Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
8ue90oYkrv.exe

Overview

General Information

Sample name:8ue90oYkrv.exe
Analysis ID:1408892
MD5:5a0d2bc66c17c640e81233cf6a200e07
SHA1:65ab84dc66feb7b7034ec5713b68fd39a6cd1a01
SHA256:e6183c4c9f5224cf8923cb76170aaf489be9428c0b7ec56f0289a74b533e7457
Infos:

Detection

Score:45
Range:0 - 100
Whitelisted:false
Confidence:100%

Compliance

Score:49
Range:0 - 100

Signatures

Multi AV Scanner detection for dropped file
.NET source code contains potential unpacker
Machine Learning detection for dropped file
Machine Learning detection for sample
Abnormal high CPU Usage
Adds / modifies Windows certificates
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for available system drives (often done to infect USB drives)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains long sleeps (>= 3 min)
Creates Visual Basic Runtime Dlls
Creates a process in suspended mode (likely to inject code)
Creates driver files
Creates files inside the driver directory
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Drops certificate files (DER)
Drops files with a non-matching file extension (content does not match file extension)
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file does not import any functions
Queries keyboard layouts
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Msiexec Execute Arbitrary DLL
Sigma detected: Use NTFS Short Name in Command Line
Sigma detected: Use Short Name Path in Command Line
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64native
  • svchost.exe (PID: 5224 cmdline: C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc MD5: F586835082F632DC8D9404D83BC16316)
  • 8ue90oYkrv.exe (PID: 3760 cmdline: C:\Users\user\Desktop\8ue90oYkrv.exe MD5: 5A0D2BC66C17C640E81233CF6A200E07)
    • TDService.exe (PID: 5868 cmdline: .\TDService.exe /m="C:\Users\user\Desktop\8UE90O~1.EXE" /k="" MD5: A94A3D60FA8A54AB71ABED39D5883D86)
      • TechkonDriver64Bit.exe (PID: 3060 cmdline: "C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe" /s MD5: F6CD94DEAEA55BB414650D6A9CB7DD6C)
        • TechkonDriver64Bit.exe (PID: 5720 cmdline: .\TechkonDriver64Bit.exe /s /m="C:\PROGRA~2\TECHKO~1\TECHKO~1\Driver\TECHKO~2.EXE" /k="" MD5: 5A3DA2206BD35C381B826FF748093684)
          • cmd.exe (PID: 6616 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\Cert\Cert.Bat" " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • x64DPInst.exe (PID: 4736 cmdline: C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\DENS /D /SA /LM /F MD5: BE3C79033FA8302002D9D3A6752F2263)
          • x64DPInst.exe (PID: 3000 cmdline: C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\MF-IR /D /SA /LM /F MD5: BE3C79033FA8302002D9D3A6752F2263)
          • x64DPInst.exe (PID: 3344 cmdline: C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SP6D70~1 /D /SA /LM /F MD5: BE3C79033FA8302002D9D3A6752F2263)
          • x64DPInst.exe (PID: 4932 cmdline: C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~4 /D /SA /LM /F MD5: BE3C79033FA8302002D9D3A6752F2263)
          • x64DPInst.exe (PID: 4772 cmdline: C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~3 /D /SA /LM /F MD5: BE3C79033FA8302002D9D3A6752F2263)
          • x64DPInst.exe (PID: 2980 cmdline: C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~2 /D /SA /LM /F MD5: BE3C79033FA8302002D9D3A6752F2263)
          • x64DPInst.exe (PID: 4828 cmdline: C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~1 /D /SA /LM /F MD5: BE3C79033FA8302002D9D3A6752F2263)
          • x64DPInst.exe (PID: 3640 cmdline: C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPC171~1 /D /SA /LM /F MD5: BE3C79033FA8302002D9D3A6752F2263)
  • msiexec.exe (PID: 6404 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 6360 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding FC59D1BB68DDFDC1E5D4349A53CC36CC MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 6208 cmdline: C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\USBIOCOM.dll MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 6616 cmdline: C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\TDSCON.ocx MD5: 9D09DC1EDA745A5F87553048E57620CF)
      • conhost.exe (PID: 4932 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 81CA40085FC75BABD2C91D18AA9FFA68)
      • certutil.exe (PID: 3044 cmdline: certutil -f -addstore TrustedPublisher TK1.cer MD5: BD8D9943A9B1DEF98EB83E0FA48796C2)
      • certutil.exe (PID: 4168 cmdline: certutil -f -addstore TrustedPublisher TK2.cer MD5: BD8D9943A9B1DEF98EB83E0FA48796C2)
    • msiexec.exe (PID: 4816 cmdline: C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\MSWINSCK.OCX MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • msiexec.exe (PID: 4236 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 60A2701AE26538E52DD17AD6BC358181 MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • TDService.exe (PID: 6476 cmdline: "C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe" MD5: F00223A56D3F89627CC88625DBCB0C42)
  • svchost.exe (PID: 7668 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall MD5: F586835082F632DC8D9404D83BC16316)
    • drvinst.exe (PID: 2036 cmdline: DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{16e7fd5a-7fa1-284a-a78e-4c7e00d15a9e}\dens_x64.inf" "9" "439f12f93" "0000000000000144" "WinSta0\Default" "000000000000015C" "208" "c:\progra~1\techko~1\techko~1\dens" MD5: D26EB7BD11479C9C3C5CB5641C4360E1)
    • drvinst.exe (PID: 3696 cmdline: DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{a68cce64-7ff6-cf40-9135-83c2fc219f99}\spectrodens_ir_x64.inf" "9" "4b61cb89f" "000000000000012C" "WinSta0\Default" "0000000000000110" "208" "c:\progra~1\techko~1\techko~1\mf-ir" MD5: D26EB7BD11479C9C3C5CB5641C4360E1)
    • drvinst.exe (PID: 1720 cmdline: DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{da57fd97-fa69-9340-a4da-037be2662fe1}\spectroplate_x64.inf" "9" "4010f9813" "0000000000000110" "WinSta0\Default" "0000000000000178" "208" "c:\progra~1\techko~1\techko~1\sp6d70~1" MD5: D26EB7BD11479C9C3C5CB5641C4360E1)
    • drvinst.exe (PID: 600 cmdline: DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{9697d70c-ee9a-f048-8996-c17faa7f2c84}\spectrojet_x64.inf" "9" "4b5792527" "000000000000018C" "WinSta0\Default" "0000000000000190" "208" "c:\progra~1\techko~1\techko~1\spectr~4" MD5: D26EB7BD11479C9C3C5CB5641C4360E1)
    • drvinst.exe (PID: 636 cmdline: DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{2b7966a8-8a6d-a94f-a256-589fc26d83d0}\spectrodrive_x64.inf" "9" "40b9ce367" "000000000000012C" "WinSta0\Default" "0000000000000110" "208" "c:\progra~1\techko~1\techko~1\spectr~3" MD5: D26EB7BD11479C9C3C5CB5641C4360E1)
    • drvinst.exe (PID: 1756 cmdline: DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{295155e4-5a7e-c344-9bda-c97bbccbaffe}\spectrodrive_x64.inf" "9" "48bc6c0e7" "0000000000000110" "WinSta0\Default" "0000000000000178" "208" "c:\progra~1\techko~1\techko~1\spectr~2" MD5: D26EB7BD11479C9C3C5CB5641C4360E1)
    • drvinst.exe (PID: 1672 cmdline: DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{fa2b8a9a-24a0-6c46-aecd-31efdad63fbc}\spectrodens_x64.inf" "9" "46d73562f" "0000000000000178" "WinSta0\Default" "0000000000000190" "208" "c:\progra~1\techko~1\techko~1\spectr~1" MD5: D26EB7BD11479C9C3C5CB5641C4360E1)
    • drvinst.exe (PID: 1500 cmdline: DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{a2a72662-6183-c742-a103-e60145f480e5}\spectrojet_x64.inf" "9" "4c691d78b" "0000000000000190" "WinSta0\Default" "000000000000012C" "208" "c:\progra~1\techko~1\techko~1\spc171~1" MD5: D26EB7BD11479C9C3C5CB5641C4360E1)
  • svchost.exe (PID: 5824 cmdline: C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc MD5: F586835082F632DC8D9404D83BC16316)
  • svchost.exe (PID: 2524 cmdline: C:\Windows\system32\svchost.exe -k wsappx -p -s AppXSvc MD5: F586835082F632DC8D9404D83BC16316)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
    C:\ProgramData\miaE9AF.tmp\TDService.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
      C:\ProgramData\{C39D0F65-909B-4DBD-A3E7-FF81A783B41B}\TDService.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
        C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\TechkonDriver64Bit.exeJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
          SourceRuleDescriptionAuthorStrings
          00000004.00000000.167625105498.0000000000401000.00000020.00000001.01000000.00000005.sdmpJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
            SourceRuleDescriptionAuthorStrings
            4.0.TDService.exe.400000.0.unpackJoeSecurity_DelphiSystemParamCountDetected Delphi use of System.ParamCount()Joe Security
              Source: Process startedAuthor: frack113: Data: Command: C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\USBIOCOM.dll, CommandLine: C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\USBIOCOM.dll, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\msiexec.exe, NewProcessName: C:\Windows\SysWOW64\msiexec.exe, OriginalFileName: C:\Windows\SysWOW64\msiexec.exe, ParentCommandLine: C:\Windows\system32\msiexec.exe /V, ParentImage: C:\Windows\System32\msiexec.exe, ParentProcessId: 6404, ParentProcessName: msiexec.exe, ProcessCommandLine: C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\USBIOCOM.dll, ProcessId: 6208, ProcessName: msiexec.exe
              Source: Process startedAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: Command: .\TDService.exe /m="C:\Users\user\Desktop\8UE90O~1.EXE" /k="", CommandLine: .\TDService.exe /m="C:\Users\user\Desktop\8UE90O~1.EXE" /k="", CommandLine|base64offset|contains: , Image: C:\ProgramData\miaE9AF.tmp\TDService.exe, NewProcessName: C:\ProgramData\miaE9AF.tmp\TDService.exe, OriginalFileName: C:\ProgramData\miaE9AF.tmp\TDService.exe, ParentCommandLine: C:\Users\user\Desktop\8ue90oYkrv.exe, ParentImage: C:\Users\user\Desktop\8ue90oYkrv.exe, ParentProcessId: 3760, ParentProcessName: 8ue90oYkrv.exe, ProcessCommandLine: .\TDService.exe /m="C:\Users\user\Desktop\8UE90O~1.EXE" /k="", ProcessId: 5868, ProcessName: TDService.exe
              Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: .\TechkonDriver64Bit.exe /s /m="C:\PROGRA~2\TECHKO~1\TECHKO~1\Driver\TECHKO~2.EXE" /k="", CommandLine: .\TechkonDriver64Bit.exe /s /m="C:\PROGRA~2\TECHKO~1\TECHKO~1\Driver\TECHKO~2.EXE" /k="", CommandLine|base64offset|contains: , Image: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe, NewProcessName: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe, OriginalFileName: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe, ParentCommandLine: "C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe" /s, ParentImage: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe, ParentProcessId: 3060, ParentProcessName: TechkonDriver64Bit.exe, ProcessCommandLine: .\TechkonDriver64Bit.exe /s /m="C:\PROGRA~2\TECHKO~1\TECHKO~1\Driver\TECHKO~2.EXE" /k="", ProcessId: 5720, ProcessName: TechkonDriver64Bit.exe
              Source: Process startedAuthor: vburov: Data: Command: C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc, CommandLine: C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 908, ProcessCommandLine: C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc, ProcessId: 5224, ProcessName: svchost.exe
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroDriveUpdate.exeVirustotal: Detection: 9%Perma Link
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroJetUpdate.exeVirustotal: Detection: 8%Perma Link
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServerApp.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroDriveUpdate.exeJoe Sandbox ML: detected
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroJetUpdate.exeJoe Sandbox ML: detected
              Source: 8ue90oYkrv.exeJoe Sandbox ML: detected

              Compliance

              barindex
              Source: 8ue90oYkrv.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbHJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64BitJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDensJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLanJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJetJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroPlateJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IRJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENSJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet2Jump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\CertJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDrive\spectrodrive_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDrive\spectrodrive_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDrive\spectrodrive_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLan\spectrodrive_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLan\spectrodrive_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLan\spectrodrive_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet\spectrojet_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet\spectrojet_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet\spectrojet_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroPlate\spectroplate_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroPlate\spectroplate_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroPlate\spectroplate_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IR\spectrodens_ir_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IR\spectrodens_ir_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IR\spectrodens_ir_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENS\dens_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENS\dens_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENS\dens_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet2\spectrojet_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet2\spectrojet_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet2\spectrojet_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\Cert\TK1.cerJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\Cert\TK2.cerJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\Cert\Cert.BatJump to behavior
              Source: C:\Windows\System32\msiexec.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD1E6019-47AE-4334-A91E-595BA68B6E06}Jump to behavior
              Source: 8ue90oYkrv.exeStatic PE information: certificate valid
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
              Source: Binary string: C:\Development\TDServiceSDK\Programm\TechkonDeviceService\TDServerLogMonitor\obj\x86\Release\TDServiceLogMonitor.pdb source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Development\TDServiceSDK\Programm\TechkonDeviceService\TDServerLogMonitor\obj\x86\Release\TDServiceLogMonitor.pdb0eNe @e_CorExeMainmscoree.dll source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Development\TDServiceSDK\Programm\TechkonDeviceService\TDServiceConnection\obj\x86\Release\TDServiceConnection.pdb,NNN @N_CorDllMainmscoree.dll source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000004103000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: gacutil.pdb, AH/@ source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167673031660.00000000032E1000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167626091802.00000000007FF000.00000002.00000001.01000000.00000005.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: GameuxInstallHelper.pdb source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167673031660.00000000032E1000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167626091802.00000000007FF000.00000002.00000001.01000000.00000005.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: gacutil.pdb source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167673031660.00000000032E1000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167626091802.00000000007FF000.00000002.00000001.01000000.00000005.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: gacutil.pdb(0 source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167673031660.00000000032E1000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167626091802.00000000007FF000.00000002.00000001.01000000.00000005.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Development\TDServiceSDK\Programm\TechkonDeviceService\TDServiceConnection\obj\x86\Release\TDServiceConnection.pdb source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000004103000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: DpInst.pdbH source: TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: w:\_thesycon\usb\usbio\_main\bin\fre\amd64\usbio_x64.pdb source: TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.000000000318C000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: DpInst.pdb source: TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmp, x64DPInst.exe
              Source: Binary string: gacutlrc.pdb source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167673031660.00000000032E1000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167626091802.00000000007FF000.00000002.00000001.01000000.00000005.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmp
              Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: d:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
              Source: C:\Windows\System32\cmd.exeFile opened: c:
              Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_00407AC0 FindNextFileW,FindClose,FindFirstFileW,FindFirstFileW,3_2_00407AC0
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: 4_2_6DA42A30 FindFirstFileW,LoadLibraryW,FindClose,FindResourceW,LoadLibraryW,4_2_6DA42A30
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: 4_2_6DA32470 FindClose,FindFirstFileW,FindFirstFileW,4_2_6DA32470
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_6A172A30 FindFirstFileW,LoadLibraryW,FindClose,FindResourceW,LoadLibraryW,13_2_6A172A30
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_6A162470 FindClose,FindFirstFileW,FindFirstFileW,13_2_6A162470
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeFile opened: C:\Users\userJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeFile opened: C:\Users\user\AppDataJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
              Source: TechkonDriver64Bit.exe, 0000000D.00000003.168267103771.0000000002804000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: HTTP://WWW.MYWEBSITE.COM/TECHKONDRIVER64BIT.7ZIP
              Source: TDService.exe, 00000004.00000003.168283345562.00000000028DB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: HTTP://WWW.TECHKON.COM/MICROSOFT
              Source: drvinst.exe, 00000017.00000003.167837015987.000001E13D4CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.000000000336F000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000017.00000003.167837015987.000001E13D4CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.000000000336F000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000017.00000003.167837015987.000001E13D4CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.thawte.com0
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000002BC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://sawebservice.red-gate.com/
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000002F82000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167625105498.0000000000418000.00000020.00000001.01000000.00000005.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007F957000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002AD9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://standards.iso.org/iso/19770/-2/2008/schema.xsd
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.000000000336F000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000017.00000003.167837015987.000001E13D4CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.000000000336F000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000017.00000003.167837015987.000001E13D4CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
              Source: drvinst.exe, 00000017.00000003.167837015987.000001E13D4CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crlb$
              Source: drvinst.exe, 00000017.00000003.167837015987.000001E13D4CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRi82PVYYKWGJWdgVNyePy5kYTdqQQUX5r1blzMz
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.000000000336F000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000017.00000003.167837015987.000001E13D4CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com07
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000002F82000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167625105498.000000000077E000.00000020.00000001.01000000.00000005.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167625105498.0000000000418000.00000020.00000001.01000000.00000005.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007F957000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002AD9000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.installaware.com/
              Source: TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002AD9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.installaware.com/InstallAware
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167625105498.000000000077E000.00000020.00000001.01000000.00000005.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.installaware.com/buydirect.aspopen
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167625105498.000000000077E000.00000020.00000001.01000000.00000005.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.installaware.com/x2/
              Source: 8ue90oYkrv.exe, 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmp, 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167673031660.00000000032E1000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167929283940.0000000000CC5000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167626091802.00000000007FF000.00000002.00000001.01000000.00000005.sdmp, TDService.exe, 00000004.00000003.168281434764.0000000000CC9000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000002.168290671231.0000000000CCB000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000C.00000002.168278210797.0000000000440000.00000002.00000001.01000000.0000000D.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000D.00000003.167699894798.000000007FE3A000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000D.00000000.167698325162.000000000095B000.00000002.00000001.01000000.0000000E.sdmp, TechkonDriver64Bit.exe, 0000000D.00000003.167729039334.000000000345C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.installaware.comz
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167673031660.00000000032E1000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.168283345562.0000000002908000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007F940000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.mywebsite.com/TECHKON
              Source: TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000D.00000003.167699894798.000000007F940000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000D.00000003.167729039334.00000000033E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.mywebsite.com/TechkonDriver64Bit.7zip
              Source: TechkonDriver64Bit.exe, 0000000D.00000003.168267103771.0000000002804000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.mywebsite.com/TechkonDriver64Bit.7zipiJ
              Source: TechkonDriver64Bit.exe, 0000000D.00000003.168267103771.0000000002804000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.mywebsite.com/TechkonDriver64Bit.7zipn
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000002BC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.red-gate.com/products/dotnet-development/smartassembly/?utm_source=smartassemblyui&utm_me
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000002BC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.smartassembly.com/webservices/Reporting/L
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000002BC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.smartassembly.com/webservices/Reporting/UploadReport2
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000002BC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.smartassembly.com/webservices/UploadReportLogin/
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000002BC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURL
              Source: TechkonDriver64Bit.exe, 0000000D.00000003.168267103771.00000000028B4000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000D.00000003.167729039334.00000000033E2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.techkon.com/
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167673031660.00000000032E1000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007F940000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.168283345562.00000000028DB000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.techkon.com/Microsoft
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{ceebd2dd-ea39-9044-afd8-41621eb760d6}\spectrodrive_x64.cat (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{295155e4-5a7e-c344-9bda-c97bbccbaffe}\spectrodrive_x64.cat (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{da57fd97-fa69-9340-a4da-037be2662fe1}\SET5181.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{16e7fd5a-7fa1-284a-a78e-4c7e00d15a9e}\dens_x64.cat (copy)Jump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\1ABF3862\DFC33D3E\spectrodens_x64.catJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{ceebd2dd-ea39-9044-afd8-41621eb760d6}\SET863D.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{da57fd97-fa69-9340-a4da-037be2662fe1}\spectroplate_x64.cat (copy)Jump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\9E7D6EA9\A1D4A3D9\TK2.cerJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{295155e4-5a7e-c344-9bda-c97bbccbaffe}\SET9CD2.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{9f354680-41e4-a947-8983-0a6ae0b9b27b}\SET6D85.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{a68cce64-7ff6-cf40-9135-83c2fc219f99}\SET3CC0.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3fc825f5-b61a-994f-9bba-85cd6c4da8b7}\spectrodens_x64.cat (copy)Jump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\52B152B3\9B44F18F\spectrodrive_x64.catJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{a68cce64-7ff6-cf40-9135-83c2fc219f99}\spectrodens_ir_x64.cat (copy)Jump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\B06B5044\C2555B5\spectrojet_x64.catJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{401fd0c5-2338-6643-b9e5-a41648c52a8f}\SET407A.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{2b7966a8-8a6d-a94f-a256-589fc26d83d0}\SET81D8.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{9f354680-41e4-a947-8983-0a6ae0b9b27b}\spectrojet_x64.cat (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{06178e7f-c714-204a-9afb-f62978734989}\SETDA1A.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{28b6d34b-f8b1-234e-a714-2f9a63d90bcc}\dens_x64.cat (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{9697d70c-ee9a-f048-8996-c17faa7f2c84}\spectrojet_x64.cat (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{2b7966a8-8a6d-a94f-a256-589fc26d83d0}\spectrodrive_x64.cat (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{c8a74b24-c087-b944-a9d3-d198b3071dfa}\spectroplate_x64.cat (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{7396bad8-7048-af42-b5d5-dc387736691c}\SETA1A5.tmpJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\F2F92670\383AE05B\spectrodrive_x64.catJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{401fd0c5-2338-6643-b9e5-a41648c52a8f}\spectrodens_ir_x64.cat (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{fa2b8a9a-24a0-6c46-aecd-31efdad63fbc}\spectrodens_x64.cat (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{16e7fd5a-7fa1-284a-a78e-4c7e00d15a9e}\SET2550.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3fc825f5-b61a-994f-9bba-85cd6c4da8b7}\SETBC8F.tmpJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\56A7DD7A\5EDECBEE\spectrojet_x64.catJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{a2a72662-6183-c742-a103-e60145f480e5}\SETD4EA.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{a2a72662-6183-c742-a103-e60145f480e5}\spectrojet_x64.cat (copy)Jump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\4D56F533\BD12AE78\spectrodens_ir_x64.catJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{7396bad8-7048-af42-b5d5-dc387736691c}\spectrodrive_x64.cat (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{06178e7f-c714-204a-9afb-f62978734989}\spectrojet_x64.cat (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{c8a74b24-c087-b944-a9d3-d198b3071dfa}\SET553A.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{9697d70c-ee9a-f048-8996-c17faa7f2c84}\SET695E.tmpJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\849003A2\CFFA0AE5\spectroplate_x64.catJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{fa2b8a9a-24a0-6c46-aecd-31efdad63fbc}\SETB80B.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{28b6d34b-f8b1-234e-a714-2f9a63d90bcc}\SET290A.tmpJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\66E41FEB\A1D4A3D9\TK1.cerJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\7AA455DC\9C4070E9\dens_x64.catJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess Stats: CPU usage > 6%
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\msvbvm60.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\7C4CDFEC\F965E9F6\MSWINSCK.OCXJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\EACB8D8\F965E9F6\MSWINSCK.OCXJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\MSWINSCK.OCXJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.sysJump to behavior
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{28b6d34b-f8b1-234e-a714-2f9a63d90bcc}
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\161fe31.msiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIFEFC.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIFFA9.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{CD1E6019-47AE-4334-A91E-595BA68B6E06}Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIFFF8.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI28.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI77.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\lcms.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\USBIOCOM.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\TDSCON.ocxJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\MSWINSCK.OCXJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\161fe35.msiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\161fe35.msiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\161fe36.msiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1930.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI19AE.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\SourceHash{55EA8940-B618-47BD-A642-20BFB2A64F78}Jump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI19FD.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1A2D.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\inprogressinstallinfo.ipiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1A6D.tmpJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\161fe39.msiJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\161fe39.msiJump to behavior
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Windows\DPINST.LOG
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\dens_x64.inf_amd64_0443b10bbf7d32a7
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\drvstore.tmp
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\inf\oem9.inf
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\spectrodens_ir_x64.inf_amd64_8d12fea260853771
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\drvstore.tmp
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\inf\oem12.inf
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\spectroplate_x64.inf_amd64_c71201b931dd1be0
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\drvstore.tmp
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\inf\oem27.inf
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\spectrojet_x64.inf_amd64_5ffa68417e0a7d5b
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\drvstore.tmp
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\inf\oem28.inf
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\spectrodrive_x64.inf_amd64_4202c4b809e7c711
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\drvstore.tmp
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\inf\oem29.inf
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\spectrodrive_x64.inf_amd64_2098370fcaa48685
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\drvstore.tmp
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\inf\oem30.inf
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\spectrodens_x64.inf_amd64_f8d6912081a30de7
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\drvstore.tmp
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\inf\oem31.inf
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\spectrojet_x64.inf_amd64_8d9b062068cda5fb
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\drvstore.tmp
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\inf\oem32.inf
              Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSIFEFC.tmpJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_0041F2D03_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_00419AA03_2_00419AA0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_0040AEE03_2_0040AEE0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_004010003_2_00401000
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_004011003_2_00401100
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_004011C03_2_004011C0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_004011D83_2_004011D8
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_004042D03_2_004042D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_004102D03_2_004102D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_004013F03_2_004013F0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_0040E4403_2_0040E440
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_0042244E3_2_0042244E
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_004055103_2_00405510
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_004045A03_2_004045A0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_004015B03_2_004015B0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_004037603_2_00403760
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_004128A03_2_004128A0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_0040D9003_2_0040D900
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_00401AB03_2_00401AB0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_00408DD03_2_00408DD0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_0040EFF03_2_0040EFF0
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: 4_2_6DA34C004_2_6DA34C00
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: 4_2_6DA2AE704_2_6DA2AE70
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: 4_2_6DA28AB04_2_6DA28AB0
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: 4_2_6DA335F04_2_6DA335F0
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: 4_2_6DA264604_2_6DA26460
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: 4_2_6DA3FEE04_2_6DA3FEE0
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: 4_2_6DA48E1B4_2_6DA48E1B
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: 4_2_6DA3B9C04_2_6DA3B9C0
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: 4_2_6DA3E9504_2_6DA3E950
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: 4_2_6DA2B4474_2_6DA2B447
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: 4_2_6DA4E78B4_2_6DA4E78B
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: 4_2_6DA4E6B04_2_6DA4E6B0
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: 4_2_6DA2E6704_2_6DA2E670
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: 4_2_6DA2D1B04_2_6DA2D1B0
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_1000100013_2_10001000
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_1000902813_2_10009028
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_1001733013_2_10017330
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_100153E013_2_100153E0
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_1000D45013_2_1000D450
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_1001E5C313_2_1001E5C3
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_1001771013_2_10017710
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_1001E75113_2_1001E751
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_1000E77013_2_1000E770
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_100127E013_2_100127E0
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_1001E82B13_2_1001E82B
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_100178D013_2_100178D0
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_1000C8E013_2_1000C8E0
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_10014A4013_2_10014A40
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_1000EB1013_2_1000EB10
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_1000CCA013_2_1000CCA0
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_1001AD1A13_2_1001AD1A
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_10016D8013_2_10016D80
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_10017DC013_2_10017DC0
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_10012F0013_2_10012F00
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_10016F8013_2_10016F80
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_6A158AB013_2_6A158AB0
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_6A15AE7013_2_6A15AE70
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_6A164C0013_2_6A164C00
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_6A15646013_2_6A156460
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_6A1635F013_2_6A1635F0
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_6A16E95013_2_6A16E950
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_6A16B9C013_2_6A16B9C0
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_6A178E1B13_2_6A178E1B
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_6A16FEE013_2_6A16FEE0
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_6A15D1B013_2_6A15D1B0
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_6A15E67013_2_6A15E670
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_6A17E6B013_2_6A17E6B0
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_6A17E78B13_2_6A17E78B
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_6A15B44713_2_6A15B447
              Source: C:\Windows\System32\svchost.exeProcess token adjusted: Security
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: String function: 6A177AA4 appears 37 times
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: String function: 10018EB0 appears 95 times
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: String function: 6A154C80 appears 39 times
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: String function: 00422A14 appears 35 times
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: String function: 6DA24C80 appears 39 times
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: String function: 6DA47AA4 appears 37 times
              Source: TDService.exe1.3.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Source: TDService.exe1.3.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Source: TDService.exe1.3.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (console) Intel 80386, for MS Windows
              Source: TDService.exe1.3.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
              Source: TDService.exe1.3.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (console) Intel 80386, for MS Windows
              Source: TDService.exe1.3.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Source: TDService.exe1.3.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (console) Intel 80386, for MS Windows
              Source: mia.lib.3.drStatic PE information: Resource name: RC_DATA type: PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
              Source: stdole2.tlb.3.drStatic PE information: No import functions for PE file found
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000004187000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTDSCON.ocx, vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.00000000041E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename7zxa.dll, vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003C7B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamedzncore.dll vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003C7B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamedznet.dllD vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003CBA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelcms.dll vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.000000000413B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.000000000413B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameW95INF16.DLL5%ProductNameMicrosoft vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.000000000413B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameW95INF32.DLLj% vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003C0E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameADVPACK.DLLx, vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003C3E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamecomcat.dllx, vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000004111000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUSBIOCOM.dllT vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameahadmin_wrapper.dll4 vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameahadmin_.dll4 vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameGameuxInstallHelper.DLLb! vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameManagedVCL.Utils.dll8 vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamegacutil.exeT vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamegacutlrc.dllT vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamez vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTDServiceLogMonitor.exeX vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTechkonSpectroDriveUpdate.exeT vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000004103000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameOLEPRO32.DLL( vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000004103000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTDServiceConnection.dlld" vs 8ue90oYkrv.exe
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000002BC0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTDServerApp.exed" vs 8ue90oYkrv.exe
              Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: capabilityaccessmanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: capabilityaccessmanagerclient.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: capauthz.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wifidatacapabilityhandler.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wwapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: cellulardatacapabilityhandler.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: explorerframe.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: msimg32.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: version.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: mpr.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: winmm.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: wtsapi32.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: winsta.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: olepro32.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: wldp.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: propsys.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: profapi.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: srclient.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: spp.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: vssapi.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: vsstrace.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: msi.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: srpapi.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: tsappcmp.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: netutils.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: edputil.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: slc.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: userenv.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: sppc.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: usbiocom.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msvbvm60.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: version.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: netfxperf.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: edgegdi.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: explorerframe.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: msimg32.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: version.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: mpr.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: winmm.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: edgegdi.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: uxtheme.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: kernel.appcore.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: wtsapi32.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: winsta.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: olepro32.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: windows.storage.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: wldp.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: propsys.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: profapi.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: dwmapi.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: mscoree.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: srclient.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: spp.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: powrprof.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: vssapi.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: vsstrace.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: umpdc.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: ntmarta.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: msi.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: srpapi.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: tsappcmp.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: netapi32.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: wkscli.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: netutils.dll
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeSection loaded: apphelp.dll
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dll
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dll
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dll
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dll
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dll
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: edgegdi.dll
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dll
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dll
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dll
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dll
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: certcli.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: cabinet.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: cryptui.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: certca.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: ncrypt.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: netapi32.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: ntdsapi.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: version.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: secur32.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: samcli.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: logoncli.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: dsrole.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: netutils.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: edgegdi.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: ntasn1.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: certcli.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: cabinet.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: cryptui.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: certca.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: ncrypt.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: netapi32.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: ntdsapi.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: version.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: secur32.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: samcli.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: logoncli.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: dsrole.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: netutils.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: edgegdi.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: ntasn1.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\certutil.exeSection loaded: cryptbase.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: apphelp.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: version.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: edgegdi.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msasn1.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: kernel.appcore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: uxtheme.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msxml3.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: drvstore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devrtl.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: spinf.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: cabinet.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: ntmarta.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devobj.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: umpnpmgr.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: devrtl.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptnet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: slc.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: sppc.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: version.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: edgegdi.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msasn1.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: kernel.appcore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: uxtheme.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msxml3.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: drvstore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devrtl.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: spinf.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: cabinet.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: ntmarta.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devobj.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptnet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: slc.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: sppc.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: version.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: edgegdi.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msasn1.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: kernel.appcore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: uxtheme.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msxml3.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: drvstore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devrtl.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: spinf.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: cabinet.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: ntmarta.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devobj.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptnet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: slc.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: sppc.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: version.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: edgegdi.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msasn1.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: kernel.appcore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: uxtheme.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msxml3.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: drvstore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devrtl.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: spinf.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: cabinet.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: ntmarta.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devobj.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptnet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: slc.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: sppc.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: version.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: edgegdi.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msasn1.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: kernel.appcore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: uxtheme.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msxml3.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: drvstore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devrtl.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: spinf.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: cabinet.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: ntmarta.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devobj.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptnet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: slc.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: sppc.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: version.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: edgegdi.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msasn1.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: kernel.appcore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: uxtheme.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msxml3.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: drvstore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devrtl.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: spinf.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: cabinet.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: ntmarta.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devobj.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptnet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: slc.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: sppc.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: version.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: edgegdi.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msasn1.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: kernel.appcore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: uxtheme.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msxml3.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: drvstore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devrtl.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: spinf.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: cabinet.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: ntmarta.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devobj.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptnet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: slc.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: sppc.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: version.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: edgegdi.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msasn1.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: kernel.appcore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: uxtheme.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: msxml3.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: drvstore.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devrtl.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: spinf.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: cabinet.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: ntmarta.dll
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeSection loaded: devobj.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: cryptnet.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: slc.dll
              Source: C:\Windows\System32\drvinst.exeSection loaded: sppc.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: edgegdi.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: capabilityaccessmanager.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: capabilityaccessmanagerclient.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: windows.staterepositoryps.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: capauthz.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wifidatacapabilityhandler.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wwapi.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: cellulardatacapabilityhandler.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: edgegdi.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentserver.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: staterepository.core.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: mrmdeploy.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: mrmcorer.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wevtapi.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wer.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: wtsapi32.dll
              Source: C:\Windows\System32\svchost.exeSection loaded: winsta.dll
              Source: 8ue90oYkrv.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: TechkonSpectroJetUpdate.exe.3.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: TDServerApp.exe.3.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: TDService.exe.3.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: TDService.exe0.3.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: TechkonSpectroDriveUpdate.exe.3.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: TechkonSpectroJetUpdate.exe.3.dr, SimpleZip.csCryptographic APIs: 'CreateDecryptor'
              Source: TechkonSpectroJetUpdate.exe.3.dr, SimpleZip.csCryptographic APIs: 'TransformFinalBlock'
              Source: TechkonSpectroJetUpdate.exe.3.dr, SimpleZip.csCryptographic APIs: 'TransformFinalBlock'
              Source: TDServerApp.exe.3.dr, -.csCryptographic APIs: 'CreateDecryptor'
              Source: TDServerApp.exe.3.dr, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: TDServerApp.exe.3.dr, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: TDService.exe.3.dr, -.csCryptographic APIs: 'CreateDecryptor'
              Source: TDService.exe.3.dr, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: TDService.exe.3.dr, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: classification engineClassification label: mal45.evad.winEXE@63/343@0/0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_0041E6A0 GetVersion,CoCreateInstance,3_2_0041E6A0
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: 4_2_6DA42980 LoadResource,SizeofResource,LockResource,CreateFileW,WriteFile,FindCloseChangeNotification,DeleteFileW,4_2_6DA42980
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeCode function: 11_2_0142A3E2 StartServiceCtrlDispatcherW,11_2_0142A3E2
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeCode function: 11_2_0142A3E2 StartServiceCtrlDispatcherW,11_2_0142A3E2
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeCode function: 11_2_0142A3B6 StartServiceCtrlDispatcherW,11_2_0142A3B6
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\TECHKON GmbHJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeFile created: C:\Users\user\AppData\Local\IIIQFJump to behavior
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeMutant created: \Sessions\1\BaseNamedObjects\Global\DPINST_LOG_SCROLLER_MUTEX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeMutant created: NULL
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeMutant created: \BaseNamedObjects\Global\.net clr networking
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4932:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4932:304:WilStaging_02
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeMutant created: \BaseNamedObjects\Global\netfxeventlog.1.0
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeFile created: C:\Users\user\AppData\Local\Temp\lang.locJump to behavior
              Source: Yara matchFile source: 4.0.TDService.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000000.167625105498.0000000000401000.00000020.00000001.01000000.00000005.sdmp, type: MEMORY
              Source: Yara matchFile source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe, type: DROPPED
              Source: Yara matchFile source: C:\ProgramData\miaE9AF.tmp\TDService.exe, type: DROPPED
              Source: Yara matchFile source: C:\ProgramData\{C39D0F65-909B-4DBD-A3E7-FF81A783B41B}\TDService.exe, type: DROPPED
              Source: Yara matchFile source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\TechkonDriver64Bit.exe, type: DROPPED
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\Cert\Cert.Bat" "
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: PTn3_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: "-k=3_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: "/k=3_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: -k=3_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: /k=3_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: Title3_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: BeginPrompt3_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: Progress3_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: Directory3_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: RunProgram3_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: ExecuteFile3_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: @KA3_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: setup.exe3_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: %%T3_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: %%T\3_2_0041F2D0
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCommand line argument: mia.lib3_2_0041F2D0
              Source: 8ue90oYkrv.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\Locales
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
              Source: x64DPInst.exeString found in binary or memory: Some post-install cleanup tasks failed. Error code is 0x%X
              Source: x64DPInst.exeString found in binary or memory: During undo of install, we failed to re-install the driver. Error code 0x%X
              Source: x64DPInst.exeString found in binary or memory: Error 0x%X - Could not delete service info key for '%ws', even though there are no more DIFx-installed driver stores using this se
              Source: x64DPInst.exeString found in binary or memory: Install option set: Suppress pre-install of Plug and Play drivers if no matching devices are present.
              Source: x64DPInst.exeString found in binary or memory: Successfully re-added '%s' to reference list of driver store entry '%s'
              Source: x64DPInst.exeString found in binary or memory: Could not re-add '%s' to reference list of driver store entry '%s'
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile read: C:\Users\user\Desktop\8ue90oYkrv.exeJump to behavior
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
              Source: unknownProcess created: C:\Users\user\Desktop\8ue90oYkrv.exe C:\Users\user\Desktop\8ue90oYkrv.exe
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeProcess created: C:\ProgramData\miaE9AF.tmp\TDService.exe .\TDService.exe /m="C:\Users\user\Desktop\8UE90O~1.EXE" /k=""
              Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding FC59D1BB68DDFDC1E5D4349A53CC36CC
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\USBIOCOM.dll
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\TDSCON.ocx
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\MSWINSCK.OCX
              Source: unknownProcess created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe "C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe"
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe "C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe" /s
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeProcess created: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe .\TechkonDriver64Bit.exe /s /m="C:\PROGRA~2\TECHKO~1\TECHKO~1\Driver\TECHKO~2.EXE" /k=""
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 60A2701AE26538E52DD17AD6BC358181
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\Cert\Cert.Bat" "
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -f -addstore TrustedPublisher TK1.cer
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -f -addstore TrustedPublisher TK2.cer
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\DENS /D /SA /LM /F
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{16e7fd5a-7fa1-284a-a78e-4c7e00d15a9e}\dens_x64.inf" "9" "439f12f93" "0000000000000144" "WinSta0\Default" "000000000000015C" "208" "c:\progra~1\techko~1\techko~1\dens"
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\MF-IR /D /SA /LM /F
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{a68cce64-7ff6-cf40-9135-83c2fc219f99}\spectrodens_ir_x64.inf" "9" "4b61cb89f" "000000000000012C" "WinSta0\Default" "0000000000000110" "208" "c:\progra~1\techko~1\techko~1\mf-ir"
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SP6D70~1 /D /SA /LM /F
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{da57fd97-fa69-9340-a4da-037be2662fe1}\spectroplate_x64.inf" "9" "4010f9813" "0000000000000110" "WinSta0\Default" "0000000000000178" "208" "c:\progra~1\techko~1\techko~1\sp6d70~1"
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~4 /D /SA /LM /F
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{9697d70c-ee9a-f048-8996-c17faa7f2c84}\spectrojet_x64.inf" "9" "4b5792527" "000000000000018C" "WinSta0\Default" "0000000000000190" "208" "c:\progra~1\techko~1\techko~1\spectr~4"
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~3 /D /SA /LM /F
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{2b7966a8-8a6d-a94f-a256-589fc26d83d0}\spectrodrive_x64.inf" "9" "40b9ce367" "000000000000012C" "WinSta0\Default" "0000000000000110" "208" "c:\progra~1\techko~1\techko~1\spectr~3"
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~2 /D /SA /LM /F
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{295155e4-5a7e-c344-9bda-c97bbccbaffe}\spectrodrive_x64.inf" "9" "48bc6c0e7" "0000000000000110" "WinSta0\Default" "0000000000000178" "208" "c:\progra~1\techko~1\techko~1\spectr~2"
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~1 /D /SA /LM /F
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{fa2b8a9a-24a0-6c46-aecd-31efdad63fbc}\spectrodens_x64.inf" "9" "46d73562f" "0000000000000178" "WinSta0\Default" "0000000000000190" "208" "c:\progra~1\techko~1\techko~1\spectr~1"
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPC171~1 /D /SA /LM /F
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{a2a72662-6183-c742-a103-e60145f480e5}\spectrojet_x64.inf" "9" "4c691d78b" "0000000000000190" "WinSta0\Default" "000000000000012C" "208" "c:\progra~1\techko~1\techko~1\spc171~1"
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k wsappx -p -s AppXSvc
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeProcess created: C:\ProgramData\miaE9AF.tmp\TDService.exe .\TDService.exe /m="C:\Users\user\Desktop\8UE90O~1.EXE" /k=""Jump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe "C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe" /sJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding FC59D1BB68DDFDC1E5D4349A53CC36CCJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\USBIOCOM.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\TDSCON.ocxJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\MSWINSCK.OCXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 60A2701AE26538E52DD17AD6BC358181Jump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeProcess created: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe .\TechkonDriver64Bit.exe /s /m="C:\PROGRA~2\TECHKO~1\TECHKO~1\Driver\TECHKO~2.EXE" /k=""Jump to behavior
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\Cert\Cert.Bat" "
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\DENS /D /SA /LM /F
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\MF-IR /D /SA /LM /F
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SP6D70~1 /D /SA /LM /F
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~3 /D /SA /LM /F
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~2 /D /SA /LM /F
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~1 /D /SA /LM /F
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPC171~1 /D /SA /LM /F
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -f -addstore TrustedPublisher TK1.cer
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -f -addstore TrustedPublisher TK2.cer
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{16e7fd5a-7fa1-284a-a78e-4c7e00d15a9e}\dens_x64.inf" "9" "439f12f93" "0000000000000144" "WinSta0\Default" "000000000000015C" "208" "c:\progra~1\techko~1\techko~1\dens"
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{a68cce64-7ff6-cf40-9135-83c2fc219f99}\spectrodens_ir_x64.inf" "9" "4b61cb89f" "000000000000012C" "WinSta0\Default" "0000000000000110" "208" "c:\progra~1\techko~1\techko~1\mf-ir"
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{da57fd97-fa69-9340-a4da-037be2662fe1}\spectroplate_x64.inf" "9" "4010f9813" "0000000000000110" "WinSta0\Default" "0000000000000178" "208" "c:\progra~1\techko~1\techko~1\sp6d70~1"
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{9697d70c-ee9a-f048-8996-c17faa7f2c84}\spectrojet_x64.inf" "9" "4b5792527" "000000000000018C" "WinSta0\Default" "0000000000000190" "208" "c:\progra~1\techko~1\techko~1\spectr~4"
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{2b7966a8-8a6d-a94f-a256-589fc26d83d0}\spectrodrive_x64.inf" "9" "40b9ce367" "000000000000012C" "WinSta0\Default" "0000000000000110" "208" "c:\progra~1\techko~1\techko~1\spectr~3"
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{295155e4-5a7e-c344-9bda-c97bbccbaffe}\spectrodrive_x64.inf" "9" "48bc6c0e7" "0000000000000110" "WinSta0\Default" "0000000000000178" "208" "c:\progra~1\techko~1\techko~1\spectr~2"
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{fa2b8a9a-24a0-6c46-aecd-31efdad63fbc}\spectrodens_x64.inf" "9" "46d73562f" "0000000000000178" "WinSta0\Default" "0000000000000190" "208" "c:\progra~1\techko~1\techko~1\spectr~1"
              Source: C:\Windows\System32\svchost.exeProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{a2a72662-6183-c742-a103-e60145f480e5}\spectrojet_x64.inf" "9" "4c691d78b" "0000000000000190" "WinSta0\Default" "000000000000012C" "208" "c:\progra~1\techko~1\techko~1\spc171~1"
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32Jump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbHJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64BitJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDensJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLanJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJetJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroPlateJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IRJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENSJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet2Jump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\CertJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDrive\spectrodrive_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDrive\spectrodrive_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDrive\spectrodrive_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLan\spectrodrive_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLan\spectrodrive_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLan\spectrodrive_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet\spectrojet_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet\spectrojet_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet\spectrojet_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroPlate\spectroplate_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroPlate\spectroplate_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroPlate\spectroplate_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IR\spectrodens_ir_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IR\spectrodens_ir_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IR\spectrodens_ir_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENS\dens_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENS\dens_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENS\dens_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet2\spectrojet_x64.sysJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet2\spectrojet_x64.infJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet2\spectrojet_x64.catJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\Cert\TK1.cerJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\Cert\TK2.cerJump to behavior
              Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\Cert\Cert.BatJump to behavior
              Source: C:\Windows\System32\msiexec.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CD1E6019-47AE-4334-A91E-595BA68B6E06}Jump to behavior
              Source: 8ue90oYkrv.exeStatic PE information: certificate valid
              Source: 8ue90oYkrv.exeStatic file information: File size 13453632 > 1048576
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
              Source: Binary string: C:\Development\TDServiceSDK\Programm\TechkonDeviceService\TDServerLogMonitor\obj\x86\Release\TDServiceLogMonitor.pdb source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Development\TDServiceSDK\Programm\TechkonDeviceService\TDServerLogMonitor\obj\x86\Release\TDServiceLogMonitor.pdb0eNe @e_CorExeMainmscoree.dll source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Development\TDServiceSDK\Programm\TechkonDeviceService\TDServiceConnection\obj\x86\Release\TDServiceConnection.pdb,NNN @N_CorDllMainmscoree.dll source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000004103000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: gacutil.pdb, AH/@ source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167673031660.00000000032E1000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167626091802.00000000007FF000.00000002.00000001.01000000.00000005.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: GameuxInstallHelper.pdb source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167673031660.00000000032E1000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167626091802.00000000007FF000.00000002.00000001.01000000.00000005.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: gacutil.pdb source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167673031660.00000000032E1000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167626091802.00000000007FF000.00000002.00000001.01000000.00000005.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: gacutil.pdb(0 source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167673031660.00000000032E1000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167626091802.00000000007FF000.00000002.00000001.01000000.00000005.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Development\TDServiceSDK\Programm\TechkonDeviceService\TDServiceConnection\obj\x86\Release\TDServiceConnection.pdb source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000004103000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: DpInst.pdbH source: TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: w:\_thesycon\usb\usbio\_main\bin\fre\amd64\usbio_x64.pdb source: TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.000000000318C000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: DpInst.pdb source: TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmp, x64DPInst.exe
              Source: Binary string: gacutlrc.pdb source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167673031660.00000000032E1000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167626091802.00000000007FF000.00000002.00000001.01000000.00000005.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: TechkonSpectroJetUpdate.exe.3.dr, AssemblyResolverHelper.cs.Net Code: ResolveAssembly System.Reflection.Assembly.Load(byte[])
              Source: TDServerApp.exe.3.dr, --.cs.Net Code: _001B_0008 System.Reflection.Assembly.Load(byte[])
              Source: TDService.exe.3.dr, --.cs.Net Code: _001B_0008 System.Reflection.Assembly.Load(byte[])
              Source: TDService.exe0.3.dr, --.cs.Net Code: _001B_0008 System.Reflection.Assembly.Load(byte[])
              Source: TechkonSpectroDriveUpdate.exe.3.dr, AssemblyResolverHelper.cs.Net Code: ResolveAssembly System.Reflection.Assembly.Load(byte[])
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_00425561 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,3_2_00425561
              Source: lcms.dll.3.drStatic PE information: real checksum: 0x0 should be: 0x35ee6
              Source: TechkonSpectroJetUpdate.exe.3.drStatic PE information: real checksum: 0x0 should be: 0xe77a0
              Source: mVBExec.dll.3.drStatic PE information: real checksum: 0x0 should be: 0x14f360
              Source: TDServerApp.exe.3.drStatic PE information: real checksum: 0x0 should be: 0x132619
              Source: mMSIExec.dll.3.drStatic PE information: real checksum: 0x0 should be: 0x16af1f
              Source: dzncore.dll.3.drStatic PE information: real checksum: 0x0 should be: 0x3f85f
              Source: mia.lib.3.drStatic PE information: real checksum: 0x78abd should be: 0xa3ca7
              Source: TDService.exe0.3.drStatic PE information: real checksum: 0x0 should be: 0x127b7b
              Source: TDServiceLogMonitor.exe.3.drStatic PE information: real checksum: 0x0 should be: 0x11f04
              Source: TechkonSpectroDriveUpdate.exe.3.drStatic PE information: real checksum: 0x0 should be: 0x1ba8a4
              Source: stdole2.tlb.3.drStatic PE information: real checksum: 0x0 should be: 0x52af
              Source: TDService.exe1.3.drStatic PE information: real checksum: 0x0 should be: 0x519d69
              Source: TDService.exe.3.drStatic PE information: real checksum: 0x0 should be: 0x127b7b
              Source: mMSIExec.dll.3.drStatic PE information: section name: .didata
              Source: msvbvm60.dll.3.drStatic PE information: section name: ENGINE
              Source: mVBExec.dll.3.drStatic PE information: section name: .didata
              Source: TDService.exe1.3.drStatic PE information: section name: .didata
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_004300F8 push eax; retf 3_2_00430145
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_004353B0 push eax; retf 0042h3_2_004353B1
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_00435484 push eax; retf 3_2_00435485
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_00435494 pushad ; retf 3_2_00435495
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_0043368D pushad ; retf 0002h3_2_00433699
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_00422A59 push ecx; ret 3_2_00422A6C
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_00434BC8 push eax; retn 0042h3_2_00434BC9
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: 4_2_6DA47AE9 push ecx; ret 4_2_6DA47AFC
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeCode function: 11_2_0142268D push eax; retf 11_2_0142268E
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeCode function: 11_2_01423162 push ebp; retf 11_2_0142316A
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeCode function: 11_2_01422BB8 pushfd ; retf 11_2_01422BBE
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_10013130 push ecx; mov dword ptr [esp], ecx13_2_10013131
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_1001D2C0 push eax; ret 13_2_1001D2EE
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_10018EB0 push eax; ret 13_2_10018ECE
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_6A177AE9 push ecx; ret 13_2_6A177AFC
              Source: TechkonSpectroJetUpdate.exe.3.drStatic PE information: section name: .text entropy: 7.8810776452765055
              Source: TDServerApp.exe.3.drStatic PE information: section name: .text entropy: 7.851236452154908
              Source: TDService.exe.3.drStatic PE information: section name: .text entropy: 7.950881957105219
              Source: TDService.exe0.3.drStatic PE information: section name: .text entropy: 7.950881957105219
              Source: TechkonSpectroDriveUpdate.exe.3.drStatic PE information: section name: .text entropy: 7.905714785753008
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\1A9DA512\CFFA0AE5\spectroplate_x64.sysJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\98500B5D\BD12AE78\spectrodens_ir_x64.sysJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet\spectrojet_x64.sysJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENS\dens_x64.sysJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\66980B9F\9C4070E9\dens_x64.sysJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3fc825f5-b61a-994f-9bba-85cd6c4da8b7}\SETBD0E.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\TDSCON.ocxJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\A913E6AF\BB0F7F36\dzncore.dllJump to dropped file
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeFile created: C:\Users\user\AppData\Local\IIIQF\7z.dllJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{9f354680-41e4-a947-8983-0a6ae0b9b27b}\SET6DE5.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\1872974D\9EB13253\TechkonDriver64Bit.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\EACB8D8\F965E9F6\MSWINSCK.OCXJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\8808A0B2\65F95E8\TechkonSpectroDriveUpdate.exeJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{401fd0c5-2338-6643-b9e5-a41648c52a8f}\SET40D9.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroJetUpdate.exeJump to dropped file
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeFile created: C:\ProgramData\{C39D0F65-909B-4DBD-A3E7-FF81A783B41B}\TDService.exeJump to dropped file
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeFile created: C:\Users\user\AppData\Local\Temp\mia1\mMSIExec.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\asycfilt.dllJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{ceebd2dd-ea39-9044-afd8-41621eb760d6}\SET86AC.tmpJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\ADVPACK.DLLJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\C5D9D236\F965E9F6\lcms.dllJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{401fd0c5-2338-6643-b9e5-a41648c52a8f}\spectrodens_ir_x64.sys (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{295155e4-5a7e-c344-9bda-c97bbccbaffe}\SET9D61.tmpJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\mMSI.dll\mMSIExec.dllJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{7396bad8-7048-af42-b5d5-dc387736691c}\spectrodrive_x64.sys (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{da57fd97-fa69-9340-a4da-037be2662fe1}\spectroplate_x64.sys (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{a2a72662-6183-c742-a103-e60145f480e5}\SETD578.tmpJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\C64028C1\DF012C2A\TDSCON.ocxJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{16e7fd5a-7fa1-284a-a78e-4c7e00d15a9e}\dens_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI19FD.tmpJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\7C4CDFEC\F965E9F6\MSWINSCK.OCXJump to dropped file
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeFile created: C:\Users\user\AppData\Local\Temp\mia1\mVBExec.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\F0FC8706\FDA73152\TDService.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\olepro32.dllJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{c8a74b24-c087-b944-a9d3-d198b3071dfa}\SET559A.tmpJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\mia.libJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: 161fe34.rbf (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{a2a72662-6183-c742-a103-e60145f480e5}\spectrojet_x64.sys (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{a68cce64-7ff6-cf40-9135-83c2fc219f99}\SET3D30.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIFFF8.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IR\spectrodens_ir_x64.sysJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\C0AC9330\383AE05B\spectrodrive_x64.sysJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{16e7fd5a-7fa1-284a-a78e-4c7e00d15a9e}\SET25A1.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{fa2b8a9a-24a0-6c46-aecd-31efdad63fbc}\spectrodens_x64.sys (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{9697d70c-ee9a-f048-8996-c17faa7f2c84}\SET69DD.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{06178e7f-c714-204a-9afb-f62978734989}\SETDA99.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver32Bit.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\mVBExec.dllJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{c8a74b24-c087-b944-a9d3-d198b3071dfa}\spectroplate_x64.sys (copy)Jump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\msvbvm60.dllJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroPlate\spectroplate_x64.sysJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\34E6DE3C\FDA73152\TDService.exeJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{ceebd2dd-ea39-9044-afd8-41621eb760d6}\spectrodrive_x64.sys (copy)Jump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\CC3273D\BD615B11\TechkonSpectroJetUpdate.exeJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroDriveUpdate.exeJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\lcms.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\W95INF32.DLLJump to dropped file
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeFile created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\mia.libJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDrive\spectrodrive_x64.sysJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServerApp.exeJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\mDIFxIDE.dll\mDIFxEXE.dllJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{9f354680-41e4-a947-8983-0a6ae0b9b27b}\spectrojet_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{28b6d34b-f8b1-234e-a714-2f9a63d90bcc}\dens_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI28.tmpJump to dropped file
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeFile created: C:\Users\user\AppData\Local\Temp\mia2\mDIFxEXE.dllJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\9167C40A\C2555B5\spectrojet_x64.sysJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{a68cce64-7ff6-cf40-9135-83c2fc219f99}\spectrodens_ir_x64.sys (copy)Jump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\3CEB12CD\59B974C\TechkonDriver32Bit.exeJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIFEFC.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI19AE.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{da57fd97-fa69-9340-a4da-037be2662fe1}\SET51F0.tmpJump to dropped file
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeFile created: C:\ProgramData\{C39D0F65-909B-4DBD-A3E7-FF81A783B41B}\mia.libJump to dropped file
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeFile created: C:\Users\user\AppData\Local\Temp\mia2\mMSIExec.dllJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1930.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet2\spectrojet_x64.sysJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServiceConnection.dllJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServiceLogMonitor.exeJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{2b7966a8-8a6d-a94f-a256-589fc26d83d0}\SET8257.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3fc825f5-b61a-994f-9bba-85cd6c4da8b7}\spectrodens_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{7396bad8-7048-af42-b5d5-dc387736691c}\SETA224.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\dzncore.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\oleaut32.dllJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIFFA9.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{295155e4-5a7e-c344-9bda-c97bbccbaffe}\spectrodrive_x64.sys (copy)Jump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\W95INF16.DLLJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\mia.libJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\stdole2.tlbJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{28b6d34b-f8b1-234e-a714-2f9a63d90bcc}\SET2969.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLan\spectrodrive_x64.sysJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\76FCA102\DFC33D3E\spectrodens_x64.sysJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\CECD985D\BB0F7F36\dznet.dllJump to dropped file
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeFile created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\TechkonDriver64Bit.exeJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1A2D.tmpJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\1A2661C4\F965E9F6\USBIOCOM.dllJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{9697d70c-ee9a-f048-8996-c17faa7f2c84}\spectrojet_x64.sys (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{2b7966a8-8a6d-a94f-a256-589fc26d83d0}\spectrodrive_x64.sys (copy)Jump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\502E833A\9B44F18F\spectrodrive_x64.sysJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeFile created: C:\Users\user\AppData\Local\Temp\{fa2b8a9a-24a0-6c46-aecd-31efdad63fbc}\SETB89A.tmpJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\8135F827\A789A22E\TDServiceLogMonitor.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\3476C065\CC63C202\TDServiceConnection.dllJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\USBIOCOM.dllJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\MSWINSCK.OCXJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\94312164\5EDECBEE\spectrojet_x64.sysJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.sysJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\comcat.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\25D64044\E98CA0F\TDServerApp.exeJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\mDIFxIDE.dll\x64DPInst.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\TDService.exeJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{06178e7f-c714-204a-9afb-f62978734989}\spectrojet_x64.sys (copy)Jump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mMSI.dll\mMSIExec.dllJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\dznet.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\7C4CDFEC\F965E9F6\MSWINSCK.OCXJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\1A9DA512\CFFA0AE5\spectroplate_x64.sysJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\stdole2.tlbJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\mia.libJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\F0FC8706\FDA73152\TDService.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\olepro32.dllJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\98500B5D\BD12AE78\spectrodens_ir_x64.sysJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\CECD985D\BB0F7F36\dznet.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\W95INF32.DLLJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\76FCA102\DFC33D3E\spectrodens_x64.sysJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\mia.libJump to dropped file
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeFile created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\mia.libJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\66980B9F\9C4070E9\dens_x64.sysJump to dropped file
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeFile created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\TechkonDriver64Bit.exeJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\mDIFxIDE.dll\mDIFxEXE.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\A913E6AF\BB0F7F36\dzncore.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\1872974D\9EB13253\TechkonDriver64Bit.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\1A2661C4\F965E9F6\USBIOCOM.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\EACB8D8\F965E9F6\MSWINSCK.OCXJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\502E833A\9B44F18F\spectrodrive_x64.sysJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\C0AC9330\383AE05B\spectrodrive_x64.sysJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\9167C40A\C2555B5\spectrojet_x64.sysJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\8808A0B2\65F95E8\TechkonSpectroDriveUpdate.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\3CEB12CD\59B974C\TechkonDriver32Bit.exeJump to dropped file
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeFile created: C:\ProgramData\{C39D0F65-909B-4DBD-A3E7-FF81A783B41B}\TDService.exeJump to dropped file
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeFile created: C:\ProgramData\{C39D0F65-909B-4DBD-A3E7-FF81A783B41B}\mia.libJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\8135F827\A789A22E\TDServiceLogMonitor.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\asycfilt.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\mVBExec.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\3476C065\CC63C202\TDServiceConnection.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\ADVPACK.DLLJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\C5D9D236\F965E9F6\lcms.dllJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\94312164\5EDECBEE\spectrojet_x64.sysJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\msvbvm60.dllJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\mMSI.dll\mMSIExec.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\comcat.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\34E6DE3C\FDA73152\TDService.exeJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\oleaut32.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\25D64044\E98CA0F\TDServerApp.exeJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\data\OFFLINE\mDIFxIDE.dll\x64DPInst.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\TDService.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\C64028C1\DF012C2A\TDSCON.ocxJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mMSI.dll\mMSIExec.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\CC3273D\BD615B11\TechkonSpectroJetUpdate.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\W95INF16.DLLJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI19FD.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{28b6d34b-f8b1-234e-a714-2f9a63d90bcc}\SET2969.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\lcms.dllJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{c8a74b24-c087-b944-a9d3-d198b3071dfa}\SET559A.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1A2D.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIFFF8.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3fc825f5-b61a-994f-9bba-85cd6c4da8b7}\SETBD0E.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\TDSCON.ocxJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{9f354680-41e4-a947-8983-0a6ae0b9b27b}\SET6DE5.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{9f354680-41e4-a947-8983-0a6ae0b9b27b}\spectrojet_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{28b6d34b-f8b1-234e-a714-2f9a63d90bcc}\dens_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI28.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{401fd0c5-2338-6643-b9e5-a41648c52a8f}\SET40D9.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI19AE.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIFEFC.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{06178e7f-c714-204a-9afb-f62978734989}\SETDA99.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{ceebd2dd-ea39-9044-afd8-41621eb760d6}\SET86AC.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI1930.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\USBIOCOM.dllJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\SysWOW64\MSWINSCK.OCXJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{401fd0c5-2338-6643-b9e5-a41648c52a8f}\spectrodens_ir_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{c8a74b24-c087-b944-a9d3-d198b3071dfa}\spectroplate_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{7396bad8-7048-af42-b5d5-dc387736691c}\spectrodrive_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{3fc825f5-b61a-994f-9bba-85cd6c4da8b7}\spectrodens_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{7396bad8-7048-af42-b5d5-dc387736691c}\SETA224.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIFFA9.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{ceebd2dd-ea39-9044-afd8-41621eb760d6}\spectrodrive_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{06178e7f-c714-204a-9afb-f62978734989}\spectrojet_x64.sys (copy)Jump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeFile created: C:\ProgramData\miaE9AF.tmp\mia.libJump to dropped file
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeFile created: C:\ProgramData\{C39D0F65-909B-4DBD-A3E7-FF81A783B41B}\mia.libJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeFile created: C:\ProgramData\miaB21.tmp\mia.libJump to dropped file
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeFile created: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\mia.libJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\TDServiceLogJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeCode function: 11_2_0142A3E2 StartServiceCtrlDispatcherW,11_2_0142A3E2
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\cmd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\cmd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\Windows\System32\cmd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\cmd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\cmd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\cmd.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\conhost.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeMemory allocated: 1480000 memory reserve | memory write watchJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeMemory allocated: 2090000 memory reserve | memory write watchJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeMemory allocated: 4090000 memory commit | memory reserve | memory write watchJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeWindow / User API: threadDelayed 8924Jump to behavior
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroDriveUpdate.exeJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\ProgramData\miaB21.tmp\data\OFFLINE\1A9DA512\CFFA0AE5\spectroplate_x64.sysJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\SysWOW64\lcms.dllJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\ProgramData\miaB21.tmp\data\OFFLINE\98500B5D\BD12AE78\spectrodens_ir_x64.sysJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\W95INF32.DLLJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet\spectrojet_x64.sysJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENS\dens_x64.sysJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\ProgramData\miaB21.tmp\data\OFFLINE\66980B9F\9C4070E9\dens_x64.sysJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDrive\spectrodrive_x64.sysJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServerApp.exeJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{3fc825f5-b61a-994f-9bba-85cd6c4da8b7}\SETBD0E.tmpJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\ProgramData\miaB21.tmp\data\OFFLINE\mDIFxIDE.dll\mDIFxEXE.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\A913E6AF\BB0F7F36\dzncore.dllJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{9f354680-41e4-a947-8983-0a6ae0b9b27b}\SET6DE5.tmpJump to dropped file
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\IIIQF\7z.dllJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{9f354680-41e4-a947-8983-0a6ae0b9b27b}\spectrojet_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{28b6d34b-f8b1-234e-a714-2f9a63d90bcc}\dens_x64.sys (copy)Jump to dropped file
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\mia2\mDIFxEXE.dllJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI28.tmpJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\ProgramData\miaB21.tmp\data\OFFLINE\9167C40A\C2555B5\spectrojet_x64.sysJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\8808A0B2\65F95E8\TechkonSpectroDriveUpdate.exeJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{a68cce64-7ff6-cf40-9135-83c2fc219f99}\spectrodens_ir_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{401fd0c5-2338-6643-b9e5-a41648c52a8f}\SET40D9.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroJetUpdate.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\3CEB12CD\59B974C\TechkonDriver32Bit.exeJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI19AE.tmpJump to dropped file
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\mia1\mMSIExec.dllJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIFEFC.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{da57fd97-fa69-9340-a4da-037be2662fe1}\SET51F0.tmpJump to dropped file
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\mia2\mMSIExec.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\asycfilt.dllJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{ceebd2dd-ea39-9044-afd8-41621eb760d6}\SET86AC.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI1930.tmpJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\ADVPACK.DLLJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet2\spectrojet_x64.sysJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\C5D9D236\F965E9F6\lcms.dllJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{401fd0c5-2338-6643-b9e5-a41648c52a8f}\spectrodens_ir_x64.sys (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{295155e4-5a7e-c344-9bda-c97bbccbaffe}\SET9D61.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServiceConnection.dllJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\ProgramData\miaB21.tmp\data\OFFLINE\mMSI.dll\mMSIExec.dllJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{7396bad8-7048-af42-b5d5-dc387736691c}\spectrodrive_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServiceLogMonitor.exeJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{2b7966a8-8a6d-a94f-a256-589fc26d83d0}\SET8257.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{3fc825f5-b61a-994f-9bba-85cd6c4da8b7}\spectrodens_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{7396bad8-7048-af42-b5d5-dc387736691c}\SETA224.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{da57fd97-fa69-9340-a4da-037be2662fe1}\spectroplate_x64.sys (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{a2a72662-6183-c742-a103-e60145f480e5}\SETD578.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\dzncore.dllJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIFFA9.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{295155e4-5a7e-c344-9bda-c97bbccbaffe}\spectrodrive_x64.sys (copy)Jump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\W95INF16.DLLJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{16e7fd5a-7fa1-284a-a78e-4c7e00d15a9e}\dens_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI19FD.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{28b6d34b-f8b1-234e-a714-2f9a63d90bcc}\SET2969.tmpJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\stdole2.tlbJump to dropped file
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\mia1\mVBExec.dllJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLan\spectrodrive_x64.sysJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{c8a74b24-c087-b944-a9d3-d198b3071dfa}\SET559A.tmpJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\CECD985D\BB0F7F36\dznet.dllJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\ProgramData\miaB21.tmp\data\OFFLINE\76FCA102\DFC33D3E\spectrodens_x64.sysJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{a2a72662-6183-c742-a103-e60145f480e5}\spectrojet_x64.sys (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{a68cce64-7ff6-cf40-9135-83c2fc219f99}\SET3D30.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIFFF8.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI1A2D.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IR\spectrodens_ir_x64.sysJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{2b7966a8-8a6d-a94f-a256-589fc26d83d0}\spectrodrive_x64.sys (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{9697d70c-ee9a-f048-8996-c17faa7f2c84}\spectrojet_x64.sys (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{fa2b8a9a-24a0-6c46-aecd-31efdad63fbc}\SETB89A.tmpJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\ProgramData\miaB21.tmp\data\OFFLINE\502E833A\9B44F18F\spectrodrive_x64.sysJump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\ProgramData\miaB21.tmp\data\OFFLINE\C0AC9330\383AE05B\spectrodrive_x64.sysJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{16e7fd5a-7fa1-284a-a78e-4c7e00d15a9e}\SET25A1.tmpJump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{fa2b8a9a-24a0-6c46-aecd-31efdad63fbc}\spectrodens_x64.sys (copy)Jump to dropped file
              Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{9697d70c-ee9a-f048-8996-c17faa7f2c84}\SET69DD.tmpJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{06178e7f-c714-204a-9afb-f62978734989}\SETDA99.tmpJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver32Bit.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\8135F827\A789A22E\TDServiceLogMonitor.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\mVBExec.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\3476C065\CC63C202\TDServiceConnection.dllJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{c8a74b24-c087-b944-a9d3-d198b3071dfa}\spectroplate_x64.sys (copy)Jump to dropped file
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exeDropped PE file which has not been started: C:\ProgramData\miaB21.tmp\data\OFFLINE\94312164\5EDECBEE\spectrojet_x64.sysJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroPlate\spectroplate_x64.sysJump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.sysJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mVB.dll\comcat.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\25D64044\E98CA0F\TDServerApp.exeJump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{ceebd2dd-ea39-9044-afd8-41621eb760d6}\spectrodrive_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{06178e7f-c714-204a-9afb-f62978734989}\spectrojet_x64.sys (copy)Jump to dropped file
              Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\dznet.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\CC3273D\BD615B11\TechkonSpectroJetUpdate.exeJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeDropped PE file which has not been started: C:\ProgramData\miaE9AF.tmp\data\OFFLINE\mMSI.dll\mMSIExec.dllJump to dropped file
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_3-18666
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_3-18763
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeAPI coverage: 7.5 %
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeAPI coverage: 8.0 %
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe TID: 6192Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe TID: 4896Thread sleep count: 199 > 30Jump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe TID: 4896Thread sleep time: -39800s >= -30000sJump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe TID: 6192Thread sleep count: 8924 > 30Jump to behavior
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe TID: 6192Thread sleep time: -8924000s >= -30000sJump to behavior
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe TID: 6672Thread sleep time: -44274s >= -30000s
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070409Jump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04090409Jump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08090809Jump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070409Jump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04090409Jump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08090809Jump to behavior
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070409
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04090409
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08090809
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070409
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04090409
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08090809
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_00407AC0 FindNextFileW,FindClose,FindFirstFileW,FindFirstFileW,3_2_00407AC0
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: 4_2_6DA42A30 FindFirstFileW,LoadLibraryW,FindClose,FindResourceW,LoadLibraryW,4_2_6DA42A30
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: 4_2_6DA32470 FindClose,FindFirstFileW,FindFirstFileW,4_2_6DA32470
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_6A172A30 FindFirstFileW,LoadLibraryW,FindClose,FindResourceW,LoadLibraryW,13_2_6A172A30
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_6A162470 FindClose,FindFirstFileW,FindFirstFileW,13_2_6A162470
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeCode function: 11_2_04360366 GetSystemInfo,11_2_04360366
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeFile opened: C:\Users\userJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeFile opened: C:\Users\user\AppDataJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
              Source: TDService.exe, 0000000B.00000002.172697739091.0000000000F89000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllwordFormat="Hashed" maxInvalidPasswordAttempts="5" minRequiredPasswordLength="7" minRequiredNonalphanumericCharacters="1" passwordAttemptWindow="10" passwordStrengthRegularExpression=""/>
              Source: TDService.exe, 0000000B.00000002.172697739091.0000000000F89000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW.Data.Common.D
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeAPI call chain: ExitProcess graph end nodegraph_4-23094
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeAPI call chain: ExitProcess graph end nodegraph_13-37103
              Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_00423B3C IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00423B3C
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_00425561 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,3_2_00425561
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_004240E4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_004240E4
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_00424945 SetUnhandledExceptionFilter,3_2_00424945
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_00423B3C IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00423B3C
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_00420DEF IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00420DEF
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: 4_2_6DA46CD8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_6DA46CD8
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: 4_2_6DA45A8A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_6DA45A8A
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: 4_2_6DA451C7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_6DA451C7
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_1001B723 SetUnhandledExceptionFilter,13_2_1001B723
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_1001B735 SetUnhandledExceptionFilter,13_2_1001B735
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_6A175A8A IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_6A175A8A
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_6A176CD8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_6A176CD8
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: 13_2_6A1751C7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_6A1751C7
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeProcess created: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe "C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe" /sJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\USBIOCOM.dllJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\TDSCON.ocxJump to behavior
              Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\MSWINSCK.OCXJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -f -addstore TrustedPublisher TK1.cer
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -f -addstore TrustedPublisher TK2.cer
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000002F82000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167625105498.0000000000418000.00000020.00000001.01000000.00000005.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007F957000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Progmanadvapi32.dllCreateProcessWithTokenW
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000002F82000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167625105498.0000000000418000.00000020.00000001.01000000.00000005.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007F957000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: ProgmanU
              Source: 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000002F82000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167625105498.0000000000418000.00000020.00000001.01000000.00000005.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007F957000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Shell_TrayWndU
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: GetLocaleInfoA,3_2_004295EA
              Source: C:\ProgramData\miaE9AF.tmp\TDService.exeCode function: GetLocaleInfoA,4_2_6DA4DEDB
              Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exeCode function: GetLocaleInfoA,13_2_6A17DEDB
              Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{28b6d34b-f8b1-234e-a714-2f9a63d90bcc}\dens_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{28b6d34b-f8b1-234e-a714-2f9a63d90bcc}\dens_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{401fd0c5-2338-6643-b9e5-a41648c52a8f}\spectrodens_ir_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{401fd0c5-2338-6643-b9e5-a41648c52a8f}\spectrodens_ir_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{c8a74b24-c087-b944-a9d3-d198b3071dfa}\spectroplate_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{c8a74b24-c087-b944-a9d3-d198b3071dfa}\spectroplate_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{9f354680-41e4-a947-8983-0a6ae0b9b27b}\spectrojet_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{9f354680-41e4-a947-8983-0a6ae0b9b27b}\spectrojet_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{ceebd2dd-ea39-9044-afd8-41621eb760d6}\spectrodrive_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{ceebd2dd-ea39-9044-afd8-41621eb760d6}\spectrodrive_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{7396bad8-7048-af42-b5d5-dc387736691c}\spectrodrive_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{7396bad8-7048-af42-b5d5-dc387736691c}\spectrodrive_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{3fc825f5-b61a-994f-9bba-85cd6c4da8b7}\spectrodens_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{3fc825f5-b61a-994f-9bba-85cd6c4da8b7}\spectrodens_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{06178e7f-c714-204a-9afb-f62978734989}\spectrojet_x64.cat VolumeInformation
              Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{06178e7f-c714-204a-9afb-f62978734989}\spectrojet_x64.cat VolumeInformation
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_004250BC GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,3_2_004250BC
              Source: C:\Users\user\Desktop\8ue90oYkrv.exeCode function: 3_2_0041F2D0 MessageBoxW,CoInitialize,GetVersionExW,GetCommandLineW,MessageBoxW,MessageBoxW,MessageBoxW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,ShellExecuteExW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,CreateProcessW,GetLastError,CloseHandle,WaitForSingleObject,GetExitCodeProcess,FindCloseChangeNotification,SetCurrentDirectoryW,SetCurrentDirectoryW,3_2_0041F2D0
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: C:\Windows\System32\certutil.exeRegistry key created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\B6E6CB217307F0D3CD5CA360D368887B8FA98BA3 Blob
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeCode function: 11_2_0142B97E listen,11_2_0142B97E
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeCode function: 11_2_0142B940 listen,11_2_0142B940
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeCode function: 11_2_0436164A bind,11_2_0436164A
              Source: C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exeCode function: 11_2_04361627 bind,11_2_04361627
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information1
              Scripting
              1
              Replication Through Removable Media
              2
              Native API
              1
              Scripting
              1
              DLL Side-Loading
              11
              Disable or Modify Tools
              OS Credential Dumping1
              System Time Discovery
              Remote Services11
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts3
              Command and Scripting Interpreter
              1
              DLL Side-Loading
              23
              Windows Service
              11
              Deobfuscate/Decode Files or Information
              LSASS Memory11
              Peripheral Device Discovery
              Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts2
              Service Execution
              23
              Windows Service
              12
              Process Injection
              3
              Obfuscated Files or Information
              Security Account Manager3
              File and Directory Discovery
              SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
              Software Packing
              NTDS36
              System Information Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA Secrets111
              Security Software Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              File Deletion
              Cached Domain Credentials2
              Process Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items43
              Masquerading
              DCSync31
              Virtualization/Sandbox Evasion
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job31
              Virtualization/Sandbox Evasion
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
              Process Injection
              /etc/passwd and /etc/shadow2
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 1408892 Sample: 8ue90oYkrv.exe Startdate: 14/03/2024 Architecture: WINDOWS Score: 45 126 Multi AV Scanner detection for dropped file 2->126 128 .NET source code contains potential unpacker 2->128 130 Machine Learning detection for sample 2->130 132 Machine Learning detection for dropped file 2->132 9 8ue90oYkrv.exe 1 124 2->9         started        12 msiexec.exe 354 120 2->12         started        14 svchost.exe 2->14         started        16 4 other processes 2->16 process3 file4 102 C:\ProgramData\miaE9AF.tmp\mia.lib, PE32 9->102 dropped 104 C:\ProgramData\miaE9AF.tmp\...\mVBExec.dll, PE32 9->104 dropped 106 C:\ProgramData\miaE9AF.tmp\...\mMSIExec.dll, PE32 9->106 dropped 114 26 other files (15 malicious) 9->114 dropped 18 TDService.exe 18 99 9->18         started        108 C:\Windows\SysWOW64\lcms.dll, PE32 12->108 dropped 110 C:\Windows\SysWOW64\USBIOCOM.dll, PE32 12->110 dropped 112 C:\Windows\SysWOW64\TDSCON.ocx, PE32 12->112 dropped 116 28 other files (27 malicious) 12->116 dropped 21 msiexec.exe 88 12->21         started        23 msiexec.exe 37 12->23         started        25 msiexec.exe 31 12->25         started        33 2 other processes 12->33 27 drvinst.exe 14->27         started        29 drvinst.exe 14->29         started        31 drvinst.exe 14->31         started        35 5 other processes 14->35 process5 file6 86 5 other files (4 malicious) 18->86 dropped 37 TechkonDriver64Bit.exe 1 155 18->37         started        40 conhost.exe 21->40         started        42 certutil.exe 21->42         started        44 certutil.exe 21->44         started        88 2 other malicious files 27->88 dropped 90 2 other malicious files 29->90 dropped 76 C:\Windows\...\spectroplate_x64.sys (copy), PE32+ 31->76 dropped 78 C:\Windows\System32\...\SET559A.tmp, PE32+ 31->78 dropped 80 C:\Windows\...\spectrodrive_x64.sys (copy), PE32+ 35->80 dropped 82 C:\Windows\System32\...\SET86AC.tmp, PE32+ 35->82 dropped 84 C:\Windows\...\spectrojet_x64.sys (copy), PE32+ 35->84 dropped 92 7 other malicious files 35->92 dropped process7 file8 94 C:\ProgramData\miaB21.tmp\mia.lib, PE32 37->94 dropped 96 C:\ProgramData\miaB21.tmp\...\mMSIExec.dll, PE32 37->96 dropped 98 C:\ProgramData\miaB21.tmp\...\mDIFxEXE.dll, PE32 37->98 dropped 100 10 other files (9 malicious) 37->100 dropped 46 TechkonDriver64Bit.exe 37->46         started        process9 file10 118 C:\Users\user\AppData\Local\...\mMSIExec.dll, PE32 46->118 dropped 120 C:\Users\user\AppData\Local\...\mDIFxEXE.dll, PE32 46->120 dropped 122 C:\ProgramData\...\mia.lib, PE32 46->122 dropped 124 C:\ProgramData\...\TechkonDriver64Bit.exe, PE32 46->124 dropped 49 x64DPInst.exe 46->49         started        52 x64DPInst.exe 46->52         started        54 x64DPInst.exe 46->54         started        56 6 other processes 46->56 process11 file12 72 2 other malicious files 49->72 dropped 58 C:\Users\...\spectrodens_ir_x64.sys (copy), PE32+ 52->58 dropped 60 C:\Users\user\AppData\Local\...\SET3D30.tmp, PE32+ 52->60 dropped 62 C:\Users\user\...\spectroplate_x64.sys (copy), PE32+ 54->62 dropped 64 C:\Users\user\AppData\Local\...\SET51F0.tmp, PE32+ 54->64 dropped 66 C:\Users\user\...\spectrodens_x64.sys (copy), PE32+ 56->66 dropped 68 C:\Users\user\AppData\Local\...\SETB89A.tmp, PE32+ 56->68 dropped 70 C:\Users\user\...\spectrojet_x64.sys (copy), PE32+ 56->70 dropped 74 7 other malicious files 56->74 dropped

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              8ue90oYkrv.exe4%ReversingLabs
              8ue90oYkrv.exe1%VirustotalBrowse
              8ue90oYkrv.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServerApp.exe100%Joe Sandbox ML
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe100%Joe Sandbox ML
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroDriveUpdate.exe100%Joe Sandbox ML
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroJetUpdate.exe100%Joe Sandbox ML
              161fe34.rbf (copy)2%ReversingLabs
              161fe34.rbf (copy)6%VirustotalBrowse
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver32Bit.exe0%ReversingLabs
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver32Bit.exe0%VirustotalBrowse
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe0%ReversingLabs
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe0%VirustotalBrowse
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServerApp.exe2%ReversingLabs
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServerApp.exe6%VirustotalBrowse
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe2%ReversingLabs
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe6%VirustotalBrowse
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServiceConnection.dll0%ReversingLabs
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServiceConnection.dll0%VirustotalBrowse
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServiceLogMonitor.exe0%ReversingLabs
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDServiceLogMonitor.exe1%VirustotalBrowse
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroDriveUpdate.exe0%ReversingLabs
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroDriveUpdate.exe10%VirustotalBrowse
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroJetUpdate.exe5%ReversingLabs
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TechkonSpectroJetUpdate.exe8%VirustotalBrowse
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\dzncore.dll0%ReversingLabs
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\dzncore.dll0%VirustotalBrowse
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\dznet.dll0%ReversingLabs
              C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\dznet.dll0%VirustotalBrowse
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENS\dens_x64.sys0%ReversingLabs
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\DENS\dens_x64.sys0%VirustotalBrowse
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IR\spectrodens_ir_x64.sys0%ReversingLabs
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\MF-IR\spectrodens_ir_x64.sys0%VirustotalBrowse
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.sys0%ReversingLabs
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.sys0%VirustotalBrowse
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLan\spectrodrive_x64.sys0%ReversingLabs
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDriveWLan\spectrodrive_x64.sys0%VirustotalBrowse
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDrive\spectrodrive_x64.sys0%ReversingLabs
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDrive\spectrodrive_x64.sys0%VirustotalBrowse
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet2\spectrojet_x64.sys0%ReversingLabs
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet2\spectrojet_x64.sys0%VirustotalBrowse
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet\spectrojet_x64.sys0%ReversingLabs
              C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroJet\spectrojet_x64.sys0%VirustotalBrowse
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://www.installaware.com/buydirect.aspopen0%Avira URL Cloudsafe
              http://www.smartassembly.com/webservices/Reporting/L0%Avira URL Cloudsafe
              http://www.mywebsite.com/TechkonDriver64Bit.7zipiJ0%Avira URL Cloudsafe
              http://ocsp.thawte.com00%Avira URL Cloudsafe
              http://www.mywebsite.com/TECHKON0%Avira URL Cloudsafe
              http://www.smartassembly.com/webservices/Reporting/UploadReport20%Avira URL Cloudsafe
              HTTP://WWW.TECHKON.COM/MICROSOFT0%Avira URL Cloudsafe
              http://www.installaware.com/buydirect.aspopen1%VirustotalBrowse
              http://www.smartassembly.com/webservices/Reporting/L1%VirustotalBrowse
              http://www.installaware.comz0%Avira URL Cloudsafe
              http://www.mywebsite.com/TECHKON0%VirustotalBrowse
              http://www.installaware.com/InstallAware0%Avira URL Cloudsafe
              http://www.smartassembly.com/webservices/Reporting/UploadReport20%VirustotalBrowse
              http://www.techkon.com/0%Avira URL Cloudsafe
              http://www.installaware.com/0%Avira URL Cloudsafe
              http://www.mywebsite.com/TechkonDriver64Bit.7zip0%Avira URL Cloudsafe
              http://www.installaware.com/InstallAware1%VirustotalBrowse
              http://www.techkon.com/0%VirustotalBrowse
              http://www.smartassembly.com/webservices/UploadReportLogin/0%Avira URL Cloudsafe
              http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURL0%Avira URL Cloudsafe
              http://www.installaware.com/x2/0%Avira URL Cloudsafe
              http://www.mywebsite.com/TechkonDriver64Bit.7zipn0%Avira URL Cloudsafe
              http://www.installaware.com/x2/1%VirustotalBrowse
              http://www.smartassembly.com/webservices/UploadReportLogin/0%VirustotalBrowse
              http://www.installaware.com/0%VirustotalBrowse
              http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURL0%VirustotalBrowse
              http://www.mywebsite.com/TechkonDriver64Bit.7zip1%VirustotalBrowse
              No contacted domains info
              NameSourceMaliciousAntivirus DetectionReputation
              http://crl.thawte.com/ThawteTimestampingCA.crl08ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.000000000336F000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000017.00000003.167837015987.000001E13D4CB000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://www.mywebsite.com/TECHKON8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167673031660.00000000032E1000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.168283345562.0000000002908000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007F940000.00000004.00001000.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://www.smartassembly.com/webservices/Reporting/L8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000002BC0000.00000004.00000020.00020000.00000000.sdmpfalse
                • 1%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://www.mywebsite.com/TechkonDriver64Bit.7zipiJTechkonDriver64Bit.exe, 0000000D.00000003.168267103771.0000000002804000.00000004.00001000.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://ocsp.thawte.com08ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.000000000336F000.00000004.00000020.00020000.00000000.sdmp, drvinst.exe, 00000017.00000003.167837015987.000001E13D4CB000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.installaware.com/buydirect.aspopen8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167625105498.000000000077E000.00000020.00000001.01000000.00000005.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmpfalse
                • 1%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://sawebservice.red-gate.com/8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000002BC0000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://standards.iso.org/iso/19770/-2/2008/schema.xsd8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000002F82000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167625105498.0000000000418000.00000020.00000001.01000000.00000005.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007F957000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002AD9000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://www.smartassembly.com/webservices/Reporting/UploadReport28ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000002BC0000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    HTTP://WWW.TECHKON.COM/MICROSOFTTDService.exe, 00000004.00000003.168283345562.00000000028DB000.00000004.00001000.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.installaware.comz8ue90oYkrv.exe, 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmp, 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167673031660.00000000032E1000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167929283940.0000000000CC5000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167626091802.00000000007FF000.00000002.00000001.01000000.00000005.sdmp, TDService.exe, 00000004.00000003.168281434764.0000000000CC9000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000002.168290671231.0000000000CCB000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000C.00000002.168278210797.0000000000440000.00000002.00000001.01000000.0000000D.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000D.00000003.167699894798.000000007FE3A000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000D.00000000.167698325162.000000000095B000.00000002.00000001.01000000.0000000E.sdmp, TechkonDriver64Bit.exe, 0000000D.00000003.167729039334.000000000345C000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.installaware.com/InstallAwareTechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002AD9000.00000004.00000020.00020000.00000000.sdmpfalse
                    • 1%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://www.red-gate.com/products/dotnet-development/smartassembly/?utm_source=smartassemblyui&utm_me8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000002BC0000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      http://www.techkon.com/TechkonDriver64Bit.exe, 0000000D.00000003.168267103771.00000000028B4000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000D.00000003.167729039334.00000000033E2000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.installaware.com/8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000002F82000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167625105498.000000000077E000.00000020.00000001.01000000.00000005.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167625105498.0000000000418000.00000020.00000001.01000000.00000005.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007F957000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002AD9000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.mywebsite.com/TechkonDriver64Bit.7zipTechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000D.00000003.167699894798.000000007F940000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000D.00000003.167729039334.00000000033E2000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.smartassembly.com/webservices/UploadReportLogin/8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000002BC0000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.smartassembly.com/webservices/UploadReportLogin/GetServerURL8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, 8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000002BC0000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.installaware.com/x2/8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000000.167625105498.000000000077E000.00000020.00000001.01000000.00000005.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007FCBD000.00000004.00001000.00020000.00000000.sdmp, TechkonDriver64Bit.exe, 0000000C.00000003.167693420796.0000000002DDA000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.techkon.com/Microsoft8ue90oYkrv.exe, 00000003.00000003.167616320182.0000000003284000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167673031660.00000000032E1000.00000004.00000020.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.167629272682.000000007F940000.00000004.00001000.00020000.00000000.sdmp, TDService.exe, 00000004.00000003.168283345562.00000000028DB000.00000004.00001000.00020000.00000000.sdmpfalse
                        unknown
                        HTTP://WWW.MYWEBSITE.COM/TECHKONDRIVER64BIT.7ZIPTechkonDriver64Bit.exe, 0000000D.00000003.168267103771.0000000002804000.00000004.00001000.00020000.00000000.sdmpfalse
                          unknown
                          http://crl.thawte.com/ThawteTimestampingCA.crldrvinst.exe, 00000017.00000003.167837015987.000001E13D4CB000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.mywebsite.com/TechkonDriver64Bit.7zipnTechkonDriver64Bit.exe, 0000000D.00000003.168267103771.0000000002804000.00000004.00001000.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            No contacted IP infos
                            Joe Sandbox version:40.0.0 Tourmaline
                            Analysis ID:1408892
                            Start date and time:2024-03-14 12:27:23 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 19m 38s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                            Run name:Suspected Instruction Hammering
                            Number of analysed new started processes analysed:40
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:8ue90oYkrv.exe
                            Detection:MAL
                            Classification:mal45.evad.winEXE@63/343@0/0
                            EGA Information:
                            • Successful, ratio: 66.7%
                            HCA Information:
                            • Successful, ratio: 67%
                            • Number of executed functions: 203
                            • Number of non-executed functions: 147
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                            • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                            • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, backgroundTaskHost.exe
                            • Excluded domains from analysis (whitelisted): spclient.wg.spotify.com, x1.c.lencr.org
                            • Execution Graph export aborted for target TechkonDriver64Bit.exe, PID 3060 because there are no executed function
                            • Execution Graph export aborted for target x64DPInst.exe, PID 4736 because there are no executed function
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            TimeTypeDescription
                            12:30:07API Interceptor28630989x Sleep call for process: TDService.exe modified
                            No context
                            No context
                            No context
                            No context
                            No context
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):1150976
                            Entropy (8bit):7.90148039825505
                            Encrypted:false
                            SSDEEP:24576:+tNmK9b6A+BUpJN/SP0lm8eSqY+5bPkT0WogLEVEGlim2Vy:+36AhJ9xeSwPKBGYn
                            MD5:F00223A56D3F89627CC88625DBCB0C42
                            SHA1:15489E487F43F77C812EF8EF07BB65171AFEB5BD
                            SHA-256:91DC55CA1A2A4B6206734C159B3C8ACC411F4B2A1BF7F208256A57B7DCBDC542
                            SHA-512:12F22018BC32A98C884447FE8E44BCC1868A5133B859CB91286548A24455BCC817FC030B6BC866E282727AE48D1C88B10894FD8C3CDA809716D49BEDAA81A866
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 2%
                            • Antivirus: Virustotal, Detection: 6%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...@).W.................0...P......jK... ...`....@.. ....................................@................................. K..J....`...?........................................................................... ............... ..H............text...p+... ...0.................. ..`.rsrc....?...`...@...@..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):34388
                            Entropy (8bit):5.157244558511727
                            Encrypted:false
                            SSDEEP:768:PyTwT115cmcDdWW3pv2ltwuNDJLpt7t7t7t7t7t7t7t7t6t7tdt7t3JdezBwi8S/:qTo115cmcDdWW3pv2ltwuNDcA
                            MD5:BB950D871CB6A8BD28656BDD80FA8551
                            SHA1:C6696E6B18250DDBDC4281DDC90F87D42BEA73CC
                            SHA-256:77E822749D3CED1D3110A1BFF335948C899D25C1A97ED1FF73D2B594FC50236E
                            SHA-512:85DAFDA9893A3EB7824F67C338F10E2F38D1AB74D50562B31076FB745C8C5E3AD8356A1488C380B4A1159EB9C111E19E054C2140FA98C72C8E1340BB7F662252
                            Malicious:false
                            Preview:...@IXOS.@.....@.cnX.@.....@.....@.....@.....@.....@......&.{CD1E6019-47AE-4334-A91E-595BA68B6E06}..TECHKON Device Service..TDService.msi.@.....@.....@.....@........\PROGRA~3\&.{C39D0F65-909B-4DBD-A3E7-FF81A783B41B}.....@.....@.....@.....@.......@.....@.....@.......@......TECHKON Device Service......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{CD0C69EF-2B12-47ED-87B7-5A1DB20CBCD9}&.{CD1E6019-47AE-4334-A91E-595BA68B6E06}.@......&.{4D6F449F-FA68-42B5-A305-16C45F308B8F}&.{CD1E6019-47AE-4334-A91E-595BA68B6E06}.@......&.{96ED6BF5-4AA1-4668-AEEE-E5101CDF29BA}&.{CD1E6019-47AE-4334-A91E-595BA68B6E06}.@......&.{672A692B-629D-4B2A-A63B-2E211EA7164C}&.{CD1E6019-47AE-4334-A91E-595BA68B6E06}.@......&.{877EEC96-C1A3-45AB-B6E1-782150290E44}&.{CD1E6019-47AE-4334-A91E-595BA68B6E06}.@......&.{C166FAF3-5D3D-41C9-B181-43DF2464FB59}&.{CD1E6019-47AE-4334-A91E-595BA68B6E06}.@......&.{1E484634-B892-4CBA-9690-0E
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:modified
                            Size (bytes):46700
                            Entropy (8bit):5.127097765622923
                            Encrypted:false
                            SSDEEP:768:z9Lc5CLgpPGZvWs5idXxqlcsS8/4r/RmBkE/l/83tOtatNtWtdtAtstSthtkt7t9:ZLc5CLgpPGZvWs5idXxqlcsS8/4r/RmX
                            MD5:FC1AF9DC8692F81A790B92111E924E58
                            SHA1:FD18FB43C2FEAF4F070966F9C47163E61330EFCF
                            SHA-256:F2A8E8ECCBDB10D04D6908CAB0E69F41E40709B72825314DA0A6FBF60E92CE1B
                            SHA-512:B96F71E07857332B80DA6CDDC5E0DA50CF2398649BB6E9B1748351DDBD7151ABA4206650B9B07E9D9E0C2ABBAEAE551FC3524B6AD7024C34D6EC82C9C4799D9E
                            Malicious:false
                            Preview:...@IXOS.@.....@.cnX.@.....@.....@.....@.....@.....@......&.{55EA8940-B618-47BD-A642-20BFB2A64F78}..TECHKON Device Driver 64Bit..TechkonDriver64Bit.msi.@.....@.....@.....@........\PROGRA~3\&.{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}.....@.....@.....@.....@.......@.....@.....@.......@......TECHKON Device Driver 64Bit......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]....ProcessComponents..Updating component registration..&.{5702EAC5-033D-48B5-B83F-DEF9ECF4C262}&.{55EA8940-B618-47BD-A642-20BFB2A64F78}.@......&.{52B0046B-434A-4EA9-9AC7-766C93D4D3F6}&.{55EA8940-B618-47BD-A642-20BFB2A64F78}.@......&.{6D03A36D-9750-4B1E-8344-0CE7ACED2DE2}&.{55EA8940-B618-47BD-A642-20BFB2A64F78}.@......&.{2B8BCB22-4191-4BD5-817D-B0123E06B87F}&.{55EA8940-B618-47BD-A642-20BFB2A64F78}.@......&.{2CBD538B-C017-439A-8339-57F7ED6A8246}&.{55EA8940-B618-47BD-A642-20BFB2A64F78}.@......&.{CDF804F9-6941-49E0-8B67-519B61E33E8A}&.{55EA8940-B618-47BD-A642-20BFB2A64F78}.@......&.{DB88E18
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):2871552
                            Entropy (8bit):7.91890094076526
                            Encrypted:false
                            SSDEEP:49152:NnnZhJegT3345UB8r/fecnYWgPmGWy0tGGDOYEHamRS1j1fC5j9IXvWm6BPX:5nZygT33wtr/fmZxWywGGDOBxRkj1f6x
                            MD5:3A0BF599146750C008BA6960C694470D
                            SHA1:22E869B8C60BBFB263A7AF2B5350386617EB6E72
                            SHA-256:3F1DC61B0BF0B93B1CD5478F151895B357DA92CAD2A48857E2FC4645C41E2DA3
                            SHA-512:5E6ED7829C8DC1879C67FF6F142A96575251C583A5AE9103A48587BFF42C463B59B5EAB7F543414838AEA4E5BBCA6C0F8433CE3BEF6367632B663F242DF7D30F
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}'.O9F..9F..9F..0>[..F..0>J.-F..0>\.SF......;F......6F..9F...F..0>V.eF..'.K.8F..0>N.8F..Rich9F..................PE..L....Z.U.....................f....................@...................................+......................................`......................+. ...............................................@...............d............................text............................... ..`.rdata..(...........................@..@.data........p...$...`..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):2902256
                            Entropy (8bit):7.920111663334885
                            Encrypted:false
                            SSDEEP:49152:ynnZhJevas/0bxZjXAqySgkyneVSTTHJ7Als2GT/R1OPS5R+dQ:4nZA2xZjXgkAMSH24t1L5R+dQ
                            MD5:F6CD94DEAEA55BB414650D6A9CB7DD6C
                            SHA1:06AC62B0283E0490C9F66D3DE1E5CA47866CA3AA
                            SHA-256:08F2DBAF4537368977DC0F0790F1FFF6FD65D30F4C91FED2B2CACC9A7F307A07
                            SHA-512:3688F2622F43570DC1BD53B027D9A6C57FDE7DD4A34697D2E283549CF780F789A033FAA6EF5AB20EA49551921AC71844407AAAD0EDC87F9AAC9D1C2413D58F2C
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}'.O9F..9F..9F..0>[..F..0>J.-F..0>\.SF......;F......6F..9F...F..0>V.eF..'.K.8F..0>N.8F..Rich9F..................PE..L....Z.U.....................f....................@..................................$-......................................`....................../,. ...............................................@...............d............................text............................... ..`.rdata..(...........................@..@.data........p...$...`..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):1253376
                            Entropy (8bit):7.783380196730505
                            Encrypted:false
                            SSDEEP:24576:vF2oerN+CFfmxlJHLjyyrRyx/tCA1Q49UMEEXEimWZ2Eoxch6YB4:Mz9FOLjyywxNbrEEXhFoxch3
                            MD5:0B682718F2229F8526387698D1F60DAF
                            SHA1:FD7A024C14B1874587B1C6F94ED8AE4BA55C385C
                            SHA-256:2491D1F5D96A265794972F7BAB6173005B300BC1E85ACDA346E882D6DEBB366A
                            SHA-512:2D3B801A91C92DEC134AB0A81D7CFD2ADDA1045FD0A706B2605CB3046BEB19D97DD49D4A1418CA4966EDAE91A6CDB10A21379B85E1C035C20FB1FCE14851E597
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 2%
                            • Antivirus: Virustotal, Detection: 6%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....).W.....................`......|.... ........@.. .......................`............@.................................2...J.......P@...................@....................................................... ............... ..H............text........ ...................... ..`.rsrc...P@.......P..................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):1150976
                            Entropy (8bit):7.90148039825505
                            Encrypted:false
                            SSDEEP:24576:+tNmK9b6A+BUpJN/SP0lm8eSqY+5bPkT0WogLEVEGlim2Vy:+36AhJ9xeSwPKBGYn
                            MD5:F00223A56D3F89627CC88625DBCB0C42
                            SHA1:15489E487F43F77C812EF8EF07BB65171AFEB5BD
                            SHA-256:91DC55CA1A2A4B6206734C159B3C8ACC411F4B2A1BF7F208256A57B7DCBDC542
                            SHA-512:12F22018BC32A98C884447FE8E44BCC1868A5133B859CB91286548A24455BCC817FC030B6BC866E282727AE48D1C88B10894FD8C3CDA809716D49BEDAA81A866
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 2%
                            • Antivirus: Virustotal, Detection: 6%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...@).W.................0...P......jK... ...`....@.. ....................................@................................. K..J....`...?........................................................................... ............... ..H............text...p+... ...0.................. ..`.rsrc....?...`...@...@..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1316
                            Entropy (8bit):4.824855858394781
                            Encrypted:false
                            SSDEEP:24:cPN97KgwMV+nCGgMSqX+nH1WqBN3kmugmC4mA0snxs5XFF:cPr7/wdCGgXHH1Wqfi5mA0sxsvF
                            MD5:83B25C1067C9BE0BCDF289BBED80D363
                            SHA1:25FABE1F042D90F5678C3F97FCA6260BF27619D5
                            SHA-256:1AB2F18023EE11A92E4A3D5D7F5A9FB9A8ED8D69D93D8D804CCCEB1E431A2442
                            SHA-512:FCA4C27E0FDEAD9537694168AEA7DF3F2A05FB8E05F3EA8ECC6241E8A16A801532C9F71C777AC16528747D2160B1C9B5898CB5B8AF6C751509BE296F0CF280C0
                            Malicious:false
                            Preview:.<configuration>...<configSections>....<section name="log4net" type="System.Configuration.IgnoreSectionHandler" />...</configSections>...<runtime>...</runtime>...<log4net>....<appender name="TraceAppender" type="log4net.Appender.TraceAppender">.....<layout type="log4net.Layout.PatternLayout">......<conversionPattern value="%date [%thread] %-5level- %message%newline" />.....</layout>....</appender>.. .. <appender name="RollingFileAppender" type="log4net.Appender.RollingFileAppender">.. <file value="TDServiceLog.txt" />.. <appendToFile value="true" />.. <rollingStyle value="Size" />.. <maxSizeRollBackups value="10" />.. <maximumFileSize value="100KB" />.. <staticLogFileName value="true" />.. <threshold value="INFO"/>.. <lockingModel type="log4net.Appender.FileAppender+MinimalLock" />.. <layout type="log4net.Layout.PatternLayout">.. <conversionPattern value="%
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):24576
                            Entropy (8bit):3.368242915265491
                            Encrypted:false
                            SSDEEP:192:kRYqGL5n0f1auFrzr9VCj0aWSXRaf4iPH0uTiF7odzFaGFbieHr/zZYZud:37l08kCBZBaf9/BiqzFdFbieHTzZYcd
                            MD5:10195658250CA94B280DECCB4997B198
                            SHA1:765684257978376B463369065C552366282963F3
                            SHA-256:6801FD3462EE096A683D97A65D6E421E8B1419E9EEDC4A47BE7E2A14BCFA2CEF
                            SHA-512:016207696A3D7E4D719F3506F5C6F5CF66B77C56226778C328A0A0D6D807D572650CC460A9343276A05F2448BBC16EF0F8DF844BA257ECF8573C48343F6A0B36
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...g..W...........!.....0... ......^N... ...`....@.. ...............................L....@..................................N..W....`..h...........................XM............................................... ............... ..H............text...d.... ...0.................. ..`.rsrc...h....`.......@..............@..@.reloc...............P..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):45056
                            Entropy (8bit):3.9261380700304658
                            Encrypted:false
                            SSDEEP:384:GJzxPeOGEk4GKz7csqunx2gs1RteTOJ722RELbcAbZtLWs8:EzxNksqaJr2SLIEZ
                            MD5:9CFAB4DAACA85482012D97693EA88201
                            SHA1:095C31E6257CC5028E4605266477526D3B256B2B
                            SHA-256:0EBB561BC5FB6FEB35ADE2BE679AB8149C9942253ADD9A1C2B7A6F53ADFE4E46
                            SHA-512:9B6587CE414365420E96CA430C8DE170006CFF9ACEB51E7BF95BBFF6845AA936E8BF35D30B6442D23D48B460A085FA47673959BD3CB996970894549A71B7AB9F
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 1%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...r..W.................P...P......^e... ........@.. ....................................@..................................e..S........?..........................\d............................................... ............... ..H............text...dE... ...P.................. ..`.rsrc....?.......@...`..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):1753088
                            Entropy (8bit):7.88327202760358
                            Encrypted:false
                            SSDEEP:49152:8t723QiNn1X9NVWevTX9giFzbmjEanZQTS:8k3QiNnjNVWeLNg6nmj9n
                            MD5:819E58177441A1A5EAEE35216DC4B6D7
                            SHA1:65306A7FEF4AC738EA7177833B1D966E0B6C0BA5
                            SHA-256:2E03F7A87D69FE8B32A0B9604E270A3AF9DD3421351BE230889B7E24F2F6F88C
                            SHA-512:D8B7D560364D348ABFD956ACA24EC5631AB7488E3D49C27256B829D4EA165E0C56DC579E2E0EF1209029B7559B16A401AE63CDBBB2C773DAC176D7ABBAA3823A
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 10%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....).W..................... ........... ........@.. ....................................@.................................h...J.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):917504
                            Entropy (8bit):7.835247620836694
                            Encrypted:false
                            SSDEEP:24576:foVuryMKftmxBFAsBnnJO16noCKPxKnp:gVoyMKftoYsFnI1DRPU
                            MD5:6E5F4B906BD48CB77E3830F2871F726E
                            SHA1:7C070D83CAD9F33D4A9EC01CDE9E0BB3AFE51409
                            SHA-256:6DD53DECDE4A70E8B42657FAE088C22C07D8553E59506524ABA608BA087066F1
                            SHA-512:616B153C677FE7F403D179664E24AD5FCD6041237A9A2A9FC4CA0A2C8B0050E74AA953E7349EC23780485D7D4984AA5072A8CCA26CDF9BC8439981424CC46C32
                            Malicious:true
                            Antivirus:
                            • Antivirus: Joe Sandbox ML, Detection: 100%
                            • Antivirus: ReversingLabs, Detection: 5%
                            • Antivirus: Virustotal, Detection: 8%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....).W..................... ........... ........@.. .......................@............@.................................X...J............................ ....................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):18285
                            Entropy (8bit):3.2625513904435572
                            Encrypted:false
                            SSDEEP:384:Lgxt0XdZ+3rWJr1N684b86fZMaTx111m+0:QiM3Q13A6aN111c
                            MD5:1EBA2DF49DE0B85065585C6042C0770B
                            SHA1:FE847BFA3FA1DC279BF7FDCB62BC27EFD4306B91
                            SHA-256:BD0732871DBEAEE6A3BD9D5D0C5E1A32CB3752A857D203857AE2A99780004232
                            SHA-512:17CA2455054057A486EA2D77439CFFCE4AFC4564E99219AAE7BB44DAE0511F552D8DC5C071A8FA01CDE208EE36EADD90600DE9976FC9CA31CE6310FDD448A005
                            Malicious:false
                            Preview:Remission..16.0,007.0,008.0,01.0,01.0,011.0,012.0,012.0,013.0,014.0,014.0,014.0,014.0,015.0,014.0,014.0,014.0,014.0,015.0,015.0,015.0,016.0,016.0,017.0,018.0,019.0,02.0,021.0,022.0,024.0,025.0,027..17.0,29.0,355.0,422.0,484.0,535.0,578.0,605.0,612.0,605.0,591.0,563.0,509.0,44.0,366.0,286.0,205.0,136.0,084.0,055.0,042.0,035.0,03.0,028.0,029.0,033.0,04.0,047.0,051.0,051.0,046.0,038..18.0,187.0,171.0,165.0,171.0,178.0,172.0,151.0,125.0,099.0,077.0,057.0,038.0,027.0,023.0,02.0,015.0,012.0,013.0,028.0,109.0,374.0,623.0,687.0,729.0,77.0,787.0,787.0,785.0,786.0,794.0,806..19.0,1.0,068.0,049.0,039.0,037.0,043.0,055.0,067.0,087.0,151.0,301.0,51.0,681.0,75.0,757.0,773.0,79.0,791.0,788.0,796.0,803.0,801.0,797.0,799.0,8.0,797.0,793.0,794.0,796.0,796.0,795..20.0,209.0,207.0,206.0,208.0,211.0,214.0,218.0,222.0,225.0,226.0,227.0,23.0,232.0,232.0,231.0,232.0,233.0,232.0,23.0,23.0,231.0,231.0,23.0,231.0,232.0,231.0,232.0,233.0,236.0,238.0,239..21.0,212.0,21.0,21.0,211.0,213.0,217.0,22.0,224.0,227.0,228
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4658
                            Entropy (8bit):3.6044727088231916
                            Encrypted:false
                            SSDEEP:96:IPGiqjELGICWPCVo61VAZ1MluVPKEb81H:IPooLGICBVo6Oc
                            MD5:55B6DFD4BEE7501D0A45D4BA9A865C06
                            SHA1:8D4395E23F830F37FB59FBC8A03D15753E89F65F
                            SHA-256:BE03976E9EB14CD5C07E3B7B0C7AD26B637F3AFC765959D080EE91BAD095B513
                            SHA-512:63B07E67AAAAAB735967651AD1B3B8FC960F2809C02AF8DADD01BBEA9A722E56AA1C0BF8E95185965B919757DB6B3E5E5EB66CB3ED555416B755142D1D6E89AC
                            Malicious:false
                            Preview:Remission..Black.0,007.0,008.0,01.0,01.0,011.0,012.0,012.0,013.0,014.0,014.0,014.0,014.0,015.0,014.0,014.0,014.0,014.0,015.0,015.0,015.0,016.0,016.0,017.0,018.0,019.0,02.0,021.0,022.0,024.0,025.0,027..Cyan.0,29.0,355.0,422.0,484.0,535.0,578.0,605.0,612.0,605.0,591.0,563.0,509.0,44.0,366.0,286.0,205.0,136.0,084.0,055.0,042.0,035.0,03.0,028.0,029.0,033.0,04.0,047.0,051.0,051.0,046.0,038..Magenta.0,187.0,171.0,165.0,171.0,178.0,172.0,151.0,125.0,099.0,077.0,057.0,038.0,027.0,023.0,02.0,015.0,012.0,013.0,028.0,109.0,374.0,623.0,687.0,729.0,77.0,787.0,787.0,785.0,786.0,794.0,806..Yellow.0,1.0,068.0,049.0,039.0,037.0,043.0,055.0,067.0,087.0,151.0,301.0,51.0,681.0,75.0,757.0,773.0,79.0,791.0,788.0,796.0,803.0,801.0,797.0,799.0,8.0,797.0,793.0,794.0,796.0,796.0,795..Black_SD90.0,209.0,207.0,206.0,208.0,211.0,214.0,218.0,222.0,225.0,226.0,227.0,23.0,232.0,232.0,231.0,232.0,233.0,232.0,23.0,23.0,231.0,231.0,23.0,231.0,232.0,231.0,232.0,233.0,236.0,238.0,239..Black_SD0.0,212.0,21.0,21.0,211.0,213
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):245760
                            Entropy (8bit):6.22180183473209
                            Encrypted:false
                            SSDEEP:6144:WNO7HqL+9Qxpw1Lpaofbn+0u61wxkM2AbuACH9d7jWy:WNO7HJX16uph
                            MD5:5D1E5758CEE95AC926D0C9F7C18095EE
                            SHA1:8253C41EF9539BDAD5FC15DB4FABA99C23242CD2
                            SHA-256:4E48950BB961EA13C4DD489D915D0DF83304D52C950A99E3E6B981EAC22112D9
                            SHA-512:B074D0DE952407F5DC721DE7157EC9957A8AD98A9C04F27F04A7BA81B5F0064DEB93F8D370539A4D37598E95B9D1EC5F91B13AFEC26BBA04309138E03F763750
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^W...6...6...6..a*...6..u)...6..*...6..u)..S6.......6..>...6...6..6.......6...0...6.......6..Rich.6..........PE..L.../l.?...........!................9................................................................'..............`...........d...............................x.......................................................x............................text............................... ..`.rdata........... ..................@..@.data....t.......p..................@....rsrc...............................@..@.reloc.. ".......0..................@..B........................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):61440
                            Entropy (8bit):5.191530389320213
                            Encrypted:false
                            SSDEEP:768:idEKqzhqGRvl2ZTDATBSNdCskYW50dstrF/vmifdXJNs7GGSZhRhudUrvf:idErzhqGNl2dATskYgLhfhC2vf
                            MD5:2B3281E100D19123A8E307FBB2DB0939
                            SHA1:501376281A00B9B9A90BE2F7DACA3DB87C96DCC0
                            SHA-256:24C362E5E8819F46C23DF1D2C36C5343D088293AF4178D9ED8B966296F0BB43E
                            SHA-512:3ACB639C1C0AAB53EE9FDCB3E5F9C3767F70536858D96EBEE7841567C7C1C130F5D8DFB6FF6F491B17A56B3D579C2545E8909B3C2EB5D6D5947FEA1D6C15045A
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....q.?...........!......... ........... ........... ....................... ......"...........................................S.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):96
                            Entropy (8bit):4.2832136787344055
                            Encrypted:false
                            SSDEEP:3:HrJQyogRM/fyAiLJQyogRM/cLGr:HeFT9b
                            MD5:C10BB4CF9692695632DE53434201ACA9
                            SHA1:4215207F1C5E53C2CBA1638C7B27B587F0E48FC6
                            SHA-256:CC11C5FEA0D555905CC67BF2081C55F9F82A049EE65A89A371D2310BF37AA8EB
                            SHA-512:27234743327A5F7F46B60CD1F544C77353AA93C29E583EE8A8DB801D5E654EEDB2AAF30F8F4EA4219BB53B739C9E51694143009F9533BB456F0B44F2E2ADC862
                            Malicious:false
                            Preview:certutil -f -addstore TrustedPublisher TK1.cer..certutil -f -addstore TrustedPublisher TK2.cer..
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Certificate, Version=3
                            Category:dropped
                            Size (bytes):1379
                            Entropy (8bit):7.164821094442024
                            Encrypted:false
                            SSDEEP:24:3hE3IaffyrWghhywWGwBBrG7V+vXx9uyv1jTRgjDiuVz0mkhfAwfSLC:36DffrgarB8V+vXx9uyv0DiuVxkhfEm
                            MD5:7CA2896A0BED0C0EA2C32E34FA89EDB3
                            SHA1:B6E6CB217307F0D3CD5CA360D368887B8FA98BA3
                            SHA-256:F712E6788F1A6B6C520E5203EE07C2421F8D157D0B041AC9AA8ECABADBEFB87A
                            SHA-512:7232D3260D6714B6DD1B403AB1F838E2D6A33F9AA37D50C2DE4328DBFEA450C3A77875A333968219CB4F8B21140559310FBA42C9833F740A928554387EFFD969
                            Malicious:false
                            Preview:0.._0..G.......,h..g.0L.....1..0...*.H........0..1.0...U....US1.0...U....VeriSign, Inc.1.0...U....VeriSign Trust Network1;09..U...2Terms of use at https://www.verisign.com/rpa (c)101.0,..U...%VeriSign Class 3 Code Signing 2010 CA0...140304000000Z..170602235959Z0..1.0...U....DE1.0...U....Hessen1.0...U....Koenigstein1.0...U....TECHKON GmbH1>0<..U...5Digital ID Class 3 - Microsoft Software Validation v21.0...U....TECHKON GmbH0.."0...*.H.............0..........!.`.x..qr.r.....y.....$<.]./..E.EyJ.&4..}....}Y.O..5up....77.B.E,.U..P..b@.T.Ek..mr_9#.?.n..S....^?j....Z....m8.....L+..n...s.....k.......<|>_.T9.C...u.S}N...3.C.oKqup>..?`,..U.."..p..3<d<..$Q....|_...`U.(m...f...j....+-.. F`.....[..e|..g.?5........{0..w0...U....0.0...U...........0@..U...90705.3.1./http://csc3-2010-crl.verisign.com/CSC3-2010.crl0D..U. .=0;09..`.H...E....0*0(..+.........https://www.verisign.com/rpa0...U.%..0...+.......0q..+........e0c0$..+.....0...http://ocsp.verisign.com0;..+.....0../http://csc3-2010-aia
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Certificate, Version=3
                            Category:dropped
                            Size (bytes):1379
                            Entropy (8bit):7.175302981793894
                            Encrypted:false
                            SSDEEP:24:/3IaffyrW+hywWGwBBrG7pLqQ9xtRgjDiuVz0mkh6fyzjOlJ9X2I0:/DffrJrB80mgDiuVxkh6fyzSx0
                            MD5:1E256F3CD8A847D91596BF2C37DBF285
                            SHA1:6641ED279EF1A7A8E6D06BCEB38570B429101AA2
                            SHA-256:6FCE0715E8C7D2B5BF2D7B049AE6CB6842E2D9757A2D9296A1587BBD05C2FE25
                            SHA-512:91DAD8AFEA4A493269688CA7B7642DA7A663742C5811AADB3EE13D66DCB3BE2B1ED5EA6A9F45FBF9E6E432AEED0A9AE1AAA4A921658F2D5DDF2524C5EF195C3A
                            Malicious:false
                            Preview:0.._0..G.......7......'@...\...0...*.H........0..1.0...U....US1.0...U....VeriSign, Inc.1.0...U....VeriSign Trust Network1;09..U...2Terms of use at https://www.verisign.com/rpa (c)101.0,..U...%VeriSign Class 3 Code Signing 2010 CA0...110320000000Z..120307235959Z0..1.0...U....DE1.0...U....Hessen1.0...U....Koenigstein1.0...U....TECHKON GmbH1>0<..U...5Digital ID Class 3 - Microsoft Software Validation v21.0...U....TECHKON GmbH0.."0...*.H.............0..........6.....:N~lw..F..J7h...5x._9..\....:.)z..].......g.....4.....D..FI.......s....`L....}..`~.U..E.H....*Q........sv.....x.eLh...`..<^.%.. .J.....(5...^.....U.P.....r.......{..u...O..0....V.y......$#...#. N..:...E.L0.CZ..B3.E..@x.?.|..B.".....&.<.........{0..w0...U....0.0...U...........0@..U...90705.3.1./http://csc3-2010-crl.verisign.com/CSC3-2010.crl0D..U. .=0;09..`.H...E....0*0(..+.........https://www.verisign.com/rpa0...U.%..0...+.......0q..+........e0c0$..+.....0...http://ocsp.verisign.com0;..+.....0../http://csc3-2010-aia
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7500
                            Entropy (8bit):7.16354760210281
                            Encrypted:false
                            SSDEEP:192:N5PCjwnYe+PjP3rTqavM+vmr9ZCspE+TMAr+sMUYu4:yEnYPL3qaLeMnLQ4
                            MD5:B3A76DE50584DD20EDB7A1320F7E6C06
                            SHA1:6884659420A4A904975BE363B8B71197F35DF423
                            SHA-256:6DB1061C1712E03CC45ADAC730AF50DFA7AB2B29F4A585A0A866573E0023D5F3
                            SHA-512:5E33D07BC96082ED78EE9C45F8E4248E7AA8C872FB91D60A73623AFA593400CD47AB1F79A69166541206936156F3B0CE08E0B851561080E068F3E0288CA8072F
                            Malicious:false
                            Preview:0..H..*.H.........90..5...1.0...+......0.....+.....7......0...0...+.....7.....l...0E.B..y?t.....140516140009Z0...+.....7.....0..z0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..e0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.5.F.4.E.7.6.D.6.1.4.1.B.2.7.5.8.5.D.6.F.8.3.7.3.1.D.2.A.A.D.C.A.2.F.8.F.5.8.B...1..]0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........maA.u...71.....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9694
                            Entropy (8bit):5.199518545726912
                            Encrypted:false
                            SSDEEP:192:B8HvMWGtLZlAdwo3UqTMK4fRb7FsIVkTBgdvXnG4izeVtcw:B8H4l2tNTMK4ftRTkVEnGdzAf
                            MD5:1CA510E30084F95389EF4EEB6D44398D
                            SHA1:C5F4E76D6141B27585D6F83731D2AADCA2F8F58B
                            SHA-256:0ED6EBAEC6DEAD6FDA901B3276715E9EC35FF757C02A27D3526ACC6EEFFEF457
                            SHA-512:21ED2655F9FBDB7732B2DA8F5DF316BE4DAE80561209E49A58AAC4D69DFCF11A007A9565C3F78309DC6BC350A47F67BC4F4B559B2A8A5C340A7D60289CD243A5
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7540
                            Entropy (8bit):7.156208031117259
                            Encrypted:false
                            SSDEEP:192:jwn9PCj+nYe+PjP3rTqavM+vmr9ZCspE+TMAr+7+Yac:jjanYPL3qaLeMnOc
                            MD5:16AC4FA94C22381E7A4A50141307A54D
                            SHA1:D796A30A98D895D0BC49A09D0A6F63EABD81BD7A
                            SHA-256:9E5588D557F378CB386D0414D21EA256C60D11DE9D1B915F671B260147B98498
                            SHA-512:3FD8DDA6D71949791E1C2728E5B49EA81032BC5C0D3456DE7C4652479AE023FC5D65E0AF7773C2556F52039FC290C81FF1FBDA3709A5FA8CA81E657F932535EC
                            Malicious:false
                            Preview:0..p..*.H.........a0..]...1.0...+......0.....+.....7......0...0...+.....7......b.B...B..$......140516140010Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..y0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....R9.E.E.A.E.F.F.4.6.8.D.6.2.8.0.1.4.9.C.8.9.9.2.3.2.E.8.8.7.D.2.E.C.9.7.1.F.1.1.6...1..q0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+............h.(.I.#..}..q..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9774
                            Entropy (8bit):5.200356426579818
                            Encrypted:false
                            SSDEEP:192:B8HvMWG5LZlAdwo3UqTMG4fRb7isIVkTBgdbXnG4+zeVtc2PdT:B8HMl2tNTMG4ft+TkVQnGpzAJ
                            MD5:2AF89E9CB43E93768CA169CB76756123
                            SHA1:9EEAEFF468D6280149C899232E887D2EC971F116
                            SHA-256:303847238B729D0A2D49F93073AC882120FF112C93046845A855A3FC192D6A17
                            SHA-512:43CFED37B4946FB95BD31A33D3EFCC273446FEB13D34593134AB1CB909ACF83FBAD1B5556F092CADA0B5AD3492E2976E010966259CC2E205678CC8620310845F
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7528
                            Entropy (8bit):7.161254074300881
                            Encrypted:false
                            SSDEEP:192:LYRINCjanYe+PjP3rTqavM+vmr9ZCspE+TMAr+DtJ:a+nYPL3qaLeMnD
                            MD5:5C737957A4385512FD021458107C0CE6
                            SHA1:F5815B5B9EFFA9C7B8850B84C504CC5487DB2D4C
                            SHA-256:EFF94634DCAD8CF3D2F5633E58772368280D79B0C5DCC825D71256B70B07F37E
                            SHA-512:DFC6F4074BA83AF03F50028A3B70D980272A139E56DA7994764F6F91A44742E7498C2BFF88485E2FDC86080FE99AED582ECE55D065AA9B2D731A6AAFC685DA4E
                            Malicious:false
                            Preview:0..d..*.H.........U0..Q...1.0...+......0.....+.....7......0...0...+.....7......-.'.g.H....E.`...140516140004Z0...+.....7.....0...0....R3.A.2.7.2.A.5.7.1.B.E.9.B.B.5.E.9.C.C.2.2.F.5.3.7.A.A.2.6.4.B.1.C.3.D.1.C.D.4.5...1..k0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........:'*W..^../Sz.d....E0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..s0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9750
                            Entropy (8bit):5.199048245781225
                            Encrypted:false
                            SSDEEP:192:B8HvMWGpLZlAdwo3UqTMw4fRb704sIVkTBgdhXnG48zeVtc24yr:B8Hil2tNTMw4ftw4TkVMnGVzAL
                            MD5:5BE543804F4C61874D3CA9F979F78AD7
                            SHA1:3A272A571BE9BB5E9CC22F537AA264B1C3D1CD45
                            SHA-256:DA73278D43CD6EDA99F92C24CD6674C71238F2795CDA1B06DD2F8B0F263E1036
                            SHA-512:520B1674F908B86D56E9679A201A34A31C2B8A792281542E4720DD87D1D2C5DEE87BB6F8469F624213C9A3BE55AC5973BF6B220FF7CC0C9EF77F9AA8412E8251
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):9576
                            Entropy (8bit):7.214945113432049
                            Encrypted:false
                            SSDEEP:192:3GmgPCj2yowJL/cu7RZgjlorfpx+viJdr9ZCspE+TMcrbdYr:39xSYJLca6jIp3weM+M
                            MD5:F4F90EDFE025F3C918A7D4992F103A48
                            SHA1:34A3A6E4711D1625CB29B5A800EF1D9569373A41
                            SHA-256:51BE8127BE3D3F651D269A0885D66D16CA4030079CB8019754D7D5662090B203
                            SHA-512:CD62D1FDE1741DE0F0EC81DB325A210305C72344FD9E111011C6264EAC5FF3E84C8E22CC779EFCB3449A4839164BE068D00D249C795B68D98E3702FEFBB5FD6A
                            Malicious:false
                            Preview:0.%d..*.H........%U0.%Q...1.0...+......0.....+.....7......0...0...+.....7.........A@>C.<.._B.7..111202130217Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RD.2.4.7.5.3.B.F.3.E.9.E.4.4.F.0.4.5.5.A.7.C.C.8.8.8.0.3.D.2.A.C.0.7.2.7.C.8.C.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........GS.>.D.EZ|....'..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9774
                            Entropy (8bit):5.201512481427886
                            Encrypted:false
                            SSDEEP:192:B8HvMWG/LZlAdwo3UqTMK4fRbK6sIVkTBgdJXnG4EzeVtc28SJn:B8HGl2tNTMK4ftzTkVanG/zArZ
                            MD5:9232DCCBA703DBE10F07D17480D831F9
                            SHA1:D24753BF3E9E44F0455A7CC88803D2AC0727C8C8
                            SHA-256:792CE4DA7EA6403A6D53A6F5C563F686CD72989E716CABFF6FAED59DE477F8C2
                            SHA-512:03772B2742906A1AE260A30C97E52997A869B79C2D7A7491681F2E506757F8E057075CE4F1BB63761D6BA748AA6D28E0AA7B5930BDF3FC5B1A2637F88AD9BC33
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7532
                            Entropy (8bit):7.160287296745998
                            Encrypted:false
                            SSDEEP:192:hF8WkNCjInYe+PjP3rTqavM+vmr9ZCspE+TMAr+VykqZ:T8a8nYPL3qaLeMnVy/
                            MD5:F9A900E64BE138468DBACBC488511E8F
                            SHA1:2F8F2A07A80DC53DEE2F1B687E50D71403C66C5B
                            SHA-256:F0E7DD66F59AA78446C0A5D069F989792584D3BB8A47E69B161D278E43A58877
                            SHA-512:BA85D4D138E497A447546937B637DD7504BFFDCD04B8026C729B87F2DAC095F9739D1B0F76BE90EF6A7D1D7B201B4B8574AE4F01BC65329BB12203671F253EB8
                            Malicious:false
                            Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....\5.k>..A....N....140516140005Z0...+.....7.....0...0....R1.2.F.2.C.9.7.D.E.F.8.3.A.5.A.2.A.E.E.2.6.3.E.A.3.E.7.6.1.E.E.2.8.C.8.5.B.3.1.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........}....c.>v....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9758
                            Entropy (8bit):5.199812485547983
                            Encrypted:false
                            SSDEEP:192:B8HvMWG/LZlAdwo3UqTM84fRb7lsIVkTBgdJXnG4EzeVtc2gaj:B8HGl2tNTM84ftJTkVanG/zAl
                            MD5:04ACD4E8BFA9089D2120AE8872190CB3
                            SHA1:12F2C97DEF83A5A2AEE263EA3E761EE28C85B318
                            SHA-256:D5E60140FC42A8C26566C5D99822F449ECC51C4D8AFF2235FABBD5767AC5E779
                            SHA-512:22046E62109D752F0A3AB67962B70AE65925F3A897287EF64C59592BF11E7EC697F23FEB56AD43EDC8161F4CF144CFBA76421529C6ACA0DC9D523D762DD29DE9
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7524
                            Entropy (8bit):7.155292171931641
                            Encrypted:false
                            SSDEEP:192:64JPCjTnYe+PjP3rTqavM+vmr9ZCspE+TMAr+YR:iPnYPL3qaLeMnw
                            MD5:9C27BFE6E80B05E7DADB26DAD826984A
                            SHA1:724DFF2E442DD2D17ED6D100E9FD2D93786C79B8
                            SHA-256:C7045DFCCD4CF9D28999893C47CB4B28EA3AB0E8BD5C3C1ED7D4F3FE6EF2026F
                            SHA-512:A8225CFA0FBB7800C30978ACCE5CD8C49F481EB9BFF0E99037C7A569D1286837A027F6CC85B35A2469E2258AE3B32DD4E20095980FC0FF2C7B2094C1BEC0523B
                            Malicious:false
                            Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......P.e...@.y.....V..140916104248Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.1.6.F.4.D.0.E.E.6.9.6.F.0.B.A.C.C.1.E.0.3.7.1.5.5.7.9.3.B.A.C.D.2.7.D.0.3.3.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........oM......qUy;..}.<0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9742
                            Entropy (8bit):5.19974129042694
                            Encrypted:false
                            SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1l4fRb7JsIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTML4ftlTkV1nGkzA2
                            MD5:54604542F5A3385064DE1524F57D21E0
                            SHA1:C16F4D0EE696F0BACC1E037155793BACD27D033C
                            SHA-256:A3D693423160DCE3A729F8E97AA0085D0731B9F57C7C2ECFA6C8ABEBF52C28B8
                            SHA-512:967C9E400CB8C68560B01AB07629AF58403F9527377ABBBAC49E73A3D8CB9FFDE90EE772554700BC5F88D113B0AA9F19720D4AF2461635E52FFA77D6CB593932
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7524
                            Entropy (8bit):7.155823358156326
                            Encrypted:false
                            SSDEEP:192:66ohNCjenYe+PjP3rTqavM+vmr9ZCspE+TMAr+0+:r6nYPL3qaLeMnf
                            MD5:78FE95788DB8E3332DA03D9B86943407
                            SHA1:1D9648350CD10A6C9FB33DC87F895C23E049FB8E
                            SHA-256:B56D737983F4B59B34A0CAC7B748617DEFA159965FBEE3B693D767364FE641F0
                            SHA-512:784EA0F012D53856668AE36F6CEFBCA3DBCADE69C20E6A3F42EC899535E3CA774D8C23FC03CBBAB0B4E1DC25DF0029C4C409A2E02D085896BB6D42252CDDED9A
                            Malicious:false
                            Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......8d&?u.@.....`o...140516140007Z0...+.....7.....0...0....R5.6.1.3.1.A.E.B.2.C.6.E.7.9.4.7.E.1.F.B.7.C.B.2.8.2.6.3.8.B.5.8.B.7.0.5.6.7.8.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........V...,nyG..|..c.X..g.0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9742
                            Entropy (8bit):5.203938700783149
                            Encrypted:false
                            SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1g4fRb7J2sIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTMG4ft8TkV1nGkzA2
                            MD5:7FBD82746CF38DA2A8728A7C47112124
                            SHA1:56131AEB2C6E7947E1FB7CB282638B58B705678C
                            SHA-256:EFAD8843EB281869659A13CE3FCC48D5922C85A5CF63F4E91A6C22B0B9683F2D
                            SHA-512:DCE593288E62E60CBC6E2C3CB1EED01B56A3431F324D877D41D98F3F38D20B2276A117EB9106B690C03A5816285D6864A0DD0A99132E0781C007B8C66D72C3D6
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7532
                            Entropy (8bit):7.163912217919972
                            Encrypted:false
                            SSDEEP:192:hF2lRtPCj1nYe+PjP3rTqavM+vmr9ZCspE+TMAr+Nm0jPgH:T2gJnYPL3qaLeMnk5
                            MD5:EC1239127DC978757B0B9CC27D35128E
                            SHA1:DD4FE65A456D244DAA29E85FF5AF7E1B4BF64014
                            SHA-256:FD4981D78D8F37AAA13BEDB75406B61FF24BE17589187AC1D8FE8E8DDF0B1863
                            SHA-512:EC3C70835A009A719893B54B682BC3ED6085F506D29E1C93E255040B633ECED4DA7449C16B5F636119EB9F97314A8ADE347D9FC0B3C4ECD5A082FA771CCAA0C7
                            Malicious:false
                            Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....Y....+,J...U..X...140516140008Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RA.1.6.D.E.3.5.E.A.B.4.E.6.E.5.1.B.E.4.5.4.4.7.9.3.A.0.5.D.B.C.6.6.8.2.9.8.D.E.B...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........m.^.NnQ.EDy:...h)..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9758
                            Entropy (8bit):5.200481985878872
                            Encrypted:false
                            SSDEEP:192:B8HvMWGzLZlAdwo3UqTMH4fRbz7sIVkTBgdVXnG4QzeVtc2UWv:B8H6l2tNTMH4ft/TkVmnGLzAJ
                            MD5:120CBBA255C66FBCAAD7D49BCF567FA5
                            SHA1:A16DE35EAB4E6E51BE4544793A05DBC668298DEB
                            SHA-256:17E11451106D4DC767CE654D828EC5C3DE1AD9000BD51B7F5E2CA87334C71179
                            SHA-512:73D7A772C5F9EBAB0D363DAF3BDCBB176B0EAE6A170258D9E1EE5D1AF7D7A194C1D1716364BE411EF5CFBD1DEB69A0ECAEFB9FC8CFF08ABD68DC13B630E533EE
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):5299123
                            Entropy (8bit):6.417889890443472
                            Encrypted:false
                            SSDEEP:98304:hSmaRfSnG5itjD4+j05p5Zxa8byNFzH2bP4PqyK13icjqsNTUjJk:hTaRZ8tjD4+wD5ZksyPHIFIk
                            MD5:5A3DA2206BD35C381B826FF748093684
                            SHA1:AE5A7D9CEB4324BCE26B6E2ED7C1FE18DEAF917E
                            SHA-256:E94B30CF6F7FA8F30EB21B5A4B3316B5F005321C31A2139095882450D8BF8C78
                            SHA-512:DBA818B5E442EA797E4F20F313C2196BA366DE82784968A1F2F29C8F3AAEE5BC09B7B9CC33A959C0E2507F31517E32D48C118CDE5119A741C5378DCF29856801
                            Malicious:true
                            Yara Hits:
                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe, Author: Joe Security
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......V..................8..N.......d8.......8...@...........................U..................@...........................0;..T....?.......................................................;......................?;.......;......................text...,.7.......7................. ..`.itext........8.......7............. ..`.data.........8.......8.............@....bss....t.....9.......9..................idata...T...0;..V....9.............@....didata.......;.......9.............@....tls....P.....;.......9..................rdata........;.......9.............@..@.reloc..@#....;.......9.............@..B.rsrc.........?.......9.............@..@..............U.......S.............@..@........................................................
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Template: Intel;1033, Revision Number: {CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}, Number of Words: 0, Number of Pages: 200, Title: TechkonDriver64Bit, Subject: Techkon USB-Driver 64Bit Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0
                            Category:dropped
                            Size (bytes):770048
                            Entropy (8bit):6.313135922265424
                            Encrypted:false
                            SSDEEP:12288:DRU4nBKXsbzqDSJDQ8guBoN2KA2wKc7wMz7:DRU4BF5BqPA2fc7wMz7
                            MD5:6957CC6E903D183839C08109EDE46105
                            SHA1:9B97658AE2F1452D4A61C69BC2E303A7D36DC4D4
                            SHA-256:51BDA45008F6A3D616E94FDA63849A6E766B5509E1E5259EA8359A2466A5F2BA
                            SHA-512:2CD1018AA29FD898CCACE29582AE84A6291E991C74848939EB05F3B6B11BEC54ED16DAB8C95F648205C8FEF583DFB25E93D8CA6D4AB3A618A84ADB7E27D3FB16
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:7-zip archive data, version 0.3
                            Category:dropped
                            Size (bytes):3821599
                            Entropy (8bit):6.2872927335703555
                            Encrypted:false
                            SSDEEP:49152:YXlXDzXmLXrXxXzX4XOXWXmOX+rX14rFRMSigFEkEi24EJD2d8hMcSCnmNPIkFVT:cTE94w4BF5
                            MD5:839619AB3C498F9119516797217ECE8B
                            SHA1:83593C1247452E23F900E2F383B80FCE222E77D5
                            SHA-256:C0BA92E82179F99A6CBAE6B26E2CF94DA86D9C2A89FC71552484150D4FB1A237
                            SHA-512:8947009EE28BD4A8D6C2BEE4B03474A981A28C789021B31C6B3010FD0727180F16D7FE95F35DE13A533CA56953DE37CC088F496FA82CD4FA0371B9D422C79816
                            Malicious:false
                            Preview:7z..'...P=".'H:..............oB....TFRMDESIGN.0.[...TPF0.TfrmDesign.frmDesign.Left....Top...HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9750
                            Entropy (8bit):5.199048245781225
                            Encrypted:false
                            SSDEEP:192:B8HvMWGpLZlAdwo3UqTMw4fRb704sIVkTBgdhXnG48zeVtc24yr:B8Hil2tNTMw4ftw4TkVMnGVzAL
                            MD5:5BE543804F4C61874D3CA9F979F78AD7
                            SHA1:3A272A571BE9BB5E9CC22F537AA264B1C3D1CD45
                            SHA-256:DA73278D43CD6EDA99F92C24CD6674C71238F2795CDA1B06DD2F8B0F263E1036
                            SHA-512:520B1674F908B86D56E9679A201A34A31C2B8A792281542E4720DD87D1D2C5DEE87BB6F8469F624213C9A3BE55AC5973BF6B220FF7CC0C9EF77F9AA8412E8251
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9742
                            Entropy (8bit):5.19974129042694
                            Encrypted:false
                            SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1l4fRb7JsIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTML4ftlTkV1nGkzA2
                            MD5:54604542F5A3385064DE1524F57D21E0
                            SHA1:C16F4D0EE696F0BACC1E037155793BACD27D033C
                            SHA-256:A3D693423160DCE3A729F8E97AA0085D0731B9F57C7C2ECFA6C8ABEBF52C28B8
                            SHA-512:967C9E400CB8C68560B01AB07629AF58403F9527377ABBBAC49E73A3D8CB9FFDE90EE772554700BC5F88D113B0AA9F19720D4AF2461635E52FFA77D6CB593932
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7528
                            Entropy (8bit):7.161254074300881
                            Encrypted:false
                            SSDEEP:192:LYRINCjanYe+PjP3rTqavM+vmr9ZCspE+TMAr+DtJ:a+nYPL3qaLeMnD
                            MD5:5C737957A4385512FD021458107C0CE6
                            SHA1:F5815B5B9EFFA9C7B8850B84C504CC5487DB2D4C
                            SHA-256:EFF94634DCAD8CF3D2F5633E58772368280D79B0C5DCC825D71256B70B07F37E
                            SHA-512:DFC6F4074BA83AF03F50028A3B70D980272A139E56DA7994764F6F91A44742E7498C2BFF88485E2FDC86080FE99AED582ECE55D065AA9B2D731A6AAFC685DA4E
                            Malicious:false
                            Preview:0..d..*.H.........U0..Q...1.0...+......0.....+.....7......0...0...+.....7......-.'.g.H....E.`...140516140004Z0...+.....7.....0...0....R3.A.2.7.2.A.5.7.1.B.E.9.B.B.5.E.9.C.C.2.2.F.5.3.7.A.A.2.6.4.B.1.C.3.D.1.C.D.4.5...1..k0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........:'*W..^../Sz.d....E0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..s0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7540
                            Entropy (8bit):7.156208031117259
                            Encrypted:false
                            SSDEEP:192:jwn9PCj+nYe+PjP3rTqavM+vmr9ZCspE+TMAr+7+Yac:jjanYPL3qaLeMnOc
                            MD5:16AC4FA94C22381E7A4A50141307A54D
                            SHA1:D796A30A98D895D0BC49A09D0A6F63EABD81BD7A
                            SHA-256:9E5588D557F378CB386D0414D21EA256C60D11DE9D1B915F671B260147B98498
                            SHA-512:3FD8DDA6D71949791E1C2728E5B49EA81032BC5C0D3456DE7C4652479AE023FC5D65E0AF7773C2556F52039FC290C81FF1FBDA3709A5FA8CA81E657F932535EC
                            Malicious:false
                            Preview:0..p..*.H.........a0..]...1.0...+......0.....+.....7......0...0...+.....7......b.B...B..$......140516140010Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..y0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....R9.E.E.A.E.F.F.4.6.8.D.6.2.8.0.1.4.9.C.8.9.9.2.3.2.E.8.8.7.D.2.E.C.9.7.1.F.1.1.6...1..q0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+............h.(.I.#..}..q..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9774
                            Entropy (8bit):5.200356426579818
                            Encrypted:false
                            SSDEEP:192:B8HvMWG5LZlAdwo3UqTMG4fRb7isIVkTBgdbXnG4+zeVtc2PdT:B8HMl2tNTMG4ft+TkVQnGpzAJ
                            MD5:2AF89E9CB43E93768CA169CB76756123
                            SHA1:9EEAEFF468D6280149C899232E887D2EC971F116
                            SHA-256:303847238B729D0A2D49F93073AC882120FF112C93046845A855A3FC192D6A17
                            SHA-512:43CFED37B4946FB95BD31A33D3EFCC273446FEB13D34593134AB1CB909ACF83FBAD1B5556F092CADA0B5AD3492E2976E010966259CC2E205678CC8620310845F
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7532
                            Entropy (8bit):7.160287296745998
                            Encrypted:false
                            SSDEEP:192:hF8WkNCjInYe+PjP3rTqavM+vmr9ZCspE+TMAr+VykqZ:T8a8nYPL3qaLeMnVy/
                            MD5:F9A900E64BE138468DBACBC488511E8F
                            SHA1:2F8F2A07A80DC53DEE2F1B687E50D71403C66C5B
                            SHA-256:F0E7DD66F59AA78446C0A5D069F989792584D3BB8A47E69B161D278E43A58877
                            SHA-512:BA85D4D138E497A447546937B637DD7504BFFDCD04B8026C729B87F2DAC095F9739D1B0F76BE90EF6A7D1D7B201B4B8574AE4F01BC65329BB12203671F253EB8
                            Malicious:false
                            Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....\5.k>..A....N....140516140005Z0...+.....7.....0...0....R1.2.F.2.C.9.7.D.E.F.8.3.A.5.A.2.A.E.E.2.6.3.E.A.3.E.7.6.1.E.E.2.8.C.8.5.B.3.1.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........}....c.>v....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7524
                            Entropy (8bit):7.155823358156326
                            Encrypted:false
                            SSDEEP:192:66ohNCjenYe+PjP3rTqavM+vmr9ZCspE+TMAr+0+:r6nYPL3qaLeMnf
                            MD5:78FE95788DB8E3332DA03D9B86943407
                            SHA1:1D9648350CD10A6C9FB33DC87F895C23E049FB8E
                            SHA-256:B56D737983F4B59B34A0CAC7B748617DEFA159965FBEE3B693D767364FE641F0
                            SHA-512:784EA0F012D53856668AE36F6CEFBCA3DBCADE69C20E6A3F42EC899535E3CA774D8C23FC03CBBAB0B4E1DC25DF0029C4C409A2E02D085896BB6D42252CDDED9A
                            Malicious:false
                            Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......8d&?u.@.....`o...140516140007Z0...+.....7.....0...0....R5.6.1.3.1.A.E.B.2.C.6.E.7.9.4.7.E.1.F.B.7.C.B.2.8.2.6.3.8.B.5.8.B.7.0.5.6.7.8.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........V...,nyG..|..c.X..g.0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9742
                            Entropy (8bit):5.203938700783149
                            Encrypted:false
                            SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1g4fRb7J2sIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTMG4ft8TkV1nGkzA2
                            MD5:7FBD82746CF38DA2A8728A7C47112124
                            SHA1:56131AEB2C6E7947E1FB7CB282638B58B705678C
                            SHA-256:EFAD8843EB281869659A13CE3FCC48D5922C85A5CF63F4E91A6C22B0B9683F2D
                            SHA-512:DCE593288E62E60CBC6E2C3CB1EED01B56A3431F324D877D41D98F3F38D20B2276A117EB9106B690C03A5816285D6864A0DD0A99132E0781C007B8C66D72C3D6
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:Certificate, Version=3
                            Category:dropped
                            Size (bytes):1379
                            Entropy (8bit):7.164821094442024
                            Encrypted:false
                            SSDEEP:24:3hE3IaffyrWghhywWGwBBrG7V+vXx9uyv1jTRgjDiuVz0mkhfAwfSLC:36DffrgarB8V+vXx9uyv0DiuVxkhfEm
                            MD5:7CA2896A0BED0C0EA2C32E34FA89EDB3
                            SHA1:B6E6CB217307F0D3CD5CA360D368887B8FA98BA3
                            SHA-256:F712E6788F1A6B6C520E5203EE07C2421F8D157D0B041AC9AA8ECABADBEFB87A
                            SHA-512:7232D3260D6714B6DD1B403AB1F838E2D6A33F9AA37D50C2DE4328DBFEA450C3A77875A333968219CB4F8B21140559310FBA42C9833F740A928554387EFFD969
                            Malicious:false
                            Preview:0.._0..G.......,h..g.0L.....1..0...*.H........0..1.0...U....US1.0...U....VeriSign, Inc.1.0...U....VeriSign Trust Network1;09..U...2Terms of use at https://www.verisign.com/rpa (c)101.0,..U...%VeriSign Class 3 Code Signing 2010 CA0...140304000000Z..170602235959Z0..1.0...U....DE1.0...U....Hessen1.0...U....Koenigstein1.0...U....TECHKON GmbH1>0<..U...5Digital ID Class 3 - Microsoft Software Validation v21.0...U....TECHKON GmbH0.."0...*.H.............0..........!.`.x..qr.r.....y.....$<.]./..E.EyJ.&4..}....}Y.O..5up....77.B.E,.U..P..b@.T.Ek..mr_9#.?.n..S....^?j....Z....m8.....L+..n...s.....k.......<|>_.T9.C...u.S}N...3.C.oKqup>..?`,..U.."..p..3<d<..$Q....|_...`U.(m...f...j....+-.. F`.....[..e|..g.?5........{0..w0...U....0.0...U...........0@..U...90705.3.1./http://csc3-2010-crl.verisign.com/CSC3-2010.crl0D..U. .=0;09..`.H...E....0*0(..+.........https://www.verisign.com/rpa0...U.%..0...+.......0q..+........e0c0$..+.....0...http://ocsp.verisign.com0;..+.....0../http://csc3-2010-aia
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7500
                            Entropy (8bit):7.16354760210281
                            Encrypted:false
                            SSDEEP:192:N5PCjwnYe+PjP3rTqavM+vmr9ZCspE+TMAr+sMUYu4:yEnYPL3qaLeMnLQ4
                            MD5:B3A76DE50584DD20EDB7A1320F7E6C06
                            SHA1:6884659420A4A904975BE363B8B71197F35DF423
                            SHA-256:6DB1061C1712E03CC45ADAC730AF50DFA7AB2B29F4A585A0A866573E0023D5F3
                            SHA-512:5E33D07BC96082ED78EE9C45F8E4248E7AA8C872FB91D60A73623AFA593400CD47AB1F79A69166541206936156F3B0CE08E0B851561080E068F3E0288CA8072F
                            Malicious:false
                            Preview:0..H..*.H.........90..5...1.0...+......0.....+.....7......0...0...+.....7.....l...0E.B..y?t.....140516140009Z0...+.....7.....0..z0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..e0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.5.F.4.E.7.6.D.6.1.4.1.B.2.7.5.8.5.D.6.F.8.3.7.3.1.D.2.A.A.D.C.A.2.F.8.F.5.8.B...1..]0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........maA.u...71.....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7532
                            Entropy (8bit):7.163912217919972
                            Encrypted:false
                            SSDEEP:192:hF2lRtPCj1nYe+PjP3rTqavM+vmr9ZCspE+TMAr+Nm0jPgH:T2gJnYPL3qaLeMnk5
                            MD5:EC1239127DC978757B0B9CC27D35128E
                            SHA1:DD4FE65A456D244DAA29E85FF5AF7E1B4BF64014
                            SHA-256:FD4981D78D8F37AAA13BEDB75406B61FF24BE17589187AC1D8FE8E8DDF0B1863
                            SHA-512:EC3C70835A009A719893B54B682BC3ED6085F506D29E1C93E255040B633ECED4DA7449C16B5F636119EB9F97314A8ADE347D9FC0B3C4ECD5A082FA771CCAA0C7
                            Malicious:false
                            Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....Y....+,J...U..X...140516140008Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RA.1.6.D.E.3.5.E.A.B.4.E.6.E.5.1.B.E.4.5.4.4.7.9.3.A.0.5.D.B.C.6.6.8.2.9.8.D.E.B...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........m.^.NnQ.EDy:...h)..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9758
                            Entropy (8bit):5.200481985878872
                            Encrypted:false
                            SSDEEP:192:B8HvMWGzLZlAdwo3UqTMH4fRbz7sIVkTBgdVXnG4QzeVtc2UWv:B8H6l2tNTMH4ft/TkVmnGLzAJ
                            MD5:120CBBA255C66FBCAAD7D49BCF567FA5
                            SHA1:A16DE35EAB4E6E51BE4544793A05DBC668298DEB
                            SHA-256:17E11451106D4DC767CE654D828EC5C3DE1AD9000BD51B7F5E2CA87334C71179
                            SHA-512:73D7A772C5F9EBAB0D363DAF3BDCBB176B0EAE6A170258D9E1EE5D1AF7D7A194C1D1716364BE411EF5CFBD1DEB69A0ECAEFB9FC8CFF08ABD68DC13B630E533EE
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:Certificate, Version=3
                            Category:dropped
                            Size (bytes):1379
                            Entropy (8bit):7.175302981793894
                            Encrypted:false
                            SSDEEP:24:/3IaffyrW+hywWGwBBrG7pLqQ9xtRgjDiuVz0mkh6fyzjOlJ9X2I0:/DffrJrB80mgDiuVxkh6fyzSx0
                            MD5:1E256F3CD8A847D91596BF2C37DBF285
                            SHA1:6641ED279EF1A7A8E6D06BCEB38570B429101AA2
                            SHA-256:6FCE0715E8C7D2B5BF2D7B049AE6CB6842E2D9757A2D9296A1587BBD05C2FE25
                            SHA-512:91DAD8AFEA4A493269688CA7B7642DA7A663742C5811AADB3EE13D66DCB3BE2B1ED5EA6A9F45FBF9E6E432AEED0A9AE1AAA4A921658F2D5DDF2524C5EF195C3A
                            Malicious:false
                            Preview:0.._0..G.......7......'@...\...0...*.H........0..1.0...U....US1.0...U....VeriSign, Inc.1.0...U....VeriSign Trust Network1;09..U...2Terms of use at https://www.verisign.com/rpa (c)101.0,..U...%VeriSign Class 3 Code Signing 2010 CA0...110320000000Z..120307235959Z0..1.0...U....DE1.0...U....Hessen1.0...U....Koenigstein1.0...U....TECHKON GmbH1>0<..U...5Digital ID Class 3 - Microsoft Software Validation v21.0...U....TECHKON GmbH0.."0...*.H.............0..........6.....:N~lw..F..J7h...5x._9..\....:.)z..].......g.....4.....D..FI.......s....`L....}..`~.U..E.H....*Q........sv.....x.eLh...`..<^.%.. .J.....(5...^.....U.P.....r.......{..u...O..0....V.y......$#...#. N..:...E.L0.CZ..B3.E..@x.?.|..B.".....&.<.........{0..w0...U....0.0...U...........0@..U...90705.3.1./http://csc3-2010-crl.verisign.com/CSC3-2010.crl0D..U. .=0;09..`.H...E....0*0(..+.........https://www.verisign.com/rpa0...U.%..0...+.......0q..+........e0c0$..+.....0...http://ocsp.verisign.com0;..+.....0../http://csc3-2010-aia
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7524
                            Entropy (8bit):7.155292171931641
                            Encrypted:false
                            SSDEEP:192:64JPCjTnYe+PjP3rTqavM+vmr9ZCspE+TMAr+YR:iPnYPL3qaLeMnw
                            MD5:9C27BFE6E80B05E7DADB26DAD826984A
                            SHA1:724DFF2E442DD2D17ED6D100E9FD2D93786C79B8
                            SHA-256:C7045DFCCD4CF9D28999893C47CB4B28EA3AB0E8BD5C3C1ED7D4F3FE6EF2026F
                            SHA-512:A8225CFA0FBB7800C30978ACCE5CD8C49F481EB9BFF0E99037C7A569D1286837A027F6CC85B35A2469E2258AE3B32DD4E20095980FC0FF2C7B2094C1BEC0523B
                            Malicious:false
                            Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......P.e...@.y.....V..140916104248Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.1.6.F.4.D.0.E.E.6.9.6.F.0.B.A.C.C.1.E.0.3.7.1.5.5.7.9.3.B.A.C.D.2.7.D.0.3.3.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........oM......qUy;..}.<0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):96
                            Entropy (8bit):4.2832136787344055
                            Encrypted:false
                            SSDEEP:3:HrJQyogRM/fyAiLJQyogRM/cLGr:HeFT9b
                            MD5:C10BB4CF9692695632DE53434201ACA9
                            SHA1:4215207F1C5E53C2CBA1638C7B27B587F0E48FC6
                            SHA-256:CC11C5FEA0D555905CC67BF2081C55F9F82A049EE65A89A371D2310BF37AA8EB
                            SHA-512:27234743327A5F7F46B60CD1F544C77353AA93C29E583EE8A8DB801D5E654EEDB2AAF30F8F4EA4219BB53B739C9E51694143009F9533BB456F0B44F2E2ADC862
                            Malicious:false
                            Preview:certutil -f -addstore TrustedPublisher TK1.cer..certutil -f -addstore TrustedPublisher TK2.cer..
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9758
                            Entropy (8bit):5.199812485547983
                            Encrypted:false
                            SSDEEP:192:B8HvMWG/LZlAdwo3UqTM84fRb7lsIVkTBgdJXnG4EzeVtc2gaj:B8HGl2tNTM84ftJTkVanG/zAl
                            MD5:04ACD4E8BFA9089D2120AE8872190CB3
                            SHA1:12F2C97DEF83A5A2AEE263EA3E761EE28C85B318
                            SHA-256:D5E60140FC42A8C26566C5D99822F449ECC51C4D8AFF2235FABBD5767AC5E779
                            SHA-512:22046E62109D752F0A3AB67962B70AE65925F3A897287EF64C59592BF11E7EC697F23FEB56AD43EDC8161F4CF144CFBA76421529C6ACA0DC9D523D762DD29DE9
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9774
                            Entropy (8bit):5.201512481427886
                            Encrypted:false
                            SSDEEP:192:B8HvMWG/LZlAdwo3UqTMK4fRbK6sIVkTBgdJXnG4EzeVtc28SJn:B8HGl2tNTMK4ftzTkVanG/zArZ
                            MD5:9232DCCBA703DBE10F07D17480D831F9
                            SHA1:D24753BF3E9E44F0455A7CC88803D2AC0727C8C8
                            SHA-256:792CE4DA7EA6403A6D53A6F5C563F686CD72989E716CABFF6FAED59DE477F8C2
                            SHA-512:03772B2742906A1AE260A30C97E52997A869B79C2D7A7491681F2E506757F8E057075CE4F1BB63761D6BA748AA6D28E0AA7B5930BDF3FC5B1A2637F88AD9BC33
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9694
                            Entropy (8bit):5.199518545726912
                            Encrypted:false
                            SSDEEP:192:B8HvMWGtLZlAdwo3UqTMK4fRb7FsIVkTBgdvXnG4izeVtcw:B8H4l2tNTMK4ftRTkVEnGdzAf
                            MD5:1CA510E30084F95389EF4EEB6D44398D
                            SHA1:C5F4E76D6141B27585D6F83731D2AADCA2F8F58B
                            SHA-256:0ED6EBAEC6DEAD6FDA901B3276715E9EC35FF757C02A27D3526ACC6EEFFEF457
                            SHA-512:21ED2655F9FBDB7732B2DA8F5DF316BE4DAE80561209E49A58AAC4D69DFCF11A007A9565C3F78309DC6BC350A47F67BC4F4B559B2A8A5C340A7D60289CD243A5
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):9576
                            Entropy (8bit):7.214945113432049
                            Encrypted:false
                            SSDEEP:192:3GmgPCj2yowJL/cu7RZgjlorfpx+viJdr9ZCspE+TMcrbdYr:39xSYJLca6jIp3weM+M
                            MD5:F4F90EDFE025F3C918A7D4992F103A48
                            SHA1:34A3A6E4711D1625CB29B5A800EF1D9569373A41
                            SHA-256:51BE8127BE3D3F651D269A0885D66D16CA4030079CB8019754D7D5662090B203
                            SHA-512:CD62D1FDE1741DE0F0EC81DB325A210305C72344FD9E111011C6264EAC5FF3E84C8E22CC779EFCB3449A4839164BE068D00D249C795B68D98E3702FEFBB5FD6A
                            Malicious:false
                            Preview:0.%d..*.H........%U0.%Q...1.0...+......0.....+.....7......0...0...+.....7.........A@>C.<.._B.7..111202130217Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RD.2.4.7.5.3.B.F.3.E.9.E.4.4.F.0.4.5.5.A.7.C.C.8.8.8.0.3.D.2.A.C.0.7.2.7.C.8.C.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........GS.>.D.EZ|....'..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):1316352
                            Entropy (8bit):6.662123826541052
                            Encrypted:false
                            SSDEEP:24576:htJHEI7Kl/eZfZblU8u+noMRBqSPSUO9z8mF36X+huHcN2:rkl6PoMRMSSzy+hwcN2
                            MD5:595209D10BD0EC1B01F8AC31195E7902
                            SHA1:849F59A743DE094C7CF05C7F89B0ED22309B619C
                            SHA-256:8D67E430AB5300BBA92B1D1B45D2E87C13E8B0D61A75D02A70BC203696430534
                            SHA-512:3AA7C32A3BC9F0A1E5D4B67B657A216131FBDD62E5794403D01FBBCA663420D861460DAEA6ECEA6F2C4268E67B1E2A71DEDE6E6A57FF041E34BFD3F3130EC328
                            Malicious:true
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...X..V.....................j.....................Q....................................................................O........5.......T.............................................................................H.......^....................text...h........................... ..`.itext..T........................... ..`.data....M.......N..................@....bss....TS... ...........................idata...5.......6..................@....didata.^............0..............@....edata..O............:..............@..@.rdata...............<..............@..@.reloc...............>..............@..B.rsrc....T.......T..................@..@....................................@..@........................................................
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:PE32+ executable (GUI) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):1050104
                            Entropy (8bit):5.617498652730841
                            Encrypted:false
                            SSDEEP:12288:uIId79EaUTvwieMozMEcOigSpuPMaLium:xIdqaWw1MsbTScP0
                            MD5:BE3C79033FA8302002D9D3A6752F2263
                            SHA1:A01147731F2E500282ECA5ECE149BCC5423B59D6
                            SHA-256:181BF85D3B5900FF8ABED34BC415AFC37FC322D9D7702E14D144F96A908F5CAB
                            SHA-512:77097F220CC6D22112B314D3E42B6EEDB9CCD72BEB655B34656326C2C63FB9209977DDAC20E9C53C4EC7CCC8EA6910F400F050F4B0CB98C9F42F89617965AAEA
                            Malicious:false
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g9I.#X'.#X'.#X'.* ..!X'.* ..7X'.* ..<X'.#X&.Y'.* ..fX'.* ...X'...Y."X'.* .."X'.* .."X'.Rich#X'.................PE..d......J..........".......................................................................@.......... ......................................H...@.......pY...0..\m.......%...........................................................................................text............................... ..`.data... ...........................@....pdata..\m...0...n..................@..@.rsrc....`.......Z...v..............@..@.reloc..<...........................@..B........................................................................................................................................................................................................................................................................................................
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):1448448
                            Entropy (8bit):6.68350408954223
                            Encrypted:false
                            SSDEEP:24576:KOG+2J9h3pr7waeMDJNGg/70Z6SVflSMBKS9uiNfGn83Zc5s/Z:Kp+QiaGN9SMcS95q83IgZ
                            MD5:18B85C5A139BAEAFD89C70B8C6561A52
                            SHA1:67033A74346E46C952CEE21EC1EE2C10CE8C5618
                            SHA-256:33B5F0AED0E886DDEAD2D412BF811920FBD17B162BA6272C4B28CC879F380DB8
                            SHA-512:2CC05FA8BB59B1B1CE24D25BDE62D85BEE273D4400EF9586ED2A2C513CD971CB52C9ADEDA8669CA257E2D8B8951D86C02D8E6506AE97BD85BA5AC45C4D724B2E
                            Malicious:true
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...R..V.................n.........................Q....................................................................O....P...?...p...\.........................................................................h[...............................text....X.......Z.................. ..`.itext.......p.......^.............. ..`.data....Q.......R...r..............@....bss....XT...............................idata...?...P...@..................@....didata.............................@....edata..O...........................@..@.rdata..............................@..@.reloc.............................@..B.rsrc....\...p...\..................@..@....................................@..@........................................................
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Template: Intel;1033, Revision Number: {CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}, Number of Words: 0, Number of Pages: 200, Title: TechkonDriver64Bit, Subject: Techkon USB-Driver 64Bit Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0
                            Category:dropped
                            Size (bytes):770048
                            Entropy (8bit):6.313135922265424
                            Encrypted:false
                            SSDEEP:12288:DRU4nBKXsbzqDSJDQ8guBoN2KA2wKc7wMz7:DRU4BF5BqPA2fc7wMz7
                            MD5:6957CC6E903D183839C08109EDE46105
                            SHA1:9B97658AE2F1452D4A61C69BC2E303A7D36DC4D4
                            SHA-256:51BDA45008F6A3D616E94FDA63849A6E766B5509E1E5259EA8359A2466A5F2BA
                            SHA-512:2CD1018AA29FD898CCACE29582AE84A6291E991C74848939EB05F3B6B11BEC54ED16DAB8C95F648205C8FEF583DFB25E93D8CA6D4AB3A618A84ADB7E27D3FB16
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                            Process:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):641845
                            Entropy (8bit):6.759953089731109
                            Encrypted:false
                            SSDEEP:12288:nmkzB+dtRRReCYRo38KLg/lIH4L4Y4pgSss:LoRRYu8KU/6YLg
                            MD5:AA00215FC4A6D307A143871D1C9904A6
                            SHA1:B8A3C08DE2FB1356965FE5EC5B53102303F84DB5
                            SHA-256:F2E0625F96D32063FADDDA808AF9A435D430707717529FD1EA6C96DEA1DE13CA
                            SHA-512:547C273300F87378F61E7FD93CE683D2DDF3B9886E735B66591FBEEA7B5953D6A8112C442F277A4E3CFE4A24995E437AA03CFB2F375CE8A035E168236B05775C
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......).n.m...m...m...d.......d...@...J.m.l...J.{.d...m.......d...y...d...%...d...l...s...l...d...l...Richm...........................PE..L....QkT...........!.................e.......0...............................0............@.........................`...........d....0...............................................................................0...............................text............................... ..`.rdata......0......................@..@.data....^......."..................@....rsrc........0......................@..@.reloc...C.......D..................@..B........................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):5295078
                            Entropy (8bit):6.41595061147608
                            Encrypted:false
                            SSDEEP:98304:hSmaRfSnG5itjD4+j05p5Zxa8byNFzH2bP4PqyK13icjqsNTUjJF:hTaRZ8tjD4+wD5ZksyPHIFIF
                            MD5:A94A3D60FA8A54AB71ABED39D5883D86
                            SHA1:3FC14B383FD699017AA7B7281C28F143AEAF7B9F
                            SHA-256:3AC4616A5ABF9A408EDCCC48D15AB9DD6441DAD273C8F477C1EB291812949451
                            SHA-512:172CE336A3343D8ED92EDA525A549F1E388D37076F71DC28C043FABC94B04761B7E936871F203C2B681EB4BFCC8C239327656F51003CD46D11C94589B1E8CC13
                            Malicious:true
                            Yara Hits:
                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\miaE9AF.tmp\TDService.exe, Author: Joe Security
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......V..................8..N.......d8.......8...@...........................U..................@...........................0;..T....?.......................................................;......................?;.......;......................text...,.7.......7................. ..`.itext........8.......7............. ..`.data.........8.......8.............@....bss....t.....9.......9..................idata...T...0;..V....9.............@....didata.......;.......9.............@....tls....P.....;.......9..................rdata........;.......9.............@..@.reloc..@#....;.......9.............@..B.rsrc.........?.......9.............@..@..............U.......S.............@..@........................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Template: Intel;1033, Revision Number: {C39D0F65-909B-4DBD-A3E7-FF81A783B41B}, Number of Words: 0, Number of Pages: 200, Title: TECHKON Device Service, Subject: TECHKON Device Service Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0
                            Category:dropped
                            Size (bytes):766976
                            Entropy (8bit):6.307836502585046
                            Encrypted:false
                            SSDEEP:12288:HUbU4DBKXsbzeDSJoQ8guBoN2KA2wKc7wMz7:HcU4VE5BqPA2fc7wMz7
                            MD5:D471255784CC4AE28EA97447F67DA9F2
                            SHA1:AC46FC4DD17A2F6BACFD33015B695970AADBA875
                            SHA-256:A35926623E6DAEF708BD51436D547BEE6B15DCC6DDAE52A74FDC323F1F8ECD26
                            SHA-512:760C4ACDC725549002D59B432FC4A55D065E72D6909D7EF2D8468723A2BF419581F258A373161974133087546B97216044B6D222930077960323528211A90A59
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:7-zip archive data, version 0.3
                            Category:dropped
                            Size (bytes):3831837
                            Entropy (8bit):6.288047394335939
                            Encrypted:false
                            SSDEEP:49152:zXlXDzXmLXrXxXzX4XOXWXmOX+rXAEJD2d8hMcSCnmNPIkFVZ+cocaFjhkSYKPM:xw4BF3ai
                            MD5:3EA26D5D84024858345551BDD209F62A
                            SHA1:DE89AEAB1CBE1328B0CDB7C17BE2B43BEA076E30
                            SHA-256:E58F0C20DFFBB1299D972CC7C3556DDDDE8D6888570FEEF208E48EAD68877149
                            SHA-512:5E8F2CCA528F77CC624FD17228D796E3921008A9D73511793E33FE6F4B94463D5304A969A4F18DD0BCDD2C5B0663861570E861DAC58355EF641860BB071AE607
                            Malicious:false
                            Preview:7z..'.......'p:...............M...TFRMDESIGN.0.[...TPF0.TfrmDesign.frmDesign.Left....Top...HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):2902256
                            Entropy (8bit):7.920111663334885
                            Encrypted:false
                            SSDEEP:49152:ynnZhJevas/0bxZjXAqySgkyneVSTTHJ7Als2GT/R1OPS5R+dQ:4nZA2xZjXgkAMSH24t1L5R+dQ
                            MD5:F6CD94DEAEA55BB414650D6A9CB7DD6C
                            SHA1:06AC62B0283E0490C9F66D3DE1E5CA47866CA3AA
                            SHA-256:08F2DBAF4537368977DC0F0790F1FFF6FD65D30F4C91FED2B2CACC9A7F307A07
                            SHA-512:3688F2622F43570DC1BD53B027D9A6C57FDE7DD4A34697D2E283549CF780F789A033FAA6EF5AB20EA49551921AC71844407AAAD0EDC87F9AAC9D1C2413D58F2C
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}'.O9F..9F..9F..0>[..F..0>J.-F..0>\.SF......;F......6F..9F...F..0>V.eF..'.K.8F..0>N.8F..Rich9F..................PE..L....Z.U.....................f....................@..................................$-......................................`....................../,. ...............................................@...............d............................text............................... ..`.rdata..(...........................@..@.data........p...$...`..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):180224
                            Entropy (8bit):6.031963137664287
                            Encrypted:false
                            SSDEEP:3072:LwlZ+P6imnm8mFmT73tgHnV53kAgcvzgRm1trohJkwh:cZ+6imnm8mFmT73krb6gonf
                            MD5:CEC1791BEC45F9D86771AF4F24EAA3F4
                            SHA1:1B806C9A7189C7801EF643C5AEA03CD6B0DEDCC4
                            SHA-256:7878EB862C0A8AB0766236E6C2183FAC93A0C734276347A143B454E2FB8B4F58
                            SHA-512:BF917BA4C20DB97685A4BFEA266ECE11C77286F9480E546007FC1D830E4DFBA0966F6B5B59D74AFC89713276BB899755DFABC8F3C42A8422E612401C761A9BE7
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........%.v.v.v.Y.v.v.Y.v...v"..v.v"..v.v.vE..v.Y.v..v.Y.v...v.Y.v...v.Y.v...vRich.v........PE..L...Q..K...........!.....`...P...............p......................................[...............................0................0..................................................................@............p..l............................text...._.......`.................. ..`.rdata...x...p.......p..............@..@.data....9....... ..................@....rsrc........0......................@..@.reloc..V'.......0..................@..B................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):1253376
                            Entropy (8bit):7.783380196730505
                            Encrypted:false
                            SSDEEP:24576:vF2oerN+CFfmxlJHLjyyrRyx/tCA1Q49UMEEXEimWZ2Eoxch6YB4:Mz9FOLjyywxNbrEEXhFoxch3
                            MD5:0B682718F2229F8526387698D1F60DAF
                            SHA1:FD7A024C14B1874587B1C6F94ED8AE4BA55C385C
                            SHA-256:2491D1F5D96A265794972F7BAB6173005B300BC1E85ACDA346E882D6DEBB366A
                            SHA-512:2D3B801A91C92DEC134AB0A81D7CFD2ADDA1045FD0A706B2605CB3046BEB19D97DD49D4A1418CA4966EDAE91A6CDB10A21379B85E1C035C20FB1FCE14851E597
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....).W.....................`......|.... ........@.. .......................`............@.................................2...J.......P@...................@....................................................... ............... ..H............text........ ...................... ..`.rsrc...P@.......P..................@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):24576
                            Entropy (8bit):3.368242915265491
                            Encrypted:false
                            SSDEEP:192:kRYqGL5n0f1auFrzr9VCj0aWSXRaf4iPH0uTiF7odzFaGFbieHr/zZYZud:37l08kCBZBaf9/BiqzFdFbieHTzZYcd
                            MD5:10195658250CA94B280DECCB4997B198
                            SHA1:765684257978376B463369065C552366282963F3
                            SHA-256:6801FD3462EE096A683D97A65D6E421E8B1419E9EEDC4A47BE7E2A14BCFA2CEF
                            SHA-512:016207696A3D7E4D719F3506F5C6F5CF66B77C56226778C328A0A0D6D807D572650CC460A9343276A05F2448BBC16EF0F8DF844BA257ECF8573C48343F6A0B36
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...g..W...........!.....0... ......^N... ...`....@.. ...............................L....@..................................N..W....`..h...........................XM............................................... ............... ..H............text...d.... ...0.................. ..`.rsrc...h....`.......@..............@..@.reloc...............P..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):1150976
                            Entropy (8bit):7.90148039825505
                            Encrypted:false
                            SSDEEP:24576:+tNmK9b6A+BUpJN/SP0lm8eSqY+5bPkT0WogLEVEGlim2Vy:+36AhJ9xeSwPKBGYn
                            MD5:F00223A56D3F89627CC88625DBCB0C42
                            SHA1:15489E487F43F77C812EF8EF07BB65171AFEB5BD
                            SHA-256:91DC55CA1A2A4B6206734C159B3C8ACC411F4B2A1BF7F208256A57B7DCBDC542
                            SHA-512:12F22018BC32A98C884447FE8E44BCC1868A5133B859CB91286548A24455BCC817FC030B6BC866E282727AE48D1C88B10894FD8C3CDA809716D49BEDAA81A866
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...@).W.................0...P......jK... ...`....@.. ....................................@................................. K..J....`...?........................................................................... ............... ..H............text...p+... ...0.................. ..`.rsrc....?...`...@...@..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4658
                            Entropy (8bit):3.6044727088231916
                            Encrypted:false
                            SSDEEP:96:IPGiqjELGICWPCVo61VAZ1MluVPKEb81H:IPooLGICBVo6Oc
                            MD5:55B6DFD4BEE7501D0A45D4BA9A865C06
                            SHA1:8D4395E23F830F37FB59FBC8A03D15753E89F65F
                            SHA-256:BE03976E9EB14CD5C07E3B7B0C7AD26B637F3AFC765959D080EE91BAD095B513
                            SHA-512:63B07E67AAAAAB735967651AD1B3B8FC960F2809C02AF8DADD01BBEA9A722E56AA1C0BF8E95185965B919757DB6B3E5E5EB66CB3ED555416B755142D1D6E89AC
                            Malicious:false
                            Preview:Remission..Black.0,007.0,008.0,01.0,01.0,011.0,012.0,012.0,013.0,014.0,014.0,014.0,014.0,015.0,014.0,014.0,014.0,014.0,015.0,015.0,015.0,016.0,016.0,017.0,018.0,019.0,02.0,021.0,022.0,024.0,025.0,027..Cyan.0,29.0,355.0,422.0,484.0,535.0,578.0,605.0,612.0,605.0,591.0,563.0,509.0,44.0,366.0,286.0,205.0,136.0,084.0,055.0,042.0,035.0,03.0,028.0,029.0,033.0,04.0,047.0,051.0,051.0,046.0,038..Magenta.0,187.0,171.0,165.0,171.0,178.0,172.0,151.0,125.0,099.0,077.0,057.0,038.0,027.0,023.0,02.0,015.0,012.0,013.0,028.0,109.0,374.0,623.0,687.0,729.0,77.0,787.0,787.0,785.0,786.0,794.0,806..Yellow.0,1.0,068.0,049.0,039.0,037.0,043.0,055.0,067.0,087.0,151.0,301.0,51.0,681.0,75.0,757.0,773.0,79.0,791.0,788.0,796.0,803.0,801.0,797.0,799.0,8.0,797.0,793.0,794.0,796.0,796.0,795..Black_SD90.0,209.0,207.0,206.0,208.0,211.0,214.0,218.0,222.0,225.0,226.0,227.0,23.0,232.0,232.0,231.0,232.0,233.0,232.0,23.0,23.0,231.0,231.0,23.0,231.0,232.0,231.0,232.0,233.0,236.0,238.0,239..Black_SD0.0,212.0,21.0,21.0,211.0,213
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):2871552
                            Entropy (8bit):7.91890094076526
                            Encrypted:false
                            SSDEEP:49152:NnnZhJegT3345UB8r/fecnYWgPmGWy0tGGDOYEHamRS1j1fC5j9IXvWm6BPX:5nZygT33wtr/fmZxWywGGDOBxRkj1f6x
                            MD5:3A0BF599146750C008BA6960C694470D
                            SHA1:22E869B8C60BBFB263A7AF2B5350386617EB6E72
                            SHA-256:3F1DC61B0BF0B93B1CD5478F151895B357DA92CAD2A48857E2FC4645C41E2DA3
                            SHA-512:5E6ED7829C8DC1879C67FF6F142A96575251C583A5AE9103A48587BFF42C463B59B5EAB7F543414838AEA4E5BBCA6C0F8433CE3BEF6367632B663F242DF7D30F
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}'.O9F..9F..9F..0>[..F..0>J.-F..0>\.SF......;F......6F..9F...F..0>V.eF..'.K.8F..0>N.8F..Rich9F..................PE..L....Z.U.....................f....................@...................................+......................................`......................+. ...............................................@...............d............................text............................... ..`.rdata..(...........................@..@.data........p...$...`..............@....rsrc..............................@..@................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                            Category:dropped
                            Size (bytes):124688
                            Entropy (8bit):5.941729779329973
                            Encrypted:false
                            SSDEEP:3072:9PdIuG8UvahsdcYX3UI2EuJ3im/ZCdady+RlTp/VYq63+sB:9PBUyhsdEI2++M+RlTHYL
                            MD5:E8A2190A9E8EE5E5D2E0B599BBF9DDA6
                            SHA1:4E97BF9519C83835DA9DB309E61EC87DDF165167
                            SHA-256:80AB0B86DE58A657956B2A293BD9957F78E37E7383C86D6CD142208C153B6311
                            SHA-512:57F8473EEDAF7E8AAD3B5BCBB16D373FD6AAEC290C3230033FC50B5EC220E93520B8915C936E758BB19107429A49965516425350E012F8DB0DE6D4F6226B42EE
                            Malicious:false
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...].:@...........#......................... .....".................................W...............................i...............0...f...........................................................................................................text............................... ..`.data...P.... ....... ..............@....rsrc....g...0...p...0..............@....reloc........... ..................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):45056
                            Entropy (8bit):3.9261380700304658
                            Encrypted:false
                            SSDEEP:384:GJzxPeOGEk4GKz7csqunx2gs1RteTOJ722RELbcAbZtLWs8:EzxNksqaJr2SLIEZ
                            MD5:9CFAB4DAACA85482012D97693EA88201
                            SHA1:095C31E6257CC5028E4605266477526D3B256B2B
                            SHA-256:0EBB561BC5FB6FEB35ADE2BE679AB8149C9942253ADD9A1C2B7A6F53ADFE4E46
                            SHA-512:9B6587CE414365420E96CA430C8DE170006CFF9ACEB51E7BF95BBFF6845AA936E8BF35D30B6442D23D48B460A085FA47673959BD3CB996970894549A71B7AB9F
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...r..W.................P...P......^e... ........@.. ....................................@..................................e..S........?..........................\d............................................... ............... ..H............text...dE... ...P.................. ..`.rsrc....?.......@...`..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):1753088
                            Entropy (8bit):7.88327202760358
                            Encrypted:false
                            SSDEEP:49152:8t723QiNn1X9NVWevTX9giFzbmjEanZQTS:8k3QiNnjNVWeLNg6nmj9n
                            MD5:819E58177441A1A5EAEE35216DC4B6D7
                            SHA1:65306A7FEF4AC738EA7177833B1D966E0B6C0BA5
                            SHA-256:2E03F7A87D69FE8B32A0B9604E270A3AF9DD3421351BE230889B7E24F2F6F88C
                            SHA-512:D8B7D560364D348ABFD956ACA24EC5631AB7488E3D49C27256B829D4EA165E0C56DC579E2E0EF1209029B7559B16A401AE63CDBBB2C773DAC176D7ABBAA3823A
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....).W..................... ........... ........@.. ....................................@.................................h...J.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):245760
                            Entropy (8bit):6.22180183473209
                            Encrypted:false
                            SSDEEP:6144:WNO7HqL+9Qxpw1Lpaofbn+0u61wxkM2AbuACH9d7jWy:WNO7HJX16uph
                            MD5:5D1E5758CEE95AC926D0C9F7C18095EE
                            SHA1:8253C41EF9539BDAD5FC15DB4FABA99C23242CD2
                            SHA-256:4E48950BB961EA13C4DD489D915D0DF83304D52C950A99E3E6B981EAC22112D9
                            SHA-512:B074D0DE952407F5DC721DE7157EC9957A8AD98A9C04F27F04A7BA81B5F0064DEB93F8D370539A4D37598E95B9D1EC5F91B13AFEC26BBA04309138E03F763750
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^W...6...6...6..a*...6..u)...6..*...6..u)..S6.......6..>...6...6..6.......6...0...6.......6..Rich.6..........PE..L.../l.?...........!................9................................................................'..............`...........d...............................x.......................................................x............................text............................... ..`.rdata........... ..................@..@.data....t.......p..................@....rsrc...............................@..@.reloc.. ".......0..................@..B........................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):212992
                            Entropy (8bit):6.4058590918443175
                            Encrypted:false
                            SSDEEP:6144:U+l+8gbiTF32Cw0oSGWhuLuGser+VbGrIQL:idbgFmJSGWhWuGseapkr
                            MD5:05D89328C51E732DE076DA05239D1D79
                            SHA1:C89B8500D13D540D9F6D8FA651F13E2F9990DECE
                            SHA-256:EE0BC472EC26CE050315AAAE1D85AE51BAF17E8A2A548E3161DED665CF324DD1
                            SHA-512:9EFE29F322A0A3049D0E5332C92A434B2F9797C0D3DB09414FCF8D6F5A01C4157716D5D252B38879312D5675712AD875B2A8D7E9407849CE1B992B94D5E50FF3
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......9K!3}*O`}*O`}*O`.5D`|*O`.6A``*O`.5E`.*O`.5\`x*O`}*N`3*O`{.E`i*O`.,I`|*O`..K`|*O`Rich}*O`........................PE..L......B...........!.....p..........w...................................................................................W.......<....`.......................p.......................................................................................text....k.......p.................. ..`.rdata...(.......0..................@..@.data...X........`..................@....rsrc........`......................@..@.reloc.......p... ... ..............@..B........................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):81920
                            Entropy (8bit):5.853209211745096
                            Encrypted:false
                            SSDEEP:1536:YxeYFH0dtYcPdtYc0F9J174KlwOAYQog4wBYo4IYo4N65xpUV:YTFXNxF9j7j65xpUV
                            MD5:9AA2C7DEAF5B8DBED62A60F723553858
                            SHA1:6BFE53D07A3970523DC8C796EE24F392D2686BF7
                            SHA-256:28D0E73EE5616C2A76829A0A430F465B598987B4798F6BA46234393E40167BA9
                            SHA-512:AF2C404702563143B3ED6FC26C45D4E1CBB074F006420FF04F963C1F13783CA141C13D08918AFA9537A2DAABABC631C18DBB6562BC50AA3CB49294CCD00714F3
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......UBq..#...#...#...?...#..^....#..'....#.......#..Rich.#..........PE..L...Y..J...........!.........@......(........................................@......"J..........................................(.......D....................0..............................................X... .......(............................text............................... ..`.data...H...........................@....rsrc...D........ ..................@..@.reloc.......0.......0..............@..B2..H............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):917504
                            Entropy (8bit):7.835247620836694
                            Encrypted:false
                            SSDEEP:24576:foVuryMKftmxBFAsBnnJO16noCKPxKnp:gVoyMKftoYsFnI1DRPU
                            MD5:6E5F4B906BD48CB77E3830F2871F726E
                            SHA1:7C070D83CAD9F33D4A9EC01CDE9E0BB3AFE51409
                            SHA-256:6DD53DECDE4A70E8B42657FAE088C22C07D8553E59506524ABA608BA087066F1
                            SHA-512:616B153C677FE7F403D179664E24AD5FCD6041237A9A2A9FC4CA0A2C8B0050E74AA953E7349EC23780485D7D4984AA5072A8CCA26CDF9BC8439981424CC46C32
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....).W..................... ........... ........@.. .......................@............@.................................X...J............................ ....................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):61440
                            Entropy (8bit):5.191530389320213
                            Encrypted:false
                            SSDEEP:768:idEKqzhqGRvl2ZTDATBSNdCskYW50dstrF/vmifdXJNs7GGSZhRhudUrvf:idErzhqGNl2dATskYgLhfhC2vf
                            MD5:2B3281E100D19123A8E307FBB2DB0939
                            SHA1:501376281A00B9B9A90BE2F7DACA3DB87C96DCC0
                            SHA-256:24C362E5E8819F46C23DF1D2C36C5343D088293AF4178D9ED8B966296F0BB43E
                            SHA-512:3ACB639C1C0AAB53EE9FDCB3E5F9C3767F70536858D96EBEE7841567C7C1C130F5D8DFB6FF6F491B17A56B3D579C2545E8909B3C2EB5D6D5947FEA1D6C15045A
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....q.?...........!......... ........... ........... ....................... ......"...........................................S.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1316
                            Entropy (8bit):4.824855858394781
                            Encrypted:false
                            SSDEEP:24:cPN97KgwMV+nCGgMSqX+nH1WqBN3kmugmC4mA0snxs5XFF:cPr7/wdCGgXHH1Wqfi5mA0sxsvF
                            MD5:83B25C1067C9BE0BCDF289BBED80D363
                            SHA1:25FABE1F042D90F5678C3F97FCA6260BF27619D5
                            SHA-256:1AB2F18023EE11A92E4A3D5D7F5A9FB9A8ED8D69D93D8D804CCCEB1E431A2442
                            SHA-512:FCA4C27E0FDEAD9537694168AEA7DF3F2A05FB8E05F3EA8ECC6241E8A16A801532C9F71C777AC16528747D2160B1C9B5898CB5B8AF6C751509BE296F0CF280C0
                            Malicious:false
                            Preview:.<configuration>...<configSections>....<section name="log4net" type="System.Configuration.IgnoreSectionHandler" />...</configSections>...<runtime>...</runtime>...<log4net>....<appender name="TraceAppender" type="log4net.Appender.TraceAppender">.....<layout type="log4net.Layout.PatternLayout">......<conversionPattern value="%date [%thread] %-5level- %message%newline" />.....</layout>....</appender>.. .. <appender name="RollingFileAppender" type="log4net.Appender.RollingFileAppender">.. <file value="TDServiceLog.txt" />.. <appendToFile value="true" />.. <rollingStyle value="Size" />.. <maxSizeRollBackups value="10" />.. <maximumFileSize value="100KB" />.. <staticLogFileName value="true" />.. <threshold value="INFO"/>.. <lockingModel type="log4net.Appender.FileAppender+MinimalLock" />.. <layout type="log4net.Layout.PatternLayout">.. <conversionPattern value="%
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                            Category:dropped
                            Size (bytes):124688
                            Entropy (8bit):5.941729779329973
                            Encrypted:false
                            SSDEEP:3072:9PdIuG8UvahsdcYX3UI2EuJ3im/ZCdady+RlTp/VYq63+sB:9PBUyhsdEI2++M+RlTHYL
                            MD5:E8A2190A9E8EE5E5D2E0B599BBF9DDA6
                            SHA1:4E97BF9519C83835DA9DB309E61EC87DDF165167
                            SHA-256:80AB0B86DE58A657956B2A293BD9957F78E37E7383C86D6CD142208C153B6311
                            SHA-512:57F8473EEDAF7E8AAD3B5BCBB16D373FD6AAEC290C3230033FC50B5EC220E93520B8915C936E758BB19107429A49965516425350E012F8DB0DE6D4F6226B42EE
                            Malicious:false
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...].:@...........#......................... .....".................................W...............................i...............0...f...........................................................................................................text............................... ..`.data...P.... ....... ..............@....rsrc....g...0...p...0..............@....reloc........... ..................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):18285
                            Entropy (8bit):3.2625513904435572
                            Encrypted:false
                            SSDEEP:384:Lgxt0XdZ+3rWJr1N684b86fZMaTx111m+0:QiM3Q13A6aN111c
                            MD5:1EBA2DF49DE0B85065585C6042C0770B
                            SHA1:FE847BFA3FA1DC279BF7FDCB62BC27EFD4306B91
                            SHA-256:BD0732871DBEAEE6A3BD9D5D0C5E1A32CB3752A857D203857AE2A99780004232
                            SHA-512:17CA2455054057A486EA2D77439CFFCE4AFC4564E99219AAE7BB44DAE0511F552D8DC5C071A8FA01CDE208EE36EADD90600DE9976FC9CA31CE6310FDD448A005
                            Malicious:false
                            Preview:Remission..16.0,007.0,008.0,01.0,01.0,011.0,012.0,012.0,013.0,014.0,014.0,014.0,014.0,015.0,014.0,014.0,014.0,014.0,015.0,015.0,015.0,016.0,016.0,017.0,018.0,019.0,02.0,021.0,022.0,024.0,025.0,027..17.0,29.0,355.0,422.0,484.0,535.0,578.0,605.0,612.0,605.0,591.0,563.0,509.0,44.0,366.0,286.0,205.0,136.0,084.0,055.0,042.0,035.0,03.0,028.0,029.0,033.0,04.0,047.0,051.0,051.0,046.0,038..18.0,187.0,171.0,165.0,171.0,178.0,172.0,151.0,125.0,099.0,077.0,057.0,038.0,027.0,023.0,02.0,015.0,012.0,013.0,028.0,109.0,374.0,623.0,687.0,729.0,77.0,787.0,787.0,785.0,786.0,794.0,806..19.0,1.0,068.0,049.0,039.0,037.0,043.0,055.0,067.0,087.0,151.0,301.0,51.0,681.0,75.0,757.0,773.0,79.0,791.0,788.0,796.0,803.0,801.0,797.0,799.0,8.0,797.0,793.0,794.0,796.0,796.0,795..20.0,209.0,207.0,206.0,208.0,211.0,214.0,218.0,222.0,225.0,226.0,227.0,23.0,232.0,232.0,231.0,232.0,233.0,232.0,23.0,23.0,231.0,231.0,23.0,231.0,232.0,231.0,232.0,233.0,236.0,238.0,239..21.0,212.0,21.0,21.0,211.0,213.0,217.0,22.0,224.0,227.0,228
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Category:dropped
                            Size (bytes):1150976
                            Entropy (8bit):7.90148039825505
                            Encrypted:false
                            SSDEEP:24576:+tNmK9b6A+BUpJN/SP0lm8eSqY+5bPkT0WogLEVEGlim2Vy:+36AhJ9xeSwPKBGYn
                            MD5:F00223A56D3F89627CC88625DBCB0C42
                            SHA1:15489E487F43F77C812EF8EF07BB65171AFEB5BD
                            SHA-256:91DC55CA1A2A4B6206734C159B3C8ACC411F4B2A1BF7F208256A57B7DCBDC542
                            SHA-512:12F22018BC32A98C884447FE8E44BCC1868A5133B859CB91286548A24455BCC817FC030B6BC866E282727AE48D1C88B10894FD8C3CDA809716D49BEDAA81A866
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...@).W.................0...P......jK... ...`....@.. ....................................@................................. K..J....`...?........................................................................... ............... ..H............text...p+... ...0.................. ..`.rsrc....?...`...@...@..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):1448448
                            Entropy (8bit):6.68350408954223
                            Encrypted:false
                            SSDEEP:24576:KOG+2J9h3pr7waeMDJNGg/70Z6SVflSMBKS9uiNfGn83Zc5s/Z:Kp+QiaGN9SMcS95q83IgZ
                            MD5:18B85C5A139BAEAFD89C70B8C6561A52
                            SHA1:67033A74346E46C952CEE21EC1EE2C10CE8C5618
                            SHA-256:33B5F0AED0E886DDEAD2D412BF811920FBD17B162BA6272C4B28CC879F380DB8
                            SHA-512:2CC05FA8BB59B1B1CE24D25BDE62D85BEE273D4400EF9586ED2A2C513CD971CB52C9ADEDA8669CA257E2D8B8951D86C02D8E6506AE97BD85BA5AC45C4D724B2E
                            Malicious:true
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...R..V.................n.........................Q....................................................................O....P...?...p...\.........................................................................h[...............................text....X.......Z.................. ..`.itext.......p.......^.............. ..`.data....Q.......R...r..............@....bss....XT...............................idata...?...P...@..................@....didata.............................@....edata..O...........................@..@.rdata..............................@..@.reloc.............................@..B.rsrc....\...p...\..................@..@....................................@..@........................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                            Category:dropped
                            Size (bytes):74960
                            Entropy (8bit):6.080943948881524
                            Encrypted:false
                            SSDEEP:1536:3TlRSuxQYyqUB9XzWqxGHVcIIX5ZDBZGscEvWlExtJl966CX6q0uE:FfUB9XamGHpw5ZDXXPOixtJz3CX6qQ
                            MD5:81E5C8596A7E4E98117F5C5143293020
                            SHA1:45B7FE0989E2DF1B4DFD227F8F3B73B6B7DF9081
                            SHA-256:7D126ED85DF9705EC4F38BD52A73B621CF64DD87A3E8F9429A569F3F82F74004
                            SHA-512:05B1E9EEF13F7C140EB21F6DCB705EE3AAAFABE94857AA86252AFA4844DE231815078A72E63D43725F6074AA5FEFE765FEB93A6B9CD510EE067291526BB95EC6
                            Malicious:false
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...~c.3...."......#.................3.............p................................g....................................................%.......................... ...8............................................................................text....................... ....... ..`.data...............................@....rsrc....%.......&..................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:MS-DOS executable, NE for MS Windows 3.x (DLL or font)
                            Category:dropped
                            Size (bytes):2272
                            Entropy (8bit):5.626412274243338
                            Encrypted:false
                            SSDEEP:48:iuB0q8Z8LCQZ5U45owLkq10Ju1pwZbQP+DWmnDypKGDsQVG:NB0q7L35S22u1pwZC+ymnDmKGDsv
                            MD5:7210D5407A2D2F52E851604666403024
                            SHA1:242FDE2A7C6A3EFF245F06813A2E1BDCAA9F16D9
                            SHA-256:337D2FB5252FC532B7BF67476B5979D158CA2AC589E49C6810E2E1AFEBE296AF
                            SHA-512:1755A26FA018429AEA00EBCC786BB41B0D6C4D26D56CD3B88D886B0C0773D863094797334E72D770635ED29B98D4C8C7F0EC717A23A22ADEF705A1CCF46B3F68
                            Malicious:false
                            Preview:MZR.....................@...............................................!..L.!This program requires Microsoft Windows...$.......NE.<............................1.@.P.|.....M.............R.......r.P.r.`.r.q.r...........l...0...............p...0..........W95INF16...WEP...DLLENTRYPOINT...........KERNEL.USER.SETUPX....?.z...?.....?.!...INF Installation Library...W95THK_THUNKDATA16.....................................................................EU...WQ.V..j.j.Q......j....f..]M.EU....f..]M....2...v.2...6...:.XZh..h..h>.hV..RP.....w95thk_ThunkData32..U..F..p........U...h ..h...v.f.v..@.I.=....@.........V.^.&....f.v..F..P.........t....M.v...6L...6X......Ph...........u.....P..6d........t..v.......j....F..^.&..3.^.........WV.v..v.V......N.....N.;.v.QVQP........&.?\t..F.&..\G.^.&.? t.......F&.< t..v.W.V.....^_........WV..C.......f....3.........F..F.f.v..F..P............j......P.......u......P.......t..F...j.f.v......3.....~....f.~..u..F......F...3..F.F.F.f+.f.N.f.N.h..h...N..Q......
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):4608
                            Entropy (8bit):2.9774207313950316
                            Encrypted:false
                            SSDEEP:48:6Z3Mi+h0U47yaE6akf1WbvgFfSBZW3IezfXNFk5WgF:VEyaVaVv+aPWJXNyWg
                            MD5:4BE7661C89897EAA9B28DAE290C3922F
                            SHA1:4C9D25195093FEA7C139167F0C5A40E13F3000F2
                            SHA-256:E5E9F7C8DBD47134815E155ED1C7B261805EDA6FDDEA6FA4EA78E0E4FB4F7FB5
                            SHA-512:2035B0D35A5B72F5EA5D5D0D959E8C36FC7AC37DEF40FA8653C45A49434CBE5E1C73AAF144CBFBEFC5F832E362B63D00FC3157CA8A1627C3C1494C13A308FC7F
                            Malicious:false
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....=2...........!......................... .....p.........................p...................................... .......@..<....P.......................`..0...................................................d@..(............................text............................... ..`.rdata....... ......................@..@.data........0......................@....idata..@....@......................@....rsrc........P......................@....reloc..\....`......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                            Category:dropped
                            Size (bytes):147728
                            Entropy (8bit):5.909287934496192
                            Encrypted:false
                            SSDEEP:3072:h+qD1Cd/Oa5kXFlqkFGr3CAP7LCyInPEggen5Ez:hlCd/OaaFEjCAPKyOE6na
                            MD5:C89E401800DE62E5702E085D898EED20
                            SHA1:72FB4F088C6AC02097B55FB267C76FBF5E0FA1F7
                            SHA-256:DE83C9D9203050B40C098E4143EF8F577AA90016C7A64D4F2931B57A4C43E566
                            SHA-512:70006D70DCB47361FF43E4F7C458655AD2474B70CB917873AA77D2CC06465A68D375D36C494D154A03DBBFF891DF7DD6CAB3D2C7B08E8650B9FF170E30838070
                            Malicious:false
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............ru..ru..ru..mf..ru..ru..su.Rich.ru.........................PE..L....!.6...........#..................... ........<e.........................`... ..^q..................................n.......d....0.......................@..0...P!............................................... ..L............................text...n.... ....... .............. ..`.data....d.......P..................@....rsrc........0......................@..@.reloc..v....@... ... ..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                            Category:dropped
                            Size (bytes):22288
                            Entropy (8bit):4.814478820147639
                            Encrypted:false
                            SSDEEP:384:23Fob3slaN3oF1fHICOoMzMv/QTIBjDVquODJXsUW7ftWs6:Yo7s28JnOxzMv/QsBjRqugXspd
                            MD5:3B180DA2B50B954A55FE37AFBA58D428
                            SHA1:C2A409311853AD4608418E790621F04155E55000
                            SHA-256:96D04CDFAF4F4D7B8722B139A15074975D4C244302F78034B7BE65DF1A92FD03
                            SHA-512:CF94AD749D91169078B8829288A2FC8DE86EC2FE83D89DC27D54D03C73C0DECA66B5D83ABBEAA1FF09D0ACAC4C4352BE6502945B5187ECDE952CBB08037D07E8
                            Malicious:false
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...rD.2....i......#.....2...................P.....w.................................................................?......*<..d....`.......................p..4...............................................X....................................text...#0.......2.......... V...... ..`.data........P.......B..............@....rsrc........`.......N..............@..@.reloc.......p.......R..............@..BkD.2(.....22...jD.2?....%.2J...........ole32.dll.KERNEL32.dll.USER32.dll.ADVAPI32.dll..........................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):1326592
                            Entropy (8bit):6.662178971692568
                            Encrypted:false
                            SSDEEP:24576:9JGBDZIKwoTaK/T/Tua+hWWfnElT/XhBiSwmK9lHcPJMgh:vqxaSzqUNBXhkSwQPi
                            MD5:AC12DEC48405495C2008858D243DA8BC
                            SHA1:0B6AD42CDE232A81B415481B772319FB1138C35E
                            SHA-256:AD45020E327C16F0A847C38A058E606A7738EA6D0DDAAF80439797CA95F5FD43
                            SHA-512:F6A381063DC321C85BD9FFECD524FCFA4EB968AA7644AB339F292B7037BE9C1FA997D2CAD382BE92848010AEEEA38209908B5FAE17CD0B261E0DBEFA38BF5F58
                            Malicious:true
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...R..V.....................t.....................Q....................................................................N.......\7.......Z..........................................................................,................................text...\........................... ..`.itext.............................. ..`.data....M.......N..................@....bss.....T...@...........................idata..\7.......8..................@....didata..............P..............@....edata..N............Z..............@..@.rdata...............\..............@..@.reloc...............^..............@..B.rsrc....Z.......Z..................@..@.....................>..............@..@........................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                            Category:dropped
                            Size (bytes):1386496
                            Entropy (8bit):6.507253562372704
                            Encrypted:false
                            SSDEEP:24576:jrWIEO0eDfcPOvCOpMEPJonhql5oHS+zh3JajtObuF+T+NUFRjUgIeX40sgdp:jrOuCQhJohq3oHrh3JajtObu2+NUF5Vd
                            MD5:F28EB5CBC3CA6D8C787F09F047D1F9C8
                            SHA1:70DB1FAC822974BC9B636A984BCC1DA2E67F8DE5
                            SHA-256:3EF32E0152CC3FA07C417E6AADF9EAD83A17B5FDEE73799044E1BD7564725D6E
                            SHA-512:84F811F75E9D5143898728D2109B349802A292D4EF2CCAE4B4421D20268A33C6DDEE9C70E8BDEB474A3AC70307B2554C00CE786CA1F446807610FA2717F3745F
                            Malicious:false
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....:@...........#.........v.....................f......................... .......N...............................0...Q..............L.................... .......................................................................................text.............................. ..`ENGINE.............................. ..`.data....n.......p..................@....rsrc...l...........................@..@.reloc....... ....... ..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                            Category:dropped
                            Size (bytes):598288
                            Entropy (8bit):6.644743270512807
                            Encrypted:false
                            SSDEEP:12288:HCKynQWKglDhrUtrvT/NInIk4NDXsR6lMlpGz:HGXqB8V6lMlMz
                            MD5:7B156D230278B8C914EF3F4169FEC1CC
                            SHA1:6B58E20B2538CB308091DA838710F6AAD933A301
                            SHA-256:BAEB2F7C1B8BE56738D34E1D1DDF8E0EEBD3A633215DC1575E14656BE38B939D
                            SHA-512:E4EC2BC714069E0A6B56D89B52AABAD92E5BA741DC6F26D2FC2D72AA9AD2EC465DEA523CCCD810331AB78B5FB8A1244B2B521303418EAD5BD6BE5A58B43794C5
                            Malicious:false
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ibW.-.9.-.9.-.9...7.(.9.{.*.,.9.-.9...9.Rich-.9.................PE..L....#.6...........#..... ...................p....4e......................... ......+................................6..%$.......................................g...................................................................................text............ ... .............. ..`.data....a...0...`...@..............@....rsrc...............................@..@.reloc...g.......p..................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                            Category:dropped
                            Size (bytes):164112
                            Entropy (8bit):5.8462943829831575
                            Encrypted:false
                            SSDEEP:3072:+VrhrwLXcA2Ha/joWklbo/Acjwm4AaW7zozn/zgOh0Z76:fklbsqmyWnoz/P
                            MD5:CE0155405EA902797E88B92A78443AEB
                            SHA1:8ADFF69050D14A57D7F553CA8978439AF188C192
                            SHA-256:789C3C45EDA1749BD939F4A96616E1E9EF1B7DCC62A2889F65088954C64D0938
                            SHA-512:3FDE09067F9CA8D315DE07C8DB972F99723EA4C3F997DC58210F9D6565CAA9935C79F13E8B2D20ADC5609919A381E4C2A90A0B3123A35947997229D7C615E162
                            Malicious:false
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......e.'r!.I!!.I!!.I!w.Z!*.I!!.I!\.I!Rich!.I!........PE..L....!.6...........#.................)... ........0_............................. ..>................................................0...3...................p...... #............................................... ...............................text...q.... ....... .............. ..`.data....X.......P..................@....rsrc....3...0...@... ..............@..@.reloc.......p... ...`..............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):17920
                            Entropy (8bit):4.083884450202126
                            Encrypted:false
                            SSDEEP:384:cogoEvM/uFrR+X6QNn1pcJIrWocDGWct:cogoEvM0rgqQNn3
                            MD5:1B02577F0ADDEA32EB02A50D4A4CDD1E
                            SHA1:36F701CCEC78A5D218FEA23FD05351890F14CF7D
                            SHA-256:6EA525BFACE5467C1045C3708F339A4B92A3A273F70656E061C7F7322C56D667
                            SHA-512:87FD4AA5158D09EB97B6131E651DB2A4761546907A960AF7792F8E95947C0A825E84F88ECCF42EC896FF5BB2BBC461488B898D5F1BD853847317493C44B330C9
                            Malicious:false
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......eU!.!4O.!4O.!4O.!4O. 4O.Rich!4O.................PE..L....!.6...........!.........D...............................................p...........................................................@...................`.......................................................................................rsrc....@.......B..................@..@.reloc.......`.......D..............@..B.............!.6............ .......8........!.6............P........!.6............h........!.6.....................!.6....................@:...........J................T.Y.P.E.L.I.B.MSFT................A...........*................................... ...................d.......,...........X....... ...........L...........x.......@...........l.......4...........`.......(...........T...................H...........t.......<...............h...........................................L...P.......
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:Generic INItialization configuration [DestinationDirs]
                            Category:dropped
                            Size (bytes):1069
                            Entropy (8bit):5.4959184158351215
                            Encrypted:false
                            SSDEEP:24:yuZq732XeLfX8IUy3k8exg5S3X8n2uNXVANXVMbNX9NXR/NXVuZZNXV0pT7:BJeL/8IhvFSn82CVoVMB/DViDV057
                            MD5:F8854BDCD55ECCF24F077981ADFE6B9A
                            SHA1:377FC226B1C10B244F1E32F6EA3A20B5D47D4777
                            SHA-256:E5A9050E93487A1D296CEEC10B95BE9F92EB877AA2913296B5C31B9F74F7C788
                            SHA-512:6331F337A1595D6F83281614E6A92AABA9D8B27FDA3B5CF4E85F1B49AC335E10F0F62CD147131D53C473B3ACC42BC27F2D02073F0CC60755CA10871EF2E7AC8E
                            Malicious:false
                            Preview:; INF file for Visual Basic 6.0 Run-time Redist Pack....[DefaultInstall]..CopyFiles=install.files..RegisterOCXs=RegisterFiles....[DestinationDirs]..install.files=11....[install.files]..OLEAUT32.DLL,,OLEAUT32.DLL,32;..OLEPRO32.DLL,,OLEPRO32.DLL,32;..ASYCFILT.DLL,,ASYCFILT.DLL,32;..STDOLE2.TLB,,STDOLE2.TLB,32;..MSVBVM60.DLL,,MSVBVM60.DLL,32;..COMCAT.DLL,,COMCAT.DLL,32;....[RegisterFiles]..%11%\OLEAUT32.DLL..%11%\OLEPRO32.DLL..%11%\MSVBVM60.DLL..%11%\COMCAT.DLL....[OLEAUT32.DLL]..file-win32-x86=thiscab..RegisterServer=Yes..FileVersion=2,40,4275,1....[OLEPRO32.DLL]..file-win32-x86=thiscab..RegisterServer=Yes..FileVersion=5,0,4275,1....[ASYCFILT.DLL]..file-win32-x86=thiscab..RegisterServer=No..FileVersion=2,40,4275,1....[STDOLE2.TLB]..file-win32-x86=thiscab..RegisterServer=No..FileVersion=2,40,4275,1....[MSVBVM60.DLL]..file-win32-x86=thiscab..RegisterServer=Yes..FileVersion=6,0,97,82....[COMCAT.DLL]..file-win32-x86=thiscab..RegisterServer=Yes..FileVersion=4,71,1460,1....[version]..signature
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Template: Intel;1033, Revision Number: {C39D0F65-909B-4DBD-A3E7-FF81A783B41B}, Number of Words: 0, Number of Pages: 200, Title: TECHKON Device Service, Subject: TECHKON Device Service Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0
                            Category:dropped
                            Size (bytes):766976
                            Entropy (8bit):6.307836502585046
                            Encrypted:false
                            SSDEEP:12288:HUbU4DBKXsbzeDSJoQ8guBoN2KA2wKc7wMz7:HcU4VE5BqPA2fc7wMz7
                            MD5:D471255784CC4AE28EA97447F67DA9F2
                            SHA1:AC46FC4DD17A2F6BACFD33015B695970AADBA875
                            SHA-256:A35926623E6DAEF708BD51436D547BEE6B15DCC6DDAE52A74FDC323F1F8ECD26
                            SHA-512:760C4ACDC725549002D59B432FC4A55D065E72D6909D7EF2D8468723A2BF419581F258A373161974133087546B97216044B6D222930077960323528211A90A59
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                            Process:C:\Users\user\Desktop\8ue90oYkrv.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):641845
                            Entropy (8bit):6.759953089731109
                            Encrypted:false
                            SSDEEP:12288:nmkzB+dtRRReCYRo38KLg/lIH4L4Y4pgSss:LoRRYu8KU/6YLg
                            MD5:AA00215FC4A6D307A143871D1C9904A6
                            SHA1:B8A3C08DE2FB1356965FE5EC5B53102303F84DB5
                            SHA-256:F2E0625F96D32063FADDDA808AF9A435D430707717529FD1EA6C96DEA1DE13CA
                            SHA-512:547C273300F87378F61E7FD93CE683D2DDF3B9886E735B66591FBEEA7B5953D6A8112C442F277A4E3CFE4A24995E437AA03CFB2F375CE8A035E168236B05775C
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......).n.m...m...m...d.......d...@...J.m.l...J.{.d...m.......d...y...d...%...d...l...s...l...d...l...Richm...........................PE..L....QkT...........!.................e.......0...............................0............@.........................`...........d....0...............................................................................0...............................text............................... ..`.rdata......0......................@..@.data....^......."..................@....rsrc........0......................@..@.reloc...C.......D..................@..B........................................................................................................................................................................................................................................................................................................
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):294
                            Entropy (8bit):5.21221799398743
                            Encrypted:false
                            SSDEEP:6:SpXr+pVSDDDLm+6WWq5vR7xXrlqt+TzTEQjM41wy:SpOSDC+Zb7eKTEsMXy
                            MD5:5E1B362822AF7B65CEADD04E17FE93DD
                            SHA1:E97136FF549A5EA648B53C852A6CF83D7B214CB8
                            SHA-256:3BA47D29D3B8810C479BD6D3D470FC400AA15AA35187BB1FA72C7E20E2573009
                            SHA-512:76A2D74395DA1EB6E2292B9CEB743718C9AA8BC03E0F88F7A250E281B5DBD4394429979B89BBD878822984B8C7B821667F2BC30BD833B0CBCA1B61DA23CD0F19
                            Malicious:false
                            Preview:MYAH-PREDEF-COMPONENT..TECHKON Device Service..$..TRUE..TRUE..$..$..$..$..MYAH-PREDEF-COMPONENT..11974355..TECHKON DEVICE SERVICE..1150976..$..C:\Program Files (x86)\\TECHKON GmbH\TECHKON Device Service SDK..TRUE....C:\PROGRA~3\{C39D0~1\..MYAH64WOW..x64..OVERRIDECACHE....NATIVE_ENGINE..FALSE..
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):5295078
                            Entropy (8bit):6.41595061147608
                            Encrypted:false
                            SSDEEP:98304:hSmaRfSnG5itjD4+j05p5Zxa8byNFzH2bP4PqyK13icjqsNTUjJF:hTaRZ8tjD4+wD5ZksyPHIFIF
                            MD5:A94A3D60FA8A54AB71ABED39D5883D86
                            SHA1:3FC14B383FD699017AA7B7281C28F143AEAF7B9F
                            SHA-256:3AC4616A5ABF9A408EDCCC48D15AB9DD6441DAD273C8F477C1EB291812949451
                            SHA-512:172CE336A3343D8ED92EDA525A549F1E388D37076F71DC28C043FABC94B04761B7E936871F203C2B681EB4BFCC8C239327656F51003CD46D11C94589B1E8CC13
                            Malicious:true
                            Yara Hits:
                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\{C39D0F65-909B-4DBD-A3E7-FF81A783B41B}\TDService.exe, Author: Joe Security
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......V..................8..N.......d8.......8...@...........................U..................@...........................0;..T....?.......................................................;......................?;.......;......................text...,.7.......7................. ..`.itext........8.......7............. ..`.data.........8.......8.............@....bss....t.....9.......9..................idata...T...0;..V....9.............@....didata.......;.......9.............@....tls....P.....;.......9..................rdata........;.......9.............@..@.reloc..@#....;.......9.............@..B.rsrc.........?.......9.............@..@..............U.......S.............@..@........................................................
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:Unicode text, UTF-8 text, with no line terminators
                            Category:dropped
                            Size (bytes):3
                            Entropy (8bit):1.584962500721156
                            Encrypted:false
                            SSDEEP:3:g:g
                            MD5:ECAA88F7FA0BF610A5A26CF545DCD3AA
                            SHA1:57218C316B6921E2CD61027A2387EDC31A2D9471
                            SHA-256:F1945CD6C19E56B3C1C78943EF5EC18116907A4CA1EFC40A57D48AB1DB7ADFC5
                            SHA-512:37C783B80B1D458B89E712C2DFE2777050EFF0AEFC9F6D8BEEDEE77807D9AEB2E27D14815CF4F0229B1D36C186BB5F2B5EF55E632B108CC41E9FB964C39B42A5
                            Malicious:false
                            Preview:.
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Template: Intel;1033, Revision Number: {C39D0F65-909B-4DBD-A3E7-FF81A783B41B}, Number of Words: 0, Number of Pages: 200, Title: TECHKON Device Service, Subject: TECHKON Device Service Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0
                            Category:dropped
                            Size (bytes):766976
                            Entropy (8bit):6.307836502585046
                            Encrypted:false
                            SSDEEP:12288:HUbU4DBKXsbzeDSJoQ8guBoN2KA2wKc7wMz7:HcU4VE5BqPA2fc7wMz7
                            MD5:D471255784CC4AE28EA97447F67DA9F2
                            SHA1:AC46FC4DD17A2F6BACFD33015B695970AADBA875
                            SHA-256:A35926623E6DAEF708BD51436D547BEE6B15DCC6DDAE52A74FDC323F1F8ECD26
                            SHA-512:760C4ACDC725549002D59B432FC4A55D065E72D6909D7EF2D8468723A2BF419581F258A373161974133087546B97216044B6D222930077960323528211A90A59
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):2338
                            Entropy (8bit):5.357798355644986
                            Encrypted:false
                            SSDEEP:48:n52QnlauJANzvc+/zM2WTZowX6U4WqARxCmlyqGkcz8wV30/33Bs+:PZhJwVUBH
                            MD5:E7433271C48AC5C443718ECC8CC5C8D6
                            SHA1:963F524D432FCCEA6D1A0F263C3FA71BF12D41C4
                            SHA-256:41490736C33D4CD6F25F7958C8274B6FDE22B6AE52C4F6AAA5884B45D8E52BA0
                            SHA-512:B925D0FA81ED211D7EF5247A770A7F4DAAD2A1AF1505484AC3946D3C6B1342688643A6E138E5E8D891E2785518DB33E5DFB1B16FEC6A02C7B9C7A967C9CAF2BC
                            Malicious:false
                            Preview:.AEDD97940..FALSE..A3CE6DECE..FALSE..A34E6DE3C..FALSE..A25D64044..FALSE..A3476C065..FALSE..A8135F827..FALSE..A8808A0B2..FALSE..ACC3273D..FALSE..AA913E6AF..FALSE..ACECD985D..FALSE..AC5D9D236..FALSE..A1A2661C4..FALSE..AC64028C1..FALSE..A3CEB12CD..FALSE..A1872974D..FALSE..AD4D85249..FALSE..AEACB8D8..FALSE..A7C4CDFEC..FALSE..A95FFAA1..FALSE..AF0FC8706..FALSE..AD7FB24C5..FALSE..A86D611ED..FALSE..AEDD97940..TRUE..PEDD97940_1..C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK..A3CE6DECE..TRUE..P3CE6DECE_1..C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK..A34E6DE3C..TRUE..P34E6DE3C_1..C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK..A25D64044..TRUE..P25D64044_1..C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK..A3476C065..TRUE..P3476C065_1..C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK..A8135F827..TRUE..P8135F827_1..C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK..A8808A0B2..TRUE..P8808A0B2_1..C:\Program
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:7-zip archive data, version 0.3
                            Category:dropped
                            Size (bytes):3831837
                            Entropy (8bit):6.288047394335939
                            Encrypted:false
                            SSDEEP:49152:zXlXDzXmLXrXxXzX4XOXWXmOX+rXAEJD2d8hMcSCnmNPIkFVZ+cocaFjhkSYKPM:xw4BF3ai
                            MD5:3EA26D5D84024858345551BDD209F62A
                            SHA1:DE89AEAB1CBE1328B0CDB7C17BE2B43BEA076E30
                            SHA-256:E58F0C20DFFBB1299D972CC7C3556DDDDE8D6888570FEEF208E48EAD68877149
                            SHA-512:5E8F2CCA528F77CC624FD17228D796E3921008A9D73511793E33FE6F4B94463D5304A969A4F18DD0BCDD2C5B0663861570E861DAC58355EF641860BB071AE607
                            Malicious:false
                            Preview:7z..'.......'p:...............M...TFRMDESIGN.0.[...TPF0.TfrmDesign.frmDesign.Left....Top...HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):104
                            Entropy (8bit):4.763214906845461
                            Encrypted:false
                            SSDEEP:3:fCSpmrc5Pk+T0kcAwS+h2h2MxB:rsc5Pk+r0grH
                            MD5:36487EC6BBA7512EFC29BEFC31D9C8E0
                            SHA1:BBC7D906BFEC90E60D3ED2768FD3DBF1E23A831C
                            SHA-256:96DA35BCA6739A48B794F7A93643A4B449F1BDBD0A4506B2CEE752ACF351DF15
                            SHA-512:044444B2237DEE8C9CBFB966F9C3EEEBB6FBD0D86643E692E0686A0254919218DB4277A50EF251A26D112286CF64A21685191052B1C31CE03186EF25CB30AC0B
                            Malicious:false
                            Preview:{CD1E6019-47AE-4334-A91E-595BA68B6E06}..{C39D0F65-909B-4DBD-A3E7-FF81A783B41B}..TECHKON Device Service..
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):641845
                            Entropy (8bit):6.759953089731109
                            Encrypted:false
                            SSDEEP:12288:nmkzB+dtRRReCYRo38KLg/lIH4L4Y4pgSss:LoRRYu8KU/6YLg
                            MD5:AA00215FC4A6D307A143871D1C9904A6
                            SHA1:B8A3C08DE2FB1356965FE5EC5B53102303F84DB5
                            SHA-256:F2E0625F96D32063FADDDA808AF9A435D430707717529FD1EA6C96DEA1DE13CA
                            SHA-512:547C273300F87378F61E7FD93CE683D2DDF3B9886E735B66591FBEEA7B5953D6A8112C442F277A4E3CFE4A24995E437AA03CFB2F375CE8A035E168236B05775C
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......).n.m...m...m...d.......d...@...J.m.l...J.{.d...m.......d...y...d...%...d...l...s...l...d...l...Richm...........................PE..L....QkT...........!.................e.......0...............................0............@.........................`...........d....0...............................................................................0...............................text............................... ..`.rdata......0......................@..@.data....^......."..................@....rsrc........0......................@..@.reloc...C.......D..................@..B........................................................................................................................................................................................................................................................................................................
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):266
                            Entropy (8bit):5.172580566169641
                            Encrypted:false
                            SSDEEP:6:SpU7SDwVs6ZU9xXiaQoOXtCBnTzTEQjM41wy:SpU7SDXo6UoOd8fTEsMXy
                            MD5:78A3F93BD0082F553E5B911C0DF9A218
                            SHA1:C435D901BF62921AE6FA320616909CC7EA59A0E4
                            SHA-256:B40D65735A6D1D806908ED541F1701C7AD59A9264E0C1081FAAF40635F9024FB
                            SHA-512:9C48437D2270962228A0DE928E36E3D4829A932153AC7CF74E2A98895F97FB1E3C884FBF3D49EEE4DDADDEEC3004283E34152527F65B5EA814D3C943D41D395E
                            Malicious:false
                            Preview:MYAH-PREDEF-COMPONENT..TechkonDriver64Bit..$..TRUE..TRUE..$..$..$..$..MYAH-PREDEF-COMPONENT..531006..TECHKONDRIVER64BIT..0..$..C:\Program Files\\TECHKON GmbH\TECHKON Driver 64Bit..TRUE....C:\PROGRA~3\{CDCC2~1\..MYAH64WOW..x64..OVERRIDECACHE....NATIVE_ENGINE..FALSE..
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):5299123
                            Entropy (8bit):6.417889890443472
                            Encrypted:false
                            SSDEEP:98304:hSmaRfSnG5itjD4+j05p5Zxa8byNFzH2bP4PqyK13icjqsNTUjJk:hTaRZ8tjD4+wD5ZksyPHIFIk
                            MD5:5A3DA2206BD35C381B826FF748093684
                            SHA1:AE5A7D9CEB4324BCE26B6E2ED7C1FE18DEAF917E
                            SHA-256:E94B30CF6F7FA8F30EB21B5A4B3316B5F005321C31A2139095882450D8BF8C78
                            SHA-512:DBA818B5E442EA797E4F20F313C2196BA366DE82784968A1F2F29C8F3AAEE5BC09B7B9CC33A959C0E2507F31517E32D48C118CDE5119A741C5378DCF29856801
                            Malicious:true
                            Yara Hits:
                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\TechkonDriver64Bit.exe, Author: Joe Security
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......V..................8..N.......d8.......8...@...........................U..................@...........................0;..T....?.......................................................;......................?;.......;......................text...,.7.......7................. ..`.itext........8.......7............. ..`.data.........8.......8.............@....bss....t.....9.......9..................idata...T...0;..V....9.............@....didata.......;.......9.............@....tls....P.....;.......9..................rdata........;.......9.............@..@.reloc..@#....;.......9.............@..B.rsrc.........?.......9.............@..@..............U.......S.............@..@........................................................
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:Unicode text, UTF-8 text, with no line terminators
                            Category:dropped
                            Size (bytes):3
                            Entropy (8bit):1.584962500721156
                            Encrypted:false
                            SSDEEP:3:g:g
                            MD5:ECAA88F7FA0BF610A5A26CF545DCD3AA
                            SHA1:57218C316B6921E2CD61027A2387EDC31A2D9471
                            SHA-256:F1945CD6C19E56B3C1C78943EF5EC18116907A4CA1EFC40A57D48AB1DB7ADFC5
                            SHA-512:37C783B80B1D458B89E712C2DFE2777050EFF0AEFC9F6D8BEEDEE77807D9AEB2E27D14815CF4F0229B1D36C186BB5F2B5EF55E632B108CC41E9FB964C39B42A5
                            Malicious:false
                            Preview:.
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.0, MSI Installer, Code page: 1252, Template: Intel;1033, Revision Number: {CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}, Number of Words: 0, Number of Pages: 200, Title: TechkonDriver64Bit, Subject: Techkon USB-Driver 64Bit Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0
                            Category:dropped
                            Size (bytes):770048
                            Entropy (8bit):6.313135922265424
                            Encrypted:false
                            SSDEEP:12288:DRU4nBKXsbzqDSJDQ8guBoN2KA2wKc7wMz7:DRU4BF5BqPA2fc7wMz7
                            MD5:6957CC6E903D183839C08109EDE46105
                            SHA1:9B97658AE2F1452D4A61C69BC2E303A7D36DC4D4
                            SHA-256:51BDA45008F6A3D616E94FDA63849A6E766B5509E1E5259EA8359A2466A5F2BA
                            SHA-512:2CD1018AA29FD898CCACE29582AE84A6291E991C74848939EB05F3B6B11BEC54ED16DAB8C95F648205C8FEF583DFB25E93D8CA6D4AB3A618A84ADB7E27D3FB16
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):4020
                            Entropy (8bit):5.369966676914094
                            Encrypted:false
                            SSDEEP:96:7lpWBZ9pJNvlVPgXPaPsqJziqWq2FmGihH1c8ABhBdFFP5iqcXTUrXzgO:7lpWBZ9pJNvlVUSkyiPzwGihH1c8ABhX
                            MD5:238D1E9B674FCD0B8A77A928DFF29C22
                            SHA1:50E3E75DD2B48E8E1B8270B609BEFA2F233DBD3F
                            SHA-256:BFFEF270E9609F75876B38AA6E7F7AF8DB2BD4935791477ADD6C034EE990AEF2
                            SHA-512:96CC49664A0A4C3D9417EDB3DC9B3B469B11D4E434D2D837028AFCECD996E6ADA3C02E72B74807691256FEDBD0BC509827EBB25CA0B69B7EDCD9F2324A98AC35
                            Malicious:false
                            Preview:.A76FCA102..FALSE..A150AC403..FALSE..A1ABF3862..FALSE..A502E833A..FALSE..ACE56FB43..FALSE..A52B152B3..FALSE..AC0AC9330..FALSE..AE09F5A5F..FALSE..AF2F92670..FALSE..A94312164..FALSE..A5809A5D8..FALSE..A56A7DD7A..FALSE..A1A9DA512..FALSE..A84FEA59D..FALSE..A849003A2..FALSE..A98500B5D..FALSE..A4F27760E..FALSE..A4D56F533..FALSE..A7AA455DC..FALSE..AE1318D92..FALSE..A66980B9F..FALSE..A9167C40A..FALSE..A15F69ECD..FALSE..AB06B5044..FALSE..A66E41FEB..FALSE..A9E7D6EA9..FALSE..AB258770..FALSE..AB5CD4D0..FALSE..A537BC2C1..FALSE..A5D1665DA..FALSE..A6EB99A04..FALSE..AF5C9AD93..FALSE..A21D6E643..FALSE..A63D6488F..FALSE..AF835DFEA..FALSE..A9115C352..FALSE..A76FCA102..TRUE..P76FCA102_1..C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens..A150AC403..TRUE..P150AC403_1..C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens..A1ABF3862..TRUE..P1ABF3862_1..C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens..A502E833A..TRUE..P502E833A_1..C:\Program Files\TECHKON GmbH\TECHKON D
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:7-zip archive data, version 0.3
                            Category:dropped
                            Size (bytes):3821599
                            Entropy (8bit):6.2872927335703555
                            Encrypted:false
                            SSDEEP:49152:YXlXDzXmLXrXxXzX4XOXWXmOX+rX14rFRMSigFEkEi24EJD2d8hMcSCnmNPIkFVT:cTE94w4BF5
                            MD5:839619AB3C498F9119516797217ECE8B
                            SHA1:83593C1247452E23F900E2F383B80FCE222E77D5
                            SHA-256:C0BA92E82179F99A6CBAE6B26E2CF94DA86D9C2A89FC71552484150D4FB1A237
                            SHA-512:8947009EE28BD4A8D6C2BEE4B03474A981A28C789021B31C6B3010FD0727180F16D7FE95F35DE13A533CA56953DE37CC088F496FA82CD4FA0371B9D422C79816
                            Malicious:false
                            Preview:7z..'...P=".'H:..............oB....TFRMDESIGN.0.[...TPF0.TfrmDesign.frmDesign.Left....Top...HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):109
                            Entropy (8bit):4.682207123816963
                            Encrypted:false
                            SSDEEP:3:P1UckThRSnhZTYIT9ovtndNpnCmiTQeVnh2MjzXFTBQov:9UckTynVT9ovtndfCmi8eVhr3fQov
                            MD5:6F37D4EFB813C85449B22D66C053DE6B
                            SHA1:DDE70506FB522175DF612A6ADDF04E0009B30FAD
                            SHA-256:3687950173500CEF8D7F3EB691FEE0F08866C463E4434282C8DD2A36EDC4A7C2
                            SHA-512:5205A6BD0496FFBD307E9D49254D23E71D8C04C04F16A4E57AF708B826306AEFFFA999113D5A1FAFCAEA444C56D33ADAFF994337E6FE0D487C42EDBC289615B9
                            Malicious:false
                            Preview:{55EA8940-B618-47BD-A642-20BFB2A64F78}..{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}..TECHKON Device Driver 64Bit..
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):641845
                            Entropy (8bit):6.759953089731109
                            Encrypted:false
                            SSDEEP:12288:nmkzB+dtRRReCYRo38KLg/lIH4L4Y4pgSss:LoRRYu8KU/6YLg
                            MD5:AA00215FC4A6D307A143871D1C9904A6
                            SHA1:B8A3C08DE2FB1356965FE5EC5B53102303F84DB5
                            SHA-256:F2E0625F96D32063FADDDA808AF9A435D430707717529FD1EA6C96DEA1DE13CA
                            SHA-512:547C273300F87378F61E7FD93CE683D2DDF3B9886E735B66591FBEEA7B5953D6A8112C442F277A4E3CFE4A24995E437AA03CFB2F375CE8A035E168236B05775C
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......).n.m...m...m...d.......d...@...J.m.l...J.{.d...m.......d...y...d...%...d...l...s...l...d...l...Richm...........................PE..L....QkT...........!.................e.......0...............................0............@.........................`...........d....0...............................................................................0...............................text............................... ..`.rdata......0......................@..@.data....^......."..................@....rsrc........0......................@..@.reloc...C.......D..................@..B........................................................................................................................................................................................................................................................................................................
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):174080
                            Entropy (8bit):6.279217790646268
                            Encrypted:false
                            SSDEEP:3072:xyljBP/VZjAISqyTFjoZAO1h7BTF1rJa//diUTTBXJxO8hlIhb0:xeBnVZ8w4toZAcLrJa/liSVHU
                            MD5:31CAD6A3EDD1C32981AD6B565CBEAC94
                            SHA1:9338978C85A9423EE2A38CBA027F79192D684F1B
                            SHA-256:B8521ABDA09EC17DDAD36528C1BC50395DC8C5F7C11C026A5B3FF23110C54182
                            SHA-512:02E198B8EF192DE55DB35AE00A16A80B3309A9373A596C20D617B43DD7159A635BC303F371859E704375521A1242D02754807E2E9DFEF63FFD06993B24C17D3D
                            Malicious:false
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......D..P....................6...>..............._...........6...P...o.^.....o.j....................Rich............................PE..L....S.L...........!........................................................@.......................................@.......9..P...............................@.......................................................,............................text............................... ..`.rdata...@.......B..................@..@.data.......P...4...4..............@....sxdata..............h..............@....rsrc................j..............@..@.reloc...%.......&..................@..B................................................................................................................................................................................................................................................................
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:Unicode text, UTF-8 text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):197429
                            Entropy (8bit):5.976046888177846
                            Encrypted:false
                            SSDEEP:3072:VZ2NCsffL4WCb+gS5MJBdpzMObFz7m/RktZtUEEgny32rf:/4L4YCBdpzMAFe/oZtUYny3i
                            MD5:B87AFAA4E8FE37C2878E240D7E5B74C4
                            SHA1:BD4996CD4CC682E9DC8966BE8D697C91F46FABD7
                            SHA-256:077898C146E917107BDB281F4E21C380C5E6B18E9B2213FBDE8FE5FD086336AE
                            SHA-512:1EDC62AB821DDDA0EA312CFE4D79F908E3AD6B28C87C903CD956EC9A12E6F62010380A1C0801601185A30D24F9897D81A37A14BD4891E303691DCED2A50F7D1B
                            Malicious:false
                            Preview:Please install the common controls update from Microsoft before attempting to install this product...Setup resource not found..Setup resource decompression failure..Setup database not found..Runtime error in install: ..bytes..KB..MB..Attempting to get value of undefined variable ..Attempting to set value of undefined variable ..Copying: ..Unable to copy installation data to local folders..Downloading Web Media: ..Unable to download installation data from the web..Extracting Web Media: ..Unable to extract installation data downloaded from the web..Please locate your original setup sources to continue operation..Original setup sources required to complete operation, sources not found..General setup failure..Runtime error in setup script:..% complete..bytes received..InstallAware Wizard..InstallAware is preparing the InstallAware Wizard which will install this application. Please wait...Retry Download?..Downloading of installation data from the web has failed. Would you like to try again?
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (343), with CRLF line terminators
                            Category:dropped
                            Size (bytes):71603
                            Entropy (8bit):5.523940105836007
                            Encrypted:false
                            SSDEEP:1536:ewNhtmrNAKe1J4eFiLIidSxfuisTJIHvxDZN7kAblAFKqZLYjz1:Vtm572J4egLI4wIZYjZ
                            MD5:6614F2128AFB570A9EB3BFBAC47340AB
                            SHA1:99356886CF9A2EB83492EED2D1C7F7190353BDDB
                            SHA-256:645F8C9588263BB3B0A5BA31A1705EF8931B2247EF6113C2F18F375B67DE94F8
                            SHA-512:680B81C9BC89392B4068466AF9CA1C7053DFF548FF34BEEDDDC97A80C324DA696DC955EE6412073FDDE4442031C82DDEE6DAE2A0AAD140877D44941024C446FC
                            Malicious:false
                            Preview:.Comment..Comment..Code Folding Region..Get System Settings..If..MessageBox..Terminate Install..End..Set 64 Bit Mode..Code Folding Region..Comment..Code Folding Region..Comment..Code Folding Region..Comment..Set Variable..Set Variable..Comment..If..Set Variable..Set Variable..End..Comment..Code Folding Region..Comment..Code Folding Region..Comment..If..Comment..If..Terminate Install..End..Comment..Comment..If..Set Variable..Set Variable..(Un)Install MSI Setup..If..MessageBox..Terminate Install..End..If..MessageBox..If..Reboot and Resume..Else..Terminate Install..End..End..Set Variable..End..Comment..Hide Dialog..End..Code Folding Region..Comment..Code Folding Region..Comment..Code Folding Region..Comment..Define Component..Comment..Comment..Get System Settings..Get Folder Location..Get Folder Location..Get Folder Location..Get Folder Location..If..Set Variable..End..Get Folder Location..Get Folder Location..Get Folder Location..Get Folder Location..Get Folder Location..Code Folding R
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Revision Number: {C39D0F65-909B-4DBD-A3E7-FF81A783B41B}, Number of Pages: 200, Title: TECHKON Device Service, Subject: TECHKON Device Service Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0, Template: x64;1033, Number of Words: 8
                            Category:dropped
                            Size (bytes):767488
                            Entropy (8bit):6.309158560991388
                            Encrypted:false
                            SSDEEP:12288:tZTHM43BKXsbzeDSJfQ8guBoN2KA2wKc7wMz7:tFM4Rx5BqPA2fc7wMz7
                            MD5:BB476839A65AB03B7419B1285080C884
                            SHA1:9321332A351363696DF3F12FB8FDC602043CAA95
                            SHA-256:FF54C9A79D8DBB85E232B5E9A5C3C8F5AE32558B65CDE7935084A4E705BB21D4
                            SHA-512:9BF03E54FCBAF7FF7031155C16B59BF5AF039D3145AFEBAE7036A93552CA3621A40FDE80207F787D599C74AD366D5A116F50DE5374700658C8DFE85E6E8C3792
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):32879
                            Entropy (8bit):3.303772475257304
                            Encrypted:false
                            SSDEEP:768:VDHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfwE:VDXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DA
                            MD5:7ABD6BD2B201E76EA624B72EC854E178
                            SHA1:B74ECA13809A2439B0A8B769328247EED6ECA6CC
                            SHA-256:B7E2337DDFE813C051D10B5CBBBBDC7FCD0EEF4B5B2621C3A77D6B91743C0F4D
                            SHA-512:66AF2C8901D8B421C1BC1265CBC8495E19C2346BF8B97D280079E1200578D450B6DEA570B712D350D5BE0A8B88A2615BE4075008D85CCA3CCF5D28A4D9194A9E
                            Malicious:false
                            Preview:...TFRMDESIGN.0.[...TPF0.TfrmDesign.frmDesign.Left....Top...HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o...
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):32756
                            Entropy (8bit):3.2836876237576345
                            Encrypted:false
                            SSDEEP:768:XyHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibfn:X6XQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DU
                            MD5:BF3263127CD771470559490ADB76647B
                            SHA1:8971CB4959D1BCA4A0EC48F3186309B00E16261B
                            SHA-256:4811574E264AEB0927806A9A953CEA2A903ED18C36A34A10B67E40B99CA1670F
                            SHA-512:9AF82B1F3EB3E735E2434BA803C1FC6D13BC1866A73D9F0FF466A23A5761291DD00A6C0D57BD24CE6CC2DCD0ACC16E863A2F30A41FC4BBBD041578F85AF6AD27
                            Malicious:false
                            Preview:...TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):161047
                            Entropy (8bit):1.9896602276153565
                            Encrypted:false
                            SSDEEP:192:E3Rfzvu9vJSm3IZ8Zgspkk4B9heXItzNGzOiOWEpap5PKo6Mmp4CWNux1uAw1Dmi:EtI/gWf
                            MD5:5F7AE8AAAC7F8E1E811BE95B187ABB10
                            SHA1:C34C69B5AE6B4B2EFAE3236C386F2B0388F815A8
                            SHA-256:984A34337FC921BCCBA721B8361D3806459D2F37CBF117F5CC35D6BD0D6FEF6D
                            SHA-512:0A6F8E499686102AD85DD411958B3417A4E758FAC61A1D883420490AABDEF0F6CECED358997F83AB84FF7DC2D01A3E90903C899ED382B97165CF019B8C213709
                            Malicious:false
                            Preview:...TFRMDESIGN.0..u..TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.:..Picture.Data..i...TBitmap~i..BM~i......6...(.......:...........He..................V-..a8..`9..b=..nD..yJ..zL...S..d@..gC..jE..jF..mH..rL..tK..sM..zQ..kG .mI .lI%.rN$.tO&.pN).{R#.{U .{S$.rP*.tP).sR..{W..}Y*.vU2.|Z2.yY6.}[5.zZ8.}^;..X...V...[...`...f...a...f...l...o...z...|...r...z...q...w...|...\#..X'..]$..Y)..[,.._/..^4..e'..h#..i%..l+..t...d2..b4..f6..e:..g=..h?..j<..l<..q<..~)..|1..}8..eD..kF..oJ..mA..sC..rD..uH..xM..xS..}V..zJ.................../...3...4...?...<...1...6...8....................................................
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1561
                            Entropy (8bit):5.018115004625162
                            Encrypted:false
                            SSDEEP:24:UuikSi+nfi0ZiFuEai/pZSruicvSi+pipUivuNsIi/pEaiDatfi/pTvSgREii/pH:U5ExAGVPbu1ZRMfkf3faWYt
                            MD5:2FE4E500443ECB1E27A767BEE9A18C63
                            SHA1:887A5789CDAC46BEA2829870DF02AD6B87A92270
                            SHA-256:6492FEB41031C64C70FA8FABAABCCDE4846F9438B017D152C68C4B356C6A167A
                            SHA-512:9475EB0E7509493A23DEA491CFA0A9A1DB0D339C216F1E38512DF18A74D80C69B6C8CE9C10131047227FFA3E979D5D6F144748569CFD9209C47977D770D94DD4
                            Malicious:false
                            Preview:IF (checkSuccess.Caption = COMPLETE) THEN textComplete.Visible := True;..IF (checkSuccess.Caption = REBOOT) THEN textReboot.Visible := True;..IF (checkSuccess.Caption = CANCEL) THEN textCancelled.Visible := True;..IF (checkSuccess.Caption = ERROR) THEN textError.Visible := True;..IF (checkSuccess.Caption = COMPLETE) THEN RunNow.Visible := True;..IF (checkRemove.Caption = TRUE) THEN textRemove.Visible := True;..IF (checkSuccess.Caption = REBOOT) THEN RebootNow.Visible := True;..IF (checkSuccess.Caption <> COMPLETE) THEN textComplete.Visible := False;..IF (checkSuccess.Caption <> REBOOT) THEN textReboot.Visible := False;..IF (checkSuccess.Caption <> CANCEL) THEN textCancelled.Visible := False;..IF (checkSuccess.Caption <> ERROR) THEN textError.Visible := False;..IF (checkSuccess.Caption <> COMPLETE) THEN RunNow.Visible := False;..IF (checkRemove.Caption <> TRUE) THEN textRemove.Visible := False;..IF (checkRemove.Caption = TRUE) THEN textComplete.Visible := Fal
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
                            Category:dropped
                            Size (bytes):1597
                            Entropy (8bit):7.871063017224323
                            Encrypted:false
                            SSDEEP:24:X93kpZjQLmEcxtIwWXPAGpKpkZcks41xdrqUaBdJbYfxpJgx7YWg/uLwdCnq:N3Yj8mEcxywiPrpKpNMdr07SxgSt
                            MD5:B7225A16DAF9DE1D514AEFE567FDF2F5
                            SHA1:D6A00C526C425FCD5EF49B0C87814F2CF476CB59
                            SHA-256:0E2DEFC9B470D3F9BD184D254493EFAD94EA0273C1FE17FC8FC651D47B01734E
                            SHA-512:31412603AE87F2B9C9DAD2D0BA64868105586D1778846DE5F1C14667C4292DE36FC193B54670BDF130019B0B42AB59EEF2C2D8672226BA755181FEA894BD9246
                            Malicious:false
                            Preview:.PNG........IHDR... ... .....szz.....IDATx.W.L.W...!..dl.'.@.10.a.....2.T'.....SD..-PK@t.....:53.... :#F.......|"...L....6 m)Lw........9...K.+.b...z.x........=...J.V....n3[.B..v[m..../....o0.L....Q...&...$~?%%?PG..S<..]...$.Z......O.3".k....m]..2S9..4,.k+.xf..k.F...V..4[Ec'K.2.2..PK.....H$..H.....kA...M..>.zs.....^.*..K"...j..:..Hu.T..Q.....N...y'.+9.dR.{..Xn....w.f...R.KQB.]z........6>..,.......q.%........;.,......U{.i....Z.....)._I..7..J.q..d)...CM....;...,R~.B.S...E...p[-O........].F...%..A.%....{.%.*...]Q..>.-..f..C..i.Q..+5.......A'~.....J...M.mtN..0..r.>.@K.....D...<...CI^#.-.P.}?R..M.-.7..GS...Z^9s..<6.....>......<..g.~.9....{]Ju..}`..Z(..ikw^.,)X..g...|G.LQ9A^...9pe....7d.......SE.Q..../nx.}_..F...$..I..K...o4.^ ..e.X.Q.H......&........Q..............\n....J......./...7.....E.9.....$...K..!...c.`.=.Jd.nq.n.W.Q...Q.#s.w._.d....u...Q].-U.N.J..&.O..=......a+.k.....%.$..(.....@`...lx.......tDC..=.{...^"...@.....\{;#.^...G.q./AA.
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):32086
                            Entropy (8bit):3.1568876532608567
                            Encrypted:false
                            SSDEEP:768:PGHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibfp:P+XQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DC
                            MD5:D5DF18B96E3A0E9DA52766BDEB603E4B
                            SHA1:A1D313F08A9B663F8DB7BCB258EFA616BB2618DB
                            SHA-256:C1E2B73702BE7EA8E2BB9CEC1F9D210757D67EB950D8A22EA39E0E2C5F9AF6B0
                            SHA-512:AB60CE2806739B62EC063FABA81A17CFEEA3CFCD546E9DD8F486DA3491DF3BB76C7020E35B5C2898A923736672E3AE9CA2400978DCBFBD8B75E76B579B85FED1
                            Malicious:false
                            Preview:...TFRMDESIGN.0.B}..TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):128
                            Entropy (8bit):4.596663476123045
                            Encrypted:false
                            SSDEEP:3:ap5i6ApR2tuFRAdRLOEpe8vi5i6ApVuFRAdRLOEpe7Jv:aHi6GKuMtrk86i6euMtrkt
                            MD5:26D8EB4CC3DEFA59F4E8FD1713EA2AB0
                            SHA1:3D39A67AB169CA9F6EE0A9E2073142B5B75DD1E8
                            SHA-256:D5DE1F79D4AEA2327A85379FB51AC3157907809043AA1E4AA34878E3E9787442
                            SHA-512:5E3D9B5D65896A5C836BABDD892A306863342563FB2D41C56FB342A7E165F0319ECA6D24CE2825011EF0B109C304C7C4CB0DC4D0A493BC4281E32CE8970A1ACC
                            Malicious:false
                            Preview:IF (LicenseCheck.Checked = True) THEN Next.Enabled := True;..IF (LicenseCheck.Checked = False) THEN Next.Enabled := False;..
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):1448448
                            Entropy (8bit):6.68350408954223
                            Encrypted:false
                            SSDEEP:24576:KOG+2J9h3pr7waeMDJNGg/70Z6SVflSMBKS9uiNfGn83Zc5s/Z:Kp+QiaGN9SMcS95q83IgZ
                            MD5:18B85C5A139BAEAFD89C70B8C6561A52
                            SHA1:67033A74346E46C952CEE21EC1EE2C10CE8C5618
                            SHA-256:33B5F0AED0E886DDEAD2D412BF811920FBD17B162BA6272C4B28CC879F380DB8
                            SHA-512:2CC05FA8BB59B1B1CE24D25BDE62D85BEE273D4400EF9586ED2A2C513CD971CB52C9ADEDA8669CA257E2D8B8951D86C02D8E6506AE97BD85BA5AC45C4D724B2E
                            Malicious:true
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...R..V.................n.........................Q....................................................................O....P...?...p...\.........................................................................h[...............................text....X.......Z.................. ..`.itext.......p.......^.............. ..`.data....Q.......R...r..............@....bss....XT...............................idata...?...P...@..................@....didata.............................@....edata..O...........................@..@.rdata..............................@..@.reloc.............................@..B.rsrc....\...p...\..................@..@....................................@..@........................................................
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):1326592
                            Entropy (8bit):6.662178971692568
                            Encrypted:false
                            SSDEEP:24576:9JGBDZIKwoTaK/T/Tua+hWWfnElT/XhBiSwmK9lHcPJMgh:vqxaSzqUNBXhkSwQPi
                            MD5:AC12DEC48405495C2008858D243DA8BC
                            SHA1:0B6AD42CDE232A81B415481B772319FB1138C35E
                            SHA-256:AD45020E327C16F0A847C38A058E606A7738EA6D0DDAAF80439797CA95F5FD43
                            SHA-512:F6A381063DC321C85BD9FFECD524FCFA4EB968AA7644AB339F292B7037BE9C1FA997D2CAD382BE92848010AEEEA38209908B5FAE17CD0B261E0DBEFA38BF5F58
                            Malicious:true
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...R..V.....................t.....................Q....................................................................N.......\7.......Z..........................................................................,................................text...\........................... ..`.itext.............................. ..`.data....M.......N..................@....bss.....T...@...........................idata..\7.......8..................@....didata..............P..............@....edata..N............Z..............@..@.rdata...............\..............@..@.reloc...............^..............@..B.rsrc....Z.......Z..................@..@.....................>..............@..@........................................................
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):160192
                            Entropy (8bit):1.9416958546631025
                            Encrypted:false
                            SSDEEP:192:TdRfzvu9vJSm3IZ8Zgspkk4B9heXItzNGzOiOWEpap5PKo6Mmp4Cdtq69wTEmC+:TvI/Lw76
                            MD5:68E84CD5CA646B0204CD019CC6B63DCD
                            SHA1:B00E7D577E350F96149E5C14C6DDA8B05994462D
                            SHA-256:ECCE7B76CEE8E1C10D828DC932F1BFDC782F1B599C1BF13651C21B73A5AE1A4A
                            SHA-512:E848350BD35C9DD7B7AFA741BD4089763EA990B7F27AF96C3067E308A9AF812D83DB5F48E2EF8A6CE3E221036B1C76F0802A87DF9FC16CEB8C3B8E03619A1C85
                            Malicious:false
                            Preview:...TFRMDESIGN.0..q..TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.:..Picture.Data..i...TBitmap~i..BM~i......6...(.......:...........He..................V-..a8..`9..b=..nD..yJ..zL...S..d@..gC..jE..jF..mH..rL..tK..sM..zQ..kG .mI .lI%.rN$.tO&.pN).{R#.{U .{S$.rP*.tP).sR..{W..}Y*.vU2.|Z2.yY6.}[5.zZ8.}^;..X...V...[...`...f...a...f...l...o...z...|...r...z...q...w...|...\#..X'..]$..Y)..[,.._/..^4..e'..h#..i%..l+..t...d2..b4..f6..e:..g=..h?..j<..l<..q<..~)..|1..}8..eD..kF..oJ..mA..sC..rD..uH..xM..xS..}V..zJ.................../...3...4...?...<...1...6...8....................................................
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):32211
                            Entropy (8bit):3.1826203678135156
                            Encrypted:false
                            SSDEEP:768:iVHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibfb:idXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5Di
                            MD5:1074D7C4D94AF399F1F6137AD183E70D
                            SHA1:9C7BDC1EFDEC073746AD9B7478F113D9EBD403EB
                            SHA-256:2AA0603ADAA5058A1C118C8F2FAACD333D31112EC4C75689F765E4BC3AF69473
                            SHA-512:38C7A641A232F2A67F10904716D13C137F08A0A19F47D209994FF63BFB198D8BB89075CD78BD23FF26427CFB3BDC53585EC33735A6FFF5E76834278D958AD1ED
                            Malicious:false
                            Preview:...TFRMDESIGN.0..}..TPF0.TfrmDesign.frmDesign.Left.D..Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):370
                            Entropy (8bit):4.959095954912026
                            Encrypted:false
                            SSDEEP:6:aG1uSLF2du6szW4Rl1Ac2duJRl1Ow0Ld2du4LRl1uSLju6szWAK1Ow0Lru4FK1AC:qITMDIb6UIJTc6S6jO
                            MD5:D8BA1E1B3F547F94CB059C8ACEC89297
                            SHA1:71A5043CA3BF89FECA070431985C232E28940AAB
                            SHA-256:62EE20B127F44C2D91BBCC9A232689DD3F1BC3359E606257BF3B115D4CBBDD2C
                            SHA-512:5DA1E4DEB8518CD7AF202E7169F181683C74A83F62D98A36DEB45A03E14F384410633017D16CCBB6E216904F40AC782D7BE97940EACAB7D60B2D54CB7DBAEDC9
                            Malicious:false
                            Preview:IF (checkWINST.Caption <> TRUE) THEN WINST.Visible := True;..IF (checkJS.Caption <> TRUE) THEN JS.Visible := True;..IF (checkDotNET.Caption <> TRUE) THEN dotNET.Visible := True;..IF (checkWINST.Caption = TRUE) THEN WINST.Visible := False;..IF (checkDotNET.Caption = TRUE) THEN dotNET.Visible := False;..IF (checkJS.Caption = TRUE) THEN JS.Visible := False;..
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):43052
                            Entropy (8bit):4.120190601260142
                            Encrypted:false
                            SSDEEP:768:yJHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibf9:yhXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5Dy
                            MD5:57A89F49FD0EE39606E927B96B00CFE5
                            SHA1:5D94926CAF2BE0284B0B4CB7E69ECFA7A9A63284
                            SHA-256:8B4D56464B9F2050B89134F7BCC8CD0FAFE946CE062F320915B0404685BDA111
                            SHA-512:186F50C78EBD96CB12E8F7D5DF249AFBBA3C71E5DF96AB4F293DB2AC99593459F634C0BFA3B1C2FF34063819894FB9F446000110069B1DE2DD63B47874956E7E
                            Malicious:false
                            Preview:...TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):292
                            Entropy (8bit):4.740550563860751
                            Encrypted:false
                            SSDEEP:6:a3jF2duukAiRcjjuukTDoRcjF2duukTDQTjjuukAh:csIrqar1sIroarg
                            MD5:86B3EBFBD934B66842048F0AA241E5C5
                            SHA1:F770786C29D12D8C33B975EF2BAAD6D59A90F7CF
                            SHA-256:4AEDBF26E568E62B47517E91FBCC818A5B95BD7FDB8A7DC5B826C0BD194077A6
                            SHA-512:FE37AD98EC8DE62CE6E6A46E284450BBE19B7D8EB8C7B3B81BD06BA22EEBA487C2CEE8C3B37CD84FEAA09F8F39BDF532371B57FCCC7788A2F54EDA3390E58FD3
                            Malicious:false
                            Preview:IF (TestRemove.Caption <> TRUE) THEN CaptionInstall.Visible := True;..IF (TestRemove.Caption = TRUE) THEN CaptionUninstall.Visible := True;..IF (TestRemove.Caption <> TRUE) THEN CaptionUninstall.Visible := False;..IF (TestRemove.Caption = TRUE) THEN CaptionInstall.Visible := False;..
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):42687
                            Entropy (8bit):4.076635616143556
                            Encrypted:false
                            SSDEEP:768:PoHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibf/i:PoXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DJ
                            MD5:0379D6212582C3FFF4E2E205B9585151
                            SHA1:72BCF5C26E8270EC72F53EDC69D970E65CEE7229
                            SHA-256:9495AE09659EA231157D576BF325CF8A55C191A493CF9EA39979CBC3497B281B
                            SHA-512:D65059609CF44FDEA5134CC542835B7CD1FCB0873854D6BDB6A15D53737CD090F65CA119D81A0D3DCA5E0289E666395E140564B457870BDFD5A6334EBE41BE0C
                            Malicious:false
                            Preview:...TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top.w.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o...
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):31936
                            Entropy (8bit):3.1261873313705286
                            Encrypted:false
                            SSDEEP:768:KGHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfjE:K+XQ1NmO7ZDrkqzM+KGk1ccHq7kJT5Db
                            MD5:92B2E967740B9A9566132617654F99CE
                            SHA1:9E5CD494173A9BABFC520E085B66CAD832FA9263
                            SHA-256:4CB5450E2366EB03855CB1890C84245BD21975B353807F820C461F56577E02D1
                            SHA-512:233442A840DBCC4B37FF40CE8B97E2B4A157043A8B552236B2A24BA0DB18AA38CCA99B2F257272DA577793B129C047895D46A68214074D977E6930571974A3C4
                            Malicious:false
                            Preview:...TFRMDESIGN.0..|..TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):128
                            Entropy (8bit):4.596663476123045
                            Encrypted:false
                            SSDEEP:3:ap5i6ApR2tuFRAdRLOEpe8vi5i6ApVuFRAdRLOEpe7Jv:aHi6GKuMtrk86i6euMtrkt
                            MD5:26D8EB4CC3DEFA59F4E8FD1713EA2AB0
                            SHA1:3D39A67AB169CA9F6EE0A9E2073142B5B75DD1E8
                            SHA-256:D5DE1F79D4AEA2327A85379FB51AC3157907809043AA1E4AA34878E3E9787442
                            SHA-512:5E3D9B5D65896A5C836BABDD892A306863342563FB2D41C56FB342A7E165F0319ECA6D24CE2825011EF0B109C304C7C4CB0DC4D0A493BC4281E32CE8970A1ACC
                            Malicious:false
                            Preview:IF (LicenseCheck.Checked = True) THEN Next.Enabled := True;..IF (LicenseCheck.Checked = False) THEN Next.Enabled := False;..
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):32180
                            Entropy (8bit):3.176260859175472
                            Encrypted:false
                            SSDEEP:768:5UVHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfA:5UdXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5F
                            MD5:56BAD53F5F88A0340D5835A37CCC33C5
                            SHA1:943A88F953CD36E9F79B6681BDB3949071F60188
                            SHA-256:7BEB6D4F0AC884F33B9528E3C56BEE15E3D4BD33D16DE40F242B024CE68FC4B0
                            SHA-512:79AD20CD678C8C3F9A6571BEBDAC570B7167813310C44BEC1D67EC881F9FFC843965FF0B047F31E154A616B2E917A291DD8765B217674A963A7FCD57C20737C5
                            Malicious:false
                            Preview:...TFRMDESIGN.0..}..TPF0.TfrmDesign.frmDesign.Left....Top.z.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TLabel.Label5.Left.(.Top.H.Width.8.Height...Caption..&User Name:.FocusControl..Name...TLabel.Label6.Left.(.Top.x.Width.A.Height...Caption..&Organization:.FocusControl..Company...TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!.
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):202
                            Entropy (8bit):4.56478131967351
                            Encrypted:false
                            SSDEEP:6:aFiLYMtrk8FYMLYMtrk8W7qMtrkeqYRqMtrkt:+GYMtg+YMtgdmMtgpMtgt
                            MD5:2FA9DDBED5C616D3838AD3934F3B2D7D
                            SHA1:234B295897F4F8E6E991A5B362B5F5D8011EC24B
                            SHA-256:4FB0948F1707CE29811F05CB06169D1360B08445AAA180EAB814EBADDF2BB101
                            SHA-512:DAFE8B7BBF7BBFC6816707F131AB66924964576BD4BE5FD2986611212E7D7D436C71112CFCDD8EBF42F6C515700165D8305357DFA7030391E4B99E4998E91A70
                            Malicious:false
                            Preview:IF (Name.Text <> ) THEN Next.Enabled := True;..IF (Company.Text <> ) THEN Next.Enabled := True;..IF (Name.Text = ) THEN Next.Enabled := False;..IF (Company.Text = ) THEN Next.Enabled := False;..
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):32912
                            Entropy (8bit):3.310684742077839
                            Encrypted:false
                            SSDEEP:768:+tHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfMb:+VXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DP
                            MD5:C44488F6F633D32EA08F480FC760607C
                            SHA1:6979D51D6398EFFF9742D09E022534A05AB9271A
                            SHA-256:95C6B4CF234F726DDE2F63F9B162817A6807B3F33CC513C6FAF5E8BA0FB2A79A
                            SHA-512:1C8EA5B2C0898DB712D9027E1B2B8AB8B569B520CEFE755B62C648EA9EBB8C720357DD4DB9E6F03D4C8143C524942D22AE9FD83F89EF5553E5E88AFEA0235E53
                            Malicious:false
                            Preview:...TFRMDESIGN.0.|...TPF0.TfrmDesign.frmDesign.Left....Top.v.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o...
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):722
                            Entropy (8bit):4.629672896174913
                            Encrypted:false
                            SSDEEP:12:+GYMtg+YMtgPt0YMtgPrYMtgP0ZYMtgPpDYMtgPuYMtgdmMtgpMtg6tkMtg63Mth:+ff7kkKSHFmBBApVeNF
                            MD5:5D78380EBDAD86764F26B73474DF4900
                            SHA1:D2574CD9FB599E81C6099738D9D7974CE4039AFD
                            SHA-256:DAA5742D80E19668753D435DA0937A4409D22AF73FBAF9DF22EC4CBC34FF5D45
                            SHA-512:3533A9D8F4B1D8BD703856B150B8CBA99CA8CF55EF2182EB7B7326BF742C2B4B5CEA896B818FB690E0678689A8B452F22F5F548124D0B8302D776E8B2335B26D
                            Malicious:false
                            Preview:IF (Name.Text <> ) THEN Next.Enabled := True;..IF (Company.Text <> ) THEN Next.Enabled := True;..IF (Serial1.Text <> ) THEN Next.Enabled := True;..IF (Serial2.Text <> ) THEN Next.Enabled := True;..IF (Serial3.Text <> ) THEN Next.Enabled := True;..IF (Serial4.Text <> ) THEN Next.Enabled := True;..IF (Serial5.Text <> ) THEN Next.Enabled := True;..IF (Name.Text = ) THEN Next.Enabled := False;..IF (Company.Text = ) THEN Next.Enabled := False;..IF (Serial1.Text = ) THEN Next.Enabled := False;..IF (Serial2.Text = ) THEN Next.Enabled := False;..IF (Serial3.Text = ) THEN Next.Enabled := False;..IF (Serial4.Text = ) THEN Next.Enabled := False;..IF (Serial5.Text = ) THEN Next.Enabled := False;..
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):33198
                            Entropy (8bit):3.359763390973846
                            Encrypted:false
                            SSDEEP:768:DIHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibf7q:DIXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DB
                            MD5:EFB592762376173C651EC1755E26DD1F
                            SHA1:3ECBFC3F6058E6F827A2FD91A7AB94EB7E60A045
                            SHA-256:ED39514751D8C9913F0A3C222F29FFC85F0EE3D107A222BD668DB96125190A03
                            SHA-512:062BBBBBEC95FA272D2F35EACAF2DE3D8BD3D04E027FB34059CD25D0E482D525393D81AA7DD575BDB5970DA298A87C916283983E2B66208B6787747D72E2D8A5
                            Malicious:false
                            Preview:...TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TLabel.Label4.Left.(.Top.H.Width.I..Height.!.AutoSize..Caption..Please select a setup type..WordWrap....TBevel.Bevel2.Left...Top.:.Width....Height...Shape..bsTopLine...TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):159671
                            Entropy (8bit):1.9106205211543585
                            Encrypted:false
                            SSDEEP:192:mrRfzvu9vJSm3IZ8Zgspkk4B9heXItzNGzOiOWEpap5PKo6Mmp4C/DEtdmpJ:m5I/SKi
                            MD5:5773034B4AA211DB5CCCA92B4A346660
                            SHA1:99948D4B79CFB184B076CC156F7656E4C3604438
                            SHA-256:AF00C29E992E19D6DBE9D8DC5535BED62475F09B6E79EAE64B92E6B7CC801170
                            SHA-512:E6B23477655045A65442E383748C6883AC0560CC3152DC8A5D19D8DAAE0BD5345B28392C804F3E1B0A3572410CB1AFCEB1EA2C195A976DD432CB0705B2398953
                            Malicious:false
                            Preview:...TFRMDESIGN.0..o..TPF0.TfrmDesign.frmDesign.Left....Top.~.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.:..Picture.Data..i...TBitmap~i..BM~i......6...(.......:...........He..................V-..a8..`9..b=..nD..yJ..zL...S..d@..gC..jE..jF..mH..rL..tK..sM..zQ..kG .mI .lI%.rN$.tO&.pN).{R#.{U .{S$.rP*.tP).sR..{W..}Y*.vU2.|Z2.yY6.}[5.zZ8.}^;..X...V...[...`...f...a...f...l...o...z...|...r...z...q...w...|...\#..X'..]$..Y)..[,.._/..^4..e'..h#..i%..l+..t...d2..b4..f6..e:..g=..h?..j<..l<..q<..~)..|1..}8..eD..kF..oJ..mA..sC..rD..uH..xM..xS..}V..zJ.................../...3...4...?...<...1...6...8.....................................................
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):32908
                            Entropy (8bit):3.3110543872756732
                            Encrypted:false
                            SSDEEP:768:qNHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfX1:q1XQ1NmO7ZDrkqzM+KGk1ccHq7kJT5De
                            MD5:5A8C8E081C329D3F53494AECEF81BD82
                            SHA1:9F1037A2CF254FA932D2A642C4ABD84E0770E167
                            SHA-256:FE73CBFCCECE99991601E653E816A1489425BC8701EEC2CF89724239316CC8CC
                            SHA-512:9565DD95764D8B6E1761E323BD12420E84733CB6D35DDAADE755186E208C81308231C891CF00296E4F2FE7493D7E9DEE04A68DA7624D8F69C49A2DAC4B865B01
                            Malicious:false
                            Preview:...TFRMDESIGN.0.x...TPF0.TfrmDesign.frmDesign.Left.u..Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):228
                            Entropy (8bit):4.823487220355037
                            Encrypted:false
                            SSDEEP:6:aoqLYMtrk8LTqMtrkegurusdrHE8Pud2dusdrHEt:jOYMtgQeMtg1dsdrHEUxIsdrHEt
                            MD5:8ED569EB90D7EC0791C65F696B85AA4B
                            SHA1:AA48F7BD2BA3A2F5DD63D25DA56A1039A18E7FB0
                            SHA-256:ABF9F1E255935EC3BA966B8CDA6D129F93F28F43F8C805523B4846769C90F788
                            SHA-512:3BDBBDF37199E6FEB281867FFDE480782905E0C24DB729DBF78D6FA0D92A363AA0CABBE20303E06D1327A24C3142F0EF72F8B0AF1ED268652DB301407A4F5926
                            Malicious:false
                            Preview:IF (MenuGroup.Text <> ) THEN Next.Enabled := True;..IF (MenuGroup.Text = ) THEN Next.Enabled := False;..IF (ISNT.Caption = TRUE) THEN AllUsers.Enabled := True;..IF (ISNT.Caption <> TRUE) THEN AllUsers.Enabled := False;..
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):159591
                            Entropy (8bit):1.9059323470293204
                            Encrypted:false
                            SSDEEP:192:26Rfzvu9vJSm3IZ8Zgspkk4B9heXItzNGzOiOWEpap5PKo6Mmp4CBH1qw3cmrw:2QI/VnP
                            MD5:C61886A33BF58C3BC38FA869019DA28E
                            SHA1:C2E1B87CCBD13CBE8AFB4FC278A5BA0635C97279
                            SHA-256:39056A7647F8135EDF8D8D80F81C53153CCE7E5BCC858ECC81BE6F0075692A26
                            SHA-512:65EDBD0675A8282ECD0CCD74BDA2F458D222EAFA5BF29BE61F5F081D3FB53B38797B57BBF78C544771F362ED6F03929FEAB19C2E6928222AAD8BC1A53DF81263
                            Malicious:false
                            Preview:...TFRMDESIGN.0.So..TPF0.TfrmDesign.frmDesign.Left.+..Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.:..Picture.Data..i...TBitmap~i..BM~i......6...(.......:...........He..................V-..a8..`9..b=..nD..yJ..zL...S..d@..gC..jE..jF..mH..rL..tK..sM..zQ..kG .mI .lI%.rN$.tO&.pN).{R#.{U .{S$.rP*.tP).sR..{W..}Y*.vU2.|Z2.yY6.}[5.zZ8.}^;..X...V...[...`...f...a...f...l...o...z...|...r...z...q...w...|...\#..X'..]$..Y)..[,.._/..^4..e'..h#..i%..l+..t...d2..b4..f6..e:..g=..h?..j<..l<..q<..~)..|1..}8..eD..kF..oJ..mA..sC..rD..uH..xM..xS..}V..zJ.................../...3...4...?...<...1...6...8....................................................
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):31822
                            Entropy (8bit):3.1036618557972493
                            Encrypted:false
                            SSDEEP:768:sHHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfU:snXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DB
                            MD5:01216764772CEB5308A494AFD9D73C37
                            SHA1:88A301C9F21316D7AA3B909C3EF18A3F3EC164F7
                            SHA-256:EC6130DCA3F4C1AF10559659024F6A5DC97D8B31E415715CF5C9D662BAC5743F
                            SHA-512:6E3399DCD1A3EC38045FF360E53FBC836CDCBC763AABFFC9253F07F9A9683E2D605F088E885BE0254096430601F484740240D739110E557C458BE0851868E7BA
                            Malicious:false
                            Preview:...TFRMDESIGN.0.:|..TPF0.TfrmDesign.frmDesign.Left....Top...HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o...
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Revision Number: {CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}, Number of Pages: 200, Title: TechkonDriver64Bit, Subject: Techkon USB-Driver 64Bit Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0, Template: x64;1033, Number of Words: 8
                            Category:dropped
                            Size (bytes):770560
                            Entropy (8bit):6.315743880506391
                            Encrypted:false
                            SSDEEP:12288:+to45BKXsbzzDSJsQ8guBoN2KA2wKc7wMz7:+to4vl5BqPA2fc7wMz7
                            MD5:B807BD86405509D80EFA5DA0F8E0EFD6
                            SHA1:6826E0429813D0AB446ECF2CE56BD0A14B701BE0
                            SHA-256:81C9666B260B0CBD8B10F253CEAA699AB606BB8BE83946F4B253B153E11336FC
                            SHA-512:4D6F9E7B7B2ED6ADF7BC74A65FA1C583756DF80680F97CACB5E2C94BC3A4C2296636C900325DFD4DBEBB2EE031305D6F3CE245D41481AB150DBC331F2BFA1E52
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-...........0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):32879
                            Entropy (8bit):3.303772475257304
                            Encrypted:false
                            SSDEEP:768:VDHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfwE:VDXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DA
                            MD5:7ABD6BD2B201E76EA624B72EC854E178
                            SHA1:B74ECA13809A2439B0A8B769328247EED6ECA6CC
                            SHA-256:B7E2337DDFE813C051D10B5CBBBBDC7FCD0EEF4B5B2621C3A77D6B91743C0F4D
                            SHA-512:66AF2C8901D8B421C1BC1265CBC8495E19C2346BF8B97D280079E1200578D450B6DEA570B712D350D5BE0A8B88A2615BE4075008D85CCA3CCF5D28A4D9194A9E
                            Malicious:false
                            Preview:...TFRMDESIGN.0.[...TPF0.TfrmDesign.frmDesign.Left....Top...HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o...
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):32756
                            Entropy (8bit):3.2836876237576345
                            Encrypted:false
                            SSDEEP:768:XyHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibfn:X6XQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DU
                            MD5:BF3263127CD771470559490ADB76647B
                            SHA1:8971CB4959D1BCA4A0EC48F3186309B00E16261B
                            SHA-256:4811574E264AEB0927806A9A953CEA2A903ED18C36A34A10B67E40B99CA1670F
                            SHA-512:9AF82B1F3EB3E735E2434BA803C1FC6D13BC1866A73D9F0FF466A23A5761291DD00A6C0D57BD24CE6CC2DCD0ACC16E863A2F30A41FC4BBBD041578F85AF6AD27
                            Malicious:false
                            Preview:...TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):161047
                            Entropy (8bit):1.9896602276153565
                            Encrypted:false
                            SSDEEP:192:E3Rfzvu9vJSm3IZ8Zgspkk4B9heXItzNGzOiOWEpap5PKo6Mmp4CWNux1uAw1Dmi:EtI/gWf
                            MD5:5F7AE8AAAC7F8E1E811BE95B187ABB10
                            SHA1:C34C69B5AE6B4B2EFAE3236C386F2B0388F815A8
                            SHA-256:984A34337FC921BCCBA721B8361D3806459D2F37CBF117F5CC35D6BD0D6FEF6D
                            SHA-512:0A6F8E499686102AD85DD411958B3417A4E758FAC61A1D883420490AABDEF0F6CECED358997F83AB84FF7DC2D01A3E90903C899ED382B97165CF019B8C213709
                            Malicious:false
                            Preview:...TFRMDESIGN.0..u..TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.:..Picture.Data..i...TBitmap~i..BM~i......6...(.......:...........He..................V-..a8..`9..b=..nD..yJ..zL...S..d@..gC..jE..jF..mH..rL..tK..sM..zQ..kG .mI .lI%.rN$.tO&.pN).{R#.{U .{S$.rP*.tP).sR..{W..}Y*.vU2.|Z2.yY6.}[5.zZ8.}^;..X...V...[...`...f...a...f...l...o...z...|...r...z...q...w...|...\#..X'..]$..Y)..[,.._/..^4..e'..h#..i%..l+..t...d2..b4..f6..e:..g=..h?..j<..l<..q<..~)..|1..}8..eD..kF..oJ..mA..sC..rD..uH..xM..xS..}V..zJ.................../...3...4...?...<...1...6...8....................................................
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):1561
                            Entropy (8bit):5.018115004625162
                            Encrypted:false
                            SSDEEP:24:UuikSi+nfi0ZiFuEai/pZSruicvSi+pipUivuNsIi/pEaiDatfi/pTvSgREii/pH:U5ExAGVPbu1ZRMfkf3faWYt
                            MD5:2FE4E500443ECB1E27A767BEE9A18C63
                            SHA1:887A5789CDAC46BEA2829870DF02AD6B87A92270
                            SHA-256:6492FEB41031C64C70FA8FABAABCCDE4846F9438B017D152C68C4B356C6A167A
                            SHA-512:9475EB0E7509493A23DEA491CFA0A9A1DB0D339C216F1E38512DF18A74D80C69B6C8CE9C10131047227FFA3E979D5D6F144748569CFD9209C47977D770D94DD4
                            Malicious:false
                            Preview:IF (checkSuccess.Caption = COMPLETE) THEN textComplete.Visible := True;..IF (checkSuccess.Caption = REBOOT) THEN textReboot.Visible := True;..IF (checkSuccess.Caption = CANCEL) THEN textCancelled.Visible := True;..IF (checkSuccess.Caption = ERROR) THEN textError.Visible := True;..IF (checkSuccess.Caption = COMPLETE) THEN RunNow.Visible := True;..IF (checkRemove.Caption = TRUE) THEN textRemove.Visible := True;..IF (checkSuccess.Caption = REBOOT) THEN RebootNow.Visible := True;..IF (checkSuccess.Caption <> COMPLETE) THEN textComplete.Visible := False;..IF (checkSuccess.Caption <> REBOOT) THEN textReboot.Visible := False;..IF (checkSuccess.Caption <> CANCEL) THEN textCancelled.Visible := False;..IF (checkSuccess.Caption <> ERROR) THEN textError.Visible := False;..IF (checkSuccess.Caption <> COMPLETE) THEN RunNow.Visible := False;..IF (checkRemove.Caption <> TRUE) THEN textRemove.Visible := False;..IF (checkRemove.Caption = TRUE) THEN textComplete.Visible := Fal
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):32086
                            Entropy (8bit):3.1568876532608567
                            Encrypted:false
                            SSDEEP:768:PGHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibfp:P+XQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DC
                            MD5:D5DF18B96E3A0E9DA52766BDEB603E4B
                            SHA1:A1D313F08A9B663F8DB7BCB258EFA616BB2618DB
                            SHA-256:C1E2B73702BE7EA8E2BB9CEC1F9D210757D67EB950D8A22EA39E0E2C5F9AF6B0
                            SHA-512:AB60CE2806739B62EC063FABA81A17CFEEA3CFCD546E9DD8F486DA3491DF3BB76C7020E35B5C2898A923736672E3AE9CA2400978DCBFBD8B75E76B579B85FED1
                            Malicious:false
                            Preview:...TFRMDESIGN.0.B}..TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):128
                            Entropy (8bit):4.596663476123045
                            Encrypted:false
                            SSDEEP:3:ap5i6ApR2tuFRAdRLOEpe8vi5i6ApVuFRAdRLOEpe7Jv:aHi6GKuMtrk86i6euMtrkt
                            MD5:26D8EB4CC3DEFA59F4E8FD1713EA2AB0
                            SHA1:3D39A67AB169CA9F6EE0A9E2073142B5B75DD1E8
                            SHA-256:D5DE1F79D4AEA2327A85379FB51AC3157907809043AA1E4AA34878E3E9787442
                            SHA-512:5E3D9B5D65896A5C836BABDD892A306863342563FB2D41C56FB342A7E165F0319ECA6D24CE2825011EF0B109C304C7C4CB0DC4D0A493BC4281E32CE8970A1ACC
                            Malicious:false
                            Preview:IF (LicenseCheck.Checked = True) THEN Next.Enabled := True;..IF (LicenseCheck.Checked = False) THEN Next.Enabled := False;..
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):1316352
                            Entropy (8bit):6.662123826541052
                            Encrypted:false
                            SSDEEP:24576:htJHEI7Kl/eZfZblU8u+noMRBqSPSUO9z8mF36X+huHcN2:rkl6PoMRMSSzy+hwcN2
                            MD5:595209D10BD0EC1B01F8AC31195E7902
                            SHA1:849F59A743DE094C7CF05C7F89B0ED22309B619C
                            SHA-256:8D67E430AB5300BBA92B1D1B45D2E87C13E8B0D61A75D02A70BC203696430534
                            SHA-512:3AA7C32A3BC9F0A1E5D4B67B657A216131FBDD62E5794403D01FBBCA663420D861460DAEA6ECEA6F2C4268E67B1E2A71DEDE6E6A57FF041E34BFD3F3130EC328
                            Malicious:true
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...X..V.....................j.....................Q....................................................................O........5.......T.............................................................................H.......^....................text...h........................... ..`.itext..T........................... ..`.data....M.......N..................@....bss....TS... ...........................idata...5.......6..................@....didata.^............0..............@....edata..O............:..............@..@.rdata...............<..............@..@.reloc...............>..............@..B.rsrc....T.......T..................@..@....................................@..@........................................................
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):1448448
                            Entropy (8bit):6.68350408954223
                            Encrypted:false
                            SSDEEP:24576:KOG+2J9h3pr7waeMDJNGg/70Z6SVflSMBKS9uiNfGn83Zc5s/Z:Kp+QiaGN9SMcS95q83IgZ
                            MD5:18B85C5A139BAEAFD89C70B8C6561A52
                            SHA1:67033A74346E46C952CEE21EC1EE2C10CE8C5618
                            SHA-256:33B5F0AED0E886DDEAD2D412BF811920FBD17B162BA6272C4B28CC879F380DB8
                            SHA-512:2CC05FA8BB59B1B1CE24D25BDE62D85BEE273D4400EF9586ED2A2C513CD971CB52C9ADEDA8669CA257E2D8B8951D86C02D8E6506AE97BD85BA5AC45C4D724B2E
                            Malicious:true
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...R..V.................n.........................Q....................................................................O....P...?...p...\.........................................................................h[...............................text....X.......Z.................. ..`.itext.......p.......^.............. ..`.data....Q.......R...r..............@....bss....XT...............................idata...?...P...@..................@....didata.............................@....edata..O...........................@..@.rdata..............................@..@.reloc.............................@..B.rsrc....\...p...\..................@..@....................................@..@........................................................
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):160192
                            Entropy (8bit):1.9416958546631025
                            Encrypted:false
                            SSDEEP:192:TdRfzvu9vJSm3IZ8Zgspkk4B9heXItzNGzOiOWEpap5PKo6Mmp4Cdtq69wTEmC+:TvI/Lw76
                            MD5:68E84CD5CA646B0204CD019CC6B63DCD
                            SHA1:B00E7D577E350F96149E5C14C6DDA8B05994462D
                            SHA-256:ECCE7B76CEE8E1C10D828DC932F1BFDC782F1B599C1BF13651C21B73A5AE1A4A
                            SHA-512:E848350BD35C9DD7B7AFA741BD4089763EA990B7F27AF96C3067E308A9AF812D83DB5F48E2EF8A6CE3E221036B1C76F0802A87DF9FC16CEB8C3B8E03619A1C85
                            Malicious:false
                            Preview:...TFRMDESIGN.0..q..TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.:..Picture.Data..i...TBitmap~i..BM~i......6...(.......:...........He..................V-..a8..`9..b=..nD..yJ..zL...S..d@..gC..jE..jF..mH..rL..tK..sM..zQ..kG .mI .lI%.rN$.tO&.pN).{R#.{U .{S$.rP*.tP).sR..{W..}Y*.vU2.|Z2.yY6.}[5.zZ8.}^;..X...V...[...`...f...a...f...l...o...z...|...r...z...q...w...|...\#..X'..]$..Y)..[,.._/..^4..e'..h#..i%..l+..t...d2..b4..f6..e:..g=..h?..j<..l<..q<..~)..|1..}8..eD..kF..oJ..mA..sC..rD..uH..xM..xS..}V..zJ.................../...3...4...?...<...1...6...8....................................................
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):32211
                            Entropy (8bit):3.1826203678135156
                            Encrypted:false
                            SSDEEP:768:iVHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibfb:idXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5Di
                            MD5:1074D7C4D94AF399F1F6137AD183E70D
                            SHA1:9C7BDC1EFDEC073746AD9B7478F113D9EBD403EB
                            SHA-256:2AA0603ADAA5058A1C118C8F2FAACD333D31112EC4C75689F765E4BC3AF69473
                            SHA-512:38C7A641A232F2A67F10904716D13C137F08A0A19F47D209994FF63BFB198D8BB89075CD78BD23FF26427CFB3BDC53585EC33735A6FFF5E76834278D958AD1ED
                            Malicious:false
                            Preview:...TFRMDESIGN.0..}..TPF0.TfrmDesign.frmDesign.Left.D..Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):370
                            Entropy (8bit):4.959095954912026
                            Encrypted:false
                            SSDEEP:6:aG1uSLF2du6szW4Rl1Ac2duJRl1Ow0Ld2du4LRl1uSLju6szWAK1Ow0Lru4FK1AC:qITMDIb6UIJTc6S6jO
                            MD5:D8BA1E1B3F547F94CB059C8ACEC89297
                            SHA1:71A5043CA3BF89FECA070431985C232E28940AAB
                            SHA-256:62EE20B127F44C2D91BBCC9A232689DD3F1BC3359E606257BF3B115D4CBBDD2C
                            SHA-512:5DA1E4DEB8518CD7AF202E7169F181683C74A83F62D98A36DEB45A03E14F384410633017D16CCBB6E216904F40AC782D7BE97940EACAB7D60B2D54CB7DBAEDC9
                            Malicious:false
                            Preview:IF (checkWINST.Caption <> TRUE) THEN WINST.Visible := True;..IF (checkJS.Caption <> TRUE) THEN JS.Visible := True;..IF (checkDotNET.Caption <> TRUE) THEN dotNET.Visible := True;..IF (checkWINST.Caption = TRUE) THEN WINST.Visible := False;..IF (checkDotNET.Caption = TRUE) THEN dotNET.Visible := False;..IF (checkJS.Caption = TRUE) THEN JS.Visible := False;..
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):43052
                            Entropy (8bit):4.120190601260142
                            Encrypted:false
                            SSDEEP:768:yJHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibf9:yhXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5Dy
                            MD5:57A89F49FD0EE39606E927B96B00CFE5
                            SHA1:5D94926CAF2BE0284B0B4CB7E69ECFA7A9A63284
                            SHA-256:8B4D56464B9F2050B89134F7BCC8CD0FAFE946CE062F320915B0404685BDA111
                            SHA-512:186F50C78EBD96CB12E8F7D5DF249AFBBA3C71E5DF96AB4F293DB2AC99593459F634C0BFA3B1C2FF34063819894FB9F446000110069B1DE2DD63B47874956E7E
                            Malicious:false
                            Preview:...TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):292
                            Entropy (8bit):4.740550563860751
                            Encrypted:false
                            SSDEEP:6:a3jF2duukAiRcjjuukTDoRcjF2duukTDQTjjuukAh:csIrqar1sIroarg
                            MD5:86B3EBFBD934B66842048F0AA241E5C5
                            SHA1:F770786C29D12D8C33B975EF2BAAD6D59A90F7CF
                            SHA-256:4AEDBF26E568E62B47517E91FBCC818A5B95BD7FDB8A7DC5B826C0BD194077A6
                            SHA-512:FE37AD98EC8DE62CE6E6A46E284450BBE19B7D8EB8C7B3B81BD06BA22EEBA487C2CEE8C3B37CD84FEAA09F8F39BDF532371B57FCCC7788A2F54EDA3390E58FD3
                            Malicious:false
                            Preview:IF (TestRemove.Caption <> TRUE) THEN CaptionInstall.Visible := True;..IF (TestRemove.Caption = TRUE) THEN CaptionUninstall.Visible := True;..IF (TestRemove.Caption <> TRUE) THEN CaptionUninstall.Visible := False;..IF (TestRemove.Caption = TRUE) THEN CaptionInstall.Visible := False;..
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):42687
                            Entropy (8bit):4.076635616143556
                            Encrypted:false
                            SSDEEP:768:PoHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibf/i:PoXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DJ
                            MD5:0379D6212582C3FFF4E2E205B9585151
                            SHA1:72BCF5C26E8270EC72F53EDC69D970E65CEE7229
                            SHA-256:9495AE09659EA231157D576BF325CF8A55C191A493CF9EA39979CBC3497B281B
                            SHA-512:D65059609CF44FDEA5134CC542835B7CD1FCB0873854D6BDB6A15D53737CD090F65CA119D81A0D3DCA5E0289E666395E140564B457870BDFD5A6334EBE41BE0C
                            Malicious:false
                            Preview:...TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top.w.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o...
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):31936
                            Entropy (8bit):3.1261873313705286
                            Encrypted:false
                            SSDEEP:768:KGHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfjE:K+XQ1NmO7ZDrkqzM+KGk1ccHq7kJT5Db
                            MD5:92B2E967740B9A9566132617654F99CE
                            SHA1:9E5CD494173A9BABFC520E085B66CAD832FA9263
                            SHA-256:4CB5450E2366EB03855CB1890C84245BD21975B353807F820C461F56577E02D1
                            SHA-512:233442A840DBCC4B37FF40CE8B97E2B4A157043A8B552236B2A24BA0DB18AA38CCA99B2F257272DA577793B129C047895D46A68214074D977E6930571974A3C4
                            Malicious:false
                            Preview:...TFRMDESIGN.0..|..TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):128
                            Entropy (8bit):4.596663476123045
                            Encrypted:false
                            SSDEEP:3:ap5i6ApR2tuFRAdRLOEpe8vi5i6ApVuFRAdRLOEpe7Jv:aHi6GKuMtrk86i6euMtrkt
                            MD5:26D8EB4CC3DEFA59F4E8FD1713EA2AB0
                            SHA1:3D39A67AB169CA9F6EE0A9E2073142B5B75DD1E8
                            SHA-256:D5DE1F79D4AEA2327A85379FB51AC3157907809043AA1E4AA34878E3E9787442
                            SHA-512:5E3D9B5D65896A5C836BABDD892A306863342563FB2D41C56FB342A7E165F0319ECA6D24CE2825011EF0B109C304C7C4CB0DC4D0A493BC4281E32CE8970A1ACC
                            Malicious:false
                            Preview:IF (LicenseCheck.Checked = True) THEN Next.Enabled := True;..IF (LicenseCheck.Checked = False) THEN Next.Enabled := False;..
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):32180
                            Entropy (8bit):3.176260859175472
                            Encrypted:false
                            SSDEEP:768:5UVHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfA:5UdXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5F
                            MD5:56BAD53F5F88A0340D5835A37CCC33C5
                            SHA1:943A88F953CD36E9F79B6681BDB3949071F60188
                            SHA-256:7BEB6D4F0AC884F33B9528E3C56BEE15E3D4BD33D16DE40F242B024CE68FC4B0
                            SHA-512:79AD20CD678C8C3F9A6571BEBDAC570B7167813310C44BEC1D67EC881F9FFC843965FF0B047F31E154A616B2E917A291DD8765B217674A963A7FCD57C20737C5
                            Malicious:false
                            Preview:...TFRMDESIGN.0..}..TPF0.TfrmDesign.frmDesign.Left....Top.z.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TLabel.Label5.Left.(.Top.H.Width.8.Height...Caption..&User Name:.FocusControl..Name...TLabel.Label6.Left.(.Top.x.Width.A.Height...Caption..&Organization:.FocusControl..Company...TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!.
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):202
                            Entropy (8bit):4.56478131967351
                            Encrypted:false
                            SSDEEP:6:aFiLYMtrk8FYMLYMtrk8W7qMtrkeqYRqMtrkt:+GYMtg+YMtgdmMtgpMtgt
                            MD5:2FA9DDBED5C616D3838AD3934F3B2D7D
                            SHA1:234B295897F4F8E6E991A5B362B5F5D8011EC24B
                            SHA-256:4FB0948F1707CE29811F05CB06169D1360B08445AAA180EAB814EBADDF2BB101
                            SHA-512:DAFE8B7BBF7BBFC6816707F131AB66924964576BD4BE5FD2986611212E7D7D436C71112CFCDD8EBF42F6C515700165D8305357DFA7030391E4B99E4998E91A70
                            Malicious:false
                            Preview:IF (Name.Text <> ) THEN Next.Enabled := True;..IF (Company.Text <> ) THEN Next.Enabled := True;..IF (Name.Text = ) THEN Next.Enabled := False;..IF (Company.Text = ) THEN Next.Enabled := False;..
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):32912
                            Entropy (8bit):3.310684742077839
                            Encrypted:false
                            SSDEEP:768:+tHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfMb:+VXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DP
                            MD5:C44488F6F633D32EA08F480FC760607C
                            SHA1:6979D51D6398EFFF9742D09E022534A05AB9271A
                            SHA-256:95C6B4CF234F726DDE2F63F9B162817A6807B3F33CC513C6FAF5E8BA0FB2A79A
                            SHA-512:1C8EA5B2C0898DB712D9027E1B2B8AB8B569B520CEFE755B62C648EA9EBB8C720357DD4DB9E6F03D4C8143C524942D22AE9FD83F89EF5553E5E88AFEA0235E53
                            Malicious:false
                            Preview:...TFRMDESIGN.0.|...TPF0.TfrmDesign.frmDesign.Left....Top.v.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o...
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):722
                            Entropy (8bit):4.629672896174913
                            Encrypted:false
                            SSDEEP:12:+GYMtg+YMtgPt0YMtgPrYMtgP0ZYMtgPpDYMtgPuYMtgdmMtgpMtg6tkMtg63Mth:+ff7kkKSHFmBBApVeNF
                            MD5:5D78380EBDAD86764F26B73474DF4900
                            SHA1:D2574CD9FB599E81C6099738D9D7974CE4039AFD
                            SHA-256:DAA5742D80E19668753D435DA0937A4409D22AF73FBAF9DF22EC4CBC34FF5D45
                            SHA-512:3533A9D8F4B1D8BD703856B150B8CBA99CA8CF55EF2182EB7B7326BF742C2B4B5CEA896B818FB690E0678689A8B452F22F5F548124D0B8302D776E8B2335B26D
                            Malicious:false
                            Preview:IF (Name.Text <> ) THEN Next.Enabled := True;..IF (Company.Text <> ) THEN Next.Enabled := True;..IF (Serial1.Text <> ) THEN Next.Enabled := True;..IF (Serial2.Text <> ) THEN Next.Enabled := True;..IF (Serial3.Text <> ) THEN Next.Enabled := True;..IF (Serial4.Text <> ) THEN Next.Enabled := True;..IF (Serial5.Text <> ) THEN Next.Enabled := True;..IF (Name.Text = ) THEN Next.Enabled := False;..IF (Company.Text = ) THEN Next.Enabled := False;..IF (Serial1.Text = ) THEN Next.Enabled := False;..IF (Serial2.Text = ) THEN Next.Enabled := False;..IF (Serial3.Text = ) THEN Next.Enabled := False;..IF (Serial4.Text = ) THEN Next.Enabled := False;..IF (Serial5.Text = ) THEN Next.Enabled := False;..
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):33198
                            Entropy (8bit):3.359763390973846
                            Encrypted:false
                            SSDEEP:768:DIHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5Dmoibf7q:DIXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DB
                            MD5:EFB592762376173C651EC1755E26DD1F
                            SHA1:3ECBFC3F6058E6F827A2FD91A7AB94EB7E60A045
                            SHA-256:ED39514751D8C9913F0A3C222F29FFC85F0EE3D107A222BD668DB96125190A03
                            SHA-512:062BBBBBEC95FA272D2F35EACAF2DE3D8BD3D04E027FB34059CD25D0E482D525393D81AA7DD575BDB5970DA298A87C916283983E2B66208B6787747D72E2D8A5
                            Malicious:false
                            Preview:...TFRMDESIGN.0.....TPF0.TfrmDesign.frmDesign.Left....Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TLabel.Label4.Left.(.Top.H.Width.I..Height.!.AutoSize..Caption..Please select a setup type..WordWrap....TBevel.Bevel2.Left...Top.:.Width....Height...Shape..bsTopLine...TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):159671
                            Entropy (8bit):1.9106205211543585
                            Encrypted:false
                            SSDEEP:192:mrRfzvu9vJSm3IZ8Zgspkk4B9heXItzNGzOiOWEpap5PKo6Mmp4C/DEtdmpJ:m5I/SKi
                            MD5:5773034B4AA211DB5CCCA92B4A346660
                            SHA1:99948D4B79CFB184B076CC156F7656E4C3604438
                            SHA-256:AF00C29E992E19D6DBE9D8DC5535BED62475F09B6E79EAE64B92E6B7CC801170
                            SHA-512:E6B23477655045A65442E383748C6883AC0560CC3152DC8A5D19D8DAAE0BD5345B28392C804F3E1B0A3572410CB1AFCEB1EA2C195A976DD432CB0705B2398953
                            Malicious:false
                            Preview:...TFRMDESIGN.0..o..TPF0.TfrmDesign.frmDesign.Left....Top.~.HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.:..Picture.Data..i...TBitmap~i..BM~i......6...(.......:...........He..................V-..a8..`9..b=..nD..yJ..zL...S..d@..gC..jE..jF..mH..rL..tK..sM..zQ..kG .mI .lI%.rN$.tO&.pN).{R#.{U .{S$.rP*.tP).sR..{W..}Y*.vU2.|Z2.yY6.}[5.zZ8.}^;..X...V...[...`...f...a...f...l...o...z...|...r...z...q...w...|...\#..X'..]$..Y)..[,.._/..^4..e'..h#..i%..l+..t...d2..b4..f6..e:..g=..h?..j<..l<..q<..~)..|1..}8..eD..kF..oJ..mA..sC..rD..uH..xM..xS..}V..zJ.................../...3...4...?...<...1...6...8.....................................................
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):32908
                            Entropy (8bit):3.3110543872756732
                            Encrypted:false
                            SSDEEP:768:qNHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfX1:q1XQ1NmO7ZDrkqzM+KGk1ccHq7kJT5De
                            MD5:5A8C8E081C329D3F53494AECEF81BD82
                            SHA1:9F1037A2CF254FA932D2A642C4ABD84E0770E167
                            SHA-256:FE73CBFCCECE99991601E653E816A1489425BC8701EEC2CF89724239316CC8CC
                            SHA-512:9565DD95764D8B6E1761E323BD12420E84733CB6D35DDAADE755186E208C81308231C891CF00296E4F2FE7493D7E9DEE04A68DA7624D8F69C49A2DAC4B865B01
                            Malicious:false
                            Preview:...TFRMDESIGN.0.x...TPF0.TfrmDesign.frmDesign.Left.u..Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o..
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):228
                            Entropy (8bit):4.823487220355037
                            Encrypted:false
                            SSDEEP:6:aoqLYMtrk8LTqMtrkegurusdrHE8Pud2dusdrHEt:jOYMtgQeMtg1dsdrHEUxIsdrHEt
                            MD5:8ED569EB90D7EC0791C65F696B85AA4B
                            SHA1:AA48F7BD2BA3A2F5DD63D25DA56A1039A18E7FB0
                            SHA-256:ABF9F1E255935EC3BA966B8CDA6D129F93F28F43F8C805523B4846769C90F788
                            SHA-512:3BDBBDF37199E6FEB281867FFDE480782905E0C24DB729DBF78D6FA0D92A363AA0CABBE20303E06D1327A24C3142F0EF72F8B0AF1ED268652DB301407A4F5926
                            Malicious:false
                            Preview:IF (MenuGroup.Text <> ) THEN Next.Enabled := True;..IF (MenuGroup.Text = ) THEN Next.Enabled := False;..IF (ISNT.Caption = TRUE) THEN AllUsers.Enabled := True;..IF (ISNT.Caption <> TRUE) THEN AllUsers.Enabled := False;..
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):159591
                            Entropy (8bit):1.9059323470293204
                            Encrypted:false
                            SSDEEP:192:26Rfzvu9vJSm3IZ8Zgspkk4B9heXItzNGzOiOWEpap5PKo6Mmp4CBH1qw3cmrw:2QI/VnP
                            MD5:C61886A33BF58C3BC38FA869019DA28E
                            SHA1:C2E1B87CCBD13CBE8AFB4FC278A5BA0635C97279
                            SHA-256:39056A7647F8135EDF8D8D80F81C53153CCE7E5BCC858ECC81BE6F0075692A26
                            SHA-512:65EDBD0675A8282ECD0CCD74BDA2F458D222EAFA5BF29BE61F5F081D3FB53B38797B57BBF78C544771F362ED6F03929FEAB19C2E6928222AAD8BC1A53DF81263
                            Malicious:false
                            Preview:...TFRMDESIGN.0.So..TPF0.TfrmDesign.frmDesign.Left.+..Top....HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.:..Picture.Data..i...TBitmap~i..BM~i......6...(.......:...........He..................V-..a8..`9..b=..nD..yJ..zL...S..d@..gC..jE..jF..mH..rL..tK..sM..zQ..kG .mI .lI%.rN$.tO&.pN).{R#.{U .{S$.rP*.tP).sR..{W..}Y*.vU2.|Z2.yY6.}[5.zZ8.}^;..X...V...[...`...f...a...f...l...o...z...|...r...z...q...w...|...\#..X'..]$..Y)..[,.._/..^4..e'..h#..i%..l+..t...d2..b4..f6..e:..g=..h?..j<..l<..q<..~)..|1..}8..eD..kF..oJ..mA..sC..rD..uH..xM..xS..}V..zJ.................../...3...4...?...<...1...6...8....................................................
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:JPEG XL codestream
                            Category:dropped
                            Size (bytes):31822
                            Entropy (8bit):3.1036618557972493
                            Encrypted:false
                            SSDEEP:768:sHHXQ1NmO7ZDrkqzM+KGlm1ccHq7kBTT5DmoibfU:snXQ1NmO7ZDrkqzM+KGk1ccHq7kJT5DB
                            MD5:01216764772CEB5308A494AFD9D73C37
                            SHA1:88A301C9F21316D7AA3B909C3EF18A3F3EC164F7
                            SHA-256:EC6130DCA3F4C1AF10559659024F6A5DC97D8B31E415715CF5C9D662BAC5743F
                            SHA-512:6E3399DCD1A3EC38045FF360E53FBC836CDCBC763AABFFC9253F07F9A9683E2D605F088E885BE0254096430601F484740240D739110E557C458BE0851868E7BA
                            Malicious:false
                            Preview:...TFRMDESIGN.0.:|..TPF0.TfrmDesign.frmDesign.Left....Top...HelpType..htKeyword.HelpKeyword..passingvariables.BorderIcons..biSystemMenu.biMinimize..BorderStyle..bsSingle.Caption..$TITLE$.ClientHeight.h..ClientWidth....Color..clBtnFace.Font.Charset..DEFAULT_CHARSET.Font.Color..clWindowText.Font.Height...Font.Name..Tahoma.Font.Style...OldCreateOrder..Position..poDesigned.PixelsPerInch.`.TextHeight....TImage.Image1.Left...Top...Width....Height.;.Picture.Data.~w...TBitmaprw..BMrw......6...(.......;...........<s..................V-..^4..^6.._8..g;..a9..oB..xI..iB..gB..rK..nJ#.qN(.rP*.wT(.sQ,.uT/.wV2.}[1.zY6.~\5.|\9..P...W...^..._...e...c...i...l...s...{...y...z...|.......Z!.._2..i<..dB..jJ..mM..sF..zO..}O..sU..uW..uX..z^..}P..}a..........................................................).....!..!..$..&..(..*..-..<..1..4..7..;...Z...j...l...m...v...y...~...~..A..F..F..M..I..M..P..Q..T..[..]..X..m..d..w...}..r..a..n..m...Z...]...e...b...j...o...
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7500
                            Entropy (8bit):7.16354760210281
                            Encrypted:false
                            SSDEEP:192:N5PCjwnYe+PjP3rTqavM+vmr9ZCspE+TMAr+sMUYu4:yEnYPL3qaLeMnLQ4
                            MD5:B3A76DE50584DD20EDB7A1320F7E6C06
                            SHA1:6884659420A4A904975BE363B8B71197F35DF423
                            SHA-256:6DB1061C1712E03CC45ADAC730AF50DFA7AB2B29F4A585A0A866573E0023D5F3
                            SHA-512:5E33D07BC96082ED78EE9C45F8E4248E7AA8C872FB91D60A73623AFA593400CD47AB1F79A69166541206936156F3B0CE08E0B851561080E068F3E0288CA8072F
                            Malicious:false
                            Preview:0..H..*.H.........90..5...1.0...+......0.....+.....7......0...0...+.....7.....l...0E.B..y?t.....140516140009Z0...+.....7.....0..z0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..e0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.5.F.4.E.7.6.D.6.1.4.1.B.2.7.5.8.5.D.6.F.8.3.7.3.1.D.2.A.A.D.C.A.2.F.8.F.5.8.B...1..]0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........maA.u...71.....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9694
                            Entropy (8bit):5.199518545726912
                            Encrypted:false
                            SSDEEP:192:B8HvMWGtLZlAdwo3UqTMK4fRb7FsIVkTBgdvXnG4izeVtcw:B8H4l2tNTMK4ftRTkVEnGdzAf
                            MD5:1CA510E30084F95389EF4EEB6D44398D
                            SHA1:C5F4E76D6141B27585D6F83731D2AADCA2F8F58B
                            SHA-256:0ED6EBAEC6DEAD6FDA901B3276715E9EC35FF757C02A27D3526ACC6EEFFEF457
                            SHA-512:21ED2655F9FBDB7732B2DA8F5DF316BE4DAE80561209E49A58AAC4D69DFCF11A007A9565C3F78309DC6BC350A47F67BC4F4B559B2A8A5C340A7D60289CD243A5
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7500
                            Entropy (8bit):7.16354760210281
                            Encrypted:false
                            SSDEEP:192:N5PCjwnYe+PjP3rTqavM+vmr9ZCspE+TMAr+sMUYu4:yEnYPL3qaLeMnLQ4
                            MD5:B3A76DE50584DD20EDB7A1320F7E6C06
                            SHA1:6884659420A4A904975BE363B8B71197F35DF423
                            SHA-256:6DB1061C1712E03CC45ADAC730AF50DFA7AB2B29F4A585A0A866573E0023D5F3
                            SHA-512:5E33D07BC96082ED78EE9C45F8E4248E7AA8C872FB91D60A73623AFA593400CD47AB1F79A69166541206936156F3B0CE08E0B851561080E068F3E0288CA8072F
                            Malicious:false
                            Preview:0..H..*.H.........90..5...1.0...+......0.....+.....7......0...0...+.....7.....l...0E.B..y?t.....140516140009Z0...+.....7.....0..z0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..e0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.5.F.4.E.7.6.D.6.1.4.1.B.2.7.5.8.5.D.6.F.8.3.7.3.1.D.2.A.A.D.C.A.2.F.8.F.5.8.B...1..]0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........maA.u...71.....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9694
                            Entropy (8bit):5.199518545726912
                            Encrypted:false
                            SSDEEP:192:B8HvMWGtLZlAdwo3UqTMK4fRb7FsIVkTBgdvXnG4izeVtcw:B8H4l2tNTMK4ftRTkVEnGdzAf
                            MD5:1CA510E30084F95389EF4EEB6D44398D
                            SHA1:C5F4E76D6141B27585D6F83731D2AADCA2F8F58B
                            SHA-256:0ED6EBAEC6DEAD6FDA901B3276715E9EC35FF757C02A27D3526ACC6EEFFEF457
                            SHA-512:21ED2655F9FBDB7732B2DA8F5DF316BE4DAE80561209E49A58AAC4D69DFCF11A007A9565C3F78309DC6BC350A47F67BC4F4B559B2A8A5C340A7D60289CD243A5
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7532
                            Entropy (8bit):7.160287296745998
                            Encrypted:false
                            SSDEEP:192:hF8WkNCjInYe+PjP3rTqavM+vmr9ZCspE+TMAr+VykqZ:T8a8nYPL3qaLeMnVy/
                            MD5:F9A900E64BE138468DBACBC488511E8F
                            SHA1:2F8F2A07A80DC53DEE2F1B687E50D71403C66C5B
                            SHA-256:F0E7DD66F59AA78446C0A5D069F989792584D3BB8A47E69B161D278E43A58877
                            SHA-512:BA85D4D138E497A447546937B637DD7504BFFDCD04B8026C729B87F2DAC095F9739D1B0F76BE90EF6A7D1D7B201B4B8574AE4F01BC65329BB12203671F253EB8
                            Malicious:false
                            Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....\5.k>..A....N....140516140005Z0...+.....7.....0...0....R1.2.F.2.C.9.7.D.E.F.8.3.A.5.A.2.A.E.E.2.6.3.E.A.3.E.7.6.1.E.E.2.8.C.8.5.B.3.1.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........}....c.>v....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9758
                            Entropy (8bit):5.199812485547983
                            Encrypted:false
                            SSDEEP:192:B8HvMWG/LZlAdwo3UqTM84fRb7lsIVkTBgdJXnG4EzeVtc2gaj:B8HGl2tNTM84ftJTkVanG/zAl
                            MD5:04ACD4E8BFA9089D2120AE8872190CB3
                            SHA1:12F2C97DEF83A5A2AEE263EA3E761EE28C85B318
                            SHA-256:D5E60140FC42A8C26566C5D99822F449ECC51C4D8AFF2235FABBD5767AC5E779
                            SHA-512:22046E62109D752F0A3AB67962B70AE65925F3A897287EF64C59592BF11E7EC697F23FEB56AD43EDC8161F4CF144CFBA76421529C6ACA0DC9D523D762DD29DE9
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7532
                            Entropy (8bit):7.160287296745998
                            Encrypted:false
                            SSDEEP:192:hF8WkNCjInYe+PjP3rTqavM+vmr9ZCspE+TMAr+VykqZ:T8a8nYPL3qaLeMnVy/
                            MD5:F9A900E64BE138468DBACBC488511E8F
                            SHA1:2F8F2A07A80DC53DEE2F1B687E50D71403C66C5B
                            SHA-256:F0E7DD66F59AA78446C0A5D069F989792584D3BB8A47E69B161D278E43A58877
                            SHA-512:BA85D4D138E497A447546937B637DD7504BFFDCD04B8026C729B87F2DAC095F9739D1B0F76BE90EF6A7D1D7B201B4B8574AE4F01BC65329BB12203671F253EB8
                            Malicious:false
                            Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....\5.k>..A....N....140516140005Z0...+.....7.....0...0....R1.2.F.2.C.9.7.D.E.F.8.3.A.5.A.2.A.E.E.2.6.3.E.A.3.E.7.6.1.E.E.2.8.C.8.5.B.3.1.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........}....c.>v....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9758
                            Entropy (8bit):5.199812485547983
                            Encrypted:false
                            SSDEEP:192:B8HvMWG/LZlAdwo3UqTM84fRb7lsIVkTBgdJXnG4EzeVtc2gaj:B8HGl2tNTM84ftJTkVanG/zAl
                            MD5:04ACD4E8BFA9089D2120AE8872190CB3
                            SHA1:12F2C97DEF83A5A2AEE263EA3E761EE28C85B318
                            SHA-256:D5E60140FC42A8C26566C5D99822F449ECC51C4D8AFF2235FABBD5767AC5E779
                            SHA-512:22046E62109D752F0A3AB67962B70AE65925F3A897287EF64C59592BF11E7EC697F23FEB56AD43EDC8161F4CF144CFBA76421529C6ACA0DC9D523D762DD29DE9
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):9576
                            Entropy (8bit):7.214945113432049
                            Encrypted:false
                            SSDEEP:192:3GmgPCj2yowJL/cu7RZgjlorfpx+viJdr9ZCspE+TMcrbdYr:39xSYJLca6jIp3weM+M
                            MD5:F4F90EDFE025F3C918A7D4992F103A48
                            SHA1:34A3A6E4711D1625CB29B5A800EF1D9569373A41
                            SHA-256:51BE8127BE3D3F651D269A0885D66D16CA4030079CB8019754D7D5662090B203
                            SHA-512:CD62D1FDE1741DE0F0EC81DB325A210305C72344FD9E111011C6264EAC5FF3E84C8E22CC779EFCB3449A4839164BE068D00D249C795B68D98E3702FEFBB5FD6A
                            Malicious:false
                            Preview:0.%d..*.H........%U0.%Q...1.0...+......0.....+.....7......0...0...+.....7.........A@>C.<.._B.7..111202130217Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RD.2.4.7.5.3.B.F.3.E.9.E.4.4.F.0.4.5.5.A.7.C.C.8.8.8.0.3.D.2.A.C.0.7.2.7.C.8.C.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........GS.>.D.EZ|....'..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9774
                            Entropy (8bit):5.201512481427886
                            Encrypted:false
                            SSDEEP:192:B8HvMWG/LZlAdwo3UqTMK4fRbK6sIVkTBgdJXnG4EzeVtc28SJn:B8HGl2tNTMK4ftzTkVanG/zArZ
                            MD5:9232DCCBA703DBE10F07D17480D831F9
                            SHA1:D24753BF3E9E44F0455A7CC88803D2AC0727C8C8
                            SHA-256:792CE4DA7EA6403A6D53A6F5C563F686CD72989E716CABFF6FAED59DE477F8C2
                            SHA-512:03772B2742906A1AE260A30C97E52997A869B79C2D7A7491681F2E506757F8E057075CE4F1BB63761D6BA748AA6D28E0AA7B5930BDF3FC5B1A2637F88AD9BC33
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):9576
                            Entropy (8bit):7.214945113432049
                            Encrypted:false
                            SSDEEP:192:3GmgPCj2yowJL/cu7RZgjlorfpx+viJdr9ZCspE+TMcrbdYr:39xSYJLca6jIp3weM+M
                            MD5:F4F90EDFE025F3C918A7D4992F103A48
                            SHA1:34A3A6E4711D1625CB29B5A800EF1D9569373A41
                            SHA-256:51BE8127BE3D3F651D269A0885D66D16CA4030079CB8019754D7D5662090B203
                            SHA-512:CD62D1FDE1741DE0F0EC81DB325A210305C72344FD9E111011C6264EAC5FF3E84C8E22CC779EFCB3449A4839164BE068D00D249C795B68D98E3702FEFBB5FD6A
                            Malicious:false
                            Preview:0.%d..*.H........%U0.%Q...1.0...+......0.....+.....7......0...0...+.....7.........A@>C.<.._B.7..111202130217Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RD.2.4.7.5.3.B.F.3.E.9.E.4.4.F.0.4.5.5.A.7.C.C.8.8.8.0.3.D.2.A.C.0.7.2.7.C.8.C.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........GS.>.D.EZ|....'..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9774
                            Entropy (8bit):5.201512481427886
                            Encrypted:false
                            SSDEEP:192:B8HvMWG/LZlAdwo3UqTMK4fRbK6sIVkTBgdJXnG4EzeVtc28SJn:B8HGl2tNTMK4ftzTkVanG/zArZ
                            MD5:9232DCCBA703DBE10F07D17480D831F9
                            SHA1:D24753BF3E9E44F0455A7CC88803D2AC0727C8C8
                            SHA-256:792CE4DA7EA6403A6D53A6F5C563F686CD72989E716CABFF6FAED59DE477F8C2
                            SHA-512:03772B2742906A1AE260A30C97E52997A869B79C2D7A7491681F2E506757F8E057075CE4F1BB63761D6BA748AA6D28E0AA7B5930BDF3FC5B1A2637F88AD9BC33
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):8060
                            Entropy (8bit):5.464471468898182
                            Encrypted:false
                            SSDEEP:192:rZyVhFTzHjHP2CSIizfTQAkVxdUM47BjzFPaXp5MFrgD/tc6XVFXThjXT9lXAEj8:dyVhFTzHjHP2CSIiz7QAkVxdUM47Bj5X
                            MD5:9F49B8D570D061E87A7E813493003AB4
                            SHA1:B30ADE0A13BACE18D24F380F9201420104BC1974
                            SHA-256:86997407997321AD6D18E258086E5AA2323EF18736A0B49A4A5A1DDE084CD608
                            SHA-512:F9BC3DE550159DA045794E424FABA056E7AB37DBE23215701A8F9F43367661F73CE703AC1E6EDF22CC8D3E4E312014BA169C444290E87DA054C18A1304D564D3
                            Malicious:false
                            Preview:SourceDir..C:\PROGRA~3\{CDCC2~1\..$ex..MEDIAPACKAGEPATH..\PROGRA~3\..$ex..A76FCA102..FALSE..$ex..A150AC403..FALSE..$ex..A1ABF3862..FALSE..$ex..A502E833A..FALSE..$ex..ACE56FB43..FALSE..$ex..A52B152B3..FALSE..$ex..AC0AC9330..FALSE..$ex..AE09F5A5F..FALSE..$ex..AF2F92670..FALSE..$ex..A94312164..FALSE..$ex..A5809A5D8..FALSE..$ex..A56A7DD7A..FALSE..$ex..A1A9DA512..FALSE..$ex..A84FEA59D..FALSE..$ex..A849003A2..FALSE..$ex..A98500B5D..FALSE..$ex..A4F27760E..FALSE..$ex..A4D56F533..FALSE..$ex..A7AA455DC..FALSE..$ex..AE1318D92..FALSE..$ex..A66980B9F..FALSE..$ex..A9167C40A..FALSE..$ex..A15F69ECD..FALSE..$ex..AB06B5044..FALSE..$ex..A66E41FEB..FALSE..$ex..A9E7D6EA9..FALSE..$ex..AB258770..FALSE..$ex..AB5CD4D0..FALSE..$ex..A537BC2C1..FALSE..$ex..A5D1665DA..FALSE..$ex..A6EB99A04..FALSE..$ex..AF5C9AD93..FALSE..$ex..A21D6E643..FALSE..$ex..A63D6488F..FALSE..$ex..AF835DFEA..FALSE..$ex..A9115C352..FALSE..$ex..A76FCA102..TRUE..$ex..P76FCA102_1..C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens..$
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7524
                            Entropy (8bit):7.155823358156326
                            Encrypted:false
                            SSDEEP:192:66ohNCjenYe+PjP3rTqavM+vmr9ZCspE+TMAr+0+:r6nYPL3qaLeMnf
                            MD5:78FE95788DB8E3332DA03D9B86943407
                            SHA1:1D9648350CD10A6C9FB33DC87F895C23E049FB8E
                            SHA-256:B56D737983F4B59B34A0CAC7B748617DEFA159965FBEE3B693D767364FE641F0
                            SHA-512:784EA0F012D53856668AE36F6CEFBCA3DBCADE69C20E6A3F42EC899535E3CA774D8C23FC03CBBAB0B4E1DC25DF0029C4C409A2E02D085896BB6D42252CDDED9A
                            Malicious:false
                            Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......8d&?u.@.....`o...140516140007Z0...+.....7.....0...0....R5.6.1.3.1.A.E.B.2.C.6.E.7.9.4.7.E.1.F.B.7.C.B.2.8.2.6.3.8.B.5.8.B.7.0.5.6.7.8.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........V...,nyG..|..c.X..g.0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9742
                            Entropy (8bit):5.203938700783149
                            Encrypted:false
                            SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1g4fRb7J2sIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTMG4ft8TkV1nGkzA2
                            MD5:7FBD82746CF38DA2A8728A7C47112124
                            SHA1:56131AEB2C6E7947E1FB7CB282638B58B705678C
                            SHA-256:EFAD8843EB281869659A13CE3FCC48D5922C85A5CF63F4E91A6C22B0B9683F2D
                            SHA-512:DCE593288E62E60CBC6E2C3CB1EED01B56A3431F324D877D41D98F3F38D20B2276A117EB9106B690C03A5816285D6864A0DD0A99132E0781C007B8C66D72C3D6
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7524
                            Entropy (8bit):7.155823358156326
                            Encrypted:false
                            SSDEEP:192:66ohNCjenYe+PjP3rTqavM+vmr9ZCspE+TMAr+0+:r6nYPL3qaLeMnf
                            MD5:78FE95788DB8E3332DA03D9B86943407
                            SHA1:1D9648350CD10A6C9FB33DC87F895C23E049FB8E
                            SHA-256:B56D737983F4B59B34A0CAC7B748617DEFA159965FBEE3B693D767364FE641F0
                            SHA-512:784EA0F012D53856668AE36F6CEFBCA3DBCADE69C20E6A3F42EC899535E3CA774D8C23FC03CBBAB0B4E1DC25DF0029C4C409A2E02D085896BB6D42252CDDED9A
                            Malicious:false
                            Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......8d&?u.@.....`o...140516140007Z0...+.....7.....0...0....R5.6.1.3.1.A.E.B.2.C.6.E.7.9.4.7.E.1.F.B.7.C.B.2.8.2.6.3.8.B.5.8.B.7.0.5.6.7.8.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........V...,nyG..|..c.X..g.0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9742
                            Entropy (8bit):5.203938700783149
                            Encrypted:false
                            SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1g4fRb7J2sIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTMG4ft8TkV1nGkzA2
                            MD5:7FBD82746CF38DA2A8728A7C47112124
                            SHA1:56131AEB2C6E7947E1FB7CB282638B58B705678C
                            SHA-256:EFAD8843EB281869659A13CE3FCC48D5922C85A5CF63F4E91A6C22B0B9683F2D
                            SHA-512:DCE593288E62E60CBC6E2C3CB1EED01B56A3431F324D877D41D98F3F38D20B2276A117EB9106B690C03A5816285D6864A0DD0A99132E0781C007B8C66D72C3D6
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):6207
                            Entropy (8bit):5.445328020722464
                            Encrypted:false
                            SSDEEP:192:86NgV1JraG6XVFGVhjXy9hXATNiFSJLOV:tca9XVFGVEARiFSJyV
                            MD5:6666B907D613082581C25DDA1982F049
                            SHA1:618AECD9FEB5D7472884994E815CD3D1F135724C
                            SHA-256:787D0927ABD1DEDF96B539D1E70B36BB1DDE2D266DC48BE99DE4F96C96F4637D
                            SHA-512:E4CE433700587FA1D0A50D5D54733E55C9AC161F9EC651785F63E8E65A698FEFB91C6FF4C792F7F1958B8286ADBF4037009910B3F671A8A79B2DC183ABC37B92
                            Malicious:false
                            Preview:SourceDir..C:\PROGRA~3\{C39D0~1\..$ex..MEDIAPACKAGEPATH..\PROGRA~3\..$ex..AEDD97940..FALSE..$ex..A3CE6DECE..FALSE..$ex..A34E6DE3C..FALSE..$ex..A25D64044..FALSE..$ex..A3476C065..FALSE..$ex..A8135F827..FALSE..$ex..A8808A0B2..FALSE..$ex..ACC3273D..FALSE..$ex..AA913E6AF..FALSE..$ex..ACECD985D..FALSE..$ex..AC5D9D236..FALSE..$ex..A1A2661C4..FALSE..$ex..AC64028C1..FALSE..$ex..A3CEB12CD..FALSE..$ex..A1872974D..FALSE..$ex..AD4D85249..FALSE..$ex..AEACB8D8..FALSE..$ex..A7C4CDFEC..FALSE..$ex..A95FFAA1..FALSE..$ex..AF0FC8706..FALSE..$ex..AD7FB24C5..FALSE..$ex..A86D611ED..FALSE..$ex..AEDD97940..TRUE..$ex..PEDD97940_1..C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK..$ex..A3CE6DECE..TRUE..$ex..P3CE6DECE_1..C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK..$ex..A34E6DE3C..TRUE..$ex..P34E6DE3C_1..C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK..$ex..A25D64044..TRUE..$ex..P25D64044_1..C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK..$ex..A3476C0
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7524
                            Entropy (8bit):7.155292171931641
                            Encrypted:false
                            SSDEEP:192:64JPCjTnYe+PjP3rTqavM+vmr9ZCspE+TMAr+YR:iPnYPL3qaLeMnw
                            MD5:9C27BFE6E80B05E7DADB26DAD826984A
                            SHA1:724DFF2E442DD2D17ED6D100E9FD2D93786C79B8
                            SHA-256:C7045DFCCD4CF9D28999893C47CB4B28EA3AB0E8BD5C3C1ED7D4F3FE6EF2026F
                            SHA-512:A8225CFA0FBB7800C30978ACCE5CD8C49F481EB9BFF0E99037C7A569D1286837A027F6CC85B35A2469E2258AE3B32DD4E20095980FC0FF2C7B2094C1BEC0523B
                            Malicious:false
                            Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......P.e...@.y.....V..140916104248Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.1.6.F.4.D.0.E.E.6.9.6.F.0.B.A.C.C.1.E.0.3.7.1.5.5.7.9.3.B.A.C.D.2.7.D.0.3.3.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........oM......qUy;..}.<0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9742
                            Entropy (8bit):5.19974129042694
                            Encrypted:false
                            SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1l4fRb7JsIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTML4ftlTkV1nGkzA2
                            MD5:54604542F5A3385064DE1524F57D21E0
                            SHA1:C16F4D0EE696F0BACC1E037155793BACD27D033C
                            SHA-256:A3D693423160DCE3A729F8E97AA0085D0731B9F57C7C2ECFA6C8ABEBF52C28B8
                            SHA-512:967C9E400CB8C68560B01AB07629AF58403F9527377ABBBAC49E73A3D8CB9FFDE90EE772554700BC5F88D113B0AA9F19720D4AF2461635E52FFA77D6CB593932
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7524
                            Entropy (8bit):7.155292171931641
                            Encrypted:false
                            SSDEEP:192:64JPCjTnYe+PjP3rTqavM+vmr9ZCspE+TMAr+YR:iPnYPL3qaLeMnw
                            MD5:9C27BFE6E80B05E7DADB26DAD826984A
                            SHA1:724DFF2E442DD2D17ED6D100E9FD2D93786C79B8
                            SHA-256:C7045DFCCD4CF9D28999893C47CB4B28EA3AB0E8BD5C3C1ED7D4F3FE6EF2026F
                            SHA-512:A8225CFA0FBB7800C30978ACCE5CD8C49F481EB9BFF0E99037C7A569D1286837A027F6CC85B35A2469E2258AE3B32DD4E20095980FC0FF2C7B2094C1BEC0523B
                            Malicious:false
                            Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......P.e...@.y.....V..140916104248Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.1.6.F.4.D.0.E.E.6.9.6.F.0.B.A.C.C.1.E.0.3.7.1.5.5.7.9.3.B.A.C.D.2.7.D.0.3.3.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........oM......qUy;..}.<0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9742
                            Entropy (8bit):5.19974129042694
                            Encrypted:false
                            SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1l4fRb7JsIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTML4ftlTkV1nGkzA2
                            MD5:54604542F5A3385064DE1524F57D21E0
                            SHA1:C16F4D0EE696F0BACC1E037155793BACD27D033C
                            SHA-256:A3D693423160DCE3A729F8E97AA0085D0731B9F57C7C2ECFA6C8ABEBF52C28B8
                            SHA-512:967C9E400CB8C68560B01AB07629AF58403F9527377ABBBAC49E73A3D8CB9FFDE90EE772554700BC5F88D113B0AA9F19720D4AF2461635E52FFA77D6CB593932
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7540
                            Entropy (8bit):7.156208031117259
                            Encrypted:false
                            SSDEEP:192:jwn9PCj+nYe+PjP3rTqavM+vmr9ZCspE+TMAr+7+Yac:jjanYPL3qaLeMnOc
                            MD5:16AC4FA94C22381E7A4A50141307A54D
                            SHA1:D796A30A98D895D0BC49A09D0A6F63EABD81BD7A
                            SHA-256:9E5588D557F378CB386D0414D21EA256C60D11DE9D1B915F671B260147B98498
                            SHA-512:3FD8DDA6D71949791E1C2728E5B49EA81032BC5C0D3456DE7C4652479AE023FC5D65E0AF7773C2556F52039FC290C81FF1FBDA3709A5FA8CA81E657F932535EC
                            Malicious:false
                            Preview:0..p..*.H.........a0..]...1.0...+......0.....+.....7......0...0...+.....7......b.B...B..$......140516140010Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..y0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....R9.E.E.A.E.F.F.4.6.8.D.6.2.8.0.1.4.9.C.8.9.9.2.3.2.E.8.8.7.D.2.E.C.9.7.1.F.1.1.6...1..q0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+............h.(.I.#..}..q..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9774
                            Entropy (8bit):5.200356426579818
                            Encrypted:false
                            SSDEEP:192:B8HvMWG5LZlAdwo3UqTMG4fRb7isIVkTBgdbXnG4+zeVtc2PdT:B8HMl2tNTMG4ft+TkVQnGpzAJ
                            MD5:2AF89E9CB43E93768CA169CB76756123
                            SHA1:9EEAEFF468D6280149C899232E887D2EC971F116
                            SHA-256:303847238B729D0A2D49F93073AC882120FF112C93046845A855A3FC192D6A17
                            SHA-512:43CFED37B4946FB95BD31A33D3EFCC273446FEB13D34593134AB1CB909ACF83FBAD1B5556F092CADA0B5AD3492E2976E010966259CC2E205678CC8620310845F
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7540
                            Entropy (8bit):7.156208031117259
                            Encrypted:false
                            SSDEEP:192:jwn9PCj+nYe+PjP3rTqavM+vmr9ZCspE+TMAr+7+Yac:jjanYPL3qaLeMnOc
                            MD5:16AC4FA94C22381E7A4A50141307A54D
                            SHA1:D796A30A98D895D0BC49A09D0A6F63EABD81BD7A
                            SHA-256:9E5588D557F378CB386D0414D21EA256C60D11DE9D1B915F671B260147B98498
                            SHA-512:3FD8DDA6D71949791E1C2728E5B49EA81032BC5C0D3456DE7C4652479AE023FC5D65E0AF7773C2556F52039FC290C81FF1FBDA3709A5FA8CA81E657F932535EC
                            Malicious:false
                            Preview:0..p..*.H.........a0..]...1.0...+......0.....+.....7......0...0...+.....7......b.B...B..$......140516140010Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..y0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....R9.E.E.A.E.F.F.4.6.8.D.6.2.8.0.1.4.9.C.8.9.9.2.3.2.E.8.8.7.D.2.E.C.9.7.1.F.1.1.6...1..q0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+............h.(.I.#..}..q..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9774
                            Entropy (8bit):5.200356426579818
                            Encrypted:false
                            SSDEEP:192:B8HvMWG5LZlAdwo3UqTMG4fRb7isIVkTBgdbXnG4+zeVtc2PdT:B8HMl2tNTMG4ft+TkVQnGpzAJ
                            MD5:2AF89E9CB43E93768CA169CB76756123
                            SHA1:9EEAEFF468D6280149C899232E887D2EC971F116
                            SHA-256:303847238B729D0A2D49F93073AC882120FF112C93046845A855A3FC192D6A17
                            SHA-512:43CFED37B4946FB95BD31A33D3EFCC273446FEB13D34593134AB1CB909ACF83FBAD1B5556F092CADA0B5AD3492E2976E010966259CC2E205678CC8620310845F
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7532
                            Entropy (8bit):7.163912217919972
                            Encrypted:false
                            SSDEEP:192:hF2lRtPCj1nYe+PjP3rTqavM+vmr9ZCspE+TMAr+Nm0jPgH:T2gJnYPL3qaLeMnk5
                            MD5:EC1239127DC978757B0B9CC27D35128E
                            SHA1:DD4FE65A456D244DAA29E85FF5AF7E1B4BF64014
                            SHA-256:FD4981D78D8F37AAA13BEDB75406B61FF24BE17589187AC1D8FE8E8DDF0B1863
                            SHA-512:EC3C70835A009A719893B54B682BC3ED6085F506D29E1C93E255040B633ECED4DA7449C16B5F636119EB9F97314A8ADE347D9FC0B3C4ECD5A082FA771CCAA0C7
                            Malicious:false
                            Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....Y....+,J...U..X...140516140008Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RA.1.6.D.E.3.5.E.A.B.4.E.6.E.5.1.B.E.4.5.4.4.7.9.3.A.0.5.D.B.C.6.6.8.2.9.8.D.E.B...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........m.^.NnQ.EDy:...h)..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9758
                            Entropy (8bit):5.200481985878872
                            Encrypted:false
                            SSDEEP:192:B8HvMWGzLZlAdwo3UqTMH4fRbz7sIVkTBgdVXnG4QzeVtc2UWv:B8H6l2tNTMH4ft/TkVmnGLzAJ
                            MD5:120CBBA255C66FBCAAD7D49BCF567FA5
                            SHA1:A16DE35EAB4E6E51BE4544793A05DBC668298DEB
                            SHA-256:17E11451106D4DC767CE654D828EC5C3DE1AD9000BD51B7F5E2CA87334C71179
                            SHA-512:73D7A772C5F9EBAB0D363DAF3BDCBB176B0EAE6A170258D9E1EE5D1AF7D7A194C1D1716364BE411EF5CFBD1DEB69A0ECAEFB9FC8CFF08ABD68DC13B630E533EE
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7532
                            Entropy (8bit):7.163912217919972
                            Encrypted:false
                            SSDEEP:192:hF2lRtPCj1nYe+PjP3rTqavM+vmr9ZCspE+TMAr+Nm0jPgH:T2gJnYPL3qaLeMnk5
                            MD5:EC1239127DC978757B0B9CC27D35128E
                            SHA1:DD4FE65A456D244DAA29E85FF5AF7E1B4BF64014
                            SHA-256:FD4981D78D8F37AAA13BEDB75406B61FF24BE17589187AC1D8FE8E8DDF0B1863
                            SHA-512:EC3C70835A009A719893B54B682BC3ED6085F506D29E1C93E255040B633ECED4DA7449C16B5F636119EB9F97314A8ADE347D9FC0B3C4ECD5A082FA771CCAA0C7
                            Malicious:false
                            Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....Y....+,J...U..X...140516140008Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RA.1.6.D.E.3.5.E.A.B.4.E.6.E.5.1.B.E.4.5.4.4.7.9.3.A.0.5.D.B.C.6.6.8.2.9.8.D.E.B...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........m.^.NnQ.EDy:...h)..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9758
                            Entropy (8bit):5.200481985878872
                            Encrypted:false
                            SSDEEP:192:B8HvMWGzLZlAdwo3UqTMH4fRbz7sIVkTBgdVXnG4QzeVtc2UWv:B8H6l2tNTMH4ft/TkVmnGLzAJ
                            MD5:120CBBA255C66FBCAAD7D49BCF567FA5
                            SHA1:A16DE35EAB4E6E51BE4544793A05DBC668298DEB
                            SHA-256:17E11451106D4DC767CE654D828EC5C3DE1AD9000BD51B7F5E2CA87334C71179
                            SHA-512:73D7A772C5F9EBAB0D363DAF3BDCBB176B0EAE6A170258D9E1EE5D1AF7D7A194C1D1716364BE411EF5CFBD1DEB69A0ECAEFB9FC8CFF08ABD68DC13B630E533EE
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7528
                            Entropy (8bit):7.161254074300881
                            Encrypted:false
                            SSDEEP:192:LYRINCjanYe+PjP3rTqavM+vmr9ZCspE+TMAr+DtJ:a+nYPL3qaLeMnD
                            MD5:5C737957A4385512FD021458107C0CE6
                            SHA1:F5815B5B9EFFA9C7B8850B84C504CC5487DB2D4C
                            SHA-256:EFF94634DCAD8CF3D2F5633E58772368280D79B0C5DCC825D71256B70B07F37E
                            SHA-512:DFC6F4074BA83AF03F50028A3B70D980272A139E56DA7994764F6F91A44742E7498C2BFF88485E2FDC86080FE99AED582ECE55D065AA9B2D731A6AAFC685DA4E
                            Malicious:false
                            Preview:0..d..*.H.........U0..Q...1.0...+......0.....+.....7......0...0...+.....7......-.'.g.H....E.`...140516140004Z0...+.....7.....0...0....R3.A.2.7.2.A.5.7.1.B.E.9.B.B.5.E.9.C.C.2.2.F.5.3.7.A.A.2.6.4.B.1.C.3.D.1.C.D.4.5...1..k0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........:'*W..^../Sz.d....E0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..s0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9750
                            Entropy (8bit):5.199048245781225
                            Encrypted:false
                            SSDEEP:192:B8HvMWGpLZlAdwo3UqTMw4fRb704sIVkTBgdhXnG48zeVtc24yr:B8Hil2tNTMw4ftw4TkVMnGVzAL
                            MD5:5BE543804F4C61874D3CA9F979F78AD7
                            SHA1:3A272A571BE9BB5E9CC22F537AA264B1C3D1CD45
                            SHA-256:DA73278D43CD6EDA99F92C24CD6674C71238F2795CDA1B06DD2F8B0F263E1036
                            SHA-512:520B1674F908B86D56E9679A201A34A31C2B8A792281542E4720DD87D1D2C5DEE87BB6F8469F624213C9A3BE55AC5973BF6B220FF7CC0C9EF77F9AA8412E8251
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7528
                            Entropy (8bit):7.161254074300881
                            Encrypted:false
                            SSDEEP:192:LYRINCjanYe+PjP3rTqavM+vmr9ZCspE+TMAr+DtJ:a+nYPL3qaLeMnD
                            MD5:5C737957A4385512FD021458107C0CE6
                            SHA1:F5815B5B9EFFA9C7B8850B84C504CC5487DB2D4C
                            SHA-256:EFF94634DCAD8CF3D2F5633E58772368280D79B0C5DCC825D71256B70B07F37E
                            SHA-512:DFC6F4074BA83AF03F50028A3B70D980272A139E56DA7994764F6F91A44742E7498C2BFF88485E2FDC86080FE99AED582ECE55D065AA9B2D731A6AAFC685DA4E
                            Malicious:false
                            Preview:0..d..*.H.........U0..Q...1.0...+......0.....+.....7......0...0...+.....7......-.'.g.H....E.`...140516140004Z0...+.....7.....0...0....R3.A.2.7.2.A.5.7.1.B.E.9.B.B.5.E.9.C.C.2.2.F.5.3.7.A.A.2.6.4.B.1.C.3.D.1.C.D.4.5...1..k0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........:'*W..^../Sz.d....E0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..s0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9750
                            Entropy (8bit):5.199048245781225
                            Encrypted:false
                            SSDEEP:192:B8HvMWGpLZlAdwo3UqTMw4fRb704sIVkTBgdhXnG48zeVtc24yr:B8Hil2tNTMw4ftw4TkVMnGVzAL
                            MD5:5BE543804F4C61874D3CA9F979F78AD7
                            SHA1:3A272A571BE9BB5E9CC22F537AA264B1C3D1CD45
                            SHA-256:DA73278D43CD6EDA99F92C24CD6674C71238F2795CDA1B06DD2F8B0F263E1036
                            SHA-512:520B1674F908B86D56E9679A201A34A31C2B8A792281542E4720DD87D1D2C5DEE87BB6F8469F624213C9A3BE55AC5973BF6B220FF7CC0C9EF77F9AA8412E8251
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:modified
                            Size (bytes):39898
                            Entropy (8bit):3.728795323107343
                            Encrypted:false
                            SSDEEP:384:64S0ScS6VWCSlSNSddrgSBSpS9dwaSxS5SIlgoSWS+SIF9lS3S/SL9EOSUS8SGNC:6MW3rNwYgq9+E+x4V
                            MD5:E94B7F6DFD11666219A32954D6375E91
                            SHA1:2E0921802A3466DEE1BB4DF6F549FF9BC950868F
                            SHA-256:CFA015173A944FE88DA609942AB9CE3BBC40C40F0498A7F21054B4E3BBEC73C7
                            SHA-512:3EF7622EF4883CFAED484E9E799B76823034BBB1FF7EFDEA643E9788FB82F1A30D0981A14DB1DB5B9135B4C134A12DF7C487DEE5838D6D69591DDFAE2A802188
                            Malicious:false
                            Preview:..I.N.F.O.:. . . .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....I.N.F.O.:. . . .0.3./.1.4./.2.0.2.4. .1.2.:.2.9.:.4.2.....I.N.F.O.:. . . .P.r.o.d.u.c.t. .V.e.r.s.i.o.n. .2...1...0...0.......I.N.F.O.:. . . .V.e.r.s.i.o.n.:. .6...2...9.2.0.0. .....I.N.F.O.:. . . .P.l.a.t.f.o.r.m. .I.D.:. .2. .(.N.T.).....I.N.F.O.:. . . .S.e.r.v.i.c.e. .P.a.c.k.:. .0...0.....I.N.F.O.:. . . .S.u.i.t.e.:. .0.x.0.1.0.0.,. .P.r.o.d.u.c.t. .T.y.p.e.:. .1.....I.N.F.O.:. . . .A.r.c.h.i.t.e.c.t.u.r.e.:. .A.M.D.6.4.......I.N.F.O.:. . . .I.n.t.e.r.a.c.t.i.v.e. .W.i.n.d.o.w.s. .S.t.a.t.i.o.n.....I.N.F.O.:. . . .C.o.m.m.a.n.d. .L.i.n.e.:. .'.C.:.\.P.R.O.G.R.A.~.3.\.{.C.D.C.C.2.~.1.\.O.F.F.L.I.N.E.\.m.D.I.F.x.I.D.E...d.l.l.\.x.6.4.D.P.I.n.s.t...e.x.e. . ./.S.W. ./.S.E. ./.E.L. ./.P.A.T.H. .C.:.\.P.R.O.G.R.A.~.1.\.\.T.E.C.H.K.O.~.1.\.T.E.C.H.K.O.~.1.\.D.E.N.S. ./.D. ./.S.A. ./.L.M. ./.F.'.....I.N.F.O.:. . . .D.P.I.n.s.t. .i.s. .n.o.t. .m.u.l.t.i.-.l.i.n.g.u.a.l.......I.N.F.O.:. . .
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9774
                            Entropy (8bit):5.200356426579818
                            Encrypted:false
                            SSDEEP:192:B8HvMWG5LZlAdwo3UqTMG4fRb7isIVkTBgdbXnG4+zeVtc2PdT:B8HMl2tNTMG4ft+TkVQnGpzAJ
                            MD5:2AF89E9CB43E93768CA169CB76756123
                            SHA1:9EEAEFF468D6280149C899232E887D2EC971F116
                            SHA-256:303847238B729D0A2D49F93073AC882120FF112C93046845A855A3FC192D6A17
                            SHA-512:43CFED37B4946FB95BD31A33D3EFCC273446FEB13D34593134AB1CB909ACF83FBAD1B5556F092CADA0B5AD3492E2976E010966259CC2E205678CC8620310845F
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9758
                            Entropy (8bit):5.200481985878872
                            Encrypted:false
                            SSDEEP:192:B8HvMWGzLZlAdwo3UqTMH4fRbz7sIVkTBgdVXnG4QzeVtc2UWv:B8H6l2tNTMH4ft/TkVmnGLzAJ
                            MD5:120CBBA255C66FBCAAD7D49BCF567FA5
                            SHA1:A16DE35EAB4E6E51BE4544793A05DBC668298DEB
                            SHA-256:17E11451106D4DC767CE654D828EC5C3DE1AD9000BD51B7F5E2CA87334C71179
                            SHA-512:73D7A772C5F9EBAB0D363DAF3BDCBB176B0EAE6A170258D9E1EE5D1AF7D7A194C1D1716364BE411EF5CFBD1DEB69A0ECAEFB9FC8CFF08ABD68DC13B630E533EE
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9742
                            Entropy (8bit):5.203938700783149
                            Encrypted:false
                            SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1g4fRb7J2sIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTMG4ft8TkV1nGkzA2
                            MD5:7FBD82746CF38DA2A8728A7C47112124
                            SHA1:56131AEB2C6E7947E1FB7CB282638B58B705678C
                            SHA-256:EFAD8843EB281869659A13CE3FCC48D5922C85A5CF63F4E91A6C22B0B9683F2D
                            SHA-512:DCE593288E62E60CBC6E2C3CB1EED01B56A3431F324D877D41D98F3F38D20B2276A117EB9106B690C03A5816285D6864A0DD0A99132E0781C007B8C66D72C3D6
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9774
                            Entropy (8bit):5.201512481427886
                            Encrypted:false
                            SSDEEP:192:B8HvMWG/LZlAdwo3UqTMK4fRbK6sIVkTBgdJXnG4EzeVtc28SJn:B8HGl2tNTMK4ftzTkVanG/zArZ
                            MD5:9232DCCBA703DBE10F07D17480D831F9
                            SHA1:D24753BF3E9E44F0455A7CC88803D2AC0727C8C8
                            SHA-256:792CE4DA7EA6403A6D53A6F5C563F686CD72989E716CABFF6FAED59DE477F8C2
                            SHA-512:03772B2742906A1AE260A30C97E52997A869B79C2D7A7491681F2E506757F8E057075CE4F1BB63761D6BA748AA6D28E0AA7B5930BDF3FC5B1A2637F88AD9BC33
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9758
                            Entropy (8bit):5.199812485547983
                            Encrypted:false
                            SSDEEP:192:B8HvMWG/LZlAdwo3UqTM84fRb7lsIVkTBgdJXnG4EzeVtc2gaj:B8HGl2tNTM84ftJTkVanG/zAl
                            MD5:04ACD4E8BFA9089D2120AE8872190CB3
                            SHA1:12F2C97DEF83A5A2AEE263EA3E761EE28C85B318
                            SHA-256:D5E60140FC42A8C26566C5D99822F449ECC51C4D8AFF2235FABBD5767AC5E779
                            SHA-512:22046E62109D752F0A3AB67962B70AE65925F3A897287EF64C59592BF11E7EC697F23FEB56AD43EDC8161F4CF144CFBA76421529C6ACA0DC9D523D762DD29DE9
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9750
                            Entropy (8bit):5.199048245781225
                            Encrypted:false
                            SSDEEP:192:B8HvMWGpLZlAdwo3UqTMw4fRb704sIVkTBgdhXnG48zeVtc24yr:B8Hil2tNTMw4ftw4TkVMnGVzAL
                            MD5:5BE543804F4C61874D3CA9F979F78AD7
                            SHA1:3A272A571BE9BB5E9CC22F537AA264B1C3D1CD45
                            SHA-256:DA73278D43CD6EDA99F92C24CD6674C71238F2795CDA1B06DD2F8B0F263E1036
                            SHA-512:520B1674F908B86D56E9679A201A34A31C2B8A792281542E4720DD87D1D2C5DEE87BB6F8469F624213C9A3BE55AC5973BF6B220FF7CC0C9EF77F9AA8412E8251
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9742
                            Entropy (8bit):5.19974129042694
                            Encrypted:false
                            SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1l4fRb7JsIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTML4ftlTkV1nGkzA2
                            MD5:54604542F5A3385064DE1524F57D21E0
                            SHA1:C16F4D0EE696F0BACC1E037155793BACD27D033C
                            SHA-256:A3D693423160DCE3A729F8E97AA0085D0731B9F57C7C2ECFA6C8ABEBF52C28B8
                            SHA-512:967C9E400CB8C68560B01AB07629AF58403F9527377ABBBAC49E73A3D8CB9FFDE90EE772554700BC5F88D113B0AA9F19720D4AF2461635E52FFA77D6CB593932
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9694
                            Entropy (8bit):5.199518545726912
                            Encrypted:false
                            SSDEEP:192:B8HvMWGtLZlAdwo3UqTMK4fRb7FsIVkTBgdvXnG4izeVtcw:B8H4l2tNTMK4ftRTkVEnGdzAf
                            MD5:1CA510E30084F95389EF4EEB6D44398D
                            SHA1:C5F4E76D6141B27585D6F83731D2AADCA2F8F58B
                            SHA-256:0ED6EBAEC6DEAD6FDA901B3276715E9EC35FF757C02A27D3526ACC6EEFFEF457
                            SHA-512:21ED2655F9FBDB7732B2DA8F5DF316BE4DAE80561209E49A58AAC4D69DFCF11A007A9565C3F78309DC6BC350A47F67BC4F4B559B2A8A5C340A7D60289CD243A5
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            File Type:Generic INItialization configuration [BeginLog]
                            Category:dropped
                            Size (bytes):345082
                            Entropy (8bit):5.027856870071611
                            Encrypted:false
                            SSDEEP:1536:JqXp4MG+qrW40i6FfveS15KKpEtPyMbC4hDR+EHmEDFYQZ8ZBie2bQx:JqCMpqaruHmEfe2bQx
                            MD5:58730B25C331F7CBBCE05F76CDE83561
                            SHA1:E230142802C8DEBB68D8DE7AC338311409906FBB
                            SHA-256:F9DF72236F366543489BE1C92E0922BC181ABF1CAEF2E08A0FEC814BE4E28F46
                            SHA-512:6C8797D1D88E5558C3F5F99652601A32536CEC58B6494883A3074D4B26F47E1082FD70E74785F0DA2AEFE5100FACAFF0CCAD81810E64049B5E029658E83A6882
                            Malicious:false
                            Preview:[Device Install Log].. OS Version = 10.0.19042.. Service Pack = 0.0.. Suite = 0x0100.. ProductType = 1.. Architecture = amd64....[BeginLog]....[Boot Session: 2021/09/03 00:40:02.500]....>>> [Setup Import Driver Package - C:\WINDOWS\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf]..>>> Section start 2021/09/03 00:42:46.054.. cmd: C:\WINDOWS\System32\spoolsv.exe.. inf: Provider: Microsoft.. inf: Class GUID: {4D36E979-E325-11CE-BFC1-08002BE10318}.. inf: Driver Version: 06/21/2006,10.0.19041.1.. inf: Catalog File: prnms009.cat.. ump: Import flags: 0x0000000D.. pol: {Driver package policy check} 00:42:46.085.. pol: {Driver package policy check - exit(0x00000000)} 00:42:46.085.. sto: {Stage Driver Package: C:\WINDOWS\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf} 00:42:46.085.. inf: {Query Configurability: C:\WINDOWS\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf} 00:42:46.085.. inf:
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Revision Number: {C39D0F65-909B-4DBD-A3E7-FF81A783B41B}, Number of Pages: 200, Title: TECHKON Device Service, Subject: TECHKON Device Service Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0, Template: x64;1033, Number of Words: 8
                            Category:dropped
                            Size (bytes):767488
                            Entropy (8bit):6.309158560991388
                            Encrypted:false
                            SSDEEP:12288:tZTHM43BKXsbzeDSJfQ8guBoN2KA2wKc7wMz7:tFM4Rx5BqPA2fc7wMz7
                            MD5:BB476839A65AB03B7419B1285080C884
                            SHA1:9321332A351363696DF3F12FB8FDC602043CAA95
                            SHA-256:FF54C9A79D8DBB85E232B5E9A5C3C8F5AE32558B65CDE7935084A4E705BB21D4
                            SHA-512:9BF03E54FCBAF7FF7031155C16B59BF5AF039D3145AFEBAE7036A93552CA3621A40FDE80207F787D599C74AD366D5A116F50DE5374700658C8DFE85E6E8C3792
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Revision Number: {C39D0F65-909B-4DBD-A3E7-FF81A783B41B}, Number of Pages: 200, Title: TECHKON Device Service, Subject: TECHKON Device Service Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0, Template: x64;1033, Number of Words: 8
                            Category:dropped
                            Size (bytes):767488
                            Entropy (8bit):6.309158560991388
                            Encrypted:false
                            SSDEEP:12288:tZTHM43BKXsbzeDSJfQ8guBoN2KA2wKc7wMz7:tFM4Rx5BqPA2fc7wMz7
                            MD5:BB476839A65AB03B7419B1285080C884
                            SHA1:9321332A351363696DF3F12FB8FDC602043CAA95
                            SHA-256:FF54C9A79D8DBB85E232B5E9A5C3C8F5AE32558B65CDE7935084A4E705BB21D4
                            SHA-512:9BF03E54FCBAF7FF7031155C16B59BF5AF039D3145AFEBAE7036A93552CA3621A40FDE80207F787D599C74AD366D5A116F50DE5374700658C8DFE85E6E8C3792
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Revision Number: {CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}, Number of Pages: 200, Title: TechkonDriver64Bit, Subject: Techkon USB-Driver 64Bit Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0, Template: x64;1033, Number of Words: 8
                            Category:dropped
                            Size (bytes):770560
                            Entropy (8bit):6.315743880506391
                            Encrypted:false
                            SSDEEP:12288:+to45BKXsbzzDSJsQ8guBoN2KA2wKc7wMz7:+to4vl5BqPA2fc7wMz7
                            MD5:B807BD86405509D80EFA5DA0F8E0EFD6
                            SHA1:6826E0429813D0AB446ECF2CE56BD0A14B701BE0
                            SHA-256:81C9666B260B0CBD8B10F253CEAA699AB606BB8BE83946F4B253B153E11336FC
                            SHA-512:4D6F9E7B7B2ED6ADF7BC74A65FA1C583756DF80680F97CACB5E2C94BC3A4C2296636C900325DFD4DBEBB2EE031305D6F3CE245D41481AB150DBC331F2BFA1E52
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-...........0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Revision Number: {CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}, Number of Pages: 200, Title: TechkonDriver64Bit, Subject: Techkon USB-Driver 64Bit Installation, Keywords: Installer, MSI, Database, Author: TECHKON GmbH, Comments: All rights reserved, Name of Creating Application: InstallAware, Security: 0, Template: x64;1033, Number of Words: 8
                            Category:dropped
                            Size (bytes):770560
                            Entropy (8bit):6.315743880506391
                            Encrypted:false
                            SSDEEP:12288:+to45BKXsbzzDSJsQ8guBoN2KA2wKc7wMz7:+to4vl5BqPA2fc7wMz7
                            MD5:B807BD86405509D80EFA5DA0F8E0EFD6
                            SHA1:6826E0429813D0AB446ECF2CE56BD0A14B701BE0
                            SHA-256:81C9666B260B0CBD8B10F253CEAA699AB606BB8BE83946F4B253B153E11336FC
                            SHA-512:4D6F9E7B7B2ED6ADF7BC74A65FA1C583756DF80680F97CACB5E2C94BC3A4C2296636C900325DFD4DBEBB2EE031305D6F3CE245D41481AB150DBC331F2BFA1E52
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................%.......................................................................................................V........... ...!..."...#...$...&.......'...p...)...*...+...,...-...........0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...W...]...X...Y...Z...[...\...y...^..._...`...t...b...c...d...e...n...g...h...i...j...k...l...m...a...o.......q...r...s...u...v...w...x...........z...
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):389632
                            Entropy (8bit):6.443465180760872
                            Encrypted:false
                            SSDEEP:6144:zgj8g8Sy2AoNSlkJAiL9svGFXFPvA2wKcWQwMYW7rmk:zQ8guBoN2KA2wKc7wMz7
                            MD5:89B5903624F9CDED346676E88F918693
                            SHA1:162201E4E31FB327E0B16531C81041DC574A04A4
                            SHA-256:851BB0A420E47AF2F49518FAE86E4B9755BD5DAA6E9EB3B2F1FC4585B6F05163
                            SHA-512:FD2587EF52E43EC131E4D06A34306E038B85B98E9EE2866FFD117E906B019FBA6972B794BEC2A9E0FEF357E199A0D13E64A89D4356EA8BF6CAFD6A289B1B48A7
                            Malicious:true
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...>=xQ............................d........ ....@.....................................................................E............p...&.......................}...................................................................................text............................... ..`.itext..|........................... ..`.data....,... ......................@....bss.....P...P.......8...................idata...............8..............@....didata..............J..............@....edata..E............L..............@..@.reloc...}.......~...N..............@..B.rsrc....&...p...&..................@..@....................................@..@................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):144384
                            Entropy (8bit):6.043448081977129
                            Encrypted:false
                            SSDEEP:1536:bzfplpotJ+Tc5x5XJAIu7+zc2X5X1DznQyrvDklgXUEfbSorHqSCdZQVTbe6Kion:bjbp4gcXsnuRfklg8orHqnzT9ioO
                            MD5:6484BEE1546FEB56595EAACF5D019C55
                            SHA1:CBFE2EBE0485E447F1887F52D5A3CFA480A8FBBE
                            SHA-256:FB73F1E2A71635F6F1F10FB7C7B738E4CE5125C3841B1A656A5F2CD406BDDFB2
                            SHA-512:538A1B8981BAF6F35FE58CC862FAA5AF27D68E93572C5E4EF6719E1CF4A9B1A4AC9E61FFA22EBC1E9AEC0FDEB88AF54FE8834B8C384B596A889C07E63C031ECE
                            Malicious:true
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...?=xQ.....................f......|.............@.....................................................................D....`..................................d+..................................................Xb.......p.......................text............................... ..`.itext.............................. ..`.data...h...........................@....bss.....N...............................idata.......`......................@....didata......p......................@....edata..D...........................@..@.reloc..d+.......,..................@..B.rsrc................"..............@..@.....................4..............@..@................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):144384
                            Entropy (8bit):6.043448081977129
                            Encrypted:false
                            SSDEEP:1536:bzfplpotJ+Tc5x5XJAIu7+zc2X5X1DznQyrvDklgXUEfbSorHqSCdZQVTbe6Kion:bjbp4gcXsnuRfklg8orHqnzT9ioO
                            MD5:6484BEE1546FEB56595EAACF5D019C55
                            SHA1:CBFE2EBE0485E447F1887F52D5A3CFA480A8FBBE
                            SHA-256:FB73F1E2A71635F6F1F10FB7C7B738E4CE5125C3841B1A656A5F2CD406BDDFB2
                            SHA-512:538A1B8981BAF6F35FE58CC862FAA5AF27D68E93572C5E4EF6719E1CF4A9B1A4AC9E61FFA22EBC1E9AEC0FDEB88AF54FE8834B8C384B596A889C07E63C031ECE
                            Malicious:true
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...?=xQ.....................f......|.............@.....................................................................D....`..................................d+..................................................Xb.......p.......................text............................... ..`.itext.............................. ..`.data...h...........................@....bss.....N...............................idata.......`......................@....didata......p......................@....edata..D...........................@..@.reloc..d+.......,..................@..B.rsrc................"..............@..@.....................4..............@..@................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):144384
                            Entropy (8bit):6.043448081977129
                            Encrypted:false
                            SSDEEP:1536:bzfplpotJ+Tc5x5XJAIu7+zc2X5X1DznQyrvDklgXUEfbSorHqSCdZQVTbe6Kion:bjbp4gcXsnuRfklg8orHqnzT9ioO
                            MD5:6484BEE1546FEB56595EAACF5D019C55
                            SHA1:CBFE2EBE0485E447F1887F52D5A3CFA480A8FBBE
                            SHA-256:FB73F1E2A71635F6F1F10FB7C7B738E4CE5125C3841B1A656A5F2CD406BDDFB2
                            SHA-512:538A1B8981BAF6F35FE58CC862FAA5AF27D68E93572C5E4EF6719E1CF4A9B1A4AC9E61FFA22EBC1E9AEC0FDEB88AF54FE8834B8C384B596A889C07E63C031ECE
                            Malicious:true
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...?=xQ.....................f......|.............@.....................................................................D....`..................................d+..................................................Xb.......p.......................text............................... ..`.itext.............................. ..`.data...h...........................@....bss.....N...............................idata.......`......................@....didata......p......................@....edata..D...........................@..@.reloc..d+.......,..................@..B.rsrc................"..............@..@.....................4..............@..@................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):16702
                            Entropy (8bit):5.722525852747486
                            Encrypted:false
                            SSDEEP:384:ueRHUzdHmO0GgJVAu6qMNv1oDZkXtQMDmDIzqZ1+CmC/jFz5G6ci40F1e3i0iwA+:u/zM3y5XTb
                            MD5:55BD5079DC9347432915BDE446DC8A40
                            SHA1:2FE6AA406E4B8DB01151CA9C6B57661A467D311D
                            SHA-256:49AB62755C75E19F58C2E089F416EFE338ECEA2AC8E6643D02E3286A54D88CB0
                            SHA-512:9B5388EA5B3BC203D43B94EBCAF61447A3DA2268455A9C211E88B6BEF5DE97C807ABB50FA3770A6C7F7F64E0555961274444FE963F8DB98FB842C98AECC6C837
                            Malicious:false
                            Preview:...@IXOS.@.....@.cnX.@.....@.....@.....@.....@.....@......&.{55EA8940-B618-47BD-A642-20BFB2A64F78}..TECHKON Device Driver 64Bit..TechkonDriver64Bit.msi.@.....@.....@.....@........\PROGRA~3\&.{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}.....@.....@.....@.....@.......@.....@.....@.......@......TECHKON Device Driver 64Bit......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@$....@.....@.]....&.{5702EAC5-033D-48B5-B83F-DEF9ECF4C262}R.C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.sys.@.......@.....@.....@......&.{52B0046B-434A-4EA9-9AC7-766C93D4D3F6}R.C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.inf.@.......@.....@.....@......&.{6D03A36D-9750-4B1E-8344-0CE7ACED2DE2}R.C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\SpectroDens\spectrodens_x64.cat.@.......@.....@.....@......&.{2B8BCB22-4191-4BD5-817D-B0123E06B87F}T.C:
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):144384
                            Entropy (8bit):6.043448081977129
                            Encrypted:false
                            SSDEEP:1536:bzfplpotJ+Tc5x5XJAIu7+zc2X5X1DznQyrvDklgXUEfbSorHqSCdZQVTbe6Kion:bjbp4gcXsnuRfklg8orHqnzT9ioO
                            MD5:6484BEE1546FEB56595EAACF5D019C55
                            SHA1:CBFE2EBE0485E447F1887F52D5A3CFA480A8FBBE
                            SHA-256:FB73F1E2A71635F6F1F10FB7C7B738E4CE5125C3841B1A656A5F2CD406BDDFB2
                            SHA-512:538A1B8981BAF6F35FE58CC862FAA5AF27D68E93572C5E4EF6719E1CF4A9B1A4AC9E61FFA22EBC1E9AEC0FDEB88AF54FE8834B8C384B596A889C07E63C031ECE
                            Malicious:true
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...?=xQ.....................f......|.............@.....................................................................D....`..................................d+..................................................Xb.......p.......................text............................... ..`.itext.............................. ..`.data...h...........................@....bss.....N...............................idata.......`......................@....didata......p......................@....edata..D...........................@..@.reloc..d+.......,..................@..B.rsrc................"..............@..@.....................4..............@..@................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):11787
                            Entropy (8bit):5.788440018842951
                            Encrypted:false
                            SSDEEP:192:KHw9S/Q1WOcI8skxoCyRR3E0cqiZ1rFsI92uBYPiGVAey24jW3:KHw9T1CyRRU0cqiZ1xh92UlFW3
                            MD5:37DD08DF1DFA40201B229B676F909DD8
                            SHA1:6ECE8FF47DBFDFDB918AA921D38F2D1CB85CC49E
                            SHA-256:356C0F129F52A6FC2D652EA6000C909468E5EBCE27C672CB346F0662B96340CF
                            SHA-512:9D2E76177D468EEAEAC83A28DE0249632A157C57FB07D983F79F332C9E012E40DC1A77730A084B9D83E73FBFD4D0144D13D191B1AB7237C96CE30F9E687311D2
                            Malicious:false
                            Preview:...@IXOS.@.....@.cnX.@.....@.....@.....@.....@.....@......&.{CD1E6019-47AE-4334-A91E-595BA68B6E06}..TECHKON Device Service..TDService.msi.@.....@.....@.....@........\PROGRA~3\&.{C39D0F65-909B-4DBD-A3E7-FF81A783B41B}.....@.....@.....@.....@.......@.....@.....@.......@......TECHKON Device Service......Rollback..Rolling back action:..[1]..RollbackCleanup..Removing backup files..File: [1]...@.......@........ProcessComponents..Updating component registration.....@.....@.....@.]....&.{CD0C69EF-2B12-47ED-87B7-5A1DB20CBCD9}N.C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\defaultScan.tss.@.......@.....@.....@......&.{4D6F449F-FA68-42B5-A305-16C45F308B8F}N.C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\defaultSpot.tss.@.......@.....@.....@......&.{96ED6BF5-4AA1-4668-AEEE-E5101CDF29BA}L.C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe.@.......@.....@.....@......&.{672A692B-629D-4B2A-A63B-2E211EA7164C}N.C:\Program Files (x86)\TECHKON GmbH
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):389632
                            Entropy (8bit):6.443465180760872
                            Encrypted:false
                            SSDEEP:6144:zgj8g8Sy2AoNSlkJAiL9svGFXFPvA2wKcWQwMYW7rmk:zQ8guBoN2KA2wKc7wMz7
                            MD5:89B5903624F9CDED346676E88F918693
                            SHA1:162201E4E31FB327E0B16531C81041DC574A04A4
                            SHA-256:851BB0A420E47AF2F49518FAE86E4B9755BD5DAA6E9EB3B2F1FC4585B6F05163
                            SHA-512:FD2587EF52E43EC131E4D06A34306E038B85B98E9EE2866FFD117E906B019FBA6972B794BEC2A9E0FEF357E199A0D13E64A89D4356EA8BF6CAFD6A289B1B48A7
                            Malicious:true
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...>=xQ............................d........ ....@.....................................................................E............p...&.......................}...................................................................................text............................... ..`.itext..|........................... ..`.data....,... ......................@....bss.....P...P.......8...................idata...............8..............@....didata..............J..............@....edata..E............L..............@..@.reloc...}.......~...N..............@..B.rsrc....&...p...&..................@..@....................................@..@................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):144384
                            Entropy (8bit):6.043448081977129
                            Encrypted:false
                            SSDEEP:1536:bzfplpotJ+Tc5x5XJAIu7+zc2X5X1DznQyrvDklgXUEfbSorHqSCdZQVTbe6Kion:bjbp4gcXsnuRfklg8orHqnzT9ioO
                            MD5:6484BEE1546FEB56595EAACF5D019C55
                            SHA1:CBFE2EBE0485E447F1887F52D5A3CFA480A8FBBE
                            SHA-256:FB73F1E2A71635F6F1F10FB7C7B738E4CE5125C3841B1A656A5F2CD406BDDFB2
                            SHA-512:538A1B8981BAF6F35FE58CC862FAA5AF27D68E93572C5E4EF6719E1CF4A9B1A4AC9E61FFA22EBC1E9AEC0FDEB88AF54FE8834B8C384B596A889C07E63C031ECE
                            Malicious:true
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...?=xQ.....................f......|.............@.....................................................................D....`..................................d+..................................................Xb.......p.......................text............................... ..`.itext.............................. ..`.data...h...........................@....bss.....N...............................idata.......`......................@....didata......p......................@....edata..D...........................@..@.reloc..d+.......,..................@..B.rsrc................"..............@..@.....................4..............@..@................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):144384
                            Entropy (8bit):6.043448081977129
                            Encrypted:false
                            SSDEEP:1536:bzfplpotJ+Tc5x5XJAIu7+zc2X5X1DznQyrvDklgXUEfbSorHqSCdZQVTbe6Kion:bjbp4gcXsnuRfklg8orHqnzT9ioO
                            MD5:6484BEE1546FEB56595EAACF5D019C55
                            SHA1:CBFE2EBE0485E447F1887F52D5A3CFA480A8FBBE
                            SHA-256:FB73F1E2A71635F6F1F10FB7C7B738E4CE5125C3841B1A656A5F2CD406BDDFB2
                            SHA-512:538A1B8981BAF6F35FE58CC862FAA5AF27D68E93572C5E4EF6719E1CF4A9B1A4AC9E61FFA22EBC1E9AEC0FDEB88AF54FE8834B8C384B596A889C07E63C031ECE
                            Malicious:true
                            Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...?=xQ.....................f......|.............@.....................................................................D....`..................................d+..................................................Xb.......p.......................text............................... ..`.itext.............................. ..`.data...h...........................@....bss.....N...............................idata.......`......................@....didata......p......................@....edata..D...........................@..@.reloc..d+.......,..................@..B.rsrc................"..............@..@.....................4..............@..@................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):20480
                            Entropy (8bit):1.8077247005115518
                            Encrypted:false
                            SSDEEP:24:JgXIf908zkGAu8HscELypUHOl050j9/ZVuNjJPUB//6FN:GS9zkwP6UW052y6//6v
                            MD5:07CCE5AC6AD240342FDCC3131B884FC4
                            SHA1:A0798EF650677ACDDAF1F722A71B86670421C090
                            SHA-256:515CAFE7533D528879A9DF7DF66FAE05481881CAAC0976DF9599978FB121FBB3
                            SHA-512:D90724276FA560E836DEABB34933F723651BB8A9AE7E03D716B096CBBBBE5D593DE2B4F9AF1AE9179A6514E97FE3224A60B88BD4EE3775735097759F1287911F
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):20480
                            Entropy (8bit):1.627908699439305
                            Encrypted:false
                            SSDEEP:24:JRXmIsc0d+RjcsiQs5hBFyTUksTQ+F/ymZU+/w/FD+utO7KvFN:zWxcJjcsmBITdsT2AKvv
                            MD5:F88287AA89AD79DAD09F70592BD497B2
                            SHA1:FE1AB5052AD09D63B0D2004EE910B15E70C2102B
                            SHA-256:2D957E15375DCC3BECFF5BC2FAA36EE8BCEA9EE33A180C6A1EE0632B14457C9D
                            SHA-512:40F32EB723B5C37B51699BF6CD6E87F0591303CF698E53BC742AE7F1034FCE4F1160338127CEEA8ED4C7CD9D35BD4871A53A39DCA6F3FF6DCD9145D62C21A2E9
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):20480
                            Entropy (8bit):1.4855112921180504
                            Encrypted:false
                            SSDEEP:48:C8PhbuRc06WXJGFT5vI4Xn3tZ/1Cfq6Oe0ZPfjOy:thb1dFTz33D/1CnfuPC
                            MD5:92F06D61F100A3BD2B8C18EE665FF26E
                            SHA1:DB96F68A66392E4227F4D3CC9539A1DAE43231F0
                            SHA-256:4E582B7165F78BFE372470A0FF6640A9AB2F8840F1159D707CFCF5FA6D5324F2
                            SHA-512:B8ED3D71DB489FA3540FDC0BF45A0AAB0DB9C4F408809FFABCABC0544502377ED0CC3DCEC1D0B5D093D0A2C450CA57E38A2245F0431801D68298B6C6F63FDAEC
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):871608
                            Entropy (8bit):5.412145162341004
                            Encrypted:false
                            SSDEEP:3072:76sAoN1IAMVcB6J3l7NPh7sOyQSiMbRolrNWG6x+Rkeov8Qj9lOx2s9OW1LRuuGi:TFfxq8RfKF0Dux6lvJ3c7v/3dgA/UM
                            MD5:86CD1191E0A56EA4EC16D45F85266261
                            SHA1:1ED30A2E88968249A304628CB811C451CDC7BE07
                            SHA-256:B4AB76BD17592DB1BC93D15E552221DEB13B5AB75C28425AC716022816FC733E
                            SHA-512:7C537262D5C2412939C99264A880ED5C13CB82DB368619B05637D2AAA52D585006A5BB1F9949412DAFF16B674A3EEA37EF7C19A76A29148DB4F24C9B4F0C19A6
                            Malicious:false
                            Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 09:59:37.236 [4684]: Command line: D:\wd\compilerTemp\BMT.i51yo0aa.beh\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 09:59:37.255 [4684]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 09:59:37.299 [4684]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 09:59:37.299 [4684]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 09:59:37.299 [
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                            Category:dropped
                            Size (bytes):124688
                            Entropy (8bit):5.941729779329973
                            Encrypted:false
                            SSDEEP:3072:9PdIuG8UvahsdcYX3UI2EuJ3im/ZCdady+RlTp/VYq63+sB:9PBUyhsdEI2++M+RlTHYL
                            MD5:E8A2190A9E8EE5E5D2E0B599BBF9DDA6
                            SHA1:4E97BF9519C83835DA9DB309E61EC87DDF165167
                            SHA-256:80AB0B86DE58A657956B2A293BD9957F78E37E7383C86D6CD142208C153B6311
                            SHA-512:57F8473EEDAF7E8AAD3B5BCBB16D373FD6AAEC290C3230033FC50B5EC220E93520B8915C936E758BB19107429A49965516425350E012F8DB0DE6D4F6226B42EE
                            Malicious:false
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...].:@...........#......................... .....".................................W...............................i...............0...f...........................................................................................................text............................... ..`.data...P.... ....... ..............@....rsrc....g...0...p...0..............@....reloc........... ..................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):81920
                            Entropy (8bit):5.853209211745096
                            Encrypted:false
                            SSDEEP:1536:YxeYFH0dtYcPdtYc0F9J174KlwOAYQog4wBYo4IYo4N65xpUV:YTFXNxF9j7j65xpUV
                            MD5:9AA2C7DEAF5B8DBED62A60F723553858
                            SHA1:6BFE53D07A3970523DC8C796EE24F392D2686BF7
                            SHA-256:28D0E73EE5616C2A76829A0A430F465B598987B4798F6BA46234393E40167BA9
                            SHA-512:AF2C404702563143B3ED6FC26C45D4E1CBB074F006420FF04F963C1F13783CA141C13D08918AFA9537A2DAABABC631C18DBB6562BC50AA3CB49294CCD00714F3
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......UBq..#...#...#...?...#..^....#..'....#.......#..Rich.#..........PE..L...Y..J...........!.........@......(........................................@......"J..........................................(.......D....................0..............................................X... .......(............................text............................... ..`.data...H...........................@....rsrc...D........ ..................@..@.reloc.......0.......0..............@..B2..H............MSVBVM60.DLL....................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):180224
                            Entropy (8bit):6.031963137664287
                            Encrypted:false
                            SSDEEP:3072:LwlZ+P6imnm8mFmT73tgHnV53kAgcvzgRm1trohJkwh:cZ+6imnm8mFmT73krb6gonf
                            MD5:CEC1791BEC45F9D86771AF4F24EAA3F4
                            SHA1:1B806C9A7189C7801EF643C5AEA03CD6B0DEDCC4
                            SHA-256:7878EB862C0A8AB0766236E6C2183FAC93A0C734276347A143B454E2FB8B4F58
                            SHA-512:BF917BA4C20DB97685A4BFEA266ECE11C77286F9480E546007FC1D830E4DFBA0966F6B5B59D74AFC89713276BB899755DFABC8F3C42A8422E612401C761A9BE7
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........%.v.v.v.Y.v.v.Y.v...v"..v.v"..v.v.vE..v.Y.v..v.Y.v...v.Y.v...v.Y.v...vRich.v........PE..L...Q..K...........!.....`...P...............p......................................[...............................0................0..................................................................@............p..l............................text...._.......`.................. ..`.rdata...x...p.......p..............@..@.data....9....... ..................@....rsrc........0......................@..@.reloc..V'.......0..................@..B................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):212992
                            Entropy (8bit):6.4058590918443175
                            Encrypted:false
                            SSDEEP:6144:U+l+8gbiTF32Cw0oSGWhuLuGser+VbGrIQL:idbgFmJSGWhWuGseapkr
                            MD5:05D89328C51E732DE076DA05239D1D79
                            SHA1:C89B8500D13D540D9F6D8FA651F13E2F9990DECE
                            SHA-256:EE0BC472EC26CE050315AAAE1D85AE51BAF17E8A2A548E3161DED665CF324DD1
                            SHA-512:9EFE29F322A0A3049D0E5332C92A434B2F9797C0D3DB09414FCF8D6F5A01C4157716D5D252B38879312D5675712AD875B2A8D7E9407849CE1B992B94D5E50FF3
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......9K!3}*O`}*O`}*O`.5D`|*O`.6A``*O`.5E`.*O`.5\`x*O`}*N`3*O`{.E`i*O`.,I`|*O`..K`|*O`Rich}*O`........................PE..L......B...........!.....p..........w...................................................................................W.......<....`.......................p.......................................................................................text....k.......p.................. ..`.rdata...(.......0..................@..@.data...X........`..................@....rsrc........`......................@..@.reloc.......p... ... ..............@..B........................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7524
                            Entropy (8bit):7.155292171931641
                            Encrypted:false
                            SSDEEP:192:64JPCjTnYe+PjP3rTqavM+vmr9ZCspE+TMAr+YR:iPnYPL3qaLeMnw
                            MD5:9C27BFE6E80B05E7DADB26DAD826984A
                            SHA1:724DFF2E442DD2D17ED6D100E9FD2D93786C79B8
                            SHA-256:C7045DFCCD4CF9D28999893C47CB4B28EA3AB0E8BD5C3C1ED7D4F3FE6EF2026F
                            SHA-512:A8225CFA0FBB7800C30978ACCE5CD8C49F481EB9BFF0E99037C7A569D1286837A027F6CC85B35A2469E2258AE3B32DD4E20095980FC0FF2C7B2094C1BEC0523B
                            Malicious:false
                            Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......P.e...@.y.....V..140916104248Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.1.6.F.4.D.0.E.E.6.9.6.F.0.B.A.C.C.1.E.0.3.7.1.5.5.7.9.3.B.A.C.D.2.7.D.0.3.3.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........oM......qUy;..}.<0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9742
                            Entropy (8bit):5.19974129042694
                            Encrypted:false
                            SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1l4fRb7JsIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTML4ftlTkV1nGkzA2
                            MD5:54604542F5A3385064DE1524F57D21E0
                            SHA1:C16F4D0EE696F0BACC1E037155793BACD27D033C
                            SHA-256:A3D693423160DCE3A729F8E97AA0085D0731B9F57C7C2ECFA6C8ABEBF52C28B8
                            SHA-512:967C9E400CB8C68560B01AB07629AF58403F9527377ABBBAC49E73A3D8CB9FFDE90EE772554700BC5F88D113B0AA9F19720D4AF2461635E52FFA77D6CB593932
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7524
                            Entropy (8bit):7.155292171931641
                            Encrypted:false
                            SSDEEP:192:64JPCjTnYe+PjP3rTqavM+vmr9ZCspE+TMAr+YR:iPnYPL3qaLeMnw
                            MD5:9C27BFE6E80B05E7DADB26DAD826984A
                            SHA1:724DFF2E442DD2D17ED6D100E9FD2D93786C79B8
                            SHA-256:C7045DFCCD4CF9D28999893C47CB4B28EA3AB0E8BD5C3C1ED7D4F3FE6EF2026F
                            SHA-512:A8225CFA0FBB7800C30978ACCE5CD8C49F481EB9BFF0E99037C7A569D1286837A027F6CC85B35A2469E2258AE3B32DD4E20095980FC0FF2C7B2094C1BEC0523B
                            Malicious:false
                            Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......P.e...@.y.....V..140916104248Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.1.6.F.4.D.0.E.E.6.9.6.F.0.B.A.C.C.1.E.0.3.7.1.5.5.7.9.3.B.A.C.D.2.7.D.0.3.3.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........oM......qUy;..}.<0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9742
                            Entropy (8bit):5.19974129042694
                            Encrypted:false
                            SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1l4fRb7JsIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTML4ftlTkV1nGkzA2
                            MD5:54604542F5A3385064DE1524F57D21E0
                            SHA1:C16F4D0EE696F0BACC1E037155793BACD27D033C
                            SHA-256:A3D693423160DCE3A729F8E97AA0085D0731B9F57C7C2ECFA6C8ABEBF52C28B8
                            SHA-512:967C9E400CB8C68560B01AB07629AF58403F9527377ABBBAC49E73A3D8CB9FFDE90EE772554700BC5F88D113B0AA9F19720D4AF2461635E52FFA77D6CB593932
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7500
                            Entropy (8bit):7.16354760210281
                            Encrypted:false
                            SSDEEP:192:N5PCjwnYe+PjP3rTqavM+vmr9ZCspE+TMAr+sMUYu4:yEnYPL3qaLeMnLQ4
                            MD5:B3A76DE50584DD20EDB7A1320F7E6C06
                            SHA1:6884659420A4A904975BE363B8B71197F35DF423
                            SHA-256:6DB1061C1712E03CC45ADAC730AF50DFA7AB2B29F4A585A0A866573E0023D5F3
                            SHA-512:5E33D07BC96082ED78EE9C45F8E4248E7AA8C872FB91D60A73623AFA593400CD47AB1F79A69166541206936156F3B0CE08E0B851561080E068F3E0288CA8072F
                            Malicious:false
                            Preview:0..H..*.H.........90..5...1.0...+......0.....+.....7......0...0...+.....7.....l...0E.B..y?t.....140516140009Z0...+.....7.....0..z0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..e0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.5.F.4.E.7.6.D.6.1.4.1.B.2.7.5.8.5.D.6.F.8.3.7.3.1.D.2.A.A.D.C.A.2.F.8.F.5.8.B...1..]0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........maA.u...71.....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9694
                            Entropy (8bit):5.199518545726912
                            Encrypted:false
                            SSDEEP:192:B8HvMWGtLZlAdwo3UqTMK4fRb7FsIVkTBgdvXnG4izeVtcw:B8H4l2tNTMK4ftRTkVEnGdzAf
                            MD5:1CA510E30084F95389EF4EEB6D44398D
                            SHA1:C5F4E76D6141B27585D6F83731D2AADCA2F8F58B
                            SHA-256:0ED6EBAEC6DEAD6FDA901B3276715E9EC35FF757C02A27D3526ACC6EEFFEF457
                            SHA-512:21ED2655F9FBDB7732B2DA8F5DF316BE4DAE80561209E49A58AAC4D69DFCF11A007A9565C3F78309DC6BC350A47F67BC4F4B559B2A8A5C340A7D60289CD243A5
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7500
                            Entropy (8bit):7.16354760210281
                            Encrypted:false
                            SSDEEP:192:N5PCjwnYe+PjP3rTqavM+vmr9ZCspE+TMAr+sMUYu4:yEnYPL3qaLeMnLQ4
                            MD5:B3A76DE50584DD20EDB7A1320F7E6C06
                            SHA1:6884659420A4A904975BE363B8B71197F35DF423
                            SHA-256:6DB1061C1712E03CC45ADAC730AF50DFA7AB2B29F4A585A0A866573E0023D5F3
                            SHA-512:5E33D07BC96082ED78EE9C45F8E4248E7AA8C872FB91D60A73623AFA593400CD47AB1F79A69166541206936156F3B0CE08E0B851561080E068F3E0288CA8072F
                            Malicious:false
                            Preview:0..H..*.H.........90..5...1.0...+......0.....+.....7......0...0...+.....7.....l...0E.B..y?t.....140516140009Z0...+.....7.....0..z0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..e0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RC.5.F.4.E.7.6.D.6.1.4.1.B.2.7.5.8.5.D.6.F.8.3.7.3.1.D.2.A.A.D.C.A.2.F.8.F.5.8.B...1..]0<..+.....7...1.0,...F.i.l.e........d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........maA.u...71.....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9694
                            Entropy (8bit):5.199518545726912
                            Encrypted:false
                            SSDEEP:192:B8HvMWGtLZlAdwo3UqTMK4fRb7FsIVkTBgdvXnG4izeVtcw:B8H4l2tNTMK4ftRTkVEnGdzAf
                            MD5:1CA510E30084F95389EF4EEB6D44398D
                            SHA1:C5F4E76D6141B27585D6F83731D2AADCA2F8F58B
                            SHA-256:0ED6EBAEC6DEAD6FDA901B3276715E9EC35FF757C02A27D3526ACC6EEFFEF457
                            SHA-512:21ED2655F9FBDB7732B2DA8F5DF316BE4DAE80561209E49A58AAC4D69DFCF11A007A9565C3F78309DC6BC350A47F67BC4F4B559B2A8A5C340A7D60289CD243A5
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7528
                            Entropy (8bit):7.161254074300881
                            Encrypted:false
                            SSDEEP:192:LYRINCjanYe+PjP3rTqavM+vmr9ZCspE+TMAr+DtJ:a+nYPL3qaLeMnD
                            MD5:5C737957A4385512FD021458107C0CE6
                            SHA1:F5815B5B9EFFA9C7B8850B84C504CC5487DB2D4C
                            SHA-256:EFF94634DCAD8CF3D2F5633E58772368280D79B0C5DCC825D71256B70B07F37E
                            SHA-512:DFC6F4074BA83AF03F50028A3B70D980272A139E56DA7994764F6F91A44742E7498C2BFF88485E2FDC86080FE99AED582ECE55D065AA9B2D731A6AAFC685DA4E
                            Malicious:false
                            Preview:0..d..*.H.........U0..Q...1.0...+......0.....+.....7......0...0...+.....7......-.'.g.H....E.`...140516140004Z0...+.....7.....0...0....R3.A.2.7.2.A.5.7.1.B.E.9.B.B.5.E.9.C.C.2.2.F.5.3.7.A.A.2.6.4.B.1.C.3.D.1.C.D.4.5...1..k0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........:'*W..^../Sz.d....E0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..s0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9750
                            Entropy (8bit):5.199048245781225
                            Encrypted:false
                            SSDEEP:192:B8HvMWGpLZlAdwo3UqTMw4fRb704sIVkTBgdhXnG48zeVtc24yr:B8Hil2tNTMw4ftw4TkVMnGVzAL
                            MD5:5BE543804F4C61874D3CA9F979F78AD7
                            SHA1:3A272A571BE9BB5E9CC22F537AA264B1C3D1CD45
                            SHA-256:DA73278D43CD6EDA99F92C24CD6674C71238F2795CDA1B06DD2F8B0F263E1036
                            SHA-512:520B1674F908B86D56E9679A201A34A31C2B8A792281542E4720DD87D1D2C5DEE87BB6F8469F624213C9A3BE55AC5973BF6B220FF7CC0C9EF77F9AA8412E8251
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7528
                            Entropy (8bit):7.161254074300881
                            Encrypted:false
                            SSDEEP:192:LYRINCjanYe+PjP3rTqavM+vmr9ZCspE+TMAr+DtJ:a+nYPL3qaLeMnD
                            MD5:5C737957A4385512FD021458107C0CE6
                            SHA1:F5815B5B9EFFA9C7B8850B84C504CC5487DB2D4C
                            SHA-256:EFF94634DCAD8CF3D2F5633E58772368280D79B0C5DCC825D71256B70B07F37E
                            SHA-512:DFC6F4074BA83AF03F50028A3B70D980272A139E56DA7994764F6F91A44742E7498C2BFF88485E2FDC86080FE99AED582ECE55D065AA9B2D731A6AAFC685DA4E
                            Malicious:false
                            Preview:0..d..*.H.........U0..Q...1.0...+......0.....+.....7......0...0...+.....7......-.'.g.H....E.`...140516140004Z0...+.....7.....0...0....R3.A.2.7.2.A.5.7.1.B.E.9.B.B.5.E.9.C.C.2.2.F.5.3.7.A.A.2.6.4.B.1.C.3.D.1.C.D.4.5...1..k0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........:'*W..^../Sz.d....E0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..s0J..+.....7...1<0:...F.i.l.e.......(s.p.e.c.t.r.o.d.e.n.s._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9750
                            Entropy (8bit):5.199048245781225
                            Encrypted:false
                            SSDEEP:192:B8HvMWGpLZlAdwo3UqTMw4fRb704sIVkTBgdhXnG48zeVtc24yr:B8Hil2tNTMw4ftw4TkVMnGVzAL
                            MD5:5BE543804F4C61874D3CA9F979F78AD7
                            SHA1:3A272A571BE9BB5E9CC22F537AA264B1C3D1CD45
                            SHA-256:DA73278D43CD6EDA99F92C24CD6674C71238F2795CDA1B06DD2F8B0F263E1036
                            SHA-512:520B1674F908B86D56E9679A201A34A31C2B8A792281542E4720DD87D1D2C5DEE87BB6F8469F624213C9A3BE55AC5973BF6B220FF7CC0C9EF77F9AA8412E8251
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7540
                            Entropy (8bit):7.156208031117259
                            Encrypted:false
                            SSDEEP:192:jwn9PCj+nYe+PjP3rTqavM+vmr9ZCspE+TMAr+7+Yac:jjanYPL3qaLeMnOc
                            MD5:16AC4FA94C22381E7A4A50141307A54D
                            SHA1:D796A30A98D895D0BC49A09D0A6F63EABD81BD7A
                            SHA-256:9E5588D557F378CB386D0414D21EA256C60D11DE9D1B915F671B260147B98498
                            SHA-512:3FD8DDA6D71949791E1C2728E5B49EA81032BC5C0D3456DE7C4652479AE023FC5D65E0AF7773C2556F52039FC290C81FF1FBDA3709A5FA8CA81E657F932535EC
                            Malicious:false
                            Preview:0..p..*.H.........a0..]...1.0...+......0.....+.....7......0...0...+.....7......b.B...B..$......140516140010Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..y0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....R9.E.E.A.E.F.F.4.6.8.D.6.2.8.0.1.4.9.C.8.9.9.2.3.2.E.8.8.7.D.2.E.C.9.7.1.F.1.1.6...1..q0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+............h.(.I.#..}..q..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9774
                            Entropy (8bit):5.200356426579818
                            Encrypted:false
                            SSDEEP:192:B8HvMWG5LZlAdwo3UqTMG4fRb7isIVkTBgdbXnG4+zeVtc2PdT:B8HMl2tNTMG4ft+TkVQnGpzAJ
                            MD5:2AF89E9CB43E93768CA169CB76756123
                            SHA1:9EEAEFF468D6280149C899232E887D2EC971F116
                            SHA-256:303847238B729D0A2D49F93073AC882120FF112C93046845A855A3FC192D6A17
                            SHA-512:43CFED37B4946FB95BD31A33D3EFCC273446FEB13D34593134AB1CB909ACF83FBAD1B5556F092CADA0B5AD3492E2976E010966259CC2E205678CC8620310845F
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7540
                            Entropy (8bit):7.156208031117259
                            Encrypted:false
                            SSDEEP:192:jwn9PCj+nYe+PjP3rTqavM+vmr9ZCspE+TMAr+7+Yac:jjanYPL3qaLeMnOc
                            MD5:16AC4FA94C22381E7A4A50141307A54D
                            SHA1:D796A30A98D895D0BC49A09D0A6F63EABD81BD7A
                            SHA-256:9E5588D557F378CB386D0414D21EA256C60D11DE9D1B915F671B260147B98498
                            SHA-512:3FD8DDA6D71949791E1C2728E5B49EA81032BC5C0D3456DE7C4652479AE023FC5D65E0AF7773C2556F52039FC290C81FF1FBDA3709A5FA8CA81E657F932535EC
                            Malicious:false
                            Preview:0..p..*.H.........a0..]...1.0...+......0.....+.....7......0...0...+.....7......b.B...B..$......140516140010Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..y0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....R9.E.E.A.E.F.F.4.6.8.D.6.2.8.0.1.4.9.C.8.9.9.2.3.2.E.8.8.7.D.2.E.C.9.7.1.F.1.1.6...1..q0P..+.....7...1B0@...F.i.l.e........s.p.e.c.t.r.o.d.e.n.s._.i.r._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+............h.(.I.#..}..q..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9774
                            Entropy (8bit):5.200356426579818
                            Encrypted:false
                            SSDEEP:192:B8HvMWG5LZlAdwo3UqTMG4fRb7isIVkTBgdbXnG4+zeVtc2PdT:B8HMl2tNTMG4ft+TkVQnGpzAJ
                            MD5:2AF89E9CB43E93768CA169CB76756123
                            SHA1:9EEAEFF468D6280149C899232E887D2EC971F116
                            SHA-256:303847238B729D0A2D49F93073AC882120FF112C93046845A855A3FC192D6A17
                            SHA-512:43CFED37B4946FB95BD31A33D3EFCC273446FEB13D34593134AB1CB909ACF83FBAD1B5556F092CADA0B5AD3492E2976E010966259CC2E205678CC8620310845F
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7532
                            Entropy (8bit):7.160287296745998
                            Encrypted:false
                            SSDEEP:192:hF8WkNCjInYe+PjP3rTqavM+vmr9ZCspE+TMAr+VykqZ:T8a8nYPL3qaLeMnVy/
                            MD5:F9A900E64BE138468DBACBC488511E8F
                            SHA1:2F8F2A07A80DC53DEE2F1B687E50D71403C66C5B
                            SHA-256:F0E7DD66F59AA78446C0A5D069F989792584D3BB8A47E69B161D278E43A58877
                            SHA-512:BA85D4D138E497A447546937B637DD7504BFFDCD04B8026C729B87F2DAC095F9739D1B0F76BE90EF6A7D1D7B201B4B8574AE4F01BC65329BB12203671F253EB8
                            Malicious:false
                            Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....\5.k>..A....N....140516140005Z0...+.....7.....0...0....R1.2.F.2.C.9.7.D.E.F.8.3.A.5.A.2.A.E.E.2.6.3.E.A.3.E.7.6.1.E.E.2.8.C.8.5.B.3.1.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........}....c.>v....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9758
                            Entropy (8bit):5.199812485547983
                            Encrypted:false
                            SSDEEP:192:B8HvMWG/LZlAdwo3UqTM84fRb7lsIVkTBgdJXnG4EzeVtc2gaj:B8HGl2tNTM84ftJTkVanG/zAl
                            MD5:04ACD4E8BFA9089D2120AE8872190CB3
                            SHA1:12F2C97DEF83A5A2AEE263EA3E761EE28C85B318
                            SHA-256:D5E60140FC42A8C26566C5D99822F449ECC51C4D8AFF2235FABBD5767AC5E779
                            SHA-512:22046E62109D752F0A3AB67962B70AE65925F3A897287EF64C59592BF11E7EC697F23FEB56AD43EDC8161F4CF144CFBA76421529C6ACA0DC9D523D762DD29DE9
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7532
                            Entropy (8bit):7.160287296745998
                            Encrypted:false
                            SSDEEP:192:hF8WkNCjInYe+PjP3rTqavM+vmr9ZCspE+TMAr+VykqZ:T8a8nYPL3qaLeMnVy/
                            MD5:F9A900E64BE138468DBACBC488511E8F
                            SHA1:2F8F2A07A80DC53DEE2F1B687E50D71403C66C5B
                            SHA-256:F0E7DD66F59AA78446C0A5D069F989792584D3BB8A47E69B161D278E43A58877
                            SHA-512:BA85D4D138E497A447546937B637DD7504BFFDCD04B8026C729B87F2DAC095F9739D1B0F76BE90EF6A7D1D7B201B4B8574AE4F01BC65329BB12203671F253EB8
                            Malicious:false
                            Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....\5.k>..A....N....140516140005Z0...+.....7.....0...0....R1.2.F.2.C.9.7.D.E.F.8.3.A.5.A.2.A.E.E.2.6.3.E.A.3.E.7.6.1.E.E.2.8.C.8.5.B.3.1.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+...........}....c.>v....0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9758
                            Entropy (8bit):5.199812485547983
                            Encrypted:false
                            SSDEEP:192:B8HvMWG/LZlAdwo3UqTM84fRb7lsIVkTBgdJXnG4EzeVtc2gaj:B8HGl2tNTM84ftJTkVanG/zAl
                            MD5:04ACD4E8BFA9089D2120AE8872190CB3
                            SHA1:12F2C97DEF83A5A2AEE263EA3E761EE28C85B318
                            SHA-256:D5E60140FC42A8C26566C5D99822F449ECC51C4D8AFF2235FABBD5767AC5E779
                            SHA-512:22046E62109D752F0A3AB67962B70AE65925F3A897287EF64C59592BF11E7EC697F23FEB56AD43EDC8161F4CF144CFBA76421529C6ACA0DC9D523D762DD29DE9
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7524
                            Entropy (8bit):7.155823358156326
                            Encrypted:false
                            SSDEEP:192:66ohNCjenYe+PjP3rTqavM+vmr9ZCspE+TMAr+0+:r6nYPL3qaLeMnf
                            MD5:78FE95788DB8E3332DA03D9B86943407
                            SHA1:1D9648350CD10A6C9FB33DC87F895C23E049FB8E
                            SHA-256:B56D737983F4B59B34A0CAC7B748617DEFA159965FBEE3B693D767364FE641F0
                            SHA-512:784EA0F012D53856668AE36F6CEFBCA3DBCADE69C20E6A3F42EC899535E3CA774D8C23FC03CBBAB0B4E1DC25DF0029C4C409A2E02D085896BB6D42252CDDED9A
                            Malicious:false
                            Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......8d&?u.@.....`o...140516140007Z0...+.....7.....0...0....R5.6.1.3.1.A.E.B.2.C.6.E.7.9.4.7.E.1.F.B.7.C.B.2.8.2.6.3.8.B.5.8.B.7.0.5.6.7.8.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........V...,nyG..|..c.X..g.0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9742
                            Entropy (8bit):5.203938700783149
                            Encrypted:false
                            SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1g4fRb7J2sIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTMG4ft8TkV1nGkzA2
                            MD5:7FBD82746CF38DA2A8728A7C47112124
                            SHA1:56131AEB2C6E7947E1FB7CB282638B58B705678C
                            SHA-256:EFAD8843EB281869659A13CE3FCC48D5922C85A5CF63F4E91A6C22B0B9683F2D
                            SHA-512:DCE593288E62E60CBC6E2C3CB1EED01B56A3431F324D877D41D98F3F38D20B2276A117EB9106B690C03A5816285D6864A0DD0A99132E0781C007B8C66D72C3D6
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7524
                            Entropy (8bit):7.155823358156326
                            Encrypted:false
                            SSDEEP:192:66ohNCjenYe+PjP3rTqavM+vmr9ZCspE+TMAr+0+:r6nYPL3qaLeMnf
                            MD5:78FE95788DB8E3332DA03D9B86943407
                            SHA1:1D9648350CD10A6C9FB33DC87F895C23E049FB8E
                            SHA-256:B56D737983F4B59B34A0CAC7B748617DEFA159965FBEE3B693D767364FE641F0
                            SHA-512:784EA0F012D53856668AE36F6CEFBCA3DBCADE69C20E6A3F42EC899535E3CA774D8C23FC03CBBAB0B4E1DC25DF0029C4C409A2E02D085896BB6D42252CDDED9A
                            Malicious:false
                            Preview:0..`..*.H.........Q0..M...1.0...+......0.....+.....7......0...0...+.....7......8d&?u.@.....`o...140516140007Z0...+.....7.....0...0....R5.6.1.3.1.A.E.B.2.C.6.E.7.9.4.7.E.1.F.B.7.C.B.2.8.2.6.3.8.B.5.8.B.7.0.5.6.7.8.C...1..i0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........V...,nyG..|..c.X..g.0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..q0H..+.....7...1:08...F.i.l.e.......&s.p.e.c.t.r.o.j.e.t._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9742
                            Entropy (8bit):5.203938700783149
                            Encrypted:false
                            SSDEEP:192:B8HvMWGKLZlAdwo3UqTM1g4fRb7J2sIVkTBgdmXnG4jzeVtc2nVc:B8Htl2tNTMG4ft8TkV1nGkzA2
                            MD5:7FBD82746CF38DA2A8728A7C47112124
                            SHA1:56131AEB2C6E7947E1FB7CB282638B58B705678C
                            SHA-256:EFAD8843EB281869659A13CE3FCC48D5922C85A5CF63F4E91A6C22B0B9683F2D
                            SHA-512:DCE593288E62E60CBC6E2C3CB1EED01B56A3431F324D877D41D98F3F38D20B2276A117EB9106B690C03A5816285D6864A0DD0A99132E0781C007B8C66D72C3D6
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7532
                            Entropy (8bit):7.163912217919972
                            Encrypted:false
                            SSDEEP:192:hF2lRtPCj1nYe+PjP3rTqavM+vmr9ZCspE+TMAr+Nm0jPgH:T2gJnYPL3qaLeMnk5
                            MD5:EC1239127DC978757B0B9CC27D35128E
                            SHA1:DD4FE65A456D244DAA29E85FF5AF7E1B4BF64014
                            SHA-256:FD4981D78D8F37AAA13BEDB75406B61FF24BE17589187AC1D8FE8E8DDF0B1863
                            SHA-512:EC3C70835A009A719893B54B682BC3ED6085F506D29E1C93E255040B633ECED4DA7449C16B5F636119EB9F97314A8ADE347D9FC0B3C4ECD5A082FA771CCAA0C7
                            Malicious:false
                            Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....Y....+,J...U..X...140516140008Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RA.1.6.D.E.3.5.E.A.B.4.E.6.E.5.1.B.E.4.5.4.4.7.9.3.A.0.5.D.B.C.6.6.8.2.9.8.D.E.B...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........m.^.NnQ.EDy:...h)..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9758
                            Entropy (8bit):5.200481985878872
                            Encrypted:false
                            SSDEEP:192:B8HvMWGzLZlAdwo3UqTMH4fRbz7sIVkTBgdVXnG4QzeVtc2UWv:B8H6l2tNTMH4ft/TkVmnGLzAJ
                            MD5:120CBBA255C66FBCAAD7D49BCF567FA5
                            SHA1:A16DE35EAB4E6E51BE4544793A05DBC668298DEB
                            SHA-256:17E11451106D4DC767CE654D828EC5C3DE1AD9000BD51B7F5E2CA87334C71179
                            SHA-512:73D7A772C5F9EBAB0D363DAF3BDCBB176B0EAE6A170258D9E1EE5D1AF7D7A194C1D1716364BE411EF5CFBD1DEB69A0ECAEFB9FC8CFF08ABD68DC13B630E533EE
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):7532
                            Entropy (8bit):7.163912217919972
                            Encrypted:false
                            SSDEEP:192:hF2lRtPCj1nYe+PjP3rTqavM+vmr9ZCspE+TMAr+Nm0jPgH:T2gJnYPL3qaLeMnk5
                            MD5:EC1239127DC978757B0B9CC27D35128E
                            SHA1:DD4FE65A456D244DAA29E85FF5AF7E1B4BF64014
                            SHA-256:FD4981D78D8F37AAA13BEDB75406B61FF24BE17589187AC1D8FE8E8DDF0B1863
                            SHA-512:EC3C70835A009A719893B54B682BC3ED6085F506D29E1C93E255040B633ECED4DA7449C16B5F636119EB9F97314A8ADE347D9FC0B3C4ECD5A082FA771CCAA0C7
                            Malicious:false
                            Preview:0..h..*.H.........Y0..U...1.0...+......0.....+.....7......0...0...+.....7.....Y....+,J...U..X...140516140008Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RA.1.6.D.E.3.5.E.A.B.4.E.6.E.5.1.B.E.4.5.4.4.7.9.3.A.0.5.D.B.C.6.6.8.2.9.8.D.E.B...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.p.l.a.t.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........m.^.NnQ.EDy:...h)..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9758
                            Entropy (8bit):5.200481985878872
                            Encrypted:false
                            SSDEEP:192:B8HvMWGzLZlAdwo3UqTMH4fRbz7sIVkTBgdVXnG4QzeVtc2UWv:B8H6l2tNTMH4ft/TkVmnGLzAJ
                            MD5:120CBBA255C66FBCAAD7D49BCF567FA5
                            SHA1:A16DE35EAB4E6E51BE4544793A05DBC668298DEB
                            SHA-256:17E11451106D4DC767CE654D828EC5C3DE1AD9000BD51B7F5E2CA87334C71179
                            SHA-512:73D7A772C5F9EBAB0D363DAF3BDCBB176B0EAE6A170258D9E1EE5D1AF7D7A194C1D1716364BE411EF5CFBD1DEB69A0ECAEFB9FC8CFF08ABD68DC13B630E533EE
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):9576
                            Entropy (8bit):7.214945113432049
                            Encrypted:false
                            SSDEEP:192:3GmgPCj2yowJL/cu7RZgjlorfpx+viJdr9ZCspE+TMcrbdYr:39xSYJLca6jIp3weM+M
                            MD5:F4F90EDFE025F3C918A7D4992F103A48
                            SHA1:34A3A6E4711D1625CB29B5A800EF1D9569373A41
                            SHA-256:51BE8127BE3D3F651D269A0885D66D16CA4030079CB8019754D7D5662090B203
                            SHA-512:CD62D1FDE1741DE0F0EC81DB325A210305C72344FD9E111011C6264EAC5FF3E84C8E22CC779EFCB3449A4839164BE068D00D249C795B68D98E3702FEFBB5FD6A
                            Malicious:false
                            Preview:0.%d..*.H........%U0.%Q...1.0...+......0.....+.....7......0...0...+.....7.........A@>C.<.._B.7..111202130217Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RD.2.4.7.5.3.B.F.3.E.9.E.4.4.F.0.4.5.5.A.7.C.C.8.8.8.0.3.D.2.A.C.0.7.2.7.C.8.C.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........GS.>.D.EZ|....'..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9774
                            Entropy (8bit):5.201512481427886
                            Encrypted:false
                            SSDEEP:192:B8HvMWG/LZlAdwo3UqTMK4fRbK6sIVkTBgdJXnG4EzeVtc28SJn:B8HGl2tNTMK4ftzTkVanG/zArZ
                            MD5:9232DCCBA703DBE10F07D17480D831F9
                            SHA1:D24753BF3E9E44F0455A7CC88803D2AC0727C8C8
                            SHA-256:792CE4DA7EA6403A6D53A6F5C563F686CD72989E716CABFF6FAED59DE477F8C2
                            SHA-512:03772B2742906A1AE260A30C97E52997A869B79C2D7A7491681F2E506757F8E057075CE4F1BB63761D6BA748AA6D28E0AA7B5930BDF3FC5B1A2637F88AD9BC33
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):9576
                            Entropy (8bit):7.214945113432049
                            Encrypted:false
                            SSDEEP:192:3GmgPCj2yowJL/cu7RZgjlorfpx+viJdr9ZCspE+TMcrbdYr:39xSYJLca6jIp3weM+M
                            MD5:F4F90EDFE025F3C918A7D4992F103A48
                            SHA1:34A3A6E4711D1625CB29B5A800EF1D9569373A41
                            SHA-256:51BE8127BE3D3F651D269A0885D66D16CA4030079CB8019754D7D5662090B203
                            SHA-512:CD62D1FDE1741DE0F0EC81DB325A210305C72344FD9E111011C6264EAC5FF3E84C8E22CC779EFCB3449A4839164BE068D00D249C795B68D98E3702FEFBB5FD6A
                            Malicious:false
                            Preview:0.%d..*.H........%U0.%Q...1.0...+......0.....+.....7......0...0...+.....7.........A@>C.<.._B.7..111202130217Z0...+.....7.....0...0....R5.C.5.A.1.D.6.2.D.C.C.8.E.4.A.E.5.5.C.9.5.7.3.1.0.0.D.1.2.A.4.5.6.3.1.9.A.5.5.A...1..u0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...s.y.s...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0i..+.....7...1[0Y04..+.....7...0&..... .....<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+........\Z.b...U.W1..*Ec..Z0....RD.2.4.7.5.3.B.F.3.E.9.E.4.4.F.0.4.5.5.A.7.C.C.8.8.8.0.3.D.2.A.C.0.7.2.7.C.8.C.8...1..m0L..+.....7...1>0<...F.i.l.e.......*s.p.e.c.t.r.o.d.r.i.v.e._.x.6.4...i.n.f...0V..+.....7...1H0F...O.S.A.t.t.r.......02.:.5...1.,.2.:.5...2.,.2.:.6...0.,.2.:.6...1...0a..+.....7...1S0Q0,..+.....7........<.<.<.O.b.s.o.l.e.t.e.>.>.>0!0...+.........GS.>.D.EZ|....'..0b..+.....7...1T0R.L.{.D.E.3.5.1.A.4.2.-.8.E.5.9.
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:Windows setup INFormation
                            Category:dropped
                            Size (bytes):9774
                            Entropy (8bit):5.201512481427886
                            Encrypted:false
                            SSDEEP:192:B8HvMWG/LZlAdwo3UqTMK4fRbK6sIVkTBgdJXnG4EzeVtc28SJn:B8HGl2tNTMK4ftzTkVanG/zArZ
                            MD5:9232DCCBA703DBE10F07D17480D831F9
                            SHA1:D24753BF3E9E44F0455A7CC88803D2AC0727C8C8
                            SHA-256:792CE4DA7EA6403A6D53A6F5C563F686CD72989E716CABFF6FAED59DE477F8C2
                            SHA-512:03772B2742906A1AE260A30C97E52997A869B79C2D7A7491681F2E506757F8E057075CE4F1BB63761D6BA748AA6D28E0AA7B5930BDF3FC5B1A2637F88AD9BC33
                            Malicious:false
                            Preview:;..; *** This file was generated by USBIO Installation Wizard. ***..;..;..; USBIO Setup Information file V2.50..; Copyright (c) 1998-2009 by Thesycon GmbH..;..; This file supports:..; Windows XP x64 Edition..; Windows Vista x64..; Windows 7 x64..; Windows Server 2003 x64..; Windows Server 2008 x64..;..; To create a customized version of this file..; modify sections marked with ### modify here ###..; For details, refer to the USBIO Reference Manual...;..; Note:..; Some section names (enclosed in []) are system-defined and should not be changed...; Private section names start with an '_'. Those can be changed...;..; Refer to the Windows DDK documentation for more information on INF files...;....;******************************************************************************..; Version section..;------------------------------------------------------------------------------..[Version]..Signature="$Windows NT$"..Provider=%S_Provider%..DriverVer=11/16/2009,2.50.0.0....; Th
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:PE32+ executable (native) x86-64, for MS Windows
                            Category:dropped
                            Size (bytes):48488
                            Entropy (8bit):6.440221003074469
                            Encrypted:false
                            SSDEEP:768:uK4Pgwcmf/CQeVMVV8xwaLlFHGLC/v2YjVt3M9/9ao6C3l2HOkGiFB+QL/MmwbCU:cTcmyVMVN5C/niEWkHO3iFB+QbDkCGJ
                            MD5:8E049EC67A13CB855C0717D88CB75C25
                            SHA1:F39038344DBEBD62719CEA89F1B5EA7D4489C5D1
                            SHA-256:6E6FAE0D077BFD57AE363324EBE06FB318364A7E76339535F49B605559704BD6
                            SHA-512:E9700A50C5D22AEBD8FDE98EDF92F034494403413CC2DD67400BDAA82CCA60911A1871B977B9A2406DB161D6129A3FA89EAF6DD9F88C9232DA327A8CF1D82AE4
                            Malicious:true
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........S...=_..=_..=_..<_..=_.2F_..=_.2@_..=_.2P_..=_.2O_..=_.2A_..=_.2E_..=_Rich..=_........................PE..d...I.J.........."......x..........................................................F}......................................................d...P.......................h'......4...0...................................................(............................text...om.......n.................. ..h.rdata..H............r..............@..H.data................~..............@....pdata..............................@..HINIT................................ ....rsrc...............................@..B.reloc..............................@..B................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\drvinst.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:modified
                            Size (bytes):6719
                            Entropy (8bit):5.302103870369462
                            Encrypted:false
                            SSDEEP:192:UOYYKOYYKx00cQiev1liGdUiGdUdhNb6KWAbcXDX9hl6tbNuwQ:UfYKfYKx00cuTiGdUiGdUdhCP
                            MD5:D20E560EF358E1CC075EA2D026313178
                            SHA1:48A8E9D53D17C3D964870FBB099558CADFD48A8C
                            SHA-256:C8D58EB36F799FC67EFD094E287462D41EB9C8C79EB166EBD90C2BF4C4CBB4E8
                            SHA-512:C21341A725B4AFA37E186B848BADE79D1E73AA49E9C30A51C795E8F859A2AA5763FC6661BC65F8CD6008EFB041129C424184CB4EC77BC9822B29B3E455A90FC9
                            Malicious:false
                            Preview:CatalogDB: 12:38:54 AM 9/3/2021: catdbsvc.cpp at line #6041 encountered JET error -1409..CatalogDB: 12:38:54 AM 9/3/2021: catdbsvc.cpp at line #6699 encountered JET error -1409..CatalogDB: 12:38:54 AM 9/3/2021: catdbsvc.cpp at line #4398 encountered JET error -1409..CatalogDB: 12:38:54 AM 9/3/2021: catdbsvc.cpp at line #6041 encountered JET error -1409..CatalogDB: 12:38:54 AM 9/3/2021: catdbsvc.cpp at line #6699 encountered JET error -1409..CatalogDB: 12:38:54 AM 9/3/2021: catdbsvc.cpp at line #4398 encountered JET error -1409..CatalogDB: 12:38:54 AM 9/3/2021: catdbsvc.cpp at line #2083 encountered JET error -1409..CatalogDB: 12:38:54 AM 9/3/2021: catdbsvc.cpp at line #2459 encountered JET error -1409..CatalogDB: 12:38:54 AM 9/3/2021: SyncAllDBs Corruption or Schema Change..CatalogDB: 12:38:54 AM 9/3/2021: catdbsvc.cpp at line #891 encountered JET error -1409..CatalogDB: 12:38:54 AM 9/3/2021: catdbsvc.cpp at line #1307 encountered JET error -1601..CatalogDB: 12:38:54 AM 9/3/2021: SyncD
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):32768
                            Entropy (8bit):2.351205858233362
                            Encrypted:false
                            SSDEEP:192:qt1Vb1BgkSnuYQ0jg5Bt+GS7DDsv4TKDZRD/IYI:OPxB+nuVCg5BtoDsrDZ1/
                            MD5:791251FC20A7C8E1D34B9E7765D0BF0E
                            SHA1:0DC8796973D6DEEFD5E9F95BDA507BEDE63FD3E3
                            SHA-256:FE92625B61CF76728CC68268228102BAFC9DCDE5E685D6B177052E095255331A
                            SHA-512:C2C93C9F80006920194A501DBB107B209CB64CA97D040BBB1C314D57BBB09123DE97B60106FA3B63D985FA3E4191F5AAB7FD6404FABB8143D546E485BB967016
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):512
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3::
                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                            Malicious:false
                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):32768
                            Entropy (8bit):0.5371067531425333
                            Encrypted:false
                            SSDEEP:24:/bF0mlGAu8HscELypUHOl050j9/ZVuNjJPUB//:/bamlwP6UW052y6//
                            MD5:98DAD454EA741487DDEECF44A849F212
                            SHA1:0A31507139CFE50B514891E8A6000C6F443ADCDC
                            SHA-256:9DD769C5AE6AABA499786B8F5696CBDEE3BC8CF542F67F2559DDAC5987E38379
                            SHA-512:DDFEAEA0844AADB5BA476DB4E3DCA46AE3D8326EF4C0300CD9C0CC1303C487863240C5BE6D4B9C0EC79B5F58127DB8A35473CFD4854DF3509D7123E366AB161E
                            Malicious:false
                            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):49152
                            Entropy (8bit):1.7878893430217928
                            Encrypted:false
                            SSDEEP:192:1Gx6r1BgkSnuYQ0jg5Bt+GS7DDsv4TKDZRD/IYI:1OSB+nuVCg5BtoDsrDZ1/
                            MD5:CCABAEAAC2DB8D9CA7723928518B8897
                            SHA1:BD2BB7883BABDC5BA6A64E3D4C74F11EA7944B31
                            SHA-256:E2D7A614BDE4B44AA867F1F79384255BA106D61581E898FB1C84BAC660B73A94
                            SHA-512:61A6011071EEB7703C6CE37716EA50CB52138FDE5F5C1E186475B9BF3D270DA6B71730780DA0D44BE5A7CDA9DCE66DCCEADEF423C7E159E31010FD82C7CFD265
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):512
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3::
                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                            Malicious:false
                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):512
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3::
                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                            Malicious:false
                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):77824
                            Entropy (8bit):0.8683449633455047
                            Encrypted:false
                            SSDEEP:192:s3OYXmcMAcAYAiAbAOAAsjqpSjwlJy/Aa8BAx3oFGg5Bt+vSB3DFgBYuEsDo1SAF:sPzZFXkzsQxYsg5BoiDFEDo1SA7/
                            MD5:E21AF55FE1E5DC333750F4C57F07A7C3
                            SHA1:CEBBA7B8475E749E3EEEBD6DE0EA75660D57648F
                            SHA-256:8B53702EEAD86DAAD2DEC8DD6E26D8919D8B57EF14580D96F681BAE904F25500
                            SHA-512:BBF50F2120367BEB6DC6C5AD641E7E9DFA1A88F906415A163D26A80E7DE63E4129B1C774C75F3231C2AC0C03A5DE47ACB422357A732A92E1ECDC5C94940B70F6
                            Malicious:false
                            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):20480
                            Entropy (8bit):1.4855112921180504
                            Encrypted:false
                            SSDEEP:48:C8PhbuRc06WXJGFT5vI4Xn3tZ/1Cfq6Oe0ZPfjOy:thb1dFTz33D/1CnfuPC
                            MD5:92F06D61F100A3BD2B8C18EE665FF26E
                            SHA1:DB96F68A66392E4227F4D3CC9539A1DAE43231F0
                            SHA-256:4E582B7165F78BFE372470A0FF6640A9AB2F8840F1159D707CFCF5FA6D5324F2
                            SHA-512:B8ED3D71DB489FA3540FDC0BF45A0AAB0DB9C4F408809FFABCABC0544502377ED0CC3DCEC1D0B5D093D0A2C450CA57E38A2245F0431801D68298B6C6F63FDAEC
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):20480
                            Entropy (8bit):1.4855112921180504
                            Encrypted:false
                            SSDEEP:48:C8PhbuRc06WXJGFT5vI4Xn3tZ/1Cfq6Oe0ZPfjOy:thb1dFTz33D/1CnfuPC
                            MD5:92F06D61F100A3BD2B8C18EE665FF26E
                            SHA1:DB96F68A66392E4227F4D3CC9539A1DAE43231F0
                            SHA-256:4E582B7165F78BFE372470A0FF6640A9AB2F8840F1159D707CFCF5FA6D5324F2
                            SHA-512:B8ED3D71DB489FA3540FDC0BF45A0AAB0DB9C4F408809FFABCABC0544502377ED0CC3DCEC1D0B5D093D0A2C450CA57E38A2245F0431801D68298B6C6F63FDAEC
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):49152
                            Entropy (8bit):2.0093338792840023
                            Encrypted:false
                            SSDEEP:192:SavwCDFGg5Bt+vSB3DFgBYuEsDo1SAlmo/SY7nYXmcMAcAYAiAbAOAAsjqpSjwli:S8jDsg5BoiDFEDo1SA7/ezZFXkzsQx
                            MD5:9B79BBED576E0CA61F8103964B67C231
                            SHA1:EC8CA6A61F6CF7A31D53419FEAF63B19825D62A7
                            SHA-256:038932197299181CAE2820A63629CAF56B8F4360308940E14982D8E2C1431370
                            SHA-512:445B08B19A1B1514D8194E19766269FA954AB7577BF2A4B0F67DE86B3F607F7999AB5404D3DB251C57F4A9496F135A20A24B0388F84698DBBCE2C7A8F19892D2
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):49152
                            Entropy (8bit):2.0093338792840023
                            Encrypted:false
                            SSDEEP:192:SavwCDFGg5Bt+vSB3DFgBYuEsDo1SAlmo/SY7nYXmcMAcAYAiAbAOAAsjqpSjwli:S8jDsg5BoiDFEDo1SA7/ezZFXkzsQx
                            MD5:9B79BBED576E0CA61F8103964B67C231
                            SHA1:EC8CA6A61F6CF7A31D53419FEAF63B19825D62A7
                            SHA-256:038932197299181CAE2820A63629CAF56B8F4360308940E14982D8E2C1431370
                            SHA-512:445B08B19A1B1514D8194E19766269FA954AB7577BF2A4B0F67DE86B3F607F7999AB5404D3DB251C57F4A9496F135A20A24B0388F84698DBBCE2C7A8F19892D2
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):49152
                            Entropy (8bit):1.7878893430217928
                            Encrypted:false
                            SSDEEP:192:1Gx6r1BgkSnuYQ0jg5Bt+GS7DDsv4TKDZRD/IYI:1OSB+nuVCg5BtoDsrDZ1/
                            MD5:CCABAEAAC2DB8D9CA7723928518B8897
                            SHA1:BD2BB7883BABDC5BA6A64E3D4C74F11EA7944B31
                            SHA-256:E2D7A614BDE4B44AA867F1F79384255BA106D61581E898FB1C84BAC660B73A94
                            SHA-512:61A6011071EEB7703C6CE37716EA50CB52138FDE5F5C1E186475B9BF3D270DA6B71730780DA0D44BE5A7CDA9DCE66DCCEADEF423C7E159E31010FD82C7CFD265
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):49152
                            Entropy (8bit):1.7878893430217928
                            Encrypted:false
                            SSDEEP:192:1Gx6r1BgkSnuYQ0jg5Bt+GS7DDsv4TKDZRD/IYI:1OSB+nuVCg5BtoDsrDZ1/
                            MD5:CCABAEAAC2DB8D9CA7723928518B8897
                            SHA1:BD2BB7883BABDC5BA6A64E3D4C74F11EA7944B31
                            SHA-256:E2D7A614BDE4B44AA867F1F79384255BA106D61581E898FB1C84BAC660B73A94
                            SHA-512:61A6011071EEB7703C6CE37716EA50CB52138FDE5F5C1E186475B9BF3D270DA6B71730780DA0D44BE5A7CDA9DCE66DCCEADEF423C7E159E31010FD82C7CFD265
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):32768
                            Entropy (8bit):0.40513758244142983
                            Encrypted:false
                            SSDEEP:24:/jF0mljcsiQs5hBFyTUksTQ+F/ymZU+/w/FD+utO7K:/jamljcsmBITdsT2AK
                            MD5:C9CE37571D2D99AF9CCD5C5BAE4EA9DA
                            SHA1:412B6CEC7D93E35891DA132C8A0625B5943CC035
                            SHA-256:0874EB1855AC1968237855FC450B59CEB1FC7AA39A6CA269744900577BB44228
                            SHA-512:AB9DBFE452B9B69311C5AD9341A8FD0A4B75F7B6861841FD5082EEC6B5D45BB111A957AEF6FB0CEED141E3DE6986CFF5C18188B67E09E372186D5CADA967EAAE
                            Malicious:false
                            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):49152
                            Entropy (8bit):2.0093338792840023
                            Encrypted:false
                            SSDEEP:192:SavwCDFGg5Bt+vSB3DFgBYuEsDo1SAlmo/SY7nYXmcMAcAYAiAbAOAAsjqpSjwli:S8jDsg5BoiDFEDo1SA7/ezZFXkzsQx
                            MD5:9B79BBED576E0CA61F8103964B67C231
                            SHA1:EC8CA6A61F6CF7A31D53419FEAF63B19825D62A7
                            SHA-256:038932197299181CAE2820A63629CAF56B8F4360308940E14982D8E2C1431370
                            SHA-512:445B08B19A1B1514D8194E19766269FA954AB7577BF2A4B0F67DE86B3F607F7999AB5404D3DB251C57F4A9496F135A20A24B0388F84698DBBCE2C7A8F19892D2
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):512
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3::
                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                            Malicious:false
                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):512
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3::
                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                            Malicious:false
                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):512
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3::
                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                            Malicious:false
                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):73728
                            Entropy (8bit):0.739418406647458
                            Encrypted:false
                            SSDEEP:192:0WnuYT1Bgkg0jg5Bt+GS7DDsv4TKDZRD/IY:BnueBkCg5BtoDsrDZ1/
                            MD5:7AD9E26ED22120E679B06302D31BE01E
                            SHA1:6A2B1C4ECD486F5248027BE54F1326AF56D1E924
                            SHA-256:F62E9BB4A50CC4B1AB68D40D590C12324817028ED28465BE2DE4E302B06C932D
                            SHA-512:EEB20A9495DFADD52B3B9A740FF5C54E0DBB90DF940A60A8E44F63A8D66D498CD4FC5DC8A8E73558FA02916066A38AC427C862E07B10FF343214A5FC647208AF
                            Malicious:false
                            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):512
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3::
                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                            Malicious:false
                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):512
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3::
                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                            Malicious:false
                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):512
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3::
                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                            Malicious:false
                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):512
                            Entropy (8bit):0.0
                            Encrypted:false
                            SSDEEP:3::
                            MD5:BF619EAC0CDF3F68D496EA9344137E8B
                            SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                            SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                            SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                            Malicious:false
                            Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\msiexec.exe
                            File Type:Composite Document File V2 Document, Cannot read section info
                            Category:dropped
                            Size (bytes):32768
                            Entropy (8bit):2.351205858233362
                            Encrypted:false
                            SSDEEP:192:qt1Vb1BgkSnuYQ0jg5Bt+GS7DDsv4TKDZRD/IYI:OPxB+nuVCg5BtoDsrDZ1/
                            MD5:791251FC20A7C8E1D34B9E7765D0BF0E
                            SHA1:0DC8796973D6DEEFD5E9F95BDA507BEDE63FD3E3
                            SHA-256:FE92625B61CF76728CC68268228102BAFC9DCDE5E685D6B177052E095255331A
                            SHA-512:C2C93C9F80006920194A501DBB107B209CB64CA97D040BBB1C314D57BBB09123DE97B60106FA3B63D985FA3E4191F5AAB7FD6404FABB8143D546E485BB967016
                            Malicious:false
                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):7.992773034922727
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:8ue90oYkrv.exe
                            File size:13'453'632 bytes
                            MD5:5a0d2bc66c17c640e81233cf6a200e07
                            SHA1:65ab84dc66feb7b7034ec5713b68fd39a6cd1a01
                            SHA256:e6183c4c9f5224cf8923cb76170aaf489be9428c0b7ec56f0289a74b533e7457
                            SHA512:702c862e10b31a7c14fa1c9d63d42b5710d5a7392b5acbb0ebb4605d8c92f77dd08b69234eea99a5fc7031fa337173e3c7f45547e0cc1e0e17465a6fbd110743
                            SSDEEP:196608:uv/Ubmek67xSg9uXs1MAsG3UiKC0NWzqi3aumj37RtXuC9/RyXBNQeGvcGqR3q8H:g8aejfucanjC0NNtp37RdZeBNKvcGkfz
                            TLSH:8DD63322F3EE8271FCB36EB859B18BAA462778119F35D6DF6348095D5E322C05A74313
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......}'.O9F..9F..9F..0>[..F..0>J.-F..0>\.SF......;F......6F..9F...F..0>V.eF..'.K.8F..0>N.8F..Rich9F..................PE..L....Z.U...
                            Icon Hash:3e5bec56762e350b
                            Entrypoint:0x421bd6
                            Entrypoint Section:.text
                            Digitally signed:true
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:TERMINAL_SERVER_AWARE
                            Time Stamp:0x55EF5AD2 [Tue Sep 8 22:01:54 2015 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:0
                            File Version Major:5
                            File Version Minor:0
                            Subsystem Version Major:5
                            Subsystem Version Minor:0
                            Import Hash:eaefd1169420dcee9fef7c65aa268740
                            Signature Valid:true
                            Signature Issuer:CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
                            Signature Validation Error:The operation completed successfully
                            Error Number:0
                            Not Before, Not After
                            • 04/03/2014 00:00:00 03/06/2017 00:59:59
                            Subject Chain
                            • CN=TECHKON GmbH, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=TECHKON GmbH, L=Koenigstein, S=Hessen, C=DE
                            Version:3
                            Thumbprint MD5:7CA2896A0BED0C0EA2C32E34FA89EDB3
                            Thumbprint SHA-1:B6E6CB217307F0D3CD5CA360D368887B8FA98BA3
                            Thumbprint SHA-256:F712E6788F1A6B6C520E5203EE07C2421F8D157D0B041AC9AA8ECABADBEFB87A
                            Serial:2C68B7C967BB304C0C911BB4D3311D95
                            Instruction
                            call 00007FC478933786h
                            jmp 00007FC47893011Dh
                            mov edi, edi
                            push ebp
                            mov ebp, esp
                            sub esp, 00000328h
                            mov dword ptr [004393B8h], eax
                            mov dword ptr [004393B4h], ecx
                            mov dword ptr [004393B0h], edx
                            mov dword ptr [004393ACh], ebx
                            mov dword ptr [004393A8h], esi
                            mov dword ptr [004393A4h], edi
                            mov word ptr [004393D0h], ss
                            mov word ptr [004393C4h], cs
                            mov word ptr [004393A0h], ds
                            mov word ptr [0043939Ch], es
                            mov word ptr [00439398h], fs
                            mov word ptr [00439394h], gs
                            pushfd
                            pop dword ptr [004393C8h]
                            mov eax, dword ptr [ebp+00h]
                            mov dword ptr [004393BCh], eax
                            mov eax, dword ptr [ebp+04h]
                            mov dword ptr [004393C0h], eax
                            lea eax, dword ptr [ebp+08h]
                            mov dword ptr [004393CCh], eax
                            mov eax, dword ptr [ebp-00000320h]
                            mov dword ptr [00439308h], 00010001h
                            mov eax, dword ptr [004393C0h]
                            mov dword ptr [004392BCh], eax
                            mov dword ptr [004392B0h], C0000409h
                            mov dword ptr [004392B4h], 00000001h
                            mov eax, dword ptr [00437024h]
                            mov dword ptr [ebp-00000328h], eax
                            mov eax, dword ptr [00437028h]
                            mov dword ptr [ebp-00000324h], eax
                            call dword ptr [00000098h]
                            Programming Language:
                            • [C++] VS2008 SP1 build 30729
                            • [ASM] VS2008 SP1 build 30729
                            • [ C ] VS2008 SP1 build 30729
                            • [ C ] VS2005 build 50727
                            • [IMP] VS2005 build 50727
                            • [RES] VS2008 build 21022
                            • [LNK] VS2008 SP1 build 30729
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x360e80xa0.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x400000x1b0c8.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0xcd30200x1920
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x30e100x40.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x2e0000x264.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x2cb9d0x2cc0008b1425d0c235f73ec2fd58abfe6486dFalse0.5150412447625698data6.487113973217182IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x2e0000x8e280x90002493c37a97f6e172b3dd001b1af0d594False0.3415256076388889data4.651109246510969IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x370000x83000x24005b956e9eb3e2cde75a854ea16ed7c543False0.2583550347222222data4.183030383074928IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x400000x1b0c80x1b2000776982004dfe8682cdafdb0e01c538bFalse0.2710883496543779data4.541515290825601IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x40d140xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.35261194029850745
                            RT_ICON0x41bbc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.36236462093862815
                            RT_ICON0x424640x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.3302023121387283
                            RT_ICON0x429cc0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.27842323651452283
                            RT_ICON0x44f740x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.3557692307692308
                            RT_ICON0x4601c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.4512411347517731
                            RT_DIALOG0x464840x1d8data0.5720338983050848
                            RT_DIALOG0x4665c0x1bedata0.5605381165919282
                            RT_DIALOG0x4681c0x54data0.7619047619047619
                            RT_STRING0x468700x478Matlab v4 mat-file (little endian) D\006'\006 , numeric, rows 0, columns 0ArabicSaudi Arabia0.2972027972027972
                            RT_STRING0x46ce80x5baMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0CatalanSpain0.252387448840382
                            RT_STRING0x472a40x1caMatlab v4 mat-file (little endian) !q\325luR\372^\207e\366N>Y , numeric, rows 0, columns 0ChineseTaiwan0.5131004366812227
                            RT_STRING0x474700x4eaMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0CzechCzech Republic0.2845786963434022
                            RT_STRING0x4795c0x4d6Matlab v4 mat-file (little endian) K, numeric, rows 0, columns 0DanishDenmark0.2689822294022617
                            RT_STRING0x47e340x6b6Matlab v4 mat-file (little endian) O, numeric, rows 0, columns 0GermanGermany0.2409778812572759
                            RT_STRING0x484ec0x596Matlab v4 mat-file (little endian) \224\003\265\003\275\003 , numeric, rows 0, columns 0GreekGreece0.2853146853146853
                            RT_STRING0x48a840x48cMatlab v4 mat-file (little endian) C, numeric, rows 0, columns 0EnglishUnited States0.27405498281786944
                            RT_STRING0x48f100x57cMatlab v4 mat-file (little endian) E, numeric, rows 0, columns 0FinnishFinland0.24287749287749288
                            RT_STRING0x4948c0x63cMatlab v4 mat-file (little endian) I, numeric, rows 0, columns 0FrenchFrance0.22807017543859648
                            RT_STRING0x49ac80x370Matlab v4 mat-file (little endian) ', numeric, rows 0, columns 0HebrewIsrael0.33636363636363636
                            RT_STRING0x49e380x4c6Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0HungarianHungary0.29705400981996727
                            RT_STRING0x4a3000x528Matlab v4 mat-file (little endian) I, numeric, rows 0, columns 0ItalianItaly0.25227272727272726
                            RT_STRING0x4a8280x2c6Matlab v4 mat-file (little endian) \3250\2510\3530\3000 , numeric, rows 0, columns 0JapaneseJapan0.4295774647887324
                            RT_STRING0x4aaf00x290Matlab v4 mat-file (little endian) \364\323T\263|\271 , numeric, rows 0, columns 0KoreanNorth Korea0.4634146341463415
                            RT_STRING0x4aaf00x290Matlab v4 mat-file (little endian) \364\323T\263|\271 , numeric, rows 0, columns 0KoreanSouth Korea0.4634146341463415
                            RT_STRING0x4ad800x5b2Matlab v4 mat-file (little endian) K, numeric, rows 0, columns 0DutchNetherlands0.2496570644718793
                            RT_STRING0x4b3340x496Matlab v4 mat-file (little endian) K, numeric, rows 0, columns 0NorwegianNorway0.2632027257240204
                            RT_STRING0x4b7cc0x4bcMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0PolishPoland0.2838283828382838
                            RT_STRING0x4bc880x5a6Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0PortugueseBrazil0.25311203319502074
                            RT_STRING0x4c2300x582Matlab v4 mat-file (little endian) D, numeric, rows 0, columns 0RomanianRomania0.2581560283687943
                            RT_STRING0x4c7b40x52cdataRussianRussia0.2809667673716012
                            RT_STRING0x4cce00x47aMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0CroatianCroatia0.27486910994764396
                            RT_STRING0x4d15c0x506Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0SlovakSlovakia0.2690513219284603
                            RT_STRING0x4d6640x4beMatlab v4 mat-file (little endian) K, numeric, rows 0, columns 0SwedishSweden0.25617792421746294
                            RT_STRING0x4db240x458Matlab v4 mat-file (little endian) D\016!\016H\016*\0162\016!\0162\016#\016\026\016*\016#\016I\0162\016\007\016B\016\037\016%\016@\016\024\016-\016#\016L\016D\016\024\016I\016 , numeric, rows 0, columns 0ThaiThailand0.3255395683453237
                            RT_STRING0x4df7c0x3fcMatlab v4 mat-file (little endian) ', numeric, rows 0, columns 0TurkishTurkey0.31862745098039214
                            RT_STRING0x4e3780x5b6Matlab v4 mat-file (little endian) K, numeric, rows 0, columns 0SlovenianSlovenia0.25239398084815323
                            RT_STRING0x4e9300x4eaMatlab v4 mat-file (little endian) E, numeric, rows 0, columns 0EstonianEstonia0.2599364069952305
                            RT_STRING0x4ee1c0x578Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0LatvianLativa0.25642857142857145
                            RT_STRING0x4f3940x4b8Matlab v4 mat-file (little endian) N, numeric, rows 0, columns 0LithuanianLithuania0.2814569536423841
                            RT_STRING0x4f84c0x484Matlab v4 mat-file (little endian) K, numeric, rows 0, columns 0VietnameseVietnam0.24567474048442905
                            RT_STRING0x4fcd00x590Matlab v4 mat-file (little endian) D, numeric, rows 0, columns 0BasqueFrance0.25280898876404495
                            RT_STRING0x4fcd00x590Matlab v4 mat-file (little endian) D, numeric, rows 0, columns 0BasqueSpain0.25280898876404495
                            RT_STRING0x502600x1caMatlab v4 mat-file (little endian) \340e\325l\033R\372^\207e\366N9Y , numeric, rows 0, columns 0ChineseChina0.5131004366812227
                            RT_STRING0x5042c0x61cMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 0PortuguesePortugal0.2289002557544757
                            RT_STRING0x50a480x5fcMatlab v4 mat-file (little endian) N, numeric, rows 0, columns 00.24216710182767623
                            RT_STRING0x510440x27edataArabicSaudi Arabia0.46551724137931033
                            RT_STRING0x512c40x39edataCatalanSpain0.3941684665226782
                            RT_STRING0x516640xeadataChineseTaiwan0.8333333333333334
                            RT_STRING0x517500x302dataCzechCzech Republic0.4701298701298701
                            RT_STRING0x51a540x326dataDanishDenmark0.413151364764268
                            RT_STRING0x51d7c0x442dataGermanGermany0.38073394495412843
                            RT_STRING0x521c00x376dataGreekGreece0.43115124153498874
                            RT_STRING0x525380x2f2dataEnglishUnited States0.42572944297082227
                            RT_STRING0x5282c0x31cdataFinnishFinland0.4258793969849246
                            RT_STRING0x52b480x3deAmigaOS bitmap font "r", fc_YSize 29184, 17664 elements, 2nd "u", 3rd "'"FrenchFrance0.36666666666666664
                            RT_STRING0x52f280x24cdataHebrewIsrael0.4574829931972789
                            RT_STRING0x531740x342AmigaOS bitmap font "s", fc_YSize 24832, 18688 elements, 2nd "b", 3rd "n"HungarianHungary0.42206235011990406
                            RT_STRING0x534b80x3aadataItalianItaly0.3699360341151386
                            RT_STRING0x538640x1ccdataJapaneseJapan0.6804347826086956
                            RT_STRING0x53a300x1a4dataKoreanNorth Korea0.7452380952380953
                            RT_STRING0x53a300x1a4dataKoreanSouth Korea0.7452380952380953
                            RT_STRING0x53bd40x37cAmigaOS bitmap font "n", fc_YSize 29184, 20224 elements, 2nd ".", 3rd "*"DutchNetherlands0.40358744394618834
                            RT_STRING0x53f500x324dataNorwegianNorway0.4166666666666667
                            RT_STRING0x542740x372dataPolishPoland0.42063492063492064
                            RT_STRING0x545e80x38edataPortugueseBrazil0.38461538461538464
                            RT_STRING0x549780x39edataRomanianRomania0.4136069114470842
                            RT_STRING0x54d180x35adataRussianRussia0.42424242424242425
                            RT_STRING0x550740x2dedataCroatianCroatia0.4223433242506812
                            RT_STRING0x553540x340dataSlovakSlovakia0.4338942307692308
                            RT_STRING0x556940x310dataSwedishSweden0.42346938775510207
                            RT_STRING0x559a40x2bedataThaiThailand0.47293447293447294
                            RT_STRING0x55c640x2a6AmigaOS bitmap font "i", fc_YSize 30208, 16896 elements, 2nd "z", 3rd " "TurkishTurkey0.46607669616519176
                            RT_STRING0x55f0c0x380dataSlovenianSlovenia0.39285714285714285
                            RT_STRING0x5628c0x33adataEstonianEstonia0.4067796610169492
                            RT_STRING0x565c80x374dataLatvianLativa0.4117647058823529
                            RT_STRING0x5693c0x31aAmigaOS bitmap font "e", fc_YSize 25600, 19968 elements, 2nd "p", 3rd "o"LithuanianLithuania0.43828715365239296
                            RT_STRING0x56c580x2badataVietnameseVietnam0.39111747851002865
                            RT_STRING0x56f140x36adataBasqueFrance0.41533180778032036
                            RT_STRING0x56f140x36adataBasqueSpain0.41533180778032036
                            RT_STRING0x572800xe8dataChineseChina0.8362068965517241
                            RT_STRING0x573680x3d2dataPortuguesePortugal0.3834355828220859
                            RT_STRING0x5773c0x3aedata0.37579617834394907
                            RT_STRING0x57aec0xeedataArabicSaudi Arabia0.592436974789916
                            RT_STRING0x57bdc0x12cdataCatalanSpain0.5133333333333333
                            RT_STRING0x57d080x92dataChineseTaiwan0.678082191780822
                            RT_STRING0x57d9c0xf8dataCzechCzech Republic0.5604838709677419
                            RT_STRING0x57e940xf4dataDanishDenmark0.5450819672131147
                            RT_STRING0x57f880x10edataGermanGermany0.5
                            RT_STRING0x580980x10cdataGreekGreece0.5970149253731343
                            RT_STRING0x581a40x106dataEnglishUnited States0.5076335877862596
                            RT_STRING0x582ac0xe4dataFinnishFinland0.5175438596491229
                            RT_STRING0x583900x144dataFrenchFrance0.48148148148148145
                            RT_STRING0x584d40xd4dataHebrewIsrael0.6084905660377359
                            RT_STRING0x585a80xfedataHungarianHungary0.531496062992126
                            RT_STRING0x586a80x122dataItalianItaly0.503448275862069
                            RT_STRING0x587cc0xa6dataJapaneseJapan0.6807228915662651
                            RT_STRING0x588740xaadataKoreanNorth Korea0.7352941176470589
                            RT_STRING0x588740xaadataKoreanSouth Korea0.7352941176470589
                            RT_STRING0x589200xf4dataDutchNetherlands0.5122950819672131
                            RT_STRING0x58a140x106dataNorwegianNorway0.5114503816793893
                            RT_STRING0x58b1c0xeadataPolishPoland0.5341880341880342
                            RT_STRING0x58c080x10adataPortugueseBrazil0.49624060150375937
                            RT_STRING0x58d140x12cdataRomanianRomania0.49
                            RT_STRING0x58e400x114dataRussianRussia0.5398550724637681
                            RT_STRING0x58f540xf2dataCroatianCroatia0.5743801652892562
                            RT_STRING0x590480xf8dataSlovakSlovakia0.5483870967741935
                            RT_STRING0x591400x134dataSwedishSweden0.4318181818181818
                            RT_STRING0x592740x118dataThaiThailand0.5285714285714286
                            RT_STRING0x5938c0xf2dataTurkishTurkey0.5619834710743802
                            RT_STRING0x594800x11edataSlovenianSlovenia0.5104895104895105
                            RT_STRING0x595a00xeedataEstonianEstonia0.542016806722689
                            RT_STRING0x596900x110dataLatvianLativa0.5257352941176471
                            RT_STRING0x597a00xecdataLithuanianLithuania0.5720338983050848
                            RT_STRING0x5988c0x10adataVietnameseVietnam0.5037593984962406
                            RT_STRING0x599980x138dataBasqueFrance0.46794871794871795
                            RT_STRING0x599980x138dataBasqueSpain0.46794871794871795
                            RT_STRING0x59ad00x92dataChineseChina0.6575342465753424
                            RT_STRING0x59b640x122dataPortuguesePortugal0.49310344827586206
                            RT_STRING0x59c880x132data0.48366013071895425
                            RT_GROUP_ICON0x59dbc0x5adataEnglishUnited States0.7
                            RT_VERSION0x59e180xe40dataEnglishUnited States0.11677631578947369
                            RT_MANIFEST0x5ac580x470XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4507042253521127
                            DLLImport
                            KERNEL32.dllGetLastError, ResetEvent, CreateEventW, CloseHandle, MultiByteToWideChar, WideCharToMultiByte, GetModuleFileNameW, FormatMessageW, LocalFree, GetWindowsDirectoryW, CreateFileW, SetFileTime, SetFileAttributesW, RemoveDirectoryW, CreateDirectoryW, DeleteFileW, GetShortPathNameW, GetFullPathNameW, lstrlenW, GetCurrentDirectoryW, GetTempFileNameW, FindClose, FindFirstFileW, FindNextFileW, GetFileSize, SetFilePointer, ReadFile, WriteFile, SetEndOfFile, DeleteCriticalSection, GetStdHandle, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSection, GetCurrentProcessId, GetCurrentThreadId, QueryPerformanceCounter, GetTickCount, Sleep, LocalAlloc, SetCurrentDirectoryW, GetVersion, GetCommandLineW, CreateProcessW, GetExitCodeProcess, FlushFileBuffers, CreateFileA, WriteConsoleW, GetConsoleOutputCP, WriteConsoleA, SetStdHandle, LCMapStringW, LCMapStringA, GetStringTypeW, GetStringTypeA, GetConsoleMode, GetConsoleCP, GetLocaleInfoA, IsValidCodePage, GetOEMCP, GetACP, GetCPInfo, LoadLibraryA, RaiseException, RtlUnwind, InitializeCriticalSectionAndSpinCount, GetSystemTimeAsFileTime, WaitForSingleObject, SetEvent, GetVersionExW, VirtualAlloc, WaitForMultipleObjects, VirtualFree, GetFileType, SetHandleCount, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsA, HeapSize, InterlockedDecrement, SetLastError, InterlockedIncrement, TlsFree, TlsSetValue, HeapFree, HeapAlloc, ExitThread, CreateThread, HeapReAlloc, GetCommandLineA, GetStartupInfoA, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, HeapCreate, GetModuleHandleW, GetProcAddress, ExitProcess, GetModuleFileNameA, TlsGetValue, TlsAlloc
                            USER32.dllSetForegroundWindow, CharUpperW, DestroyWindow, RegisterWindowMessageW, AdjustWindowRect, LoadImageW, KillTimer, SetTimer, PostMessageW, EndDialog, IsDlgButtonChecked, SetDlgItemTextW, GetDlgItem, SetWindowTextW, GetWindowTextW, GetWindowTextLengthW, LoadStringW, DialogBoxParamW, CreateDialogParamW, SystemParametersInfoW, PeekMessageW, GetDesktopWindow, MessageBoxW, SendMessageW, GetWindowLongW, SetWindowLongW, ShowWindow, MoveWindow, GetWindowRect, LoadIconW
                            GDI32.dllGetObjectW
                            ADVAPI32.dllRegSetValueExW, RegCreateKeyExW, RegCloseKey
                            SHELL32.dllShellExecuteExW, SHGetFolderPathW
                            ole32.dllCoInitialize, CoCreateInstance
                            OLEAUT32.dllSysAllocStringLen, SysFreeString, VariantClear, SysAllocString
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            ArabicSaudi Arabia
                            CatalanSpain
                            ChineseTaiwan
                            CzechCzech Republic
                            DanishDenmark
                            GermanGermany
                            GreekGreece
                            FinnishFinland
                            FrenchFrance
                            HebrewIsrael
                            HungarianHungary
                            ItalianItaly
                            JapaneseJapan
                            KoreanNorth Korea
                            KoreanSouth Korea
                            DutchNetherlands
                            NorwegianNorway
                            PolishPoland
                            PortugueseBrazil
                            RomanianRomania
                            RussianRussia
                            CroatianCroatia
                            SlovakSlovakia
                            SwedishSweden
                            ThaiThailand
                            TurkishTurkey
                            SlovenianSlovenia
                            EstonianEstonia
                            LatvianLativa
                            LithuanianLithuania
                            VietnameseVietnam
                            ChineseChina
                            PortuguesePortugal
                            No network behavior found

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:12:29:27
                            Start date:14/03/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
                            Imagebase:0x7ff711700000
                            File size:57'360 bytes
                            MD5 hash:F586835082F632DC8D9404D83BC16316
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:3
                            Start time:12:29:27
                            Start date:14/03/2024
                            Path:C:\Users\user\Desktop\8ue90oYkrv.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Users\user\Desktop\8ue90oYkrv.exe
                            Imagebase:0x400000
                            File size:13'453'632 bytes
                            MD5 hash:5A0D2BC66C17C640E81233CF6A200E07
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:4
                            Start time:12:29:30
                            Start date:14/03/2024
                            Path:C:\ProgramData\miaE9AF.tmp\TDService.exe
                            Wow64 process (32bit):true
                            Commandline:.\TDService.exe /m="C:\Users\user\Desktop\8UE90O~1.EXE" /k=""
                            Imagebase:0x400000
                            File size:5'295'078 bytes
                            MD5 hash:A94A3D60FA8A54AB71ABED39D5883D86
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:Borland Delphi
                            Yara matches:
                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: 00000004.00000000.167625105498.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\miaE9AF.tmp\TDService.exe, Author: Joe Security
                            Reputation:low
                            Has exited:true

                            Target ID:6
                            Start time:12:29:32
                            Start date:14/03/2024
                            Path:C:\Windows\System32\msiexec.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\msiexec.exe /V
                            Imagebase:0x7ff6815d0000
                            File size:69'632 bytes
                            MD5 hash:E5DA170027542E25EDE42FC54C929077
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:7
                            Start time:12:29:33
                            Start date:14/03/2024
                            Path:C:\Windows\SysWOW64\msiexec.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding FC59D1BB68DDFDC1E5D4349A53CC36CC
                            Imagebase:0xf70000
                            File size:59'904 bytes
                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:8
                            Start time:12:29:34
                            Start date:14/03/2024
                            Path:C:\Windows\SysWOW64\msiexec.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\USBIOCOM.dll
                            Imagebase:0xf70000
                            File size:59'904 bytes
                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:9
                            Start time:12:29:34
                            Start date:14/03/2024
                            Path:C:\Windows\SysWOW64\msiexec.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\TDSCON.ocx
                            Imagebase:0xf70000
                            File size:59'904 bytes
                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:10
                            Start time:12:29:34
                            Start date:14/03/2024
                            Path:C:\Windows\SysWOW64\msiexec.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\syswow64\MsiExec.exe" /Y "C:\Windows\SysWOW64\MSWINSCK.OCX
                            Imagebase:0xf70000
                            File size:59'904 bytes
                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:11
                            Start time:12:29:34
                            Start date:14/03/2024
                            Path:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\TDService.exe"
                            Imagebase:0x9d0000
                            File size:1'150'976 bytes
                            MD5 hash:F00223A56D3F89627CC88625DBCB0C42
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Antivirus matches:
                            • Detection: 100%, Joe Sandbox ML
                            • Detection: 2%, ReversingLabs
                            • Detection: 6%, Virustotal, Browse
                            Reputation:low
                            Has exited:false

                            Target ID:12
                            Start time:12:29:36
                            Start date:14/03/2024
                            Path:C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Program Files (x86)\TECHKON GmbH\TECHKON Device Service SDK\Driver\TechkonDriver64Bit.exe" /s
                            Imagebase:0x400000
                            File size:2'902'256 bytes
                            MD5 hash:F6CD94DEAEA55BB414650D6A9CB7DD6C
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Antivirus matches:
                            • Detection: 0%, ReversingLabs
                            • Detection: 0%, Virustotal, Browse
                            Reputation:low
                            Has exited:true

                            Target ID:13
                            Start time:12:29:38
                            Start date:14/03/2024
                            Path:C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe
                            Wow64 process (32bit):true
                            Commandline:.\TechkonDriver64Bit.exe /s /m="C:\PROGRA~2\TECHKO~1\TECHKO~1\Driver\TECHKO~2.EXE" /k=""
                            Imagebase:0x400000
                            File size:5'299'123 bytes
                            MD5 hash:5A3DA2206BD35C381B826FF748093684
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:Borland Delphi
                            Yara matches:
                            • Rule: JoeSecurity_DelphiSystemParamCount, Description: Detected Delphi use of System.ParamCount(), Source: C:\ProgramData\miaB21.tmp\TechkonDriver64Bit.exe, Author: Joe Security
                            Reputation:low
                            Has exited:true

                            Target ID:14
                            Start time:12:29:39
                            Start date:14/03/2024
                            Path:C:\Windows\SysWOW64\msiexec.exe
                            Wow64 process (32bit):true
                            Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 60A2701AE26538E52DD17AD6BC358181
                            Imagebase:0xf70000
                            File size:59'904 bytes
                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:15
                            Start time:12:29:41
                            Start date:14/03/2024
                            Path:C:\Windows\System32\cmd.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\cmd.exe /c ""C:\Program Files\TECHKON GmbH\TECHKON Driver 64Bit\Cert\Cert.Bat" "
                            Imagebase:0x7ff657960000
                            File size:289'792 bytes
                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:16
                            Start time:12:29:41
                            Start date:14/03/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6687b0000
                            File size:875'008 bytes
                            MD5 hash:81CA40085FC75BABD2C91D18AA9FFA68
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:17
                            Start time:12:29:41
                            Start date:14/03/2024
                            Path:C:\Windows\System32\certutil.exe
                            Wow64 process (32bit):false
                            Commandline:certutil -f -addstore TrustedPublisher TK1.cer
                            Imagebase:0x7ff6ba8d0000
                            File size:1'651'200 bytes
                            MD5 hash:BD8D9943A9B1DEF98EB83E0FA48796C2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:18
                            Start time:12:29:42
                            Start date:14/03/2024
                            Path:C:\Windows\System32\certutil.exe
                            Wow64 process (32bit):false
                            Commandline:certutil -f -addstore TrustedPublisher TK2.cer
                            Imagebase:0x7ff6687b0000
                            File size:1'651'200 bytes
                            MD5 hash:BD8D9943A9B1DEF98EB83E0FA48796C2
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:19
                            Start time:12:29:42
                            Start date:14/03/2024
                            Path:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            Wow64 process (32bit):false
                            Commandline:C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\DENS /D /SA /LM /F
                            Imagebase:0x7ff666970000
                            File size:1'050'104 bytes
                            MD5 hash:BE3C79033FA8302002D9D3A6752F2263
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:20
                            Start time:12:29:43
                            Start date:14/03/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
                            Imagebase:0x7ff711700000
                            File size:57'360 bytes
                            MD5 hash:F586835082F632DC8D9404D83BC16316
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:21
                            Start time:12:29:43
                            Start date:14/03/2024
                            Path:C:\Windows\System32\drvinst.exe
                            Wow64 process (32bit):false
                            Commandline:DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{16e7fd5a-7fa1-284a-a78e-4c7e00d15a9e}\dens_x64.inf" "9" "439f12f93" "0000000000000144" "WinSta0\Default" "000000000000015C" "208" "c:\progra~1\techko~1\techko~1\dens"
                            Imagebase:0x7ff6b80b0000
                            File size:344'576 bytes
                            MD5 hash:D26EB7BD11479C9C3C5CB5641C4360E1
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:22
                            Start time:12:29:48
                            Start date:14/03/2024
                            Path:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            Wow64 process (32bit):false
                            Commandline:C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\MF-IR /D /SA /LM /F
                            Imagebase:0x7ff666970000
                            File size:1'050'104 bytes
                            MD5 hash:BE3C79033FA8302002D9D3A6752F2263
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:23
                            Start time:12:29:49
                            Start date:14/03/2024
                            Path:C:\Windows\System32\drvinst.exe
                            Wow64 process (32bit):false
                            Commandline:DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{a68cce64-7ff6-cf40-9135-83c2fc219f99}\spectrodens_ir_x64.inf" "9" "4b61cb89f" "000000000000012C" "WinSta0\Default" "0000000000000110" "208" "c:\progra~1\techko~1\techko~1\mf-ir"
                            Imagebase:0x7ff6b80b0000
                            File size:344'576 bytes
                            MD5 hash:D26EB7BD11479C9C3C5CB5641C4360E1
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:24
                            Start time:12:29:53
                            Start date:14/03/2024
                            Path:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            Wow64 process (32bit):false
                            Commandline:C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SP6D70~1 /D /SA /LM /F
                            Imagebase:0x7ff666970000
                            File size:1'050'104 bytes
                            MD5 hash:BE3C79033FA8302002D9D3A6752F2263
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:25
                            Start time:12:29:54
                            Start date:14/03/2024
                            Path:C:\Windows\System32\drvinst.exe
                            Wow64 process (32bit):false
                            Commandline:DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{da57fd97-fa69-9340-a4da-037be2662fe1}\spectroplate_x64.inf" "9" "4010f9813" "0000000000000110" "WinSta0\Default" "0000000000000178" "208" "c:\progra~1\techko~1\techko~1\sp6d70~1"
                            Imagebase:0x7ff6b80b0000
                            File size:344'576 bytes
                            MD5 hash:D26EB7BD11479C9C3C5CB5641C4360E1
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:26
                            Start time:12:29:59
                            Start date:14/03/2024
                            Path:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            Wow64 process (32bit):false
                            Commandline:C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~4 /D /SA /LM /F
                            Imagebase:0x7ff666970000
                            File size:1'050'104 bytes
                            MD5 hash:BE3C79033FA8302002D9D3A6752F2263
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:27
                            Start time:12:30:00
                            Start date:14/03/2024
                            Path:C:\Windows\System32\drvinst.exe
                            Wow64 process (32bit):false
                            Commandline:DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{9697d70c-ee9a-f048-8996-c17faa7f2c84}\spectrojet_x64.inf" "9" "4b5792527" "000000000000018C" "WinSta0\Default" "0000000000000190" "208" "c:\progra~1\techko~1\techko~1\spectr~4"
                            Imagebase:0x7ff6b80b0000
                            File size:344'576 bytes
                            MD5 hash:D26EB7BD11479C9C3C5CB5641C4360E1
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:28
                            Start time:12:30:06
                            Start date:14/03/2024
                            Path:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            Wow64 process (32bit):false
                            Commandline:C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~3 /D /SA /LM /F
                            Imagebase:0x7ff666970000
                            File size:1'050'104 bytes
                            MD5 hash:BE3C79033FA8302002D9D3A6752F2263
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:29
                            Start time:12:30:07
                            Start date:14/03/2024
                            Path:C:\Windows\System32\drvinst.exe
                            Wow64 process (32bit):false
                            Commandline:DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{2b7966a8-8a6d-a94f-a256-589fc26d83d0}\spectrodrive_x64.inf" "9" "40b9ce367" "000000000000012C" "WinSta0\Default" "0000000000000110" "208" "c:\progra~1\techko~1\techko~1\spectr~3"
                            Imagebase:0x7ff6b80b0000
                            File size:344'576 bytes
                            MD5 hash:D26EB7BD11479C9C3C5CB5641C4360E1
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:30
                            Start time:12:30:12
                            Start date:14/03/2024
                            Path:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            Wow64 process (32bit):false
                            Commandline:C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~2 /D /SA /LM /F
                            Imagebase:0x7ff666970000
                            File size:1'050'104 bytes
                            MD5 hash:BE3C79033FA8302002D9D3A6752F2263
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:31
                            Start time:12:30:14
                            Start date:14/03/2024
                            Path:C:\Windows\System32\drvinst.exe
                            Wow64 process (32bit):false
                            Commandline:DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{295155e4-5a7e-c344-9bda-c97bbccbaffe}\spectrodrive_x64.inf" "9" "48bc6c0e7" "0000000000000110" "WinSta0\Default" "0000000000000178" "208" "c:\progra~1\techko~1\techko~1\spectr~2"
                            Imagebase:0x7ff6b80b0000
                            File size:344'576 bytes
                            MD5 hash:D26EB7BD11479C9C3C5CB5641C4360E1
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:32
                            Start time:12:30:19
                            Start date:14/03/2024
                            Path:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            Wow64 process (32bit):true
                            Commandline:C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPECTR~1 /D /SA /LM /F
                            Imagebase:0x6c0000
                            File size:1'050'104 bytes
                            MD5 hash:BE3C79033FA8302002D9D3A6752F2263
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:33
                            Start time:12:30:21
                            Start date:14/03/2024
                            Path:C:\Windows\System32\drvinst.exe
                            Wow64 process (32bit):false
                            Commandline:DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{fa2b8a9a-24a0-6c46-aecd-31efdad63fbc}\spectrodens_x64.inf" "9" "46d73562f" "0000000000000178" "WinSta0\Default" "0000000000000190" "208" "c:\progra~1\techko~1\techko~1\spectr~1"
                            Imagebase:0x7ff6b80b0000
                            File size:344'576 bytes
                            MD5 hash:D26EB7BD11479C9C3C5CB5641C4360E1
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:34
                            Start time:12:30:27
                            Start date:14/03/2024
                            Path:C:\ProgramData\{CDCC27FF-B8C2-4EF0-92DE-CCCEB844BC67}\OFFLINE\mDIFxIDE.dll\x64DPInst.exe
                            Wow64 process (32bit):false
                            Commandline:C:\PROGRA~3\{CDCC2~1\OFFLINE\mDIFxIDE.dll\x64DPInst.exe /SW /SE /EL /PATH C:\PROGRA~1\\TECHKO~1\TECHKO~1\SPC171~1 /D /SA /LM /F
                            Imagebase:0x7ff666970000
                            File size:1'050'104 bytes
                            MD5 hash:BE3C79033FA8302002D9D3A6752F2263
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:35
                            Start time:12:30:28
                            Start date:14/03/2024
                            Path:C:\Windows\System32\drvinst.exe
                            Wow64 process (32bit):false
                            Commandline:DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{a2a72662-6183-c742-a103-e60145f480e5}\spectrojet_x64.inf" "9" "4c691d78b" "0000000000000190" "WinSta0\Default" "000000000000012C" "208" "c:\progra~1\techko~1\techko~1\spc171~1"
                            Imagebase:0x7ff6b80b0000
                            File size:344'576 bytes
                            MD5 hash:D26EB7BD11479C9C3C5CB5641C4360E1
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:true

                            Target ID:36
                            Start time:12:35:18
                            Start date:14/03/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
                            Imagebase:0x7ff711700000
                            File size:57'360 bytes
                            MD5 hash:F586835082F632DC8D9404D83BC16316
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Target ID:37
                            Start time:12:35:18
                            Start date:14/03/2024
                            Path:C:\Windows\System32\svchost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\svchost.exe -k wsappx -p -s AppXSvc
                            Imagebase:0x7ff711700000
                            File size:57'360 bytes
                            MD5 hash:F586835082F632DC8D9404D83BC16316
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:12.7%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:12.4%
                              Total number of Nodes:2000
                              Total number of Limit Nodes:118
                              execution_graph 18502 41d880 18507 41d750 18502->18507 18504 41d895 18505 41d888 18505->18504 18526 420dfe 18505->18526 18508 41d7a5 KiUserCallbackDispatcher 18507->18508 18509 41d7b1 18507->18509 18508->18509 18510 41d7c2 DestroyWindow 18509->18510 18511 41d7ce 18509->18511 18510->18511 18512 420dfe 66 API calls 18511->18512 18513 41d7e1 18512->18513 18514 420dfe 66 API calls 18513->18514 18515 41d7ed 18514->18515 18539 41d370 DeleteCriticalSection 18515->18539 18518 420dfe 66 API calls 18519 41d811 18518->18519 18520 420dfe 66 API calls 18519->18520 18521 41d836 18520->18521 18522 420dfe 66 API calls 18521->18522 18523 41d844 18522->18523 18524 420dfe 66 API calls 18523->18524 18525 41d852 18524->18525 18525->18505 18527 420e0a 18526->18527 18528 420e49 18527->18528 18534 420e83 18527->18534 18545 421f1d 18527->18545 18529 420e5e RtlFreeHeap 18528->18529 18528->18534 18531 420e70 18529->18531 18529->18534 18561 421d28 18531->18561 18534->18504 18535 420e21 18536 420e3b 18535->18536 18552 421f80 18535->18552 18558 420e54 18536->18558 18540 41d3c1 18539->18540 18541 41d3ae CloseHandle 18539->18541 18543 420dfe 66 API calls 18540->18543 18541->18540 18542 41d3b9 GetLastError 18541->18542 18542->18540 18544 41d3d6 18543->18544 18544->18518 18546 421f32 18545->18546 18547 421f45 EnterCriticalSection 18545->18547 18564 421e5a 18546->18564 18547->18535 18549 421f38 18549->18547 18590 422c2c 18549->18590 18553 421fbf 18552->18553 18557 422261 18552->18557 18554 4221ab VirtualFree 18553->18554 18553->18557 18555 42220f 18554->18555 18556 42221e VirtualFree HeapFree 18555->18556 18555->18557 18556->18557 18557->18536 18819 421e43 LeaveCriticalSection 18558->18819 18560 420e5b 18560->18528 18820 4233da GetLastError 18561->18820 18563 420e75 GetLastError 18563->18534 18565 421e66 18564->18565 18566 421e8c 18565->18566 18597 4230df 18565->18597 18574 421e9c 18566->18574 18643 423a4e 18566->18643 18570 421ea7 18572 421eae 18570->18572 18573 421ebd 18570->18573 18576 421d28 66 API calls 18572->18576 18577 421f1d 66 API calls 18573->18577 18574->18549 18575 421e82 18640 422c80 18575->18640 18576->18574 18579 421ec4 18577->18579 18580 421ef8 18579->18580 18581 421ecc 18579->18581 18582 420dfe 66 API calls 18580->18582 18648 425169 18581->18648 18589 421ee9 18582->18589 18584 421ed7 18586 420dfe 66 API calls 18584->18586 18584->18589 18587 421ee3 18586->18587 18588 421d28 66 API calls 18587->18588 18588->18589 18652 421f14 18589->18652 18591 4230df 66 API calls 18590->18591 18592 422c36 18591->18592 18593 422f34 66 API calls 18592->18593 18594 422c3e 18593->18594 18595 4231ca 6 API calls 18594->18595 18596 421f44 18595->18596 18596->18547 18655 4258f3 18597->18655 18600 4258f3 66 API calls 18603 4230f3 18600->18603 18601 422f34 66 API calls 18602 42310b 18601->18602 18604 422f34 66 API calls 18602->18604 18603->18601 18605 421e7b 18603->18605 18604->18605 18606 422f34 18605->18606 18607 422f48 18606->18607 18608 4258f3 63 API calls 18607->18608 18639 4230a3 18607->18639 18609 422f6a 18608->18609 18610 4230a8 GetStdHandle 18609->18610 18612 4258f3 63 API calls 18609->18612 18611 4230b6 18610->18611 18610->18639 18615 4230cf WriteFile 18611->18615 18611->18639 18613 422f7b 18612->18613 18613->18610 18614 422f8d 18613->18614 18614->18639 18678 42588b 18614->18678 18615->18639 18618 422fc3 GetModuleFileNameA 18620 422fe1 18618->18620 18624 423004 18618->18624 18621 42588b 63 API calls 18620->18621 18623 422ff1 18621->18623 18623->18624 18625 423b3c 10 API calls 18623->18625 18636 423047 18624->18636 18694 42573e 18624->18694 18625->18624 18629 423b3c 10 API calls 18632 42306b 18629->18632 18630 4256ca 63 API calls 18633 42307f 18630->18633 18632->18630 18635 423090 18633->18635 18637 423b3c 10 API calls 18633->18637 18634 423b3c 10 API calls 18634->18636 18712 425561 18635->18712 18703 4256ca 18636->18703 18637->18635 18639->18575 18763 422c55 GetModuleHandleW 18640->18763 18647 423a57 18643->18647 18645 423a8d 18645->18570 18646 423a6e Sleep 18646->18647 18647->18645 18647->18646 18767 420edb 18647->18767 18817 422a14 18648->18817 18650 425175 InitializeCriticalSectionAndSpinCount 18651 4251b9 18650->18651 18651->18584 18818 421e43 LeaveCriticalSection 18652->18818 18654 421f1b 18654->18574 18656 425902 18655->18656 18657 4230e6 18656->18657 18658 421d28 66 API calls 18656->18658 18657->18600 18657->18603 18659 425925 18658->18659 18661 423c64 18659->18661 18664 4231ca TlsGetValue 18661->18664 18663 423c74 18665 4231e2 18664->18665 18666 423203 GetModuleHandleW 18664->18666 18665->18666 18669 4231ec TlsGetValue 18665->18669 18667 423213 18666->18667 18668 42321e GetProcAddress 18666->18668 18674 422bfc 18667->18674 18673 4231fb 18668->18673 18672 4231f7 18669->18672 18672->18666 18672->18673 18673->18663 18675 422c07 Sleep GetModuleHandleW 18674->18675 18676 422c25 18675->18676 18677 422c29 18675->18677 18676->18675 18676->18677 18677->18668 18677->18673 18679 4258a3 18678->18679 18680 42589c 18678->18680 18681 421d28 66 API calls 18679->18681 18680->18679 18685 4258c9 18680->18685 18682 4258a8 18681->18682 18683 423c64 6 API calls 18682->18683 18684 422faf 18683->18684 18684->18618 18687 423b3c 18684->18687 18685->18684 18686 421d28 66 API calls 18685->18686 18686->18682 18739 426470 18687->18739 18689 423b69 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18690 423c45 GetCurrentProcess TerminateProcess 18689->18690 18691 423c39 18689->18691 18741 420def 18690->18741 18691->18690 18693 422fc0 18693->18618 18699 425750 18694->18699 18695 425754 18696 423034 18695->18696 18697 421d28 66 API calls 18695->18697 18696->18634 18696->18636 18698 425770 18697->18698 18700 423c64 6 API calls 18698->18700 18699->18695 18699->18696 18701 42579a 18699->18701 18700->18696 18701->18696 18702 421d28 66 API calls 18701->18702 18702->18698 18704 4256e2 18703->18704 18706 4256db 18703->18706 18705 421d28 66 API calls 18704->18705 18711 4256e7 18705->18711 18706->18704 18709 425716 18706->18709 18707 423c64 6 API calls 18708 42305a 18707->18708 18708->18629 18708->18632 18709->18708 18710 421d28 66 API calls 18709->18710 18710->18711 18711->18707 18750 4231c1 18712->18750 18715 425584 LoadLibraryA 18716 425599 GetProcAddress 18715->18716 18723 4256ae 18715->18723 18717 4255af 18716->18717 18716->18723 18753 42314f TlsGetValue 18717->18753 18719 4231ca 6 API calls 18719->18723 18720 4231ca 6 API calls 18731 425679 18720->18731 18721 4231ca 6 API calls 18724 425629 18721->18724 18723->18639 18725 4231ca 6 API calls 18724->18725 18729 425636 18725->18729 18726 42314f 6 API calls 18727 4255ca GetProcAddress 18726->18727 18728 42314f 6 API calls 18727->18728 18730 4255df GetProcAddress 18728->18730 18729->18720 18735 425661 18729->18735 18732 42314f 6 API calls 18730->18732 18733 4231ca 6 API calls 18731->18733 18731->18735 18734 4255f4 18732->18734 18733->18735 18736 4255fe GetProcAddress 18734->18736 18738 42560c 18734->18738 18735->18719 18737 42314f 6 API calls 18736->18737 18737->18738 18738->18721 18738->18729 18740 42647c 18739->18740 18740->18689 18742 420df7 18741->18742 18743 420df9 IsDebuggerPresent 18741->18743 18742->18693 18749 425152 18743->18749 18746 421cad SetUnhandledExceptionFilter UnhandledExceptionFilter 18747 421cd2 GetCurrentProcess TerminateProcess 18746->18747 18748 421cca 18746->18748 18747->18693 18748->18747 18749->18746 18751 42314f 6 API calls 18750->18751 18752 4231c8 18751->18752 18752->18715 18752->18738 18754 423167 18753->18754 18755 423188 GetModuleHandleW 18753->18755 18754->18755 18756 423171 TlsGetValue 18754->18756 18757 4231a3 GetProcAddress 18755->18757 18758 423198 18755->18758 18761 42317c 18756->18761 18760 423180 GetProcAddress 18757->18760 18759 422bfc 2 API calls 18758->18759 18762 42319e 18759->18762 18760->18726 18761->18755 18761->18760 18762->18757 18762->18760 18764 422c69 GetProcAddress 18763->18764 18765 422c7e ExitProcess 18763->18765 18764->18765 18766 422c79 18764->18766 18766->18765 18768 420f8e 18767->18768 18775 420eed 18767->18775 18769 423127 6 API calls 18768->18769 18770 420f94 18769->18770 18772 421d28 65 API calls 18770->18772 18771 4230df 65 API calls 18778 420efe 18771->18778 18773 420f86 18772->18773 18773->18647 18775->18773 18777 420f4a RtlAllocateHeap 18775->18777 18775->18778 18780 420f7a 18775->18780 18783 420f7f 18775->18783 18785 420e8c 18775->18785 18793 423127 18775->18793 18776 422f34 65 API calls 18776->18778 18777->18775 18778->18771 18778->18775 18778->18776 18779 422c80 3 API calls 18778->18779 18779->18778 18781 421d28 65 API calls 18780->18781 18781->18783 18784 421d28 65 API calls 18783->18784 18784->18773 18786 420e98 18785->18786 18787 421f1d 66 API calls 18786->18787 18788 420ec9 18786->18788 18789 420eae 18787->18789 18788->18775 18796 42272f 18789->18796 18794 4231ca 6 API calls 18793->18794 18795 423137 18794->18795 18795->18775 18798 42275d 18796->18798 18797 420eb9 18802 420ed2 18797->18802 18798->18797 18801 4227f6 18798->18801 18805 422296 18798->18805 18801->18797 18812 422346 18801->18812 18816 421e43 LeaveCriticalSection 18802->18816 18804 420ed9 18804->18788 18806 4222a9 HeapReAlloc 18805->18806 18807 4222dd HeapAlloc 18805->18807 18809 4222c7 18806->18809 18810 4222cb 18806->18810 18808 422300 VirtualAlloc 18807->18808 18807->18809 18808->18809 18811 42231a HeapFree 18808->18811 18809->18801 18810->18807 18811->18809 18813 42235d VirtualAlloc 18812->18813 18815 4223a4 18813->18815 18815->18797 18816->18804 18817->18650 18818->18654 18819->18560 18835 423265 TlsGetValue 18820->18835 18823 423447 SetLastError 18823->18563 18825 423405 18825->18823 18826 42340d 18825->18826 18827 4231ca 6 API calls 18826->18827 18828 42341f 18827->18828 18829 423426 18828->18829 18830 42343e 18828->18830 18846 4232f3 18829->18846 18832 420dfe 63 API calls 18830->18832 18834 423444 18832->18834 18833 42342e GetCurrentThreadId 18833->18823 18834->18823 18836 423295 18835->18836 18837 42327a 18835->18837 18836->18823 18840 423a93 18836->18840 18838 4231ca 6 API calls 18837->18838 18839 423285 TlsSetValue 18838->18839 18839->18836 18842 423a9c 18840->18842 18843 423ad9 18842->18843 18844 423aba Sleep 18842->18844 18865 426346 18842->18865 18843->18825 18845 423acf 18844->18845 18845->18842 18845->18843 18882 422a14 18846->18882 18848 4232ff GetModuleHandleW 18849 423316 18848->18849 18850 42330f 18848->18850 18851 423351 18849->18851 18852 42332d GetProcAddress GetProcAddress 18849->18852 18853 422bfc 2 API calls 18850->18853 18854 421f1d 62 API calls 18851->18854 18852->18851 18855 423315 18853->18855 18856 423370 InterlockedIncrement 18854->18856 18855->18849 18883 4233c8 18856->18883 18859 421f1d 62 API calls 18860 423391 18859->18860 18886 425a87 InterlockedIncrement 18860->18886 18862 4233af 18898 4233d1 18862->18898 18864 4233bc 18864->18833 18866 426352 18865->18866 18867 42636a 18866->18867 18877 426389 18866->18877 18868 421d28 65 API calls 18867->18868 18869 42636f 18868->18869 18870 423c64 6 API calls 18869->18870 18874 42637f 18870->18874 18871 4263fb HeapAlloc 18871->18877 18872 423127 6 API calls 18872->18877 18873 421f1d 65 API calls 18873->18877 18874->18842 18875 42272f 5 API calls 18875->18877 18877->18871 18877->18872 18877->18873 18877->18874 18877->18875 18878 426442 18877->18878 18881 421e43 LeaveCriticalSection 18878->18881 18880 426449 18880->18877 18881->18880 18882->18848 18901 421e43 LeaveCriticalSection 18883->18901 18885 42338a 18885->18859 18887 425aa5 InterlockedIncrement 18886->18887 18888 425aa8 18886->18888 18887->18888 18889 425ab2 InterlockedIncrement 18888->18889 18890 425ab5 18888->18890 18889->18890 18891 425ac2 18890->18891 18892 425abf InterlockedIncrement 18890->18892 18893 425acc InterlockedIncrement 18891->18893 18894 425acf 18891->18894 18892->18891 18893->18894 18895 425ae8 InterlockedIncrement 18894->18895 18896 425af8 InterlockedIncrement 18894->18896 18897 425b03 InterlockedIncrement 18894->18897 18895->18894 18896->18894 18897->18862 18902 421e43 LeaveCriticalSection 18898->18902 18900 4233d8 18900->18864 18901->18885 18902->18900 18903 416340 18908 416370 18903->18908 18906 416355 18907 420dfe 66 API calls 18907->18906 18909 4163d8 18908->18909 18910 420dfe 66 API calls 18909->18910 18911 416348 18910->18911 18911->18906 18911->18907 18912 416d40 18913 416d5d 18912->18913 18914 416d69 18913->18914 18917 416cf0 18913->18917 18918 416cf7 18917->18918 18919 416d1e 18918->18919 18920 420dfe 66 API calls 18918->18920 18921 416d0b 18920->18921 18921->18919 18922 420edb 66 API calls 18921->18922 18922->18919 18923 41bb00 EnterCriticalSection LeaveCriticalSection 18924 41bb30 18923->18924 18932 41bb9a 18923->18932 18925 41bb35 PostMessageW 18924->18925 18926 41bb4b EnterCriticalSection LeaveCriticalSection 18924->18926 18925->18926 18927 41bb82 18926->18927 18928 41bb7d 18926->18928 18937 41ba30 18927->18937 18928->18927 18929 41bb89 18928->18929 18933 41ba80 18929->18933 18934 41ba95 18933->18934 18935 41bad5 SendMessageW 18934->18935 18936 41baeb 18934->18936 18935->18936 18936->18932 18938 41ba56 18937->18938 18939 41ba62 SendMessageW 18938->18939 18939->18929 18940 4139c0 18941 4139d0 WriteFile 18940->18941 18942 4139cb 18940->18942 18943 413a0d 18941->18943 18942->18941 18944 413a13 18943->18944 18945 413a18 GetLastError 18943->18945 18946 413a22 18945->18946 18947 415180 18948 41518d CreateEventW 18947->18948 18949 4151af 18947->18949 18948->18949 18952 41519e GetLastError 18948->18952 18950 4151b5 CreateEventW 18949->18950 18951 4151c6 ResetEvent 18949->18951 18950->18951 18950->18952 18953 4151dd GetLastError 18951->18953 18954 4151df ResetEvent 18951->18954 18955 4151a8 18952->18955 18953->18954 18956 4151e9 GetLastError 18954->18956 18957 4151eb 18954->18957 18956->18957 18958 4151f9 18957->18958 18960 4150e0 18957->18960 18966 4210a6 18960->18966 18963 415105 GetLastError 18965 41510f 18963->18965 18964 4150ff 18964->18955 18965->18955 18967 4210d6 18966->18967 18968 4210ba 18966->18968 18970 423265 8 API calls 18967->18970 18969 421d28 66 API calls 18968->18969 18972 4210bf 18969->18972 18971 4210dc 18970->18971 18973 423a93 66 API calls 18971->18973 18974 423c64 6 API calls 18972->18974 18975 4210e8 18973->18975 18982 4150f2 18974->18982 18976 42113a 18975->18976 18987 423453 18975->18987 18978 420dfe 66 API calls 18976->18978 18980 421140 18978->18980 18980->18982 18992 421d4e 18980->18992 18981 4232f3 66 API calls 18985 4210fe CreateThread 18981->18985 18982->18963 18982->18964 18985->18982 18986 421131 GetLastError 18985->18986 19000 421023 18985->19000 18986->18976 18988 4233da 66 API calls 18987->18988 18989 42345b 18988->18989 18990 422c2c 66 API calls 18989->18990 18991 4210f5 18989->18991 18990->18991 18991->18981 18997 421d3b 18992->18997 18994 421d59 18995 421d28 66 API calls 18994->18995 18996 421d6c 18995->18996 18996->18982 18998 4233da 66 API calls 18997->18998 18999 421d40 18998->18999 18999->18994 19001 423265 8 API calls 19000->19001 19002 42102e 19001->19002 19015 423245 TlsGetValue 19002->19015 19005 421067 19028 42346d 19005->19028 19006 42103d 19025 423299 19006->19025 19009 421082 19017 420fe2 19009->19017 19013 421050 GetLastError ExitThread 19014 42105d GetCurrentThreadId 19014->19009 19016 421039 19015->19016 19016->19005 19016->19006 19018 420fee 19017->19018 19019 423453 66 API calls 19018->19019 19020 420ff3 19019->19020 19064 420fa5 19020->19064 19026 4231ca 6 API calls 19025->19026 19027 42104c 19026->19027 19027->19013 19027->19014 19030 423479 19028->19030 19029 423491 19033 420dfe 66 API calls 19029->19033 19035 42349f 19029->19035 19030->19029 19031 420dfe 66 API calls 19030->19031 19032 42357b 19030->19032 19031->19029 19032->19009 19033->19035 19034 4234ad 19037 4234bb 19034->19037 19038 420dfe 66 API calls 19034->19038 19035->19034 19036 420dfe 66 API calls 19035->19036 19036->19034 19039 4234c9 19037->19039 19040 420dfe 66 API calls 19037->19040 19038->19037 19041 4234d7 19039->19041 19042 420dfe 66 API calls 19039->19042 19040->19039 19043 4234e5 19041->19043 19044 420dfe 66 API calls 19041->19044 19042->19041 19045 4234f6 19043->19045 19046 420dfe 66 API calls 19043->19046 19044->19043 19047 421f1d 66 API calls 19045->19047 19046->19045 19048 4234fe 19047->19048 19049 423523 19048->19049 19050 42350a InterlockedDecrement 19048->19050 19082 423587 19049->19082 19050->19049 19051 423515 19050->19051 19051->19049 19054 420dfe 66 API calls 19051->19054 19054->19049 19055 421f1d 66 API calls 19056 423537 19055->19056 19057 423568 19056->19057 19085 425b16 19056->19085 19129 423593 19057->19129 19061 420dfe 66 API calls 19061->19032 19067 420fb3 19064->19067 19065 4233da 66 API calls 19066 420fcd 19065->19066 19068 420fd8 ExitThread 19066->19068 19071 42359c 19066->19071 19067->19065 19072 4235f5 19071->19072 19073 4235aa 19071->19073 19076 420fd7 19072->19076 19077 4235ff TlsSetValue 19072->19077 19074 4235b0 TlsGetValue 19073->19074 19075 4235d3 19073->19075 19074->19075 19078 4235c3 TlsGetValue 19074->19078 19079 4231ca 6 API calls 19075->19079 19076->19068 19077->19076 19078->19075 19080 4235ea 19079->19080 19081 42346d 75 API calls 19080->19081 19081->19072 19132 421e43 LeaveCriticalSection 19082->19132 19084 423530 19084->19055 19086 425b27 InterlockedDecrement 19085->19086 19087 42354c 19085->19087 19088 425b3f 19086->19088 19089 425b3c InterlockedDecrement 19086->19089 19087->19057 19099 42593e 19087->19099 19090 425b49 InterlockedDecrement 19088->19090 19091 425b4c 19088->19091 19089->19088 19090->19091 19092 425b56 InterlockedDecrement 19091->19092 19093 425b59 19091->19093 19092->19093 19094 425b63 InterlockedDecrement 19093->19094 19096 425b66 19093->19096 19094->19096 19095 425b7f InterlockedDecrement 19095->19096 19096->19095 19097 425b8f InterlockedDecrement 19096->19097 19098 425b9a InterlockedDecrement 19096->19098 19097->19096 19098->19087 19100 425955 19099->19100 19126 4259c2 19099->19126 19103 425989 19100->19103 19110 420dfe 66 API calls 19100->19110 19100->19126 19101 425a0f 19114 425a36 19101->19114 19157 4282f8 19101->19157 19102 420dfe 66 API calls 19105 4259e3 19102->19105 19107 4259aa 19103->19107 19118 420dfe 66 API calls 19103->19118 19108 420dfe 66 API calls 19105->19108 19109 420dfe 66 API calls 19107->19109 19113 4259f6 19108->19113 19115 4259b7 19109->19115 19116 42597e 19110->19116 19111 420dfe 66 API calls 19111->19114 19112 425a7b 19117 420dfe 66 API calls 19112->19117 19120 420dfe 66 API calls 19113->19120 19114->19112 19119 420dfe 66 API calls 19114->19119 19121 420dfe 66 API calls 19115->19121 19133 4284d2 19116->19133 19123 425a81 19117->19123 19124 42599f 19118->19124 19119->19114 19125 425a04 19120->19125 19121->19126 19123->19057 19149 42848d 19124->19149 19128 420dfe 66 API calls 19125->19128 19126->19101 19126->19102 19128->19101 19245 421e43 LeaveCriticalSection 19129->19245 19131 423575 19131->19061 19132->19084 19134 4284df 19133->19134 19148 42855c 19133->19148 19135 4284f0 19134->19135 19137 420dfe 66 API calls 19134->19137 19136 428502 19135->19136 19138 420dfe 66 API calls 19135->19138 19139 428514 19136->19139 19140 420dfe 66 API calls 19136->19140 19137->19135 19138->19136 19141 428526 19139->19141 19142 420dfe 66 API calls 19139->19142 19140->19139 19143 420dfe 66 API calls 19141->19143 19146 428538 19141->19146 19142->19141 19143->19146 19144 420dfe 66 API calls 19145 42854a 19144->19145 19147 420dfe 66 API calls 19145->19147 19145->19148 19146->19144 19146->19145 19147->19148 19148->19103 19150 42849a 19149->19150 19156 4284ce 19149->19156 19151 4284aa 19150->19151 19152 420dfe 66 API calls 19150->19152 19153 420dfe 66 API calls 19151->19153 19154 4284bc 19151->19154 19152->19151 19153->19154 19155 420dfe 66 API calls 19154->19155 19154->19156 19155->19156 19156->19107 19158 428309 19157->19158 19244 425a2f 19157->19244 19159 420dfe 66 API calls 19158->19159 19160 428311 19159->19160 19161 420dfe 66 API calls 19160->19161 19162 428319 19161->19162 19163 420dfe 66 API calls 19162->19163 19164 428321 19163->19164 19165 420dfe 66 API calls 19164->19165 19166 428329 19165->19166 19167 420dfe 66 API calls 19166->19167 19168 428331 19167->19168 19169 420dfe 66 API calls 19168->19169 19170 428339 19169->19170 19171 420dfe 66 API calls 19170->19171 19172 428340 19171->19172 19173 420dfe 66 API calls 19172->19173 19174 428348 19173->19174 19175 420dfe 66 API calls 19174->19175 19176 428350 19175->19176 19177 420dfe 66 API calls 19176->19177 19178 428358 19177->19178 19179 420dfe 66 API calls 19178->19179 19180 428360 19179->19180 19181 420dfe 66 API calls 19180->19181 19182 428368 19181->19182 19183 420dfe 66 API calls 19182->19183 19184 428370 19183->19184 19185 420dfe 66 API calls 19184->19185 19186 428378 19185->19186 19187 420dfe 66 API calls 19186->19187 19188 428380 19187->19188 19189 420dfe 66 API calls 19188->19189 19190 428388 19189->19190 19191 420dfe 66 API calls 19190->19191 19192 428393 19191->19192 19193 420dfe 66 API calls 19192->19193 19194 42839b 19193->19194 19195 420dfe 66 API calls 19194->19195 19196 4283a3 19195->19196 19197 420dfe 66 API calls 19196->19197 19244->19111 19245->19131 19246 416bd0 19247 416bd8 19246->19247 19248 416bdb 19246->19248 19249 420edb 66 API calls 19248->19249 19250 416be1 19249->19250 19251 421a58 19290 422a14 19251->19290 19253 421a64 GetStartupInfoA 19255 421a87 19253->19255 19291 421d71 HeapCreate 19255->19291 19257 421ad7 19293 42360a GetModuleHandleW 19257->19293 19261 421ae8 19327 424e1c 19261->19327 19262 421a2f 66 API calls 19262->19261 19264 421af6 19265 421b02 GetCommandLineA 19264->19265 19267 422c2c 66 API calls 19264->19267 19342 424ce5 19265->19342 19268 421b01 19267->19268 19268->19265 19272 421b27 19381 4249b2 19272->19381 19273 422c2c 66 API calls 19273->19272 19276 421b38 19396 422ceb 19276->19396 19278 422c2c 66 API calls 19278->19276 19279 421b3f 19280 421b4a 19279->19280 19281 422c2c 66 API calls 19279->19281 19402 424953 19280->19402 19281->19280 19285 421b6b 19286 421b79 19285->19286 20065 422e9c 19285->20065 20076 422ec8 19286->20076 19289 421b7e 19290->19253 19292 421acb 19291->19292 19292->19257 20068 421a2f 19292->20068 19294 423625 19293->19294 19295 42361e 19293->19295 19297 42362f GetProcAddress GetProcAddress GetProcAddress GetProcAddress 19294->19297 19298 42378d 19294->19298 19296 422bfc 2 API calls 19295->19296 19299 423624 19296->19299 19300 423678 TlsAlloc 19297->19300 20090 4232b6 19298->20090 19299->19294 19303 421add 19300->19303 19304 4236c6 TlsSetValue 19300->19304 19303->19261 19303->19262 19304->19303 19305 4236d7 19304->19305 20079 422ee6 19305->20079 19308 42314f 6 API calls 19309 4236e7 19308->19309 19310 42314f 6 API calls 19309->19310 19311 4236f7 19310->19311 19312 42314f 6 API calls 19311->19312 19313 423707 19312->19313 19314 42314f 6 API calls 19313->19314 19315 423717 19314->19315 20086 421da1 19315->20086 19318 4231ca 6 API calls 19319 423738 19318->19319 19319->19298 19320 423a93 66 API calls 19319->19320 19321 423751 19320->19321 19321->19298 19322 4231ca 6 API calls 19321->19322 19323 42376b 19322->19323 19323->19298 19324 423772 19323->19324 19325 4232f3 66 API calls 19324->19325 19326 42377a GetCurrentThreadId 19325->19326 19326->19303 20099 422a14 19327->20099 19329 424e28 GetStartupInfoA 19330 423a93 66 API calls 19329->19330 19338 424e49 19330->19338 19331 425067 19331->19264 19332 424fe4 GetStdHandle 19337 424fae 19332->19337 19333 423a93 66 API calls 19333->19338 19334 425049 SetHandleCount 19334->19331 19335 424ff6 GetFileType 19335->19337 19336 424f31 19336->19331 19336->19337 19339 424f5a GetFileType 19336->19339 19341 425169 InitializeCriticalSectionAndSpinCount 19336->19341 19337->19331 19337->19332 19337->19334 19337->19335 19340 425169 InitializeCriticalSectionAndSpinCount 19337->19340 19338->19331 19338->19333 19338->19336 19338->19337 19339->19336 19340->19337 19341->19336 19343 424d03 GetEnvironmentStringsW 19342->19343 19347 424d22 19342->19347 19344 424d17 GetLastError 19343->19344 19345 424d0b 19343->19345 19344->19347 19348 424d3e GetEnvironmentStringsW 19345->19348 19349 424d4d WideCharToMultiByte 19345->19349 19346 424dbb 19350 424dc4 GetEnvironmentStrings 19346->19350 19351 421b12 19346->19351 19347->19345 19347->19346 19348->19349 19348->19351 19355 424db0 FreeEnvironmentStringsW 19349->19355 19356 424d81 19349->19356 19350->19351 19352 424dd4 19350->19352 19368 424c2a 19351->19368 19357 423a4e 66 API calls 19352->19357 19355->19351 19358 423a4e 66 API calls 19356->19358 19359 424dee 19357->19359 19360 424d87 19358->19360 19361 424e01 19359->19361 19362 424df5 FreeEnvironmentStringsA 19359->19362 19360->19355 19363 424d8f WideCharToMultiByte 19360->19363 19366 424e0b FreeEnvironmentStringsA 19361->19366 19362->19351 19364 424da1 19363->19364 19365 424da9 19363->19365 19367 420dfe 66 API calls 19364->19367 19365->19355 19366->19351 19367->19365 19369 424c44 GetModuleFileNameA 19368->19369 19370 424c3f 19368->19370 19372 424c6b 19369->19372 20106 426328 19370->20106 20100 424a90 19372->20100 19375 421b1c 19375->19272 19375->19273 19376 424ca7 19377 423a4e 66 API calls 19376->19377 19378 424cad 19377->19378 19378->19375 19379 424a90 76 API calls 19378->19379 19380 424cc7 19379->19380 19380->19375 19382 4249bb 19381->19382 19385 4249c0 19381->19385 19383 426328 110 API calls 19382->19383 19383->19385 19384 423a93 66 API calls 19390 4249f5 19384->19390 19385->19384 19388 421b2d 19385->19388 19386 424a53 19387 420dfe 66 API calls 19386->19387 19387->19388 19388->19276 19388->19278 19389 423a93 66 API calls 19389->19390 19390->19386 19390->19388 19390->19389 19391 424a79 19390->19391 19393 42588b 66 API calls 19390->19393 19394 424a3a 19390->19394 19392 420dfe 66 API calls 19391->19392 19392->19388 19393->19390 19394->19390 19395 423b3c 10 API calls 19394->19395 19395->19394 19397 422cf9 19396->19397 20356 42531f 19397->20356 19399 422d17 19401 422d36 19399->19401 20360 42163c 19399->20360 19401->19279 19403 424961 19402->19403 19405 424966 19402->19405 19404 426328 110 API calls 19403->19404 19404->19405 19406 421b50 19405->19406 19407 4281a0 76 API calls 19405->19407 19408 41f2d0 19406->19408 19407->19405 20460 41e5c0 GetVersionExW 19408->20460 19410 41f300 19411 41f304 19410->19411 19412 41f34f CoInitialize 19410->19412 19414 41af50 68 API calls 19411->19414 20468 41e6a0 GetVersion 19412->20468 19416 41f316 MessageBoxW 19414->19416 19415 41f35b 19418 41f373 GetVersionExW 19415->19418 19417 420dfe 66 API calls 19416->19417 19419 41f332 19417->19419 19420 41f3b5 19418->19420 19421 41f39b 19418->19421 19422 420def 5 API calls 19419->19422 19424 41f3bf 19420->19424 20471 41ea60 19420->20471 19421->19420 19423 41f3a4 19421->19423 19425 41f349 19422->19425 20728 41e9b0 19423->20728 20481 404e60 19424->20481 19425->19285 19431 404e60 67 API calls 19432 41f402 19431->19432 19433 404e60 67 API calls 19432->19433 19434 41f41f 19433->19434 19435 404e60 67 API calls 19434->19435 19436 41f436 GetCommandLineW 19435->19436 20488 404b30 19436->20488 19438 41f447 20492 404850 19438->20492 19441 420dfe 66 API calls 19442 41f466 19441->19442 20502 41af50 19442->20502 22470 422d70 20065->22470 20067 422ead 20067->19286 20069 421a42 20068->20069 20070 421a3d 20068->20070 20072 422f34 66 API calls 20069->20072 20071 4230df 66 API calls 20070->20071 20071->20069 20073 421a4a 20072->20073 20074 422c80 3 API calls 20073->20074 20075 421a54 20074->20075 20075->19257 20077 422d70 66 API calls 20076->20077 20078 422ed3 20077->20078 20078->19289 20080 4231c1 6 API calls 20079->20080 20081 422eee 20080->20081 20096 423d0e 20081->20096 20084 42314f 6 API calls 20085 422f2a 20084->20085 20085->19308 20088 421dac 20086->20088 20087 425169 InitializeCriticalSectionAndSpinCount 20087->20088 20088->20087 20089 421dda 20088->20089 20089->19298 20089->19318 20091 4232c0 20090->20091 20092 4232cc 20090->20092 20093 4231ca 6 API calls 20091->20093 20094 4232e0 TlsFree 20092->20094 20095 4232ee 20092->20095 20093->20092 20094->20095 20095->20095 20097 42314f 6 API calls 20096->20097 20098 422f20 20097->20098 20098->20084 20099->19329 20102 424aaf 20100->20102 20104 424b1c 20102->20104 20110 4281a0 20102->20110 20103 424c1a 20103->19375 20103->19376 20104->20103 20105 4281a0 76 API calls 20104->20105 20105->20104 20107 426338 20106->20107 20108 426331 20106->20108 20107->19369 20171 42618e 20108->20171 20113 42814d 20110->20113 20116 4246f9 20113->20116 20117 42470c 20116->20117 20123 424759 20116->20123 20118 423453 66 API calls 20117->20118 20119 424711 20118->20119 20120 424739 20119->20120 20124 425bed 20119->20124 20120->20123 20139 425e89 20120->20139 20123->20102 20125 425bf9 20124->20125 20126 423453 66 API calls 20125->20126 20127 425bfe 20126->20127 20128 425c2c 20127->20128 20130 425c10 20127->20130 20129 421f1d 66 API calls 20128->20129 20131 425c33 20129->20131 20132 423453 66 API calls 20130->20132 20155 425baf 20131->20155 20134 425c15 20132->20134 20137 425c23 20134->20137 20138 422c2c 66 API calls 20134->20138 20137->20120 20138->20137 20140 425e95 20139->20140 20141 423453 66 API calls 20140->20141 20142 425e9a 20141->20142 20143 425eac 20142->20143 20144 421f1d 66 API calls 20142->20144 20147 425eba 20143->20147 20151 422c2c 66 API calls 20143->20151 20145 425eca 20144->20145 20146 425f13 20145->20146 20148 425ee1 InterlockedDecrement 20145->20148 20149 425efb InterlockedIncrement 20145->20149 20167 425f24 20146->20167 20147->20123 20148->20149 20152 425eec 20148->20152 20149->20146 20151->20147 20152->20149 20153 420dfe 66 API calls 20152->20153 20154 425efa 20153->20154 20154->20149 20156 425bb3 20155->20156 20157 425be5 20155->20157 20156->20157 20158 425a87 8 API calls 20156->20158 20163 425c57 20157->20163 20159 425bc6 20158->20159 20159->20157 20160 425b16 8 API calls 20159->20160 20161 425bd1 20160->20161 20161->20157 20162 42593e 66 API calls 20161->20162 20162->20157 20166 421e43 LeaveCriticalSection 20163->20166 20165 425c5e 20165->20134 20166->20165 20170 421e43 LeaveCriticalSection 20167->20170 20169 425f2b 20169->20143 20170->20169 20172 42619a 20171->20172 20173 423453 66 API calls 20172->20173 20174 4261a3 20173->20174 20175 425e89 68 API calls 20174->20175 20176 4261ad 20175->20176 20202 425f2d 20176->20202 20179 423a4e 66 API calls 20180 4261ce 20179->20180 20181 4262ed 20180->20181 20209 425fa9 20180->20209 20181->20107 20184 4262fa 20184->20181 20189 42630d 20184->20189 20191 420dfe 66 API calls 20184->20191 20185 4261fe InterlockedDecrement 20186 42620e 20185->20186 20187 42621f InterlockedIncrement 20185->20187 20186->20187 20190 420dfe 66 API calls 20186->20190 20187->20181 20188 426235 20187->20188 20188->20181 20194 421f1d 66 API calls 20188->20194 20192 421d28 66 API calls 20189->20192 20193 42621e 20190->20193 20191->20189 20192->20181 20193->20187 20196 426249 InterlockedDecrement 20194->20196 20197 4262c5 20196->20197 20198 4262d8 InterlockedIncrement 20196->20198 20197->20198 20200 420dfe 66 API calls 20197->20200 20219 4262ef 20198->20219 20201 4262d7 20200->20201 20201->20198 20203 4246f9 76 API calls 20202->20203 20204 425f41 20203->20204 20205 425f6a 20204->20205 20206 425f4c GetOEMCP 20204->20206 20207 425f6f GetACP 20205->20207 20208 425f5c 20205->20208 20206->20208 20207->20208 20208->20179 20208->20181 20210 425f2d 78 API calls 20209->20210 20211 425fc9 20210->20211 20212 425fd4 20211->20212 20215 426018 IsValidCodePage 20211->20215 20218 42603d 20211->20218 20213 420def 5 API calls 20212->20213 20214 42618c 20213->20214 20214->20184 20214->20185 20215->20212 20216 42602a GetCPInfo 20215->20216 20216->20212 20216->20218 20222 425cf6 GetCPInfo 20218->20222 20355 421e43 LeaveCriticalSection 20219->20355 20221 4262f6 20221->20181 20223 425ddc 20222->20223 20226 425d2a 20222->20226 20228 420def 5 API calls 20223->20228 20232 428760 20226->20232 20230 425e87 20228->20230 20230->20218 20231 428b95 101 API calls 20231->20223 20233 4246f9 76 API calls 20232->20233 20234 428773 20233->20234 20242 4285a6 20234->20242 20237 428b95 20238 4246f9 76 API calls 20237->20238 20239 428ba8 20238->20239 20308 4287f0 20239->20308 20243 4285f2 20242->20243 20244 4285c7 GetStringTypeW 20242->20244 20245 4286d9 20243->20245 20247 4285df 20243->20247 20246 4285e7 GetLastError 20244->20246 20244->20247 20270 4295ea GetLocaleInfoA 20245->20270 20246->20243 20248 42862b MultiByteToWideChar 20247->20248 20265 4286d3 20247->20265 20254 428658 20248->20254 20248->20265 20251 420def 5 API calls 20252 425d97 20251->20252 20252->20237 20253 42872a GetStringTypeA 20257 428745 20253->20257 20253->20265 20258 42866d 20254->20258 20259 420edb 66 API calls 20254->20259 20256 4286a6 MultiByteToWideChar 20261 4286bc GetStringTypeW 20256->20261 20262 4286cd 20256->20262 20263 420dfe 66 API calls 20257->20263 20258->20256 20258->20265 20259->20258 20261->20262 20266 4264ea 20262->20266 20263->20265 20265->20251 20267 4264f6 20266->20267 20269 426507 20266->20269 20268 420dfe 66 API calls 20267->20268 20267->20269 20268->20269 20269->20265 20271 42961d 20270->20271 20272 429618 20270->20272 20301 428cf4 20271->20301 20274 420def 5 API calls 20272->20274 20275 4286fd 20274->20275 20275->20253 20275->20265 20276 429633 20275->20276 20277 429673 GetCPInfo 20276->20277 20281 4296fd 20276->20281 20278 42968a 20277->20278 20279 4296e8 MultiByteToWideChar 20277->20279 20278->20279 20282 429690 GetCPInfo 20278->20282 20279->20281 20284 4296a3 20279->20284 20280 420def 5 API calls 20285 42871e 20280->20285 20281->20280 20282->20279 20283 42969d 20282->20283 20283->20279 20283->20284 20286 4296d5 20284->20286 20287 420edb 66 API calls 20284->20287 20285->20253 20285->20265 20286->20281 20288 429732 MultiByteToWideChar 20286->20288 20287->20286 20289 42974a 20288->20289 20290 429769 20288->20290 20292 429751 WideCharToMultiByte 20289->20292 20293 42976e 20289->20293 20291 4264ea 66 API calls 20290->20291 20291->20281 20292->20290 20294 429779 WideCharToMultiByte 20293->20294 20295 42978d 20293->20295 20294->20290 20294->20295 20296 423a93 66 API calls 20295->20296 20297 429795 20296->20297 20297->20290 20298 42979e WideCharToMultiByte 20297->20298 20298->20290 20299 4297b0 20298->20299 20300 420dfe 66 API calls 20299->20300 20300->20290 20304 429a16 20301->20304 20305 429a2f 20304->20305 20306 4297e7 90 API calls 20305->20306 20307 428d05 20306->20307 20307->20272 20309 428811 LCMapStringW 20308->20309 20313 42882c 20308->20313 20310 428834 GetLastError 20309->20310 20309->20313 20310->20313 20311 428a2a 20315 4295ea 90 API calls 20311->20315 20312 428886 20314 42889f MultiByteToWideChar 20312->20314 20335 428a21 20312->20335 20313->20311 20313->20312 20323 4288cc 20314->20323 20314->20335 20317 428a52 20315->20317 20316 420def 5 API calls 20318 425db7 20316->20318 20319 428b46 LCMapStringA 20317->20319 20320 428a6b 20317->20320 20317->20335 20318->20231 20354 428aa2 20319->20354 20321 429633 73 API calls 20320->20321 20325 428a7d 20321->20325 20322 42891d MultiByteToWideChar 20326 428936 LCMapStringW 20322->20326 20347 428a18 20322->20347 20324 420edb 66 API calls 20323->20324 20332 4288e5 20323->20332 20324->20332 20329 428a87 LCMapStringA 20325->20329 20325->20335 20331 428957 20326->20331 20326->20347 20327 428b6d 20334 420dfe 66 API calls 20327->20334 20327->20335 20328 420dfe 66 API calls 20328->20327 20338 428aa9 20329->20338 20329->20354 20330 4264ea 66 API calls 20330->20335 20333 428960 20331->20333 20337 428989 20331->20337 20332->20322 20332->20335 20336 428972 LCMapStringW 20333->20336 20333->20347 20334->20335 20335->20316 20336->20347 20340 420edb 66 API calls 20337->20340 20350 4289a4 20337->20350 20341 420edb 66 API calls 20338->20341 20351 428aba 20338->20351 20339 4289d8 LCMapStringW 20342 428a12 20339->20342 20343 4289f0 WideCharToMultiByte 20339->20343 20340->20350 20341->20351 20344 4264ea 66 API calls 20342->20344 20343->20342 20344->20347 20345 428af8 LCMapStringA 20348 428b14 20345->20348 20349 428b18 20345->20349 20347->20330 20353 4264ea 66 API calls 20348->20353 20352 429633 73 API calls 20349->20352 20350->20339 20350->20347 20351->20345 20351->20354 20352->20348 20353->20354 20354->20327 20354->20328 20355->20221 20357 425325 20356->20357 20358 42314f 6 API calls 20357->20358 20359 42533d 20357->20359 20358->20357 20359->19399 20363 421600 20360->20363 20362 421649 20362->19401 20364 42160c 20363->20364 20371 422c98 20364->20371 20370 42162d 20370->20362 20372 421f1d 66 API calls 20371->20372 20373 421611 20372->20373 20374 421515 20373->20374 20375 4231ca 6 API calls 20374->20375 20376 421529 20375->20376 20377 4231ca 6 API calls 20376->20377 20378 421539 20377->20378 20379 4215bc 20378->20379 20394 424041 20378->20394 20391 421636 20379->20391 20381 42314f 6 API calls 20384 4215b1 20381->20384 20382 421557 20383 42157b 20382->20383 20390 4215a3 20382->20390 20407 423adf 20382->20407 20383->20379 20387 423adf 72 API calls 20383->20387 20388 421591 20383->20388 20386 42314f 6 API calls 20384->20386 20386->20379 20387->20388 20388->20379 20389 42314f 6 API calls 20388->20389 20389->20390 20390->20381 20456 422ca1 20391->20456 20395 42404d 20394->20395 20396 42407a 20395->20396 20397 42405d 20395->20397 20399 4240bb HeapSize 20396->20399 20401 421f1d 66 API calls 20396->20401 20398 421d28 66 API calls 20397->20398 20400 424062 20398->20400 20403 424072 20399->20403 20402 423c64 6 API calls 20400->20402 20404 42408a 20401->20404 20402->20403 20403->20382 20412 4240db 20404->20412 20410 423ae8 20407->20410 20409 423b27 20409->20383 20410->20409 20411 423b08 Sleep 20410->20411 20416 42167d 20410->20416 20411->20410 20415 421e43 LeaveCriticalSection 20412->20415 20414 4240b6 20414->20399 20414->20403 20415->20414 20417 421689 20416->20417 20418 421690 20417->20418 20419 42169e 20417->20419 20420 420edb 66 API calls 20418->20420 20421 4216b1 20419->20421 20422 4216a5 20419->20422 20442 421698 20420->20442 20429 421823 20421->20429 20437 4216be 20421->20437 20423 420dfe 66 API calls 20422->20423 20423->20442 20424 421856 20425 423127 6 API calls 20424->20425 20428 42185c 20425->20428 20426 421f1d 66 API calls 20426->20437 20427 421828 HeapReAlloc 20427->20429 20427->20442 20431 421d28 66 API calls 20428->20431 20429->20424 20429->20427 20430 42187a 20429->20430 20432 423127 6 API calls 20429->20432 20434 421870 20429->20434 20433 421d28 66 API calls 20430->20433 20430->20442 20431->20442 20432->20429 20435 421883 GetLastError 20433->20435 20438 421d28 66 API calls 20434->20438 20435->20442 20437->20424 20437->20426 20439 421749 HeapAlloc 20437->20439 20441 42179e HeapReAlloc 20437->20441 20437->20442 20443 42272f 5 API calls 20437->20443 20444 421809 20437->20444 20445 423127 6 API calls 20437->20445 20447 4217ec 20437->20447 20451 421f80 VirtualFree VirtualFree HeapFree 20437->20451 20452 4217c1 20437->20452 20450 4217f1 20438->20450 20439->20437 20440 4217f6 GetLastError 20440->20442 20441->20437 20442->20410 20443->20437 20444->20442 20446 421d28 66 API calls 20444->20446 20445->20437 20448 421816 20446->20448 20449 421d28 66 API calls 20447->20449 20448->20435 20448->20442 20449->20450 20450->20440 20450->20442 20451->20437 20455 421e43 LeaveCriticalSection 20452->20455 20454 4217c8 20454->20437 20455->20454 20459 421e43 LeaveCriticalSection 20456->20459 20458 42163b 20458->20370 20459->20458 20461 41e60b 20460->20461 20462 41e5ea 20460->20462 20464 420def 5 API calls 20461->20464 20462->20461 20463 41e5f1 20462->20463 20465 420def 5 API calls 20463->20465 20466 41e61b 20464->20466 20467 41e604 20465->20467 20466->19410 20467->19410 20469 41e6b0 CoCreateInstance 20468->20469 20470 41e6d7 20468->20470 20469->20470 20470->19415 20472 426470 20471->20472 20473 41ea91 GetModuleFileNameW 20472->20473 20474 41eac0 20473->20474 20475 4218b6 66 API calls 20474->20475 20476 41ead4 20475->20476 20924 4219b2 20476->20924 20479 420def 5 API calls 20480 41eb5d 20479->20480 20480->19424 20482 420edb 66 API calls 20481->20482 20483 404e7e 20482->20483 20484 42a355 RaiseException 20483->20484 20486 404e9c 20483->20486 20484->20486 20485 404ec8 20485->19431 20486->20485 20486->20486 20487 420dfe 66 API calls 20486->20487 20487->20485 20489 404b4f 20488->20489 20490 404e60 67 API calls 20489->20490 20491 404b65 20489->20491 20490->20491 20491->19438 20491->20491 20495 40489c 20492->20495 20497 4048be 20492->20497 20493 4048cd 20496 404ca0 67 API calls 20493->20496 20494 404c30 67 API calls 20494->20495 20495->20493 20495->20494 20495->20497 20498 4048db 20496->20498 20497->19441 20499 404be0 67 API calls 20498->20499 20500 4048ee 20499->20500 20501 420dfe 66 API calls 20500->20501 20501->20497 20933 408680 20502->20933 20729 41e9ba 20728->20729 20730 41e9d9 GetModuleFileNameW RegCreateKeyExW RegSetValueExW RegCloseKey 20729->20730 20731 420def 5 API calls 20730->20731 20732 41ea54 20731->20732 20732->19420 20925 4219ca 20924->20925 20928 4219c3 20924->20928 20926 421d28 66 API calls 20925->20926 20927 4219cf 20926->20927 20929 423c64 6 API calls 20927->20929 20928->20925 20930 421a06 20928->20930 20931 41eaf6 RegCreateKeyExW RegSetValueExW RegCloseKey 20929->20931 20930->20931 20932 421d28 66 API calls 20930->20932 20931->20479 20932->20927 20936 4085b0 20933->20936 20937 404e60 67 API calls 20936->20937 20940 4085f8 20937->20940 20938 408629 LoadStringW 20938->20940 20940->20938 20941 404e60 67 API calls 20940->20941 20941->20938 22471 422d7c 22470->22471 22472 421f1d 66 API calls 22471->22472 22473 422d83 22472->22473 22474 422e4c 22473->22474 22475 422daf 22473->22475 22489 422e87 22474->22489 22477 4231ca 6 API calls 22475->22477 22480 422dba 22477->22480 22479 422e84 22479->20067 22481 422e3c 22480->22481 22483 4231ca 6 API calls 22480->22483 22481->22474 22488 422dcf 22483->22488 22484 422e7b 22485 422c80 3 API calls 22484->22485 22485->22479 22486 4231ca 6 API calls 22486->22488 22487 4231c1 6 API calls 22487->22488 22488->22481 22488->22486 22488->22487 22490 422e68 22489->22490 22491 422e8d 22489->22491 22490->22479 22493 421e43 LeaveCriticalSection 22490->22493 22494 421e43 LeaveCriticalSection 22491->22494 22493->22484 22494->22490 22495 40b75d 22516 40b240 22495->22516 22496 40b2b8 22497 40b268 22668 40a700 22497->22668 22498 40b2d7 22682 40b810 22498->22682 22499 420edb 66 API calls 22499->22516 22504 42a355 RaiseException 22504->22516 22507 40b880 66 API calls 22507->22496 22511 40b405 22512 40b810 66 API calls 22511->22512 22514 40b434 22512->22514 22515 40b880 66 API calls 22514->22515 22515->22496 22516->22496 22516->22497 22516->22498 22516->22499 22516->22504 22516->22511 22517 40c180 72 API calls 22516->22517 22518 40b5d6 22516->22518 22519 40b533 22516->22519 22527 414c20 22516->22527 22532 40bd00 22516->22532 22537 40bf90 22516->22537 22541 408dd0 22516->22541 22517->22516 22520 40b810 66 API calls 22518->22520 22521 40b810 66 API calls 22519->22521 22522 40b611 22520->22522 22523 40b56e 22521->22523 22524 40b880 66 API calls 22522->22524 22525 40b880 66 API calls 22523->22525 22524->22496 22525->22496 22529 414c50 22527->22529 22528 414cd1 22528->22516 22529->22528 22687 41c1d0 EnterCriticalSection 22529->22687 22530 414cca 22530->22516 22533 420edb 66 API calls 22532->22533 22534 40bd57 22533->22534 22535 40bd73 22534->22535 22536 42a355 RaiseException 22534->22536 22535->22516 22536->22535 22538 40c03e 22537->22538 22540 40bfa1 22537->22540 22538->22516 22540->22538 22690 40bdc0 22540->22690 22694 40d900 22541->22694 22544 409606 22544->22516 22547 4090f3 22548 42a355 RaiseException 22547->22548 22549 409108 22548->22549 22551 42a355 RaiseException 22549->22551 22550 420edb 66 API calls 22564 408e4d 22550->22564 22558 40911d 22551->22558 22552 409077 22553 420edb 66 API calls 22552->22553 22552->22558 22647 40938a 22552->22647 22554 4090d7 22553->22554 22554->22558 22561 42a355 RaiseException 22554->22561 22555 409dc9 22559 42a355 RaiseException 22555->22559 22563 409e17 22555->22563 22556 4091da 22560 409359 22556->22560 22578 4094fe 22556->22578 22582 409623 22556->22582 22587 40959b 22556->22587 22603 40a790 67 API calls 22556->22603 22609 4127c0 76 API calls 22556->22609 22733 413650 22556->22733 22557 40916d 22562 408d50 66 API calls 22557->22562 22558->22556 22558->22557 22559->22563 22736 40a1c0 22560->22736 22561->22547 22565 409182 DeleteCriticalSection 22562->22565 22569 409e97 22563->22569 22570 409e2a 22563->22570 22564->22547 22564->22549 22564->22550 22600 408f8f 22564->22600 22714 40a790 22564->22714 22568 4091a3 22565->22568 22729 40a2d0 22568->22729 22574 4051e0 67 API calls 22569->22574 22573 408d50 66 API calls 22570->22573 22580 409e3f DeleteCriticalSection 22573->22580 22591 409ecd 22574->22591 22589 408d50 66 API calls 22578->22589 22579 409b08 22581 408d50 66 API calls 22579->22581 22583 409e60 22580->22583 22588 409b2d DeleteCriticalSection 22581->22588 22592 408d50 66 API calls 22582->22592 22590 40a2d0 66 API calls 22583->22590 22584 409b88 22596 408d50 66 API calls 22584->22596 22585 409f2f 22615 420dfe 66 API calls 22585->22615 22586 409bd6 22606 408d50 66 API calls 22586->22606 22598 408d50 66 API calls 22587->22598 22593 409b4e 22588->22593 22594 409543 DeleteCriticalSection 22589->22594 22595 409e7d 22590->22595 22591->22585 22605 4051e0 67 API calls 22591->22605 22599 409650 DeleteCriticalSection 22592->22599 22601 40a2d0 66 API calls 22593->22601 22602 409564 22594->22602 22595->22516 22597 409bb5 DeleteCriticalSection 22596->22597 22597->22586 22604 4095c8 DeleteCriticalSection 22598->22604 22608 409671 22599->22608 22721 4089c0 22600->22721 22610 409b6b 22601->22610 22611 40a2d0 66 API calls 22602->22611 22603->22556 22612 4095e9 22604->22612 22605->22591 22613 409c18 DeleteCriticalSection 22606->22613 22607 409c73 SysFreeString 22616 409c8e 22607->22616 22617 40a2d0 66 API calls 22608->22617 22609->22556 22610->22516 22618 409581 22611->22618 22619 40a2d0 66 API calls 22612->22619 22620 409c39 22613->22620 22614 404b30 67 API calls 22614->22647 22621 409f8f 22615->22621 22622 408d50 66 API calls 22616->22622 22623 40968e 22617->22623 22618->22516 22619->22544 22624 40a2d0 66 API calls 22620->22624 22629 420dfe 66 API calls 22621->22629 22625 409cab DeleteCriticalSection 22622->22625 22623->22516 22626 409c56 22624->22626 22627 409ccc 22625->22627 22626->22516 22630 40a2d0 66 API calls 22627->22630 22628 420edb 66 API calls 22628->22647 22632 409fd0 22629->22632 22633 409ce9 22630->22633 22631 409890 22637 420dfe 66 API calls 22631->22637 22635 408860 66 API calls 22632->22635 22633->22516 22634 409d03 22639 42a355 RaiseException 22634->22639 22638 409ffd DeleteCriticalSection 22635->22638 22636 409d18 22640 420dfe 66 API calls 22636->22640 22641 4098bb 22637->22641 22642 40a01e 22638->22642 22639->22636 22643 409d25 22640->22643 22653 420dfe 66 API calls 22641->22653 22645 40a2d0 66 API calls 22642->22645 22646 420dfe 66 API calls 22643->22646 22644 420dfe 66 API calls 22649 409731 SysFreeString 22644->22649 22650 40a03b 22645->22650 22648 409d36 SysFreeString 22646->22648 22647->22555 22647->22579 22647->22584 22647->22586 22647->22607 22647->22614 22647->22628 22647->22631 22647->22634 22647->22636 22647->22644 22651 4051e0 67 API calls 22647->22651 22654 420dfe 66 API calls 22647->22654 22652 409d54 22648->22652 22649->22647 22650->22516 22651->22647 22655 408d50 66 API calls 22652->22655 22656 4098f0 22653->22656 22654->22647 22657 409d71 DeleteCriticalSection 22655->22657 22660 420dfe 66 API calls 22656->22660 22658 409d92 22657->22658 22659 40a2d0 66 API calls 22658->22659 22661 409daf 22659->22661 22662 409931 22660->22662 22661->22516 22751 408860 22662->22751 22665 40997f 22666 40a2d0 66 API calls 22665->22666 22667 40999c 22666->22667 22667->22516 22669 40a73f 22668->22669 22670 420dfe 66 API calls 22669->22670 22671 40a763 22670->22671 22672 408d50 22671->22672 22673 408d93 22672->22673 22674 420dfe 66 API calls 22673->22674 22675 408d9c 22674->22675 22676 408860 66 API calls 22675->22676 22677 408db6 22676->22677 22678 40b880 22677->22678 22679 40b8bf 22678->22679 22680 420dfe 66 API calls 22679->22680 22681 40b8e3 22680->22681 22681->22496 22683 40a700 66 API calls 22682->22683 22684 40b846 22683->22684 22685 408d50 66 API calls 22684->22685 22686 40b2fa 22685->22686 22686->22507 22688 41c278 LeaveCriticalSection 22687->22688 22689 41c222 22687->22689 22688->22530 22689->22688 22691 40bdf8 22690->22691 22693 407be0 72 API calls 22691->22693 22692 40be2f 22692->22540 22693->22692 22695 40d940 22694->22695 22702 408e0d 22694->22702 22695->22702 22761 40d890 22695->22761 22697 40db9f 22700 420dfe 66 API calls 22697->22700 22699 40d890 67 API calls 22703 40d9f8 22699->22703 22700->22702 22701 40da2d 22704 420dfe 66 API calls 22701->22704 22702->22544 22711 40a060 22702->22711 22703->22697 22703->22701 22706 40da5a 22704->22706 22705 40dc93 22707 420dfe 66 API calls 22705->22707 22706->22705 22709 4051e0 67 API calls 22706->22709 22708 40dcf7 22707->22708 22710 420dfe 66 API calls 22708->22710 22709->22706 22710->22702 22767 4047c0 InitializeCriticalSection 22711->22767 22713 40a09c 22713->22564 22715 420edb 66 API calls 22714->22715 22716 40a7bd 22715->22716 22717 42a355 RaiseException 22716->22717 22719 40a7db 22716->22719 22717->22719 22718 40a82e 22718->22564 22719->22718 22720 4051e0 67 API calls 22719->22720 22720->22718 22723 4089d2 22721->22723 22722 408be7 22722->22552 22725 4051e0 67 API calls 22723->22725 22727 408a3e 22723->22727 22724 408b8f 22724->22722 22728 4051e0 67 API calls 22724->22728 22725->22723 22726 4051e0 67 API calls 22726->22727 22727->22724 22727->22726 22728->22724 22730 40a30f 22729->22730 22731 420dfe 66 API calls 22730->22731 22732 4091c0 22731->22732 22732->22516 22768 4134d0 22733->22768 22737 40a1d4 22736->22737 22738 40ac10 67 API calls 22737->22738 22739 40a1dc 22738->22739 22740 40ac10 67 API calls 22739->22740 22741 40a1fa 22740->22741 22780 413350 22741->22780 22744 413350 67 API calls 22745 409368 22744->22745 22746 40ac10 22745->22746 22747 4051e0 67 API calls 22746->22747 22749 40ac2e 22747->22749 22748 40ac8c 22748->22647 22749->22748 22750 4051e0 67 API calls 22749->22750 22750->22749 22752 4088a7 22751->22752 22753 420dfe 66 API calls 22752->22753 22754 4088b0 22753->22754 22755 420dfe 66 API calls 22754->22755 22756 4088e0 22755->22756 22757 420dfe 66 API calls 22756->22757 22758 40890f 22757->22758 22759 420dfe 66 API calls 22758->22759 22760 40893f DeleteCriticalSection 22759->22760 22760->22665 22762 40d8a5 22761->22762 22763 4051e0 67 API calls 22762->22763 22765 40d8aa 22763->22765 22764 40d8ee 22764->22697 22764->22699 22765->22764 22766 4051e0 67 API calls 22765->22766 22766->22765 22767->22713 22772 413506 22768->22772 22769 420edb 66 API calls 22770 4135b7 22769->22770 22771 4135d3 22770->22771 22773 42a355 RaiseException 22770->22773 22776 413dd0 VirtualAlloc 22771->22776 22772->22769 22775 4135e5 22772->22775 22773->22771 22775->22556 22777 413e96 22776->22777 22778 413ead 22776->22778 22779 42a355 RaiseException 22777->22779 22778->22775 22779->22778 22781 4051e0 67 API calls 22780->22781 22782 41336c 22781->22782 22783 40a218 22782->22783 22784 4051e0 67 API calls 22782->22784 22783->22744 22784->22782 22785 419bde 22787 419be0 22785->22787 22786 405130 2 API calls 22786->22787 22787->22786 22788 419c80 22787->22788 22789 4051e0 67 API calls 22787->22789 22790 405290 67 API calls 22787->22790 22791 419c9a 22788->22791 22806 419cf9 22788->22806 22789->22787 22790->22787 22793 420dfe 66 API calls 22791->22793 22792 419e12 22794 420dfe 66 API calls 22792->22794 22796 419cbc 22793->22796 22797 419e38 22794->22797 22795 419e89 22803 420dfe 66 API calls 22795->22803 22799 420dfe 66 API calls 22796->22799 22798 420dfe 66 API calls 22797->22798 22800 419e56 22798->22800 22801 419cda 22799->22801 22802 420dfe 66 API calls 22800->22802 22804 420dfe 66 API calls 22801->22804 22856 419cef 22802->22856 22805 419eb0 22803->22805 22804->22856 22808 420dfe 66 API calls 22805->22808 22806->22792 22806->22795 22807 419ee7 22806->22807 22809 419f58 22806->22809 22857 40ce90 96 API calls 22806->22857 22858 40ceb0 96 API calls 22806->22858 22859 413890 3 API calls 22806->22859 22813 420dfe 66 API calls 22807->22813 22810 419ece 22808->22810 22811 419f5c 22809->22811 22816 419fca 22809->22816 22812 420dfe 66 API calls 22810->22812 22819 420dfe 66 API calls 22811->22819 22812->22856 22815 419f1b 22813->22815 22814 41a017 22817 408530 VariantClear 22814->22817 22820 420dfe 66 API calls 22815->22820 22816->22814 22821 406510 67 API calls 22816->22821 22818 41a027 22817->22818 22828 41a0eb 22818->22828 22829 41a05f 22818->22829 22822 419f90 22819->22822 22823 419f39 22820->22823 22821->22814 22824 420dfe 66 API calls 22822->22824 22825 420dfe 66 API calls 22823->22825 22826 419fae 22824->22826 22825->22856 22827 420dfe 66 API calls 22826->22827 22827->22856 22830 419780 2 API calls 22828->22830 22831 404b30 67 API calls 22829->22831 22832 41a0f4 22830->22832 22833 41a06d 22831->22833 22835 418aa0 69 API calls 22832->22835 22834 404b30 67 API calls 22833->22834 22836 41a07b 22834->22836 22837 41a115 22835->22837 22838 418aa0 69 API calls 22836->22838 22839 404be0 67 API calls 22837->22839 22840 41a09c 22838->22840 22841 41a12b 22839->22841 22842 404be0 67 API calls 22840->22842 22843 420dfe 66 API calls 22841->22843 22844 41a0b2 22842->22844 22850 41a0e4 22843->22850 22845 420dfe 66 API calls 22844->22845 22846 41a0c0 22845->22846 22847 420dfe 66 API calls 22846->22847 22848 41a0d2 22847->22848 22849 420dfe 66 API calls 22848->22849 22849->22850 22851 420dfe 66 API calls 22850->22851 22852 41a171 22851->22852 22853 420dfe 66 API calls 22852->22853 22854 41a18e 22853->22854 22855 420dfe 66 API calls 22854->22855 22855->22856 22857->22806 22858->22806 22859->22806 22860 40aee0 22870 40af2b 22860->22870 22861 40b119 22907 41c100 EnterCriticalSection 22861->22907 22862 40b129 22864 40b14f 22862->22864 22865 40b12f 22862->22865 22869 420edb 66 API calls 22864->22869 22867 40b880 66 API calls 22865->22867 22866 40b910 67 API calls 22866->22870 22868 40af56 22867->22868 22871 40b198 22869->22871 22870->22861 22870->22866 22870->22868 22872 420dfe 66 API calls 22870->22872 22874 4051e0 67 API calls 22870->22874 22910 40ae30 22870->22910 22916 40ad10 22870->22916 22873 42a355 RaiseException 22871->22873 22894 40b1b4 22871->22894 22872->22870 22873->22894 22874->22870 22876 40b268 22879 40a700 66 API calls 22876->22879 22877 40b2d7 22881 40b810 66 API calls 22877->22881 22878 420edb 66 API calls 22878->22894 22880 40b288 22879->22880 22885 408d50 66 API calls 22880->22885 22882 40b2fa 22881->22882 22886 40b880 66 API calls 22882->22886 22883 42a355 RaiseException 22883->22894 22884 40bd00 67 API calls 22884->22894 22887 40b2ab 22885->22887 22886->22868 22888 40b880 66 API calls 22887->22888 22888->22868 22889 40bf90 72 API calls 22889->22894 22890 40b405 22891 40b810 66 API calls 22890->22891 22893 40b434 22891->22893 22892 408dd0 93 API calls 22892->22894 22895 40b880 66 API calls 22893->22895 22894->22868 22894->22876 22894->22877 22894->22878 22894->22883 22894->22884 22894->22889 22894->22890 22894->22892 22896 40c180 72 API calls 22894->22896 22897 40b5d6 22894->22897 22898 40b533 22894->22898 22905 414c20 2 API calls 22894->22905 22895->22868 22896->22894 22899 40b810 66 API calls 22897->22899 22900 40b810 66 API calls 22898->22900 22901 40b611 22899->22901 22902 40b56e 22900->22902 22903 40b880 66 API calls 22901->22903 22904 40b880 66 API calls 22902->22904 22903->22868 22904->22868 22905->22894 22908 41c1a6 LeaveCriticalSection 22907->22908 22909 41c156 22907->22909 22908->22862 22909->22908 22911 40aebb 22910->22911 22912 40ae8b 22910->22912 22911->22870 22913 4051e0 67 API calls 22912->22913 22914 40ae93 22913->22914 22914->22911 22915 4051e0 67 API calls 22914->22915 22915->22911 22917 40ad18 22916->22917 22919 40ad1c 22916->22919 22917->22870 22918 42a355 RaiseException 22921 40ad6c 22918->22921 22919->22918 22920 40ad3f 22919->22920 22920->22870 22921->22870 22921->22921 22922 41c6e0 EnterCriticalSection LeaveCriticalSection 22923 41c720 22922->22923 22924 41c72e 22922->22924 22925 404e60 67 API calls 22924->22925 22951 41c89b 22924->22951 22927 41c787 22925->22927 22926 408530 VariantClear 22928 41c8a7 22926->22928 22929 41c791 22927->22929 22930 41c79d 22927->22930 22931 404be0 67 API calls 22929->22931 22932 406510 67 API calls 22930->22932 22950 41c92a 22930->22950 22934 41c79b 22931->22934 22932->22934 22933 420dfe 66 API calls 22936 41c934 22933->22936 22935 404be0 67 API calls 22934->22935 22949 41c7c3 22935->22949 22937 408530 VariantClear 22936->22937 22938 41c940 22937->22938 22939 420dfe 66 API calls 22941 41cc5e 22939->22941 22940 41c888 22942 408530 VariantClear 22940->22942 22943 408530 VariantClear 22941->22943 22944 41c840 22942->22944 22946 41cc6a 22943->22946 22948 420dfe 66 API calls 22944->22948 22945 41c99f 22947 408530 VariantClear 22945->22947 22947->22950 22948->22951 22949->22940 22949->22945 22952 41c847 22949->22952 22953 41c837 22949->22953 23018 41ca5b 22949->23018 22950->22933 22951->22926 22955 41c8b2 22952->22955 22956 41c87f 22952->22956 22954 408530 VariantClear 22953->22954 22954->22944 22958 408530 VariantClear 22955->22958 22957 408530 VariantClear 22956->22957 22957->22940 22959 41c8ce 22958->22959 22960 41c913 22959->22960 22961 41c8e9 22959->22961 22963 41c94e 22960->22963 22965 41c921 22960->22965 22962 408530 VariantClear 22961->22962 22964 41c8f2 22962->22964 23036 405fa0 22963->23036 22966 420dfe 66 API calls 22964->22966 22968 408530 VariantClear 22965->22968 22969 41c8fc 22966->22969 22968->22950 22971 408530 VariantClear 22969->22971 22975 41c908 22971->22975 22972 41c997 22976 404920 66 API calls 22972->22976 22973 41c9af 22974 404b90 67 API calls 22973->22974 22978 41c9bc 22974->22978 22976->22945 22977 41c9f1 22979 407940 67 API calls 22977->22979 22978->22977 23059 41c5d0 22978->23059 22981 41ca03 22979->22981 22982 41ca65 22981->22982 22983 41ca09 22981->22983 23068 406db0 22982->23068 22984 404be0 67 API calls 22983->22984 22986 41ca17 22984->22986 22989 41ca20 22986->22989 22990 41ca28 22986->22990 22988 407be0 72 API calls 22992 41ca7a 22988->22992 22991 406870 70 API calls 22989->22991 23047 406690 CreateFileW 22990->23047 22994 41ca26 22991->22994 22995 41cb2c 22992->22995 22996 406de0 72 API calls 22992->22996 22997 420dfe 66 API calls 22994->22997 23001 405340 67 API calls 22995->23001 23017 41cbc0 22995->23017 22998 41ca8c 22996->22998 22999 41ca38 22997->22999 22998->22995 23002 41ca94 22998->23002 23003 420dfe 66 API calls 22999->23003 23000 404be0 67 API calls 23004 41cc0c 23000->23004 23005 41cb41 23001->23005 23008 404be0 67 API calls 23002->23008 23031 41caac 23002->23031 23006 41ca45 23003->23006 23007 420dfe 66 API calls 23004->23007 23011 408050 71 API calls 23005->23011 23009 404920 66 API calls 23006->23009 23010 41cc19 23007->23010 23008->23031 23012 41ca52 23009->23012 23013 420dfe 66 API calls 23010->23013 23014 41cb8c 23011->23014 23015 408530 VariantClear 23012->23015 23016 41cc26 23013->23016 23014->23017 23022 41cb9b 23014->23022 23015->23018 23019 420dfe 66 API calls 23016->23019 23017->23000 23018->22939 23023 41cc33 23019->23023 23020 420dfe 66 API calls 23021 41caf2 23020->23021 23024 420dfe 66 API calls 23021->23024 23025 404be0 67 API calls 23022->23025 23026 404920 66 API calls 23023->23026 23027 41caff 23024->23027 23025->23031 23028 41cc40 23026->23028 23030 420dfe 66 API calls 23027->23030 23029 408530 VariantClear 23028->23029 23029->23018 23032 41cb0c 23030->23032 23031->23020 23033 404920 66 API calls 23032->23033 23034 41cb19 23033->23034 23035 408530 VariantClear 23034->23035 23035->22950 23037 405fda 23036->23037 23038 404e60 67 API calls 23037->23038 23040 405ff1 23038->23040 23039 406052 23041 4049b0 67 API calls 23039->23041 23040->23039 23043 4049b0 67 API calls 23040->23043 23044 405ffc 23040->23044 23046 404c30 67 API calls 23040->23046 23041->23044 23042 420dfe 66 API calls 23045 406070 23042->23045 23043->23040 23044->23042 23045->22972 23045->22973 23046->23040 23048 40673c 23047->23048 23049 4066db 23047->23049 23050 406764 23048->23050 23051 406748 SetFileTime FindCloseChangeNotification 23048->23051 23052 404e60 67 API calls 23049->23052 23050->22994 23051->23050 23053 4066f2 23052->23053 23054 407e60 68 API calls 23053->23054 23055 406703 23054->23055 23056 40672e 23055->23056 23057 406717 CreateFileW 23055->23057 23058 420dfe 66 API calls 23056->23058 23057->23056 23058->23048 23060 404b90 67 API calls 23059->23060 23066 41c605 23060->23066 23061 41c6b0 23063 420dfe 66 API calls 23061->23063 23062 4060e0 67 API calls 23062->23066 23064 41c6c4 23063->23064 23064->22977 23065 406930 71 API calls 23065->23066 23066->23061 23066->23062 23066->23065 23067 404e60 67 API calls 23066->23067 23067->23066 23069 404e60 67 API calls 23068->23069 23070 406dc5 23069->23070 23070->22988 23071 41cca0 23072 41cda3 23071->23072 23076 41ccb2 23071->23076 23073 41cdb0 SetFileTime 23072->23073 23079 41cdde 23072->23079 23074 41cdd3 FindCloseChangeNotification 23073->23074 23073->23079 23075 41cde6 GetLastError 23074->23075 23074->23079 23075->23079 23081 41cdf0 23075->23081 23077 41ccd4 23076->23077 23082 41cd09 23076->23082 23080 404be0 67 API calls 23077->23080 23085 41cd19 23077->23085 23078 41ce31 23079->23078 23083 406780 70 API calls 23079->23083 23080->23085 23084 404be0 67 API calls 23082->23084 23083->23078 23084->23085 23086 415560 23087 41557a 23086->23087 23088 41556e 23086->23088 23092 415590 23088->23092 23091 420dfe 66 API calls 23091->23087 23103 415390 23092->23103 23097 415310 VirtualFree 23098 4155e5 23097->23098 23099 415310 VirtualFree 23098->23099 23100 4155f3 23099->23100 23101 415310 VirtualFree 23100->23101 23102 415574 23101->23102 23102->23091 23104 4153d1 23103->23104 23105 4153c3 VirtualFree 23103->23105 23106 415310 23104->23106 23105->23104 23107 415352 23106->23107 23108 415344 VirtualFree 23106->23108 23107->23097 23108->23107 23109 41bbe0 23110 41bbf0 KillTimer 23109->23110 23111 41bc0b 23109->23111 23110->23111 23112 41bc26 KiUserCallbackDispatcher 23110->23112 23115 406250 23111->23115 23114 41bc21 23116 406262 23115->23116 23117 4062ef 23115->23117 23119 406290 23116->23119 23120 40626e 23116->23120 23124 4062be 23116->23124 23118 4063f0 SetEvent 23117->23118 23117->23120 23118->23114 23122 4062b6 23119->23122 23123 406296 GetDesktopWindow SetForegroundWindow 23119->23123 23125 40636c 23120->23125 23126 40631e ShowWindow 23120->23126 23130 406277 23120->23130 23122->23114 23123->23114 23124->23114 23128 406371 ShowWindow 23125->23128 23129 4063b5 23125->23129 23127 406330 PeekMessageW 23126->23127 23127->23127 23131 406342 DialogBoxParamW SetEvent 23127->23131 23132 406380 PeekMessageW 23128->23132 23129->23114 23130->23114 23131->23125 23132->23132 23133 406392 MessageBoxW SetEvent 23132->23133 23133->23129 23134 41bda0 GetDlgItem SendMessageW 23135 40a664 23136 40a678 23135->23136 23137 40a6b7 23136->23137 23139 420dfe 66 API calls 23136->23139 23140 40a9f0 23136->23140 23139->23136 23141 40aa3a 23140->23141 23142 420dfe 66 API calls 23141->23142 23143 40aa43 23142->23143 23144 420dfe 66 API calls 23143->23144 23145 40aa76 23144->23145 23154 40a410 23145->23154 23148 40a2d0 66 API calls 23149 40aaa1 23148->23149 23158 415210 23149->23158 23151 40aaab 23173 40aae0 23151->23173 23155 40a44f 23154->23155 23156 420dfe 66 API calls 23155->23156 23157 40a473 23156->23157 23157->23148 23159 415251 SetEvent 23158->23159 23160 415262 23158->23160 23159->23160 23163 41525c GetLastError 23159->23163 23161 415272 23160->23161 23162 415269 WaitForSingleObject 23160->23162 23164 415283 CloseHandle 23161->23164 23166 415294 23161->23166 23162->23161 23163->23160 23165 41528a GetLastError 23164->23165 23164->23166 23165->23166 23167 4152b8 23166->23167 23168 4152ad CloseHandle 23166->23168 23170 4152ec 23167->23170 23171 4152ce CloseHandle 23167->23171 23168->23167 23169 4152b4 GetLastError 23168->23169 23169->23167 23170->23151 23171->23170 23172 4152d5 GetLastError 23171->23172 23172->23151 23174 40ab27 23173->23174 23175 420dfe 66 API calls 23174->23175 23176 40ab30 23175->23176 23177 420dfe 66 API calls 23176->23177 23178 40ab60 23177->23178 23179 420dfe 66 API calls 23178->23179 23180 40ab90 23179->23180 23181 420dfe 66 API calls 23180->23181 23182 40aabc 23181->23182 23182->23136 23183 416364 23184 420dfe 66 API calls 23183->23184 23185 41636a 23184->23185 23186 4123a9 23188 4123b0 23186->23188 23187 41241e 23189 412452 23187->23189 23190 41242d 23187->23190 23188->23187 23191 4051e0 67 API calls 23188->23191 23209 415c80 23189->23209 23196 413820 23190->23196 23203 4148c0 EnterCriticalSection 23190->23203 23191->23188 23192 412450 23197 413830 ReadFile 23196->23197 23198 41382b 23196->23198 23199 413860 23197->23199 23198->23197 23200 41386a 23199->23200 23201 41386f GetLastError 23199->23201 23200->23192 23202 413879 23201->23202 23202->23192 23208 413890 3 API calls 23203->23208 23204 414914 23205 414938 LeaveCriticalSection 23204->23205 23206 41491a LeaveCriticalSection 23204->23206 23205->23192 23206->23192 23208->23204 23212 415740 23209->23212 23211 415ccf 23211->23192 23213 415776 23212->23213 23214 415c5d 23212->23214 23213->23214 23241 414740 23213->23241 23214->23211 23216 415791 23217 415795 23216->23217 23218 414740 2 API calls 23216->23218 23217->23211 23219 4157bd 23218->23219 23219->23217 23220 414740 2 API calls 23219->23220 23221 4157cf 23220->23221 23221->23217 23222 414740 2 API calls 23221->23222 23223 4157e1 23222->23223 23223->23217 23248 4149d0 23223->23248 23226 4157f8 23226->23217 23255 415410 23226->23255 23227 4147d0 RaiseException 23231 4158e1 23227->23231 23230 415b7b 23230->23211 23231->23227 23231->23230 23232 415c11 23231->23232 23234 415c24 23231->23234 23235 415c37 23231->23235 23236 415c4a 23231->23236 23240 414c20 2 API calls 23231->23240 23259 414b00 23231->23259 23264 415d40 23231->23264 23233 42a355 RaiseException 23232->23233 23233->23234 23237 42a355 RaiseException 23234->23237 23238 42a355 RaiseException 23235->23238 23239 42a355 RaiseException 23236->23239 23237->23235 23238->23236 23239->23214 23240->23231 23244 414748 23241->23244 23242 41476f 23245 41478d VirtualAlloc 23242->23245 23246 41477d 23242->23246 23243 414759 23243->23216 23244->23242 23244->23243 23247 414761 VirtualFree 23244->23247 23245->23216 23246->23216 23247->23242 23253 4149d8 23248->23253 23249 4149fe 23250 414a0b 23249->23250 23251 414a1a VirtualAlloc 23249->23251 23250->23226 23251->23226 23252 4149e8 23252->23226 23253->23249 23253->23252 23254 4149f0 VirtualFree 23253->23254 23254->23249 23257 415435 23255->23257 23258 41546a 23257->23258 23271 4147d0 23257->23271 23258->23231 23260 414b21 23259->23260 23261 414b0c 23259->23261 23260->23231 23261->23260 23262 42a355 RaiseException 23261->23262 23263 414b37 23262->23263 23263->23231 23265 415d55 23264->23265 23266 415dab 23264->23266 23268 4147d0 RaiseException 23265->23268 23270 415d7d 23265->23270 23267 4147d0 RaiseException 23266->23267 23269 415dd5 23266->23269 23267->23269 23268->23270 23269->23231 23270->23231 23272 4147d9 23271->23272 23273 4147df 23271->23273 23272->23257 23274 41481b 23273->23274 23275 42a355 RaiseException 23273->23275 23274->23257 23275->23274 23276 40a930 23277 40a972 FindCloseChangeNotification 23276->23277 23278 40a97d 23276->23278 23277->23278 23279 40a979 GetLastError 23277->23279 23280 40a990 CloseHandle 23278->23280 23281 40a99b 23278->23281 23279->23278 23280->23281 23282 40a997 GetLastError 23280->23282 23283 40a9b0 CloseHandle 23281->23283 23284 40a9ce 23281->23284 23282->23281 23283->23284 23285 40a9b7 GetLastError 23283->23285 23286 416430 23287 416437 23286->23287 23288 41643f 23286->23288 23293 4024a0 23288->23293 23290 416454 23291 420edb 66 API calls 23290->23291 23292 416460 23290->23292 23291->23292 23294 40251a 23293->23294 23297 4024b9 23293->23297 23295 420def 5 API calls 23294->23295 23296 40252b 23295->23296 23296->23290 23298 420def 5 API calls 23297->23298 23299 402514 23298->23299 23299->23290 23300 41b730 GetDlgItem 23301 41b787 LoadIconW SendMessageW 23300->23301 23302 41b7ae SetTimer SetWindowTextW 23300->23302 23301->23302 23303 41b7d3 PostMessageW 23302->23303 23304 41b7e7 23302->23304 23303->23304 23305 404e60 67 API calls 23304->23305 23306 41b7fe 23305->23306 23307 41af50 68 API calls 23306->23307 23308 41b810 23307->23308 23309 404be0 67 API calls 23308->23309 23310 41b81e 23309->23310 23311 420dfe 66 API calls 23310->23311 23312 41b82c SetDlgItemTextW 23311->23312 23313 404e60 67 API calls 23312->23313 23314 41b85a 23313->23314 23315 41af50 68 API calls 23314->23315 23316 41b86d 23315->23316 23317 404be0 67 API calls 23316->23317 23318 41b87b 23317->23318 23319 420dfe 66 API calls 23318->23319 23320 41b88a SetDlgItemTextW SendMessageW SetEvent 23319->23320 23321 41b8c5 GetLastError 23320->23321 23322 41b8cb 23320->23322 23321->23322 23323 41b8d6 GetWindowRect GetWindowRect SystemParametersInfoW 23322->23323 23324 41b9be 23322->23324 23326 41b98a MoveWindow 23323->23326 23325 420dfe 66 API calls 23324->23325 23327 41b9cc 23325->23327 23326->23324 23329 420dfe 66 API calls 23327->23329 23330 41b9de 23329->23330 23331 40b9f1 23334 40ba09 23331->23334 23332 40ba76 23333 420dfe 66 API calls 23333->23334 23334->23332 23334->23333 23335 41dbb0 23338 41dae0 23335->23338 23337 41dbba 23339 41db2b WaitForSingleObject 23338->23339 23340 41db25 23338->23340 23343 41db63 PostMessageW 23339->23343 23344 41db88 23339->23344 23341 41d8c0 117 API calls 23340->23341 23341->23339 23343->23337 23344->23337 23354 40fe37 23357 40fca6 23354->23357 23355 40fe94 23358 40a700 66 API calls 23355->23358 23357->23355 23361 40ad10 RaiseException 23357->23361 23363 4100b2 23357->23363 23365 4100b7 23357->23365 23368 4100cc 23357->23368 23369 420edb 66 API calls 23357->23369 23370 420dfe 66 API calls 23357->23370 23373 4100e1 23357->23373 23376 408dd0 93 API calls 23357->23376 23406 411b60 23357->23406 23359 40feab 23358->23359 23360 408d50 66 API calls 23359->23360 23362 40fedb 23360->23362 23361->23357 23366 420dfe 66 API calls 23362->23366 23364 40ddc0 RaiseException 23363->23364 23364->23365 23367 42a355 RaiseException 23365->23367 23372 40ff06 23366->23372 23367->23368 23371 42a355 RaiseException 23368->23371 23369->23357 23370->23357 23371->23373 23374 420dfe 66 API calls 23372->23374 23377 40b810 66 API calls 23373->23377 23375 40ff3b 23374->23375 23379 420dfe 66 API calls 23375->23379 23376->23357 23378 410106 23377->23378 23381 420dfe 66 API calls 23378->23381 23380 40ff70 23379->23380 23383 420dfe 66 API calls 23380->23383 23382 410133 23381->23382 23386 420dfe 66 API calls 23382->23386 23384 40ffb1 23383->23384 23417 40d2f0 23384->23417 23388 410168 23386->23388 23390 420dfe 66 API calls 23388->23390 23389 420dfe 66 API calls 23391 410010 23389->23391 23392 41019d 23390->23392 23393 420dfe 66 API calls 23391->23393 23394 420dfe 66 API calls 23392->23394 23395 41004d 23393->23395 23396 4101de 23394->23396 23399 420dfe 66 API calls 23395->23399 23397 40d2f0 66 API calls 23396->23397 23398 41020b 23397->23398 23401 420dfe 66 API calls 23398->23401 23400 410091 23399->23400 23402 41023d 23401->23402 23403 420dfe 66 API calls 23402->23403 23404 41027b 23403->23404 23405 420dfe 66 API calls 23404->23405 23405->23400 23407 420edb 66 API calls 23406->23407 23408 411b8b 23407->23408 23409 411bab 23408->23409 23410 42a355 RaiseException 23408->23410 23411 420dfe 66 API calls 23409->23411 23410->23409 23412 411bc6 23411->23412 23413 40a260 67 API calls 23412->23413 23415 411be1 23412->23415 23413->23415 23414 411c2e 23414->23357 23415->23414 23416 4051e0 67 API calls 23415->23416 23416->23414 23418 40d32f 23417->23418 23419 420dfe 66 API calls 23418->23419 23420 40d353 23419->23420 23420->23389

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 41f2d0-41f302 call 41e5c0 3 41f304-41f34c call 41af50 MessageBoxW call 420dfe call 420def 0->3 4 41f34f-41f399 CoInitialize call 41e6a0 call 426470 GetVersionExW 0->4 13 41f3c1 4->13 14 41f39b-41f3a2 4->14 18 41f3c3 call 41ea60 13->18 19 41f3c8-41f5db call 404e60 * 4 GetCommandLineW call 404b30 call 404850 call 420dfe call 41af50 call 404be0 call 420dfe call 41af50 call 404be0 call 420dfe call 41af50 call 404be0 call 420dfe call 41af50 call 404be0 call 420dfe call 41af50 call 404be0 call 420dfe call 41af50 call 404be0 call 420dfe call 41af50 call 404be0 call 420dfe call 41af50 call 404be0 call 420dfe call 41af50 call 404be0 call 420dfe call 420edb 13->19 16 41f3b5-41f3bd 14->16 17 41f3a4-41f3b3 call 41e9b0 14->17 16->18 22 41f3bf 16->22 17->13 17->16 18->19 95 41f5f2-41f632 call 404b30 call 404e60 call 421951 19->95 96 41f5dd-41f5ed call 42a355 19->96 22->19 104 41f634-41f639 95->104 105 41f63b-41f64b call 421951 95->105 96->95 107 41f67b-41f67d 104->107 113 41f654-41f664 call 421951 105->113 114 41f64d-41f652 105->114 109 41f6a5-41f6ac 107->109 110 41f67f-41f681 107->110 111 41f6d3-41f6e3 call 421951 109->111 112 41f6ae-41f6d1 call 4218b6 call 406510 109->112 115 41f683-41f690 110->115 116 41f692-41f69a 110->116 128 41f6e5-41f6f5 call 421951 111->128 129 41f71f 111->129 112->111 126 41f666-41f676 call 421951 113->126 127 41f678 113->127 114->107 120 41f69f-41f6a0 call 41e830 115->120 116->120 120->109 126->109 126->127 127->107 128->129 138 41f6f7-41f707 call 421951 128->138 130 41f721-41f7d7 call 404e60 call 406490 call 405070 call 404fd0 call 420dfe call 405070 call 404f50 call 420dfe call 404b30 call 404de0 call 405130 129->130 165 41f817 130->165 166 41f7d9-41f815 call 404b30 call 404de0 call 405130 130->166 138->129 144 41f709-41f719 call 421951 138->144 144->129 149 41f71b-41f71d 144->149 149->130 167 41f81c-41f823 165->167 166->165 166->167 169 41f835-41f838 167->169 170 41f825-41f832 call 420dfe 167->170 173 41f84a-41f84d 169->173 174 41f83a-41f847 call 420dfe 169->174 170->169 178 41f862-41f865 173->178 179 41f84f-41f85f call 420dfe 173->179 174->173 181 41f877-41f87c 178->181 182 41f867-41f874 call 420dfe 178->182 179->178 188 41f8b6-41f8ed call 405390 call 41eb70 181->188 189 41f87e-41f8b1 call 404ca0 call 404be0 call 420dfe call 404e00 181->189 182->181 200 41f8f3-41f8f7 188->200 201 41f98e-41f9c1 call 404b30 call 404e60 188->201 189->188 203 41f905-41f98b call 420dfe * 8 call 420def 200->203 204 41f8f9-41f900 call 41e630 200->204 216 41f9c7-41fa09 call 405510 201->216 217 41fddd-41fe10 call 404e60 201->217 204->203 227 41fad0-41fb74 call 404b30 call 405db0 call 420dfe call 404b30 call 405db0 call 420dfe call 404b30 call 405db0 call 420dfe call 405130 216->227 228 41fa0f-41fa13 216->228 224 41fe12-41fe1f call 406f70 217->224 225 41fe26-41fe3b call 407800 217->225 224->225 242 41fe41-41fe45 225->242 243 41ff0a-41ff1e call 420edb 225->243 342 41fb76 227->342 343 41fb7a-41fbaa call 404b30 call 405d40 call 420dfe 227->343 229 41fa20-41facd call 420c70 call 420dfe * 10 call 420def 228->229 230 41fa15-41fa1b call 41e630 228->230 230->229 248 41fe53-41ff07 call 41e550 call 420dfe * 10 call 420def 242->248 249 41fe47-41fe4e call 41e630 242->249 262 41ff20-41ff30 call 42a355 243->262 263 41ff35-41ff66 call 418ec0 243->263 249->248 262->263 284 42003e-4200a3 call 404b90 call 404e60 call 41dbc0 263->284 285 41ff6c-41ff71 263->285 322 42024b-420277 call 420dfe call 41f260 SetCurrentDirectoryW 284->322 323 4200a9-4200ae 284->323 291 41ff73-41ff7a call 41e630 285->291 292 41ff7f-42003b call 41e550 call 420dfe * 10 call 420def 285->292 291->292 362 4202b0-4202b5 322->362 363 420279-4202ab SetCurrentDirectoryW call 420dfe * 2 322->363 328 4200b4-4200b7 323->328 329 42016f-420248 call 420dfe * 2 call 41e550 call 420dfe * 10 call 420def 323->329 338 4200c0-4200eb call 41af50 call 404be0 call 420dfe 328->338 339 4200b9-4200be 328->339 356 4200f5-42010c call 41af50 338->356 339->338 348 4200ed-4200f3 339->348 342->343 416 41fbc9-41fbd2 343->416 417 41fbac-41fbc2 call 404be0 343->417 348->329 348->356 383 420124-420166 call 41e480 MessageBoxW call 41e450 356->383 384 42010e-420122 MessageBoxW 356->384 374 4202bb-4202fd call 404b90 362->374 375 42047c-420481 362->375 363->362 408 4202ff-420308 call 4060e0 374->408 409 42030d-420360 call 404b90 ShellExecuteExW 374->409 387 420587-4205a3 call 404b10 call 4071b0 375->387 388 420487-4204a1 call 406510 call 407c50 375->388 396 420167-42016c call 420dfe 383->396 384->396 435 4205a5-4205db call 404b10 call 4071b0 call 404be0 call 420dfe 387->435 436 4205de-4205f2 call 421951 387->436 388->387 432 4204a7-4204ab 388->432 396->329 408->409 433 420366-42036b 409->433 434 42045d-420477 call 420dfe * 2 409->434 430 41fbd8-41fbdd 416->430 431 41fcaf-41fddb call 404b30 call 405db0 call 404be0 call 420dfe * 2 call 404b30 call 405db0 call 404be0 call 420dfe * 2 call 404b30 call 405db0 call 407940 call 404be0 call 420dfe * 6 call 420c70 416->431 417->416 430->431 441 41fbe3-41fbf6 MessageBoxW 430->441 431->217 443 4204b9-420581 SetCurrentDirectoryW call 420dfe * 2 call 41e550 call 420dfe * 9 432->443 444 4204ad-4204b4 call 41e630 432->444 445 420379-420457 call 420dfe * 2 SetCurrentDirectoryW call 420dfe * 2 call 41e550 call 420dfe * 9 433->445 446 42036d-420374 call 41e630 433->446 492 4208db-4208e0 434->492 435->436 465 420667-42066c 436->465 466 4205f4-420665 call 404be0 call 4083a0 call 404b30 * 2 call 41b120 call 420dfe * 2 436->466 441->431 452 41fbfc-41fcaa call 420dfe * 3 call 420c70 call 420dfe * 9 441->452 443->387 444->443 445->434 446->445 685 420acc-420aea call 420dfe call 420def 452->685 475 420677-4206dc call 404b30 call 404b90 call 41ee70 call 404be0 call 420dfe * 2 465->475 476 42066e-420672 call 4083a0 465->476 466->475 598 4206f7-420878 call 407940 call 404b30 * 3 call 407940 * 5 call 420dfe * 8 CreateProcessW 475->598 599 4206de-4206f2 call 404c30 call 4060e0 475->599 476->475 501 4208e6-420928 WaitForSingleObject GetExitCodeProcess FindCloseChangeNotification call 4065e0 SetCurrentDirectoryW call 420dfe 492->501 502 4209fc-420acb call 4065e0 SetCurrentDirectoryW call 420dfe * 2 call 41e550 call 420dfe * 9 492->502 542 42092d-4209f9 call 420dfe call 41e550 call 420dfe * 10 call 420def 501->542 502->685 747 42087a-42087e 598->747 748 4208ab-4208d7 CloseHandle call 420dfe * 2 598->748 599->598 750 420880-420887 GetLastError call 41af70 747->750 751 42088c-4208a3 call 420dfe * 2 747->751 748->492 750->751 751->748
                              APIs
                                • Part of subcall function 0041E5C0: GetVersionExW.KERNEL32 ref: 0041E5E0
                              • MessageBoxW.USER32(00000000,02306160,?,00012010), ref: 0041F322
                                • Part of subcall function 00420DFE: RtlFreeHeap.NTDLL(00000000,?,00433738,0000000C,00423444,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C), ref: 00420E66
                                • Part of subcall function 00420DFE: GetLastError.KERNEL32(?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38,?,?,?,004234FE,0000000D), ref: 00420E77
                              • CoInitialize.OLE32(00000000), ref: 0041F350
                              • GetVersionExW.KERNEL32 ref: 0041F389
                              • GetCommandLineW.KERNEL32(00000004,00000004,00000004,00000004), ref: 0041F436
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: Version$CommandErrorFreeHeapInitializeLastLineMessage
                              • String ID: $ $ /m="$"$" /k="$"-k=$"/k=$%%T$%%T\$-k=$/k=$<$@KA$BeginPrompt$D$Directory$ExecuteFile$ExecuteParameters$PTn$Progress$RunProgram$Title$mia.lib$setup.exe
                              • API String ID: 2504683216-784449763
                              • Opcode ID: 8e4316e5e1cb91bd92f44a1657cf3a3e21e2f08c1d298bee1368258b13409358
                              • Instruction ID: 8ae80e7e1ea0a5da9484d0cc992cac7dbaeb8ea33a9bedbd46246e47c3c2bf24
                              • Opcode Fuzzy Hash: 8e4316e5e1cb91bd92f44a1657cf3a3e21e2f08c1d298bee1368258b13409358
                              • Instruction Fuzzy Hash: 09D2E6B06143409BD220EB75E842B9FB3E5AFC4308F40892EF58957252DB78F559CB9B
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1209 407ac0-407b0d 1210 407b24-407b35 FindFirstFileW 1209->1210 1211 407b0f-407b18 FindClose 1209->1211 1214 407b37-407b6a call 404e60 call 407e60 1210->1214 1215 407b9f-407bac call 407a60 1210->1215 1212 407bd3-407bd5 1211->1212 1213 407b1e 1211->1213 1217 407bae-407bd0 call 420def 1212->1217 1213->1210 1225 407b86-407b9d call 420dfe 1214->1225 1226 407b6c-407b76 1214->1226 1215->1217 1225->1212 1225->1215 1226->1225 1227 407b78-407b84 FindFirstFileW 1226->1227 1227->1225
                              APIs
                              • FindClose.KERNEL32(?,35A089A6,?,?), ref: 00407B10
                              • FindFirstFileW.KERNELBASE(?,?,35A089A6,?,?), ref: 00407B2A
                              • FindFirstFileW.KERNELBASE(?,?), ref: 00407B7E
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: Find$FileFirst$Close
                              • String ID:
                              • API String ID: 2810966245-0
                              • Opcode ID: e3b150c79052ad27782232c84f3a52fc6a62a57a2177f983f14b6e4624e5d615
                              • Instruction ID: 560bba3c12bb28fd588b29f65aec3029f033ad3fe931a3478cb76b2749ea814c
                              • Opcode Fuzzy Hash: e3b150c79052ad27782232c84f3a52fc6a62a57a2177f983f14b6e4624e5d615
                              • Instruction Fuzzy Hash: E5318F7190C3029FC720DF34D845B5BB7E4EB44724F100B2AE4A5933D1DB38A906CB96
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CreateInstanceVersion
                              • String ID:
                              • API String ID: 1462612201-0
                              • Opcode ID: 2cdb6139d6d9018f19570d7e36b6b22097f60c5826a9e3d961c17cac6fa76371
                              • Instruction ID: 51c3d68f6bde5c068a399ea07d0c0e700ec6cb6b10fcc9f3be2698376900635b
                              • Opcode Fuzzy Hash: 2cdb6139d6d9018f19570d7e36b6b22097f60c5826a9e3d961c17cac6fa76371
                              • Instruction Fuzzy Hash: DC010C74344201AFD310DB96D885F5B77F9AF88B44F50882DF858C72A0E7B8E8498B56
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CharUpper
                              • String ID: Unknown error
                              • API String ID: 9403516-83687255
                              • Opcode ID: 2761547e7a1914e5cfac364daaa5c13b498969adc31383defdc27037288d2e85
                              • Instruction ID: c92c129fdc3c76a0617035b0c9c6b73ca8392c23127d0512a78de34984e17ce4
                              • Opcode Fuzzy Hash: 2761547e7a1914e5cfac364daaa5c13b498969adc31383defdc27037288d2e85
                              • Instruction Fuzzy Hash: E92268752083808FC324DF69D884A5BBBE5BFC9304F54891EF29987351CB79E885CB96
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 37256b94bb60d5af6bc0b7cc110bb3124668dd40debc1630c3715b466050bab0
                              • Instruction ID: a73d485eed2c0f547a0b7567924c6c7deb504bae5797be35f8c618b3fbe3f811
                              • Opcode Fuzzy Hash: 37256b94bb60d5af6bc0b7cc110bb3124668dd40debc1630c3715b466050bab0
                              • Instruction Fuzzy Hash: 49625E71600248DFCB10DF68C880A9EBBF5EF89304F24859EE849AB391C779ED45CB95
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetDlgItem.USER32(?,000003E8), ref: 0041B774
                              • LoadIconW.USER32(00400000,?), ref: 0041B796
                              • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 0041B7A8
                              • SetTimer.USER32(?,00000003,00000064,00000000), ref: 0041B7B7
                              • SetWindowTextW.USER32(?,?), ref: 0041B7C8
                              • PostMessageW.USER32(?,00008000,00000000,00000000), ref: 0041B7DE
                              • SetDlgItemTextW.USER32(?,000003E7,?), ref: 0041B83D
                              • SetDlgItemTextW.USER32(?,00000002,?), ref: 0041B898
                              • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 0041B8AD
                              • SetEvent.KERNEL32 ref: 0041B8BB
                              • GetLastError.KERNEL32 ref: 0041B8C5
                              • GetWindowRect.USER32(?,?), ref: 0041B8F4
                              • GetWindowRect.USER32(?,?), ref: 0041B911
                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0041B946
                              • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0041B9B8
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: Window$ItemMessageText$RectSend$ErrorEventIconInfoLastLoadMoveParametersPostSystemTimer
                              • String ID:
                              • API String ID: 4208242464-0
                              • Opcode ID: 8212f1b92ac8d9662513c723b768a45af60c9ba66733e5d3f47eddca9276ea67
                              • Instruction ID: 6367b0c4eee05ecfc1dfa8353564df2870d360439f43c4ec88678ed8d53926e9
                              • Opcode Fuzzy Hash: 8212f1b92ac8d9662513c723b768a45af60c9ba66733e5d3f47eddca9276ea67
                              • Instruction Fuzzy Hash: 219145B1608344AFD310DF69C884A5BBBE9EB88704F404A2EF999D7391D774D940CBA6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • CreateDialogParamW.USER32(00400000,000001F6,00000000,Function_00006160,?), ref: 0041D4F4
                              • ShowWindow.USER32(?,00000001,?,setup.bmp), ref: 0041D535
                              • DialogBoxParamW.USER32(00400000,000001F4,00000000,Function_00006160,?), ref: 0041D57B
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,setup.bmp), ref: 0041D590
                              • SetWindowTextW.USER32(?,?), ref: 0041D5A7
                              • ShowWindow.USER32(?,00000001), ref: 0041D5C0
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041D5CB
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: Window$DialogObjectParamShowSingleWait$CreateText
                              • String ID: setup.bmp
                              • API String ID: 2497262453-2262724209
                              • Opcode ID: 72b3b40019be3ca3750d4009480d7b4b18c2004af0f88731a6715918442dda41
                              • Instruction ID: 1d5dabd48a9213cc4ee5c15c04374f547c5cd17aedaa24753aeb20be2184952a
                              • Opcode Fuzzy Hash: 72b3b40019be3ca3750d4009480d7b4b18c2004af0f88731a6715918442dda41
                              • Instruction Fuzzy Hash: 2A31F175740305ABC720DF25DC41FDB37A8EB48314F500629FA556B281CA34F806CBA9
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00008010), ref: 0041BDE8
                              • GetObjectW.GDI32(00000000,00000018,?), ref: 0041BE15
                              • SendMessageW.USER32(?,00000172,00000000,?), ref: 0041BE2A
                              • MoveWindow.USER32(?,00000000,00000000,?,?,00000001), ref: 0041BE4A
                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0041BE67
                              • GetWindowLongW.USER32(?,000000F0), ref: 0041BECD
                              • AdjustWindowRect.USER32(?,00000000), ref: 0041BED9
                              • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0041BEFD
                                • Part of subcall function 00420DFE: RtlFreeHeap.NTDLL(00000000,?,00433738,0000000C,00423444,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C), ref: 00420E66
                                • Part of subcall function 00420DFE: GetLastError.KERNEL32(?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38,?,?,?,004234FE,0000000D), ref: 00420E77
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: Window$Move$AdjustErrorFreeHeapImageInfoLastLoadLongMessageObjectParametersRectSendSystem
                              • String ID:
                              • API String ID: 1590663869-0
                              • Opcode ID: 9d7f9e0890f737e2ba4dd122624acd51a10f9590b6e1cac4c65fd5ed4c9739be
                              • Instruction ID: 03af98d0d0ffadcbe7ba7a864b7898debb76d72cbabd0c032310ea64956284ab
                              • Opcode Fuzzy Hash: 9d7f9e0890f737e2ba4dd122624acd51a10f9590b6e1cac4c65fd5ed4c9739be
                              • Instruction Fuzzy Hash: 8941F8B1604300AFD354CF39DC85F6BBBE9EBC8710F444A2DF98AC6290D671E9458B66
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 819 41eb70-41ebe7 call 429090 call 408050 824 41ec06-41ec10 819->824 825 41ebe9-41ebf6 819->825 828 41ec12-41ec1a 824->828 829 41ec1c-41ec28 824->829 826 41ebf8-41ebf9 CloseHandle 825->826 827 41ebff-41ec01 825->827 826->827 830 41ee3e-41ee65 call 420def 827->830 828->828 828->829 831 41ec2a 829->831 832 41ec3e-41ec4b 829->832 833 41ec30-41ec38 831->833 834 41ec53-41ec6f call 4081c0 832->834 833->833 837 41ec3a 833->837 834->825 840 41ec75-41ec7b 834->840 837->832 841 41ec81-41ec8d 840->841 842 41edef-41edfc 840->842 843 41ec90-41ec9b 841->843 844 41ee33 842->844 845 41eca1-41eca9 843->845 846 41ed2b-41ed2f 843->846 847 41ee35-41ee36 FindCloseChangeNotification 844->847 848 41ee3c 844->848 850 41ed8d-41edb5 call 4211b0 845->850 851 41ecaf-41ecb9 845->851 849 41ed31-41ed3d 846->849 846->850 847->848 848->830 853 41ed54-41ed56 849->853 854 41ed3f 849->854 864 41edc5-41ede2 850->864 865 41edb7-41edbf 850->865 855 41ecd4-41ecd6 851->855 856 41ecbb 851->856 860 41ed58-41ed5c 853->860 861 41ed7f-41ed88 853->861 858 41ed40-41ed44 854->858 862 41ee21-41ee30 855->862 863 41ecdc-41ece0 855->863 859 41ecc0-41ecc4 856->859 866 41ed46-41ed52 858->866 867 41ed78-41ed7a 858->867 868 41ecc6-41ecd2 859->868 869 41ed08-41ed10 859->869 860->867 870 41ed5e-41ed61 860->870 861->843 862->844 863->869 871 41ece2-41ece5 863->871 875 41ede4-41ede5 CloseHandle 864->875 876 41edeb-41eded 864->876 865->864 874 41ec50 865->874 866->853 866->858 867->843 868->855 868->859 872 41ed16-41ed26 call 405e00 869->872 873 41edfe-41ee10 869->873 870->861 877 41ed63-41ed69 870->877 871->862 878 41eceb-41ecf1 871->878 872->843 873->827 880 41ee16-41ee1f CloseHandle 873->880 874->834 875->876 876->830 877->867 881 41ed6b-41ed6e 877->881 878->869 882 41ecf3-41ecf6 878->882 880->830 881->861 884 41ed70-41ed76 881->884 882->862 885 41ecfc-41ed02 882->885 884->861 884->867 885->862 885->869
                              APIs
                                • Part of subcall function 00408050: CloseHandle.KERNEL32(?,35A089A6,00000000,?,80000000,00000001,00000000), ref: 0040807D
                                • Part of subcall function 00408050: CreateFileW.KERNELBASE(?,?,?,00000000,00000003,00000080,00000000,35A089A6,00000000,?,80000000,00000001,00000000), ref: 004080B0
                                • Part of subcall function 00408050: CreateFileW.KERNEL32(?,?,?,00000000,00000003,00000080,00000000), ref: 0040810E
                              • CloseHandle.KERNEL32(?,?,00001000,?,80000000,00000001,35A089A6,?,?,?,00000004,00000000,0042D21B,000000FF,0041F8EB,?), ref: 0041EBF9
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CloseCreateFileHandle
                              • String ID: ;!@Install@!UTF-8!$;!@InstallEnd@!
                              • API String ID: 3498533004-372238525
                              • Opcode ID: afc51a853e801afb9757ed0c4be47186c9cb9a67f59d5721a3fd60e810a4cbc9
                              • Instruction ID: 951928544ea1403c87551abc08aa41bf64b6ac2c57d2d5833b4dbc2ae828a00e
                              • Opcode Fuzzy Hash: afc51a853e801afb9757ed0c4be47186c9cb9a67f59d5721a3fd60e810a4cbc9
                              • Instruction Fuzzy Hash: AD8109795083818BD330CF26D8847EBBBE1AB55314F540A5EE9D587381D739D8C6CB4A
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0041EAA3
                              • RegCreateKeyExW.KERNELBASE ref: 0041EB1F
                              • RegSetValueExW.KERNELBASE(00000000,IsHostApp,00000000,00000001,00000000,00000002), ref: 0041EB3F
                              • RegCloseKey.ADVAPI32 ref: 0041EB49
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CloseCreateFileModuleNameValue
                              • String ID: Applications\$IsHostApp
                              • API String ID: 506456306-1667566961
                              • Opcode ID: 5cec257a012e9a1e1d57e1157371452729b30d6bfd67cdf483cdb0fb9429fb01
                              • Instruction ID: 4aa4451f33cd243bcb97ec5c147c50c0ddf720af96767f8ac43c9fc97424fe1f
                              • Opcode Fuzzy Hash: 5cec257a012e9a1e1d57e1157371452729b30d6bfd67cdf483cdb0fb9429fb01
                              • Instruction Fuzzy Hash: 7121A7B17943007BE224EB61DC4BFAB73E4AF98B04F40491DB385961C1DAB4A544C79B
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 899 40a930-40a970 900 40a972-40a977 FindCloseChangeNotification 899->900 901 40a97d 899->901 900->901 902 40a979-40a97b GetLastError 900->902 903 40a984-40a98e 901->903 902->903 904 40a990-40a995 CloseHandle 903->904 905 40a99b 903->905 904->905 906 40a997-40a999 GetLastError 904->906 907 40a9a2-40a9ae 905->907 906->907 908 40a9b0-40a9b5 CloseHandle 907->908 909 40a9ce-40a9e6 907->909 908->909 910 40a9b7-40a9cb GetLastError 908->910
                              APIs
                              • FindCloseChangeNotification.KERNELBASE(?,35A089A6,00000000,?,?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A973
                              • GetLastError.KERNEL32(?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A979
                              • CloseHandle.KERNEL32(?,35A089A6,00000000,?,?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A991
                              • GetLastError.KERNEL32(?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A997
                              • CloseHandle.KERNEL32(?,35A089A6,00000000,?,?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A9B1
                              • GetLastError.KERNEL32(?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A9B7
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CloseErrorLast$Handle$ChangeFindNotification
                              • String ID:
                              • API String ID: 499975219-0
                              • Opcode ID: 5ca849f9e80f7cf6a4f2ccd92f1cca5e306e245aee22a54abe53d0d2476e70a3
                              • Instruction ID: b8afac3a52eb0e78b9d4f59a748d0347e24904ef526753f53a3bde94e43bcd0c
                              • Opcode Fuzzy Hash: 5ca849f9e80f7cf6a4f2ccd92f1cca5e306e245aee22a54abe53d0d2476e70a3
                              • Instruction Fuzzy Hash: 3D1181F23087418BD320DF29D800B27B7D8EB90B60F110D3EE89593780D73AE414CAAA
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 911 41dbc0-41dd1a call 41e0c0 call 41af50 call 404be0 call 420dfe call 41af50 call 404be0 call 420dfe call 41af50 call 404be0 call 420dfe call 41af50 call 404be0 call 420dfe call 404be0 * 2 call 420edb 944 41dd1c-41dd2a call 42a355 911->944 945 41dd2f-41dd50 call 41d5e0 911->945 944->945 949 41dd52-41dd57 945->949 950 41dd5a-41dd60 945->950 949->950 951 41dd62-41dd67 950->951 952 41dd6a-41dda6 call 404be0 950->952 951->952 955 41dfbc-41dfc3 952->955 956 41ddac-41ddbd call 41d8c0 952->956 958 41dfc5-41dfd6 call 41d8c0 955->958 959 41dfd8-41dff7 955->959 964 41ddc3-41ddec 956->964 965 41dffe-41e00e 956->965 958->959 958->965 959->965 973 41ded0-41ded7 964->973 974 41ddf2-41de16 call 4083e0 964->974 966 41e051-41e054 965->966 967 41e010-41e025 965->967 970 41e067-41e085 966->970 971 41e056-41e062 call 404be0 966->971 968 41e027-41e028 call 404e60 967->968 969 41e02d-41e034 967->969 968->969 976 41e036-41e045 969->976 978 41e086-41e0b1 call 41e180 970->978 971->970 973->965 980 41dedd-41df0b call 4210a6 973->980 983 41de18-41de3a call 404b30 974->983 976->976 981 41e047-41e04e 976->981 988 41df28-41dfb2 call 404e60 call 41af50 call 404be0 call 420dfe call 41d4d0 call 420dfe FindCloseChangeNotification 980->988 989 41df0d-41df17 GetLastError 980->989 981->966 991 41de57-41de5a 983->991 992 41de3c 983->992 988->965 1022 41dfb4-41dfba GetLastError 988->1022 993 41df19 989->993 994 41df1e-41df23 989->994 997 41de65-41de79 call 420dfe 991->997 996 41de3f 992->996 993->994 994->978 999 41de41-41de44 996->999 1000 41de5c-41de61 996->1000 1007 41dea0-41dec9 call 408530 997->1007 1008 41de7b-41de98 call 408530 997->1008 1003 41de63 999->1003 1004 41de46-41de55 999->1004 1000->997 1003->997 1004->991 1004->996 1017 41dece 1007->1017 1008->974 1014 41de9e 1008->1014 1014->1017 1017->973 1022->965
                              APIs
                                • Part of subcall function 00420DFE: RtlFreeHeap.NTDLL(00000000,?,00433738,0000000C,00423444,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C), ref: 00420E66
                                • Part of subcall function 00420DFE: GetLastError.KERNEL32(?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38,?,?,?,004234FE,0000000D), ref: 00420E77
                                • Part of subcall function 00420EDB: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38), ref: 00420F52
                                • Part of subcall function 0042A355: RaiseException.KERNEL32(?,?,?,00404E9C,?,?,?,?,?,00404E9C,?,00433BD0), ref: 0042A397
                              • GetLastError.KERNEL32(?,?,?,?,?,00000000,?,?,?,?,00000000), ref: 0041DF0D
                                • Part of subcall function 0041D4D0: CreateDialogParamW.USER32(00400000,000001F6,00000000,Function_00006160,?), ref: 0041D4F4
                                • Part of subcall function 0041D4D0: ShowWindow.USER32(?,00000001,?,setup.bmp), ref: 0041D535
                                • Part of subcall function 0041D4D0: DialogBoxParamW.USER32(00400000,000001F4,00000000,Function_00006160,?), ref: 0041D57B
                                • Part of subcall function 0041D4D0: WaitForSingleObject.KERNEL32(?,000000FF,?,setup.bmp), ref: 0041D590
                                • Part of subcall function 0041D4D0: SetWindowTextW.USER32(?,?), ref: 0041D5A7
                                • Part of subcall function 0041D4D0: ShowWindow.USER32(?,00000001), ref: 0041D5C0
                                • Part of subcall function 0041D4D0: WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041D5CB
                              • FindCloseChangeNotification.KERNELBASE(00000000,?,00000004,?,?,?,?,?,00000000,?,?,?,?,00000000), ref: 0041DFAA
                              • GetLastError.KERNEL32(?,?,?,?,?,00000000,?,?,?,?,00000000), ref: 0041DFB4
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ErrorLastWindow$DialogHeapObjectParamShowSingleWait$AllocateChangeCloseCreateExceptionFindFreeNotificationRaiseText
                              • String ID: etup.bmp
                              • API String ID: 50554229-3436927654
                              • Opcode ID: 51248fe61525d921019bc7784e8c2f4ce7418bc3d4169d9d94d46c807291a52d
                              • Instruction ID: 14b6864db79aa0758f53e4780a0cfdcd85dd8687eaec00fb5cd2c2bcdf21938c
                              • Opcode Fuzzy Hash: 51248fe61525d921019bc7784e8c2f4ce7418bc3d4169d9d94d46c807291a52d
                              • Instruction Fuzzy Hash: 95D17FB55083808FD320EF65C880B9BB7E5AF98304F14892EF59987351D778E94ACB5B
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1024 41ee70-41ef23 call 404e60 call 4079b0 call 404b90 call 420dfe call 407d60 1035 41f114-41f143 call 404b30 call 420dfe 1024->1035 1036 41ef29 1024->1036 1056 41f145-41f146 FindClose 1035->1056 1057 41f14c 1035->1057 1038 41ef30-41ef52 1036->1038 1040 41ef54 1038->1040 1041 41ef7d-41ef94 1038->1041 1040->1041 1045 41ef56-41ef59 1040->1045 1042 41ef96 1041->1042 1043 41efbf-41efc9 1041->1043 1042->1043 1046 41ef98-41ef9b 1042->1046 1047 41f0ff-41f10e call 407d60 1043->1047 1048 41efcf-41f036 call 407940 call 4079b0 call 420dfe 1043->1048 1050 41ef5b-41ef6a 1045->1050 1051 41ef6e-41ef77 1045->1051 1053 41efb0-41efb9 1046->1053 1054 41ef9d-41efac 1046->1054 1047->1035 1047->1038 1079 41f038-41f039 call 404e60 1048->1079 1080 41f03e-41f042 1048->1080 1050->1040 1058 41ef6c 1050->1058 1051->1041 1059 41f19a-41f1cb call 404b90 call 420dfe 1051->1059 1053->1043 1053->1059 1054->1042 1062 41efae 1054->1062 1056->1057 1064 41f154-41f173 call 420dfe 1057->1064 1058->1041 1074 41f1d4-41f1fb call 420dfe 1059->1074 1075 41f1cd-41f1ce FindClose 1059->1075 1062->1043 1073 41f174-41f197 call 420dfe 1064->1073 1074->1073 1075->1074 1079->1080 1082 41f044-41f053 1080->1082 1082->1082 1085 41f055-41f081 call 41ee70 1082->1085 1088 41f083-41f098 1085->1088 1089 41f0c8-41f0e4 call 420dfe 1085->1089 1090 41f0a2-41f0a8 1088->1090 1091 41f09a-41f09d call 404e60 1088->1091 1097 41f200-41f243 call 404b90 call 420dfe * 2 1089->1097 1098 41f0ea-41f0fc call 420dfe 1089->1098 1094 41f0b0-41f0bf 1090->1094 1091->1090 1094->1094 1096 41f0c1-41f0c4 1094->1096 1096->1089 1107 41f245-41f246 FindClose 1097->1107 1108 41f24c-41f253 1097->1108 1098->1047 1107->1108 1108->1064
                              APIs
                                • Part of subcall function 00420DFE: RtlFreeHeap.NTDLL(00000000,?,00433738,0000000C,00423444,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C), ref: 00420E66
                                • Part of subcall function 00420DFE: GetLastError.KERNEL32(?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38,?,?,?,004234FE,0000000D), ref: 00420E77
                                • Part of subcall function 00407D60: FindNextFileW.KERNELBASE(35A089A6,?,?,00000000), ref: 00407D8D
                              • FindClose.KERNELBASE(?,?,mia.lib), ref: 0041F146
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: Find$CloseErrorFileFreeHeapLastNext
                              • String ID: mia.lib
                              • API String ID: 2022707556-3926378727
                              • Opcode ID: 106c9770c868863ecd1b176a45e11baaaa2e39fe68dba10e270c5d4592b9eba8
                              • Instruction ID: acefb76dbfd321258123378c1413fdf74a6f6d2c8bb5f67a3714b289b7daedea
                              • Opcode Fuzzy Hash: 106c9770c868863ecd1b176a45e11baaaa2e39fe68dba10e270c5d4592b9eba8
                              • Instruction Fuzzy Hash: A1B18F755083809FC330DB29C44079BB7E1AF85318F444A2EF9D957391D739A98AC79B
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1109 41cca0-41ccac 1110 41cda3-41cdae 1109->1110 1111 41ccb2-41ccb7 1109->1111 1112 41cdb0-41cdd1 SetFileTime 1110->1112 1113 41ce0a-41ce0f 1110->1113 1114 41ccb9-41ccc1 1111->1114 1115 41ccc8-41cccd 1111->1115 1112->1113 1116 41cdd3-41cddc FindCloseChangeNotification 1112->1116 1119 41ce11-41ce19 1113->1119 1120 41ce20-41ce24 1113->1120 1114->1115 1117 41cd22 1115->1117 1118 41cccf-41ccd2 1115->1118 1122 41cde6-41cdee GetLastError 1116->1122 1123 41cdde-41cde4 1116->1123 1121 41cd27-41cd2d call 404be0 1117->1121 1125 41ccf0-41ccf7 1118->1125 1126 41ccd4-41ccd7 1118->1126 1119->1120 1127 41ce31 1120->1127 1128 41ce26-41ce2c call 406780 1120->1128 1133 41cd32-41cd39 1121->1133 1131 41cdf0-41cdf7 1122->1131 1132 41cdfa 1122->1132 1123->1113 1135 41cd09-41cd14 call 404be0 1125->1135 1136 41ccf9-41cd00 1125->1136 1126->1133 1134 41ccd9-41ccdf 1126->1134 1129 41ce33-41ce35 1127->1129 1128->1127 1141 41ce06-41ce08 1132->1141 1142 41cdfc-41ce01 1132->1142 1139 41cd42-41cd49 1133->1139 1140 41cd3b 1133->1140 1143 41cce1-41cce7 1134->1143 1144 41cd19-41cd20 1134->1144 1135->1144 1136->1135 1145 41cd02-41cd07 1136->1145 1147 41cd99-41cda0 1139->1147 1148 41cd4b-41cd52 1139->1148 1140->1139 1141->1113 1141->1129 1142->1141 1143->1144 1149 41cce9-41ccee 1143->1149 1144->1133 1145->1121 1150 41cd65-41cd86 1148->1150 1151 41cd54-41cd60 1148->1151 1149->1121 1150->1147 1153 41cd88-41cd94 1150->1153 1151->1150 1153->1147
                              APIs
                              • SetFileTime.KERNELBASE(?,00000000,00000000,?), ref: 0041CDBF
                              • FindCloseChangeNotification.KERNELBASE(?), ref: 0041CDD4
                              • GetLastError.KERNEL32 ref: 0041CDE6
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ChangeCloseErrorFileFindLastNotificationTime
                              • String ID: PTn
                              • API String ID: 3673273941-3877643181
                              • Opcode ID: c825ca507cc76167d5b05d5c4b29e77f4d476bc3e0454580608a0aaad5d88e34
                              • Instruction ID: 7b2998dd1cb06f6e771dfa2e92566308564360dd9503c26fc9d92f09fd085f74
                              • Opcode Fuzzy Hash: c825ca507cc76167d5b05d5c4b29e77f4d476bc3e0454580608a0aaad5d88e34
                              • Instruction Fuzzy Hash: 50417E756447418BE330CB79DC84BD3BBE5AB88314F184A2ED19A8B390C779E886C759
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1154 406690-4066d9 CreateFileW 1155 406741-406746 1154->1155 1156 4066db-406709 call 404e60 call 407e60 1154->1156 1157 406764-406777 1155->1157 1158 406748-406762 SetFileTime FindCloseChangeNotification 1155->1158 1163 40670b-406715 1156->1163 1164 40672e-40673f call 420dfe 1156->1164 1158->1157 1163->1164 1165 406717-40672c CreateFileW 1163->1165 1164->1155 1165->1164
                              APIs
                              • CreateFileW.KERNELBASE(?,40000000,00000003,00000000,00000003,02000000,00000000,35A089A6,00000004,?,?,?), ref: 004066D2
                              • CreateFileW.KERNEL32(35A089A6,40000000,00000003,00000000,00000003,02000000,00000000,?,00000000,00000004), ref: 0040672A
                              • SetFileTime.KERNELBASE(00000000,00000000,00000000,?,?,40000000,00000003,00000000,00000003,02000000,00000000,35A089A6,00000004,?,?,?), ref: 00406750
                              • FindCloseChangeNotification.KERNELBASE(00000000,?,40000000,00000003,00000000,00000003,02000000,00000000,35A089A6,00000004,?,?,?), ref: 0040675C
                                • Part of subcall function 00407E60: GetCurrentDirectoryW.KERNEL32(00000105,35A089A6), ref: 00407F53
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: File$Create$ChangeCloseCurrentDirectoryFindNotificationTime
                              • String ID:
                              • API String ID: 4004719644-0
                              • Opcode ID: 4019fdf441a4c4eb5f69e1d984c632c07fca8aefb080f6855eb8301330c79c31
                              • Instruction ID: ac6c79c5a0dc6e211d532a3be32971133362d4db447b27be0444ece16f4d2a22
                              • Opcode Fuzzy Hash: 4019fdf441a4c4eb5f69e1d984c632c07fca8aefb080f6855eb8301330c79c31
                              • Instruction Fuzzy Hash: E02125712443207BE2209F25DC45F5B7BDCEB85B64F50062AF654A72C1C778A905CAEA
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1168 41d750-41d7a3 1169 41d7a5-41d7af KiUserCallbackDispatcher 1168->1169 1170 41d7bb-41d7c0 1168->1170 1169->1170 1171 41d7b1 1169->1171 1172 41d7c2-41d7cc DestroyWindow 1170->1172 1173 41d7d5-41d81e call 420dfe * 2 call 41d370 call 420dfe 1170->1173 1171->1170 1172->1173 1174 41d7ce 1172->1174 1183 41d820-41d825 1173->1183 1184 41d828-41d862 call 420dfe * 3 1173->1184 1174->1173 1183->1184 1191 41d864-41d869 1184->1191 1192 41d86c-41d87d 1184->1192 1191->1192
                              APIs
                              • KiUserCallbackDispatcher.NTDLL(?,35A089A6,?,?,?,?,0042C782,000000FF), ref: 0041D7A6
                              • DestroyWindow.USER32(?,35A089A6,?,?,?,?,0042C782,000000FF), ref: 0041D7C3
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CallbackDestroyDispatcherUserWindow
                              • String ID: A
                              • API String ID: 2944404800-2078354741
                              • Opcode ID: 5586f43cb49ad24856759286fed33058e7b89fb5ff18b7701b6384f671d7b546
                              • Instruction ID: 7c98b1cd013b058fd397e9c972b29c14f6c4b2c3c95b67cdc02f0fa2510ff33a
                              • Opcode Fuzzy Hash: 5586f43cb49ad24856759286fed33058e7b89fb5ff18b7701b6384f671d7b546
                              • Instruction Fuzzy Hash: 3931E2B1A04B408BC720DF79C848B87B7E8AF48314F04490EF59987392D779F844CB99
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1193 408050-40807a 1194 408091-4080b7 CreateFileW 1193->1194 1195 40807c-408085 CloseHandle 1193->1195 1198 408123-40813c 1194->1198 1199 4080b9-4080eb call 404e60 call 407e60 1194->1199 1196 40808b 1195->1196 1197 40813f-408152 1195->1197 1196->1194 1204 408112-408120 call 420dfe 1199->1204 1205 4080ed-4080f7 1199->1205 1204->1198 1205->1204 1206 4080f9-408110 CreateFileW 1205->1206 1206->1204
                              APIs
                              • CloseHandle.KERNEL32(?,35A089A6,00000000,?,80000000,00000001,00000000), ref: 0040807D
                              • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,00000080,00000000,35A089A6,00000000,?,80000000,00000001,00000000), ref: 004080B0
                              • CreateFileW.KERNEL32(?,?,?,00000000,00000003,00000080,00000000), ref: 0040810E
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CreateFile$CloseHandle
                              • String ID:
                              • API String ID: 1443461169-0
                              • Opcode ID: 4b125d2712671a8b9b856184b240ac5c30ea288019e4421a8eb221e93ca9e89b
                              • Instruction ID: eaacea67b0cf3e73bad7505eea8c61148c2237cac8ae426234bba4b99fc82f96
                              • Opcode Fuzzy Hash: 4b125d2712671a8b9b856184b240ac5c30ea288019e4421a8eb221e93ca9e89b
                              • Instruction Fuzzy Hash: 44316E716083119BD210DF24CC45B5BBBE8EB84774F104B2DF5A4A72D0D734A905CB96
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1230 41c100-41c154 EnterCriticalSection 1231 41c1a6-41c1bf LeaveCriticalSection 1230->1231 1232 41c156-41c19f call 41b600 call 429f50 * 2 1230->1232 1240 41c1a2 1232->1240 1240->1231
                              APIs
                              • EnterCriticalSection.KERNEL32(?,35A089A6,?,?,?,?,?,0042BEA8,000000FF,0041C57E,?,?), ref: 0041C12C
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,0042BEA8,000000FF,0041C57E,?,?), ref: 0041C1A7
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: PTn
                              • API String ID: 3168844106-3877643181
                              • Opcode ID: 9cbe4fff46b69963bc134ad39493b898461fb08ad28b906b1cb4e27107f027dc
                              • Instruction ID: 256898e5de4089b529f01b85fbd61eb56f82475c3371ccf47f2285002a5edf27
                              • Opcode Fuzzy Hash: 9cbe4fff46b69963bc134ad39493b898461fb08ad28b906b1cb4e27107f027dc
                              • Instruction Fuzzy Hash: 582125B6204B009FC364DF19DA80A6BB3F9FB8C710B514A1EF55A93B10C734B805CB65
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?,35A089A6,?,?,?,?,?,0042BEA8,000000FF,0041C5BF,?,?), ref: 0041C1FC
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,?,0042BEA8,000000FF,0041C5BF,?,?), ref: 0041C279
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: PTn
                              • API String ID: 3168844106-3877643181
                              • Opcode ID: 8965e7820ab05e143a14055c6ca1c15ace38de8a3e8155362b1ceca85fd9a237
                              • Instruction ID: de78da07c04899c8c77929c97aee399886044714f0d20352497b2a5157ff95ff
                              • Opcode Fuzzy Hash: 8965e7820ab05e143a14055c6ca1c15ace38de8a3e8155362b1ceca85fd9a237
                              • Instruction Fuzzy Hash: 8F2105BA200B009FD350DF59DAC0A6BB3F9FB88710F544A1DF65A93B50C774B8068BA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateDirectoryW.KERNELBASE(?,00000000,35A089A6,?,?,00000000,35A089A6,?,?,?), ref: 00406965
                              • GetLastError.KERNEL32(?,?), ref: 0040696F
                              • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000004,?,?), ref: 004069B5
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CreateDirectory$ErrorLast
                              • String ID:
                              • API String ID: 2485089472-0
                              • Opcode ID: 09fedd525c91c46e77d549ea5cb71cab928228c9b59ed4ab44ca6ba5e70dc188
                              • Instruction ID: 07c36081a8cf2dc79f657bfda38f72f695a10e805b8cff717bcdba199a8b3ed4
                              • Opcode Fuzzy Hash: 09fedd525c91c46e77d549ea5cb71cab928228c9b59ed4ab44ca6ba5e70dc188
                              • Instruction Fuzzy Hash: D611F3B25083149FC210EF259C81A1BB7D8FB85764F410A3EF595A73C1C739E905CBAA
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetFilePointer.KERNELBASE(?,?,?,?), ref: 004138CC
                              • GetLastError.KERNEL32 ref: 004138E1
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ErrorFileLastPointer
                              • String ID:
                              • API String ID: 2976181284-0
                              • Opcode ID: 6c661a8d229cc777c08ed75c1f6bd61d8eaa686054be378eced9a4eb92950332
                              • Instruction ID: d5bed59300834c27db51d3e3e8804af017eb22c56735c72e24745968a0aac8e0
                              • Opcode Fuzzy Hash: 6c661a8d229cc777c08ed75c1f6bd61d8eaa686054be378eced9a4eb92950332
                              • Instruction Fuzzy Hash: CE11E1B661120A8B8310DF2DE8409EB77D8AB85321F10822BFD18C7310D236D95A97F9
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00423265: TlsGetValue.KERNEL32(?,0042102E), ref: 0042326E
                                • Part of subcall function 00423265: TlsSetValue.KERNEL32(00000000,0042102E), ref: 0042328F
                                • Part of subcall function 00423245: TlsGetValue.KERNEL32(?,?,00421039,00000000), ref: 00423253
                              • GetLastError.KERNEL32(00000000,?,00000000), ref: 00421050
                              • ExitThread.KERNEL32 ref: 00421057
                              • GetCurrentThreadId.KERNEL32 ref: 0042105D
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: Value$Thread$CurrentErrorExitLast
                              • String ID:
                              • API String ID: 1890717252-0
                              • Opcode ID: c00acaf4266d19e5d9d4bfebc160deac36d2b180b2bae20bb46cd11b0c97e720
                              • Instruction ID: ac458970b274fa377b2d346be178e4a5aabec80b7a813b2af96a27a2eaab62bb
                              • Opcode Fuzzy Hash: c00acaf4266d19e5d9d4bfebc160deac36d2b180b2bae20bb46cd11b0c97e720
                              • Instruction Fuzzy Hash: 4101AC70700260EBC714BF62F90990E37B8AF553497A040ABF50587222DB3CD943CA6D
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?,35A089A6,?,?,?,?,?,0042BEA8,000000FF), ref: 004148EE
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,0042BEA8,000000FF), ref: 0041491B
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,0042BEA8,000000FF), ref: 00414954
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$Enter
                              • String ID:
                              • API String ID: 2978645861-0
                              • Opcode ID: 8e528e502c537d0b69e499d11ca13bb5c5ec1de1f9027612ed72021158fe6829
                              • Instruction ID: 625b76eddf601073e9c329e31110d9aa6d4444885a5d27fa199e2bc448fd388d
                              • Opcode Fuzzy Hash: 8e528e502c537d0b69e499d11ca13bb5c5ec1de1f9027612ed72021158fe6829
                              • Instruction Fuzzy Hash: CB1117B6208650AFD300CF59D980F6BB7E8FBC8B20F60452EF615D3350D775A9068BA6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetTempFileNameW.KERNELBASE(00000000,mia,00000000,?,00000000,35A089A6,00407773,35A089A6,00000004,35A089A6,00000000,?,?,00000000,?), ref: 0040766E
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: FileNameTemp
                              • String ID: mia
                              • API String ID: 745986568-834928705
                              • Opcode ID: 91ff85b098e991700fcb46d4f0a7d15549d180b965abfbab977b0fb5837ae3f1
                              • Instruction ID: fab8d13fb08992a67c48349e1e354a0264bd0400b9f99db237117d7352dc61b1
                              • Opcode Fuzzy Hash: 91ff85b098e991700fcb46d4f0a7d15549d180b965abfbab977b0fb5837ae3f1
                              • Instruction Fuzzy Hash: 2AF08971A04A115BE760DB2DC801757B3E5EF94710F258C3BE181E32D0E7F8A8D58B59
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SysAllocString.OLEAUT32(?), ref: 00408406
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: AllocString
                              • String ID: out of memory
                              • API String ID: 2525500382-2599737071
                              • Opcode ID: 13725d636b88ff8fd5f4f3596f44767d9b62ef17f027a52fb81a274580c37290
                              • Instruction ID: aec7c54f5a2f0369ed48fcd6afc8c6432b74e5c3ee15c3e0c9f0bed6091b2591
                              • Opcode Fuzzy Hash: 13725d636b88ff8fd5f4f3596f44767d9b62ef17f027a52fb81a274580c37290
                              • Instruction Fuzzy Hash: 44F03074314B4256D7149F2A9A10617F2E4EF98744F60C43EE8C9C3691FF38D841831E
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00420DFE: RtlFreeHeap.NTDLL(00000000,?,00433738,0000000C,00423444,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C), ref: 00420E66
                                • Part of subcall function 00420DFE: GetLastError.KERNEL32(?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38,?,?,?,004234FE,0000000D), ref: 00420E77
                                • Part of subcall function 00407D60: FindNextFileW.KERNELBASE(35A089A6,?,?,00000000), ref: 00407D8D
                              • FindClose.KERNELBASE(?), ref: 004070A7
                              • FindClose.KERNEL32(?), ref: 00407130
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: Find$Close$ErrorFileFreeHeapLastNext
                              • String ID:
                              • API String ID: 75599382-0
                              • Opcode ID: 146458d03b0ddfb7acac76936b528f83ff8088b17ca806f1c30c1053e68c23bb
                              • Instruction ID: cc9cac371736834354910bd5cd1b867e14824cd5f17210572d58679627a67666
                              • Opcode Fuzzy Hash: 146458d03b0ddfb7acac76936b528f83ff8088b17ca806f1c30c1053e68c23bb
                              • Instruction Fuzzy Hash: F151A2B15083809BC320DF39D881B5BB7E4BF84314F508A2EF5D997391DA39E8498B57
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStartupInfoA.KERNEL32(?), ref: 00421A6D
                              • GetCommandLineA.KERNEL32 ref: 00421B02
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CommandInfoLineStartup
                              • String ID:
                              • API String ID: 582193876-0
                              • Opcode ID: 38a39aeb73bf2e7173b6e4f070e5c862512578e1b3fdaa91549fd01fb2ab9960
                              • Instruction ID: 935b6921e9bc571738380e2031d860571ab393784bdb0857821c0bed948142ed
                              • Opcode Fuzzy Hash: 38a39aeb73bf2e7173b6e4f070e5c862512578e1b3fdaa91549fd01fb2ab9960
                              • Instruction Fuzzy Hash: 9331B470B01334A9DB10BBB2BD46B6E6674AF20719F90456FF401AA1E1EEBC8D41875C
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetFileAttributesW.KERNELBASE(?,00000000,35A089A6,?,?,00000000,0042B6B8,000000FF,004070B9), ref: 004067B0
                              • SetFileAttributesW.KERNEL32(35A089A6,00000000), ref: 0040680B
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: 5b3868d93b943efae48f880093a7dcf00f7b0866e36bf908cbcae1e608109585
                              • Instruction ID: 3abfe7707c06ebe879871dbe4fe9751a5188b692b2e6d43a4f0365353a145ddf
                              • Opcode Fuzzy Hash: 5b3868d93b943efae48f880093a7dcf00f7b0866e36bf908cbcae1e608109585
                              • Instruction Fuzzy Hash: C62128B25083118FD310EF24AC01B5BB7D4EB85720F440A2FF955933C0D739A909CBAA
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041DB58
                              • PostMessageW.USER32(00000001,00008000,00000000,00000000), ref: 0041DB6E
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: MessageObjectPostSingleWait
                              • String ID:
                              • API String ID: 1869837590-0
                              • Opcode ID: 627ec1fdba6808bbe801e4296038a541cf8789fabb4638545bf7f397b6626cea
                              • Instruction ID: f70689f1fa0990ff4c806b016051adae220c096d235ed575134d8d770105b2d3
                              • Opcode Fuzzy Hash: 627ec1fdba6808bbe801e4296038a541cf8789fabb4638545bf7f397b6626cea
                              • Instruction Fuzzy Hash: 2B2190B2A08748AFD720CF59D980B9AF7E8FB59324F10426EE55193780C735BD00CB94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateThread.KERNELBASE(?,?,00421023,00000000,?,?), ref: 00421127
                              • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 00421131
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CreateErrorLastThread
                              • String ID:
                              • API String ID: 1689873465-0
                              • Opcode ID: f836f3a5612b81b6d242fef6bf68f0a3a6f628dcc52a2b413912adf7304544da
                              • Instruction ID: e962943f56dbf5af09c7da81f0f6a5c3264a404381241de3fbf0b3df6231d336
                              • Opcode Fuzzy Hash: f836f3a5612b81b6d242fef6bf68f0a3a6f628dcc52a2b413912adf7304544da
                              • Instruction Fuzzy Hash: BA11E672700225EFDB10BFA5FC428AF77A5EF14328B90403FF20597161DB799A518668
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00406780: SetFileAttributesW.KERNELBASE(?,00000000,35A089A6,?,?,00000000,0042B6B8,000000FF,004070B9), ref: 004067B0
                              • DeleteFileW.KERNELBASE(?,35A089A6,?,?,?,00000000,35A089A6,?,00000000), ref: 00406E1F
                              • DeleteFileW.KERNEL32(?,?,?,00000004,?,?,00000000,35A089A6,?,00000000), ref: 00406E63
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: File$Delete$Attributes
                              • String ID:
                              • API String ID: 890995776-0
                              • Opcode ID: a4c654311a422871e41f01ebf7195a200fc4afce3709328d9ae48f9f955de1fa
                              • Instruction ID: da23887d15a8d6a19aae8d093848008d0c976a6323084b2f47239b9cdeb27970
                              • Opcode Fuzzy Hash: a4c654311a422871e41f01ebf7195a200fc4afce3709328d9ae48f9f955de1fa
                              • Instruction Fuzzy Hash: 9411D1B25083449BC200EF25DC41A5BB7D8FF85364F410A3EF596673C1D739A80A8BAA
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RemoveDirectoryW.KERNELBASE(?,35A089A6,00000000,?,?,00000000,000000FF,004070C5,00000000), ref: 004068A2
                              • RemoveDirectoryW.KERNELBASE(?,?,?,00000004,?,00000000,000000FF,004070C5,00000000), ref: 004068E6
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: DirectoryRemove
                              • String ID:
                              • API String ID: 597925465-0
                              • Opcode ID: 621f523769aaef9b58c8a91ef20634b5231e089e51fc69d7aa2af418621f3536
                              • Instruction ID: 6976d5837b81d7e19e2d9c0b6484c5b3c993c74492be7e520881c874ba3be3b1
                              • Opcode Fuzzy Hash: 621f523769aaef9b58c8a91ef20634b5231e089e51fc69d7aa2af418621f3536
                              • Instruction Fuzzy Hash: C21103B25083049FD200EF259C81A5BB7D8FB85764F540A3EF595673C1C339A91ACBAA
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RtlFreeHeap.NTDLL(00000000,?,00433738,0000000C,00423444,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C), ref: 00420E66
                              • GetLastError.KERNEL32(?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38,?,?,?,004234FE,0000000D), ref: 00420E77
                                • Part of subcall function 00421F1D: EnterCriticalSection.KERNEL32(?,?,?,004234FE,0000000D,00433868,00000008,00421082,?,00000000), ref: 00421F47
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CriticalEnterErrorFreeHeapLastSection
                              • String ID:
                              • API String ID: 2972400715-0
                              • Opcode ID: 7e3986139b8b67c31b0f88678f7bfd5cf2d99dd6cd2fd27712303bc26acdf7ba
                              • Instruction ID: 4a3575ee672623f86528ee1a37db317970acd7e0053c85b255a08892b49a06f0
                              • Opcode Fuzzy Hash: 7e3986139b8b67c31b0f88678f7bfd5cf2d99dd6cd2fd27712303bc26acdf7ba
                              • Instruction Fuzzy Hash: E9018471B04331AADB306FB2BD06B5F7AA09F107A5F91091BF114661E2CB7C8981CA9C
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • WriteFile.KERNELBASE(?,?,?,?,?,?,?,?,00000000), ref: 004139EE
                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,00000000), ref: 00413A18
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ErrorFileLastWrite
                              • String ID:
                              • API String ID: 442123175-0
                              • Opcode ID: a78a2efdd5613b01d2b79f02f39425878d4e99252d466dafbcb7c97e419e4ac0
                              • Instruction ID: e1ab2209f1384d4f2fa4e66112dcc239a9f12346fb3dde1c493d98484847d039
                              • Opcode Fuzzy Hash: a78a2efdd5613b01d2b79f02f39425878d4e99252d466dafbcb7c97e419e4ac0
                              • Instruction Fuzzy Hash: AC016D752043029FD320CF18D840BA777E8AF84741F40892EE485D7290D3B8DD858BAA
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ReadFile.KERNELBASE(?,?,?,?,?,?,?,?,00000000), ref: 0041384D
                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 0041386F
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ErrorFileLastRead
                              • String ID:
                              • API String ID: 1948546556-0
                              • Opcode ID: 6407f021dffc35e2c3c1c4773c865c1866bb2cf9022ef79f00685affb8ef31de
                              • Instruction ID: f641d7c6c31ab4fa61280dfe541440687991b8de954b03818c422660b77a6340
                              • Opcode Fuzzy Hash: 6407f021dffc35e2c3c1c4773c865c1866bb2cf9022ef79f00685affb8ef31de
                              • Instruction Fuzzy Hash: 22F044B56142029BE314DF18C844B6B73E4BB84706F50C92EF889CB290D778DA46DB69
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • KillTimer.USER32(?,?), ref: 0041BBF8
                              • KiUserCallbackDispatcher.NTDLL(?,00000000), ref: 0041BC2C
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CallbackDispatcherKillTimerUser
                              • String ID:
                              • API String ID: 45433635-0
                              • Opcode ID: d033354e10069cd3944b8f72e8f620b563b4be52a86df29c28ef20a6ecc5271c
                              • Instruction ID: 3a79594e2e4ba89a1939e98a1d4e93963408e146f71aaaaec97657f73b39a7ed
                              • Opcode Fuzzy Hash: d033354e10069cd3944b8f72e8f620b563b4be52a86df29c28ef20a6ecc5271c
                              • Instruction Fuzzy Hash: 46F09A762047009BD324EB19D844FABF7E9EBE4714F00481EF48647280C7B4EC82CBA8
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetDlgItem.USER32(?,000003E8), ref: 0041BDAC
                              • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 0041BDC2
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ItemMessageSend
                              • String ID:
                              • API String ID: 3015471070-0
                              • Opcode ID: 2441c42c4b6f22e1cf8c1fee51e8d6bf5436049b2f025d8a7968970b928ded5b
                              • Instruction ID: 60cb442689e21d02718789498e37ea817ec3b23390f51a8d278c0a99377a07cd
                              • Opcode Fuzzy Hash: 2441c42c4b6f22e1cf8c1fee51e8d6bf5436049b2f025d8a7968970b928ded5b
                              • Instruction Fuzzy Hash: 02D0A771780310A7DA344B64FC4AF8273DCAB0CB01F004A5AF24BDB1C0CAB0A4418B18
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • VirtualFree.KERNEL32(?,00000000,00008000,?,00415791,35A089A6), ref: 00414769
                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,?,00415791,35A089A6), ref: 00414797
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: Virtual$AllocFree
                              • String ID:
                              • API String ID: 2087232378-0
                              • Opcode ID: 0e4be479701c683b50c260801d2e880a7be25350149d4d5141acb3b6feb9e411
                              • Instruction ID: 542480b1d8eb3a287b7ca1102c7a40aaead071fd07a36395327ad36d3e90ae7b
                              • Opcode Fuzzy Hash: 0e4be479701c683b50c260801d2e880a7be25350149d4d5141acb3b6feb9e411
                              • Instruction Fuzzy Hash: 4CF0F631A4072267EB605F26EC857D6A7986B42760F118436F474DB2C0C774D8D28BD4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • VirtualFree.KERNEL32(?,00000000,00008000,?,004157F8,35A089A6), ref: 004149F8
                              • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,?,004157F8,35A089A6), ref: 00414A24
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: Virtual$AllocFree
                              • String ID:
                              • API String ID: 2087232378-0
                              • Opcode ID: b942ac331d50b9ed078247248d033226dec88fd113c0506c2f77df4ba4ab23b1
                              • Instruction ID: 5a3fa2ac8ef23217d4891ebed1f32e095f862d02ae69871e60c5b41101f2b08d
                              • Opcode Fuzzy Hash: b942ac331d50b9ed078247248d033226dec88fd113c0506c2f77df4ba4ab23b1
                              • Instruction Fuzzy Hash: 59F090B17513235BEB604F39AC057D767D86B45BA0F110136F891DB2C0D77498D28BA8
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FindNextFileW.KERNELBASE(35A089A6,?,?,00000000), ref: 00407D8D
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: FileFindNext
                              • String ID:
                              • API String ID: 2029273394-0
                              • Opcode ID: d6102d2f79556fb804bc3cdef158af67678b0c0b9c80ec8252fa7e3b88ae394d
                              • Instruction ID: db1d632e28ba83ce996c61ce977e882cbc98f0db580175ffcd9fbd943c47ada1
                              • Opcode Fuzzy Hash: d6102d2f79556fb804bc3cdef158af67678b0c0b9c80ec8252fa7e3b88ae394d
                              • Instruction Fuzzy Hash: A4216D706097409FC724DF25D881A6BB7E0BF88304F40896EE59997381D739F90ACB9A
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38), ref: 00420F52
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: 75ac3337fd4c4b1908931c5cf1c689c8d1c8be91d30c6be0be3fb32ad1f7f2dc
                              • Instruction ID: 26bac391057fe65c1740df9e2c232788cbe269b23501fca5ae5d16265334a20b
                              • Opcode Fuzzy Hash: 75ac3337fd4c4b1908931c5cf1c689c8d1c8be91d30c6be0be3fb32ad1f7f2dc
                              • Instruction Fuzzy Hash: D711A5327852356AD6316A25BE0166B72D89F11365FD21137F810AA2E3DBEC9C81829D
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0041BADF
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 9ff0bd8df8b3e03792c25fa20b94eef2b4d4b427d93619a6059a71ce3b869d11
                              • Instruction ID: 3e7fcfab807292a2e376bda8b89e87e695560b0a2a75ea0193b5ac30183f4faa
                              • Opcode Fuzzy Hash: 9ff0bd8df8b3e03792c25fa20b94eef2b4d4b427d93619a6059a71ce3b869d11
                              • Instruction Fuzzy Hash: 8E017C71704726ABCB14AE65C9C0A9EF795FF84790B44852AE20587A40C77AF890C7EC
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ReadFile.KERNELBASE(?,?,?,?,00000000,00000000,?,00000000,0041EC6D,?,00001000,?,80000000,00000001,35A089A6,?), ref: 004081FC
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: 7172b6f68366401be356630bd6221e0c059fe72a1489c2c52d4b235dd23c16c7
                              • Instruction ID: 344882e4de680020cf4ff848e1b13181e4dbf44253f8dd695d1efe681d569fc8
                              • Opcode Fuzzy Hash: 7172b6f68366401be356630bd6221e0c059fe72a1489c2c52d4b235dd23c16c7
                              • Instruction Fuzzy Hash: 6FF090722443065BCB54DE89E980B2BF3E8ABE8310F14443FF184DB280DB75A84AC739
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetShortPathNameW.KERNELBASE(?,?,00000105), ref: 004071DC
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: NamePathShort
                              • String ID:
                              • API String ID: 1295925010-0
                              • Opcode ID: a34fcc026e5eddb0abd216ec2ac06cbd66b9c2a377ebd18c04affc28681fd9f6
                              • Instruction ID: bb03d8354c47a3f1518cb96bd69e0356edef982ec88e3c7f4cbd0e2162754a91
                              • Opcode Fuzzy Hash: a34fcc026e5eddb0abd216ec2ac06cbd66b9c2a377ebd18c04affc28681fd9f6
                              • Instruction Fuzzy Hash: 70F09071A146104AE324CB6CD805957B3E6EF98710F24843EE086EB3C1F6B4A8D28755
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,?,00000004,00407731,00000004,35A089A6,00000000,?,?,00000000,?,?,00000000), ref: 00407609
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: FolderPath
                              • String ID:
                              • API String ID: 1514166925-0
                              • Opcode ID: ce42f76a6e4a08daa65f762c9b60fd1b6d081efab45241d6b49ae351743e7067
                              • Instruction ID: 68fae374c04cf999103e7eb2464c69c75c241746d07472e689ce900bf412340b
                              • Opcode Fuzzy Hash: ce42f76a6e4a08daa65f762c9b60fd1b6d081efab45241d6b49ae351743e7067
                              • Instruction Fuzzy Hash: 84F082306046105BE7749F28EC42BA733E1EB48710F24487AE586DB2D0D6F468C28759
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00407AC0: FindClose.KERNEL32(?,35A089A6,?,?), ref: 00407B10
                                • Part of subcall function 00407AC0: FindFirstFileW.KERNELBASE(?,?,35A089A6,?,?), ref: 00407B2A
                                • Part of subcall function 00407AC0: FindFirstFileW.KERNELBASE(?,?), ref: 00407B7E
                              • FindClose.KERNEL32(FFFFFFFF,?,35A089A6,00000000,?,?,0042CDA8,000000FF,004185F5,?), ref: 00407C2E
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID:
                              • API String ID: 2295610775-0
                              • Opcode ID: 6c08d5d5c73984ff19fc94b1beb69e089bece98d3ab973c1c2cb81dc39aa8a1f
                              • Instruction ID: 82d1cd481473c7c660dfbb2f871a6913d5477604bf1c6d76b04acfc675b75649
                              • Opcode Fuzzy Hash: 6c08d5d5c73984ff19fc94b1beb69e089bece98d3ab973c1c2cb81dc39aa8a1f
                              • Instruction Fuzzy Hash: 49F012B5648640AFD314CF14C885B5BB7E4EB55730F508B2EF865837D0D738A5058A55
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 00421D86
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CreateHeap
                              • String ID:
                              • API String ID: 10892065-0
                              • Opcode ID: 0cda041672ff756b0c41609eb62c40a4d8100e3eb3300feebbfe4dd53f538022
                              • Instruction ID: 474048e3887c1b198e73afb4c75b232851880925ce40373f535b8a9ed00aa635
                              • Opcode Fuzzy Hash: 0cda041672ff756b0c41609eb62c40a4d8100e3eb3300feebbfe4dd53f538022
                              • Instruction Fuzzy Hash: 92D05E32A60345AEDB105F71BC087727BDC9384395F444436B91DC61D0E674D9518608
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ExitThread
                              • String ID:
                              • API String ID: 2158977761-0
                              • Opcode ID: 80a01ca7609d5c989842f362529a1f62e76a78053e1eadb625ad7ffcc62f00cd
                              • Instruction ID: e4d375fbbcc4364e754cd5714ee3cf852806fdbcd81a02de693fee1c1a3a24a8
                              • Opcode Fuzzy Hash: 80a01ca7609d5c989842f362529a1f62e76a78053e1eadb625ad7ffcc62f00cd
                              • Instruction Fuzzy Hash: 6CD0C2307412A05ADB203B22FE0E61736A84F04306FD11036F401C45E2CEBCC941C91C
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00422C55: GetModuleHandleW.KERNEL32(mscoree.dll,?,00422C8D,?,?,00420F14,000000FF,0000001E,?,00423A5F,?,00000001,?,?,00421EA7,00000018), ref: 00422C5F
                                • Part of subcall function 00422C55: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00422C6F
                              • ExitProcess.KERNEL32 ref: 00422C91
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: AddressExitHandleModuleProcProcess
                              • String ID:
                              • API String ID: 75539706-0
                              • Opcode ID: fc79cb4a7c75e363490d362e0a29c1fa0792ec12669b4d022235d3ed5050525d
                              • Instruction ID: e8b23ca0be1445246cfa665b12da37794814825febd1767cce8e84558c35c2c0
                              • Opcode Fuzzy Hash: fc79cb4a7c75e363490d362e0a29c1fa0792ec12669b4d022235d3ed5050525d
                              • Instruction Fuzzy Hash: 69B04831100108BBAB112B13ED0A8693E2AEA802A0B904025B809091219AB2A9A3AA88
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • VirtualFree.KERNELBASE(?,00000000,00008000,35A089A6,?,?,0042B74B,000000FF), ref: 0041534C
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: FreeVirtual
                              • String ID:
                              • API String ID: 1263568516-0
                              • Opcode ID: 64b23c1747a59f00b3a7cb71c49a0bb61e7895e5ecc26e207c38e6798bb42fa8
                              • Instruction ID: 45228e7dd2016b5ef2fd0bc3b159d9bd00e66ae215068ebcedc432afdcfb51ae
                              • Opcode Fuzzy Hash: 64b23c1747a59f00b3a7cb71c49a0bb61e7895e5ecc26e207c38e6798bb42fa8
                              • Instruction Fuzzy Hash: 13F0F675604B419BD320CF15C840B57B7E8FB88760F148A29E5A6877E0D779E844CA95
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • VirtualFree.KERNELBASE(?,00000000,00008000,35A089A6,?,?,0042B71B,000000FF), ref: 004153CB
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: FreeVirtual
                              • String ID:
                              • API String ID: 1263568516-0
                              • Opcode ID: 9e23df7032f1c1c763019a4865475cb3fd46ef146c702e0662e34135316dac18
                              • Instruction ID: 20b1c5693166b8bca95178b271d56a26094c7afef8293269c8dfa1a5887baf42
                              • Opcode Fuzzy Hash: 9e23df7032f1c1c763019a4865475cb3fd46ef146c702e0662e34135316dac18
                              • Instruction Fuzzy Hash: 58F01975604B419FD320CF18D840B57B7E8FB88B60F104A29E9A5877D0D779E844CB95
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ErrorLast
                              • String ID:
                              • API String ID: 1452528299-0
                              • Opcode ID: 91e7c122242a59b9ccdf0bc7cab8ba7e8ce12b952b763bfd60d325ca9c1f4047
                              • Instruction ID: 0420e787cb9a86eed4a7b4d6ef3617ecd3e0c8e4f838007923f70c7bb3aee507
                              • Opcode Fuzzy Hash: 91e7c122242a59b9ccdf0bc7cab8ba7e8ce12b952b763bfd60d325ca9c1f4047
                              • Instruction Fuzzy Hash: FBE0C2B13142016BF3259B748C46FA7339C9B90704F20403FB106CE2C0EBA5D950823D
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • DeleteCriticalSection.KERNEL32(?,0042FFD8), ref: 00409192
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CriticalDeleteSection
                              • String ID: @KA$@KA
                              • API String ID: 166494926-2499244848
                              • Opcode ID: 2173faeb293dca02ee19f3e9e51af43ddb57dbe41030808bd3abe99407723cfe
                              • Instruction ID: 101a39299099d8b7fbc73b7120cb9860c9e9d9b4841921f6e0cd10bc3771a624
                              • Opcode Fuzzy Hash: 2173faeb293dca02ee19f3e9e51af43ddb57dbe41030808bd3abe99407723cfe
                              • Instruction Fuzzy Hash: B0C25A716083818FC320DF69C480B9BBBE4BFC9304F14896EE58997392DB75A945CB96
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryA.KERNEL32(USER32.DLL,00439760,00000000,00000314,?,004230A3,00439760,Microsoft Visual C++ Runtime Library), ref: 00425589
                              • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 004255A5
                                • Part of subcall function 0042314F: TlsGetValue.KERNEL32(00000000,?,004231C8,00000000,00425571,00439760,00000000,00000314,?,004230A3,00439760,Microsoft Visual C++ Runtime Library,00012010), ref: 00423161
                                • Part of subcall function 0042314F: TlsGetValue.KERNEL32(00000005,?,004231C8,00000000,00425571,00439760,00000000,00000314,?,004230A3,00439760,Microsoft Visual C++ Runtime Library,00012010), ref: 00423178
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 004255C2
                                • Part of subcall function 0042314F: GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004231C8,00000000,00425571,00439760,00000000,00000314,?,004230A3,00439760,Microsoft Visual C++ Runtime Library,00012010), ref: 0042318E
                                • Part of subcall function 0042314F: GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 004231A9
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 004255D7
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 004255EC
                              • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 00425604
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: AddressProc$Value$HandleLibraryLoadModule
                              • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                              • API String ID: 2739679353-232180764
                              • Opcode ID: eda493182502602d78804c1dcaf6d901c150ed2079cc82df330cf64e554991c4
                              • Instruction ID: ea4f8d63e2448dcebdce051990e56d3433885cbb053dcb12d77742c4b55e84ad
                              • Opcode Fuzzy Hash: eda493182502602d78804c1dcaf6d901c150ed2079cc82df330cf64e554991c4
                              • Instruction Fuzzy Hash: A5419871F04722AADB10AFB5BC05A7B7AB8AF40751BD8042BE408D6291DBBCDD508A5D
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • IsDebuggerPresent.KERNEL32(?,?,00000314), ref: 00423C18
                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,00000314), ref: 00423C22
                              • UnhandledExceptionFilter.KERNEL32(?,?,?,00000314), ref: 00423C2F
                              • GetCurrentProcess.KERNEL32(C0000417,?,?,00000314), ref: 00423C4A
                              • TerminateProcess.KERNEL32(00000000,?,?,00000314), ref: 00423C51
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                              • String ID:
                              • API String ID: 2579439406-0
                              • Opcode ID: 28abf845cb6c40201863f7eb85ba11f7b915c65e1d0012d16df31474ab224b33
                              • Instruction ID: d83251fa16af329b4315153c2e38519d9b9d51a5e64fd7ff99532e3034369041
                              • Opcode Fuzzy Hash: 28abf845cb6c40201863f7eb85ba11f7b915c65e1d0012d16df31474ab224b33
                              • Instruction Fuzzy Hash: 4231E8B1E113289BDB60DF65DD897D8BBB8AF18304F5040EAE50DA6250EB785F818F08
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • IsDebuggerPresent.KERNEL32 ref: 00421C9B
                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421CB0
                              • UnhandledExceptionFilter.KERNEL32(0042E368), ref: 00421CBB
                              • GetCurrentProcess.KERNEL32(C0000409), ref: 00421CD7
                              • TerminateProcess.KERNEL32(00000000), ref: 00421CDE
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                              • String ID:
                              • API String ID: 2579439406-0
                              • Opcode ID: 6dce4c989cf31f9a2636c4ce92163af802b09ed08417ef6bccfbb8f4d1c3d290
                              • Instruction ID: e4562c502b537d5cccca84f566efa76d5afb76e5238d3ce5c2676c7199ec694f
                              • Opcode Fuzzy Hash: 6dce4c989cf31f9a2636c4ce92163af802b09ed08417ef6bccfbb8f4d1c3d290
                              • Instruction Fuzzy Hash: 9C21BAB9A04200AFDB10DF6AF8496953BF0BB0C710F80607AEA09873A1E7B45D91CF0D
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 004250F3
                              • GetCurrentProcessId.KERNEL32 ref: 004250FF
                              • GetCurrentThreadId.KERNEL32 ref: 00425107
                              • GetTickCount.KERNEL32 ref: 0042510F
                              • QueryPerformanceCounter.KERNEL32(?), ref: 0042511B
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                              • String ID:
                              • API String ID: 1445889803-0
                              • Opcode ID: 35849d5ae6893442137a7b63ded673c0d501242e2656aa3c6f61a9e853f2a60e
                              • Instruction ID: 5884621900dd183efe006d37875236d81a61058141d2cd9c3fa534dfe45ae878
                              • Opcode Fuzzy Hash: 35849d5ae6893442137a7b63ded673c0d501242e2656aa3c6f61a9e853f2a60e
                              • Instruction Fuzzy Hash: 9611A972E002389FDB209BB5EC4866AB7F4EF4C351FD20571D541E7210DA749D01C798
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 0042A355: RaiseException.KERNEL32(?,?,?,00404E9C,?,?,?,?,?,00404E9C,?,00433BD0), ref: 0042A397
                              • SetEvent.KERNEL32(?,00000000,?,?,?,?,?,?,?,00433B9C), ref: 00412CDB
                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,00433B9C), ref: 00412CE1
                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,00433B9C), ref: 00412D24
                                • Part of subcall function 00415180: CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,00412CA3,?,?,?,?,?,?,?,00433B9C), ref: 00415195
                                • Part of subcall function 00415180: GetLastError.KERNEL32(?,?,?,?,?,?,?,00433B9C), ref: 0041519E
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ErrorEventLast$CreateExceptionObjectRaiseSingleWait
                              • String ID:
                              • API String ID: 1996610700-0
                              • Opcode ID: 4d39b91e3f8c64d9e1cd22e97cb076a47efb473c21de60c66e173e9c86d92202
                              • Instruction ID: 0a967a9db4ba4e0fb76a007f6e616d88927016828e0849af8afb68f1a4c9ab52
                              • Opcode Fuzzy Hash: 4d39b91e3f8c64d9e1cd22e97cb076a47efb473c21de60c66e173e9c86d92202
                              • Instruction Fuzzy Hash: B8028F746047029FC764DF28C580AAAB3E1FF88304F248A1EE595C7351D774F8A6CB99
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004241E0
                              • UnhandledExceptionFilter.KERNEL32(?), ref: 004241ED
                                • Part of subcall function 00422F34: GetModuleFileNameA.KERNEL32(00000000,00439779,00000104), ref: 00422FD7
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled$FileModuleName
                              • String ID:
                              • API String ID: 787209826-0
                              • Opcode ID: 25cc7d49b9454689ddfc9af2ac2f9835beff2613ad77b6a286ddb831ceea68db
                              • Instruction ID: e82509b2808dd087b6cc8addbea33cb8face3e593dbea50d11c58a0f20d52b25
                              • Opcode Fuzzy Hash: 25cc7d49b9454689ddfc9af2ac2f9835beff2613ad77b6a286ddb831ceea68db
                              • Instruction Fuzzy Hash: E52126B0D0132D9ACB21DF65AC897C9BBB4BF18304F5000EAA50CA6251DBB84FC0CF48
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b24e76e97f088ff2340df07ce6d8eaf1190ca0a9df6fc331afb225c23a03e0c0
                              • Instruction ID: 6ec0d9b20c51930400a28b2cf4c630a1cacc779d3f08c7b5f658bb3cc2d65df3
                              • Opcode Fuzzy Hash: b24e76e97f088ff2340df07ce6d8eaf1190ca0a9df6fc331afb225c23a03e0c0
                              • Instruction Fuzzy Hash: 74511A31B106204AF30CCF769C842A67BD3DBC9386B44D63DE295DA6D8DABDC017C698
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2c170e2161206dc0ced38249dd021522e111bee97a1422566ba6a8047c7c9086
                              • Instruction ID: 8fa4896d0c32512dfa3da576777b2c050686be6e2d8f2528dbc2fa637e1ff780
                              • Opcode Fuzzy Hash: 2c170e2161206dc0ced38249dd021522e111bee97a1422566ba6a8047c7c9086
                              • Instruction Fuzzy Hash: BB510731B106200AF308CF369C842A67BD3DBC9386B44D23DD695DA6E8DABDC017C698
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ExceptionRaise
                              • String ID:
                              • API String ID: 3997070919-3916222277
                              • Opcode ID: 48082f854bff1add32f48e4266824b0ab221c14decb41c0ecf9b5038d6d03464
                              • Instruction ID: 4905a2555361d4b40396e2ad8604d136661ad17ace758740d79296136a4cd9e7
                              • Opcode Fuzzy Hash: 48082f854bff1add32f48e4266824b0ab221c14decb41c0ecf9b5038d6d03464
                              • Instruction Fuzzy Hash: B5E191716043018FC714DF2AC48052BB7E5EF89328F548D3FE895A7391DA39E865CB8A
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetLocaleInfoA.KERNEL32(?,00001004,?,00000006,?,?,?,?,?,?,00000000), ref: 0042960E
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: InfoLocale
                              • String ID:
                              • API String ID: 2299586839-0
                              • Opcode ID: 54a90aea609222d28112c1eaa106de384f8d0ce6c8b0134624755defd90b07d8
                              • Instruction ID: 973265b16e2cb84984fe7449b7d49a156527acce62ffe282a182c70b07d50db1
                              • Opcode Fuzzy Hash: 54a90aea609222d28112c1eaa106de384f8d0ce6c8b0134624755defd90b07d8
                              • Instruction Fuzzy Hash: C0F06530B04218ABDB10DBB5E846B9E77F9AF48314F90416AF511D61C1DFB4DA04C61D
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(Function_00024903), ref: 0042494A
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 24524984a58f72cb7fe12606cdfcc85d318e1795a0ded427764ce3f430ceae39
                              • Instruction ID: 02c8abee07370e7cb003beee7d17bd52556d1210545f2270e595cfdec49312d0
                              • Opcode Fuzzy Hash: 24524984a58f72cb7fe12606cdfcc85d318e1795a0ded427764ce3f430ceae39
                              • Instruction Fuzzy Hash: F69002B03551154A662017716D4A71A29909AA86027D114716205C415CDAA44052551F
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 02f1eac608253b4fa400cd88ccec21fbfb64af6ca787b348a66882f4047c332a
                              • Instruction ID: 01a91eeea2aff737d0b365e6c57a033e2f99f4b8156a15c0193d14d1a608853e
                              • Opcode Fuzzy Hash: 02f1eac608253b4fa400cd88ccec21fbfb64af6ca787b348a66882f4047c332a
                              • Instruction Fuzzy Hash: 1D9228B1508381CFC734DF59C480A9BBBE1BF89304F14892EE59A97351D7B8A885CF96
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$AllocateHeap
                              • String ID:
                              • API String ID: 2584219951-0
                              • Opcode ID: 46391849c57e93a8729d2033434e9fb67e9fe17df0031d36261b6a635283fe9f
                              • Instruction ID: 94e795bf1a0c9910044c3c2dd5c4af4e6959a853943c1580eb38ed7d93358e0f
                              • Opcode Fuzzy Hash: 46391849c57e93a8729d2033434e9fb67e9fe17df0031d36261b6a635283fe9f
                              • Instruction Fuzzy Hash: FD222871608B908FC7219F39858466BBBD5EF95304F484A2EF8C5A7382D27CE905CF96
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 58cd1e4bd61910ee9209f8ab130cbb053367805de08f4fd01a039497d7822f7e
                              • Instruction ID: e349e95833274217d244d427187e591f8dca3494776eda759b979b6953068a50
                              • Opcode Fuzzy Hash: 58cd1e4bd61910ee9209f8ab130cbb053367805de08f4fd01a039497d7822f7e
                              • Instruction Fuzzy Hash: 0C223774504341DFC724DF15C480A6AB7E1FB88314F14897EE899AB792DB39EC4ACB86
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9803c8db8919b39b22e60e951130245479d9368fb12c4fe1c3f5fb4592283aad
                              • Instruction ID: c2d97246fd2aafeb022947b6bb86a1446f9da4e42c3c7867536164bb694cac53
                              • Opcode Fuzzy Hash: 9803c8db8919b39b22e60e951130245479d9368fb12c4fe1c3f5fb4592283aad
                              • Instruction Fuzzy Hash: 80024C72A042114BD708CE18C580279BFE6FBC5346F114A3FE496A77C4D778DA88CB99
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 375dd9bf2b93ec9fd52bb82df78b016270cadd8972f0c5003f6c71272566d0b8
                              • Instruction ID: e10f0c9767169ad6ca306e4759b4dee7f78dd904dd151e380c46861b78301315
                              • Opcode Fuzzy Hash: 375dd9bf2b93ec9fd52bb82df78b016270cadd8972f0c5003f6c71272566d0b8
                              • Instruction Fuzzy Hash: 1CE133B09083808FD764DF68C480B6BBBE1FF89304F51492EE999A7391D774A849CF46
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0a52f6b36d15c3f10d6125d052433a857e5dbc77148c06f91a25cd1f24f5737b
                              • Instruction ID: 1e9a4df9b44ad6f4c50e22b14f2fef7b674a283b03798b1cf1174821231ddd43
                              • Opcode Fuzzy Hash: 0a52f6b36d15c3f10d6125d052433a857e5dbc77148c06f91a25cd1f24f5737b
                              • Instruction Fuzzy Hash: 4BD1BD728446A64FE318DF5DDC80235B772EF88310F6A457DC7981B3A2CA34BA21DB95
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7e26577fba095136f5744b22ad2f39cb0c53c06d26df2648a4839c972093248a
                              • Instruction ID: a133422d40a656bc7bcaeb9e216c34e50bde69e37971f087a7cef11d5dbccbab
                              • Opcode Fuzzy Hash: 7e26577fba095136f5744b22ad2f39cb0c53c06d26df2648a4839c972093248a
                              • Instruction Fuzzy Hash: 8AD1CC328546A64FE318DF59DC9033577A3EFC8350F2E0279CB950B692CB38A611DB94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b0a81e3d32886a3826879c9bb5c7ff7792f7acd020c85209a7aca5b77f0b2be7
                              • Instruction ID: 983ecf99ccd27684851fe3aac58d00a589f3145670afc011b7ace4e69248badb
                              • Opcode Fuzzy Hash: b0a81e3d32886a3826879c9bb5c7ff7792f7acd020c85209a7aca5b77f0b2be7
                              • Instruction Fuzzy Hash: 3CB18D36A0021AEFCB15CF04D6D0AA8FBA1BF58318F54C19ED81A5B342D775EE46CB94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ed524da47b8aa2ae254806281c4a749b71c931bd55644e6fcbbed78bd4e0280e
                              • Instruction ID: 57494768f0b92b70c1e5fb60671f8c0904b92fa69cceb7a89f96e62002fbccdf
                              • Opcode Fuzzy Hash: ed524da47b8aa2ae254806281c4a749b71c931bd55644e6fcbbed78bd4e0280e
                              • Instruction Fuzzy Hash: 7E61F4112197D29FD311CE3D488026CFFE1EFA71047588B6ED8D287B86C668E56AC7E1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dd3729e50029bc6c3d4b5788440f5fe005dccf0ff45094f581cd922932bb4b71
                              • Instruction ID: bfe1c4857090628bc31f33145390d4079553c539c8f45b3f89973d2b226e20e8
                              • Opcode Fuzzy Hash: dd3729e50029bc6c3d4b5788440f5fe005dccf0ff45094f581cd922932bb4b71
                              • Instruction Fuzzy Hash: B6613A725087118FC318DF49D48494AF3E1FFC8318F1A8A6DEA885B361D771E959CB86
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 51fc0aad63f55b9cb06e14c9a54f79600626f447b6889b17ae8838990c2708ce
                              • Instruction ID: 40e91ebcbfae1216bfcaa19984515f511dc88b32e75e61ccbef25afa7c8177b3
                              • Opcode Fuzzy Hash: 51fc0aad63f55b9cb06e14c9a54f79600626f447b6889b17ae8838990c2708ce
                              • Instruction Fuzzy Hash: FB317F71A0437607E3249E2E8C80126FBE39FD1301F19C27EE69C8B75AD839954A8254
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6d56deecd46ef8ef1f69f9754baeca6b831613f74d6383f3ce14ec95c9c5be60
                              • Instruction ID: c5ec1d2ed9afae8cad4480c0fdb6b25e0a32306f29324575231a0c6ad83db5c9
                              • Opcode Fuzzy Hash: 6d56deecd46ef8ef1f69f9754baeca6b831613f74d6383f3ce14ec95c9c5be60
                              • Instruction Fuzzy Hash: 81110A3E370D0607E71C8769AD73AB921C1E384309B88A13DF68BC96D1EE6D9894C20D
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9de65a982604af57022305bde5ac8764cd96b40e1cb3bce903844e2d22169a83
                              • Instruction ID: 745e0ab5a1f4135cb869288e75bb92ef0094498d29e0feb23aae1f7a6adb8ed7
                              • Opcode Fuzzy Hash: 9de65a982604af57022305bde5ac8764cd96b40e1cb3bce903844e2d22169a83
                              • Instruction Fuzzy Hash: 0111CE37A54A270BD324A96CDC80B777392EB8A354F1A4271DF449F392D538A94282E8
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL), ref: 00423614
                              • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 0042363B
                              • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00423648
                              • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00423655
                              • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00423662
                              • TlsAlloc.KERNEL32 ref: 004236B2
                              • TlsSetValue.KERNEL32(00000000), ref: 004236CD
                              • GetCurrentThreadId.KERNEL32 ref: 0042377C
                                • Part of subcall function 00422BFC: Sleep.KERNEL32(000003E8,?,?,00423219,KERNEL32.DLL,?,00423285,?,0042102E), ref: 00422C08
                                • Part of subcall function 00422BFC: GetModuleHandleW.KERNEL32(?,?,?,00423219,KERNEL32.DLL,?,00423285,?,0042102E), ref: 00422C11
                                • Part of subcall function 004232B6: TlsFree.KERNEL32(0000000D,00423792), ref: 004232E1
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: AddressProc$HandleModule$AllocCurrentFreeSleepThreadValue
                              • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                              • API String ID: 3443574016-3819984048
                              • Opcode ID: a7711aafff6d1c943812970f45cdda8508d32c6994b3b679bdc38e784271ccf6
                              • Instruction ID: 659c3cc02cf5ae5a470aa70da44ff7c46ddd0b0c312864a7ea5dc2d590450fdb
                              • Opcode Fuzzy Hash: a7711aafff6d1c943812970f45cdda8508d32c6994b3b679bdc38e784271ccf6
                              • Instruction Fuzzy Hash: 123192B1B04370AACB207F76BC09A563FB4AB84725790563FE415927B0DBBC8941EB5C
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?,35A089A6,?,?,?,?,?,?,0042C340,000000FF), ref: 0041D255
                              • LeaveCriticalSection.KERNEL32(?), ref: 0041D28C
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041D29E
                              • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 0041D2A8
                              • PostMessageW.USER32(?,?,?,?), ref: 0041D2C3
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041D2CF
                              • CloseHandle.KERNEL32(?), ref: 0041D2D5
                              • EnterCriticalSection.KERNEL32(?), ref: 0041D2EE
                              • LeaveCriticalSection.KERNEL32(?), ref: 0041D317
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeaveObjectSingleWait$CloseCreateEventHandleMessagePost
                              • String ID: PTn
                              • API String ID: 3292403733-3877643181
                              • Opcode ID: b9247c5f70dafe7bfc19e6b92135a0c60dfd878217866a3eae6bc9666be4be80
                              • Instruction ID: ad018f8797b644248f86de4a6b73993a128294163a90829cbb7abac7b6748e62
                              • Opcode Fuzzy Hash: b9247c5f70dafe7bfc19e6b92135a0c60dfd878217866a3eae6bc9666be4be80
                              • Instruction Fuzzy Hash: FA3117B16047409FD320CB69CC84B67B7E8BB89724F104A1DE5A993790CB74A8068B69
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LCMapStringW.KERNEL32(00000000,00000100,0042FC04,00000001,00000000,00000000,00000100,?,00000000,?,?,?,?,?,?,?), ref: 00428822
                              • GetLastError.KERNEL32 ref: 00428834
                              • MultiByteToWideChar.KERNEL32(00000100,00000000,?,?,00000000,00000000,00000100,?,00000000,?,?,?,?,?,?,?), ref: 004288C0
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 0042892C
                              • LCMapStringW.KERNEL32(?,?,?,00000000,00000000,00000000), ref: 00428948
                              • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,?,?), ref: 00428982
                              • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,00000000,?), ref: 004289E6
                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,?,?,00000000,00000000), ref: 00428A09
                              • LCMapStringA.KERNEL32(?,?,00000000,?,00000000,00000000,?,?,?,00000100,?,00000000,?,?,?,?), ref: 00428A99
                              • LCMapStringA.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,?,00000100,?,00000000,?), ref: 00428B0B
                              • LCMapStringA.KERNEL32(?,?,?,?,00000000,?,00000100,?,00000000,?,?,?,?,?,?,?), ref: 00428B58
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: String$ByteCharMultiWide$ErrorLast
                              • String ID:
                              • API String ID: 1775797328-0
                              • Opcode ID: 0622c9595e7c928c67a9354684f3a0c5ff4f8ed5d5a964f2728db9e7a2ec57f5
                              • Instruction ID: 62a6f68c45b0641a106a5d19d1630dbcff62c7981991ce5b33db095deec397d3
                              • Opcode Fuzzy Hash: 0622c9595e7c928c67a9354684f3a0c5ff4f8ed5d5a964f2728db9e7a2ec57f5
                              • Instruction Fuzzy Hash: 0EB1B3B2A01029EFDF219F95EC808AF7BB5FB48314F94442FF905A6210DB398D91DB59
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetDesktopWindow.USER32 ref: 004062A1
                              • SetForegroundWindow.USER32(00000000), ref: 004062A8
                              • ShowWindow.USER32(?,00000005), ref: 00406324
                              • PeekMessageW.USER32(00000000,?,00000000,00000000,00000000), ref: 0040633C
                              • DialogBoxParamW.USER32(00400000,?,?,Function_00006160,?), ref: 00406359
                              • SetEvent.KERNEL32(?), ref: 00406366
                              • ShowWindow.USER32(?,00000005), ref: 00406377
                              • PeekMessageW.USER32(00000000,?,00000000,00000000,00000000), ref: 0040638C
                              • MessageBoxW.USER32(?,?,?,?), ref: 004063A2
                              • SetEvent.KERNEL32(?), ref: 004063AF
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: Window$Message$EventPeekShow$DesktopDialogForegroundParam
                              • String ID:
                              • API String ID: 1049595212-0
                              • Opcode ID: b861efee7c899d3e4e1076c67bf2fbbf407496ad3a32fa7bdceb73dce1f1e3b2
                              • Instruction ID: 5797e6bae45bfa39f825304b1f8ed8a4465e7a28c84138b089b3a73a73e676b4
                              • Opcode Fuzzy Hash: b861efee7c899d3e4e1076c67bf2fbbf407496ad3a32fa7bdceb73dce1f1e3b2
                              • Instruction Fuzzy Hash: EA517D763002019FD224DF59E888F6BB3A9EBD8711F11852EF64687391C631EC56CBB8
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InterlockedDecrement.KERNEL32(?), ref: 00425B30
                              • InterlockedDecrement.KERNEL32(?), ref: 00425B3D
                              • InterlockedDecrement.KERNEL32(?), ref: 00425B4A
                              • InterlockedDecrement.KERNEL32(?), ref: 00425B57
                              • InterlockedDecrement.KERNEL32(?), ref: 00425B64
                              • InterlockedDecrement.KERNEL32(?), ref: 00425B80
                              • InterlockedDecrement.KERNEL32(00000000), ref: 00425B90
                              • InterlockedDecrement.KERNEL32(?), ref: 00425BA6
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: DecrementInterlocked
                              • String ID: 8tC
                              • API String ID: 3448037634-1908392418
                              • Opcode ID: 68b8d37a790ab26a57f16d1a8e67aef492bf5187288d27573ff4109d657d946d
                              • Instruction ID: 26d9552eaaefea0de38b777c8ec2ad1a3221d05d0ca2cf7801aa64a1755bbd99
                              • Opcode Fuzzy Hash: 68b8d37a790ab26a57f16d1a8e67aef492bf5187288d27573ff4109d657d946d
                              • Instruction Fuzzy Hash: BC110071B00A25A7DB209F69DC88F57FB9CAF44794F884427A508D7241D778FD10CAB4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InterlockedIncrement.KERNEL32(?), ref: 00425A99
                              • InterlockedIncrement.KERNEL32(?), ref: 00425AA6
                              • InterlockedIncrement.KERNEL32(?), ref: 00425AB3
                              • InterlockedIncrement.KERNEL32(?), ref: 00425AC0
                              • InterlockedIncrement.KERNEL32(?), ref: 00425ACD
                              • InterlockedIncrement.KERNEL32(?), ref: 00425AE9
                              • InterlockedIncrement.KERNEL32(00000000), ref: 00425AF9
                              • InterlockedIncrement.KERNEL32(?), ref: 00425B0F
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: IncrementInterlocked
                              • String ID: 8tC
                              • API String ID: 3508698243-1908392418
                              • Opcode ID: db4b19f6db7c05c65b1895c93acde5521fd8d44035fd7f8515e16809a9c5ebee
                              • Instruction ID: 4c0a2427404962645bda0b9b296f8371433b32c1a7d54b2745580576d5f3866b
                              • Opcode Fuzzy Hash: db4b19f6db7c05c65b1895c93acde5521fd8d44035fd7f8515e16809a9c5ebee
                              • Instruction Fuzzy Hash: D8110C71B01A29ABDB10DB69ECC9B57B7ACAF44754F488527A408D7240DB78E810CBA4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,00433840,0000000C,0042342E,00000000,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C), ref: 00423305
                              • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 00423339
                              • GetProcAddress.KERNEL32(?,DecodePointer), ref: 00423349
                              • InterlockedIncrement.KERNEL32(00437528), ref: 00423378
                                • Part of subcall function 00422BFC: Sleep.KERNEL32(000003E8,?,?,00423219,KERNEL32.DLL,?,00423285,?,0042102E), ref: 00422C08
                                • Part of subcall function 00422BFC: GetModuleHandleW.KERNEL32(?,?,?,00423219,KERNEL32.DLL,?,00423285,?,0042102E), ref: 00422C11
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc$IncrementInterlockedSleep
                              • String ID: (uC$@tC$DecodePointer$EncodePointer$KERNEL32.DLL
                              • API String ID: 3998264955-3985925910
                              • Opcode ID: e6ef39dbce11235577be71a267b04464a0c36bf9595fb088b49917cb53ee76d4
                              • Instruction ID: 368c4239940ca1c59e3d13a91af4f3465ee06113d0ebd32d49dc493fe0e42800
                              • Opcode Fuzzy Hash: e6ef39dbce11235577be71a267b04464a0c36bf9595fb088b49917cb53ee76d4
                              • Instruction Fuzzy Hash: AC11A5B1A00711AED730EF67A805B5ABBF0AF04315F90451FE4A5A72A1CB7C9B41DF58
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetEnvironmentStringsW.KERNEL32 ref: 00424D03
                              • GetLastError.KERNEL32 ref: 00424D17
                              • GetEnvironmentStringsW.KERNEL32 ref: 00424D3E
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 00424D78
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,?,00000000,00000000), ref: 00424D9B
                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00424DB1
                              • GetEnvironmentStrings.KERNEL32 ref: 00424DC4
                              • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00424DF6
                              • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00424E0F
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: EnvironmentStrings$Free$ByteCharMultiWide$ErrorLast
                              • String ID:
                              • API String ID: 4109468225-0
                              • Opcode ID: 2cfb9a72264fe13fcd3e974b28445dcd2c716c364153f914d8d464fc118721a8
                              • Instruction ID: 247b671838651186a8bd24d1fbe577920d18d8b87e5d1f4aa91061dcb602c5a4
                              • Opcode Fuzzy Hash: 2cfb9a72264fe13fcd3e974b28445dcd2c716c364153f914d8d464fc118721a8
                              • Instruction Fuzzy Hash: 2D310672B10134AEDB216FB5BCC887F7AADEAC53447A40477F142D3201D6385D828769
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetEvent.KERNEL32(?,35A089A6,?,?,00000000,00000000,0042C471,000000FF,0040AAAB,?,?), ref: 00415252
                              • GetLastError.KERNEL32 ref: 0041525C
                              • WaitForSingleObject.KERNEL32(?,000000FF,35A089A6,?,?,00000000,00000000,0042C471,000000FF,0040AAAB,?,?), ref: 0041526C
                              • CloseHandle.KERNEL32(?,35A089A6,?,?,00000000,00000000,0042C471,000000FF,0040AAAB,?,?), ref: 00415284
                              • GetLastError.KERNEL32 ref: 00415290
                              • CloseHandle.KERNEL32(?,35A089A6,?,?,00000000,00000000,0042C471,000000FF,0040AAAB,?,?), ref: 004152AE
                              • GetLastError.KERNEL32 ref: 004152B4
                              • CloseHandle.KERNEL32(?,35A089A6,?,?,00000000,00000000,0042C471,000000FF,0040AAAB,?,?), ref: 004152CF
                              • GetLastError.KERNEL32 ref: 004152D5
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ErrorLast$CloseHandle$EventObjectSingleWait
                              • String ID:
                              • API String ID: 2212007442-0
                              • Opcode ID: 2777ae7e726d2c839fa65e51c23003c870152c2d6633ec8b2ef1ac72c44a5693
                              • Instruction ID: bbc22d7d5e4264d147577bd93a02f4c94613573c8b2e1379b6dd7e4c8a38e6fc
                              • Opcode Fuzzy Hash: 2777ae7e726d2c839fa65e51c23003c870152c2d6633ec8b2ef1ac72c44a5693
                              • Instruction Fuzzy Hash: 0F218FB2304B42CBD720CF25DC44B97B7E8EB94760F144A2AE895C7390D739E845CEA9
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,00439779,00000104), ref: 00422FD7
                              • GetStdHandle.KERNEL32(000000F4,77A85D90,?,00000000,00000003,00000003,?,0042310B,000000FC,00420F03,?,00423A5F,?,00000001,?), ref: 004230AA
                              • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,0042310B,000000FC,00420F03,?,00423A5F,?,00000001,?,?,00421EA7), ref: 004230D4
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: File$HandleModuleNameWrite
                              • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                              • API String ID: 3784150691-4022980321
                              • Opcode ID: cc9de0986650cee929dc048b5c1b0dddde9dfe506617fdb1c9d096763233a800
                              • Instruction ID: 9158cb6e566bfd08f085ed830427a44525b66a6d665f02bf608d18114e126ccc
                              • Opcode Fuzzy Hash: cc9de0986650cee929dc048b5c1b0dddde9dfe506617fdb1c9d096763233a800
                              • Instruction Fuzzy Hash: E14148A2B0023076E6203A67BD46B7F25689F11746FD4002BF905912C2EABDDF1281BE
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00425F2D: GetOEMCP.KERNEL32(00000000,?), ref: 00425F56
                                • Part of subcall function 00423A4E: Sleep.KERNEL32(00000000,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38,?,?,?,004234FE,0000000D,00433868,00000008), ref: 00423A6F
                              • InterlockedDecrement.KERNEL32(?), ref: 00426204
                              • InterlockedIncrement.KERNEL32(00000000), ref: 00426229
                              • InterlockedDecrement.KERNEL32 ref: 004262BB
                              • InterlockedIncrement.KERNEL32(00000000), ref: 004262DF
                                • Part of subcall function 00420DFE: RtlFreeHeap.NTDLL(00000000,?,00433738,0000000C,00423444,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C), ref: 00420E66
                                • Part of subcall function 00420DFE: GetLastError.KERNEL32(?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38,?,?,?,004234FE,0000000D), ref: 00420E77
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: Interlocked$DecrementIncrement$ErrorFreeHeapLastSleep
                              • String ID: (uC$(uC$(uC
                              • API String ID: 1703371082-3253123444
                              • Opcode ID: d9f6be0851496ed857afd1ddd90e93bab350777af422ca54c1a6e710554727b8
                              • Instruction ID: 17eb0c422dad532322fb8ef44ca996b3933cc8bb414c5f76d99fb5abf9fd75a1
                              • Opcode Fuzzy Hash: d9f6be0851496ed857afd1ddd90e93bab350777af422ca54c1a6e710554727b8
                              • Instruction Fuzzy Hash: CD41C770604224DBDB20EF75F88475A37E0AB04314F9655AFE845DB262CB7C98418B6C
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?,35A089A6), ref: 0041BC7D
                              • LeaveCriticalSection.KERNEL32(?), ref: 0041BC87
                              • EnterCriticalSection.KERNEL32(?), ref: 0041BC95
                              • LeaveCriticalSection.KERNEL32(?), ref: 0041BCC6
                              • MessageBoxW.USER32(?,?,?,00000024), ref: 0041BCF5
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$Message
                              • String ID: PTn
                              • API String ID: 850481049-3877643181
                              • Opcode ID: 97fca20e87f4d19e08f54edf18e8893c9510420802b076d91891b32d89d837be
                              • Instruction ID: 0a8a3c5dcc9595394f3e91466f479760a0ffc0d599377708b9fa38c2404fa1f7
                              • Opcode Fuzzy Hash: 97fca20e87f4d19e08f54edf18e8893c9510420802b076d91891b32d89d837be
                              • Instruction Fuzzy Hash: 6441AFB1204341AFD324DF28D844B6BBBE4FB89714F100619F56A83391C738E946CBAA
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,35A089A6,?,?,?,00000000,?,?,0042C7C9,000000FF,0041D69D,?,00000004), ref: 0041D142
                              • RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MODAL_DLG,?,?,0042C7C9,000000FF,0041D69D,?,00000004,00000004,00000004,00000004,35A089A6,?,?,00000000,00000000), ref: 0041D152
                              • RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MESSAGE_BOX,?,?,0042C7C9,000000FF,0041D69D,?,00000004,00000004,00000004,00000004,35A089A6,?,?,00000000,00000000), ref: 0041D15C
                                • Part of subcall function 004047C0: InitializeCriticalSection.KERNEL32(?,35A089A6), ref: 004047FE
                              • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,00000004,?,?,0042C7C9,000000FF,0041D69D,?,00000004,00000004,00000004,00000004,35A089A6), ref: 0041D1DF
                              • GetLastError.KERNEL32(?,?,0042C7C9,000000FF,0041D69D,?,00000004,00000004,00000004,00000004,35A089A6,?,?,00000000,00000000,0042CB29), ref: 0041D1E8
                                • Part of subcall function 0042A355: RaiseException.KERNEL32(?,?,?,00404E9C,?,?,?,?,?,00404E9C,?,00433BD0), ref: 0042A397
                              Strings
                              • CDialog::MSG_CREATE_MODAL_DLG, xrefs: 0041D14A
                              • CDialog::MSG_CREATE_MESSAGE_BOX, xrefs: 0041D154
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CreateEventMessageRegisterWindow$CriticalErrorExceptionInitializeLastRaiseSection
                              • String ID: CDialog::MSG_CREATE_MESSAGE_BOX$CDialog::MSG_CREATE_MODAL_DLG
                              • API String ID: 320577460-1515309323
                              • Opcode ID: 8c3c6d63b363685cc27f5696b87a2b9263a8d1f6cc3ee763bcd4ecdd4307727f
                              • Instruction ID: e389b8cf96f7ef14453b2a34cd2d1995612044cb35cd3128fd44df0df899afb7
                              • Opcode Fuzzy Hash: 8c3c6d63b363685cc27f5696b87a2b9263a8d1f6cc3ee763bcd4ecdd4307727f
                              • Instruction Fuzzy Hash: 173170B1604B86AFD314CF29C881B86FFE8FB19354F54462EE16883641C774B554CF99
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetCPInfo.KERNEL32(?,?,?,00000000,00000000,?,?,?,?,00428790,?,?,?,?,?,?), ref: 0042967E
                              • GetCPInfo.KERNEL32(?,00000001,?,00428790,?,?), ref: 00429697
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,00428790,00000000,00000000,?,00428790,?,?,?,?,?,?,?,?), ref: 004296F5
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,00428790,?,00000000,?,?,?,?,?,?,?,00428790,?,?), ref: 00429744
                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,00428790), ref: 0042975F
                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,00428790), ref: 00429785
                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,00428790), ref: 004297AA
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$Info
                              • String ID:
                              • API String ID: 1775632426-0
                              • Opcode ID: efa3d840405d14af4fdc8cd6cc2b4b712fdd27864ef2ab618cb99f6814856607
                              • Instruction ID: 8be41e7a548ec35f8aee705dd7f55362ca18c0eeec8d1ae65a879b8315825ffb
                              • Opcode Fuzzy Hash: efa3d840405d14af4fdc8cd6cc2b4b712fdd27864ef2ab618cb99f6814856607
                              • Instruction Fuzzy Hash: CA516F31E10129EBCF219F96EC84DEFBBB9EF89714F90412AF514A2250D7399C41CB68
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetDlgItem.USER32(?,000003E9), ref: 0041B2E2
                              • SetWindowTextW.USER32(00000000,?), ref: 0041B2F0
                                • Part of subcall function 00420DFE: RtlFreeHeap.NTDLL(00000000,?,00433738,0000000C,00423444,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C), ref: 00420E66
                                • Part of subcall function 00420DFE: GetLastError.KERNEL32(?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38,?,?,?,004234FE,0000000D), ref: 00420E77
                              • SetWindowTextW.USER32(?,?), ref: 0041B347
                              • SetDlgItemTextW.USER32(?,000003E8,?), ref: 0041B3A3
                              • SetDlgItemTextW.USER32(?,00000001,?), ref: 0041B3FC
                              • SetDlgItemTextW.USER32(?,00000002,?), ref: 0041B455
                              • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 0041B467
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: Text$Item$Window$ErrorFreeHeapLastMessageSend
                              • String ID:
                              • API String ID: 3032249301-0
                              • Opcode ID: 8616607771760b40af6b41e3cf6a6b38da392e2d415f46127b7d0b13a612a390
                              • Instruction ID: 9124571f9925069902d80d9bec0a2e382c050e0a1f5ab6a584098a3f445e3558
                              • Opcode Fuzzy Hash: 8616607771760b40af6b41e3cf6a6b38da392e2d415f46127b7d0b13a612a390
                              • Instruction Fuzzy Hash: 8C5166B15083809FD700EF69D885B4BBBE8AF88354F40095DF68997292C7B8E545CB67
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 0041D100: CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,35A089A6,?,?,?,00000000,?,?,0042C7C9,000000FF,0041D69D,?,00000004), ref: 0041D142
                                • Part of subcall function 0041D100: RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MODAL_DLG,?,?,0042C7C9,000000FF,0041D69D,?,00000004,00000004,00000004,00000004,35A089A6,?,?,00000000,00000000), ref: 0041D152
                                • Part of subcall function 0041D100: RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MESSAGE_BOX,?,?,0042C7C9,000000FF,0041D69D,?,00000004,00000004,00000004,00000004,35A089A6,?,?,00000000,00000000), ref: 0041D15C
                                • Part of subcall function 0041D100: CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,00000004,?,?,0042C7C9,000000FF,0041D69D,?,00000004,00000004,00000004,00000004,35A089A6), ref: 0041D1DF
                                • Part of subcall function 0041D100: GetLastError.KERNEL32(?,?,0042C7C9,000000FF,0041D69D,?,00000004,00000004,00000004,00000004,35A089A6,?,?,00000000,00000000,0042CB29), ref: 0041D1E8
                              • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,00000004,00000004,00000004,00000004,35A089A6,?,?,00000000,00000000,0042CB29,000000FF), ref: 0041D6BD
                              • RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MODAL_DLG), ref: 0041D6D4
                              • RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MESSAGE_BOX), ref: 0041D6E1
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: MessageRegisterWindow$CreateEvent$ErrorLast
                              • String ID: CDialog::MSG_CREATE_MESSAGE_BOX$CDialog::MSG_CREATE_MODAL_DLG$A
                              • API String ID: 3169829505-1326287800
                              • Opcode ID: e89d548d165c6ccd7a082492aa9f76ceb39d4a342e0e30b07f374673c9fb6d41
                              • Instruction ID: 4717a6013c7829877e93234c158fbe75f12066bf988c191e84262ef118b64ff5
                              • Opcode Fuzzy Hash: e89d548d165c6ccd7a082492aa9f76ceb39d4a342e0e30b07f374673c9fb6d41
                              • Instruction Fuzzy Hash: AA412AF1904B86EFC314CF26C881782FBE4BB58704F508A2EE2A957641C378A558CBD5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,00412CA3,?,?,?,?,?,?,?,00433B9C), ref: 00415195
                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,00433B9C), ref: 0041519E
                              • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,?,00412CA3,?,?,?,?,?,?,?,00433B9C), ref: 004151BD
                              • ResetEvent.KERNEL32(00000000,?,?,00412CA3,?,?,?,?,?,?,?,00433B9C), ref: 004151D1
                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,00433B9C), ref: 004151DD
                              • ResetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,00433B9C), ref: 004151E3
                              • GetLastError.KERNEL32(?,?,?,?,?,?,?,00433B9C), ref: 004151E9
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: Event$ErrorLast$CreateReset
                              • String ID:
                              • API String ID: 2684445861-0
                              • Opcode ID: 670938e640ea1e4db209150584b68df53bc7c1080c9c0f0405a21129e5743fbd
                              • Instruction ID: 068eba8924103465b4b96f194371cc6e05a3aa6795ab0b5abca74ce5f4d4681e
                              • Opcode Fuzzy Hash: 670938e640ea1e4db209150584b68df53bc7c1080c9c0f0405a21129e5743fbd
                              • Instruction Fuzzy Hash: E9118431700B01EAE7319B6AEC40BD7B3D89FD4744F60852AE115DA2D4D7B8F8828A2C
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,?,00002000,?,?,?), ref: 0041E9E8
                              • RegCreateKeyExW.ADVAPI32 ref: 0041EA14
                              • RegSetValueExW.ADVAPI32(?,00000000,00000000,00000004,00000000,00000004), ref: 0041EA36
                              • RegCloseKey.ADVAPI32(00000000,?,00000000,00000000,00000004,00000000,00000004), ref: 0041EA40
                              Strings
                              • , xrefs: 0041EA2E
                              • Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted, xrefs: 0041EA02
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CloseCreateFileModuleNameValue
                              • String ID: $Software\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Compatibility Assistant\Persisted
                              • API String ID: 506456306-2837994659
                              • Opcode ID: 9ef6a000b2af350e772483fbf86137953c4e018e4428102ed8f1a798441201ee
                              • Instruction ID: 0e3c631b592d9466001b2de6060d7075d7ffc32f5526a3d9b253da112b9fda37
                              • Opcode Fuzzy Hash: 9ef6a000b2af350e772483fbf86137953c4e018e4428102ed8f1a798441201ee
                              • Instruction Fuzzy Hash: 960152B0754300BFF220DB51DC4AF6A77E8EB48B04F80481DF7889A1C2D6B4A405CB5B
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • TlsGetValue.KERNEL32(00000000,?,004231C8,00000000,00425571,00439760,00000000,00000314,?,004230A3,00439760,Microsoft Visual C++ Runtime Library,00012010), ref: 00423161
                              • TlsGetValue.KERNEL32(00000005,?,004231C8,00000000,00425571,00439760,00000000,00000314,?,004230A3,00439760,Microsoft Visual C++ Runtime Library,00012010), ref: 00423178
                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004231C8,00000000,00425571,00439760,00000000,00000314,?,004230A3,00439760,Microsoft Visual C++ Runtime Library,00012010), ref: 0042318E
                              • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 004231A9
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: Value$AddressHandleModuleProc
                              • String ID: EncodePointer$KERNEL32.DLL
                              • API String ID: 1929421221-3682587211
                              • Opcode ID: 4ef612fe1326c84ec230daf070a95da59f1b4d14b6949d682cecbb7ac4dcd17d
                              • Instruction ID: daa87357a87a1e4e0ef2d1d1bbe15988916afdd93ab62a48e1b9757b7f748a81
                              • Opcode Fuzzy Hash: 4ef612fe1326c84ec230daf070a95da59f1b4d14b6949d682cecbb7ac4dcd17d
                              • Instruction Fuzzy Hash: B2F03670700126BB97205F26FC04ABB3AA99F013523944176FC14D7260DB3CDE62D69C
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • TlsGetValue.KERNEL32(00000000,?,00423285,?,0042102E), ref: 004231DC
                              • TlsGetValue.KERNEL32(00000005,?,00423285,?,0042102E), ref: 004231F3
                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,00423285,?,0042102E), ref: 00423209
                              • GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 00423224
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: Value$AddressHandleModuleProc
                              • String ID: DecodePointer$KERNEL32.DLL
                              • API String ID: 1929421221-629428536
                              • Opcode ID: 5819036b07a8f835e0a577b12fa298e2b16a2ee1c982b743f9ae82597d1ccb16
                              • Instruction ID: d2b717125cd0513a4a46dcede76b6d967e689a70886e68255a06d37ed6e4950c
                              • Opcode Fuzzy Hash: 5819036b07a8f835e0a577b12fa298e2b16a2ee1c982b743f9ae82597d1ccb16
                              • Instruction Fuzzy Hash: 81F03670704125EB97205F66FD049673EA89F103513944176FC14D7260DB3CDE55D6A9
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStringTypeW.KERNEL32(00000001,0042FC04,00000001,?,00000100,?,?,?,?,?,00428790,?,?,?,?,?), ref: 004285D5
                              • GetLastError.KERNEL32(?,00428790,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004285E7
                              • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,?,?,?,?,?,00428790,?,?,?), ref: 0042864C
                              • MultiByteToWideChar.KERNEL32(00000000,00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,00000000), ref: 004286B6
                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 004286C4
                              • GetStringTypeA.KERNEL32(?,?,?,?,?,00000100,?,?,?,?,?,00428790,?,?,?,?), ref: 00428739
                                • Part of subcall function 00429633: GetCPInfo.KERNEL32(?,?,?,00000000,00000000,?,?,?,?,00428790,?,?,?,?,?,?), ref: 0042967E
                                • Part of subcall function 00429633: GetCPInfo.KERNEL32(?,00000001,?,00428790,?,?), ref: 00429697
                                • Part of subcall function 00429633: MultiByteToWideChar.KERNEL32(?,00000001,?,00428790,?,00000000,?,?,?,?,?,?,?,00428790,?,?), ref: 00429744
                                • Part of subcall function 00429633: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,00428790), ref: 0042975F
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$StringType$Info$ErrorLast
                              • String ID:
                              • API String ID: 2250435928-0
                              • Opcode ID: a7ed2f8b7dec2b9b382c94045e007b3144cc7158194233a777a15d092bd5a497
                              • Instruction ID: 5d771249b7e0fca6b600092783b7d090cf16521b3a94d3bb2ee6a295d965dded
                              • Opcode Fuzzy Hash: a7ed2f8b7dec2b9b382c94045e007b3144cc7158194233a777a15d092bd5a497
                              • Instruction Fuzzy Hash: 5B51AF7170112AAFDF209F64EC819AF3BA9EB04354BA4442EF901C7250DB79DD61CB98
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041BF99
                              • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 0041BFBB
                              • SendMessageW.USER32(00000000,?,00000000,?), ref: 0041BFD3
                              • CloseHandle.KERNEL32(?), ref: 0041BFDD
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041BFE9
                              • MessageBoxW.USER32(00000000,?,?,?), ref: 0041C00C
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: MessageObjectSingleWait$CloseCreateEventHandleSend
                              • String ID:
                              • API String ID: 3833482109-0
                              • Opcode ID: 0b788cf7af48f74d30c4f0ea5c33d9a8adc3578a1e0daadd6c1318ae98fe1c94
                              • Instruction ID: f91b4b6455c39529ea0f93616aee9c7d89bd0d9653428511fc5c91251fe49f37
                              • Opcode Fuzzy Hash: 0b788cf7af48f74d30c4f0ea5c33d9a8adc3578a1e0daadd6c1318ae98fe1c94
                              • Instruction Fuzzy Hash: 42110475604301AFD224DF19DC85F5BB7E8EB88B10F108A1DF59693290D670E80ACBA6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FormatMessageW.KERNEL32(00001300,00000000,?,00000400,00000000,00000000,00000000,00000000,00420153), ref: 0041E4A3
                              • lstrlenW.KERNEL32(00000000), ref: 0041E4B0
                              • LocalAlloc.KERNEL32(00000000,00000040), ref: 0041E4E7
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: AllocFormatLocalMessagelstrlen
                              • String ID: IDispatch error #%d$Unknown error 0x%0lX
                              • API String ID: 3952663782-2934499512
                              • Opcode ID: 027266e23a27e927a6ece381ce4c76f82ce2e5e9c148b84658b8c9045bea832f
                              • Instruction ID: 1d15befb501128dd820a01fae309b8b03904db938a5df1f253dafdad90b1e791
                              • Opcode Fuzzy Hash: 027266e23a27e927a6ece381ce4c76f82ce2e5e9c148b84658b8c9045bea832f
                              • Instruction Fuzzy Hash: 2C21A570200221EBE730EB59ED46FE673A6EF54308F604559F5449B2C2F7B9B982C758
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,35A089A6,?,?,?,?,0042BE78,000000FF,0041CE6F,?), ref: 0041CF6A
                              • RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MODAL_DLG,?,?,?,?,0042BE78,000000FF,0041CE6F,?), ref: 0041CF7E
                              • RegisterWindowMessageW.USER32(CDialog::MSG_CREATE_MESSAGE_BOX,?,?,?,?,0042BE78,000000FF,0041CE6F,?), ref: 0041CF88
                              Strings
                              • CDialog::MSG_CREATE_MODAL_DLG, xrefs: 0041CF76
                              • CDialog::MSG_CREATE_MESSAGE_BOX, xrefs: 0041CF80
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: MessageRegisterWindow$CreateEvent
                              • String ID: CDialog::MSG_CREATE_MESSAGE_BOX$CDialog::MSG_CREATE_MODAL_DLG
                              • API String ID: 2418267205-1515309323
                              • Opcode ID: 7fa1a575ea346de8f28e5e3722ceb1a3217c4de9ee22338078f5ffbbcd47b5eb
                              • Instruction ID: e1c83e00d976b7b479650104844ec0f6e79c37c59f4d0df13700cc8b20bf3eca
                              • Opcode Fuzzy Hash: 7fa1a575ea346de8f28e5e3722ceb1a3217c4de9ee22338078f5ffbbcd47b5eb
                              • Instruction Fuzzy Hash: 58118BB1A04746AFD300CF26C880B12FBE8FB48760F504A2FE55893A80C378B814CF98
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?,?,?,?,?,0041C5A8), ref: 0041B6CE
                              • LeaveCriticalSection.KERNEL32(?,?,?,?,0041C5A8), ref: 0041B6DE
                              • EnterCriticalSection.KERNEL32(?), ref: 0041B6E8
                              • LeaveCriticalSection.KERNEL32(?), ref: 0041B6F2
                              • Sleep.KERNEL32(00000064), ref: 0041B6FD
                              • EnterCriticalSection.KERNEL32(?), ref: 0041B704
                              • LeaveCriticalSection.KERNEL32(?), ref: 0041B70E
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$Sleep
                              • String ID:
                              • API String ID: 2348874005-0
                              • Opcode ID: f8c0275f32117be734c0b8a6040b515ae9982e18d29e130f81fb3d05d829968e
                              • Instruction ID: 7d0ab2ec63e2e510b595603aed5c06e49eb38fb67e82f02a5ca42a647926e9c3
                              • Opcode Fuzzy Hash: f8c0275f32117be734c0b8a6040b515ae9982e18d29e130f81fb3d05d829968e
                              • Instruction Fuzzy Hash: 4FF0F96210E3E17DE31197B99C80BEBFFC8AF4A114F48044AF38542642CB64E499D3EE
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStartupInfoA.KERNEL32(?), ref: 00424E31
                                • Part of subcall function 00423A93: Sleep.KERNEL32(00000000), ref: 00423ABB
                              • GetFileType.KERNEL32(00000040), ref: 00424F5B
                              • GetStdHandle.KERNEL32(-000000F6), ref: 00424FE5
                              • GetFileType.KERNEL32(00000000), ref: 00424FF7
                              • SetHandleCount.KERNEL32 ref: 0042504F
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: FileHandleType$CountInfoSleepStartup
                              • String ID:
                              • API String ID: 1302456922-0
                              • Opcode ID: b28b26573e01cf66f2cb95df7be044c18b7f1addbcf9981789e44be643f0f182
                              • Instruction ID: b02dce34e118c2087409c128a299b0e4e65301737a26d1de5cc8ce194ba9bc26
                              • Opcode Fuzzy Hash: b28b26573e01cf66f2cb95df7be044c18b7f1addbcf9981789e44be643f0f182
                              • Instruction Fuzzy Hash: D6712771A047618FDB20CF28FD44756BBA0EF85324FAA436AD4619B2E1C77CD842CB59
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 0040A930: FindCloseChangeNotification.KERNELBASE(?,35A089A6,00000000,?,?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A973
                                • Part of subcall function 0040A930: GetLastError.KERNEL32(?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A979
                                • Part of subcall function 0040A930: CloseHandle.KERNEL32(?,35A089A6,00000000,?,?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A991
                                • Part of subcall function 0040A930: GetLastError.KERNEL32(?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A997
                                • Part of subcall function 0040A930: CloseHandle.KERNEL32(?,35A089A6,00000000,?,?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A9B1
                                • Part of subcall function 0040A930: GetLastError.KERNEL32(?,00000000,0042C6E3,000000FF,0041270E), ref: 0040A9B7
                              • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000), ref: 0041271E
                              • GetLastError.KERNEL32 ref: 0041272A
                              • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 00412740
                              • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 00412752
                              • GetLastError.KERNEL32 ref: 0041275F
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ErrorLast$CloseCreateEvent$Handle$ChangeFindNotification
                              • String ID:
                              • API String ID: 213241709-0
                              • Opcode ID: 516182abb57a05b54fca2bc3085f438cd3bdaa9ed7492599c5cdafcbb9abd9f7
                              • Instruction ID: 8ace0b9d7f818b423eaf7a3375f85a0c12461cedc0be4e9cb63852f0f41e943e
                              • Opcode Fuzzy Hash: 516182abb57a05b54fca2bc3085f438cd3bdaa9ed7492599c5cdafcbb9abd9f7
                              • Instruction Fuzzy Hash: DA317A716083009FC720DF1AD984E5BBBF5EBD8710F104A2EF955C7290D7B5A881CAAA
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?), ref: 0041BB19
                              • LeaveCriticalSection.KERNEL32(?), ref: 0041BB22
                              • PostMessageW.USER32(?,00008000,00000000,00000000), ref: 0041BB42
                              • EnterCriticalSection.KERNEL32(?), ref: 0041BB4F
                              • LeaveCriticalSection.KERNEL32(?), ref: 0041BB72
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$MessagePost
                              • String ID:
                              • API String ID: 1950312729-0
                              • Opcode ID: e829717b7742392a5d7cac33a0f9957d49dedec6ac4da5b3686c1d9b361c6041
                              • Instruction ID: d581ea35383060334206f5fcdd51a0bd68e0bee2ddb56b36f4aad4860aba5ccc
                              • Opcode Fuzzy Hash: e829717b7742392a5d7cac33a0f9957d49dedec6ac4da5b3686c1d9b361c6041
                              • Instruction Fuzzy Hash: 68219C71244704ABD220EF759C80B6BF7E8EF55B04F04081EF69643B41CB75B84687A9
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • WriteConsoleW.KERNEL32(FFFFFFFE,00000000,00000001,?,00000000,00000000,?,0042483B,00000000,?), ref: 00429008
                              • GetLastError.KERNEL32(?,0042483B,00000000,?), ref: 0042901B
                              • GetConsoleOutputCP.KERNEL32(00000000,00000000,00000001,0042483B,00000005,00000000,00000000,00000000,?,0042483B,00000000,?), ref: 0042903B
                              • WideCharToMultiByte.KERNEL32(00000000,?,0042483B,00000000,?), ref: 00429042
                              • WriteConsoleA.KERNEL32(FFFFFFFE,0042483B,00000000,?,00000000,?,0042483B,00000000,?), ref: 0042905E
                                • Part of subcall function 00429A41: CreateFileA.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00428FEB,00000000,?,0042483B,00000000,?), ref: 00429A54
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide
                              • String ID:
                              • API String ID: 1850339568-0
                              • Opcode ID: e8eccd638461bfd16512a990b982fede7f1ca95f29bca1b26eff07a560fd484d
                              • Instruction ID: 032f664b7e78d83ee315460446b2c8b3da75d7442e7cf4a3b349a9b5828177d7
                              • Opcode Fuzzy Hash: e8eccd638461bfd16512a990b982fede7f1ca95f29bca1b26eff07a560fd484d
                              • Instruction Fuzzy Hash: A921A171A01128ABD7309F61EC499FF3B6DEB05321F8042AAF512C61D0DBB49D45CBAD
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ResetEvent.KERNEL32(?), ref: 00414F26
                              • GetLastError.KERNEL32 ref: 00414F36
                              • SetEvent.KERNEL32(?), ref: 00414F3C
                              • GetLastError.KERNEL32 ref: 00414F46
                              • WaitForMultipleObjects.KERNEL32(00000002,00000000,00000000,000000FF), ref: 00414F60
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ErrorEventLast$MultipleObjectsResetWait
                              • String ID:
                              • API String ID: 234195192-0
                              • Opcode ID: c0e4b5393c150b2b1d41074350501775be6a1a9ae23a0de58fb55b33defacd65
                              • Instruction ID: 8f6e04e233e7f0ecea5ba5d329dc9ff630179ca758a6f2b2f67ed5664254b869
                              • Opcode Fuzzy Hash: c0e4b5393c150b2b1d41074350501775be6a1a9ae23a0de58fb55b33defacd65
                              • Instruction Fuzzy Hash: DA017C752003018BD320DF69DC80A67B7E4FBD8711F40892EE994C7390EB75E94ACB69
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041BF30
                              • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 0041BF3A
                              • PostMessageW.USER32(?,?,?,?), ref: 0041BF55
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0041BF61
                              • CloseHandle.KERNEL32(?), ref: 0041BF67
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ObjectSingleWait$CloseCreateEventHandleMessagePost
                              • String ID:
                              • API String ID: 1259710111-0
                              • Opcode ID: 806b293743ddfa5fc6b1ad8d583cf7613af39d7d78647ed7c97bbd4295f491a7
                              • Instruction ID: ea334cb5308d7a0064a28a168c68656027542afff3d651ce4ab8b114c3d9b8ee
                              • Opcode Fuzzy Hash: 806b293743ddfa5fc6b1ad8d583cf7613af39d7d78647ed7c97bbd4295f491a7
                              • Instruction Fuzzy Hash: 25F0F475204710ABC230DB59EC44F57B7F8EB88B20F108A19B6A6936D0CAB0F8068B65
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNEL32(mscoree.dll,?,00422C8D,?,?,00420F14,000000FF,0000001E,?,00423A5F,?,00000001,?,?,00421EA7,00000018), ref: 00422C5F
                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00422C6F
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 1646373207-1276376045
                              • Opcode ID: 8d755ef4f68e99e22c80ee652a7a60e1673d97e89cb30d31356da889f0fdd12c
                              • Instruction ID: 56a54ba1d69cd86169530cbe38a3a50b3769ef0f80295f856b38201d3892e205
                              • Opcode Fuzzy Hash: 8d755ef4f68e99e22c80ee652a7a60e1673d97e89cb30d31356da889f0fdd12c
                              • Instruction Fuzzy Hash: 38D0C9713402187BAB205BF3BE0DA2A3A5D9981B513D40576B808E6250DAB9D812D96D
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?), ref: 0041C702
                              • LeaveCriticalSection.KERNEL32(?), ref: 0041C713
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID: @N@$PTn
                              • API String ID: 3168844106-2214026116
                              • Opcode ID: 8acf8df9a3d0fdefd6065d42bdf7b300d5136280e86f815acb5728404d03b38b
                              • Instruction ID: 7b22e8e9bfa59ed91af09dfebfb28f908978085d459430ebb598829989cac8c5
                              • Opcode Fuzzy Hash: 8acf8df9a3d0fdefd6065d42bdf7b300d5136280e86f815acb5728404d03b38b
                              • Instruction Fuzzy Hash: 5C02AE716143009BC714EF65D880A9BB3E5BFC8304F40492EF9899B391DB78ED49CB9A
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00420EDB: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38), ref: 00420F52
                              • GetLastError.KERNEL32(?,00421591,?,00000010), ref: 004217F8
                              • GetLastError.KERNEL32(?,00421591,?,00000010), ref: 00421885
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ErrorLast$AllocateHeap
                              • String ID:
                              • API String ID: 4219743298-0
                              • Opcode ID: ad2f8294da4cfab47ba3c68b8891da78d6df11ee59e798cda1fb2d497740a30c
                              • Instruction ID: c5eadacef89ec66f5b0d66aa64011e7b2cb7398047c1b02230397993182e2698
                              • Opcode Fuzzy Hash: ad2f8294da4cfab47ba3c68b8891da78d6df11ee59e798cda1fb2d497740a30c
                              • Instruction Fuzzy Hash: 8F51D671F00235AACB217B76BC4566F7664EFB0394BA1052BF815672B1DB3C8C418A9D
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindowTextLengthW.USER32 ref: 004086B5
                              • GetLastError.KERNEL32 ref: 004086C1
                              • GetWindowTextW.USER32(?,?,00000001), ref: 004086EB
                              • GetLastError.KERNEL32 ref: 00408717
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ErrorLastTextWindow$Length
                              • String ID:
                              • API String ID: 3440162706-0
                              • Opcode ID: c0ddd3581b0e531c08e679f2064eb4f7fc4116aa240d8e2fe6827b0531aec1fd
                              • Instruction ID: 07fccb4b5a50a5a39ac797d7d7c016af7ded2db5039dfe4e2d7ff4f9233aebd5
                              • Opcode Fuzzy Hash: c0ddd3581b0e531c08e679f2064eb4f7fc4116aa240d8e2fe6827b0531aec1fd
                              • Instruction Fuzzy Hash: 6B11A1752145128BD724DF79E94491B73E5EFD4310711457EE086C7394EB35D8428BA8
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00415132
                              • SetEvent.KERNEL32(?), ref: 00415154
                              • GetLastError.KERNEL32 ref: 0041515A
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00415162
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ObjectSingleWait$ErrorEventLast
                              • String ID:
                              • API String ID: 3117263442-0
                              • Opcode ID: 58b0573d5ea3f526ce09629d59f4af3ae64b585e59b04b0ade2fd1c9e074ec63
                              • Instruction ID: feaf804519cf69de200bc99c0c312eed2e15eb9b6703e4fc041637bf795a50c3
                              • Opcode Fuzzy Hash: 58b0573d5ea3f526ce09629d59f4af3ae64b585e59b04b0ade2fd1c9e074ec63
                              • Instruction Fuzzy Hash: E3F0B476604715AFD721DF69DC40AA7B3E8BB89330B104B29E1A183390CB74FC828768
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: ErrorEventLastReset
                              • String ID:
                              • API String ID: 1621066496-0
                              • Opcode ID: fb3bcf7261792f35598a1087b45479a14e7556373594df7cd1b80a5989da819f
                              • Instruction ID: 8222d6231367c2f95b5b8b75f07a3969ecdbb72d7db14b241ba787fa5bd73eff
                              • Opcode Fuzzy Hash: fb3bcf7261792f35598a1087b45479a14e7556373594df7cd1b80a5989da819f
                              • Instruction Fuzzy Hash: A9F05E76600315CF8730AFAADD80457B7E8EF88651301497AD945CB211D7B1E9929BA8
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InterlockedDecrement.KERNEL32(?), ref: 0042350B
                                • Part of subcall function 00420DFE: RtlFreeHeap.NTDLL(00000000,?,00433738,0000000C,00423444,00000000,?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C), ref: 00420E66
                                • Part of subcall function 00420DFE: GetLastError.KERNEL32(?,00423A5F,?,00000001,?,?,00421EA7,00000018,00433800,0000000C,00421F38,?,?,?,004234FE,0000000D), ref: 00420E77
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: DecrementErrorFreeHeapInterlockedLast
                              • String ID: (uC$@tC
                              • API String ID: 1804986901-3738046239
                              • Opcode ID: e4c095f24c54c999a592f3d2be42f5a1a21264a0fd11f5438d8ef94960603676
                              • Instruction ID: c493a851d32146709216096e48ecb5422a5843256acaa14a0763021ed7ea294d
                              • Opcode Fuzzy Hash: e4c095f24c54c999a592f3d2be42f5a1a21264a0fd11f5438d8ef94960603676
                              • Instruction Fuzzy Hash: 88214D6274572076D624BEBAB549B1B63F99B04769B94840FF04897682CE7CFAC0851C
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FormatMessageW.KERNEL32(00001300,00000000,?,00000000,?,00000000,00000000,00000004,35A089A6,00000000,?, /m="), ref: 0041AEF0
                              • LocalFree.KERNEL32(?), ref: 0041AF0A
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: FormatFreeLocalMessage
                              • String ID: /m="
                              • API String ID: 1427518018-3487320
                              • Opcode ID: 695fc31bdaacbd9ee0ee099f19c2e04b9b79b9a2f59bf99be6fb8de6d3772c06
                              • Instruction ID: 0f6c590e0b8d9d0c3bb6e6ee73bddb7d9bdabd2836573f11952a495bd2579edb
                              • Opcode Fuzzy Hash: 695fc31bdaacbd9ee0ee099f19c2e04b9b79b9a2f59bf99be6fb8de6d3772c06
                              • Instruction Fuzzy Hash: A11148B2208340AFD210CF0AD944F5BFBE8EBC8B50F004A2EF18593290C374A805CB66
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InterlockedDecrement.KERNEL32(?), ref: 00425EE2
                              • InterlockedIncrement.KERNEL32(02301680), ref: 00425F0D
                              Strings
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: Interlocked$DecrementIncrement
                              • String ID: (uC
                              • API String ID: 2172605799-1954698195
                              • Opcode ID: 53b6455aa11515e4d592943908821254474665f41ed4d2ddcc9aa7fdd670bcc6
                              • Instruction ID: 2ef626678910c1dd51139d3e05b6160cda8dcc3cebfc1a95911fe8bb1d646cc3
                              • Opcode Fuzzy Hash: 53b6455aa11515e4d592943908821254474665f41ed4d2ddcc9aa7fdd670bcc6
                              • Instruction Fuzzy Hash: ED01C271B05A32A7D731AB69B40975A7760BF04711F82401BE40067680CB7C6A418BCD
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapReAlloc.KERNEL32(00000000,-00000010,00000000,00000000,004227F6,00000000,?,00000000), ref: 004222BD
                              • HeapAlloc.KERNEL32(00000008,000041C4,00000000,00000000,004227F6,00000000,?,00000000), ref: 004222F3
                              • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004), ref: 0042230D
                              • HeapFree.KERNEL32(00000000,?), ref: 00422324
                              Memory Dump Source
                              • Source File: 00000003.00000002.168294392516.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000003.00000002.168294339811.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294479770.000000000042E000.00000002.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294540667.0000000000437000.00000004.00000001.01000000.00000004.sdmpDownload File
                              • Associated: 00000003.00000002.168294602921.0000000000440000.00000002.00000001.01000000.00000004.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_3_2_400000_8ue90oYkrv.jbxd
                              Similarity
                              • API ID: AllocHeap$FreeVirtual
                              • String ID:
                              • API String ID: 3499195154-0
                              • Opcode ID: 0c870cc8a4655f21a06016b126539c81d98b0a1c08310027ef35540e53e620a5
                              • Instruction ID: 80f46e53f3d67063a77e077d9957d308fce32a10db66055f6894e7dc000a9253
                              • Opcode Fuzzy Hash: 0c870cc8a4655f21a06016b126539c81d98b0a1c08310027ef35540e53e620a5
                              • Instruction Fuzzy Hash: 01118C36A00710EFC3218F25FD05927BBB5FB497207555ABAF592D32B0D3B0AC519B28
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Execution Graph

                              Execution Coverage:8.5%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:1%
                              Total number of Nodes:925
                              Total number of Limit Nodes:50
                              execution_graph 22818 6da218e0 22819 6da218f8 22818->22819 22820 6da218ef 22818->22820 22822 6da21950 22820->22822 22823 6da2196b FindCloseChangeNotification 22822->22823 22824 6da21976 22822->22824 22823->22824 22825 6da21989 22824->22825 22827 6da45ff4 66 API calls 22824->22827 22825->22819 22827->22825 22828 6da219c0 22829 6da219d2 ReadFile 22828->22829 22830 6da219cd 22828->22830 22831 6da219fd 22829->22831 22830->22829 22832 6da21a06 22831->22832 22833 6da21a0c GetLastError 22831->22833 22834 6da21a16 22833->22834 22835 6da21c20 22836 6da21c32 WriteFile 22835->22836 22837 6da21c2d 22835->22837 22838 6da21c69 22836->22838 22837->22836 22839 6da21c75 GetLastError 22838->22839 22840 6da21c6f 22838->22840 22841 6da21c7f 22839->22841 22842 6da26460 22843 6da264a0 22842->22843 22930 6da2abe0 22843->22930 22845 6da26522 22846 6da26528 22845->22846 22952 6da2ab10 22845->22952 22848 6da26565 22849 6da2655c 22849->22848 22850 6da265e7 22849->22850 22851 6da265bd 22849->22851 22853 6da26623 22850->22853 22856 6da265f6 22850->22856 22852 6da32e40 VariantClear 22851->22852 22855 6da265c5 22852->22855 22964 6da32e40 22853->22964 22858 6da32e40 VariantClear 22856->22858 22857 6da2663f 22859 6da2ab10 VariantClear 22857->22859 22860 6da265fe 22858->22860 22861 6da26651 22859->22861 22862 6da2665a 22861->22862 22968 6da263a0 22861->22968 22864 6da26683 22865 6da26689 22864->22865 22866 6da266c4 22864->22866 23019 6da3e770 71 API calls 22864->23019 22868 6da2673c 22866->22868 22869 6da266ec 22866->22869 22882 6da26fdb 22866->22882 22872 6da26791 22868->22872 22873 6da26767 22868->22873 23020 6da309e0 22869->23020 22871 6da309e0 67 API calls 22888 6da270cd 22871->22888 22875 6da2679b 22872->22875 22877 6da2716a 22872->22877 22874 6da32e40 VariantClear 22873->22874 22876 6da2676f 22874->22876 22880 6da32e40 VariantClear 22875->22880 22879 6da32e40 VariantClear 22877->22879 22878 6da266f3 22894 6da2688e 22879->22894 22881 6da267bf 22880->22881 22978 6da262b0 22881->22978 22882->22871 22882->22888 22884 6da267d5 22885 6da267db 22884->22885 22886 6da262b0 VariantClear 22884->22886 22887 6da26810 22886->22887 22887->22855 22889 6da262b0 VariantClear 22887->22889 22890 6da2682d 22889->22890 22890->22848 22891 6da2ab10 VariantClear 22890->22891 22892 6da26850 22891->22892 22892->22848 22990 6da3df80 22892->22990 22895 6da268ad 22996 6da24dd0 22895->22996 22897 6da268c0 23000 6da2a360 22897->23000 22900 6da26884 22900->22894 22900->22895 23026 6da307d0 CharUpperW CharUpperW 22900->23026 22901 6da268c9 22908 6da269f7 22901->22908 23025 6da26250 CreateDirectoryW GetLastError CreateDirectoryW GetCurrentDirectoryW 22901->23025 22903 6da309e0 67 API calls 22910 6da26e99 22903->22910 22904 6da26a86 22909 6da26c89 22904->22909 23004 6da325a0 22904->23004 22905 6da26a28 22922 6da26a42 22905->22922 23028 6da31140 RemoveDirectoryW RemoveDirectoryW GetCurrentDirectoryW 22905->23028 22908->22904 22908->22905 22909->22860 22909->22882 22909->22903 23009 6da32a70 22910->23009 22912 6da26931 22912->22908 22914 6da269db 22912->22914 22913 6da26aaa 22913->22909 22913->22910 22915 6da26c81 22913->22915 22916 6da26d35 22913->22916 22913->22922 23027 6da30f70 CreateFileW CreateFileW SetFileTime CloseHandle GetCurrentDirectoryW 22914->23027 23029 6da210e0 10 API calls 22915->23029 22918 6da26d3e 22916->22918 22919 6da26ebf 22916->22919 23030 6da210e0 10 API calls 22918->23030 23032 6da317b0 SetFileAttributesW SetFileAttributesW DeleteFileW DeleteFileW GetCurrentDirectoryW 22919->23032 22923 6da269f4 22923->22908 22924 6da26dd5 22924->22909 22929 6da26ecb 22924->22929 22926 6da26d55 22926->22860 22927 6da26dc8 22926->22927 23031 6da31210 MoveFileW MoveFileW GetCurrentDirectoryW 22927->23031 22929->22910 22929->22922 22931 6da2ac34 22930->22931 22932 6da2ac3a 22931->22932 22933 6da2ac59 22931->22933 22934 6da32e40 VariantClear 22932->22934 22935 6da2ad61 22933->22935 22938 6da32e40 VariantClear 22933->22938 22936 6da2ac43 22934->22936 22937 6da32e40 VariantClear 22935->22937 22936->22845 22939 6da2ad6a 22937->22939 22941 6da2ac9a 22938->22941 22939->22845 22940 6da2ad4b 22940->22845 22941->22940 22942 6da2acfe 22941->22942 22943 6da2acdf 22941->22943 22944 6da2ad3d 22942->22944 22949 6da2ad09 22942->22949 22945 6da32e40 VariantClear 22943->22945 22944->22935 22946 6da2ad42 22944->22946 22947 6da2ace8 22945->22947 22948 6da32e40 VariantClear 22946->22948 22947->22845 22948->22940 22950 6da32e40 VariantClear 22949->22950 22951 6da2ad27 22950->22951 22951->22845 22953 6da2ab66 22952->22953 22954 6da2ab88 22953->22954 22955 6da2ab6c 22953->22955 22957 6da2ab93 22954->22957 22959 6da2abbf 22954->22959 22956 6da32e40 VariantClear 22955->22956 22958 6da2ab75 22956->22958 22961 6da32e40 VariantClear 22957->22961 22958->22849 22960 6da32e40 VariantClear 22959->22960 22962 6da2abc8 22960->22962 22963 6da2aba7 22961->22963 22962->22849 22963->22849 22965 6da32e65 VariantClear 22964->22965 22966 6da32e4b 22964->22966 22965->22857 22966->22965 22967 6da32e59 22966->22967 22967->22857 22969 6da263f7 22968->22969 22970 6da26419 22969->22970 22971 6da263fd 22969->22971 22976 6da26435 22970->22976 23033 6da32f70 RaiseException 22970->23033 22972 6da32e40 VariantClear 22971->22972 22975 6da26406 22972->22975 22974 6da32e40 VariantClear 22977 6da2644a 22974->22977 22975->22864 22976->22974 22977->22864 22979 6da26309 22978->22979 22980 6da2630f 22979->22980 22981 6da2632d 22979->22981 22982 6da32e40 VariantClear 22980->22982 22983 6da26338 22981->22983 22984 6da2637b 22981->22984 22985 6da26318 22982->22985 22986 6da32e40 VariantClear 22983->22986 22987 6da32e40 VariantClear 22984->22987 22985->22884 22988 6da26361 22986->22988 22989 6da26384 22987->22989 22988->22884 22989->22884 22993 6da3dfb7 22990->22993 22991 6da3e021 23035 6da24d10 67 API calls 22991->23035 22993->22991 22995 6da3dfda 22993->22995 23034 6da24d10 67 API calls 22993->23034 22995->22900 22998 6da24de9 22996->22998 22997 6da24e2a 22997->22897 22998->22997 23036 6da45ff4 66 API calls 22998->23036 23001 6da2a51c 23000->23001 23002 6da2a399 23000->23002 23001->22901 23002->23001 23037 6da2a240 23002->23037 23049 6da32470 23004->23049 23007 6da325f0 23007->22913 23008 6da325e9 FindClose 23008->23007 23010 6da32ab3 CreateFileW 23009->23010 23011 6da32a9e CloseHandle 23009->23011 23014 6da32ad9 23010->23014 23017 6da32b33 23010->23017 23012 6da32b57 23011->23012 23013 6da32aad 23011->23013 23012->22882 23013->23010 23015 6da328a0 GetCurrentDirectoryW 23014->23015 23016 6da32b00 23015->23016 23016->23017 23018 6da32b15 CreateFileW 23016->23018 23017->22882 23018->23017 23019->22866 23073 6da45f2a 23020->23073 23023 6da30a07 23023->22878 23025->22912 23026->22900 23027->22923 23028->22922 23029->22909 23030->22926 23031->22924 23032->22924 23033->22976 23034->22993 23035->22995 23036->22998 23045 6da2a250 23037->23045 23038 6da2a2b7 23047 6da2a1c0 CharUpperW CharUpperW 23038->23047 23040 6da2a2c5 23042 6da2a2e1 23040->23042 23048 6da2a1c0 CharUpperW CharUpperW 23040->23048 23042->23002 23044 6da2a2d7 23044->23002 23045->23038 23045->23042 23046 6da307d0 CharUpperW CharUpperW 23045->23046 23046->23045 23047->23040 23048->23044 23050 6da324c3 FindClose 23049->23050 23051 6da324d8 FindFirstFileW 23049->23051 23052 6da324d2 23050->23052 23054 6da32542 23050->23054 23053 6da324eb 23051->23053 23051->23054 23052->23051 23060 6da328a0 23053->23060 23064 6da451c7 23054->23064 23057 6da32589 23057->23007 23057->23008 23058 6da3251d 23058->23054 23059 6da32534 FindFirstFileW 23058->23059 23059->23054 23062 6da328e4 23060->23062 23061 6da3298b GetCurrentDirectoryW 23063 6da329a4 23061->23063 23062->23061 23062->23063 23063->23058 23065 6da451d1 IsDebuggerPresent 23064->23065 23066 6da451cf 23064->23066 23072 6da484c5 23065->23072 23066->23057 23069 6da46ba3 SetUnhandledExceptionFilter UnhandledExceptionFilter 23070 6da46bc0 23069->23070 23071 6da46bc8 GetCurrentProcess TerminateProcess 23069->23071 23070->23071 23071->23057 23072->23069 23074 6da45fdd 23073->23074 23084 6da45f3c 23073->23084 23099 6da49494 6 API calls 23074->23099 23076 6da45fe3 23100 6da47f70 66 API calls 23076->23100 23081 6da45f99 RtlAllocateHeap 23081->23084 23082 6da45f4d 23082->23084 23092 6da46fbb 66 API calls 23082->23092 23093 6da46e10 66 API calls 23082->23093 23094 6da47814 GetModuleHandleW GetProcAddress ExitProcess 23082->23094 23084->23081 23084->23082 23085 6da45fc9 23084->23085 23088 6da45fce 23084->23088 23090 6da309ed 23084->23090 23095 6da45edb 66 API calls 23084->23095 23096 6da49494 6 API calls 23084->23096 23097 6da47f70 66 API calls 23085->23097 23098 6da47f70 66 API calls 23088->23098 23090->23023 23091 6da4663b RaiseException 23090->23091 23091->23023 23092->23082 23093->23082 23095->23084 23096->23084 23097->23088 23098->23090 23099->23076 23100->23090 23101 6da27350 23102 6da27516 23101->23102 23107 6da27389 23101->23107 23103 6da27462 23103->23102 23104 6da263a0 2 API calls 23103->23104 23105 6da27491 23103->23105 23104->23105 23106 6da274eb 23105->23106 23116 6da31060 SetFileAttributesW 23105->23116 23107->23102 23107->23103 23108 6da2742b SetFileTime 23107->23108 23111 6da21be0 23108->23111 23112 6da21be8 FindCloseChangeNotification 23111->23112 23113 6da21bf3 23111->23113 23112->23113 23114 6da21bfd GetLastError 23112->23114 23113->23103 23115 6da21c07 23114->23115 23115->23103 23117 6da31099 23116->23117 23118 6da310ad 23116->23118 23117->23106 23119 6da328a0 GetCurrentDirectoryW 23118->23119 23120 6da310d6 23119->23120 23121 6da31115 23120->23121 23122 6da310e8 SetFileAttributesW 23120->23122 23121->23106 23123 6da310fb 23122->23123 23123->23106 23124 6da428b0 23125 6da428f6 23124->23125 23126 6da428bd 23124->23126 23126->23125 23130 6da42bf0 23126->23130 23131 6da42bf9 FreeLibrary 23130->23131 23132 6da42c0a 23130->23132 23131->23132 23133 6da428f1 23132->23133 23134 6da42c13 DeleteFileW 23132->23134 23135 6da42a30 23133->23135 23134->23133 23136 6da42a94 23135->23136 23137 6da42aac 23136->23137 23138 6da42b5b 23136->23138 23149 6da42b13 FindFirstFileW 23137->23149 23164 6da42c40 69 API calls 23138->23164 23140 6da42b65 23141 6da42b76 FindResourceW 23140->23141 23142 6da42bb2 23140->23142 23141->23142 23143 6da42b88 23141->23143 23146 6da451c7 5 API calls 23142->23146 23154 6da42980 LoadResource 23143->23154 23145 6da42b94 23145->23142 23148 6da42ba6 LoadLibraryW 23145->23148 23147 6da42bdd 23146->23147 23147->23125 23148->23142 23150 6da42b72 23149->23150 23151 6da42b2d 23149->23151 23150->23141 23152 6da42b3b LoadLibraryW FindClose 23151->23152 23153 6da42b54 23152->23153 23153->23142 23155 6da4299f SizeofResource 23154->23155 23156 6da42a1b 23154->23156 23155->23156 23157 6da429ad LockResource 23155->23157 23156->23145 23157->23156 23158 6da429ba CreateFileW 23157->23158 23158->23156 23159 6da429dc WriteFile 23158->23159 23160 6da429ef FindCloseChangeNotification 23159->23160 23162 6da42a04 DeleteFileW 23160->23162 23163 6da42a10 23160->23163 23162->23163 23163->23145 23164->23140 23165 6da43ef0 23181 6da43f2d 23165->23181 23166 6da45f2a 66 API calls 23167 6da44333 23166->23167 23168 6da4434d 23167->23168 23293 6da4663b RaiseException 23167->23293 23183 6da41230 23168->23183 23173 6da4437e 23294 6da41a40 67 API calls 23173->23294 23175 6da4439e 23176 6da440d3 23175->23176 23177 6da443d5 23175->23177 23295 6da45bd8 6 API calls 23175->23295 23179 6da443e0 23177->23179 23296 6da45bd8 6 API calls 23177->23296 23179->23176 23297 6da45bd8 6 API calls 23179->23297 23181->23166 23181->23176 23184 6da45f2a 66 API calls 23183->23184 23185 6da4125d 23184->23185 23186 6da41277 23185->23186 23298 6da4663b RaiseException 23185->23298 23188 6da382b0 23186->23188 23299 6da2f940 23188->23299 23190 6da38305 23191 6da38329 23190->23191 23450 6da4663b RaiseException 23190->23450 23193 6da24dd0 66 API calls 23191->23193 23194 6da38334 23193->23194 23303 6da37df0 23194->23303 23196 6da38340 23307 6da23be0 23196->23307 23199 6da38395 23322 6da242e0 23199->23322 23203 6da45f2a 66 API calls 23204 6da383b6 23203->23204 23206 6da383d0 23204->23206 23452 6da4663b RaiseException 23204->23452 23366 6da36cc0 23206->23366 23210 6da3846d 23385 6da372f0 23210->23385 23213 6da38498 23235 6da384b7 23213->23235 23455 6da4663b RaiseException 23213->23455 23214 6da3841b 23214->23210 23454 6da4663b RaiseException 23214->23454 23216 6da38834 23217 6da309e0 67 API calls 23216->23217 23246 6da3883b 23217->23246 23218 6da38c70 23426 6da34c00 23218->23426 23220 6da38819 23468 6da4663b RaiseException 23220->23468 23221 6da38d65 23482 6da4663b RaiseException 23221->23482 23223 6da38cfe 23480 6da4663b RaiseException 23223->23480 23225 6da38cb4 23225->23223 23226 6da38ce9 23225->23226 23230 6da38d19 23225->23230 23478 6da4663b RaiseException 23225->23478 23479 6da4663b RaiseException 23226->23479 23228 6da38d80 23483 6da4663b RaiseException 23228->23483 23230->23221 23232 6da38d4a 23230->23232 23284 6da38af7 23230->23284 23481 6da4663b RaiseException 23232->23481 23234 6da38d9d 23484 6da4663b RaiseException 23234->23484 23235->23216 23235->23218 23235->23220 23456 6da4e5ce 67 API calls 23235->23456 23239 6da38db8 23485 6da4663b RaiseException 23239->23485 23240 6da38531 23251 6da3854a 23240->23251 23457 6da393a0 67 API calls 23240->23457 23242 6da38dd3 23245 6da38b71 23245->23173 23390 6da30880 23246->23390 23248 6da389c1 23249 6da389eb 23248->23249 23469 6da25290 67 API calls 23248->23469 23398 6da28ab0 23249->23398 23458 6da3a7b0 CharUpperW CharUpperW 23251->23458 23254 6da3866d 23256 6da38671 23254->23256 23257 6da3868c 23254->23257 23255 6da38aa3 23258 6da38c55 23255->23258 23259 6da38aae 23255->23259 23459 6da4663b RaiseException 23256->23459 23460 6da3b9c0 146 API calls 23257->23460 23477 6da4663b RaiseException 23258->23477 23267 6da38b95 23259->23267 23269 6da38ad8 23259->23269 23260 6da38a88 23472 6da4663b RaiseException 23260->23472 23264 6da38a3e 23264->23255 23264->23259 23264->23260 23265 6da38a6d 23264->23265 23470 6da4663b RaiseException 23264->23470 23471 6da4663b RaiseException 23265->23471 23287 6da38bb4 23267->23287 23475 6da4663b RaiseException 23267->23475 23269->23284 23473 6da4663b RaiseException 23269->23473 23271 6da38728 23275 6da38733 23271->23275 23276 6da387fe 23271->23276 23273 6da386b2 23273->23271 23274 6da3870d 23273->23274 23273->23275 23277 6da386f2 23273->23277 23461 6da4663b RaiseException 23273->23461 23463 6da4663b RaiseException 23274->23463 23285 6da38752 23275->23285 23464 6da4663b RaiseException 23275->23464 23467 6da4663b RaiseException 23276->23467 23462 6da4663b RaiseException 23277->23462 23474 6da38de0 66 API calls 23284->23474 23465 6da38270 EnterCriticalSection LeaveCriticalSection 23285->23465 23476 6da38de0 66 API calls 23287->23476 23289 6da38c2e 23289->23173 23290 6da38796 23466 6da38de0 66 API calls 23290->23466 23292 6da387da 23292->23173 23293->23168 23294->23175 23295->23177 23296->23179 23297->23176 23298->23186 23301 6da2f97d 23299->23301 23302 6da2fb0c 23301->23302 23486 6da24d10 67 API calls 23301->23486 23302->23190 23304 6da37e4b 23303->23304 23487 6da37c10 23304->23487 23306 6da37ecb 23306->23196 23491 6da2fc80 23307->23491 23309 6da23c1c 23496 6da453fe 23309->23496 23313 6da23c2d 23314 6da453fe 66 API calls 23313->23314 23315 6da23c43 23314->23315 23316 6da4539a 66 API calls 23315->23316 23317 6da23c49 23316->23317 23318 6da453fe 66 API calls 23317->23318 23319 6da23c5f 23318->23319 23320 6da4539a 66 API calls 23319->23320 23321 6da23c65 23320->23321 23321->23199 23451 6da4663b RaiseException 23321->23451 23328 6da2431b 23322->23328 23323 6da22670 RaiseException 23323->23328 23325 6da23cf0 CharUpperW RaiseException 23325->23328 23326 6da22d80 98 API calls 23326->23328 23328->23323 23328->23325 23328->23326 23329 6da24579 23328->23329 23331 6da24583 23328->23331 23332 6da2474d 23328->23332 23350 6da24936 CharUpperW 23328->23350 23365 6da246c7 23328->23365 23518 6da226e0 23328->23518 23552 6da22940 86 API calls 23328->23552 23553 6da22670 RaiseException 23329->23553 23333 6da245c8 23331->23333 23554 6da22d80 98 API calls 23331->23554 23561 6da23750 74 API calls 23332->23561 23336 6da245f1 23333->23336 23555 6da22d80 98 API calls 23333->23555 23340 6da2460d 23336->23340 23556 6da3e950 69 API calls 23336->23556 23337 6da2475f 23562 6da239a0 67 API calls 23337->23562 23522 6da23250 23340->23522 23344 6da3ed50 69 API calls 23346 6da24a74 23344->23346 23346->23203 23348 6da24623 23557 6da24d10 67 API calls 23348->23557 23349 6da2466f 23530 6da23e70 23349->23530 23350->23328 23352 6da2487b 23356 6da23250 74 API calls 23352->23356 23353 6da2485a 23353->23352 23564 6da4663b RaiseException 23353->23564 23356->23365 23357 6da2476c 23357->23352 23357->23353 23563 6da4663b RaiseException 23357->23563 23358 6da2464e 23558 6da24d10 67 API calls 23358->23558 23362 6da2465b 23362->23365 23559 6da239a0 67 API calls 23362->23559 23363 6da2469b 23363->23365 23560 6da4663b RaiseException 23363->23560 23365->23344 23381 6da36d1e 23366->23381 23367 6da36fe8 23368 6da37001 23367->23368 23369 6da36ff5 23367->23369 23682 6da35c80 16 API calls 23368->23682 23681 6da369e0 78 API calls 23369->23681 23372 6da3700b 23683 6da369e0 78 API calls 23372->23683 23373 6da37119 23374 6da451c7 5 API calls 23373->23374 23376 6da37139 23374->23376 23376->23214 23453 6da4663b RaiseException 23376->23453 23378 6da3703f 23384 6da36ffc 23378->23384 23684 6da36b40 85 API calls 23378->23684 23381->23367 23679 6da36280 67 API calls 23381->23679 23680 6da37860 67 API calls 23381->23680 23382 6da37094 23382->23384 23685 6da36b40 85 API calls 23382->23685 23384->23373 23387 6da37329 23385->23387 23386 6da373fa 23386->23213 23387->23386 23389 6da30880 RaiseException 23387->23389 23686 6da307d0 CharUpperW CharUpperW 23387->23686 23389->23387 23391 6da3088d 23390->23391 23396 6da308fc 23390->23396 23392 6da308aa 23391->23392 23687 6da4663b RaiseException 23391->23687 23395 6da308d2 23392->23395 23688 6da4663b RaiseException 23392->23688 23395->23396 23689 6da4663b RaiseException 23395->23689 23396->23248 23406 6da28b3d 23398->23406 23399 6da28ca8 23400 6da45f2a 66 API calls 23399->23400 23401 6da28cb5 23400->23401 23402 6da28cfd 23401->23402 23743 6da4663b RaiseException 23401->23743 23690 6da28400 23402->23690 23405 6da32470 9 API calls 23405->23406 23406->23399 23406->23405 23407 6da28ccf 23406->23407 23408 6da28bf8 FindClose 23406->23408 23410 6da28ce6 23406->23410 23411 6da30880 RaiseException 23406->23411 23744 6da4663b RaiseException 23407->23744 23408->23406 23745 6da4663b RaiseException 23410->23745 23411->23406 23413 6da32470 9 API calls 23423 6da28d0f 23413->23423 23414 6da28e9f FindClose 23414->23423 23415 6da29969 23747 6da4663b RaiseException 23415->23747 23417 6da29980 23420 6da37240 CharUpperW CharUpperW 23420->23423 23423->23413 23423->23414 23423->23415 23423->23420 23424 6da28d9f 23423->23424 23425 6da29d00 RaiseException 23423->23425 23696 6da29f10 23423->23696 23701 6da2cae0 23423->23701 23720 6da28670 23423->23720 23746 6da307d0 CharUpperW CharUpperW 23423->23746 23424->23264 23425->23423 23430 6da34c52 23426->23430 23444 6da352a9 23426->23444 23427 6da32470 9 API calls 23427->23430 23428 6da34cdf FindClose 23428->23430 23429 6da2cae0 87 API calls 23429->23430 23430->23427 23430->23428 23430->23429 23430->23430 23431 6da352c1 23430->23431 23441 6da2abe0 VariantClear 23430->23441 23442 6da2ab10 VariantClear 23430->23442 23430->23444 23445 6da34a10 VariantClear RaiseException 23430->23445 23447 6da34b60 VariantClear 23430->23447 23895 6da35440 23430->23895 23907 6da3e6e0 71 API calls 23430->23907 23908 6da34ac0 VariantClear 23430->23908 23909 6da46308 66 API calls 23430->23909 23910 6da35560 67 API calls 23430->23910 23432 6da35315 23431->23432 23434 6da35327 23431->23434 23435 6da352eb 23431->23435 23911 6da4663b RaiseException 23431->23911 23914 6da4663b RaiseException 23432->23914 23434->23225 23437 6da35303 23435->23437 23912 6da4663b RaiseException 23435->23912 23913 6da4663b RaiseException 23437->23913 23441->23430 23442->23430 23444->23225 23445->23430 23447->23430 23450->23191 23451->23199 23452->23206 23453->23214 23454->23210 23455->23235 23456->23240 23457->23251 23458->23254 23459->23257 23460->23273 23461->23277 23462->23274 23463->23271 23464->23285 23465->23290 23466->23292 23467->23220 23468->23216 23469->23248 23470->23265 23471->23260 23472->23255 23473->23284 23474->23245 23475->23287 23476->23289 23477->23218 23478->23226 23479->23223 23480->23230 23481->23221 23482->23228 23483->23234 23484->23239 23485->23242 23486->23301 23488 6da37c7f 23487->23488 23489 6da41230 67 API calls 23488->23489 23490 6da37d20 23489->23490 23490->23306 23492 6da2fc9a 23491->23492 23495 6da2fd05 23491->23495 23492->23495 23511 6da2fd20 69 API calls 23492->23511 23512 6da24d10 67 API calls 23492->23512 23495->23309 23497 6da4540d 23496->23497 23501 6da23c27 23496->23501 23513 6da47f70 66 API calls 23497->23513 23499 6da45412 23514 6da45bb2 6 API calls 23499->23514 23502 6da4539a 23501->23502 23503 6da453b6 23502->23503 23504 6da453a7 23502->23504 23509 6da453da 23503->23509 23516 6da47f70 66 API calls 23503->23516 23515 6da47f70 66 API calls 23504->23515 23506 6da453ac 23506->23313 23508 6da453ca 23517 6da45bb2 6 API calls 23508->23517 23509->23313 23511->23492 23512->23492 23513->23499 23515->23506 23516->23508 23519 6da22720 23518->23519 23519->23519 23520 6da22745 CharUpperW 23519->23520 23521 6da2276e 23520->23521 23521->23328 23523 6da23258 23522->23523 23524 6da23279 23522->23524 23523->23524 23565 6da23070 23523->23565 23526 6da3ed50 23524->23526 23528 6da3ed5a 23526->23528 23527 6da2461d 23527->23348 23527->23349 23528->23527 23587 6da3e7f0 69 API calls 23528->23587 23588 6da34320 23530->23588 23532 6da23f6f 23533 6da241a5 23532->23533 23538 6da23f83 23532->23538 23617 6da4663b RaiseException 23533->23617 23535 6da241ba 23536 6da2401c 23548 6da24047 23536->23548 23614 6da4663b RaiseException 23536->23614 23537 6da240cf 23616 6da2d620 CharUpperW CharUpperW RaiseException 23537->23616 23538->23536 23613 6da24d10 67 API calls 23538->23613 23542 6da240f6 23544 6da30880 RaiseException 23542->23544 23545 6da24104 23544->23545 23547 6da30880 RaiseException 23545->23547 23550 6da2410f 23547->23550 23548->23537 23602 6da31df0 23548->23602 23615 6da24d10 67 API calls 23548->23615 23549 6da24d10 67 API calls 23549->23550 23550->23549 23551 6da2414c 23550->23551 23551->23362 23552->23328 23553->23331 23554->23333 23555->23336 23556->23340 23557->23358 23558->23362 23559->23363 23560->23365 23561->23337 23562->23357 23563->23353 23564->23352 23578 6da23030 23565->23578 23568 6da23030 10 API calls 23572 6da230b3 23568->23572 23569 6da230d9 23575 6da231ce 23569->23575 23576 6da25a70 67 API calls 23569->23576 23577 6da30880 RaiseException 23569->23577 23586 6da307d0 CharUpperW CharUpperW 23569->23586 23570 6da23235 23570->23523 23572->23569 23582 6da22f70 23572->23582 23574 6da23070 74 API calls 23574->23575 23575->23570 23575->23574 23576->23569 23577->23569 23579 6da2306a 23578->23579 23580 6da2303b 23578->23580 23579->23568 23580->23579 23581 6da22f70 10 API calls 23580->23581 23581->23580 23583 6da22fa2 23582->23583 23585 6da22fef 23582->23585 23584 6da325a0 10 API calls 23583->23584 23583->23585 23584->23585 23585->23572 23586->23569 23587->23528 23589 6da343cb 23588->23589 23590 6da3437a 23588->23590 23591 6da30880 RaiseException 23589->23591 23590->23589 23597 6da3441d 23590->23597 23618 6da335f0 23590->23618 23661 6da33460 67 API calls 23590->23661 23593 6da343d5 23591->23593 23595 6da30880 RaiseException 23593->23595 23596 6da343e0 23595->23596 23598 6da30880 RaiseException 23596->23598 23597->23532 23599 6da343eb 23598->23599 23600 6da30880 RaiseException 23599->23600 23601 6da343f6 23600->23601 23601->23532 23603 6da31e25 GetFullPathNameW 23602->23603 23604 6da31e14 23602->23604 23607 6da31e46 23603->23607 23604->23603 23605 6da31e5f 23605->23548 23606 6da31e87 GetFullPathNameW 23610 6da31ea5 23606->23610 23607->23605 23607->23606 23607->23610 23608 6da31edd 23678 6da31cc0 CharUpperW CharUpperW 23608->23678 23609 6da31ecc lstrlenW 23609->23608 23610->23605 23610->23608 23610->23609 23612 6da31ef0 23612->23548 23613->23538 23614->23548 23615->23548 23616->23542 23617->23535 23620 6da33628 23618->23620 23619 6da34303 23619->23590 23620->23619 23654 6da336e8 23620->23654 23658 6da33e62 23620->23658 23621 6da32470 9 API calls 23621->23654 23623 6da32470 9 API calls 23646 6da33a79 23623->23646 23624 6da337c3 FindClose 23624->23654 23625 6da34213 GetLastError 23626 6da34225 GetLastError 23625->23626 23635 6da3426f 23625->23635 23629 6da34257 23626->23629 23630 6da34234 23626->23630 23627 6da337d1 GetLastError 23627->23654 23628 6da33b47 FindClose 23628->23646 23676 6da24d10 67 API calls 23629->23676 23636 6da30880 RaiseException 23630->23636 23632 6da30880 RaiseException 23632->23658 23633 6da24d10 67 API calls 23633->23654 23634 6da33c19 GetLastError 23634->23646 23641 6da342a5 FindClose 23635->23641 23642 6da342ac 23635->23642 23636->23629 23638 6da30880 RaiseException 23638->23654 23639 6da24d10 67 API calls 23639->23646 23641->23642 23642->23590 23643 6da30880 RaiseException 23643->23646 23644 6da24d10 67 API calls 23644->23658 23645 6da342c4 23647 6da34301 23645->23647 23648 6da342fa FindClose 23645->23648 23646->23623 23646->23628 23646->23634 23646->23639 23646->23643 23652 6da33db4 23646->23652 23666 6da334f0 84 API calls 23646->23666 23647->23619 23648->23647 23651 6da3e790 69 API calls 23651->23658 23652->23590 23654->23621 23654->23624 23654->23627 23654->23633 23654->23638 23654->23646 23660 6da33ba9 23654->23660 23662 6da3e790 69 API calls 23654->23662 23663 6da331d0 67 API calls 23654->23663 23664 6da3e370 CharUpperW CharUpperW 23654->23664 23665 6da334f0 84 API calls 23654->23665 23658->23625 23658->23632 23658->23644 23658->23645 23658->23651 23667 6da32790 10 API calls 23658->23667 23668 6da331d0 67 API calls 23658->23668 23669 6da3e370 CharUpperW CharUpperW 23658->23669 23670 6da25bb0 23658->23670 23675 6da334f0 84 API calls 23658->23675 23660->23590 23661->23590 23662->23654 23663->23654 23664->23654 23665->23654 23666->23646 23667->23658 23668->23658 23669->23658 23671 6da30880 RaiseException 23670->23671 23674 6da25bc8 23671->23674 23672 6da25be6 23672->23658 23674->23672 23677 6da24d10 67 API calls 23674->23677 23675->23658 23676->23635 23677->23674 23678->23612 23679->23381 23680->23381 23681->23384 23682->23372 23683->23378 23684->23382 23685->23384 23686->23387 23687->23392 23688->23395 23689->23396 23691 6da28473 23690->23691 23692 6da45f2a 66 API calls 23691->23692 23693 6da284fb 23692->23693 23694 6da28515 23693->23694 23748 6da4663b RaiseException 23693->23748 23694->23423 23697 6da30880 RaiseException 23696->23697 23698 6da29f2e 23697->23698 23699 6da29f81 23698->23699 23700 6da30880 RaiseException 23698->23700 23699->23423 23700->23698 23702 6da45f2a 66 API calls 23701->23702 23703 6da2cb1d 23702->23703 23705 6da2cb35 23703->23705 23769 6da4663b RaiseException 23703->23769 23706 6da31df0 5 API calls 23705->23706 23718 6da2cc8c 23705->23718 23707 6da2cbcc 23706->23707 23709 6da2cbd3 GetLastError 23707->23709 23715 6da2cc24 23707->23715 23714 6da2cbe4 23709->23714 23710 6da2ccbc 23713 6da2ccc2 23710->23713 23770 6da24d10 67 API calls 23710->23770 23712 6da2cd2e 23719 6da2cd7e 23712->23719 23771 6da24d10 67 API calls 23712->23771 23713->23423 23714->23423 23749 6da2a910 23715->23749 23755 6da2c430 23718->23755 23719->23423 23721 6da287cd 23720->23721 23727 6da286cf 23720->23727 23726 6da287d9 23721->23726 23849 6da2a5c0 23721->23849 23723 6da2abe0 VariantClear 23723->23727 23724 6da286e1 23724->23423 23725 6da2ab10 VariantClear 23725->23727 23726->23423 23727->23721 23727->23723 23727->23724 23727->23725 23878 6da3e6e0 71 API calls 23727->23878 23879 6da29d00 RaiseException 23727->23879 23729 6da288d1 23730 6da28931 23729->23730 23853 6da31420 23729->23853 23864 6da25e10 23730->23864 23733 6da2890f 23733->23730 23735 6da28916 GetLastError 23733->23735 23734 6da28967 23868 6da2d1b0 23734->23868 23880 6da4663b RaiseException 23735->23880 23739 6da28a26 23740 6da32e40 VariantClear 23739->23740 23740->23724 23741 6da28974 23741->23724 23741->23739 23881 6da32f70 RaiseException 23741->23881 23743->23407 23744->23410 23745->23402 23746->23423 23747->23417 23748->23694 23750 6da2a943 23749->23750 23751 6da325a0 10 API calls 23750->23751 23752 6da2a966 23751->23752 23754 6da2a997 23752->23754 23772 6da4663b RaiseException 23752->23772 23754->23718 23766 6da2c46b 23755->23766 23756 6da2c88a 23759 6da32e40 VariantClear 23756->23759 23757 6da2caa1 23760 6da32e40 VariantClear 23757->23760 23761 6da2c893 23759->23761 23768 6da2c860 23760->23768 23761->23710 23762 6da32e40 VariantClear 23762->23766 23763 6da2abe0 VariantClear 23763->23766 23766->23710 23766->23756 23766->23757 23766->23762 23766->23763 23767 6da2ce60 67 API calls 23766->23767 23766->23768 23773 6da2c2d0 23766->23773 23789 6da2ae70 23766->23789 23828 6da2ad90 VariantClear 23766->23828 23767->23766 23768->23710 23769->23705 23770->23712 23771->23712 23772->23754 23774 6da2c351 23773->23774 23775 6da2c311 23773->23775 23776 6da45f2a 66 API calls 23774->23776 23777 6da45f2a 66 API calls 23775->23777 23778 6da2c358 23776->23778 23779 6da2c318 23777->23779 23780 6da2c374 23778->23780 23830 6da4663b RaiseException 23778->23830 23783 6da2c334 23779->23783 23829 6da4663b RaiseException 23779->23829 23784 6da32a70 4 API calls 23780->23784 23785 6da2ae70 12 API calls 23783->23785 23786 6da2c3b8 23784->23786 23788 6da2c3d3 23785->23788 23786->23783 23787 6da2c3bc GetLastError 23786->23787 23787->23788 23788->23766 23796 6da2aecd 23789->23796 23790 6da2afba 23791 6da30880 RaiseException 23790->23791 23817 6da2afca 23791->23817 23792 6da2b0fa 23802 6da451c7 5 API calls 23792->23802 23793 6da2afe4 23795 6da2b0e3 23793->23795 23800 6da30880 RaiseException 23793->23800 23839 6da307d0 CharUpperW CharUpperW 23793->23839 23840 6da30930 RaiseException 23793->23840 23794 6da2b1a8 23794->23792 23812 6da2b639 23794->23812 23821 6da30880 RaiseException 23794->23821 23795->23792 23795->23794 23808 6da2b734 23795->23808 23841 6da307d0 CharUpperW CharUpperW 23795->23841 23796->23790 23796->23793 23799 6da2b19d 23799->23794 23799->23808 23800->23793 23804 6da2bd53 23802->23804 23803 6da2b6ea 23809 6da2b9e7 23803->23809 23803->23817 23844 6da307d0 CharUpperW CharUpperW 23803->23844 23804->23766 23806 6da2b6c4 23810 6da29f10 RaiseException 23806->23810 23808->23792 23808->23803 23815 6da2b915 23808->23815 23842 6da307d0 CharUpperW CharUpperW 23808->23842 23809->23817 23845 6da307d0 CharUpperW CharUpperW 23809->23845 23810->23803 23812->23806 23816 6da30880 RaiseException 23812->23816 23813 6da2bee7 VariantClear 23819 6da2bef4 23813->23819 23814 6da2be65 23814->23792 23814->23813 23814->23819 23843 6da30930 RaiseException 23815->23843 23816->23812 23817->23792 23817->23814 23831 6da21ab0 23817->23831 23824 6da2c0f3 23819->23824 23825 6da2bf38 23819->23825 23820 6da2c122 23848 6da280f0 CharUpperW CharUpperW 23820->23848 23821->23794 23824->23820 23847 6da307d0 CharUpperW CharUpperW 23824->23847 23846 6da280f0 CharUpperW CharUpperW 23825->23846 23828->23766 23829->23783 23830->23780 23832 6da21ac3 23831->23832 23833 6da21ad0 SetFilePointer 23831->23833 23832->23817 23834 6da21b01 GetLastError 23833->23834 23835 6da21b0b 23833->23835 23834->23835 23836 6da21b25 23835->23836 23837 6da21b2f GetLastError 23835->23837 23836->23817 23838 6da21b35 23837->23838 23838->23817 23839->23793 23840->23793 23841->23799 23842->23808 23843->23803 23844->23803 23845->23809 23846->23792 23847->23824 23848->23792 23850 6da2a5fc 23849->23850 23851 6da2a240 2 API calls 23850->23851 23852 6da2a60d 23851->23852 23852->23729 23855 6da31454 23853->23855 23859 6da31659 23855->23859 23882 6da31340 CreateDirectoryW 23855->23882 23856 6da31528 GetLastError 23857 6da31630 23856->23857 23863 6da31520 23856->23863 23858 6da325a0 10 API calls 23857->23858 23861 6da31655 23858->23861 23859->23733 23860 6da31340 4 API calls 23860->23861 23861->23859 23861->23860 23862 6da31340 4 API calls 23862->23863 23863->23856 23863->23859 23863->23861 23863->23862 23865 6da25e5d 23864->23865 23866 6da25bb0 67 API calls 23865->23866 23867 6da25f27 23866->23867 23867->23734 23873 6da2d487 23868->23873 23875 6da2d1ec 23868->23875 23869 6da2d415 23871 6da30880 RaiseException 23869->23871 23869->23873 23871->23869 23873->23741 23875->23869 23875->23873 23877 6da32e40 VariantClear 23875->23877 23891 6da2d100 SysAllocString VariantClear RaiseException 23875->23891 23892 6da24d10 67 API calls 23875->23892 23893 6da32ec0 VariantClear VariantCopy 23875->23893 23894 6da4663b RaiseException 23875->23894 23877->23875 23878->23727 23879->23727 23880->23730 23881->23739 23883 6da31378 23882->23883 23884 6da3138c GetLastError 23882->23884 23883->23863 23885 6da31399 23884->23885 23889 6da313ff 23884->23889 23886 6da328a0 GetCurrentDirectoryW 23885->23886 23887 6da313bf 23886->23887 23888 6da313d1 CreateDirectoryW 23887->23888 23887->23889 23890 6da313e5 23888->23890 23889->23863 23890->23863 23891->23875 23892->23875 23893->23875 23894->23875 23896 6da35478 23895->23896 23898 6da3547d 23895->23898 23915 6da2ed10 67 API calls 23896->23915 23899 6da35509 23898->23899 23916 6da359c0 67 API calls 23898->23916 23899->23430 23901 6da354a9 23902 6da354c0 23901->23902 23917 6da45bd8 6 API calls 23901->23917 23905 6da354cd 23902->23905 23918 6da45bd8 6 API calls 23902->23918 23905->23899 23919 6da45ff4 66 API calls 23905->23919 23907->23430 23908->23430 23909->23430 23910->23430 23911->23435 23912->23437 23913->23432 23914->23434 23915->23898 23916->23901 23917->23902 23918->23905 23919->23899 23920 6da43c8e 23924 6da43bd7 23920->23924 23921 6da43d60 23922 6da382b0 198 API calls 23923 6da43c62 23922->23923 23924->23921 23924->23922 23925 6da4658b 23926 6da46596 23925->23926 23927 6da4659b 23925->23927 23939 6da4a8ed GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 23926->23939 23931 6da46495 23927->23931 23930 6da465a9 23932 6da464a1 23931->23932 23936 6da4653e 23932->23936 23937 6da464ee 23932->23937 23940 6da46360 23932->23940 23934 6da4651e 23935 6da46360 155 API calls 23934->23935 23934->23936 23935->23936 23936->23930 23937->23934 23937->23936 23938 6da46360 155 API calls 23937->23938 23938->23934 23939->23927 23941 6da4636f 23940->23941 23942 6da463eb 23940->23942 23989 6da493e1 HeapCreate 23941->23989 23944 6da463f1 23942->23944 23945 6da46422 23942->23945 23949 6da4637a 23944->23949 23950 6da4640c 23944->23950 24000 6da47a46 66 API calls 23944->24000 23946 6da46427 23945->23946 23947 6da46480 23945->23947 24004 6da470ea 8 API calls 23946->24004 23947->23949 24009 6da47404 78 API calls 23947->24009 23949->23937 23950->23949 24001 6da47ee0 67 API calls 23950->24001 23952 6da46381 23991 6da47472 77 API calls 23952->23991 23955 6da4642c 24005 6da47653 66 API calls 23955->24005 23957 6da46386 23966 6da46396 GetCommandLineA 23957->23966 23983 6da4638a 23957->23983 23960 6da46416 24002 6da4711e 69 API calls 23960->24002 23961 6da46438 23961->23949 24006 6da4706f 6 API calls 23961->24006 23965 6da4641b 24003 6da49411 VirtualFree HeapFree HeapFree HeapDestroy 23965->24003 23993 6da4a76a 75 API calls 23966->23993 23967 6da46456 23972 6da46474 23967->23972 23973 6da4645d 23967->23973 23970 6da463a6 23994 6da47c8c 71 API calls 23970->23994 24008 6da45ff4 66 API calls 23972->24008 24007 6da4715b 66 API calls 23973->24007 23974 6da463b0 23977 6da463b4 23974->23977 23996 6da4a6af 111 API calls 23974->23996 23995 6da4711e 69 API calls 23977->23995 23979 6da46464 GetCurrentThreadId 23979->23949 23980 6da4638f 23980->23949 23982 6da463c0 23984 6da463d4 23982->23984 23997 6da4a437 110 API calls 23982->23997 23992 6da49411 VirtualFree HeapFree HeapFree HeapDestroy 23983->23992 23984->23980 23999 6da47ee0 67 API calls 23984->23999 23987 6da463c9 23987->23984 23998 6da4787f 73 API calls 23987->23998 23990 6da46375 23989->23990 23990->23949 23990->23952 23991->23957 23992->23980 23993->23970 23994->23974 23995->23983 23996->23982 23997->23987 23998->23984 23999->23977 24000->23950 24001->23960 24002->23965 24003->23949 24004->23955 24005->23961 24006->23967 24007->23979 24008->23980 24009->23949
                              APIs
                                • Part of subcall function 6DA307D0: CharUpperW.USER32(?,00000000,?,6DA2FCF3,?,6DA2FE6C,?,00000000,?,00000010,E65594C9,?,00000000,00000000), ref: 6DA307F7
                                • Part of subcall function 6DA307D0: CharUpperW.USER32(?,?,6DA2FE6C,?,00000000,?,00000010,E65594C9,?,00000000,00000000), ref: 6DA30804
                              • VariantClear.OLEAUT32(?), ref: 6DA2BEEE
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: CharUpper$ClearVariant
                              • String ID: !$001$R$Unknown error$a$exe$iso$r$rar$udf
                              • API String ID: 3047578428-2136912355
                              • Opcode ID: 7a95bdd45440f971f72b94eb5c6f1d525d8374f7118596e1a6bfe986b1d043eb
                              • Instruction ID: 5d04957d26b65d461232a219d0b9f74fb668a4cfb1b589b1f016145641c2248d
                              • Opcode Fuzzy Hash: 7a95bdd45440f971f72b94eb5c6f1d525d8374f7118596e1a6bfe986b1d043eb
                              • Instruction Fuzzy Hash: DAC26A759082298FCB24DF29CD80BEAB7B1BF49304F1885D9D949A7254DB31AEC1CF91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FindClose.KERNEL32(FFFFFFFF,?), ref: 6DA337C4
                              • GetLastError.KERNEL32(?), ref: 6DA337D1
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: CloseErrorFindLast
                              • String ID:
                              • API String ID: 754982922-0
                              • Opcode ID: e586eaacb4335aa4f61ccb1a5f99361bf3fbaa63115484094c8ce81ff57afa73
                              • Instruction ID: 0569e2228463bc6ff02d928e2ecebead2d05793bbaed3da2ad93fd67c4b769a4
                              • Opcode Fuzzy Hash: e586eaacb4335aa4f61ccb1a5f99361bf3fbaa63115484094c8ce81ff57afa73
                              • Instruction Fuzzy Hash: EA82BF7160C3418FD724CF58C580BABB7E6AF89318F158A1DFA8997380D775E885CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 6DA42B20
                              • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,00000000), ref: 6DA42B3C
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 6DA42B48
                              • FindResourceW.KERNEL32(6DA20000,00000068,RC_DATA), ref: 6DA42B7E
                              • LoadLibraryW.KERNEL32(?,?), ref: 6DA42BA7
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: Find$LibraryLoad$CloseFileFirstResource
                              • String ID: 7z.dll$RC_DATA
                              • API String ID: 2112305928-3209790242
                              • Opcode ID: 74aab0ac8a4e183f9a1a40951142efe49283865248ab19e48244bbf35a1f4ce4
                              • Instruction ID: ba39ecd8228c410fdd1ad8431884eaea5e1cb643f2291537d2dd894a43f5d2f9
                              • Opcode Fuzzy Hash: 74aab0ac8a4e183f9a1a40951142efe49283865248ab19e48244bbf35a1f4ce4
                              • Instruction Fuzzy Hash: 2241B37150C3409FC710DF24C944B6BB7E8BB89318F058A6DF69997281DB35E589CBA3
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 775 6da42980-6da4299d LoadResource 776 6da4299f-6da429ab SizeofResource 775->776 777 6da42a1b-6da42a24 775->777 776->777 778 6da429ad-6da429b8 LockResource 776->778 778->777 779 6da429ba-6da429da CreateFileW 778->779 779->777 780 6da429dc-6da429ed WriteFile 779->780 781 6da429f6 780->781 782 6da429ef-6da429f4 780->782 783 6da429f9-6da42a02 FindCloseChangeNotification 781->783 782->781 782->783 784 6da42a04-6da42a0a DeleteFileW 783->784 785 6da42a10-6da42a18 783->785 784->785
                              APIs
                              • LoadResource.KERNEL32(6DA20000,00000000,6DA20000,?,?,6DA42B94,?), ref: 6DA42993
                              • SizeofResource.KERNEL32(6DA20000,00000000), ref: 6DA429A1
                              • LockResource.KERNEL32(00000000), ref: 6DA429AE
                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 6DA429CF
                              • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 6DA429E5
                              • FindCloseChangeNotification.KERNEL32(00000000), ref: 6DA429FA
                              • DeleteFileW.KERNEL32(00000000), ref: 6DA42A0A
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: FileResource$ChangeCloseCreateDeleteFindLoadLockNotificationSizeofWrite
                              • String ID:
                              • API String ID: 290882627-0
                              • Opcode ID: e1e27d7db632a259ba43113a07f9bb61861633439fe58704eb54347c677968bb
                              • Instruction ID: 0dca45d2d1413e4e7c6672222212951167b14275f1da166f84b8baef7cccac3c
                              • Opcode Fuzzy Hash: e1e27d7db632a259ba43113a07f9bb61861633439fe58704eb54347c677968bb
                              • Instruction Fuzzy Hash: 361129357493057BD7208A689C48FABBB7C9B8A721F04C675FE80E7281D771C84686A0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 786 6da28ab0-6da28b3b 787 6da28b42-6da28b45 786->787 788 6da28b3d-6da28b40 786->788 789 6da28b48-6da28b52 787->789 788->789 790 6da28cab-6da28cba call 6da45f2a 789->790 791 6da28b58-6da28baf call 6da4514c 789->791 796 6da28cbc-6da28cca call 6da4663b 790->796 797 6da28cfd-6da28d25 call 6da28400 790->797 798 6da28bb1-6da28bde call 6da32470 791->798 799 6da28c1c-6da28c24 791->799 806 6da28ccf-6da28ce1 call 6da4663b 796->806 816 6da28d27-6da28d2c 797->816 817 6da28d2f-6da28d80 797->817 805 6da28be3-6da28bf6 798->805 801 6da28c26-6da28c2e 799->801 802 6da28c4d-6da28ca2 call 6da451d6 799->802 807 6da28c30-6da28c35 801->807 808 6da28c37-6da28c3a 801->808 802->791 824 6da28ca8 802->824 811 6da28bf8-6da28bf9 FindClose 805->811 812 6da28bff-6da28c03 805->812 820 6da28ce6-6da28cf8 call 6da4663b 806->820 814 6da28c41-6da28c48 call 6da30880 807->814 808->814 815 6da28c3c 808->815 811->812 812->806 819 6da28c09-6da28c16 812->819 814->802 815->814 816->817 822 6da28d82-6da28d9d 817->822 823 6da28de4-6da28dee 817->823 819->799 819->820 820->797 822->823 831 6da28d9f-6da28ddf call 6da451d6 822->831 826 6da29562-6da295fb call 6da451d6 823->826 827 6da28df4-6da28e4e call 6da4514c 823->827 824->790 848 6da295ff-6da29617 826->848 833 6da28e50-6da28e65 827->833 834 6da28e67-6da28e85 call 6da32470 827->834 831->848 837 6da28ec3-6da28ede 833->837 840 6da28e8a-6da28e9d 834->840 853 6da28ee4-6da28f8d call 6da29f10 837->853 854 6da29618-6da2966a call 6da451d6 * 2 837->854 841 6da28ea6-6da28eaa 840->841 842 6da28e9f-6da28ea0 FindClose 840->842 846 6da28eb0-6da28ebd 841->846 847 6da29969-6da29980 call 6da4663b 841->847 842->841 846->837 846->847 862 6da28f93-6da28f98 853->862 863 6da290ff-6da2912d call 6da2cae0 853->863 854->848 862->863 866 6da28f9e-6da28faa 862->866 873 6da29133-6da29158 863->873 874 6da2966c-6da29709 call 6da451d6 call 6da282a0 call 6da451d6 * 2 863->874 869 6da28fc1-6da28fc9 866->869 870 6da28fac 866->870 869->863 872 6da28fcf-6da28ff9 call 6da21640 call 6da37240 869->872 871 6da28fb0-6da28fb2 870->871 871->863 876 6da28fb8-6da28fbf 871->876 887 6da290e6-6da290fc call 6da451d6 872->887 888 6da28fff-6da2900f call 6da30790 872->888 889 6da2970e-6da29761 call 6da451d6 call 6da282a0 873->889 890 6da2915e-6da29160 873->890 874->848 876->869 876->871 887->863 888->887 907 6da29015-6da29058 call 6da21660 call 6da21460 call 6da451d6 888->907 928 6da29762-6da297a8 call 6da451d6 * 2 889->928 891 6da29162-6da291c6 call 6da451d6 call 6da282a0 call 6da451d6 890->891 892 6da291cb-6da291d0 890->892 950 6da29549-6da29559 891->950 899 6da291d6-6da291e3 892->899 900 6da292a8 892->900 905 6da291e9 899->905 906 6da292af 899->906 900->906 910 6da291f0-6da29206 call 6da29ae0 905->910 912 6da292b1-6da292e4 906->912 913 6da292ea-6da2931a call 6da4514c 906->913 907->887 948 6da2905e-6da2906c 907->948 931 6da29296-6da292a2 910->931 932 6da2920c-6da29210 910->932 912->889 912->913 926 6da29344-6da29375 913->926 927 6da2931c-6da29322 913->927 951 6da2937b-6da29382 926->951 952 6da297ad-6da2980e call 6da451d6 * 2 call 6da282a0 926->952 936 6da29337-6da29341 call 6da451d6 927->936 937 6da29324-6da29335 927->937 928->848 931->900 931->910 932->931 934 6da29216-6da29251 932->934 967 6da29253-6da29259 934->967 968 6da2925b-6da29284 call 6da455f0 934->968 936->926 937->936 937->937 953 6da2906e-6da29072 948->953 954 6da2907d-6da29085 948->954 950->827 958 6da2955f 950->958 956 6da29384-6da29396 951->956 957 6da2939c-6da293ab 951->957 952->928 953->887 964 6da29074-6da2907b 953->964 954->887 965 6da29087-6da290b6 call 6da21640 call 6da37240 call 6da451d6 954->965 956->952 956->957 960 6da293e9-6da293f9 957->960 961 6da293ad 957->961 958->826 970 6da2940b 960->970 971 6da293fb-6da29402 960->971 966 6da293b0-6da293bd 961->966 964->953 964->954 965->887 1004 6da290b8-6da290cc call 6da307d0 965->1004 974 6da293e0-6da293e7 966->974 975 6da293bf-6da293cf 966->975 967->968 977 6da29288-6da29292 967->977 968->977 981 6da2940d-6da29459 call 6da28670 970->981 971->970 980 6da29404-6da29409 971->980 974->960 974->966 975->952 992 6da293d5-6da293dc 975->992 977->931 980->981 991 6da2945e-6da29465 981->991 995 6da29813-6da298b9 call 6da451d6 * 2 call 6da282a0 call 6da451d6 * 2 991->995 996 6da2946b-6da29470 991->996 992->974 995->848 1000 6da29472-6da2949c 996->1000 1001 6da2949e-6da294a5 996->1001 1002 6da294ac-6da294d6 1000->1002 1001->1002 1005 6da298be-6da29964 call 6da451d6 * 2 call 6da282a0 call 6da451d6 * 2 1002->1005 1006 6da294dc-6da29544 call 6da451d6 * 2 call 6da282a0 call 6da451d6 1002->1006 1004->887 1012 6da290ce-6da290e1 call 6da29d00 * 2 1004->1012 1005->848 1006->950 1012->887
                              APIs
                              • FindClose.KERNEL32(FFFFFFFF,?), ref: 6DA28BF9
                              • FindClose.KERNEL32(FFFFFFFF,?), ref: 6DA28EA0
                                • Part of subcall function 6DA4663B: RaiseException.KERNEL32(?,6DA40629,E65594C9,?,?,6DA40629,?,6DA58388,E65594C9), ref: 6DA4667D
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: CloseFind$ExceptionRaise
                              • String ID: 001$rar
                              • API String ID: 1045303971-402399766
                              • Opcode ID: ad087c47e6ca818636f1fb7956d94008b500f0887445e112c81d3cade61efebb
                              • Instruction ID: 248764ef6251ed749bfd084d61e4901b3cce9eb6e3ca16393959c792db6febb3
                              • Opcode Fuzzy Hash: ad087c47e6ca818636f1fb7956d94008b500f0887445e112c81d3cade61efebb
                              • Instruction Fuzzy Hash: 4F9227B550C3819FC324DF69C580AABB7F5BF88304F588A2DE69987351D731E885CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1991 6da32470-6da324c1 1992 6da324c3-6da324cc FindClose 1991->1992 1993 6da324d8-6da324e9 FindFirstFileW 1991->1993 1994 6da324d2 1992->1994 1995 6da3258f-6da32591 1992->1995 1996 6da3255b-6da32568 call 6da32410 1993->1996 1997 6da324eb-6da32526 call 6da21680 call 6da328a0 1993->1997 1994->1993 1999 6da3256a-6da3258c call 6da451c7 1995->1999 1996->1999 2007 6da32542-6da32559 call 6da451d6 1997->2007 2008 6da32528-6da32532 1997->2008 2007->1995 2007->1996 2008->2007 2009 6da32534-6da32540 FindFirstFileW 2008->2009 2009->2007
                              APIs
                              • FindClose.KERNEL32(?,E65594C9,6DA50658,00000000), ref: 6DA324C4
                              • FindFirstFileW.KERNEL32(6DA550B8,?,E65594C9,6DA50658,00000000), ref: 6DA324DE
                              • FindFirstFileW.KERNEL32(?,?), ref: 6DA3253A
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: Find$FileFirst$Close
                              • String ID:
                              • API String ID: 2810966245-0
                              • Opcode ID: d40b31fedd4a9d0720e530613e0d961ded021317d9500f6933bd948929d026a9
                              • Instruction ID: 95fcb3893a089d91974735eea33eeb62ef7329f9f138dfa04fdac5c755294063
                              • Opcode Fuzzy Hash: d40b31fedd4a9d0720e530613e0d961ded021317d9500f6933bd948929d026a9
                              • Instruction Fuzzy Hash: F431617550C3528FCB10DF28C84576AB7E4FB49328F154B19E4A5C32C0E734AA46CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6DA32470: FindClose.KERNEL32(?,E65594C9,6DA50658,00000000), ref: 6DA324C4
                                • Part of subcall function 6DA32470: FindFirstFileW.KERNEL32(6DA550B8,?,E65594C9,6DA50658,00000000), ref: 6DA324DE
                                • Part of subcall function 6DA32470: FindFirstFileW.KERNEL32(?,?), ref: 6DA3253A
                              • FindClose.KERNEL32(FFFFFFFF,?,?,?,?,?,?,?,?,?,?), ref: 6DA34CE0
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID:
                              • API String ID: 2295610775-0
                              • Opcode ID: 34d91249e001992869dd39903cc7fd06332e55bb077488a6f084192bc5fdae7a
                              • Instruction ID: 04456e7ef5c6b94575b7c6f75e01420b5d4f9547d64794f506da9ccf0fd55873
                              • Opcode Fuzzy Hash: 34d91249e001992869dd39903cc7fd06332e55bb077488a6f084192bc5fdae7a
                              • Instruction Fuzzy Hash: 9C3269B150C3818FC324CF69C580AABB7E5BFC8314F158A2EE69983350D771E985CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1764 6da242e0-6da24319 1765 6da24325-6da2433c call 6da226e0 1764->1765 1766 6da2431b-6da24320 call 6da22670 1764->1766 1770 6da24348-6da2436a 1765->1770 1771 6da2433e-6da24343 call 6da22670 1765->1771 1766->1765 1772 6da2437e-6da24387 1770->1772 1773 6da2436c-6da24378 1770->1773 1771->1770 1775 6da243a4 1772->1775 1776 6da24389-6da24392 1772->1776 1773->1772 1779 6da243a9-6da243e1 call 6da23cf0 * 2 1775->1779 1777 6da24394-6da24397 1776->1777 1778 6da2439d-6da243a2 1776->1778 1777->1775 1780 6da24399-6da2439b 1777->1780 1778->1779 1785 6da24402-6da2440c 1779->1785 1786 6da243e3-6da243ff call 6da22d80 1779->1786 1780->1779 1787 6da24428-6da2443b 1785->1787 1788 6da2440e-6da24425 call 6da22d80 1785->1788 1786->1785 1791 6da2444e 1787->1791 1792 6da2443d-6da24443 1787->1792 1788->1787 1796 6da24453-6da2445c 1791->1796 1792->1791 1795 6da24445-6da2444c 1792->1795 1795->1791 1795->1796 1797 6da24462 1796->1797 1798 6da2452b-6da24533 1796->1798 1799 6da24466-6da2446e 1797->1799 1798->1799 1800 6da24539 1798->1800 1801 6da24474 1799->1801 1802 6da2453e-6da24543 1799->1802 1800->1802 1803 6da24479-6da244ba call 6da22940 1801->1803 1802->1803 1804 6da24549-6da2454d 1802->1804 1812 6da244d3-6da244e9 1803->1812 1813 6da244bc-6da244cf call 6da21460 1803->1813 1806 6da24559-6da24573 call 6da21460 1804->1806 1807 6da2454f-6da24554 call 6da22670 1804->1807 1806->1803 1816 6da24579-6da2457e call 6da22670 1806->1816 1807->1806 1814 6da24504-6da24509 1812->1814 1815 6da244eb-6da24500 call 6da21460 1812->1815 1813->1812 1821 6da24738-6da2473d 1814->1821 1822 6da2450f-6da24513 1814->1822 1815->1814 1824 6da24583-6da245ad 1816->1824 1825 6da2473f-6da24742 1821->1825 1826 6da2474d-6da24779 call 6da23750 call 6da239a0 1821->1826 1827 6da24521-6da24526 call 6da22670 1822->1827 1828 6da24515-6da2451f 1822->1828 1829 6da245cb-6da245d5 1824->1829 1830 6da245af-6da245c8 call 6da22d80 1824->1830 1825->1826 1831 6da24744-6da24747 1825->1831 1856 6da24782-6da24794 1826->1856 1857 6da2477b 1826->1857 1827->1798 1828->1824 1828->1827 1836 6da245d7-6da245f1 call 6da22d80 1829->1836 1837 6da245f4-6da245f9 1829->1837 1830->1829 1831->1826 1835 6da248a6-6da248a9 1831->1835 1842 6da24a62-6da24a65 1835->1842 1843 6da248af-6da248dd 1835->1843 1836->1837 1844 6da245fb-6da24608 call 6da3e950 1837->1844 1845 6da2460d-6da24621 call 6da23250 call 6da3ed50 1837->1845 1842->1766 1847 6da24a6b-6da24a86 call 6da3ed50 1842->1847 1850 6da24903-6da24915 1843->1850 1851 6da248df-6da248f7 call 6da23e30 1843->1851 1844->1845 1875 6da24623-6da2466d call 6da21420 call 6da24d10 * 2 call 6da451d6 1845->1875 1876 6da2466f-6da2467b call 6da23e70 1845->1876 1850->1847 1854 6da2491b 1850->1854 1851->1850 1867 6da248f9-6da248fe call 6da22670 1851->1867 1863 6da24920-6da2494e call 6da21420 CharUpperW 1854->1863 1859 6da24796-6da2479b 1856->1859 1860 6da247b4-6da247c5 1856->1860 1857->1856 1865 6da247a7-6da247ab 1859->1865 1866 6da2479d-6da247a1 1859->1866 1869 6da247c7-6da247e9 call 6da21460 1860->1869 1870 6da24819 1860->1870 1863->1766 1882 6da24954-6da2495b 1863->1882 1865->1860 1873 6da247ad 1865->1873 1872 6da247a3-6da247a5 1866->1872 1866->1873 1867->1850 1869->1870 1892 6da247eb-6da247fd 1869->1892 1879 6da2481d-6da24838 1870->1879 1872->1860 1872->1865 1873->1860 1895 6da24686-6da2468b 1875->1895 1886 6da24680-6da24683 1876->1886 1884 6da2483a-6da24841 1879->1884 1885 6da2487b-6da2487d 1879->1885 1893 6da249a6-6da249aa 1882->1893 1894 6da2495d-6da24967 1882->1894 1887 6da24843-6da24855 call 6da4663b 1884->1887 1888 6da2485a-6da2485c 1884->1888 1890 6da24898-6da248a1 call 6da23250 1885->1890 1891 6da2487f-6da24893 call 6da21460 1885->1891 1886->1895 1887->1888 1888->1885 1898 6da2485e-6da24862 1888->1898 1890->1847 1891->1890 1892->1879 1902 6da247ff-6da24817 call 6da24b20 1892->1902 1893->1766 1897 6da249b0-6da249b8 1893->1897 1903 6da24969 1894->1903 1904 6da2496e-6da24981 call 6da23e30 1894->1904 1905 6da24721-6da24733 call 6da25110 1895->1905 1906 6da24691-6da246a2 call 6da239a0 1895->1906 1907 6da249ba-6da249c4 1897->1907 1908 6da249ed-6da249f1 1897->1908 1898->1885 1909 6da24864-6da24876 call 6da4663b 1898->1909 1902->1879 1903->1904 1904->1766 1929 6da24987-6da2498e 1904->1929 1905->1847 1931 6da246c7-6da246d1 1906->1931 1932 6da246a4-6da246a8 1906->1932 1915 6da249c6 1907->1915 1916 6da249cb-6da249d3 1907->1916 1908->1766 1919 6da249f7-6da249fc 1908->1919 1909->1885 1915->1916 1924 6da24a34-6da24a5a call 6da451d6 1916->1924 1925 6da249d5-6da249e5 call 6da23e30 1916->1925 1919->1924 1927 6da249fe-6da24a31 call 6da21640 call 6da21460 call 6da451d6 1919->1927 1924->1863 1946 6da24a60 1924->1946 1925->1766 1948 6da249eb 1925->1948 1927->1924 1929->1766 1936 6da24994-6da249a1 1929->1936 1940 6da246d3-6da246ec call 6da21460 call 6da32cb0 1931->1940 1941 6da246ef-6da24700 1931->1941 1932->1931 1938 6da246aa-6da246ae 1932->1938 1936->1924 1938->1931 1947 6da246b0-6da246c2 call 6da4663b 1938->1947 1940->1941 1944 6da24702-6da24712 1941->1944 1945 6da24714-6da24718 1941->1945 1944->1905 1945->1905 1951 6da2471a 1945->1951 1946->1847 1947->1931 1948->1924 1951->1905
                              APIs
                              • CharUpperW.USER32(?), ref: 6DA24943
                                • Part of subcall function 6DA4663B: RaiseException.KERNEL32(?,6DA40629,E65594C9,?,?,6DA40629,?,6DA58388,E65594C9), ref: 6DA4667D
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: CharExceptionRaiseUpper
                              • String ID: Cannot use absolute pathnames for this command$Incorrect command line
                              • API String ID: 1023082840-724315024
                              • Opcode ID: ef2f8ea9624b078fc95c00dd2e23580ba9442575980f0f80ffe3710e5ad9f603
                              • Instruction ID: 644ae55fb1cdc6dd1d8f36532de3bdcce971b98177f92e0be40540a4d2c8069e
                              • Opcode Fuzzy Hash: ef2f8ea9624b078fc95c00dd2e23580ba9442575980f0f80ffe3710e5ad9f603
                              • Instruction Fuzzy Hash: 1322A17550C3819FD701CF25C580BA6BBE1AF99308F0C899CE5D94B392C7B5E985CBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1959 6da32a70-6da32a9c 1960 6da32ab3-6da32ad7 CreateFileW 1959->1960 1961 6da32a9e-6da32aa7 CloseHandle 1959->1961 1964 6da32ad9-6da32b08 call 6da21680 call 6da328a0 1960->1964 1965 6da32b3c-6da32b54 1960->1965 1962 6da32b57-6da32b69 1961->1962 1963 6da32aad 1961->1963 1963->1960 1970 6da32b33-6da32b39 call 6da451d6 1964->1970 1971 6da32b0a-6da32b13 1964->1971 1970->1965 1971->1970 1973 6da32b15-6da32b31 CreateFileW 1971->1973 1973->1970
                              APIs
                              • CloseHandle.KERNEL32(?,E65594C9,?,00000000,?,?,00000000,?,?,?,00000000,6DA50C38,000000FF), ref: 6DA32A9F
                              • CreateFileW.KERNEL32(?,?,00000000,00000000,?,00000080,00000000,E65594C9,?,00000000,?,?,00000000), ref: 6DA32ACC
                              • CreateFileW.KERNEL32(?,?,?,00000000,00000000,00000080,00000000), ref: 6DA32B2B
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: CreateFile$CloseHandle
                              • String ID:
                              • API String ID: 1443461169-0
                              • Opcode ID: 811af71502670fe4802ff358088fe2de3ca428d6f8628314b14b8d28d7baec5e
                              • Instruction ID: 50ed08996ac1e8a2c146894edd7422ac85c8fa1b46ea1e68377ab763bd872c91
                              • Opcode Fuzzy Hash: 811af71502670fe4802ff358088fe2de3ca428d6f8628314b14b8d28d7baec5e
                              • Instruction Fuzzy Hash: E831AF75A0821AAFDB10CF54D845BABBBB8FB45720F108719F925972C0D730AA51CBE0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1975 6da31340-6da31376 CreateDirectoryW 1976 6da31378-6da3138b 1975->1976 1977 6da3138c-6da31397 GetLastError 1975->1977 1978 6da3140b-6da3141e 1977->1978 1979 6da31399-6da313c4 call 6da21680 call 6da328a0 1977->1979 1984 6da313c6-6da313cf 1979->1984 1985 6da313ff-6da31408 call 6da451d6 1979->1985 1984->1985 1986 6da313d1-6da313fe CreateDirectoryW call 6da451d6 1984->1986 1985->1978
                              APIs
                              • CreateDirectoryW.KERNEL32(?,00000000,E65594C9,?,?,?,?,?,00000000), ref: 6DA3136E
                              • GetLastError.KERNEL32 ref: 6DA3138C
                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 6DA313D7
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: CreateDirectory$ErrorLast
                              • String ID:
                              • API String ID: 2485089472-0
                              • Opcode ID: e4ab1d7fc6256fec292d0175d81fa35d2c4a533a57b54fc7edfa623ab597f17d
                              • Instruction ID: 6c36115215bfc37a3a8373afe472873f3756896ee011247b92238ef07d1e39b8
                              • Opcode Fuzzy Hash: e4ab1d7fc6256fec292d0175d81fa35d2c4a533a57b54fc7edfa623ab597f17d
                              • Instruction Fuzzy Hash: 9021F177E0C2149BDB009F99D8017BFFBB9EB45624F01026AEA04D3680DB366945C7D1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2012 6da21ab0-6da21ac1 2013 6da21ac3-6da21acd 2012->2013 2014 6da21ad0-6da21aff SetFilePointer 2012->2014 2015 6da21b01-6da21b09 GetLastError 2014->2015 2016 6da21b0f 2014->2016 2015->2016 2017 6da21b0b-6da21b0d 2015->2017 2018 6da21b11-6da21b1a 2016->2018 2017->2018 2019 6da21b21-6da21b23 2018->2019 2020 6da21b1c-6da21b1e 2018->2020 2021 6da21b25-6da21b2c 2019->2021 2022 6da21b2f-6da21b33 GetLastError 2019->2022 2020->2019 2023 6da21b42 2022->2023 2024 6da21b35-6da21b3f 2022->2024 2025 6da21b44-6da21b49 2023->2025 2026 6da21b4e-6da21b53 2023->2026 2025->2026
                              APIs
                              • SetFilePointer.KERNEL32(?,?,?,?), ref: 6DA21AEC
                              • GetLastError.KERNEL32 ref: 6DA21B01
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: ErrorFileLastPointer
                              • String ID:
                              • API String ID: 2976181284-0
                              • Opcode ID: 97d8b1ef3c7283a171784063067d8377f7e897477c71274b92fde15f82c2b61c
                              • Instruction ID: 3020a54d74db765d2a76b64d618d0013261c0b662b9bb429a1885055ef682bad
                              • Opcode Fuzzy Hash: 97d8b1ef3c7283a171784063067d8377f7e897477c71274b92fde15f82c2b61c
                              • Instruction Fuzzy Hash: D711D37A70920A4B8700CE6EEC419BBB7E8EB85321F18862EFD14C7250E333D85597E1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2027 6da28670-6da286c9 2028 6da28857-6da28881 2027->2028 2029 6da286cf-6da286df 2027->2029 2030 6da28883-6da2888d call 6da21680 2028->2030 2031 6da2888f-6da28892 2028->2031 2037 6da286e1-6da28701 2029->2037 2038 6da28706-6da2870b 2029->2038 2030->2031 2033 6da28895-6da288a4 2031->2033 2033->2033 2036 6da288a6-6da28904 call 6da24a90 call 6da2a5c0 call 6da299d0 call 6da451d6 * 2 2033->2036 2076 6da28931-6da2897c call 6da25e10 call 6da2d1b0 2036->2076 2077 6da28906-6da2890a call 6da31420 2036->2077 2047 6da28a91-6da28a96 call 6da451d6 2037->2047 2040 6da287d0-6da287d3 2038->2040 2041 6da28711-6da28757 call 6da4514c call 6da2abe0 2038->2041 2040->2028 2042 6da287d9-6da2881e call 6da451d6 2040->2042 2056 6da2881f-6da28852 call 6da451d6 * 2 2041->2056 2057 6da2875d-6da28773 call 6da2ab10 2041->2057 2058 6da28a98-6da28aac 2047->2058 2056->2058 2057->2056 2069 6da28779-6da28799 call 6da3e6e0 2057->2069 2080 6da287a0-6da287a7 2069->2080 2081 6da2879b-6da2879e 2069->2081 2095 6da289c3-6da289c6 2076->2095 2096 6da2897e-6da289be call 6da451d6 call 6da24c80 call 6da451d6 2076->2096 2083 6da2890f-6da28914 2077->2083 2086 6da287b9-6da287c7 call 6da451d6 2080->2086 2081->2080 2085 6da287a9-6da287b8 call 6da29d00 2081->2085 2083->2076 2087 6da28916-6da2892c GetLastError call 6da4663b 2083->2087 2085->2086 2086->2041 2097 6da287cd 2086->2097 2087->2076 2098 6da289d4 2095->2098 2099 6da289c8-6da289cb 2095->2099 2096->2058 2097->2040 2102 6da289d6-6da289df 2098->2102 2099->2098 2101 6da289cd-6da289d2 2099->2101 2101->2102 2104 6da289e1-6da28a0c 2102->2104 2105 6da28a3c-6da28a47 2102->2105 2116 6da28a2e-6da28a3a call 6da32e40 2104->2116 2117 6da28a0e-6da28a16 2104->2117 2108 6da28a4a 2105->2108 2110 6da28a4c-6da28a90 call 6da451d6 call 6da24c80 2108->2110 2110->2047 2116->2110 2120 6da28a18-6da28a1c 2117->2120 2121 6da28a1e-6da28a2b call 6da32f70 2117->2121 2120->2116 2120->2121 2121->2116
                              APIs
                              • GetLastError.KERNEL32(?,?,00000000,?,00000000), ref: 6DA28916
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: ErrorLast
                              • String ID: <H
                              • API String ID: 1452528299-4022674625
                              • Opcode ID: bbe5350a1772868404354485661e2fb58b44effb4c394174ceaef3e6c045cd5e
                              • Instruction ID: c6a71f88f2533fd981a63d554aefe7c78be0c4c5c983a922bdd2ec952c4cd5f3
                              • Opcode Fuzzy Hash: bbe5350a1772868404354485661e2fb58b44effb4c394174ceaef3e6c045cd5e
                              • Instruction Fuzzy Hash: C9E1B5B5D08249DFCB04DFE8C980AEEBBB5FF48314F18815DE515AB244D734AA85CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2129 6da46360-6da4636d 2130 6da4636f-6da46370 call 6da493e1 2129->2130 2131 6da463eb-6da463ef 2129->2131 2137 6da46375-6da46378 2130->2137 2133 6da463f1-6da463f7 2131->2133 2134 6da46422-6da46425 2131->2134 2138 6da463f9-6da46405 2133->2138 2139 6da4637a-6da4637c 2133->2139 2135 6da46427-6da4643e call 6da470ea call 6da47653 2134->2135 2136 6da46480-6da46483 2134->2136 2135->2139 2160 6da46444-6da4645b call 6da4706f 2135->2160 2144 6da46485-6da4648b call 6da47404 2136->2144 2145 6da4648c-6da4648e 2136->2145 2137->2139 2146 6da46381-6da46388 call 6da47472 2137->2146 2140 6da46407 call 6da47a46 2138->2140 2141 6da4640c-6da4640f 2138->2141 2142 6da4648f-6da46492 2139->2142 2140->2141 2141->2145 2149 6da46411-6da46420 call 6da47ee0 call 6da4711e call 6da49411 2141->2149 2144->2145 2145->2142 2156 6da46391-6da463b2 call 6da4a8a1 GetCommandLineA call 6da4a76a call 6da47c8c 2146->2156 2157 6da4638a-6da4638f call 6da49411 2146->2157 2149->2145 2180 6da463b4-6da463b9 call 6da4711e 2156->2180 2181 6da463bb-6da463c2 call 6da4a6af 2156->2181 2157->2139 2175 6da46474-6da4647b call 6da45ff4 2160->2175 2176 6da4645d-6da46472 call 6da4715b GetCurrentThreadId 2160->2176 2175->2139 2176->2145 2180->2157 2188 6da463e4-6da463e9 call 6da47ee0 2181->2188 2189 6da463c4-6da463cb call 6da4a437 2181->2189 2188->2180 2189->2188 2194 6da463cd-6da463d7 call 6da4787f 2189->2194 2194->2188 2197 6da463d9-6da463df 2194->2197 2197->2145
                              APIs
                                • Part of subcall function 6DA493E1: HeapCreate.KERNEL32(00000000,00001000,00000000,?,6DA46375,00000001,?,?,?,6DA464EE,?,?,?,6DA57F18,0000000C,6DA465A9), ref: 6DA493F6
                              • GetCommandLineA.KERNEL32(?,?,?,6DA464EE,?,?,?,6DA57F18,0000000C,6DA465A9,?), ref: 6DA46396
                                • Part of subcall function 6DA4A76A: GetEnvironmentStringsW.KERNEL32(?,?,?), ref: 6DA4A788
                                • Part of subcall function 6DA4A76A: GetEnvironmentStringsW.KERNEL32(?,?,?), ref: 6DA4A7C3
                                • Part of subcall function 6DA47C8C: GetStartupInfoA.KERNEL32(?), ref: 6DA47CA1
                                • Part of subcall function 6DA47C8C: GetFileType.KERNEL32(00000040,?,?,?,6DA464EE,?,?,?,6DA57F18,0000000C,6DA465A9,?), ref: 6DA47DCB
                                • Part of subcall function 6DA4711E: TlsFree.KERNEL32(00000015,6DA4641B,?,?,?,6DA464EE,?,?,?,6DA57F18,0000000C,6DA465A9,?), ref: 6DA47149
                                • Part of subcall function 6DA4711E: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,6DA4641B,?,?,?,6DA464EE,?,?,?,6DA57F18,0000000C,6DA465A9,?), ref: 6DA480C0
                                • Part of subcall function 6DA4711E: DeleteCriticalSection.KERNEL32(00000015,?,?,6DA4641B,?,?,?,6DA464EE,?,?,?,6DA57F18,0000000C,6DA465A9,?), ref: 6DA480EA
                                • Part of subcall function 6DA470EA: TlsGetValue.KERNEL32(6DA2FA7E,6DA47259,?,6DA24D3F,0000000C,E65594C9,?,?,00000000,?,?,6DA4EF9B,000000FF,?,6DA2FA7E,?), ref: 6DA470F3
                                • Part of subcall function 6DA470EA: TlsSetValue.KERNEL32(00000000,6DA24D3F,0000000C,E65594C9,?,?,00000000,?,?,6DA4EF9B,000000FF,?,6DA2FA7E,?), ref: 6DA47114
                                • Part of subcall function 6DA47653: Sleep.KERNEL32(00000000,?,6DA2FA7E,?), ref: 6DA4767B
                              • GetCurrentThreadId.KERNEL32 ref: 6DA46466
                                • Part of subcall function 6DA45FF4: HeapFree.KERNEL32(00000000,6DA2FA7E,6DA57EB0,0000000C,6DA481B5,00000000,6DA58028,0000000C,6DA481EF,6DA2FA7E,?,?,6DA4C6AB,00000004,6DA582E8,0000000C), ref: 6DA4605C
                                • Part of subcall function 6DA45FF4: GetLastError.KERNEL32(?,6DA4C6AB,00000004,6DA582E8,0000000C,6DA47669,6DA2FA7E,?,00000000,00000000,00000000,?,6DA4726D,00000001,00000214), ref: 6DA4606D
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: CriticalDeleteEnvironmentFreeHeapSectionStringsValue$CommandCreateCurrentErrorFileInfoLastLineSleepStartupThreadType
                              • String ID:
                              • API String ID: 3748246414-0
                              • Opcode ID: e365a8271a58cf5979630118b05d695ea38e027856a8ed5bc1f0b9371f830701
                              • Instruction ID: be7057813ffea7452733a36d48ae80cf431feb5a8d6ed1ca317536e51118c32b
                              • Opcode Fuzzy Hash: e365a8271a58cf5979630118b05d695ea38e027856a8ed5bc1f0b9371f830701
                              • Instruction Fuzzy Hash: 6921F83984C3C3969B1167B58B10BDA36B4EF4276D72DC52AD650C2241EF34D0C285F2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • SetFileAttributesW.KERNEL32(00000000,00000000,E65594C9,?,00000000,?,?,00000000,?,E65594C9,00000000), ref: 6DA3108F
                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 6DA310ED
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: 7b0b04332256f9a32a3aa8f171d33815626814423332fc0b5375a7ccd5bad0b1
                              • Instruction ID: c8f583c06d9b459778d0919517f319b637bdbfaebbbaa5357a097cfa072f5808
                              • Opcode Fuzzy Hash: 7b0b04332256f9a32a3aa8f171d33815626814423332fc0b5375a7ccd5bad0b1
                              • Instruction Fuzzy Hash: BE21C777E082089BDF00CF95D905BEEF7B8EB85624F05416AE918D3340EB35A545C791
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2212 6da21c20-6da21c2b 2213 6da21c32-6da21c67 WriteFile 2212->2213 2214 6da21c2d 2212->2214 2215 6da21c6b-6da21c6d 2213->2215 2216 6da21c69 2213->2216 2214->2213 2217 6da21c75-6da21c7d GetLastError 2215->2217 2218 6da21c6f-6da21c72 2215->2218 2216->2215 2219 6da21c88 2217->2219 2220 6da21c7f-6da21c85 2217->2220 2221 6da21c94-6da21c95 2219->2221 2222 6da21c8a-6da21c8f 2219->2222 2222->2221
                              APIs
                              • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 6DA21C4C
                              • GetLastError.KERNEL32 ref: 6DA21C75
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: ErrorFileLastWrite
                              • String ID:
                              • API String ID: 442123175-0
                              • Opcode ID: 401af5439d8d8c236de9a60408210452ece14f153793576c7821d65d0cd2c451
                              • Instruction ID: 06fd239437e72eafec11869b059cc4647ed5d9aec9830b91aebabfc08333e92d
                              • Opcode Fuzzy Hash: 401af5439d8d8c236de9a60408210452ece14f153793576c7821d65d0cd2c451
                              • Instruction Fuzzy Hash: 5A01623A20830B9BD750CF59D840BB737F8BF44710F08892AF956CB580D376E8619BA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2223 6da219c0-6da219cb 2224 6da219d2-6da219fb ReadFile 2223->2224 2225 6da219cd 2223->2225 2226 6da21a02-6da21a04 2224->2226 2227 6da219fd-6da21a00 2224->2227 2225->2224 2228 6da21a06-6da21a09 2226->2228 2229 6da21a0c-6da21a14 GetLastError 2226->2229 2227->2226 2230 6da21a16-6da21a1c 2229->2230 2231 6da21a1f 2229->2231 2232 6da21a21-6da21a26 2231->2232 2233 6da21a2b-6da21a2c 2231->2233 2232->2233
                              APIs
                              • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 6DA219EB
                              • GetLastError.KERNEL32 ref: 6DA21A0C
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: ErrorFileLastRead
                              • String ID:
                              • API String ID: 1948546556-0
                              • Opcode ID: 8b4e956b4c275ddc732695a7053a9fd7d1f361aa25fc1279a3e43a9afb1970b2
                              • Instruction ID: 04db20bb2b9052eb85ac43441668efba4b14b256f927fe656080cc8a0cfda6de
                              • Opcode Fuzzy Hash: 8b4e956b4c275ddc732695a7053a9fd7d1f361aa25fc1279a3e43a9afb1970b2
                              • Instruction Fuzzy Hash: DDF0AF7531830B9BDB00CE55D804B7733A9BB84310F08C92AF84ACB280D776D8619B60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FindCloseChangeNotification.KERNEL32(00000002,6DA3B356,?,?,?,?,?,?,6DA55380,?), ref: 6DA21BE9
                              • GetLastError.KERNEL32(?,?,?,?,?,?,6DA55380,?), ref: 6DA21BFD
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: ChangeCloseErrorFindLastNotification
                              • String ID:
                              • API String ID: 1687624791-0
                              • Opcode ID: 9ea5b07d23f929034666ee4c8c8c4df99d8d297a98cdc3f6405f98279e4b081d
                              • Instruction ID: e4cf9916f9195950a262fff3b72320514a342fd8737a01f66765595354d008c8
                              • Opcode Fuzzy Hash: 9ea5b07d23f929034666ee4c8c8c4df99d8d297a98cdc3f6405f98279e4b081d
                              • Instruction Fuzzy Hash: 2FE0127C3587035BDB104B36CC4433275B46F41731B98CB28E076C54E0E72FC4828A04
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetFileTime.KERNEL32(?,00000000,00000000,00000000,E65594C9,?,?,?,?,?,6DA50300,000000FF), ref: 6DA27438
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: FileTime
                              • String ID:
                              • API String ID: 1425588814-0
                              • Opcode ID: 1fc9136b10dcdbe2075ae2cd28c993eec9ab294e489ca1573911c22b0ffbc4b0
                              • Instruction ID: d3590e625def4ef7b76c13b577db1d771e8ef322d61d826cdbadb7408f34489e
                              • Opcode Fuzzy Hash: 1fc9136b10dcdbe2075ae2cd28c993eec9ab294e489ca1573911c22b0ffbc4b0
                              • Instruction Fuzzy Hash: 8D5190B5A08A83AFD709CF76C480BA5FBA0FB49314F18866DD46D87601D731B9A5CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RtlAllocateHeap.NTDLL(00000000,6DA2FA6F,?,00000000,?,?,6DA24D3F,0000000C,E65594C9,?,?,00000000,?,?,6DA4EF9B,000000FF), ref: 6DA45FA1
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: 9f5f409e9892009f1818a8e258d569d434c55850993ef942ec8f6858a7fe9de0
                              • Instruction ID: afb61a7b13f4af7d386cd8984a945ee95b6320465e5f22687fc664855f7c9aed
                              • Opcode Fuzzy Hash: 9f5f409e9892009f1818a8e258d569d434c55850993ef942ec8f6858a7fe9de0
                              • Instruction Fuzzy Hash: 2511B63654F7226AD7011A68CD00B7A67A8AF02768F1AC125E910DB9D0DB71DCC1C6D2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetLastError.KERNEL32(6DA2890F,E65594C9,?,?,00000000), ref: 6DA31528
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: ErrorLast
                              • String ID:
                              • API String ID: 1452528299-0
                              • Opcode ID: 7feafbba8643845e4e94324984d7c0487b471d1d4ea24d6648fc13be76672710
                              • Instruction ID: d87f9ea020b62057bc3dffbbceee09397e68a9b939a0ac648b81e30352e60f8a
                              • Opcode Fuzzy Hash: 7feafbba8643845e4e94324984d7c0487b471d1d4ea24d6648fc13be76672710
                              • Instruction Fuzzy Hash: 2BB10776E0C2198BCF04CFA8DA81AFEB3B6FF44304F198129D905E7240E735A995CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6DA32470: FindClose.KERNEL32(?,E65594C9,6DA50658,00000000), ref: 6DA324C4
                                • Part of subcall function 6DA32470: FindFirstFileW.KERNEL32(6DA550B8,?,E65594C9,6DA50658,00000000), ref: 6DA324DE
                                • Part of subcall function 6DA32470: FindFirstFileW.KERNEL32(?,?), ref: 6DA3253A
                              • FindClose.KERNEL32(FFFFFFFF,?,E65594C9,?,00000000,6DA550B8,?,6DA50438,000000FF,?,6DA3265E), ref: 6DA325EA
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID:
                              • API String ID: 2295610775-0
                              • Opcode ID: 614f9ad3bdfedfe3dade58098ad10ca6ede8e78f50564f0deea1981bb22dc867
                              • Instruction ID: 4cbabad04d890af42ad636271385634658481b03fb75f368f750d59ce70691f3
                              • Opcode Fuzzy Hash: 614f9ad3bdfedfe3dade58098ad10ca6ede8e78f50564f0deea1981bb22dc867
                              • Instruction Fuzzy Hash: 67F06DB6908608AFCB10CF98C840BAEB7B8FB46624F50471AF831D33C0D73469058AA4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FindCloseChangeNotification.KERNEL32(?), ref: 6DA2196C
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: ChangeCloseFindNotification
                              • String ID:
                              • API String ID: 2591292051-0
                              • Opcode ID: b0aa01db340073fd59d849ebb0ceec2667679b173dde001344ce94e5a475b32b
                              • Instruction ID: d3c649870d1314a53a0669028ab2328cfb30706725e40dd6c6fd64f1cd030fa0
                              • Opcode Fuzzy Hash: b0aa01db340073fd59d849ebb0ceec2667679b173dde001344ce94e5a475b32b
                              • Instruction Fuzzy Hash: E3E0DFB120C70517C3109E6A9808B6BBBD89F02370B18CB29E9B9C76C0D3B2D4A2C791
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapCreate.KERNEL32(00000000,00001000,00000000,?,6DA46375,00000001,?,?,?,6DA464EE,?,?,?,6DA57F18,0000000C,6DA465A9), ref: 6DA493F6
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: CreateHeap
                              • String ID:
                              • API String ID: 10892065-0
                              • Opcode ID: 93a76d93a45eba62d808b382f6afec1a6ede16aac2180255f2d81304b904d2c6
                              • Instruction ID: 807b3513c76f15a46b23746c1907b61dd5dd14b5fb37c3a41b966ec31c3bf02f
                              • Opcode Fuzzy Hash: 93a76d93a45eba62d808b382f6afec1a6ede16aac2180255f2d81304b904d2c6
                              • Instruction Fuzzy Hash: 14D05E3659C3499ADF005EB59D08B223BECA786399F04C439F90CC6180F770C5528600
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6DA45F2A: RtlAllocateHeap.NTDLL(00000000,6DA2FA6F,?,00000000,?,?,6DA24D3F,0000000C,E65594C9,?,?,00000000,?,?,6DA4EF9B,000000FF), ref: 6DA45FA1
                              • GetLastError.KERNEL32(?,00000000,00000000), ref: 6DA2CBD3
                                • Part of subcall function 6DA4663B: RaiseException.KERNEL32(?,6DA40629,E65594C9,?,?,6DA40629,?,6DA58388,E65594C9), ref: 6DA4667D
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: AllocateErrorExceptionHeapLastRaise
                              • String ID:
                              • API String ID: 3847173015-0
                              • Opcode ID: b145391b6300cf8d59903d082c3e9c3b79f23b96ca5aa9e57825ca71a7df2eb2
                              • Instruction ID: 364d53bba09623cf84c48372349a63043c7289d5382d57ff8669b6dfc3217a03
                              • Opcode Fuzzy Hash: b145391b6300cf8d59903d082c3e9c3b79f23b96ca5aa9e57825ca71a7df2eb2
                              • Instruction Fuzzy Hash: D2A1A8B1D08209EFCB04DFA8D980AEEB7B4FF48314F158129E915A7340D735EA55CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetLastError.KERNEL32(6DA54C28,80000000,00000001,00000003), ref: 6DA2C3BC
                                • Part of subcall function 6DA45F2A: RtlAllocateHeap.NTDLL(00000000,6DA2FA6F,?,00000000,?,?,6DA24D3F,0000000C,E65594C9,?,?,00000000,?,?,6DA4EF9B,000000FF), ref: 6DA45FA1
                                • Part of subcall function 6DA4663B: RaiseException.KERNEL32(?,6DA40629,E65594C9,?,?,6DA40629,?,6DA58388,E65594C9), ref: 6DA4667D
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: AllocateErrorExceptionHeapLastRaise
                              • String ID:
                              • API String ID: 3847173015-0
                              • Opcode ID: 6d5d17f4e6418863c88ac87b19f0cf682a01473ae488b1cb131267737dc7cb7f
                              • Instruction ID: 764103cddad89c98332681e5b6078cf398c474fe5e171cc4ba403af266e9ab28
                              • Opcode Fuzzy Hash: 6d5d17f4e6418863c88ac87b19f0cf682a01473ae488b1cb131267737dc7cb7f
                              • Instruction Fuzzy Hash: BD41D271608205AFCB10CFA9C980BAAF7A9BF49320F158659EA5597380C774EA46CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • IsDebuggerPresent.KERNEL32(?,?,00000314), ref: 6DA45B66
                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,00000314), ref: 6DA45B70
                              • UnhandledExceptionFilter.KERNEL32(?,?,?,00000314), ref: 6DA45B7D
                              • GetCurrentProcess.KERNEL32(C0000417,?,?,00000314), ref: 6DA45B98
                              • TerminateProcess.KERNEL32(00000000,?,?,00000314), ref: 6DA45B9F
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                              • String ID:
                              • API String ID: 2579439406-0
                              • Opcode ID: c6bb19caac027aac8ecd011b85bc1ccd0ed5a3c721cde1e0f06de765a9990b82
                              • Instruction ID: 6c6b649ffc442f07e83a4db59b34b139065bbd1b1b434b303747e1533ca94083
                              • Opcode Fuzzy Hash: c6bb19caac027aac8ecd011b85bc1ccd0ed5a3c721cde1e0f06de765a9990b82
                              • Instruction Fuzzy Hash: E031E2B4D053299BCF20DF64D9897C8BBB8BF58308F1081EAA50CA6250EB745FC58F48
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • IsDebuggerPresent.KERNEL32 ref: 6DA46B91
                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6DA46BA6
                              • UnhandledExceptionFilter.KERNEL32(6DA53328), ref: 6DA46BB1
                              • GetCurrentProcess.KERNEL32(C0000409), ref: 6DA46BCD
                              • TerminateProcess.KERNEL32(00000000), ref: 6DA46BD4
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                              • String ID:
                              • API String ID: 2579439406-0
                              • Opcode ID: 8c3c5f28393b7424e1643ec0fc7d9a780079d8dc686e6b7a8d3479aab20934c3
                              • Instruction ID: 5c8905281bcfcb32913d1d4fcbf244d98038949c626bf4a3ac44039873eb8968
                              • Opcode Fuzzy Hash: 8c3c5f28393b7424e1643ec0fc7d9a780079d8dc686e6b7a8d3479aab20934c3
                              • Instruction Fuzzy Hash: D52198B881D305DFDF01DF28D188B883BB4BB4A324F51C15EEA0987281EBB45986CF51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • OpenFileMappingW.KERNEL32(00000004,00000000,?,00000002), ref: 6DA22BB4
                              • GetLastError.KERNEL32 ref: 6DA22BC3
                              • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 6DA22BDF
                              • UnmapViewOfFile.KERNEL32(00000000), ref: 6DA22C88
                              • CloseHandle.KERNEL32(?), ref: 6DA22C96
                              • OpenEventW.KERNEL32(00000002,00000000,?), ref: 6DA22CA8
                              • GetLastError.KERNEL32 ref: 6DA22CBD
                              • SetEvent.KERNEL32(00000000), ref: 6DA22CC4
                              • GetLastError.KERNEL32 ref: 6DA22CCE
                              • CloseHandle.KERNEL32(00000000), ref: 6DA22CD5
                              • GetLastError.KERNEL32 ref: 6DA22CDF
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: ErrorLast$File$CloseEventHandleOpenView$MappingUnmap
                              • String ID: Can not open mapping$Incorrect command line$Incorrect mapping data$MapViewOfFile error$data error
                              • API String ID: 1601163770-464465891
                              • Opcode ID: 955662b1857dc71c27726f2e64ce6441f9db42fdee964495971f824d10c04cfc
                              • Instruction ID: 6f7a4a397f39e57b13e636806c4ec9fda68deba0917409121da5bbd656ab0f84
                              • Opcode Fuzzy Hash: 955662b1857dc71c27726f2e64ce6441f9db42fdee964495971f824d10c04cfc
                              • Instruction Fuzzy Hash: 8B61F775A1C30A9BDB10DFAACD40BAEB7B4EF45758F198124E904AB240D770E985C7A1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,6DA46386,?,?,?,6DA464EE,?,?,?,6DA57F18,0000000C,6DA465A9,?), ref: 6DA4747C
                              • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 6DA474A3
                              • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 6DA474B0
                              • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 6DA474BD
                              • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 6DA474CA
                              • TlsAlloc.KERNEL32(?,?,6DA46386,?,?,?,6DA464EE,?,?,?,6DA57F18,0000000C,6DA465A9,?), ref: 6DA4751A
                              • TlsSetValue.KERNEL32(00000000,?,?,6DA46386,?,?,?,6DA464EE,?,?,?,6DA57F18,0000000C,6DA465A9,?), ref: 6DA47535
                              • GetCurrentThreadId.KERNEL32 ref: 6DA475E4
                                • Part of subcall function 6DA47790: Sleep.KERNEL32(000003E8,?,?,6DA470BE,KERNEL32.DLL,?,6DA494A4,?,6DA45FE3,6DA2FA7E,?,?,6DA24D3F,0000000C,E65594C9,?), ref: 6DA4779C
                                • Part of subcall function 6DA47790: GetModuleHandleW.KERNEL32(6DA2FA7E,?,6DA470BE,KERNEL32.DLL,?,6DA494A4,?,6DA45FE3,6DA2FA7E,?,?,6DA24D3F,0000000C,E65594C9,?,?), ref: 6DA477A5
                                • Part of subcall function 6DA4711E: TlsFree.KERNEL32(00000015,6DA4641B,?,?,?,6DA464EE,?,?,?,6DA57F18,0000000C,6DA465A9,?), ref: 6DA47149
                                • Part of subcall function 6DA4711E: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,6DA4641B,?,?,?,6DA464EE,?,?,?,6DA57F18,0000000C,6DA465A9,?), ref: 6DA480C0
                                • Part of subcall function 6DA4711E: DeleteCriticalSection.KERNEL32(00000015,?,?,6DA4641B,?,?,?,6DA464EE,?,?,?,6DA57F18,0000000C,6DA465A9,?), ref: 6DA480EA
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: AddressProc$CriticalDeleteHandleModuleSection$AllocCurrentFreeSleepThreadValue
                              • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                              • API String ID: 3695068788-3819984048
                              • Opcode ID: 132c92fb5367f0aa33fa8880d24e666915a9e5d6d9bb35a33fc26ce99c677378
                              • Instruction ID: a4cf1c9f81fb23c0d3c7da431c0660ad484555d0297d42408b4011fbd9c391ba
                              • Opcode Fuzzy Hash: 132c92fb5367f0aa33fa8880d24e666915a9e5d6d9bb35a33fc26ce99c677378
                              • Instruction Fuzzy Hash: D6315B75C0D343AADF119F359908B263AF4EB4B364B15C52EF560E7290EB35C093CA95
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LCMapStringW.KERNEL32(00000000,00000100,6DA54BBC,00000001,00000000,00000000,00000100,?,00000000,?,?,?,?,00000001,?,00000000), ref: 6DA4D782
                              • GetLastError.KERNEL32 ref: 6DA4D794
                              • MultiByteToWideChar.KERNEL32(00000100,00000000,?,?,00000000,00000000,00000100,?,00000000,?,?,?,?,00000001,?,00000000), ref: 6DA4D820
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 6DA4D88C
                              • LCMapStringW.KERNEL32(?,?,?,00000000,00000000,00000000), ref: 6DA4D8A8
                              • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,?,?), ref: 6DA4D8E2
                              • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,00000000,?), ref: 6DA4D946
                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,?,?,00000000,00000000), ref: 6DA4D969
                              • LCMapStringA.KERNEL32(?,?,00000000,?,00000000,00000000,?,?,?,00000100,?,00000000,?,?,?,?), ref: 6DA4D9F9
                              • LCMapStringA.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,?,00000100,?,00000000,?), ref: 6DA4DA6B
                              • LCMapStringA.KERNEL32(?,?,?,?,00000000,?,00000100,?,00000000,?,?,?,?,00000001,?,00000000), ref: 6DA4DAB8
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: String$ByteCharMultiWide$ErrorLast
                              • String ID:
                              • API String ID: 1775797328-0
                              • Opcode ID: 04ff61397bec8ed44549dab8f47e9cc8bc05e0d8604862e5201234f18da270a6
                              • Instruction ID: d79dc6a98e8102f3a0c447b7c15b2b8af820d0bdb4a3aaf9ba76b3c130c5a1f0
                              • Opcode Fuzzy Hash: 04ff61397bec8ed44549dab8f47e9cc8bc05e0d8604862e5201234f18da270a6
                              • Instruction Fuzzy Hash: 9EB18D7680C21AEFDF019FA4CC809AE7BB5FB89314B19C529FA15A7150D331C9E1DB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryA.KERNEL32(USER32.DLL,6DA5F410,00000000,00000314,?,6DA46F7F,6DA5F410,Microsoft Visual C++ Runtime Library), ref: 6DA4B8C6
                              • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 6DA4B8E2
                                • Part of subcall function 6DA46FF4: TlsGetValue.KERNEL32(00000000,?,6DA4706D,00000000,6DA4B8AE,6DA5F410,00000000,00000314,?,6DA46F7F,6DA5F410,Microsoft Visual C++ Runtime Library,00012010), ref: 6DA47006
                                • Part of subcall function 6DA46FF4: TlsGetValue.KERNEL32(00000005,?,6DA4706D,00000000,6DA4B8AE,6DA5F410,00000000,00000314,?,6DA46F7F,6DA5F410,Microsoft Visual C++ Runtime Library,00012010), ref: 6DA4701D
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 6DA4B8FF
                                • Part of subcall function 6DA46FF4: GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,6DA4706D,00000000,6DA4B8AE,6DA5F410,00000000,00000314,?,6DA46F7F,6DA5F410,Microsoft Visual C++ Runtime Library,00012010), ref: 6DA47033
                                • Part of subcall function 6DA46FF4: GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 6DA4704E
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 6DA4B914
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 6DA4B929
                              • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 6DA4B941
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: AddressProc$Value$HandleLibraryLoadModule
                              • String ID: GetProcessWindowStation$MessageBoxA$USER32.DLL
                              • API String ID: 2739679353-2247880650
                              • Opcode ID: cc6c238e33932789184177d9b324983da83870213c8f4eab0b3f0fae24a934f1
                              • Instruction ID: b358aa27a0efdec9b5b73386f7f00684d0160cd591de9485e443e0eca014a2e9
                              • Opcode Fuzzy Hash: cc6c238e33932789184177d9b324983da83870213c8f4eab0b3f0fae24a934f1
                              • Instruction Fuzzy Hash: 1A41C27580D347ABDF109FB4CD0AB6E3BB8AF85354F14C929EA14D2281EB75D4C1CA62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetEnvironmentStringsW.KERNEL32(?,?,?), ref: 6DA4A788
                              • GetLastError.KERNEL32(?,?,?), ref: 6DA4A79C
                              • GetEnvironmentStringsW.KERNEL32(?,?,?), ref: 6DA4A7C3
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,?,?), ref: 6DA4A7FD
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,?,00000000,00000000,?,?,?), ref: 6DA4A820
                              • FreeEnvironmentStringsW.KERNEL32(00000000,?,?,?), ref: 6DA4A836
                              • GetEnvironmentStrings.KERNEL32(?,?,?), ref: 6DA4A849
                              • FreeEnvironmentStringsA.KERNEL32(00000000,?,?,?), ref: 6DA4A87B
                              • FreeEnvironmentStringsA.KERNEL32(00000000,?,?,?), ref: 6DA4A894
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: EnvironmentStrings$Free$ByteCharMultiWide$ErrorLast
                              • String ID:
                              • API String ID: 4109468225-0
                              • Opcode ID: f3c605dcfb2a788fe07c6ba671b7d5fdbaaf3814d5ca9be786330fedbe7b1da8
                              • Instruction ID: 370b454615dc7cd44f691a22f1ebba1f0c73113acbd9a10d39dfc7fd454464e9
                              • Opcode Fuzzy Hash: f3c605dcfb2a788fe07c6ba671b7d5fdbaaf3814d5ca9be786330fedbe7b1da8
                              • Instruction Fuzzy Hash: 203187B690C256AEDB116FB84C84D3E7ABEEB8635C729C439E651D3140E7318DC29760
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcAddress.KERNEL32(6DA36AD8,GetHandlerProperty2), ref: 6DA36584
                              • GetProcAddress.KERNEL32(?,GetHandlerProperty), ref: 6DA36595
                              • GetProcAddress.KERNEL32(?,GetNumberOfFormats), ref: 6DA365B1
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: AddressProc
                              • String ID: GetHandlerProperty$GetHandlerProperty2$GetNumberOfFormats
                              • API String ID: 190572456-3564775856
                              • Opcode ID: 71cb4b5964f118a9cfe4cefc7d0ce79f1015169f74d90c2d68a79440d465ccfe
                              • Instruction ID: 43a9171f0ba636fef1c6725324074e4b9359b55144cd627b97f6240b9ef216d2
                              • Opcode Fuzzy Hash: 71cb4b5964f118a9cfe4cefc7d0ce79f1015169f74d90c2d68a79440d465ccfe
                              • Instruction Fuzzy Hash: 22D15EB1D082289FDB14DFA9CD80BAEB7B5BF49304F1581ADE519E7240D7309A85CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,6DA5F429,00000104,?,6DA2FA7E,?), ref: 6DA46EB3
                              • GetStdHandle.KERNEL32(000000F4,00000001,?,00000000,00000003,00000003,?,6DA46FE7,000000FC,6DA48132,6DA58028,0000000C,6DA481EF,6DA2FA7E,?), ref: 6DA46F86
                              • WriteFile.KERNEL32(00000000,00000000,00000000,6DA2FA7E,00000000,?,6DA46FE7,000000FC,6DA48132,6DA58028,0000000C,6DA481EF,6DA2FA7E,?,?,6DA4C6AB), ref: 6DA46FB0
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: File$HandleModuleNameWrite
                              • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                              • API String ID: 3784150691-4022980321
                              • Opcode ID: b4796911b87a198309f9b224d4b793be2d7ee12e875c84c16a5b4070a129503a
                              • Instruction ID: f2272519378d8ee1ea92368627e9b7fd73fb15d10d6e6a1b5a7a8f7ad46f7196
                              • Opcode Fuzzy Hash: b4796911b87a198309f9b224d4b793be2d7ee12e875c84c16a5b4070a129503a
                              • Instruction Fuzzy Hash: AE4139B2A0D3127AEB0556748E85FFF36AC9F42758F1DC624FE44912C1E722CAD181E2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,6DA57F58,0000000C,6DA47296,00000000,00000000,?,6DA24D3F,0000000C,E65594C9,?,?,00000000,?,?,6DA4EF9B), ref: 6DA4716D
                              • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 6DA471A1
                              • GetProcAddress.KERNEL32(?,DecodePointer), ref: 6DA471B1
                              • InterlockedIncrement.KERNEL32(02C08302), ref: 6DA471E0
                                • Part of subcall function 6DA47790: Sleep.KERNEL32(000003E8,?,?,6DA470BE,KERNEL32.DLL,?,6DA494A4,?,6DA45FE3,6DA2FA7E,?,?,6DA24D3F,0000000C,E65594C9,?), ref: 6DA4779C
                                • Part of subcall function 6DA47790: GetModuleHandleW.KERNEL32(6DA2FA7E,?,6DA470BE,KERNEL32.DLL,?,6DA494A4,?,6DA45FE3,6DA2FA7E,?,?,6DA24D3F,0000000C,E65594C9,?,?), ref: 6DA477A5
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc$IncrementInterlockedSleep
                              • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                              • API String ID: 3998264955-2843748187
                              • Opcode ID: a02d54ed62e1f6aa669c36d80a2f2eb68577ac897b852db455b4806ab8d7c8ef
                              • Instruction ID: 235914c1c6eee4d7e2170cb75442c6c2f2bbef9f45584d0d7ef2a58488f8f184
                              • Opcode Fuzzy Hash: a02d54ed62e1f6aa669c36d80a2f2eb68577ac897b852db455b4806ab8d7c8ef
                              • Instruction Fuzzy Hash: 9A11AFB180D742EEDB20DF79DA00B5ABBF0AF45314F11C91AE5A993290CB30A991CB95
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InterlockedDecrement.KERNEL32(00000000), ref: 6DA4BD6D
                              • InterlockedDecrement.KERNEL32(?), ref: 6DA4BD7A
                              • InterlockedDecrement.KERNEL32(?), ref: 6DA4BD87
                              • InterlockedDecrement.KERNEL32(?), ref: 6DA4BD94
                              • InterlockedDecrement.KERNEL32(?), ref: 6DA4BDA1
                              • InterlockedDecrement.KERNEL32(?), ref: 6DA4BDBD
                              • InterlockedDecrement.KERNEL32(?), ref: 6DA4BDCD
                              • InterlockedDecrement.KERNEL32(?), ref: 6DA4BDE3
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: DecrementInterlocked
                              • String ID:
                              • API String ID: 3448037634-0
                              • Opcode ID: fe6d9842a5958b4f930e41230d27ab9ace49def89b7d1a0641f3af3901ccf4ff
                              • Instruction ID: 55eb86b344138768bc48a252698a4f1d9e479cd2fe9d2a5baa9204519269f62d
                              • Opcode Fuzzy Hash: fe6d9842a5958b4f930e41230d27ab9ace49def89b7d1a0641f3af3901ccf4ff
                              • Instruction Fuzzy Hash: 4C116536B04716A7EF009F79CC84BAEB7ADBF44640F088656A418D7140DB74E480CBF0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InterlockedIncrement.KERNEL32(6DA2FA7E), ref: 6DA4BCD6
                              • InterlockedIncrement.KERNEL32(00000D89), ref: 6DA4BCE3
                              • InterlockedIncrement.KERNEL32(E58B5B5E), ref: 6DA4BCF0
                              • InterlockedIncrement.KERNEL32(5F590000), ref: 6DA4BCFD
                              • InterlockedIncrement.KERNEL32(8B55CCCC), ref: 6DA4BD0A
                              • InterlockedIncrement.KERNEL32(8B55CCCC), ref: 6DA4BD26
                              • InterlockedIncrement.KERNEL32(F07589E0), ref: 6DA4BD36
                              • InterlockedIncrement.KERNEL32(A157559F), ref: 6DA4BD4C
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: IncrementInterlocked
                              • String ID:
                              • API String ID: 3508698243-0
                              • Opcode ID: 3ba41490680011e7ac6ce84c095e93289ce972132761b00aba4e02343adb6668
                              • Instruction ID: 5cb5955ea364d9ef4cec93d96a92e28666b29dd7b0d8cec63471c4b22b9e775f
                              • Opcode Fuzzy Hash: 3ba41490680011e7ac6ce84c095e93289ce972132761b00aba4e02343adb6668
                              • Instruction Fuzzy Hash: 09112175B0431AA7EF009F79CD84B6EB7ACFF45244F088566A818D7141DB34E890CBB1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetCPInfo.KERNEL32(?,00000001,?,00000000,00000000,?,?,?,?,6DA4D6F0,00000000,?,00000001,?,?,?), ref: 6DA4DF6F
                              • GetCPInfo.KERNEL32(?,00000001,?,6DA4D6F0,00000000,?), ref: 6DA4DF88
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,6DA4D6F0,00000000,00000000,?,6DA4D6F0,00000000,?,00000001,?,?,?,?,00000001), ref: 6DA4DFE6
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,6DA4D6F0,?,00000000,?,?,?,?,?,?,?,6DA4D6F0,00000000,?), ref: 6DA4E035
                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,6DA4D6F0), ref: 6DA4E050
                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,6DA4D6F0), ref: 6DA4E076
                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,6DA4D6F0), ref: 6DA4E09B
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$Info
                              • String ID:
                              • API String ID: 1775632426-0
                              • Opcode ID: dd58675405d75a4e8a14623c437dc5d996ba1056a0ecff418c0f23ec9ff945f8
                              • Instruction ID: 174621d4ad155d4d674042f4eeaf02644f15b454b552384939a2a5f6dbac8ffa
                              • Opcode Fuzzy Hash: dd58675405d75a4e8a14623c437dc5d996ba1056a0ecff418c0f23ec9ff945f8
                              • Instruction Fuzzy Hash: 83515D31D0821AAFCF21CF95DC44DEEBBB9FF89754B148119F525E6150D7318981CBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • TlsGetValue.KERNEL32(00000000,?,6DA4706D,00000000,6DA4B8AE,6DA5F410,00000000,00000314,?,6DA46F7F,6DA5F410,Microsoft Visual C++ Runtime Library,00012010), ref: 6DA47006
                              • TlsGetValue.KERNEL32(00000005,?,6DA4706D,00000000,6DA4B8AE,6DA5F410,00000000,00000314,?,6DA46F7F,6DA5F410,Microsoft Visual C++ Runtime Library,00012010), ref: 6DA4701D
                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,6DA4706D,00000000,6DA4B8AE,6DA5F410,00000000,00000314,?,6DA46F7F,6DA5F410,Microsoft Visual C++ Runtime Library,00012010), ref: 6DA47033
                              • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 6DA4704E
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: Value$AddressHandleModuleProc
                              • String ID: EncodePointer$KERNEL32.DLL
                              • API String ID: 1929421221-3682587211
                              • Opcode ID: 257c7ca471d70b1108c1345d452943b166de49ddf6595850546dbeccee3791da
                              • Instruction ID: 5cef0fa06049ebb24ab1dcb2cc8a7eaee2a8039591eb29498aaa02f889b55804
                              • Opcode Fuzzy Hash: 257c7ca471d70b1108c1345d452943b166de49ddf6595850546dbeccee3791da
                              • Instruction Fuzzy Hash: E4F04F75A0D75BABDF119A65CC04FAA3AB8EFC2264704C060F828D7190DB35DDA2CAD0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • TlsGetValue.KERNEL32(6DA2FA7E,?,6DA494A4,?,6DA45FE3,6DA2FA7E,?,?,6DA24D3F,0000000C,E65594C9,?,?,00000000,?,?), ref: 6DA47081
                              • TlsGetValue.KERNEL32(00000005,?,6DA494A4,?,6DA45FE3,6DA2FA7E,?,?,6DA24D3F,0000000C,E65594C9,?,?,00000000,?,?), ref: 6DA47098
                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,6DA494A4,?,6DA45FE3,6DA2FA7E,?,?,6DA24D3F,0000000C,E65594C9,?,?,00000000,?,?), ref: 6DA470AE
                              • GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 6DA470C9
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: Value$AddressHandleModuleProc
                              • String ID: DecodePointer$KERNEL32.DLL
                              • API String ID: 1929421221-629428536
                              • Opcode ID: 65b797d871e1cea218160090fcbd9a8ff7ff27937bf073a9c5325130646bb8c3
                              • Instruction ID: 0bde34414d2f202c0d65c7f7f283956939f68d505bf7a42694c2531781105328
                              • Opcode Fuzzy Hash: 65b797d871e1cea218160090fcbd9a8ff7ff27937bf073a9c5325130646bb8c3
                              • Instruction Fuzzy Hash: 76F04F7590D75BABDF119A25CC04BAA3BA8EFC2260704C024F818D7190DB25D992CAD0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6DA32A70: CloseHandle.KERNEL32(?,E65594C9,?,00000000,?,?,00000000,?,?,?,00000000,6DA50C38,000000FF), ref: 6DA32A9F
                                • Part of subcall function 6DA32A70: CreateFileW.KERNEL32(?,?,00000000,00000000,?,00000080,00000000,E65594C9,?,00000000,?,?,00000000), ref: 6DA32ACC
                                • Part of subcall function 6DA32A70: CreateFileW.KERNEL32(?,?,?,00000000,00000000,00000080,00000000), ref: 6DA32B2B
                              • GetFileSize.KERNEL32(FFFFFFFF,?,00000004,80000000,00000001,00000003,E65594C9,?,?,00000000,?,?,?,00000000,6DA50C38,000000FF), ref: 6DA304A7
                              • GetLastError.KERNEL32(?,?,?,00000000,6DA50C38,000000FF), ref: 6DA304B4
                              • CloseHandle.KERNEL32(FFFFFFFF,00000004,80000000,00000001,00000003,E65594C9,?,?,00000000,?,?,?,00000000,6DA50C38,000000FF), ref: 6DA3051D
                              • CloseHandle.KERNEL32(FFFFFFFF,?,00000000,00000000,00000001,?,?,?,00000000,6DA50C38,000000FF), ref: 6DA3053D
                              • CloseHandle.KERNEL32(FFFFFFFF,FFFFFFFF,00000000,?,00000000,00000000,00000001,?,?,?,00000000,6DA50C38,000000FF), ref: 6DA3056C
                                • Part of subcall function 6DA30A20: MultiByteToWideChar.KERNEL32(00000002,00000000,?,?,?,?,E65594C9,00000000), ref: 6DA30AA7
                              • CloseHandle.KERNEL32(FFFFFFFF,?,?,?,?,00000000,00000001,?,?,?,00000000), ref: 6DA306D8
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: CloseHandle$File$Create$ByteCharErrorLastMultiSizeWide
                              • String ID:
                              • API String ID: 2846089904-0
                              • Opcode ID: c4bb42628b1004041b3aa7561c1c7e346fe00b9f2d028089ac905316fb6ce829
                              • Instruction ID: a7100eb17b43346b0b24fbce99f15a3046d426a7d81a16ead88028a04a0b836f
                              • Opcode Fuzzy Hash: c4bb42628b1004041b3aa7561c1c7e346fe00b9f2d028089ac905316fb6ce829
                              • Instruction Fuzzy Hash: 5E81F372D0C2199BCF00DFA9D940BEEB776EF44324F168219E921F7280EB74A585CB64
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStringTypeW.KERNEL32(00000001,6DA54BBC,00000001,?,00000100,?,?,?,?,?,6DA4D6F0,00000000,?,00000001,?,?), ref: 6DA4D535
                              • GetLastError.KERNEL32(?,6DA4D6F0,00000000,?,00000001,?,?,?,?,00000001,?,00000000,00000001,00000000), ref: 6DA4D547
                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,00000100,?,?,?,?,?,6DA4D6F0,00000000,?,00000001), ref: 6DA4D5AC
                              • MultiByteToWideChar.KERNEL32(00000000,00000001,?,00000000,00000000,00000000,?,?,00000001,?,00000000,00000001,00000000), ref: 6DA4D616
                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 6DA4D624
                              • GetStringTypeA.KERNEL32(?,?,?,?,?,00000100,?,?,?,?,?,6DA4D6F0,00000000,?,00000001,?), ref: 6DA4D699
                                • Part of subcall function 6DA4DF24: GetCPInfo.KERNEL32(?,00000001,?,00000000,00000000,?,?,?,?,6DA4D6F0,00000000,?,00000001,?,?,?), ref: 6DA4DF6F
                                • Part of subcall function 6DA4DF24: GetCPInfo.KERNEL32(?,00000001,?,6DA4D6F0,00000000,?), ref: 6DA4DF88
                                • Part of subcall function 6DA4DF24: MultiByteToWideChar.KERNEL32(?,00000001,?,6DA4D6F0,?,00000000,?,?,?,?,?,?,?,6DA4D6F0,00000000,?), ref: 6DA4E035
                                • Part of subcall function 6DA4DF24: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,6DA4D6F0), ref: 6DA4E050
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$StringType$Info$ErrorLast
                              • String ID:
                              • API String ID: 2250435928-0
                              • Opcode ID: 85e6a6015dda1b256ad4e75231d4c0f35c2c67777e014a62338af46510daefde
                              • Instruction ID: 07c5ff5b988850427b09e9700e075dd840f008da777cab3dce141d549e6be518
                              • Opcode Fuzzy Hash: 85e6a6015dda1b256ad4e75231d4c0f35c2c67777e014a62338af46510daefde
                              • Instruction Fuzzy Hash: 4B51BC7550820AAFDF009F68CC80EAF7BB9EB89368B15C429FA14C7150DB71C9E1CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryExW.KERNEL32(?,00000000,00000002,E65594C9,6DA5FCC8,00000000), ref: 6DA36A18
                              • FreeLibrary.KERNEL32(00000000), ref: 6DA36A38
                              • FreeLibrary.KERNEL32(00000000,E65594C9,6DA5FCC8,00000000), ref: 6DA36A84
                              • GetProcAddress.KERNEL32(?,CreateObject), ref: 6DA36AA5
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: Library$Free$AddressLoadProc
                              • String ID: CreateObject
                              • API String ID: 1386263645-166191583
                              • Opcode ID: 3e31f6be657b3973476bd7237c2f6a41e5a454cf1cfc617d6eab068a147b2bb3
                              • Instruction ID: a397d8c36cd2298e5fb49901a3a8adb01ef14f9d9863fd28b19bcc17251b5eeb
                              • Opcode Fuzzy Hash: 3e31f6be657b3973476bd7237c2f6a41e5a454cf1cfc617d6eab068a147b2bb3
                              • Instruction Fuzzy Hash: A6413C75A08746AFDB00CF65C584BAAB7F5FB89310F15C51AE865CB780D734E981CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStartupInfoA.KERNEL32(?), ref: 6DA47CA1
                                • Part of subcall function 6DA47653: Sleep.KERNEL32(00000000,?,6DA2FA7E,?), ref: 6DA4767B
                              • GetFileType.KERNEL32(00000040,?,?,?,6DA464EE,?,?,?,6DA57F18,0000000C,6DA465A9,?), ref: 6DA47DCB
                              • GetStdHandle.KERNEL32(-000000F6,?,?,?,6DA464EE,?,?,?,6DA57F18,0000000C,6DA465A9,?), ref: 6DA47E55
                              • GetFileType.KERNEL32(00000000,?,?,?,6DA464EE,?,?,?,6DA57F18,0000000C,6DA465A9,?), ref: 6DA47E67
                              • SetHandleCount.KERNEL32 ref: 6DA47EBF
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: FileHandleType$CountInfoSleepStartup
                              • String ID:
                              • API String ID: 1302456922-0
                              • Opcode ID: 828392a74f7f1fc4ed6ac37b24aa2a73645f898141d816b791a883de067b1fd9
                              • Instruction ID: f0ee1c94b86d1b7ab2466a21800f59d7ec6755d22743c4e9614c7e2ecf77ce20
                              • Opcode Fuzzy Hash: 828392a74f7f1fc4ed6ac37b24aa2a73645f898141d816b791a883de067b1fd9
                              • Instruction Fuzzy Hash: FB712476D0C7C28EDB118B28C8487267BB0BF46328F29C749D0659B2D1D778D885CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • WriteConsoleW.KERNEL32(FFFFFFFE,?,00000001,?,00000000,00000000), ref: 6DA4CE2B
                              • GetLastError.KERNEL32 ref: 6DA4CE3E
                              • GetConsoleOutputCP.KERNEL32(00000000,?,00000001,00000083,00000005,00000000,00000000,00000000), ref: 6DA4CE5E
                              • WideCharToMultiByte.KERNEL32(00000000), ref: 6DA4CE65
                              • WriteConsoleA.KERNEL32(FFFFFFFE,00000083,00000000,?,00000000), ref: 6DA4CE81
                                • Part of subcall function 6DA4DC35: CreateFileA.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6DA4CE0E,00000000), ref: 6DA4DC48
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide
                              • String ID:
                              • API String ID: 1850339568-0
                              • Opcode ID: fc156fbf7ff9169ca887518b7408bc588ad2172590c21c5e0935d71b14102e42
                              • Instruction ID: 02e6b5a9ce70959ccb35ee3d42111c284f658a5993287d9d3f96728f1994798e
                              • Opcode Fuzzy Hash: fc156fbf7ff9169ca887518b7408bc588ad2172590c21c5e0935d71b14102e42
                              • Instruction Fuzzy Hash: 47218C7950C319ABDF109B64C809ABB3779FB87720B40C218F92997080DB7496DACBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 6DA4A924
                              • GetCurrentProcessId.KERNEL32 ref: 6DA4A930
                              • GetCurrentThreadId.KERNEL32 ref: 6DA4A938
                              • GetTickCount.KERNEL32 ref: 6DA4A940
                              • QueryPerformanceCounter.KERNEL32(?), ref: 6DA4A94C
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                              • String ID:
                              • API String ID: 1445889803-0
                              • Opcode ID: 776af389abf6a2d370132c4e647a510cd5572150eb8ee7f36f15d3d16b4c8c92
                              • Instruction ID: a5163005b0e8756246f2edb9bd89c326ba54388caf062bb5deaf824b4aeb688e
                              • Opcode Fuzzy Hash: 776af389abf6a2d370132c4e647a510cd5572150eb8ee7f36f15d3d16b4c8c92
                              • Instruction Fuzzy Hash: 5B11CE36D08324ABDF108BF8C448B9AF7F8FB8E355F828425E851E7240EB70C9418794
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcAddress.KERNEL32(00000000,GetMethodProperty), ref: 6DA35F83
                              • GetProcAddress.KERNEL32(00000000,GetNumberOfMethods), ref: 6DA35F9F
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: AddressProc
                              • String ID: GetMethodProperty$GetNumberOfMethods
                              • API String ID: 190572456-2134343882
                              • Opcode ID: 72b9488846d5ca14ac98d47e5d9a96b967617df2554f79674cfb85de2024e71b
                              • Instruction ID: d507210f82581c6d9dec8d22b39bde9f50a20b72aca70621028bb346e8546ce7
                              • Opcode Fuzzy Hash: 72b9488846d5ca14ac98d47e5d9a96b967617df2554f79674cfb85de2024e71b
                              • Instruction Fuzzy Hash: E5216279E0531AABCB00DF99D9819EEB7BAFF49304B158015E904E7301E771E942CBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RegOpenKeyExW.ADVAPI32(80000001,Software\7-zip,00000000,00020019,6DA4FD48,E65594C9,00000000,?,80000001,00000000,6DA4FD48,000000FF,?,6DA35DBD,?,6DA5FCC8), ref: 6DA35C1D
                                • Part of subcall function 6DA32FE0: RegQueryValueExW.ADVAPI32(00000000,Path,00000000,?,00000000,6DA35DBD,?,?,6DA35C37,?,6DA35DBD,?,6DA5FCC8,00000000,00000000), ref: 6DA3300E
                                • Part of subcall function 6DA32FE0: RegQueryValueExW.ADVAPI32(6DA35DBD,Path,00000000,6DA35DBD,?,6DA35DBD,?,6DA35DBD,?,6DA5FCC8,00000000,00000000), ref: 6DA3304E
                              • RegCloseKey.ADVAPI32(?,?,6DA35DBD,?,6DA5FCC8,00000000,00000000,?,?,?,?,?,?,?,?,00000000), ref: 6DA35C47
                              • RegCloseKey.ADVAPI32(?,?,6DA35DBD,?,6DA5FCC8,00000000,00000000,?,?,?,?,?,?,?,?,00000000), ref: 6DA35C65
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: CloseQueryValue$Open
                              • String ID: Software\7-zip
                              • API String ID: 4082589901-3321436535
                              • Opcode ID: d16969b53be3617b133b75cd327946152f5f8e701f582123cdb8ed1c74df3c32
                              • Instruction ID: 4cff6dba15625a2777000d9277aa5694d9f4d7dde7264ebfee94d9d2e15ca1de
                              • Opcode Fuzzy Hash: d16969b53be3617b133b75cd327946152f5f8e701f582123cdb8ed1c74df3c32
                              • Instruction Fuzzy Hash: E5119E7690DB38ABCB128F489C40ABFBB78FB45A24F05466AF816E3200D734590586D4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNEL32(mscoree.dll,?,6DA47821,6DA2FA7E,?,6DA48143,000000FF,0000001E,6DA58028,0000000C,6DA481EF,6DA2FA7E,?,?,6DA4C6AB,00000004), ref: 6DA477F3
                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6DA47803
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 1646373207-1276376045
                              • Opcode ID: ffea90df3f7820ca0bbe85bf8a9bd9cd4a9157573df19fd6932df34af7c57464
                              • Instruction ID: 505a3c5e6f71fe21528bd31e8b7ad47f181753eb2d77064e1fc99049f548716f
                              • Opcode Fuzzy Hash: ffea90df3f7820ca0bbe85bf8a9bd9cd4a9157573df19fd6932df34af7c57464
                              • Instruction Fuzzy Hash: 14D0C9B160D346ABEF402AB28E1CB263AACE9C2A51384C420B56DD2002DB31C8E1D9E0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6DA45F2A: RtlAllocateHeap.NTDLL(00000000,6DA2FA6F,?,00000000,?,?,6DA24D3F,0000000C,E65594C9,?,?,00000000,?,?,6DA4EF9B,000000FF), ref: 6DA45FA1
                              • GetLastError.KERNEL32(?,6DA452D8,00000000,00000010,?,?,?,6DA45364,?,6DA57E10,0000000C,6DA45390,?,?,6DA478CA,6DA4A8C7), ref: 6DA4C8C3
                              • GetLastError.KERNEL32(?,6DA452D8,00000000,00000010,?,?,?,6DA45364,?,6DA57E10,0000000C,6DA45390,?,?,6DA478CA,6DA4A8C7), ref: 6DA4C950
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: ErrorLast$AllocateHeap
                              • String ID:
                              • API String ID: 4219743298-0
                              • Opcode ID: 49c6e2c2a6cefef6f88671737f19885e7503646f07f60b3c057725fcb4bdf45c
                              • Instruction ID: e44c9b45ba8dfa43c01a00ce9cb0be56476da6f714ab12840cb69fb99c0c0c4c
                              • Opcode Fuzzy Hash: 49c6e2c2a6cefef6f88671737f19885e7503646f07f60b3c057725fcb4bdf45c
                              • Instruction Fuzzy Hash: 02512376C0D712ABCF115F788D0466E3BB4EF46364B2AC519E958A7285EB34C8C5CBE0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6DA4C1F1: GetOEMCP.KERNEL32(00000000,?,6DA4A6C9,?,?,?), ref: 6DA4C21A
                                • Part of subcall function 6DA4760E: Sleep.KERNEL32(00000000,00000001,6DA2FA7E,?,6DA4815E,00000018,6DA58028,0000000C,6DA481EF,6DA2FA7E,?,?,6DA4C6AB,00000004,6DA582E8,0000000C), ref: 6DA4762F
                              • InterlockedDecrement.KERNEL32(C03314C4), ref: 6DA4C4C8
                              • InterlockedIncrement.KERNEL32(00000000), ref: 6DA4C4ED
                              • InterlockedDecrement.KERNEL32 ref: 6DA4C57F
                              • InterlockedIncrement.KERNEL32(00000000), ref: 6DA4C5A3
                                • Part of subcall function 6DA45FF4: HeapFree.KERNEL32(00000000,6DA2FA7E,6DA57EB0,0000000C,6DA481B5,00000000,6DA58028,0000000C,6DA481EF,6DA2FA7E,?,?,6DA4C6AB,00000004,6DA582E8,0000000C), ref: 6DA4605C
                                • Part of subcall function 6DA45FF4: GetLastError.KERNEL32(?,6DA4C6AB,00000004,6DA582E8,0000000C,6DA47669,6DA2FA7E,?,00000000,00000000,00000000,?,6DA4726D,00000001,00000214), ref: 6DA4606D
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: Interlocked$DecrementIncrement$ErrorFreeHeapLastSleep
                              • String ID:
                              • API String ID: 1703371082-0
                              • Opcode ID: cdb2f750906bee63631694620ba0ae805f1e91141020bbe831aef8245abb4c68
                              • Instruction ID: 415724b0d0b59e44e8c9f587602a4207b5f547417582210e0d3901de733b9d10
                              • Opcode Fuzzy Hash: cdb2f750906bee63631694620ba0ae805f1e91141020bbe831aef8245abb4c68
                              • Instruction Fuzzy Hash: F041CC7184C3059BDF019F78CA8076D3BB0BF4A324F19C969D959DB691CB3098C6CBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateFileW.KERNEL32(00000000,40000000,00000003,00000000,00000003,02000000,00000000,E65594C9,00000000,?,?,00000000,00000000,00000000), ref: 6DA30FAE
                              • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000), ref: 6DA3100C
                              • SetFileTime.KERNEL32(00000000,?,?,?,?,?,?), ref: 6DA31033
                              • CloseHandle.KERNEL32(00000000,?,?,?), ref: 6DA3103F
                                • Part of subcall function 6DA328A0: GetCurrentDirectoryW.KERNEL32(00000105,?,E65594C9,FFFFFFFF,?,00000004), ref: 6DA32994
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: File$Create$CloseCurrentDirectoryHandleTime
                              • String ID:
                              • API String ID: 2622452211-0
                              • Opcode ID: f6ee1b233e71bef38d289f19de88651f4f5f7c4cdf737c8a7a1d16c0d68a33a5
                              • Instruction ID: 810ce8439ca47e0983821ec201642116d52273eddf9f9dc5b71b96a551d5ab4c
                              • Opcode Fuzzy Hash: f6ee1b233e71bef38d289f19de88651f4f5f7c4cdf737c8a7a1d16c0d68a33a5
                              • Instruction Fuzzy Hash: 5C21A175A08304ABEB109F54DC85FBFB7B9EB46764F114229FA15A72C0C7346E4586A0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(6DA5FC98,E65594C9,?,?,?,6DA4FB68,000000FF), ref: 6DA3D4F2
                              • LeaveCriticalSection.KERNEL32(6DA5FC98,?,?,?,6DA4FB68,000000FF), ref: 6DA3D50A
                              • LeaveCriticalSection.KERNEL32(6DA5FC98,?,?,?,?,6DA4FB68,000000FF), ref: 6DA3D547
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$Enter
                              • String ID: [Content]
                              • API String ID: 2978645861-3799411330
                              • Opcode ID: 45cb563cec6901fbe68d8e581a57257495273d2c6afaa2b297ee65adc397eec8
                              • Instruction ID: 6c8a43cd57b12facdb8a58f8cc6663958c748df6a740f3c93c9440aa334ed014
                              • Opcode Fuzzy Hash: 45cb563cec6901fbe68d8e581a57257495273d2c6afaa2b297ee65adc397eec8
                              • Instruction Fuzzy Hash: 2401D67290C318AFD711DF58C904BAAB7F8FB49620F81866EF801D7780D7756990CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStdHandle.KERNEL32(000000F6,?,00100000,?,00000000), ref: 6DA21A4E
                              • ReadFile.KERNEL32(00000000), ref: 6DA21A55
                              • GetLastError.KERNEL32 ref: 6DA21A72
                              • GetLastError.KERNEL32 ref: 6DA21A80
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: ErrorLast$FileHandleRead
                              • String ID:
                              • API String ID: 2244327787-0
                              • Opcode ID: 77ea081be48275d4487b09559506aca0c50caf386713606fdea38f6da35e55ec
                              • Instruction ID: 4a44be0da20522073c6ea9417741b57aaa929ec581ba70c33680b9cb705f827c
                              • Opcode Fuzzy Hash: 77ea081be48275d4487b09559506aca0c50caf386713606fdea38f6da35e55ec
                              • Instruction Fuzzy Hash: F601867634830B9BDB04DE959D00BB737ACEB85761F148936F916C6180D735D89197A0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • VirtualFree.KERNEL32(?,00000000,00008000,?,00000000,?,6DA46420,?,?,?,6DA464EE,?,?,?,6DA57F18,0000000C), ref: 6DA49440
                              • HeapFree.KERNEL32(00000000,-00000010,?,00000000,?,6DA46420,?,?,?,6DA464EE,?,?,?,6DA57F18,0000000C,6DA465A9), ref: 6DA49450
                              • HeapFree.KERNEL32(00000000,00000000,?,6DA46420,?,?,?,6DA464EE,?,?,?,6DA57F18,0000000C,6DA465A9,?), ref: 6DA4946D
                              • HeapDestroy.KERNEL32(6DA46420,?,?,?,6DA464EE,?,?,?,6DA57F18,0000000C,6DA465A9,?), ref: 6DA49477
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: FreeHeap$DestroyVirtual
                              • String ID:
                              • API String ID: 765507482-0
                              • Opcode ID: 5e60d3a2c12ae74856af2130a44139cef86d7ebbaf4a1f0ba60571f7bf747eb8
                              • Instruction ID: c66b3ac45e61256c24303b213b546137b87439db915f2035fe8701cb5776ac2d
                              • Opcode Fuzzy Hash: 5e60d3a2c12ae74856af2130a44139cef86d7ebbaf4a1f0ba60571f7bf747eb8
                              • Instruction Fuzzy Hash: 52F0173B648315EFDF216F64CE85B057BB9FB82319F61C0ADE641A60A1C3722866CF14
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RegQueryValueExW.ADVAPI32(00000000,Path,00000000,?,00000000,6DA35DBD,?,?,6DA35C37,?,6DA35DBD,?,6DA5FCC8,00000000,00000000), ref: 6DA3300E
                              • RegQueryValueExW.ADVAPI32(6DA35DBD,Path,00000000,6DA35DBD,?,6DA35DBD,?,6DA35DBD,?,6DA5FCC8,00000000,00000000), ref: 6DA3304E
                              Strings
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: QueryValue
                              • String ID: Path
                              • API String ID: 3660427363-2875597873
                              • Opcode ID: 7042467244f348a2c9b15f0889d9528f10136a8802ba26dcfe35a3fcd06191ab
                              • Instruction ID: be6b3c84ec68e1cd956d2e482dce1e5b83374a0755387979718f1e19e69615ed
                              • Opcode Fuzzy Hash: 7042467244f348a2c9b15f0889d9528f10136a8802ba26dcfe35a3fcd06191ab
                              • Instruction Fuzzy Hash: FB116075A0C215AFDB14DFA5C9C087EF7F9FF49700B1585AEE186D3601E77099808B50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapReAlloc.KERNEL32(00000000,-00000010,00000000,00000000,6DA491C3,00000000,?,00000000,6DA4EF9B,000000FF,?,6DA2FA7E,?), ref: 6DA48C8A
                              • HeapAlloc.KERNEL32(00000008,000041C4,00000000,00000000,6DA491C3,00000000,?,00000000,6DA4EF9B,000000FF,?,6DA2FA7E,?), ref: 6DA48CC0
                              • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,6DA2FA7E,?), ref: 6DA48CDA
                              • HeapFree.KERNEL32(00000000,?,?,6DA2FA7E,?), ref: 6DA48CF1
                              Memory Dump Source
                              • Source File: 00000004.00000002.168292372339.000000006DA21000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DA20000, based on PE: true
                              • Associated: 00000004.00000002.168292312078.000000006DA20000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292570437.000000006DA53000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000004.00000002.168292792800.000000006DA5D000.00000004.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_4_2_6da20000_TDService.jbxd
                              Similarity
                              • API ID: AllocHeap$FreeVirtual
                              • String ID:
                              • API String ID: 3499195154-0
                              • Opcode ID: a5ba02846204e32ae75925416158125f10f0d9ad83877a234e6d24600221f233
                              • Instruction ID: 174a2522a11478df4e0f95e1de4b3ce51184204457c7ae8c95bbc30205df3916
                              • Opcode Fuzzy Hash: a5ba02846204e32ae75925416158125f10f0d9ad83877a234e6d24600221f233
                              • Instruction Fuzzy Hash: 01113A77549711EFDB229F28DC05B167BB5FB87724B24CA5EE692D3190E33098828B90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Execution Graph

                              Execution Coverage:16.6%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:12.9%
                              Total number of Nodes:124
                              Total number of Limit Nodes:7
                              execution_graph 2446 142b940 2447 142b97e listen 2446->2447 2449 142b9dc 2447->2449 2329 4360a32 2330 4360a67 ReadFile 2329->2330 2332 4360a99 2330->2332 2333 142ad46 2334 142ad84 CreateIconFromResourceEx 2333->2334 2335 142adbc 2333->2335 2336 142ad92 2334->2336 2335->2334 2498 142b849 2499 142b876 CreateMutexW 2498->2499 2501 142b8f1 2499->2501 2450 142b153 2451 142b17a DuplicateHandle 2450->2451 2453 142b1c6 2451->2453 2454 4361627 2455 436164a bind 2454->2455 2457 43616b3 2455->2457 2502 4361520 2503 436153e GetProcessTimes 2502->2503 2505 43615c5 2503->2505 2538 4360fae 2541 4360fb5 ConvertStringSecurityDescriptorToSecurityDescriptorW 2538->2541 2540 4361053 2541->2540 2506 142a45b 2508 142a48e LoadLibraryExW 2506->2508 2509 142a4d6 2508->2509 2367 43601aa 2368 4360218 2367->2368 2369 43601d9 SetServiceStatus 2367->2369 2368->2369 2370 43601e7 2369->2370 2510 4360329 2511 4360366 GetSystemInfo 2510->2511 2513 43603a0 2511->2513 2371 142a3e2 2372 142a40e StartServiceCtrlDispatcherW 2371->2372 2373 142a44d 2371->2373 2374 142a41c 2372->2374 2373->2372 2458 4360a12 2459 4360a32 ReadFile 2458->2459 2461 4360a99 2459->2461 2482 142b5e4 2483 142b60d RegEnumKeyExW 2482->2483 2485 142b698 2483->2485 2403 4361802 2406 4361828 FindWindowW 2403->2406 2405 4361856 2406->2405 2411 142b876 2414 142b8ae CreateMutexW 2411->2414 2413 142b8f1 2414->2413 2415 142b17a 2416 142b1f0 2415->2416 2417 142b1b8 DuplicateHandle 2415->2417 2416->2417 2418 142b1c6 2417->2418 2518 142a67a 2519 142a67e SetErrorMode 2518->2519 2521 142a6e7 2519->2521 2462 436080a 2464 436084a CreateFileW 2462->2464 2465 43608d1 2464->2465 2486 142b1fe 2487 142b23e RegQueryValueExW 2486->2487 2489 142b2c7 2487->2489 2546 4360188 2547 43601aa SetServiceStatus 2546->2547 2549 43601e7 2547->2549 2522 4361709 2523 436172e select 2522->2523 2525 436178c 2523->2525 2550 142aa88 2551 142aaaa closesocket 2550->2551 2553 142aae4 2551->2553 2466 142a709 2467 142a73a RegOpenKeyExW 2466->2467 2469 142a7c8 2467->2469 2470 4360c7a 2472 4360c9a WSASocketW 2470->2472 2473 4360d0e 2472->2473 2351 4360366 2352 4360392 GetSystemInfo 2351->2352 2353 43603c8 2351->2353 2354 43603a0 2352->2354 2353->2352 2554 142b497 2555 142b4c6 Shell_NotifyIconW 2554->2555 2557 142b524 2555->2557 2474 142ad1e 2475 142ad46 CreateIconFromResourceEx 2474->2475 2477 142ad92 2475->2477 2526 436116a 2527 436118a MapViewOfFile 2526->2527 2529 4361211 2527->2529 2558 43603d6 2560 4360406 RegisterEventSourceW 2558->2560 2561 436047e 2560->2561 2375 142a6a6 2376 142a6d2 SetErrorMode 2375->2376 2378 142a6fb 2375->2378 2377 142a6e7 2376->2377 2378->2376 2530 142ba24 2531 142ba4e RegCreateKeyExW 2530->2531 2533 142baf8 2531->2533 2383 142aaaa 2384 142aad6 closesocket 2383->2384 2385 142ab0c 2383->2385 2386 142aae4 2384->2386 2385->2384 2490 142bdac 2492 142bdda GetFileType 2490->2492 2493 142be3c 2492->2493 2562 43617c4 2565 43617d2 FindWindowW 2562->2565 2564 4361856 2565->2564 2478 142bb31 2479 142bb76 RegSetValueExW 2478->2479 2481 142bbef 2479->2481 2494 142a3b6 2495 142a3e2 StartServiceCtrlDispatcherW 2494->2495 2497 142a41c 2495->2497 2430 436164a 2431 436167f bind 2430->2431 2433 43616b3 2431->2433 2434 436084a 2435 4360882 CreateFileW 2434->2435 2437 43608d1 2435->2437
                              APIs
                              • listen.WS2_32(?,00000E24,2FE2A08F,00000000,00000000,00000000,00000000), ref: 0142B9D4
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: listen
                              • String ID:
                              • API String ID: 3257165821-0
                              • Opcode ID: 15dfc79690fc0c442f579b58d2056ad93d987a847db8f9384f82fe60cc44661d
                              • Instruction ID: a7de22d5806475b1084093f2b8b54b5ec56adc09d6bb63e1e5ae1ef7d67edca1
                              • Opcode Fuzzy Hash: 15dfc79690fc0c442f579b58d2056ad93d987a847db8f9384f82fe60cc44661d
                              • Instruction Fuzzy Hash: DD21F7B54047805FE712CB50DC45F96BFB8EF42324F1884DBE9449F293E3649909C761
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • bind.WS2_32(?,00000E24,2FE2A08F,00000000,00000000,00000000,00000000), ref: 043616AB
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: bind
                              • String ID:
                              • API String ID: 1187836755-0
                              • Opcode ID: fc13adef3ccdad48c1d90b19d84fe24b9a9f5c4b3f617d53b7a6a3e94656379c
                              • Instruction ID: 30ccb01434eb0267b03f7b41adac275e7e7b3268b484cd2d8c806a9946991fcb
                              • Opcode Fuzzy Hash: fc13adef3ccdad48c1d90b19d84fe24b9a9f5c4b3f617d53b7a6a3e94656379c
                              • Instruction Fuzzy Hash: 7B21B0B55087846FE721CF51DC88F96BBA8EF45310F08C49BE945DB252D364A908CBB5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • bind.WS2_32(?,00000E24,2FE2A08F,00000000,00000000,00000000,00000000), ref: 043616AB
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: bind
                              • String ID:
                              • API String ID: 1187836755-0
                              • Opcode ID: 83670892283390fa1e772acd3ebdea63564b0048b8d9bec78de3e73e36f219d9
                              • Instruction ID: 87c571163a1188150158fe64d9750b8e74d79ef14af7f9672fe58fb9890643e5
                              • Opcode Fuzzy Hash: 83670892283390fa1e772acd3ebdea63564b0048b8d9bec78de3e73e36f219d9
                              • Instruction Fuzzy Hash: D01190B56006049FEB20CF55DC84FA6B7ECEF04714F08C46AED059B655E774E808CAB5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • StartServiceCtrlDispatcherW.ADVAPI32(?,2FE2A08F,00000000,?,?,?,?,?,?,?,?,6CC33C58), ref: 0142A414
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: CtrlDispatcherServiceStart
                              • String ID:
                              • API String ID: 3789849863-0
                              • Opcode ID: 8ab8f2c912154c1aefeb169284bb266205768ecd7cc27b16a3e98c80965ec90f
                              • Instruction ID: e99e1188f600f719e1e58dba006947a7ee49ebf34289ca7cfd746bfcedea93da
                              • Opcode Fuzzy Hash: 8ab8f2c912154c1aefeb169284bb266205768ecd7cc27b16a3e98c80965ec90f
                              • Instruction Fuzzy Hash: F811C8715093809FDB128F25DC94B52BFB4EF02220F0884EBED858F653D275A849CB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • listen.WS2_32(?,00000E24,2FE2A08F,00000000,00000000,00000000,00000000), ref: 0142B9D4
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: listen
                              • String ID:
                              • API String ID: 3257165821-0
                              • Opcode ID: 4e58b6167fd16de4e629e9f815b2633c49a7f0fdff7fb76112603708afb3126d
                              • Instruction ID: 47ed2d393eeea1906ee8d3ee064583f3c641f8a791caf4986dd983adafa31621
                              • Opcode Fuzzy Hash: 4e58b6167fd16de4e629e9f815b2633c49a7f0fdff7fb76112603708afb3126d
                              • Instruction Fuzzy Hash: F211C271500604AFEB21CF55DC85BA6B7E8EF44725F04C49BED049B752E374A449CAB1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • StartServiceCtrlDispatcherW.ADVAPI32(?,2FE2A08F,00000000,?,?,?,?,?,?,?,?,6CC33C58), ref: 0142A414
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: CtrlDispatcherServiceStart
                              • String ID:
                              • API String ID: 3789849863-0
                              • Opcode ID: e0a916adc03901000bf8ae248a8f4fc3db4aef62497843f5b78aad9573b9c923
                              • Instruction ID: 6d3dfaf3a34f55bd7a6e445bc0a09df7cc2f50555e1deedb0a63b943da2ae550
                              • Opcode Fuzzy Hash: e0a916adc03901000bf8ae248a8f4fc3db4aef62497843f5b78aad9573b9c923
                              • Instruction Fuzzy Hash: B80184759002409FDB10CF19E889766FBD4DF04625F58C4ABDD098FB56D275E448CA62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetSystemInfo.KERNELBASE(?), ref: 04360398
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: InfoSystem
                              • String ID:
                              • API String ID: 31276548-0
                              • Opcode ID: c50cf3fab43274d8ec488c25a22bca8e392cc5e62a36b3f0704574c3beada203
                              • Instruction ID: bf91bd5da7a5651faf669ba55a011e977cfe18ea162a1d495bdd7d5550773008
                              • Opcode Fuzzy Hash: c50cf3fab43274d8ec488c25a22bca8e392cc5e62a36b3f0704574c3beada203
                              • Instruction Fuzzy Hash: 3901A2759006408FDB10CF19E885B69FBE4DF05621F18D4AADD498F646E3B5A448CA62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 1590761-159078f 1 1590799-15907a6 0->1 2 15907ad-15907be 1->2 4 15907c5-15907cb 2->4 5 15907d2-15907d4 4->5 6 15907da-1590995 5->6 7 15909ac-15909bb 5->7 39 15909a0-15909a5 6->39 7->4 39->7
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701584653.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_1590000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID: /l$ /l$\O0l
                              • API String ID: 0-4120838383
                              • Opcode ID: 6df166c5cb13f0221619848b6bad38351c13781fa4136b425f03044867cdca98
                              • Instruction ID: 85a92c7d54f327f32994278d094b5fa37518a34a330140d9f270ad67e06282ed
                              • Opcode Fuzzy Hash: 6df166c5cb13f0221619848b6bad38351c13781fa4136b425f03044867cdca98
                              • Instruction Fuzzy Hash: 07613770B002158FCB44EF78C49089DBBF2AF89218764846EE50AEB365DB36DD46CF94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 40 1590770-15907be 44 15907c5-15907d4 40->44 46 15907da-15909a5 44->46 47 15909ac-15909bb 44->47 46->47 47->44
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701584653.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_1590000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID: /l$ /l$\O0l
                              • API String ID: 0-4120838383
                              • Opcode ID: b69cb7e7ccb25a6395a67e41694eeebb5d74368d2b6115989a513d917ddc0e05
                              • Instruction ID: 894980e7866503dfc0f62aea5bdd55f2dfd58800f235981ec310da0967f56b57
                              • Opcode Fuzzy Hash: b69cb7e7ccb25a6395a67e41694eeebb5d74368d2b6115989a513d917ddc0e05
                              • Instruction Fuzzy Hash: A5613770B002158FCB44EF78C49089DBBF2AF89214765846EE50AEB365DB36DD46CB94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 80 15909cf-1590a16 81 1590a20-1590a63 80->81 86 1590a69-1590a7d 81->86 87 1590b8d-1590ba0 81->87 91 1590a8b-1590ac1 86->91 92 1590a7f-1590a81 86->92 88 1590ba7-1590bb9 87->88 93 1590bbb 88->93 94 1590bc3 88->94 98 1590adb-1590ae7 91->98 99 1590ac3-1590ac9 91->99 92->91 93->94 96 1590bc4 94->96 96->96 103 1590b79-1590b87 98->103 104 1590aed-1590b38 98->104 100 1590acb 99->100 101 1590acd-1590ad9 99->101 100->98 101->98 103->86 103->87 110 1590b4b-1590b66 104->110 111 1590b3a-1590b44 104->111 112 1590b68-1590b76 110->112 113 1590ba2 110->113 111->110 112->103 113->88
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701584653.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_1590000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID: /l$ /l$ /l
                              • API String ID: 0-4220630555
                              • Opcode ID: a28666834351cf9d946d93d455805581f2886d8cb205d0d8f5de17c3ee83304d
                              • Instruction ID: 429b822ecddfae4afd408062f9069aaf5775da9e009976f00cb6ba228bf0923f
                              • Opcode Fuzzy Hash: a28666834351cf9d946d93d455805581f2886d8cb205d0d8f5de17c3ee83304d
                              • Instruction Fuzzy Hash: 64515D30A00619CFDB25DF34C454A99B7B6BF45314F0188A9E909AF752DB72ED86CF81
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 114 15909e0-1590a16 115 1590a20-1590a63 114->115 120 1590a69-1590a7d 115->120 121 1590b8d-1590ba0 115->121 125 1590a8b-1590ac1 120->125 126 1590a7f-1590a81 120->126 122 1590ba7-1590bb9 121->122 127 1590bbb 122->127 128 1590bc3 122->128 132 1590adb-1590ae7 125->132 133 1590ac3-1590ac9 125->133 126->125 127->128 130 1590bc4 128->130 130->130 137 1590b79-1590b87 132->137 138 1590aed-1590b38 132->138 134 1590acb 133->134 135 1590acd-1590ad9 133->135 134->132 135->132 137->120 137->121 144 1590b4b-1590b66 138->144 145 1590b3a-1590b44 138->145 146 1590b68-1590b76 144->146 147 1590ba2 144->147 145->144 146->137 147->122
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701584653.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_1590000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID: /l$ /l$ /l
                              • API String ID: 0-4220630555
                              • Opcode ID: f625cb786513bea6957e084068dd0ae9ae26efc405f194914a12bce0bdc60fb0
                              • Instruction ID: e410c6c64dabe6e536f8b3db9d6f73d20f2f666fc0e43806bd71b72a976d204d
                              • Opcode Fuzzy Hash: f625cb786513bea6957e084068dd0ae9ae26efc405f194914a12bce0bdc60fb0
                              • Instruction Fuzzy Hash: B6514B30A00619CFDB25DF34C454A99B7B6BF45314F0188A9E909AB752DB72ED86CF81
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 148 15901a0-1590265 189 1590267 call 15903c8 148->189 190 1590267 call 15903ad 148->190 163 159026c-15902da 172 15902dc-15902ff 163->172 173 1590307-1590314 163->173 172->173 176 1590321-1590347 173->176 177 1590316 173->177 181 159034e-15903a3 176->181 177->176 189->163 190->163
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701584653.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_1590000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID: dS0l$dS0l
                              • API String ID: 0-2663856297
                              • Opcode ID: b1254dd55346e7c2fd4c47c07a502bf5700aff16d420eb1cd7ad0c2000b10fe2
                              • Instruction ID: d96a0399ad8e7834fb7c6233934c5171740a74391a734b555ab3fd72cf35479c
                              • Opcode Fuzzy Hash: b1254dd55346e7c2fd4c47c07a502bf5700aff16d420eb1cd7ad0c2000b10fe2
                              • Instruction Fuzzy Hash: 62519D303006158BCB09AB38D4A066E73A7AFD920CB64886ED5469F365DF7DDC0ACB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 191 15901b0-1590265 232 1590267 call 15903c8 191->232 233 1590267 call 15903ad 191->233 206 159026c-15902da 215 15902dc-15902ff 206->215 216 1590307-1590314 206->216 215->216 219 1590321-1590347 216->219 220 1590316 216->220 224 159034e-15903a3 219->224 220->219 232->206 233->206
                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701584653.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_1590000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID: dS0l$dS0l
                              • API String ID: 0-2663856297
                              • Opcode ID: 965f55dbedc482666314e9d928aad7ee4a6cbdb057610f21d8c0057220e518be
                              • Instruction ID: 05bac6ffc2a82295ca1adfa1af44264ea27709f6fd17c5861f1d96e54805aafd
                              • Opcode Fuzzy Hash: 965f55dbedc482666314e9d928aad7ee4a6cbdb057610f21d8c0057220e518be
                              • Instruction Fuzzy Hash: 5B419E303006158BCB09BB39D4A066E72A7AFD910CB648C2ED54ADF365DF79DC0ACB95
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 234 142ba24-142baa6 238 142baab-142bab7 234->238 239 142baa8 234->239 240 142bab9 238->240 241 142babc-142bac5 238->241 239->238 240->241 242 142bac7 241->242 243 142baca-142bae1 241->243 242->243 245 142bb23-142bb28 243->245 246 142bae3-142baf6 RegCreateKeyExW 243->246 245->246 247 142bb2a-142bb2f 246->247 248 142baf8-142bb20 246->248 247->248
                              APIs
                              • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 0142BAE9
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 3690d8c66e8f8f3b6cad19b93877abaad96307da6ad8f0083f079a277995902e
                              • Instruction ID: edc31699c3e427342f17f32d9c9d521631ba79edde1cd9f8611b821ece82d729
                              • Opcode Fuzzy Hash: 3690d8c66e8f8f3b6cad19b93877abaad96307da6ad8f0083f079a277995902e
                              • Instruction Fuzzy Hash: 7F31AD71504744AFE7228B25DC44FA7BFFCEF09610F08849AF985CB662E260E449CB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 253 436080a-43608a2 257 43608a7-43608b3 253->257 258 43608a4 253->258 259 43608b5 257->259 260 43608b8-43608c1 257->260 258->257 259->260 261 4360912-4360917 260->261 262 43608c3-43608e7 CreateFileW 260->262 261->262 265 4360919-436091e 262->265 266 43608e9-436090f 262->266 265->266
                              APIs
                              • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 043608C9
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: 2d138d3120320312f3ed01390cd5978ebb92d99d3613881ff9232ebe0ea0698e
                              • Instruction ID: 72556bd021066677542ba1d92334eb40320984a117b23c2c2fa3e2193439cff1
                              • Opcode Fuzzy Hash: 2d138d3120320312f3ed01390cd5978ebb92d99d3613881ff9232ebe0ea0698e
                              • Instruction Fuzzy Hash: 0931B371504780AFE712CF65DC45BA2BFF8EF06310F08849AE9858B652E375A509DB71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 269 4360b87-4360ba7 270 4360bc9-4360bfb 269->270 271 4360ba9-4360bc8 269->271 275 4360bfe-4360c56 RegQueryValueExW 270->275 271->270 277 4360c5c-4360c72 275->277
                              APIs
                              • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 04360C4E
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: QueryValue
                              • String ID:
                              • API String ID: 3660427363-0
                              • Opcode ID: f96d3757456adb863f7c657538087bbb00bec9ceaf0847fc24beff98aa95d0b0
                              • Instruction ID: 3d4771d36a0ec2544ac31d3b2b108a88673831269235bcb32b1094d727e06df4
                              • Opcode Fuzzy Hash: f96d3757456adb863f7c657538087bbb00bec9ceaf0847fc24beff98aa95d0b0
                              • Instruction Fuzzy Hash: 0831907110E7C06FD3138B258C65A61BFB4EF47614B0E85CBD8C48F5A3D2196809C7B2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 278 142b1fe-142b27b 281 142b280-142b289 278->281 282 142b27d 278->282 283 142b28b 281->283 284 142b28e-142b294 281->284 282->281 283->284 285 142b296 284->285 286 142b299-142b2b0 284->286 285->286 288 142b2b2-142b2c5 RegQueryValueExW 286->288 289 142b2e7-142b2ec 286->289 290 142b2c7-142b2e4 288->290 291 142b2ee-142b2f3 288->291 289->288 291->290
                              APIs
                              • RegQueryValueExW.KERNELBASE(?,00000E24,2FE2A08F,00000000,00000000,00000000,00000000), ref: 0142B2B8
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: QueryValue
                              • String ID:
                              • API String ID: 3660427363-0
                              • Opcode ID: a0eb44ef75b3f908e911aaf4c923b865f66d4e6ad1f539980b7b8fd97471a351
                              • Instruction ID: b6d5506ad5802418917ef9d34b9dd29268839b5fab01f6322708f0f726c96f5c
                              • Opcode Fuzzy Hash: a0eb44ef75b3f908e911aaf4c923b865f66d4e6ad1f539980b7b8fd97471a351
                              • Instruction Fuzzy Hash: 95318F715097845FE722CB25DC44B96BFB8EF06610F0884DBE984CB2A3D264E948CB71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 295 142a709-142a76c 297 142a772-142a783 295->297 298 142a789-142a795 297->298 299 142a797 298->299 300 142a79a-142a7b1 298->300 299->300 302 142a7f3-142a7f8 300->302 303 142a7b3-142a7c6 RegOpenKeyExW 300->303 302->303 304 142a7fa-142a7ff 303->304 305 142a7c8-142a7f0 303->305 304->305
                              APIs
                              • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 0142A7B9
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: Open
                              • String ID:
                              • API String ID: 71445658-0
                              • Opcode ID: 94e92717a0c8f51c97f8a68d088517ff637a67dbeb608e40ca4a83aee5a33296
                              • Instruction ID: 379e1f4a692aa02c790942c1eb844326a50bf832546e1d42e1955fcec06cdd14
                              • Opcode Fuzzy Hash: 94e92717a0c8f51c97f8a68d088517ff637a67dbeb608e40ca4a83aee5a33296
                              • Instruction Fuzzy Hash: 3731A271408744AFE7228B65DC84FA7BFBCEF05214F08849BE945CB662D264E94DCB71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 310 43603d6-4360455 314 4360457 310->314 315 436045a-4360460 310->315 314->315 316 4360465-436046e 315->316 317 4360462 315->317 318 4360470-4360478 RegisterEventSourceW 316->318 319 43604bd-43604c2 316->319 317->316 320 436047e-4360494 318->320 319->318 322 4360496-43604bc 320->322 323 43604c4-43604c9 320->323 323->322
                              APIs
                              • RegisterEventSourceW.ADVAPI32(?,?), ref: 04360476
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: EventRegisterSource
                              • String ID:
                              • API String ID: 1693822063-0
                              • Opcode ID: 7486d0e608d7b540b220363e27e0aef66b99cfbe27b56c98927be8a07ecb0ad7
                              • Instruction ID: 633a9a7ac0899074a7180c926fe50310291fbc4459a4ca3a1da5d0a2d57f1f26
                              • Opcode Fuzzy Hash: 7486d0e608d7b540b220363e27e0aef66b99cfbe27b56c98927be8a07ecb0ad7
                              • Instruction Fuzzy Hash: 97318FB15093806FE722CB65DC45B56BFF8AF06210F18849AE944CB293E364E909CB71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 326 4361520-43615b5 331 43615b7-43615bf GetProcessTimes 326->331 332 4361602-4361607 326->332 334 43615c5-43615d7 331->334 332->331 335 4361609-436160e 334->335 336 43615d9-43615ff 334->336 335->336
                              APIs
                              • GetProcessTimes.KERNELBASE(?,00000E24,2FE2A08F,00000000,00000000,00000000,00000000), ref: 043615BD
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: ProcessTimes
                              • String ID:
                              • API String ID: 1995159646-0
                              • Opcode ID: 09665161f81887aca349a34e8dd366c4fba7753ee6e060f1482c7b6872cd4b83
                              • Instruction ID: 751d784699b037bd48ed8d494d3f50532c789b419ca4f8357eec33fb01f2c721
                              • Opcode Fuzzy Hash: 09665161f81887aca349a34e8dd366c4fba7753ee6e060f1482c7b6872cd4b83
                              • Instruction Fuzzy Hash: 6C31F7715057806FEB128F60DC44F96BFB8EF06314F08849BE985CB153D364A909CB71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 339 4360fae-4361035 344 4361037 339->344 345 436103a-4361043 339->345 344->345 346 4361045-436104d ConvertStringSecurityDescriptorToSecurityDescriptorW 345->346 347 436109b-43610a0 345->347 348 4361053-4361065 346->348 347->346 350 4361067-4361098 348->350 351 43610a2-43610a7 348->351 351->350
                              APIs
                              • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 0436104B
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: DescriptorSecurity$ConvertString
                              • String ID:
                              • API String ID: 3907675253-0
                              • Opcode ID: 23171f430c59160cd1624a131812f8b7a072bd3bb590cc3c7200e71aa608cef6
                              • Instruction ID: 783c2b54c76b3c446fc32c9e5c7a85cfa3e3c7530b64267ff83c9aa909af1033
                              • Opcode Fuzzy Hash: 23171f430c59160cd1624a131812f8b7a072bd3bb590cc3c7200e71aa608cef6
                              • Instruction Fuzzy Hash: 422193B1504385AFEB21CF65DC44FA7BBF8EF45310F08849AE945DB652D364A809CB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 355 142ba4e-142baa6 358 142baab-142bab7 355->358 359 142baa8 355->359 360 142bab9 358->360 361 142babc-142bac5 358->361 359->358 360->361 362 142bac7 361->362 363 142baca-142bae1 361->363 362->363 365 142bb23-142bb28 363->365 366 142bae3-142baf6 RegCreateKeyExW 363->366 365->366 367 142bb2a-142bb2f 366->367 368 142baf8-142bb20 366->368 367->368
                              APIs
                              • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 0142BAE9
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: ecd8c3a23dc9bc712c64dbaca0644ca46875a0a1a3efbc9c0639cbbccf516e87
                              • Instruction ID: 798a2130ea2b887e90774384c78cf861cebd4ebfc6e0135557717484ace210d5
                              • Opcode Fuzzy Hash: ecd8c3a23dc9bc712c64dbaca0644ca46875a0a1a3efbc9c0639cbbccf516e87
                              • Instruction Fuzzy Hash: D121AD72500604AFEB218F59DC84FA7BBECEF08614F04855AE945C7B62E770E549CB71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateMutexW.KERNELBASE(?,?), ref: 0142B8E9
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: CreateMutex
                              • String ID:
                              • API String ID: 1964310414-0
                              • Opcode ID: 3f1dd37706dc99b09988a855621b03e5a17c9b38391ce94ba0d252967292bab1
                              • Instruction ID: 0e387e024f43bcda3647e86037e2bf634c699de501e397c23d173a999b1cbdce
                              • Opcode Fuzzy Hash: 3f1dd37706dc99b09988a855621b03e5a17c9b38391ce94ba0d252967292bab1
                              • Instruction Fuzzy Hash: 5631A2B1509380AFE712CB65DC45F96FFF8EF05210F08849AE9848B252D375E849CB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RegQueryValueExW.KERNELBASE(?,00000E24,2FE2A08F,00000000,00000000,00000000,00000000), ref: 0142BF0C
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: QueryValue
                              • String ID:
                              • API String ID: 3660427363-0
                              • Opcode ID: ce8cafc5a6883792fb7c99fefac20216b06bf49763efe8108faea75d5fb38572
                              • Instruction ID: e28f864be1e1baa4472f543f9b3143ddeffd232792fff1cd3bd196ca8bbb51f8
                              • Opcode Fuzzy Hash: ce8cafc5a6883792fb7c99fefac20216b06bf49763efe8108faea75d5fb38572
                              • Instruction Fuzzy Hash: 7A21A2B15047406FE722CB15DC44F63BFF8EF06720F08849AE9858B663D264E809CB71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RegSetValueExW.KERNELBASE(?,00000E24,2FE2A08F,00000000,00000000,00000000,00000000), ref: 0142BBE0
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: 49a5d2178ca51a4426e097299dd51b91ee7b5de972f232cb58b72afa9be55ab0
                              • Instruction ID: a75d395a67a81c24952e5d43727ff7e91f4ac1a429dbfd7e8bf80901d0773e14
                              • Opcode Fuzzy Hash: 49a5d2178ca51a4426e097299dd51b91ee7b5de972f232cb58b72afa9be55ab0
                              • Instruction Fuzzy Hash: 3731E1724087806FD7228B659C44B93FFB8EF06310F0884CFE9858B6A3D364A449C761
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: FindWindow
                              • String ID:
                              • API String ID: 134000473-0
                              • Opcode ID: fbf599b80762bcea3e6ae8222e86229a15869089769c3bcc93260ac476175091
                              • Instruction ID: d3b9f52731aacf2304b404d84c0ca6502a5d2a41a645639cb96786f39d429313
                              • Opcode Fuzzy Hash: fbf599b80762bcea3e6ae8222e86229a15869089769c3bcc93260ac476175091
                              • Instruction Fuzzy Hash: 8721AE7540D3C45FEB138B25DC65A52BFB4AF07220F0DC0DAD8898F2A3E265A849D762
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RegEnumKeyExW.KERNELBASE(?,00000E24,?,?), ref: 0142B68A
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: Enum
                              • String ID:
                              • API String ID: 2928410991-0
                              • Opcode ID: afc0ade4a959ff85380f762e96ad854d4e6523ed68dd15f792876c0d4d7ab9c8
                              • Instruction ID: b3a59203ba2efd0268b84d853b2d7594553861e2f454632510bbae5ef708e85e
                              • Opcode Fuzzy Hash: afc0ade4a959ff85380f762e96ad854d4e6523ed68dd15f792876c0d4d7ab9c8
                              • Instruction Fuzzy Hash: 46215C6550E3C06FC3138B758C55A21BFB4EF87A10F1D81DFD8849B6A3D225A91AC7A2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • WSASocketW.WS2_32(?,?,?,?,?), ref: 04360D06
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: Socket
                              • String ID:
                              • API String ID: 38366605-0
                              • Opcode ID: 9816d868c16d901c7f8239e218d283eff1708ad17e5c1b5ef1578a6e0ead94ac
                              • Instruction ID: 05846f8ff3846a29bc0454bb77aef3980400bd5f534178cb621dc838ad3e8a95
                              • Opcode Fuzzy Hash: 9816d868c16d901c7f8239e218d283eff1708ad17e5c1b5ef1578a6e0ead94ac
                              • Instruction Fuzzy Hash: D6217E71405780AFE722CF61DC45F96FFF8EF05210F08889EE9858B692D375A419CB66
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: FileView
                              • String ID:
                              • API String ID: 3314676101-0
                              • Opcode ID: 84946002826a7d744963f9ae7c270cce2b18361b82b42c058960e0cf01b96b98
                              • Instruction ID: 2e44e9aa8e95ec1b81653cd2bc6cb28cbcd53447152fe77b00b32a783be3442b
                              • Opcode Fuzzy Hash: 84946002826a7d744963f9ae7c270cce2b18361b82b42c058960e0cf01b96b98
                              • Instruction Fuzzy Hash: 0721B171404744AFEB22CF55DC44F96FBF8EF09314F08849EE9858B252D365A549CB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 0436104B
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: DescriptorSecurity$ConvertString
                              • String ID:
                              • API String ID: 3907675253-0
                              • Opcode ID: be3582fbe087fdbcbb225c39980f7d8a41349067466dc615e2de468db7c67182
                              • Instruction ID: 2fd289cfb405ad5755ab508ee7e2d9d9b8aac454b94ccd17b4c2712e2f92215a
                              • Opcode Fuzzy Hash: be3582fbe087fdbcbb225c39980f7d8a41349067466dc615e2de468db7c67182
                              • Instruction Fuzzy Hash: 4D210172600645AFEF20DF25DC84FAABBECEF00314F04C86AE905DB651E370E4088A71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 043608C9
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: 943f82383c63c58bfc30cec748c51583f4af2cb51cb6d48eb6ec5fd9c8a34d39
                              • Instruction ID: f40bdfab1cfdeab54c2076afbc024cb7cc1128b52565ea6ecdcef7df3c48ac1f
                              • Opcode Fuzzy Hash: 943f82383c63c58bfc30cec748c51583f4af2cb51cb6d48eb6ec5fd9c8a34d39
                              • Instruction Fuzzy Hash: 0521AE71600605AFEB20DF65DC85F66FBF8EF04310F04845AE98A8B652E371F409CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RegSetValueExW.KERNELBASE(?,00000E24,2FE2A08F,00000000,00000000,00000000,00000000), ref: 0142BD64
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: 60f015a2e00b03980ebaf829e76caf81a59d20879ea80043a61df5b6e450f0c0
                              • Instruction ID: 25df16128398fd1b1b850e1b6a5305701825a75147cdf17dd01ab1587d99c32a
                              • Opcode Fuzzy Hash: 60f015a2e00b03980ebaf829e76caf81a59d20879ea80043a61df5b6e450f0c0
                              • Instruction Fuzzy Hash: EA21AFB25047406FE7228B55DC44FA7BFF8EF05610F08849BE9459B2A2D264E849CB72
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 0142A7B9
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: Open
                              • String ID:
                              • API String ID: 71445658-0
                              • Opcode ID: ea7ce056464421ef6fdfb442ed8630fe6edc991b3d16dcd01fc32507d3d89e1c
                              • Instruction ID: 355876f406074c5b838dc5fea4fad5b83c79ea8226dc82f3a694ee0235d967a5
                              • Opcode Fuzzy Hash: ea7ce056464421ef6fdfb442ed8630fe6edc991b3d16dcd01fc32507d3d89e1c
                              • Instruction Fuzzy Hash: 3721CFB2500604AEE721DB55DC84FABFBECEF04714F04845AED458BB62E370E58D8AB5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateMutexW.KERNELBASE(?,?), ref: 0142B8E9
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: CreateMutex
                              • String ID:
                              • API String ID: 1964310414-0
                              • Opcode ID: 5625271e7a93d17cec3d2ee450c916cead26e37bdadc26eb8381107a9a85ade3
                              • Instruction ID: c279e0c5054e5f9e083a84018cdd4077d52c47bac1b3507cfefe3c5ceba7532e
                              • Opcode Fuzzy Hash: 5625271e7a93d17cec3d2ee450c916cead26e37bdadc26eb8381107a9a85ade3
                              • Instruction Fuzzy Hash: B7219271600244AFE711DF69DC85BA6FBE8EF04714F04846AED48CB751E371E449CA65
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RegisterEventSourceW.ADVAPI32(?,?), ref: 04360476
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: EventRegisterSource
                              • String ID:
                              • API String ID: 1693822063-0
                              • Opcode ID: 63adc6c3aee84073e4339207e3ee8a3f7d878a008000fd6b0e00214f8bfe23fc
                              • Instruction ID: f5368bd76da932a2b75be823adf23632ac142e3fbec6ad3e62adcb137a0cb3c9
                              • Opcode Fuzzy Hash: 63adc6c3aee84073e4339207e3ee8a3f7d878a008000fd6b0e00214f8bfe23fc
                              • Instruction Fuzzy Hash: A121D1B1600200AFE721DF65DC86BA6BBE8EF04324F14C469ED49CB786E775E409CA71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetFileType.KERNELBASE(?,00000E24,2FE2A08F,00000000,00000000,00000000,00000000), ref: 0142BE2D
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: FileType
                              • String ID:
                              • API String ID: 3081899298-0
                              • Opcode ID: a81debac3a433a385017ff25b9d4acab5fa8e1016bbe9c004999bee0e1e69de8
                              • Instruction ID: cff69d0fa0fd5e68be0c112d8cfff5aae3460a5f1f127a36209f03835cd07cc7
                              • Opcode Fuzzy Hash: a81debac3a433a385017ff25b9d4acab5fa8e1016bbe9c004999bee0e1e69de8
                              • Instruction Fuzzy Hash: 4F21D271504780AFE7128B55DC44BA3BFACDF46724F08849AEA848B262D275A809CB75
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ReadFile.KERNELBASE(?,00000E24,2FE2A08F,00000000,00000000,00000000,00000000), ref: 04360A91
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: 7ca0e322f5c8ec0b880cbf75c48c7724177254bf7a3b90cb95a867df603cd5e3
                              • Instruction ID: 1534ee11e68724d75fa17f7c2d66eb5bca1205e134e117f623271c474e0bec07
                              • Opcode Fuzzy Hash: 7ca0e322f5c8ec0b880cbf75c48c7724177254bf7a3b90cb95a867df603cd5e3
                              • Instruction Fuzzy Hash: 46219F71405780AFD722CF51DC44FA6BFF8EF45320F08849AE9459B652D364A409CBB2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: select
                              • String ID:
                              • API String ID: 1274211008-0
                              • Opcode ID: febebc163e7687dea1adbc6b4a7093d3f6fd605816837f336ff72ae3baa4f71c
                              • Instruction ID: 8e2527b1f8cf44dc390ae855718b3478e8daf1689b036802be8c8b18edf6a365
                              • Opcode Fuzzy Hash: febebc163e7687dea1adbc6b4a7093d3f6fd605816837f336ff72ae3baa4f71c
                              • Instruction Fuzzy Hash: DD216A715043859FDB21CF25D884B62BFF8EF06210F08859AE949CB266E361E818CB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RegQueryValueExW.KERNELBASE(?,00000E24,2FE2A08F,00000000,00000000,00000000,00000000), ref: 0142B2B8
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: QueryValue
                              • String ID:
                              • API String ID: 3660427363-0
                              • Opcode ID: 1fde6c3402a0f77595aeaf0afbbb7b44b7ef4b58048131c551a0eae4c5199950
                              • Instruction ID: 29c2f8d0ef2e567fbd1bc14606f7afd172b920237ee379c5435890f196700764
                              • Opcode Fuzzy Hash: 1fde6c3402a0f77595aeaf0afbbb7b44b7ef4b58048131c551a0eae4c5199950
                              • Instruction Fuzzy Hash: 6D215B756007049EE721CF59DC88FA7BBECEF05610F04845AEA458B761E770E488CA75
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • WSASocketW.WS2_32(?,?,?,?,?), ref: 04360D06
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: Socket
                              • String ID:
                              • API String ID: 38366605-0
                              • Opcode ID: 789caedd2ba77d87348a7e91761f07ccf5354140e502c957ff15ab9b4cc0780e
                              • Instruction ID: 8e44bdd99a1c034afbf0a362beb371df8e4cb9748e3f972d91f81da24447896d
                              • Opcode Fuzzy Hash: 789caedd2ba77d87348a7e91761f07ccf5354140e502c957ff15ab9b4cc0780e
                              • Instruction Fuzzy Hash: 5821CF71500600AFEB21DF65DC45BA6FBF8EF04320F04885AEA4A8B691E371B409CB65
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: FileView
                              • String ID:
                              • API String ID: 3314676101-0
                              • Opcode ID: 68c63cc67da698dd5a838259dfc347f4f9d81f3f34c101fd470ce3fda3d48f49
                              • Instruction ID: de99eb4d731608c9da0b8f1747183a10ed35c24bd1b54f2f201213f1d35773bb
                              • Opcode Fuzzy Hash: 68c63cc67da698dd5a838259dfc347f4f9d81f3f34c101fd470ce3fda3d48f49
                              • Instruction Fuzzy Hash: 7921DE71500604AFEB21CF65DC85FA6FBE8EF08324F04845AE9498B655E371F449CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RegSetValueExW.KERNELBASE(?,00000E24,2FE2A08F,00000000,00000000,00000000,00000000), ref: 0142BD64
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: 4a961bca5b6852d2a46a0f5117724c08569bdd4fe126c398470b59140ef239b6
                              • Instruction ID: dde42acd6bf62ed15de2087fd6243eadb4934a9eb837f6c4568242697afb879b
                              • Opcode Fuzzy Hash: 4a961bca5b6852d2a46a0f5117724c08569bdd4fe126c398470b59140ef239b6
                              • Instruction Fuzzy Hash: 5111B176500600AFE7218E15DC84FA7FBE8EF04710F04C45AED458B762E374E44ACAB6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RegQueryValueExW.KERNELBASE(?,00000E24,2FE2A08F,00000000,00000000,00000000,00000000), ref: 0142BF0C
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: QueryValue
                              • String ID:
                              • API String ID: 3660427363-0
                              • Opcode ID: c70e1242c2652b37ac5776edb43a6feb84b88d95b500f3a121b041671169b61a
                              • Instruction ID: 326433fe1012b017505c6cce132318471e62a7a02346b770dec1d652913a40e3
                              • Opcode Fuzzy Hash: c70e1242c2652b37ac5776edb43a6feb84b88d95b500f3a121b041671169b61a
                              • Instruction Fuzzy Hash: 3D116A76500604AEE721CE59DC84FA7BBE8EF04720F08845AEA458B762E371E449CAA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryExW.KERNELBASE(?,?,?), ref: 0142A4CE
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: 0d456936144949fc55ad61cbb45f15f747fafa90dcd3d791a212d1170851eef4
                              • Instruction ID: 846b12322b300b2bfe1a65622cfe4433704b61b4ff39c651aec902cf4caf9f6d
                              • Opcode Fuzzy Hash: 0d456936144949fc55ad61cbb45f15f747fafa90dcd3d791a212d1170851eef4
                              • Instruction Fuzzy Hash: 64218E754093C09FD712CB65DC84B92BFF4EF06210F0984DBD9848F263D2759849CB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetSystemInfo.KERNELBASE(?), ref: 04360398
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: InfoSystem
                              • String ID:
                              • API String ID: 31276548-0
                              • Opcode ID: 29235680d858cb64d62c2be813825bdb92968aa3dd582aba5e39456bea13ad8b
                              • Instruction ID: f3f72207e93602d0fc30d46feca43347e5cf935b8782ba3458725f176110d763
                              • Opcode Fuzzy Hash: 29235680d858cb64d62c2be813825bdb92968aa3dd582aba5e39456bea13ad8b
                              • Instruction Fuzzy Hash: B011CD714093809FD7128F25D885B56BFB4EF03220F18C4EADC848F263D265A909CB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessTimes.KERNELBASE(?,00000E24,2FE2A08F,00000000,00000000,00000000,00000000), ref: 043615BD
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: ProcessTimes
                              • String ID:
                              • API String ID: 1995159646-0
                              • Opcode ID: c7bfda0ba884455cf8bf5b25da6a31a2c65a53df965454cb25fc98b2207ff81a
                              • Instruction ID: 0b8d7fdc3ee5db4860e4534fc1ef99f02f1489a7048b36cd9967c3504c4b4041
                              • Opcode Fuzzy Hash: c7bfda0ba884455cf8bf5b25da6a31a2c65a53df965454cb25fc98b2207ff81a
                              • Instruction Fuzzy Hash: 6111D371500601AFEB218F55DC44FAAF7E8EF04715F04C45AEE468B655E770E408CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • Shell_NotifyIconW.SHELL32(?,00000E24,?,?), ref: 0142B516
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: IconNotifyShell_
                              • String ID:
                              • API String ID: 1144537725-0
                              • Opcode ID: 4f16809e553ec0f6c092127bb576617cfd3e9cec688bfbb44198201e1ee08828
                              • Instruction ID: 7cd78b6f982aee0b81f6020902a4397517fcac89e6539659750054ccb00a673e
                              • Opcode Fuzzy Hash: 4f16809e553ec0f6c092127bb576617cfd3e9cec688bfbb44198201e1ee08828
                              • Instruction Fuzzy Hash: 92110471504740AFD312CB19DC41F72FFF8EF86A20F09819AEC489BA42D235B916CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0142B1BE
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: 7c3bc5ade063042420b2a3b9a6e2b6a321803b87e0da1f42bd83d1e7ca34260e
                              • Instruction ID: e7460bfaa44c64fd069598b8c7627465fc2a32700b95d26f496d1c8e937fccc9
                              • Opcode Fuzzy Hash: 7c3bc5ade063042420b2a3b9a6e2b6a321803b87e0da1f42bd83d1e7ca34260e
                              • Instruction Fuzzy Hash: 4F11AF71408380AFDB228F55DC44B62FFF4EF4A210F0888DAED858B263D275A419DB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RegSetValueExW.KERNELBASE(?,00000E24,2FE2A08F,00000000,00000000,00000000,00000000), ref: 0142BBE0
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: d755125778840edc3470fb75e4f1ed907d237d789edbb573ad73e0f17e31166d
                              • Instruction ID: 0400fb47842ca6e26acf7cba76f2b4b991627adebf91c98f3d3514aceb4d4261
                              • Opcode Fuzzy Hash: d755125778840edc3470fb75e4f1ed907d237d789edbb573ad73e0f17e31166d
                              • Instruction Fuzzy Hash: 9811BF72500600AFEB318F55DC84FA7FBE8EF04710F04845AEA459BB62E774E489CAB1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ReadFile.KERNELBASE(?,00000E24,2FE2A08F,00000000,00000000,00000000,00000000), ref: 04360A91
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: 81917a682e02fe1e6af5e40874c7138b38ee2f9c65fd6f6e5ba7e88931d4f0c1
                              • Instruction ID: 08f2dfd1a7875724e2cb6d3b7f47b68d5611d0babc7e8ddfc9304b6bf616d6ac
                              • Opcode Fuzzy Hash: 81917a682e02fe1e6af5e40874c7138b38ee2f9c65fd6f6e5ba7e88931d4f0c1
                              • Instruction Fuzzy Hash: 3E11BF72500600AFEB21CF55DC85FA6FBE8EF04724F04C45AEA459B655E374A409CBB1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?), ref: 0142AD8A
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: CreateFromIconResource
                              • String ID:
                              • API String ID: 3668623891-0
                              • Opcode ID: 75c983162cb795bfe8b11657cd1ad2595d860f7267342800f5690154b48f350f
                              • Instruction ID: dfd265969d51bf8f573122be3f14e633d00b42a43793011e48662292162d85f1
                              • Opcode Fuzzy Hash: 75c983162cb795bfe8b11657cd1ad2595d860f7267342800f5690154b48f350f
                              • Instruction Fuzzy Hash: A61190714043809FDB228F55DC84B52FFF4EF49310F08899EE9858B562D375A459CB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: select
                              • String ID:
                              • API String ID: 1274211008-0
                              • Opcode ID: 6ace479b36e1a24a54b16ad4717ffb5d69ad82c531aa662506192422ce97e342
                              • Instruction ID: 80153f452b41064083353151a25b87f43f8e2a43339a335887da1f5955344788
                              • Opcode Fuzzy Hash: 6ace479b36e1a24a54b16ad4717ffb5d69ad82c531aa662506192422ce97e342
                              • Instruction Fuzzy Hash: 03113D756006059FDB20CF69D984B66FBE8EF04710F08C4AADD49CB656E771F448CB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetServiceStatus.SECHOST(?,?), ref: 043601DF
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: ServiceStatus
                              • String ID:
                              • API String ID: 3969395364-0
                              • Opcode ID: 64b04f6a8124a76856e8815317b85e0cce1fb0cbbd6c0aa74b71afff1e1c08ed
                              • Instruction ID: d5c7f778f26fc0cc767418c3e0040f564d772e719388a9c69d713ba49645aa89
                              • Opcode Fuzzy Hash: 64b04f6a8124a76856e8815317b85e0cce1fb0cbbd6c0aa74b71afff1e1c08ed
                              • Instruction Fuzzy Hash: 3C11C1715083849FDB11CF25DC85B56BFF4EF06220F0884EEED458F266D274A808CB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetErrorMode.KERNELBASE(?), ref: 0142A6D8
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: ErrorMode
                              • String ID:
                              • API String ID: 2340568224-0
                              • Opcode ID: 59dc24b01a591040d0987817cd00b254fbefd776727291986103df15bb6de852
                              • Instruction ID: 53c67db2ea1c56ddc900ac2bb7fcb9e6681247bef4f1626c2ac45b3f344f5962
                              • Opcode Fuzzy Hash: 59dc24b01a591040d0987817cd00b254fbefd776727291986103df15bb6de852
                              • Instruction Fuzzy Hash: 081191754093C46FD7238B15DC44B62BFB4EF46624F0980CBED858B263D265A849CB72
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetFileType.KERNELBASE(?,00000E24,2FE2A08F,00000000,00000000,00000000,00000000), ref: 0142BE2D
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: FileType
                              • String ID:
                              • API String ID: 3081899298-0
                              • Opcode ID: a9e63a33edb15c1cb416851339b8ed28aec9ebb61f31b919751d24aca269b2f3
                              • Instruction ID: 161c477e1be5aebc83f4aaf70281b54c6ef6b05d887079f48fd090049bacdd31
                              • Opcode Fuzzy Hash: a9e63a33edb15c1cb416851339b8ed28aec9ebb61f31b919751d24aca269b2f3
                              • Instruction Fuzzy Hash: 3801D271500604AEE721CB15DC85BA6F7E8DF04724F04C097EE088B762E3B4E489CAB6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: closesocket
                              • String ID:
                              • API String ID: 2781271927-0
                              • Opcode ID: 4834a0242080644be3527a78629de56ec5ff9b887ec8079630eab865693d31aa
                              • Instruction ID: afab1cefdab9f0c53aa1c22f99cb4ec112882596e09dde24fef82e97a8d60edb
                              • Opcode Fuzzy Hash: 4834a0242080644be3527a78629de56ec5ff9b887ec8079630eab865693d31aa
                              • Instruction Fuzzy Hash: 081182715083849FDB12CF15DC84B52BFA4EF46221F0884DAED449F257D275A408CB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?), ref: 0142AD8A
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: CreateFromIconResource
                              • String ID:
                              • API String ID: 3668623891-0
                              • Opcode ID: 2088c5b6ac7393b779856c4cf619ca370dd73931c752b07018214ea55f08cec5
                              • Instruction ID: 05482a0a569c90f354a0d0be7108a5a8c5cfcb5396e07a268b20375b9716086d
                              • Opcode Fuzzy Hash: 2088c5b6ac7393b779856c4cf619ca370dd73931c752b07018214ea55f08cec5
                              • Instruction Fuzzy Hash: 1D016D72400600DFDB218F55D884B66FBE1EF08721F18899ADE494BA22D375E459DB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0142B1BE
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: 64256a36977a45f6a9f5550f66bad24712b6d8ebd44409c09cabff1c73f09eaf
                              • Instruction ID: 6efc29a8bea7b34529dd15effea3824f40595133c9d202eafda6d457e2323870
                              • Opcode Fuzzy Hash: 64256a36977a45f6a9f5550f66bad24712b6d8ebd44409c09cabff1c73f09eaf
                              • Instruction Fuzzy Hash: 5A016D32400740DFDB21CF59D884B66FBE0EF08720F18899ADE498A662D3B5E459DF62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryExW.KERNELBASE(?,?,?), ref: 0142A4CE
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: LibraryLoad
                              • String ID:
                              • API String ID: 1029625771-0
                              • Opcode ID: 7c073daf686453536f63b6eeaf4905ffeb06e8c39f0329488397c0b3363fbd57
                              • Instruction ID: 6e171aa95f7f2b430dd1cb257f5110f801ed2b37a4ac8e35ac624e47d5d0ac99
                              • Opcode Fuzzy Hash: 7c073daf686453536f63b6eeaf4905ffeb06e8c39f0329488397c0b3363fbd57
                              • Instruction Fuzzy Hash: AA0192719002008FEB20CF19E884B66FBE4EF04721F1884ABDD498B752E375E488CA61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetServiceStatus.SECHOST(?,?), ref: 043601DF
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: ServiceStatus
                              • String ID:
                              • API String ID: 3969395364-0
                              • Opcode ID: 68468baa487edecfa9f79553c2d8e1404f01b6446416d7f6b332c13d40c59e30
                              • Instruction ID: d7527d61ad924470dd17da170838272aa5d82ec82907bc4f4eebe45994b99e32
                              • Opcode Fuzzy Hash: 68468baa487edecfa9f79553c2d8e1404f01b6446416d7f6b332c13d40c59e30
                              • Instruction Fuzzy Hash: CC01D4755002058FEB10CF19E885B66FBE4EF04220F08C4AADD4A9F65AE375E448CF61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: FindWindow
                              • String ID:
                              • API String ID: 134000473-0
                              • Opcode ID: 07e837418e665017f5223c3280190273ff58050d044f104feff8e5f08f9128bc
                              • Instruction ID: 49da65717eef2522e30a1769d038ffda0ba725221ceefa81a074d699e32def41
                              • Opcode Fuzzy Hash: 07e837418e665017f5223c3280190273ff58050d044f104feff8e5f08f9128bc
                              • Instruction Fuzzy Hash: D7017175A006459FEB20DF19D885B62FBE8EF04620F08D099DD4D8B75AE274F448CAA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • Shell_NotifyIconW.SHELL32(?,00000E24,?,?), ref: 0142B516
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: IconNotifyShell_
                              • String ID:
                              • API String ID: 1144537725-0
                              • Opcode ID: 916954410f81f6d136de84df812188613db9b4c16161f6116ec42d7b0c759dbf
                              • Instruction ID: 38f33794ec3f0f247c3a5de162d61ad43d9319f98d5cee1ae87f4a47d3d66afe
                              • Opcode Fuzzy Hash: 916954410f81f6d136de84df812188613db9b4c16161f6116ec42d7b0c759dbf
                              • Instruction Fuzzy Hash: 6001A271500601ABD210DF1ACC86B66FBE8FB88B20F14815AED089BB41E771F916CBE5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RegEnumKeyExW.KERNELBASE(?,00000E24,?,?), ref: 0142B68A
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: Enum
                              • String ID:
                              • API String ID: 2928410991-0
                              • Opcode ID: c79fe82b788179b8a910527ef5f5b63935f3459e4dfa9123e11685de7fbeb251
                              • Instruction ID: 76e33323f0f82d2170d881c9a0048a659a15730fb84dde71f585cfacf0545a6e
                              • Opcode Fuzzy Hash: c79fe82b788179b8a910527ef5f5b63935f3459e4dfa9123e11685de7fbeb251
                              • Instruction Fuzzy Hash: 5301A271500601ABD250DF1ACC86B66FBE8FB88B20F14811AED089BB41E771F916CBE5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 04360C4E
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172707047992.0000000004360000.00000040.00000800.00020000.00000000.sdmp, Offset: 04360000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_4360000_TDService.jbxd
                              Similarity
                              • API ID: QueryValue
                              • String ID:
                              • API String ID: 3660427363-0
                              • Opcode ID: 6fe3ca039ad29bc2c7d261886641ceef8f10c1ef2f9bf0fcb25333c55d8904ff
                              • Instruction ID: 5ce32c48e7da1add87da0dfbab0d1a93332978262382bfb2eddf012ac188ae41
                              • Opcode Fuzzy Hash: 6fe3ca039ad29bc2c7d261886641ceef8f10c1ef2f9bf0fcb25333c55d8904ff
                              • Instruction Fuzzy Hash: 9501A271500601ABD210DF1ACC86B66FBE8FB88B20F14811AED089BB41E771F916CBE5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: closesocket
                              • String ID:
                              • API String ID: 2781271927-0
                              • Opcode ID: 0ead420f26f77b1d37920fe9d2a4a8d13427294788dd0f0b4db66fe5822a1c0e
                              • Instruction ID: 9e6e98b21aa2a00fa7dd7cf9a271bc150eec5d1c38b90165caa1096a940b375a
                              • Opcode Fuzzy Hash: 0ead420f26f77b1d37920fe9d2a4a8d13427294788dd0f0b4db66fe5822a1c0e
                              • Instruction Fuzzy Hash: C201A2719002408FDB10CF19E984766FBE4EF04621F18C4ABDD488F756E3B5A488CA62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetErrorMode.KERNELBASE(?), ref: 0142A6D8
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700160098.000000000142A000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142A000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_142a000_TDService.jbxd
                              Similarity
                              • API ID: ErrorMode
                              • String ID:
                              • API String ID: 2340568224-0
                              • Opcode ID: 653a41765f8252afe1e47c488c73ef682471a630042dd08f936cf25577dc1b9f
                              • Instruction ID: 5533403473dc2f8e13e724b449e075aeaf2a9af017fdb33b1e78ea1239c026a4
                              • Opcode Fuzzy Hash: 653a41765f8252afe1e47c488c73ef682471a630042dd08f936cf25577dc1b9f
                              • Instruction Fuzzy Hash: 2DF0A4354006448FDB208F19E985761FBE4DF44625F58C09BDD494B766D3B5E488CEA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701584653.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_1590000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID: 20l
                              • API String ID: 0-2549230344
                              • Opcode ID: e090b293f0aae0b2b846d9d6a30e9df80ea65d9c0ffdc4214791bffd2243cea5
                              • Instruction ID: 158ba4bf9717ed87d6066c651de3b2b2d1973b352e8e935ac9898ad16fe72226
                              • Opcode Fuzzy Hash: e090b293f0aae0b2b846d9d6a30e9df80ea65d9c0ffdc4214791bffd2243cea5
                              • Instruction Fuzzy Hash: B8F0C8307143444FC714973594546FF7BAAAFCA218754457FD44ACBB91CE3A8C0B8791
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701584653.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_1590000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID: 20l
                              • API String ID: 0-2549230344
                              • Opcode ID: 177759e599d68de868a1734cb9c2d461e5a7aa8491b3c0fd01969d71e0db4fce
                              • Instruction ID: 40af5c621195494fe85363b305d8cf595b6f58aaa1a0523fb65f938701829877
                              • Opcode Fuzzy Hash: 177759e599d68de868a1734cb9c2d461e5a7aa8491b3c0fd01969d71e0db4fce
                              • Instruction Fuzzy Hash: 36F0A7317003184BC318A67BD494AEB769BABC9218B50443ED54ECBB40CF76DC0A8795
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701584653.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_1590000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3793c8cb945c2e42f4fde497bde6e2ebd10aeb72c8c0fe806fa6772bf9642585
                              • Instruction ID: e4352d4260402f799d44074b82db894fe456b40b5f03e57200a1d6956af3164d
                              • Opcode Fuzzy Hash: 3793c8cb945c2e42f4fde497bde6e2ebd10aeb72c8c0fe806fa6772bf9642585
                              • Instruction Fuzzy Hash: 9431C334201300CFC728EB34E4506AA73A7FFC5218B14896EC59A8B3A5EF39AC06CB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701584653.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_1590000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 654dc1742560e87a19231073610d9b096abbda76eef15a3276cb3f7892d3a630
                              • Instruction ID: c668c41d6dd1f803aaab9daa5acc3c4ef1911459f6c09deca89dd9ff0295c0a6
                              • Opcode Fuzzy Hash: 654dc1742560e87a19231073610d9b096abbda76eef15a3276cb3f7892d3a630
                              • Instruction Fuzzy Hash: A7317F35201614CFC728EB34E5606AAB3E7BFC5258B158C2DD55A8B394EF39EC06CB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701261620.00000000014B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_14b0000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f8fad4b44dbe46480f0c84c9aa2d60288b06a9b89254be2dcdd0673cd822445d
                              • Instruction ID: f44294ad757e79489f59088c5262f94ae25522315f17cb674b3066b3ef14ead9
                              • Opcode Fuzzy Hash: f8fad4b44dbe46480f0c84c9aa2d60288b06a9b89254be2dcdd0673cd822445d
                              • Instruction Fuzzy Hash: 9F01DDB650D7C05FD712CB159C50863FFF8DB86620709C4DFE84987652D165A809CB72
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701261620.00000000014B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_14b0000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ed18fd2a1063584a2ca2b1e887a26f6a57d305e9b04a9490251a9a72722d82f4
                              • Instruction ID: e4010935b3a2af7e473e08cdceff0e913e44dee60cdd37c48d1038429a01e299
                              • Opcode Fuzzy Hash: ed18fd2a1063584a2ca2b1e887a26f6a57d305e9b04a9490251a9a72722d82f4
                              • Instruction Fuzzy Hash: 4A216D711493C49FC707CB20C890B96BFB1AB46204F1985EFD4848F6A3C33A9817DB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701261620.00000000014B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_14b0000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c4d9a20638232783a290ae76b4fc4492c57f394dbb2ace37fd05a8f10cccfe07
                              • Instruction ID: 6b76da81ee46458530e0da7612b273be7649575b74afe1d9d9a529f41a225b04
                              • Opcode Fuzzy Hash: c4d9a20638232783a290ae76b4fc4492c57f394dbb2ace37fd05a8f10cccfe07
                              • Instruction Fuzzy Hash: F211D2302042849FD715CB18D580B6BBBF5EB88709F24C99EE9490B7A3C777D817CA61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701261620.00000000014B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_14b0000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cac0a3ef7c0c0f315467e64550ce095277c8a1fa7396428edc722c022880687d
                              • Instruction ID: 8ccf47180f2062337669110174e80bdb06b5aa7c0e42184a8966a371f65ac902
                              • Opcode Fuzzy Hash: cac0a3ef7c0c0f315467e64550ce095277c8a1fa7396428edc722c022880687d
                              • Instruction Fuzzy Hash: C6112630204280DFD311CB18D4C0B67F7B5AB84719F24C59EE8490BB62C77BD807C661
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701584653.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_1590000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0d107e0dc5f7007dc273056a6e5bb2a6c3cefa5e9520745e248b22ecfa978aaa
                              • Instruction ID: a661d8232b3b1e99d86ce043fd280fcde8bf015d1f94e8a2bda5cf22ebf7423b
                              • Opcode Fuzzy Hash: 0d107e0dc5f7007dc273056a6e5bb2a6c3cefa5e9520745e248b22ecfa978aaa
                              • Instruction Fuzzy Hash: 2E11C2313003548FD72A673080107AF7762ABD2758F15887EC9469F792CEBADC46DB95
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701584653.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_1590000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 463dc0067d87e92675993f1d8d1689f777548d5b6a1fa07d48b23e7a0eee12a8
                              • Instruction ID: d6be6e472531d4533ba6c6cfc86122d859e66e74831149bdc5f0c6bedbbdefde
                              • Opcode Fuzzy Hash: 463dc0067d87e92675993f1d8d1689f777548d5b6a1fa07d48b23e7a0eee12a8
                              • Instruction Fuzzy Hash: 300180313003288BD7196731C010B9F7256ABD1758F14893EC9469F785CEBADC86DBD5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701261620.00000000014B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_14b0000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cffe88e7eca7b1de068a50569141a62928939a82c6ab0fb05efb9e3636e5b14d
                              • Instruction ID: 1ba00593d6d4e6e6cc8f7a28ff582209fcdda6f25580905f21ae512dc282ce8a
                              • Opcode Fuzzy Hash: cffe88e7eca7b1de068a50569141a62928939a82c6ab0fb05efb9e3636e5b14d
                              • Instruction Fuzzy Hash: D011823010C7808FC3078B54C994B5AFFB5AB4A314F1485DFE5894B6A3C336A813CB52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701261620.00000000014B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_14b0000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 125392c993ede1c91cefadc9523ac5077eb6d5d53de9f24be2b0cf4563af261e
                              • Instruction ID: 706d3e62995b0e3deb70c173aa48fec09efca228c38003d74e91a66a276457ea
                              • Opcode Fuzzy Hash: 125392c993ede1c91cefadc9523ac5077eb6d5d53de9f24be2b0cf4563af261e
                              • Instruction Fuzzy Hash: 64116134549380CFD716CF14D590B52BBB1AB96714F28C6EEE8494FBA3C37A980ACB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701261620.00000000014B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_14b0000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bb1b55af5a3511b148ba601d18101a128fa281466cd52ee823f89a24abc4b3f4
                              • Instruction ID: 2b5b5e045e2b2b50008ff9144d535cf39f005fe2f5f5d5fac6a64d99fce4ad93
                              • Opcode Fuzzy Hash: bb1b55af5a3511b148ba601d18101a128fa281466cd52ee823f89a24abc4b3f4
                              • Instruction Fuzzy Hash: E1F06D35104644DFC306CF04D580B16FBB2EB88718F24CAADE8480B762C337E813DA81
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701261620.00000000014B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_14b0000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dbe3f307d9bd17f5fbc64e2bf19f8c98cf4f3de3c9b6637c486e73628fbcabe8
                              • Instruction ID: 58da4c43a57ceac57940e32c7d37c346ec9e07f3c586ae05db69c7c291c646d2
                              • Opcode Fuzzy Hash: dbe3f307d9bd17f5fbc64e2bf19f8c98cf4f3de3c9b6637c486e73628fbcabe8
                              • Instruction Fuzzy Hash: 5FF04F35144640DFC316CF04D580B56F7A2FB95714F24C6AEE8480BB62C7379813CA91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701584653.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_1590000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8ad642aab16f3e55e107e64ca64fffea248f10f9eddcba2e9b3c93ca1790395c
                              • Instruction ID: fb88433c51977a3e845bb6832bfa6bca1669c81f070769485b97e719b4a1b98a
                              • Opcode Fuzzy Hash: 8ad642aab16f3e55e107e64ca64fffea248f10f9eddcba2e9b3c93ca1790395c
                              • Instruction Fuzzy Hash: 3AE022317043602FCB0973B528204FE3BA79FD6278B18087FC249C7692EE2D4C068712
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701261620.00000000014B0000.00000040.00000020.00020000.00000000.sdmp, Offset: 014B0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_14b0000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7cb144900f0c94aac9708fc92ac41468ba77badcf70e852747903d75242007b8
                              • Instruction ID: bb7b513ff06459c391a8ded6f3bd27b6bd001a3b9797e085322df40abc462b04
                              • Opcode Fuzzy Hash: 7cb144900f0c94aac9708fc92ac41468ba77badcf70e852747903d75242007b8
                              • Instruction Fuzzy Hash: 1BE092B66006044BD650CF0AEC81462F7D8EB84630708C07FDC0D8B701E275B508CAA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701584653.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_1590000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 74be40921cc83ba327a32e4a34e510d7a340afa3e6b953b82b136bd91aee79a2
                              • Instruction ID: 562e9434a8cf197d673a52c1a00f2e75dfb11681ac21966b45747124fce030e1
                              • Opcode Fuzzy Hash: 74be40921cc83ba327a32e4a34e510d7a340afa3e6b953b82b136bd91aee79a2
                              • Instruction Fuzzy Hash: FDE09A341893408FC3198B30A0501A17BB6EB86319B2486AFD88A8B357C63FDC07CB10
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701584653.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_1590000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e9d1d274bc5400f01e08694a57884665e1aa025cde659449706befae4bf04e3d
                              • Instruction ID: 2c8854b5d54adf6910617bdf4c2bcf93ac9cf49f1cfd528e2f0c05a0f3b8c348
                              • Opcode Fuzzy Hash: e9d1d274bc5400f01e08694a57884665e1aa025cde659449706befae4bf04e3d
                              • Instruction Fuzzy Hash: D3D05B16700135134A08727B54619BF258F9BDA574718443BD60DC7790DD694C0543A1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000B.00000002.172701584653.0000000001590000.00000040.00000800.00020000.00000000.sdmp, Offset: 01590000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_1590000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5fb93b92f820aff4c6c7a80cde236896bd6e067a2d1246b06fb99af1db89fbc9
                              • Instruction ID: efe7533ae2d48bffb7f09992664b9e2ed3f1d635cd29fd870e0923466b3fa17f
                              • Opcode Fuzzy Hash: 5fb93b92f820aff4c6c7a80cde236896bd6e067a2d1246b06fb99af1db89fbc9
                              • Instruction Fuzzy Hash: AFD0A7301013048BC3249734E000642739AFB8531DF10487ED50A4B345CB7BEC41CB84
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700093552.0000000001422000.00000040.00000800.00020000.00000000.sdmp, Offset: 01422000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_1422000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: edc3ad2afc67725acaddd0b1d959d9968bde5d8d072318a4b609613ca730a7cc
                              • Instruction ID: 947cd5e1eabddcb7cf4381bc6d0a2bea54678a10eb1ff114624eec5f1f1c3df3
                              • Opcode Fuzzy Hash: edc3ad2afc67725acaddd0b1d959d9968bde5d8d072318a4b609613ca730a7cc
                              • Instruction Fuzzy Hash: CCD05E792056E14FE316DA1CC2A4F963BE4AB55714F8A44FAEC009BB73C7A8D5C1D610
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000B.00000002.172700093552.0000000001422000.00000040.00000800.00020000.00000000.sdmp, Offset: 01422000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_11_2_1422000_TDService.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: abe8a0b0605cd571f91429c562259993b8a159af254aee62b19eb658790e1ede
                              • Instruction ID: e34a35fc567cb1747446411744c7f79d987ca823cae27efdde653fe29dab416f
                              • Opcode Fuzzy Hash: abe8a0b0605cd571f91429c562259993b8a159af254aee62b19eb658790e1ede
                              • Instruction Fuzzy Hash: C8D05E342002814BD719DA1CC2D4F5A7BD4AF40714F0644E9AC10CB772C7B4D8C0CA00
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Execution Graph

                              Execution Coverage:7.7%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:0%
                              Total number of Nodes:1815
                              Total number of Limit Nodes:105
                              execution_graph 36755 1000e070 36756 1000e082 36755->36756 36758 1000e08c 36755->36758 36771 10012a20 36756->36771 36759 1000e093 36758->36759 36762 100027a0 36758->36762 36766 10002f54 36758->36766 36763 100027c4 36762->36763 36764 100027e3 36763->36764 36774 10002870 36763->36774 36764->36758 36767 10002f61 36766->36767 36768 10002f8b 36767->36768 36800 10006814 36767->36800 36805 100068c9 36767->36805 36768->36758 36772 10012a24 36771->36772 36773 10012a27 VirtualAlloc 36771->36773 36772->36758 36773->36758 36777 10002805 36774->36777 36776 10002894 36776->36764 36784 10018eb0 36777->36784 36779 1000280f EnterCriticalSection 36785 6a151ab0 36779->36785 36780 10002837 36781 1000284c LeaveCriticalSection 36780->36781 36793 6a1519c0 36780->36793 36781->36776 36784->36779 36786 6a151ad0 SetFilePointer 36785->36786 36787 6a151ac3 36785->36787 36788 6a151b01 GetLastError 36786->36788 36789 6a151b0b 36786->36789 36787->36780 36788->36789 36790 6a151b25 36789->36790 36791 6a151b2f GetLastError 36789->36791 36790->36780 36792 6a151b35 36791->36792 36792->36780 36794 6a1519d2 ReadFile 36793->36794 36795 6a1519cd 36793->36795 36796 6a1519fd 36794->36796 36795->36794 36797 6a151a06 36796->36797 36798 6a151a0c GetLastError 36796->36798 36797->36781 36799 6a151a16 36798->36799 36799->36781 36801 1000681f 36800->36801 36812 6a151be0 36801->36812 36817 6a157350 36801->36817 36802 10006833 36802->36767 36809 100068d5 36805->36809 36806 10006982 36806->36767 36807 1000688a 98 API calls 36807->36809 36809->36806 36809->36807 36854 100045ee 36809->36854 36858 1000670b 36809->36858 36862 1000684d 8 API calls 36809->36862 36813 6a151be8 FindCloseChangeNotification 36812->36813 36814 6a151bf3 36812->36814 36813->36814 36815 6a151bfd GetLastError 36813->36815 36814->36802 36816 6a151c07 36815->36816 36816->36802 36818 6a157516 36817->36818 36819 6a157389 36817->36819 36818->36802 36819->36818 36822 6a15742b SetFileTime 36819->36822 36826 6a157462 36819->36826 36821 6a157491 36824 6a1574eb 36821->36824 36827 6a161060 SetFileAttributesW 36821->36827 36825 6a151be0 2 API calls 36822->36825 36824->36802 36825->36826 36826->36818 36826->36821 36835 6a1563a0 36826->36835 36828 6a1610ad 36827->36828 36829 6a161099 36827->36829 36845 6a1628a0 36828->36845 36829->36824 36831 6a1610d6 36832 6a1610e8 SetFileAttributesW 36831->36832 36833 6a161115 36831->36833 36834 6a1610fb 36832->36834 36833->36824 36834->36824 36836 6a1563f7 36835->36836 36837 6a1563fd 36836->36837 36838 6a156419 36836->36838 36849 6a162e40 36837->36849 36844 6a156435 36838->36844 36853 6a162f70 RaiseException 36838->36853 36840 6a162e40 VariantClear 36843 6a15644a 36840->36843 36841 6a156406 36841->36821 36843->36821 36844->36840 36847 6a1628e4 36845->36847 36846 6a16298b GetCurrentDirectoryW 36848 6a1629a4 36846->36848 36847->36846 36847->36848 36848->36831 36850 6a162e65 VariantClear 36849->36850 36851 6a162e4b 36849->36851 36850->36841 36851->36850 36852 6a162e59 36851->36852 36852->36841 36853->36844 36855 100045ff 36854->36855 36856 1000460f 36854->36856 36863 6a151c20 36855->36863 36856->36809 36859 10006715 36858->36859 36870 6a156460 36859->36870 36860 10006762 36860->36809 36862->36809 36864 6a151c32 WriteFile 36863->36864 36865 6a151c2d 36863->36865 36866 6a151c69 36864->36866 36865->36864 36867 6a151c75 GetLastError 36866->36867 36868 6a151c6f 36866->36868 36869 6a151c7f 36867->36869 36868->36856 36869->36856 36871 6a1564a0 36870->36871 36958 6a15abe0 36871->36958 36873 6a156522 36874 6a156528 36873->36874 36980 6a15ab10 36873->36980 36874->36860 36876 6a156565 36876->36860 36877 6a15655c 36877->36876 36878 6a1565e7 36877->36878 36879 6a1565bd 36877->36879 36880 6a156623 36878->36880 36882 6a1565f6 36878->36882 36881 6a162e40 VariantClear 36879->36881 36883 6a162e40 VariantClear 36880->36883 36884 6a1565c5 36881->36884 36885 6a162e40 VariantClear 36882->36885 36886 6a15663f 36883->36886 36884->36860 36887 6a1565fe 36885->36887 36888 6a15ab10 VariantClear 36886->36888 36887->36860 36889 6a156651 36888->36889 36890 6a15665a 36889->36890 36891 6a1563a0 2 API calls 36889->36891 36890->36860 36892 6a156683 36891->36892 36893 6a156689 36892->36893 36894 6a1566c4 36892->36894 37033 6a16e770 71 API calls 36892->37033 36893->36860 36896 6a15673c 36894->36896 36897 6a1566ec 36894->36897 36954 6a156fdb 36894->36954 36900 6a156767 36896->36900 36901 6a156791 36896->36901 37034 6a1609e0 36897->37034 36898 6a1609e0 67 API calls 36915 6a1570cd 36898->36915 36903 6a162e40 VariantClear 36900->36903 36902 6a15679b 36901->36902 36904 6a15716a 36901->36904 36907 6a162e40 VariantClear 36902->36907 36906 6a15676f 36903->36906 36908 6a162e40 VariantClear 36904->36908 36905 6a1566f3 36905->36860 36906->36860 36909 6a1567bf 36907->36909 36921 6a15688e 36908->36921 36992 6a1562b0 36909->36992 36911 6a1567d5 36912 6a1567db 36911->36912 36913 6a1562b0 VariantClear 36911->36913 36912->36860 36914 6a156810 36913->36914 36914->36884 36916 6a1562b0 VariantClear 36914->36916 36915->36860 36917 6a15682d 36916->36917 36917->36876 36918 6a15ab10 VariantClear 36917->36918 36919 6a156850 36918->36919 36919->36876 37004 6a16df80 36919->37004 36921->36860 36922 6a1568ad 37010 6a154dd0 36922->37010 36924 6a1568c0 37014 6a15a360 36924->37014 36927 6a156884 36927->36921 36927->36922 37040 6a1607d0 CharUpperW CharUpperW 36927->37040 36928 6a1568c9 36933 6a1569f7 36928->36933 37039 6a156250 CreateDirectoryW GetLastError CreateDirectoryW GetCurrentDirectoryW 36928->37039 36930 6a156a86 36936 6a156c89 36930->36936 37018 6a1625a0 36930->37018 36931 6a156a28 36955 6a156a42 36931->36955 37042 6a161140 RemoveDirectoryW RemoveDirectoryW GetCurrentDirectoryW 36931->37042 36932 6a1609e0 67 API calls 36953 6a156e99 36932->36953 36933->36930 36933->36931 36936->36887 36936->36932 36936->36954 36938 6a156931 36938->36933 36939 6a1569db 36938->36939 37041 6a160f70 CreateFileW CreateFileW SetFileTime CloseHandle GetCurrentDirectoryW 36939->37041 36940 6a156d35 36942 6a156ebf 36940->36942 36943 6a156d3e 36940->36943 36941 6a156c81 37043 6a1510e0 10 API calls 36941->37043 37046 6a1617b0 SetFileAttributesW SetFileAttributesW DeleteFileW DeleteFileW GetCurrentDirectoryW 36942->37046 37044 6a1510e0 10 API calls 36943->37044 36947 6a1569f4 36947->36933 36949 6a156d55 36949->36887 36950 6a156dc8 36949->36950 37045 6a161210 MoveFileW MoveFileW GetCurrentDirectoryW 36950->37045 36952 6a156aaa 36952->36936 36952->36940 36952->36941 36952->36953 36952->36955 37023 6a162a70 36953->37023 36954->36898 36954->36915 36955->36860 36956 6a156ecb 36956->36953 36956->36955 36957 6a156dd5 36957->36936 36957->36956 36959 6a15ac34 36958->36959 36960 6a15ac3a 36959->36960 36965 6a15ac59 36959->36965 36961 6a162e40 VariantClear 36960->36961 36962 6a15ac43 36961->36962 36962->36873 36963 6a15ad61 36964 6a162e40 VariantClear 36963->36964 36967 6a15ad6a 36964->36967 36965->36963 36966 6a162e40 VariantClear 36965->36966 36969 6a15ac9a 36966->36969 36967->36873 36968 6a15ad4b 36968->36873 36969->36968 36970 6a15acdf 36969->36970 36971 6a15acfe 36969->36971 36972 6a162e40 VariantClear 36970->36972 36973 6a15ad3d 36971->36973 36977 6a15ad09 36971->36977 36975 6a15ace8 36972->36975 36973->36963 36974 6a15ad42 36973->36974 36976 6a162e40 VariantClear 36974->36976 36975->36873 36976->36968 36978 6a162e40 VariantClear 36977->36978 36979 6a15ad27 36978->36979 36979->36873 36981 6a15ab66 36980->36981 36982 6a15ab6c 36981->36982 36983 6a15ab88 36981->36983 36984 6a162e40 VariantClear 36982->36984 36985 6a15ab93 36983->36985 36987 6a15abbf 36983->36987 36986 6a15ab75 36984->36986 36989 6a162e40 VariantClear 36985->36989 36986->36877 36988 6a162e40 VariantClear 36987->36988 36990 6a15abc8 36988->36990 36991 6a15aba7 36989->36991 36990->36877 36991->36877 36993 6a156309 36992->36993 36994 6a15632d 36993->36994 36995 6a15630f 36993->36995 36997 6a156338 36994->36997 36999 6a15637b 36994->36999 36996 6a162e40 VariantClear 36995->36996 36998 6a156318 36996->36998 37001 6a162e40 VariantClear 36997->37001 36998->36911 37000 6a162e40 VariantClear 36999->37000 37002 6a156384 37000->37002 37003 6a156361 37001->37003 37002->36911 37003->36911 37008 6a16dfb7 37004->37008 37005 6a16e021 37048 6a154d10 67 API calls 37005->37048 37007 6a16dfda 37007->36927 37008->37005 37008->37007 37047 6a154d10 67 API calls 37008->37047 37012 6a154de9 37010->37012 37011 6a154e2a 37011->36924 37012->37011 37049 6a175ff4 66 API calls 37012->37049 37015 6a15a51c 37014->37015 37016 6a15a399 37014->37016 37015->36928 37016->37015 37050 6a15a240 37016->37050 37062 6a162470 37018->37062 37021 6a1625f0 37021->36952 37022 6a1625e9 FindClose 37022->37021 37024 6a162ab3 CreateFileW 37023->37024 37025 6a162a9e CloseHandle 37023->37025 37026 6a162ad9 37024->37026 37032 6a162b33 37024->37032 37027 6a162b57 37025->37027 37028 6a162aad 37025->37028 37029 6a1628a0 GetCurrentDirectoryW 37026->37029 37027->36954 37028->37024 37030 6a162b00 37029->37030 37031 6a162b15 CreateFileW 37030->37031 37030->37032 37031->37032 37032->36954 37033->36894 37082 6a175f2a 37034->37082 37037 6a160a07 37037->36905 37039->36938 37040->36927 37041->36947 37042->36955 37043->36936 37044->36949 37045->36957 37046->36957 37047->37008 37048->37007 37049->37012 37058 6a15a250 37050->37058 37051 6a15a2b7 37060 6a15a1c0 CharUpperW CharUpperW 37051->37060 37053 6a15a2c5 37055 6a15a2e1 37053->37055 37061 6a15a1c0 CharUpperW CharUpperW 37053->37061 37055->37016 37057 6a15a2d7 37057->37016 37058->37051 37058->37055 37059 6a1607d0 CharUpperW CharUpperW 37058->37059 37059->37058 37060->37053 37061->37057 37063 6a1624c3 FindClose 37062->37063 37064 6a1624d8 FindFirstFileW 37062->37064 37065 6a1624d2 37063->37065 37067 6a162542 37063->37067 37066 6a1624eb 37064->37066 37064->37067 37065->37064 37070 6a1628a0 GetCurrentDirectoryW 37066->37070 37073 6a1751c7 37067->37073 37069 6a162589 37069->37021 37069->37022 37071 6a16251d 37070->37071 37071->37067 37072 6a162534 FindFirstFileW 37071->37072 37072->37067 37074 6a1751d1 IsDebuggerPresent 37073->37074 37075 6a1751cf 37073->37075 37081 6a1784c5 37074->37081 37075->37069 37078 6a176ba3 SetUnhandledExceptionFilter UnhandledExceptionFilter 37079 6a176bc0 37078->37079 37080 6a176bc8 GetCurrentProcess TerminateProcess 37078->37080 37079->37080 37080->37069 37081->37078 37083 6a175fdd 37082->37083 37093 6a175f3c 37082->37093 37108 6a179494 6 API calls 37083->37108 37085 6a175fe3 37109 6a177f70 66 API calls 37085->37109 37090 6a175f99 RtlAllocateHeap 37090->37093 37091 6a175f4d 37091->37093 37101 6a176fbb 66 API calls 37091->37101 37102 6a176e10 66 API calls 37091->37102 37103 6a177814 GetModuleHandleW GetProcAddress ExitProcess 37091->37103 37093->37090 37093->37091 37094 6a175fc9 37093->37094 37097 6a175fce 37093->37097 37099 6a1609ed 37093->37099 37104 6a175edb 66 API calls 37093->37104 37105 6a179494 6 API calls 37093->37105 37106 6a177f70 66 API calls 37094->37106 37107 6a177f70 66 API calls 37097->37107 37099->37037 37100 6a17663b RaiseException 37099->37100 37100->37037 37101->37091 37102->37091 37104->37093 37105->37093 37106->37097 37107->37099 37108->37085 37109->37099 37110 10005761 37111 1000577f 37110->37111 37112 1000576e 37110->37112 37112->37111 37116 100057a0 37112->37116 37117 100057aa 37116->37117 37131 100015ec 37117->37131 37122 100015ec 34 API calls 37123 100057f0 37122->37123 37124 100015a7 34 API calls 37123->37124 37125 100057fb 37124->37125 37140 100033a2 34 API calls 37125->37140 37127 10005779 37128 1000109b 37127->37128 37182 100189ee 37128->37182 37141 10001601 37131->37141 37134 100015a7 37135 100015ce 37134->37135 37136 100015ec 34 API calls 37135->37136 37137 100015d6 37136->37137 37138 1000109b 29 API calls 37137->37138 37139 100015de 37138->37139 37139->37122 37140->37127 37144 10005905 37141->37144 37142 100015f3 37142->37134 37146 1000591c 37144->37146 37145 10005954 37145->37142 37146->37145 37148 1000109b 29 API calls 37146->37148 37149 100039c8 37146->37149 37148->37146 37150 100039d2 37149->37150 37151 100015a7 34 API calls 37150->37151 37152 100039ed 37151->37152 37153 100015a7 34 API calls 37152->37153 37154 100039fc 37153->37154 37155 100015ec 34 API calls 37154->37155 37156 10003a16 37155->37156 37157 100015a7 34 API calls 37156->37157 37158 10003a21 37157->37158 37159 100015ec 34 API calls 37158->37159 37160 10003a38 37159->37160 37161 100015a7 34 API calls 37160->37161 37162 10003a43 37161->37162 37167 1000302b 37162->37167 37164 10003a4e 37165 10003600 34 API calls 37164->37165 37166 10003a62 37165->37166 37166->37146 37168 10003043 37167->37168 37169 1000304a 37167->37169 37178 100175b0 SetEvent GetLastError 37168->37178 37171 10003054 37169->37171 37172 10003059 37169->37172 37179 10017560 WaitForSingleObject 37171->37179 37180 10017530 CloseHandle GetLastError 37172->37180 37175 10003060 37181 10017530 CloseHandle GetLastError 37175->37181 37177 10003068 37178->37169 37179->37172 37180->37175 37181->37177 37183 100010a4 37182->37183 37184 10018a1c 37182->37184 37183->37111 37185 10018a61 37184->37185 37186 10018a26 37184->37186 37198 10018a52 37185->37198 37202 1001a13a 29 API calls 37185->37202 37199 1001a13a 29 API calls 37186->37199 37188 10018aba HeapFree 37188->37183 37190 10018a2d 37191 10018a47 37190->37191 37200 1001a53c VirtualFree VirtualFree HeapFree 37190->37200 37201 10018a58 LeaveCriticalSection 37191->37201 37194 10018a6d 37195 10018a99 37194->37195 37203 1001b2c3 VirtualFree HeapFree VirtualFree 37194->37203 37204 10018ab0 LeaveCriticalSection 37195->37204 37198->37183 37198->37188 37199->37190 37200->37191 37201->37198 37202->37194 37203->37195 37204->37198 37205 10019fd5 37206 10019fe8 37205->37206 37210 10019ff1 37205->37210 37207 1001a019 37206->37207 37244 100032c6 GetVersionExA 37206->37244 37210->37206 37210->37207 37215 10019efc 37210->37215 37211 1001a025 37211->37207 37212 1001a039 37211->37212 37213 10019efc 105 API calls 37211->37213 37212->37207 37214 10019efc 105 API calls 37212->37214 37213->37212 37214->37207 37216 10019f91 37215->37216 37217 10019f09 GetVersion 37215->37217 37219 10019fc3 37216->37219 37220 10019f97 37216->37220 37245 1001a3c4 HeapCreate 37217->37245 37222 10019f5c 37219->37222 37276 1001c098 37219->37276 37220->37222 37224 10019fb2 37220->37224 37275 1001c22d 32 API calls 37220->37275 37221 10019f1b 37221->37222 37263 1001bfac 37 API calls 37221->37263 37222->37206 37257 1001c8f1 30 API calls 37224->37257 37228 10019f53 37231 10019f60 GetCommandLineA 37228->37231 37232 10019f57 37228->37232 37229 10019fb7 37258 1001c000 37229->37258 37271 1001cc4b 37 API calls 37231->37271 37264 1001a421 37232->37264 37236 1001a421 6 API calls 37236->37222 37237 10019f70 37272 1001c735 34 API calls 37237->37272 37239 10019f7a 37273 1001c9fe 49 API calls 37239->37273 37241 10019f7f 37274 1001c945 48 API calls 37241->37274 37243 10019f84 37243->37222 37244->37211 37246 1001a3e4 37245->37246 37247 1001a41a 37245->37247 37298 1001a27c 57 API calls 37246->37298 37247->37221 37249 1001a3e9 37250 1001a400 37249->37250 37251 1001a3f3 37249->37251 37253 1001a41d 37250->37253 37300 1001b010 HeapAlloc VirtualAlloc VirtualAlloc VirtualFree HeapFree 37250->37300 37299 1001a4c9 HeapAlloc 37251->37299 37253->37221 37255 1001a3fd 37255->37253 37256 1001a40e HeapDestroy 37255->37256 37256->37247 37257->37229 37301 1001a0ce 37258->37301 37260 1001c005 37261 10019fbc 37260->37261 37262 1001c00f TlsFree 37260->37262 37261->37236 37262->37261 37263->37228 37265 1001a42d 37264->37265 37267 1001a493 37264->37267 37266 1001a47f HeapFree 37265->37266 37269 1001a44d VirtualFree VirtualFree HeapFree 37265->37269 37268 1001a4ba HeapDestroy 37266->37268 37267->37268 37270 1001a4a6 VirtualFree 37267->37270 37268->37222 37269->37266 37269->37269 37270->37267 37271->37237 37272->37239 37273->37241 37274->37243 37275->37224 37277 1001c137 37276->37277 37278 1001c0a6 37276->37278 37277->37222 37279 1001c0bc 37278->37279 37280 1001c0af TlsGetValue 37278->37280 37282 1001c0c9 37279->37282 37283 100189ee 29 API calls 37279->37283 37280->37279 37281 1001c128 TlsSetValue 37280->37281 37281->37277 37284 1001c0d7 37282->37284 37285 100189ee 29 API calls 37282->37285 37283->37282 37286 1001c0e5 37284->37286 37288 100189ee 29 API calls 37284->37288 37285->37284 37287 1001c0f3 37286->37287 37289 100189ee 29 API calls 37286->37289 37290 1001c101 37287->37290 37291 100189ee 29 API calls 37287->37291 37288->37286 37289->37287 37292 1001c10f 37290->37292 37293 100189ee 29 API calls 37290->37293 37291->37290 37294 1001c120 37292->37294 37296 100189ee 29 API calls 37292->37296 37293->37292 37295 100189ee 29 API calls 37294->37295 37297 1001c127 37295->37297 37296->37294 37297->37281 37298->37249 37299->37255 37300->37255 37303 1001a0db 37301->37303 37302 1001a117 DeleteCriticalSection DeleteCriticalSection DeleteCriticalSection DeleteCriticalSection 37302->37260 37303->37302 37304 1001a101 DeleteCriticalSection 37303->37304 37305 100189ee 29 API calls 37304->37305 37305->37303 37306 10002175 37307 10002182 37306->37307 37308 10002193 37306->37308 37307->37308 37312 1000219a 37307->37312 37311 1000109b 29 API calls 37311->37308 37313 100021a4 37312->37313 37316 10012a40 37313->37316 37317 1000218d 37316->37317 37318 10012a44 VirtualFree 37316->37318 37317->37311 37318->37317 37319 6a1728b0 37320 6a1728bd 37319->37320 37324 6a1728f6 37319->37324 37320->37324 37325 6a172bf0 37320->37325 37326 6a172c0a 37325->37326 37327 6a172bf9 FreeLibrary 37325->37327 37328 6a1728f1 37326->37328 37329 6a172c13 DeleteFileW 37326->37329 37327->37326 37330 6a172a30 37328->37330 37329->37328 37331 6a172a94 37330->37331 37332 6a172b5b 37331->37332 37335 6a172aac 37331->37335 37348 6a172c40 69 API calls 37332->37348 37334 6a172b65 37336 6a172b76 FindResourceW 37334->37336 37347 6a172b54 37334->37347 37343 6a172b13 FindFirstFileW 37335->37343 37337 6a172b88 37336->37337 37336->37347 37349 6a172980 7 API calls 37337->37349 37339 6a172b94 37342 6a172ba6 LoadLibraryW 37339->37342 37339->37347 37340 6a1751c7 5 API calls 37341 6a172bdd 37340->37341 37341->37324 37342->37347 37344 6a172b72 37343->37344 37345 6a172b2d 37343->37345 37344->37336 37346 6a172b3b LoadLibraryW FindClose 37345->37346 37346->37347 37347->37340 37348->37334 37349->37339 37350 6a173ef0 37358 6a173f2d 37350->37358 37351 6a175f2a 66 API calls 37352 6a174333 37351->37352 37353 6a17434d 37352->37353 37478 6a17663b RaiseException 37352->37478 37368 6a171230 37353->37368 37358->37351 37362 6a1740d3 37358->37362 37359 6a17437e 37479 6a171a40 67 API calls 37359->37479 37361 6a17439e 37361->37362 37363 6a1743d5 37361->37363 37480 6a175bd8 6 API calls 37361->37480 37364 6a1743e0 37363->37364 37481 6a175bd8 6 API calls 37363->37481 37364->37362 37482 6a175bd8 6 API calls 37364->37482 37369 6a175f2a 66 API calls 37368->37369 37370 6a17125d 37369->37370 37371 6a171277 37370->37371 37483 6a17663b RaiseException 37370->37483 37373 6a1682b0 37371->37373 37484 6a15f940 37373->37484 37375 6a168305 37376 6a168329 37375->37376 37658 6a17663b RaiseException 37375->37658 37378 6a154dd0 66 API calls 37376->37378 37379 6a168334 37378->37379 37488 6a167df0 37379->37488 37381 6a168340 37492 6a153be0 37381->37492 37384 6a168395 37507 6a1542e0 37384->37507 37388 6a175f2a 66 API calls 37389 6a1683b6 37388->37389 37391 6a1683d0 37389->37391 37660 6a17663b RaiseException 37389->37660 37551 6a166cc0 37391->37551 37395 6a16846d 37570 6a1672f0 37395->37570 37397 6a168498 37419 6a1684b7 37397->37419 37663 6a17663b RaiseException 37397->37663 37399 6a16841b 37399->37395 37662 6a17663b RaiseException 37399->37662 37401 6a168834 37402 6a1609e0 67 API calls 37401->37402 37431 6a16883b 37402->37431 37403 6a168c70 37622 6a164c00 37403->37622 37405 6a168819 37676 6a17663b RaiseException 37405->37676 37407 6a168cfe 37688 6a17663b RaiseException 37407->37688 37408 6a168d65 37690 6a17663b RaiseException 37408->37690 37409 6a168cb4 37409->37407 37410 6a168ce9 37409->37410 37415 6a168d19 37409->37415 37686 6a17663b RaiseException 37409->37686 37687 6a17663b RaiseException 37410->37687 37413 6a168d80 37691 6a17663b RaiseException 37413->37691 37415->37408 37416 6a168d4a 37415->37416 37468 6a168af7 37415->37468 37689 6a17663b RaiseException 37416->37689 37419->37401 37419->37403 37419->37405 37664 6a17e5ce 67 API calls 37419->37664 37421 6a168d9d 37692 6a17663b RaiseException 37421->37692 37424 6a168531 37436 6a16854a 37424->37436 37665 6a1693a0 67 API calls 37424->37665 37425 6a168db8 37693 6a17663b RaiseException 37425->37693 37427 6a168dd3 37430 6a168b71 37430->37359 37575 6a160880 37431->37575 37433 6a1689c1 37434 6a1689eb 37433->37434 37677 6a155290 67 API calls 37433->37677 37583 6a158ab0 37434->37583 37666 6a16a7b0 CharUpperW CharUpperW 37436->37666 37439 6a16866d 37441 6a168671 37439->37441 37442 6a16868c 37439->37442 37440 6a168aa3 37446 6a168c55 37440->37446 37447 6a168aae 37440->37447 37667 6a17663b RaiseException 37441->37667 37668 6a16b9c0 224 API calls 37442->37668 37443 6a168a88 37680 6a17663b RaiseException 37443->37680 37685 6a17663b RaiseException 37446->37685 37453 6a168b95 37447->37453 37454 6a168ad8 37447->37454 37449 6a168a3e 37449->37440 37449->37443 37449->37447 37450 6a168a6d 37449->37450 37678 6a17663b RaiseException 37449->37678 37679 6a17663b RaiseException 37450->37679 37472 6a168bb4 37453->37472 37683 6a17663b RaiseException 37453->37683 37454->37468 37681 6a17663b RaiseException 37454->37681 37456 6a168728 37457 6a168733 37456->37457 37458 6a1687fe 37456->37458 37470 6a168752 37457->37470 37672 6a17663b RaiseException 37457->37672 37675 6a17663b RaiseException 37458->37675 37459 6a1686b2 37459->37456 37459->37457 37460 6a16870d 37459->37460 37464 6a1686f2 37459->37464 37669 6a17663b RaiseException 37459->37669 37671 6a17663b RaiseException 37460->37671 37670 6a17663b RaiseException 37464->37670 37682 6a168de0 66 API calls 37468->37682 37673 6a168270 EnterCriticalSection LeaveCriticalSection 37470->37673 37684 6a168de0 66 API calls 37472->37684 37474 6a168c2e 37474->37359 37475 6a168796 37674 6a168de0 66 API calls 37475->37674 37477 6a1687da 37477->37359 37478->37353 37479->37361 37480->37363 37481->37364 37482->37362 37483->37371 37486 6a15f97d 37484->37486 37487 6a15fb0c 37486->37487 37694 6a154d10 67 API calls 37486->37694 37487->37375 37489 6a167e4b 37488->37489 37695 6a167c10 37489->37695 37491 6a167ecb 37491->37381 37699 6a15fc80 37492->37699 37494 6a153c1c 37704 6a1753fe 37494->37704 37498 6a153c2d 37499 6a1753fe 66 API calls 37498->37499 37500 6a153c43 37499->37500 37501 6a17539a 66 API calls 37500->37501 37502 6a153c49 37501->37502 37503 6a1753fe 66 API calls 37502->37503 37504 6a153c5f 37503->37504 37505 6a17539a 66 API calls 37504->37505 37506 6a153c65 37505->37506 37506->37384 37659 6a17663b RaiseException 37506->37659 37513 6a15431b 37507->37513 37509 6a152670 RaiseException 37509->37513 37510 6a153cf0 CharUpperW RaiseException 37510->37513 37511 6a152d80 98 API calls 37511->37513 37513->37509 37513->37510 37513->37511 37514 6a154579 37513->37514 37516 6a154583 37513->37516 37517 6a15474d 37513->37517 37536 6a154936 CharUpperW 37513->37536 37549 6a1546c7 37513->37549 37726 6a1526e0 37513->37726 37760 6a152940 86 API calls 37513->37760 37761 6a152670 RaiseException 37514->37761 37518 6a1545c8 37516->37518 37762 6a152d80 98 API calls 37516->37762 37769 6a153750 74 API calls 37517->37769 37521 6a1545f1 37518->37521 37763 6a152d80 98 API calls 37518->37763 37524 6a15460d 37521->37524 37764 6a16e950 69 API calls 37521->37764 37522 6a15475f 37770 6a1539a0 67 API calls 37522->37770 37730 6a153250 37524->37730 37529 6a16ed50 69 API calls 37531 6a154a74 37529->37531 37531->37388 37533 6a15476c 37537 6a15487b 37533->37537 37539 6a15485a 37533->37539 37771 6a17663b RaiseException 37533->37771 37534 6a154623 37765 6a154d10 67 API calls 37534->37765 37535 6a15466f 37738 6a153e70 37535->37738 37536->37513 37542 6a153250 74 API calls 37537->37542 37539->37537 37772 6a17663b RaiseException 37539->37772 37542->37549 37543 6a15464e 37766 6a154d10 67 API calls 37543->37766 37547 6a15465b 37547->37549 37767 6a1539a0 67 API calls 37547->37767 37548 6a15469b 37548->37549 37768 6a17663b RaiseException 37548->37768 37549->37529 37566 6a166d1e 37551->37566 37552 6a166fe8 37553 6a166ff5 37552->37553 37554 6a167001 37552->37554 37889 6a1669e0 78 API calls 37553->37889 37890 6a165c80 16 API calls 37554->37890 37557 6a16700b 37891 6a1669e0 78 API calls 37557->37891 37558 6a167119 37559 6a1751c7 5 API calls 37558->37559 37560 6a167139 37559->37560 37560->37399 37661 6a17663b RaiseException 37560->37661 37563 6a16703f 37569 6a166ffc 37563->37569 37892 6a166b40 85 API calls 37563->37892 37566->37552 37887 6a166280 67 API calls 37566->37887 37888 6a167860 67 API calls 37566->37888 37567 6a167094 37567->37569 37893 6a166b40 85 API calls 37567->37893 37569->37558 37572 6a167329 37570->37572 37571 6a1673fa 37571->37397 37572->37571 37574 6a160880 RaiseException 37572->37574 37894 6a1607d0 CharUpperW CharUpperW 37572->37894 37574->37572 37576 6a1608fc 37575->37576 37577 6a16088d 37575->37577 37576->37433 37578 6a1608aa 37577->37578 37895 6a17663b RaiseException 37577->37895 37580 6a1608d2 37578->37580 37896 6a17663b RaiseException 37578->37896 37580->37576 37897 6a17663b RaiseException 37580->37897 37591 6a158b3d 37583->37591 37584 6a158ca8 37585 6a175f2a 66 API calls 37584->37585 37586 6a158cb5 37585->37586 37587 6a158cfd 37586->37587 37955 6a17663b RaiseException 37586->37955 37898 6a158400 37587->37898 37588 6a162470 9 API calls 37588->37591 37591->37584 37591->37588 37592 6a158ccf 37591->37592 37593 6a158bf8 FindClose 37591->37593 37595 6a158ce6 37591->37595 37596 6a160880 RaiseException 37591->37596 37956 6a17663b RaiseException 37592->37956 37593->37591 37957 6a17663b RaiseException 37595->37957 37596->37591 37598 6a162470 9 API calls 37619 6a158d0f 37598->37619 37599 6a158e9f FindClose 37599->37619 37600 6a159969 37963 6a17663b RaiseException 37600->37963 37602 6a159980 37605 6a167240 CharUpperW CharUpperW 37605->37619 37606 6a15966c 37959 6a1582a0 37606->37959 37608 6a15970e 37609 6a1582a0 101 API calls 37608->37609 37610 6a158d9f 37609->37610 37610->37449 37611 6a1597ad 37613 6a1582a0 101 API calls 37611->37613 37613->37610 37615 6a159813 37617 6a1582a0 101 API calls 37615->37617 37616 6a159d00 RaiseException 37616->37619 37617->37610 37618 6a1598be 37620 6a1582a0 101 API calls 37618->37620 37619->37598 37619->37599 37619->37600 37619->37605 37619->37606 37619->37608 37619->37610 37619->37611 37619->37615 37619->37616 37619->37618 37621 6a1582a0 101 API calls 37619->37621 37904 6a159f10 37619->37904 37909 6a15cae0 37619->37909 37928 6a158670 37619->37928 37958 6a1607d0 CharUpperW CharUpperW 37619->37958 37620->37610 37621->37619 37623 6a1652a9 37622->37623 37629 6a164c52 37622->37629 37623->37409 37624 6a162470 9 API calls 37624->37629 37625 6a164cdf FindClose 37625->37629 37626 6a15cae0 179 API calls 37626->37629 37627 6a165327 37634 6a1582a0 101 API calls 37627->37634 37628 6a165315 38941 6a17663b RaiseException 37628->38941 37629->37623 37629->37624 37629->37625 37629->37626 37629->37629 37631 6a1652c1 37629->37631 37633 6a15abe0 VariantClear 37629->37633 37641 6a165364 37629->37641 37642 6a15ab10 VariantClear 37629->37642 37643 6a16539e 37629->37643 37645 6a1582a0 101 API calls 37629->37645 37646 6a1653e5 37629->37646 37653 6a164a10 VariantClear RaiseException 37629->37653 37655 6a164b60 VariantClear 37629->37655 38933 6a165440 67 API calls 37629->38933 38934 6a16e6e0 71 API calls 37629->38934 38935 6a164ac0 VariantClear 37629->38935 38936 6a176308 66 API calls 37629->38936 38937 6a165560 67 API calls 37629->38937 37630 6a1652eb 37636 6a165303 37630->37636 38939 6a17663b RaiseException 37630->38939 37631->37627 37631->37628 37631->37630 38938 6a17663b RaiseException 37631->38938 37633->37629 37638 6a165349 37634->37638 38940 6a17663b RaiseException 37636->38940 37638->37409 37644 6a1582a0 101 API calls 37641->37644 37642->37629 37649 6a1582a0 101 API calls 37643->37649 37648 6a165386 37644->37648 37645->37629 37651 6a1582a0 101 API calls 37646->37651 37648->37409 37650 6a1653cd 37649->37650 37650->37409 37652 6a165414 37651->37652 37652->37409 37653->37629 37655->37629 37658->37376 37659->37384 37660->37391 37661->37399 37662->37395 37663->37419 37664->37424 37665->37436 37666->37439 37667->37442 37668->37459 37669->37464 37670->37460 37671->37456 37672->37470 37673->37475 37674->37477 37675->37405 37676->37401 37677->37433 37678->37450 37679->37443 37680->37440 37681->37468 37682->37430 37683->37472 37684->37474 37685->37403 37686->37410 37687->37407 37688->37415 37689->37408 37690->37413 37691->37421 37692->37425 37693->37427 37694->37486 37696 6a167c7f 37695->37696 37697 6a171230 67 API calls 37696->37697 37698 6a167d20 37697->37698 37698->37491 37700 6a15fc9a 37699->37700 37703 6a15fd05 37699->37703 37700->37703 37719 6a15fd20 69 API calls 37700->37719 37720 6a154d10 67 API calls 37700->37720 37703->37494 37705 6a17540d 37704->37705 37706 6a153c27 37704->37706 37721 6a177f70 66 API calls 37705->37721 37710 6a17539a 37706->37710 37708 6a175412 37722 6a175bb2 6 API calls 37708->37722 37711 6a1753a7 37710->37711 37712 6a1753b6 37710->37712 37723 6a177f70 66 API calls 37711->37723 37716 6a1753da 37712->37716 37724 6a177f70 66 API calls 37712->37724 37714 6a1753ac 37714->37498 37716->37498 37717 6a1753ca 37725 6a175bb2 6 API calls 37717->37725 37719->37700 37720->37700 37721->37708 37723->37714 37724->37717 37727 6a152720 37726->37727 37727->37727 37728 6a152745 CharUpperW 37727->37728 37729 6a15276e 37728->37729 37729->37513 37731 6a153279 37730->37731 37732 6a153258 37730->37732 37734 6a16ed50 37731->37734 37732->37731 37773 6a153070 37732->37773 37735 6a16ed5a 37734->37735 37736 6a15461d 37735->37736 37795 6a16e7f0 69 API calls 37735->37795 37736->37534 37736->37535 37796 6a164320 37738->37796 37740 6a153f6f 37741 6a1541a5 37740->37741 37749 6a153f83 37740->37749 37825 6a17663b RaiseException 37741->37825 37743 6a1541ba 37744 6a15401c 37756 6a154047 37744->37756 37822 6a17663b RaiseException 37744->37822 37745 6a1540cf 37824 6a15d620 CharUpperW CharUpperW RaiseException 37745->37824 37749->37744 37821 6a154d10 67 API calls 37749->37821 37750 6a1540f6 37752 6a160880 RaiseException 37750->37752 37753 6a154104 37752->37753 37755 6a160880 RaiseException 37753->37755 37758 6a15410f 37755->37758 37756->37745 37810 6a161df0 37756->37810 37823 6a154d10 67 API calls 37756->37823 37757 6a154d10 67 API calls 37757->37758 37758->37757 37759 6a15414c 37758->37759 37759->37547 37760->37513 37761->37516 37762->37518 37763->37521 37764->37524 37765->37543 37766->37547 37767->37548 37768->37549 37769->37522 37770->37533 37771->37539 37772->37537 37786 6a153030 37773->37786 37776 6a153030 10 API calls 37777 6a1530b3 37776->37777 37784 6a1530d9 37777->37784 37790 6a152f70 37777->37790 37778 6a153235 37778->37732 37781 6a153070 74 API calls 37783 6a1531ce 37781->37783 37782 6a160880 RaiseException 37782->37784 37783->37778 37783->37781 37784->37782 37784->37783 37785 6a155a70 67 API calls 37784->37785 37794 6a1607d0 CharUpperW CharUpperW 37784->37794 37785->37784 37787 6a15303b 37786->37787 37788 6a15306a 37786->37788 37787->37788 37789 6a152f70 10 API calls 37787->37789 37788->37776 37789->37787 37791 6a152fa2 37790->37791 37793 6a152fef 37790->37793 37792 6a1625a0 10 API calls 37791->37792 37791->37793 37792->37793 37793->37777 37794->37784 37795->37735 37797 6a16437a 37796->37797 37798 6a1643cb 37796->37798 37797->37798 37805 6a16441d 37797->37805 37826 6a1635f0 37797->37826 37869 6a163460 67 API calls 37797->37869 37799 6a160880 RaiseException 37798->37799 37800 6a1643d5 37799->37800 37803 6a160880 RaiseException 37800->37803 37804 6a1643e0 37803->37804 37806 6a160880 RaiseException 37804->37806 37805->37740 37807 6a1643eb 37806->37807 37808 6a160880 RaiseException 37807->37808 37809 6a1643f6 37808->37809 37809->37740 37811 6a161e14 37810->37811 37812 6a161e25 GetFullPathNameW 37810->37812 37811->37812 37818 6a161e46 37812->37818 37813 6a161e5f 37813->37756 37814 6a161ecc lstrlenW 37815 6a161edd 37814->37815 37886 6a161cc0 CharUpperW CharUpperW 37815->37886 37816 6a161e87 GetFullPathNameW 37817 6a161ea5 37816->37817 37817->37813 37817->37814 37817->37815 37818->37813 37818->37816 37818->37817 37820 6a161ef0 37820->37756 37821->37749 37822->37756 37823->37756 37824->37750 37825->37743 37829 6a163628 37826->37829 37827 6a163e62 37834 6a164213 GetLastError 37827->37834 37842 6a160880 RaiseException 37827->37842 37852 6a154d10 67 API calls 37827->37852 37854 6a1642c4 37827->37854 37858 6a16e790 69 API calls 37827->37858 37875 6a162790 10 API calls 37827->37875 37876 6a1631d0 67 API calls 37827->37876 37877 6a16e370 CharUpperW CharUpperW 37827->37877 37878 6a155bb0 37827->37878 37883 6a1634f0 84 API calls 37827->37883 37828 6a164303 37828->37797 37829->37827 37829->37828 37862 6a1636e8 37829->37862 37830 6a162470 9 API calls 37830->37862 37832 6a162470 9 API calls 37849 6a163a79 37832->37849 37833 6a1637c3 FindClose 37833->37862 37835 6a164225 GetLastError 37834->37835 37841 6a16426f 37834->37841 37838 6a164257 37835->37838 37839 6a164234 37835->37839 37836 6a1637d1 GetLastError 37836->37862 37837 6a163b47 FindClose 37837->37849 37884 6a154d10 67 API calls 37838->37884 37846 6a160880 RaiseException 37839->37846 37850 6a1642a5 FindClose 37841->37850 37851 6a1642ac 37841->37851 37842->37827 37843 6a163c19 GetLastError 37843->37849 37844 6a154d10 67 API calls 37844->37862 37846->37838 37847 6a154d10 67 API calls 37847->37849 37849->37832 37849->37837 37849->37843 37849->37847 37853 6a160880 RaiseException 37849->37853 37860 6a163db4 37849->37860 37874 6a1634f0 84 API calls 37849->37874 37850->37851 37851->37797 37852->37827 37853->37849 37855 6a164301 37854->37855 37856 6a1642fa FindClose 37854->37856 37855->37828 37856->37855 37858->37827 37860->37797 37862->37830 37862->37833 37862->37836 37862->37844 37862->37849 37864 6a160880 RaiseException 37862->37864 37868 6a163ba9 37862->37868 37870 6a16e790 69 API calls 37862->37870 37871 6a1631d0 67 API calls 37862->37871 37872 6a16e370 CharUpperW CharUpperW 37862->37872 37873 6a1634f0 84 API calls 37862->37873 37864->37862 37868->37797 37869->37797 37870->37862 37871->37862 37872->37862 37873->37862 37874->37849 37875->37827 37876->37827 37877->37827 37879 6a160880 RaiseException 37878->37879 37880 6a155bc8 37879->37880 37881 6a155be6 37880->37881 37885 6a154d10 67 API calls 37880->37885 37881->37827 37883->37827 37884->37841 37885->37880 37886->37820 37887->37566 37888->37566 37889->37569 37890->37557 37891->37563 37892->37567 37893->37569 37894->37572 37895->37578 37896->37580 37897->37576 37899 6a158473 37898->37899 37900 6a175f2a 66 API calls 37899->37900 37901 6a1584fb 37900->37901 37902 6a158515 37901->37902 37964 6a17663b RaiseException 37901->37964 37902->37619 37905 6a160880 RaiseException 37904->37905 37907 6a159f2e 37905->37907 37906 6a159f81 37906->37619 37907->37906 37908 6a160880 RaiseException 37907->37908 37908->37907 37910 6a175f2a 66 API calls 37909->37910 37911 6a15cb1d 37910->37911 37913 6a15cb35 37911->37913 37985 6a17663b RaiseException 37911->37985 37914 6a15cc8c 37913->37914 37915 6a161df0 5 API calls 37913->37915 37971 6a15c430 37914->37971 37916 6a15cbcc 37915->37916 37918 6a15cbd3 GetLastError 37916->37918 37924 6a15cc24 37916->37924 37921 6a15cbe4 37918->37921 37919 6a15ccbc 37922 6a15ccc2 37919->37922 37986 6a154d10 67 API calls 37919->37986 37921->37619 37922->37619 37965 6a15a910 37924->37965 37926 6a15cd2e 37927 6a15cd7e 37926->37927 37987 6a154d10 67 API calls 37926->37987 37927->37619 37929 6a1586cf 37928->37929 37930 6a1587cd 37928->37930 37929->37930 37932 6a15abe0 VariantClear 37929->37932 37933 6a15ab10 VariantClear 37929->37933 37952 6a1586e1 37929->37952 38497 6a16e6e0 71 API calls 37929->38497 38498 6a159d00 RaiseException 37929->38498 37934 6a1587d9 37930->37934 38384 6a15a5c0 37930->38384 37932->37929 37933->37929 37934->37619 37936 6a1588d1 37937 6a158931 37936->37937 38388 6a161420 37936->38388 38399 6a155e10 37937->38399 37940 6a158967 38403 6a15d1b0 37940->38403 37941 6a15890f 37941->37937 37944 6a158916 GetLastError 37941->37944 38499 6a17663b RaiseException 37944->38499 37946 6a158974 37947 6a158a3c 37946->37947 37949 6a1589e1 37946->37949 37946->37952 38413 100061aa 37947->38413 38451 10005aa5 37947->38451 37948 6a158a26 37950 6a162e40 VariantClear 37948->37950 37949->37948 38500 6a162f70 RaiseException 37949->38500 37950->37952 37952->37619 37955->37592 37956->37595 37957->37587 37958->37619 37960 6a1582d4 37959->37960 37961 6a1582e8 37959->37961 37960->37961 38859 10006b2c 37960->38859 37961->37610 37963->37602 37964->37902 37966 6a15a943 37965->37966 37967 6a1625a0 10 API calls 37966->37967 37969 6a15a966 37967->37969 37968 6a15a997 37968->37914 37969->37968 37988 6a17663b RaiseException 37969->37988 37978 6a15c46b 37971->37978 37972 6a15c88a 37975 6a162e40 VariantClear 37972->37975 37974 6a15caa1 37976 6a162e40 VariantClear 37974->37976 37977 6a15c893 37975->37977 37980 6a15c491 37976->37980 37977->37919 37978->37972 37978->37974 37979 6a162e40 VariantClear 37978->37979 37978->37980 37981 6a15abe0 VariantClear 37978->37981 37984 6a15ce60 67 API calls 37978->37984 37989 6a15c2d0 37978->37989 38005 6a15ae70 37978->38005 38046 6a15ad90 VariantClear 37978->38046 37979->37978 37980->37919 37981->37978 37984->37978 37985->37913 37986->37926 37987->37926 37988->37968 37990 6a15c351 37989->37990 37991 6a15c311 37989->37991 37992 6a175f2a 66 API calls 37990->37992 37993 6a175f2a 66 API calls 37991->37993 37994 6a15c358 37992->37994 37995 6a15c318 37993->37995 37996 6a15c374 37994->37996 38048 6a17663b RaiseException 37994->38048 38002 6a15c334 37995->38002 38047 6a17663b RaiseException 37995->38047 37999 6a162a70 4 API calls 37996->37999 38001 6a15c3b8 37999->38001 38000 6a15ae70 174 API calls 38004 6a15c3d3 38000->38004 38001->38002 38003 6a15c3bc GetLastError 38001->38003 38002->38000 38003->38004 38004->37978 38008 6a15aecd 38005->38008 38006 6a15afba 38007 6a160880 RaiseException 38006->38007 38019 6a15afca 38007->38019 38008->38006 38014 6a15afe4 38008->38014 38009 6a15b0e3 38023 6a15b734 38009->38023 38031 6a15b1a8 38009->38031 38042 6a15b0fa 38009->38042 38087 6a1607d0 CharUpperW CharUpperW 38009->38087 38012 6a15b19d 38012->38023 38012->38031 38013 6a160880 RaiseException 38013->38014 38014->38009 38014->38013 38085 6a1607d0 CharUpperW CharUpperW 38014->38085 38086 6a160930 RaiseException 38014->38086 38016 6a1751c7 5 API calls 38017 6a15bd53 38016->38017 38017->37978 38027 6a15be65 38019->38027 38019->38042 38045 6a151ab0 3 API calls 38019->38045 38049 100089ec 38019->38049 38055 1000790d 38019->38055 38020 6a15b9e7 38020->38019 38091 6a1607d0 CharUpperW CharUpperW 38020->38091 38021 6a15b6c4 38024 6a159f10 RaiseException 38021->38024 38028 6a15b915 38023->38028 38032 6a15b6ea 38023->38032 38023->38042 38088 6a1607d0 CharUpperW CharUpperW 38023->38088 38024->38032 38026 6a15bee7 VariantClear 38034 6a15bef4 38026->38034 38027->38026 38027->38034 38027->38042 38089 6a160930 RaiseException 38028->38089 38029 6a15b639 38029->38021 38030 6a160880 RaiseException 38029->38030 38030->38029 38031->38029 38036 6a160880 RaiseException 38031->38036 38031->38042 38032->38019 38032->38020 38090 6a1607d0 CharUpperW CharUpperW 38032->38090 38039 6a15c0f3 38034->38039 38040 6a15bf38 38034->38040 38035 6a15c122 38094 6a1580f0 CharUpperW CharUpperW 38035->38094 38036->38031 38039->38035 38093 6a1607d0 CharUpperW CharUpperW 38039->38093 38092 6a1580f0 CharUpperW CharUpperW 38040->38092 38042->38016 38045->38019 38046->37978 38047->38002 38048->37996 38050 100089fd 38049->38050 38054 6a151ab0 3 API calls 38050->38054 38051 10008a11 38052 10008a21 38051->38052 38095 100087ae 38051->38095 38052->38019 38054->38051 38056 10007917 38055->38056 38057 100015ec 34 API calls 38056->38057 38058 10007939 38057->38058 38059 100089ec 35 API calls 38058->38059 38060 1000798e 38059->38060 38061 10007995 38060->38061 38062 100079c8 38060->38062 38135 10007ad6 34 API calls 38061->38135 38125 100012b5 38062->38125 38068 10007a40 38137 10009f5e 35 API calls 38068->38137 38069 10007a02 38071 1000109b 29 API calls 38069->38071 38073 10007a0a 38071->38073 38072 10007a47 38138 10009fa0 35 API calls 38072->38138 38136 10007ad6 34 API calls 38073->38136 38076 10007a4e 38139 10009ff5 35 API calls 38076->38139 38077 100079a1 38077->38019 38079 10007a55 38080 1000109b 29 API calls 38079->38080 38081 10007a68 38080->38081 38140 10007ad6 34 API calls 38081->38140 38083 10007a75 38141 1000a8eb 35 API calls 38083->38141 38085->38014 38086->38014 38087->38012 38088->38023 38089->38032 38090->38032 38091->38020 38092->38042 38093->38039 38094->38042 38096 100087b8 38095->38096 38103 10002f32 38096->38103 38098 100087e4 38098->38052 38099 100087d1 38099->38098 38106 10002e98 38099->38106 38101 1000109b 29 API calls 38101->38098 38102 1000880a 38102->38101 38112 10002ee6 38103->38112 38107 10002ea5 38106->38107 38110 10002ed9 38106->38110 38111 10002eb0 38107->38111 38116 10001075 38107->38116 38109 1000109b 29 API calls 38109->38110 38110->38102 38111->38109 38113 10002efa 38112->38113 38114 10002f29 38113->38114 38115 6a1519c0 2 API calls 38113->38115 38114->38099 38115->38113 38121 1001887a 38116->38121 38119 10001099 38119->38111 38122 1001888c 29 API calls 38121->38122 38123 10001080 38122->38123 38123->38119 38124 100189b4 RaiseException 38123->38124 38124->38119 38126 100012f5 38125->38126 38127 100012c5 38125->38127 38131 1000a496 38126->38131 38128 10001075 30 API calls 38127->38128 38129 100012cf 38128->38129 38129->38126 38130 1000109b 29 API calls 38129->38130 38130->38126 38132 1000a4a0 38131->38132 38142 1000a0ce 38132->38142 38135->38077 38136->38077 38137->38072 38138->38076 38139->38079 38140->38083 38141->38077 38143 1000a0d8 38142->38143 38185 10007b7e 38143->38185 38146 1000a11d 38148 1000a27a 38146->38148 38155 1000a170 38146->38155 38162 1000a1ee 38148->38162 38293 1000856a RaiseException 38148->38293 38150 100079fc 38150->38068 38150->38069 38151 1000a2da 38151->38150 38152 10002e98 30 API calls 38151->38152 38153 1000a2ff 38152->38153 38154 10002f32 2 API calls 38153->38154 38158 1000a30c 38154->38158 38155->38150 38156 10002f32 2 API calls 38155->38156 38156->38162 38157 1000109b 29 API calls 38157->38150 38159 1000a35b 38158->38159 38178 1000a310 38158->38178 38294 1000856a RaiseException 38158->38294 38198 10008505 38159->38198 38162->38150 38184 6a151ab0 3 API calls 38162->38184 38165 1000a396 38166 1000a42a 38165->38166 38167 1000a3b1 38165->38167 38295 1000856a RaiseException 38165->38295 38207 10009824 38166->38207 38296 1000948e 168 API calls 38167->38296 38171 1000a3d9 38172 100015ec 34 API calls 38171->38172 38175 1000a45b 38172->38175 38173 1000a3d5 38173->38171 38174 1000a3fe 38173->38174 38297 1000856a RaiseException 38173->38297 38179 10008505 30 API calls 38174->38179 38177 100015a7 34 API calls 38175->38177 38177->38178 38178->38157 38180 1000a414 38179->38180 38181 10008617 RaiseException 38180->38181 38182 1000a41c 38181->38182 38182->38166 38298 1000856a RaiseException 38182->38298 38184->38151 38299 10007bd9 38185->38299 38188 100015ec 34 API calls 38189 10007b91 38188->38189 38190 100015ec 34 API calls 38189->38190 38191 10007b9c 38190->38191 38192 100015ec 34 API calls 38191->38192 38193 10007ba7 38192->38193 38194 100015ec 34 API calls 38193->38194 38195 10007bb2 38194->38195 38196 100015ec 34 API calls 38195->38196 38197 10007bbd 38196->38197 38197->38146 38292 1000856a RaiseException 38197->38292 38330 10008491 38198->38330 38201 10008617 38202 1000862a 38201->38202 38204 1000862f 38201->38204 38334 1000856a RaiseException 38202->38334 38206 1000868a 38204->38206 38335 1000856a RaiseException 38204->38335 38206->38165 38208 1000982e 38207->38208 38209 10008617 RaiseException 38208->38209 38210 10009841 38209->38210 38212 1000986b 38210->38212 38344 10008a48 RaiseException 38210->38344 38220 100098e8 38212->38220 38345 1000948e 168 API calls 38212->38345 38213 10009863 38214 10008617 RaiseException 38213->38214 38214->38212 38216 100098b6 38217 100098ba 38216->38217 38218 10008617 RaiseException 38216->38218 38219 100015ec 34 API calls 38217->38219 38218->38220 38221 10009a49 38219->38221 38223 10009944 38220->38223 38240 1000999d 38220->38240 38222 100015a7 34 API calls 38221->38222 38291 10009a55 38222->38291 38336 100092ee 38223->38336 38224 10009995 38226 100015ec 34 API calls 38224->38226 38228 100099fe 38226->38228 38230 10009a06 38228->38230 38231 10009a5c 38228->38231 38229 10008617 RaiseException 38229->38224 38233 100015a7 34 API calls 38230->38233 38234 10009a6c 38231->38234 38349 1000856a RaiseException 38231->38349 38236 10009a15 38233->38236 38350 100086b3 38234->38350 38239 100015a7 34 API calls 38236->38239 38242 10009a24 38239->38242 38240->38224 38246 100040e5 30 API calls 38240->38246 38346 10006206 RaiseException 38240->38346 38347 100034b0 30 API calls 38240->38347 38348 10006398 30 API calls 38240->38348 38245 100015a7 34 API calls 38242->38245 38245->38217 38246->38240 38247 10009ab7 38369 100034b0 30 API calls 38247->38369 38249 10009ac5 38251 10009ad8 38249->38251 38370 100034b0 30 API calls 38249->38370 38254 10009af3 38251->38254 38371 100034b0 30 API calls 38251->38371 38252 10009a80 38252->38247 38257 1000109b 29 API calls 38252->38257 38367 10009f34 30 API calls 38252->38367 38368 1000a563 30 API calls 38252->38368 38372 1000841c 35 API calls 38254->38372 38257->38252 38259 10008617 RaiseException 38284 10009b19 38259->38284 38260 10009e7e 38261 100015a7 34 API calls 38260->38261 38264 10009e8a 38261->38264 38262 10009db8 38262->38260 38383 10006398 30 API calls 38262->38383 38265 100015a7 34 API calls 38264->38265 38266 10009e96 38265->38266 38269 100015a7 34 API calls 38266->38269 38271 10009ea2 38269->38271 38270 1000936b 35 API calls 38270->38284 38275 100015a7 34 API calls 38271->38275 38273 1000851b 30 API calls 38273->38284 38276 10009eb1 38275->38276 38280 100015a7 34 API calls 38276->38280 38277 1000841c 35 API calls 38277->38284 38282 10009ec0 38280->38282 38281 1000856a RaiseException 38281->38284 38285 100015a7 34 API calls 38282->38285 38284->38259 38284->38262 38284->38270 38284->38273 38284->38277 38284->38281 38287 100015a7 34 API calls 38284->38287 38373 1000871a 30 API calls 38284->38373 38374 100093bf 35 API calls 38284->38374 38375 100086d0 RaiseException 38284->38375 38376 100034b0 30 API calls 38284->38376 38377 1000940a 35 API calls 38284->38377 38378 10008582 38284->38378 38382 100085d9 RaiseException 38284->38382 38286 10009ecf 38285->38286 38288 100015ec 34 API calls 38286->38288 38287->38284 38289 10009ee5 38288->38289 38290 100015a7 34 API calls 38289->38290 38290->38291 38291->38171 38292->38146 38293->38162 38294->38159 38295->38167 38296->38173 38297->38174 38298->38166 38300 100015ec 34 API calls 38299->38300 38301 10007be2 38300->38301 38302 100015ec 34 API calls 38301->38302 38303 10007bea 38302->38303 38304 100015ec 34 API calls 38303->38304 38305 10007bf2 38304->38305 38306 100015ec 34 API calls 38305->38306 38307 10007bfa 38306->38307 38308 100015ec 34 API calls 38307->38308 38309 10007c02 38308->38309 38310 100015ec 34 API calls 38309->38310 38311 10007c0a 38310->38311 38312 100015ec 34 API calls 38311->38312 38313 10007c14 38312->38313 38314 100015ec 34 API calls 38313->38314 38315 10007c1c 38314->38315 38316 100015ec 34 API calls 38315->38316 38317 10007c29 38316->38317 38318 100015ec 34 API calls 38317->38318 38319 10007c31 38318->38319 38320 100015ec 34 API calls 38319->38320 38321 10007c3e 38320->38321 38322 100015ec 34 API calls 38321->38322 38323 10007c46 38322->38323 38324 100015ec 34 API calls 38323->38324 38325 10007c53 38324->38325 38326 100015ec 34 API calls 38325->38326 38327 10007c5b 38326->38327 38328 100015ec 34 API calls 38327->38328 38329 10007b86 38328->38329 38329->38188 38331 10008499 38330->38331 38332 100084b4 30 API calls 38331->38332 38333 100084ac 38332->38333 38333->38201 38334->38204 38335->38204 38340 100092f5 38336->38340 38337 10008617 RaiseException 38337->38340 38338 10009365 38338->38229 38339 10008d1a 35 API calls 38339->38340 38340->38337 38340->38338 38340->38339 38341 10008ddd 35 API calls 38340->38341 38342 1000856a RaiseException 38340->38342 38343 10009028 35 API calls 38340->38343 38341->38340 38342->38340 38343->38340 38344->38213 38345->38216 38346->38240 38347->38240 38348->38240 38349->38234 38351 10008617 RaiseException 38350->38351 38352 100086b9 38351->38352 38353 100086cc 38352->38353 38354 1000856a RaiseException 38352->38354 38355 1000163d 38353->38355 38354->38353 38356 10001651 38355->38356 38364 100016e1 38355->38364 38357 1000166e 38356->38357 38358 100189b4 RaiseException 38356->38358 38359 10001695 38357->38359 38360 100189b4 RaiseException 38357->38360 38358->38357 38361 10001075 30 API calls 38359->38361 38366 100016bd 38359->38366 38360->38359 38363 100016a1 38361->38363 38362 1000109b 29 API calls 38362->38364 38365 100189b4 RaiseException 38363->38365 38363->38366 38364->38252 38365->38366 38366->38362 38367->38252 38368->38252 38369->38249 38370->38251 38371->38254 38372->38284 38373->38284 38374->38284 38375->38284 38376->38284 38377->38284 38379 10008592 38378->38379 38380 1000858d 38378->38380 38379->38284 38381 1000856a RaiseException 38380->38381 38381->38379 38382->38284 38383->38262 38385 6a15a5fc 38384->38385 38386 6a15a240 2 API calls 38385->38386 38387 6a15a60d 38386->38387 38387->37936 38390 6a161454 38388->38390 38394 6a161659 38390->38394 38501 6a161340 CreateDirectoryW 38390->38501 38391 6a161528 GetLastError 38392 6a161630 38391->38392 38398 6a161520 38391->38398 38393 6a1625a0 10 API calls 38392->38393 38396 6a161655 38393->38396 38394->37941 38395 6a161340 4 API calls 38395->38396 38396->38394 38396->38395 38397 6a161340 4 API calls 38397->38398 38398->38391 38398->38394 38398->38396 38398->38397 38400 6a155e5d 38399->38400 38401 6a155bb0 67 API calls 38400->38401 38402 6a155f27 38401->38402 38402->37940 38410 6a15d1ec 38403->38410 38412 6a15d487 38403->38412 38404 6a15d415 38406 6a160880 RaiseException 38404->38406 38404->38412 38406->38404 38409 6a162e40 VariantClear 38409->38410 38410->38404 38410->38409 38410->38412 38510 6a15d100 SysAllocString VariantClear RaiseException 38410->38510 38511 6a154d10 67 API calls 38410->38511 38512 6a162ec0 VariantClear VariantCopy 38410->38512 38513 6a17663b RaiseException 38410->38513 38412->37946 38431 10005ce0 38413->38431 38414 10005d05 38417 10006305 34 API calls 38414->38417 38415 10005d3a 38514 10006305 38415->38514 38416 10001075 30 API calls 38416->38431 38418 10005c59 38417->38418 38420 100015ec 34 API calls 38418->38420 38423 10005c61 38420->38423 38425 100015a7 34 API calls 38423->38425 38428 10005c6d 38425->38428 38427 10005e06 38429 10006305 34 API calls 38427->38429 38428->37952 38430 10005e37 38429->38430 38432 100015ec 34 API calls 38430->38432 38431->38414 38431->38415 38431->38416 38431->38427 38436 100069d4 98 API calls 38431->38436 38437 10006040 38431->38437 38439 10005f4b 38431->38439 38441 10005fcd 38431->38441 38445 100060b5 38431->38445 38524 100066c2 38431->38524 38528 10004859 38431->38528 38670 1000657a 30 API calls 38431->38670 38434 10005e4a 38432->38434 38435 100015a7 34 API calls 38434->38435 38435->38428 38436->38431 38438 10006305 34 API calls 38437->38438 38442 10005f86 38438->38442 38440 10006305 34 API calls 38439->38440 38440->38442 38443 10006305 34 API calls 38441->38443 38444 100015ec 34 API calls 38442->38444 38443->38442 38446 10005f99 38444->38446 38447 10006305 34 API calls 38445->38447 38448 100015a7 34 API calls 38446->38448 38449 100060f3 38447->38449 38448->38428 38671 100063c7 34 API calls 38449->38671 38459 10005aaf 38451->38459 38452 10005c4e 38455 100015ec 34 API calls 38452->38455 38454 10005c39 38454->38452 38458 10001075 30 API calls 38454->38458 38457 10005c61 38455->38457 38456 100063ff 35 API calls 38456->38459 38460 100015a7 34 API calls 38457->38460 38481 10005c9f 38458->38481 38459->38454 38459->38456 38462 100015a7 34 API calls 38459->38462 38480 10005aff 38459->38480 38853 10006293 30 API calls 38459->38853 38854 10006206 RaiseException 38459->38854 38855 10006398 30 API calls 38459->38855 38460->38480 38462->38459 38464 10005d05 38467 10006305 34 API calls 38464->38467 38465 10005d3a 38468 10006305 34 API calls 38465->38468 38466 10001075 30 API calls 38466->38481 38467->38452 38469 10005d55 38468->38469 38856 100063c7 34 API calls 38469->38856 38472 100066c2 98 API calls 38472->38481 38473 10005e06 38474 10006305 34 API calls 38473->38474 38475 10005e37 38474->38475 38476 100015ec 34 API calls 38475->38476 38478 10005e4a 38476->38478 38477 10004859 168 API calls 38477->38481 38479 100015a7 34 API calls 38478->38479 38479->38480 38480->37952 38481->38464 38481->38465 38481->38466 38481->38472 38481->38473 38481->38477 38482 100069d4 98 API calls 38481->38482 38483 10006040 38481->38483 38484 100060b5 38481->38484 38485 10005f4b 38481->38485 38488 10005fcd 38481->38488 38857 1000657a 30 API calls 38481->38857 38482->38481 38486 10006305 34 API calls 38483->38486 38492 10006305 34 API calls 38484->38492 38487 10006305 34 API calls 38485->38487 38490 10005f86 38486->38490 38487->38490 38489 10006305 34 API calls 38488->38489 38489->38490 38491 100015ec 34 API calls 38490->38491 38493 10005f99 38491->38493 38495 100060f3 38492->38495 38494 100015a7 34 API calls 38493->38494 38494->38480 38858 100063c7 34 API calls 38495->38858 38497->37929 38498->37929 38499->37937 38500->37948 38502 6a16138c GetLastError 38501->38502 38503 6a161378 38501->38503 38504 6a161399 38502->38504 38508 6a1613ff 38502->38508 38503->38398 38505 6a1628a0 GetCurrentDirectoryW 38504->38505 38506 6a1613bf 38505->38506 38507 6a1613d1 CreateDirectoryW 38506->38507 38506->38508 38509 6a1613e5 38507->38509 38508->38398 38509->38398 38510->38410 38511->38410 38512->38410 38513->38410 38515 1000630f 38514->38515 38516 100015ec 34 API calls 38515->38516 38517 10006333 38516->38517 38518 100015a7 34 API calls 38517->38518 38519 1000633e 38518->38519 38520 100015a7 34 API calls 38519->38520 38521 10006364 38520->38521 38672 100033a2 34 API calls 38521->38672 38523 10005d55 38669 100063c7 34 API calls 38523->38669 38525 100066eb 38524->38525 38673 1000688a 38525->38673 38529 10004863 38528->38529 38679 100081ef 38529->38679 38531 1000487b 38629 10004f5e 38531->38629 38696 10017690 InitializeCriticalSection 38531->38696 38533 10001075 30 API calls 38545 100048a7 38533->38545 38534 100049a8 38697 100054e2 38534->38697 38536 100049df 38537 100015ec 34 API calls 38536->38537 38643 10004bb4 38536->38643 38538 10004a08 38537->38538 38539 10001075 30 API calls 38538->38539 38549 10004a29 38538->38549 38539->38549 38540 10004a74 38544 100015a7 34 API calls 38540->38544 38541 10004abc 38546 10004ba5 38541->38546 38557 10004e20 38541->38557 38562 10004ef8 38541->38562 38564 10004e8b 38541->38564 38709 10001c8a 38541->38709 38736 10003a70 35 API calls 38541->38736 38737 10003a95 35 API calls 38541->38737 38738 10005966 30 API calls 38541->38738 38548 10004a83 38544->38548 38545->38533 38545->38534 38734 10003f9b 30 API calls 38545->38734 38739 10005815 35 API calls 38546->38739 38735 100033a2 34 API calls 38548->38735 38549->38540 38549->38541 38552 10005357 38554 100015a7 34 API calls 38552->38554 38558 10005366 38554->38558 38555 10004a92 DeleteCriticalSection 38571 10004aa7 38555->38571 38556 100053b3 38563 1000163d 30 API calls 38556->38563 38565 100015a7 34 API calls 38557->38565 38751 100033a2 34 API calls 38558->38751 38559 1000504d 38561 100015a7 34 API calls 38559->38561 38567 1000506a 38561->38567 38575 100015a7 34 API calls 38562->38575 38569 100053dc 38563->38569 38587 100015a7 34 API calls 38564->38587 38570 10004e51 38565->38570 38566 10005375 DeleteCriticalSection 38566->38571 38744 100033a2 34 API calls 38567->38744 38568 1000508e 38579 100015a7 34 API calls 38568->38579 38574 100053fc 38569->38574 38752 100040e5 38569->38752 38741 100033a2 34 API calls 38570->38741 38573 100015ec 34 API calls 38571->38573 38578 100053a0 38573->38578 38666 10012a20 VirtualAlloc 38574->38666 38717 10017570 38574->38717 38723 1000367f 38574->38723 38582 10004f18 38575->38582 38577 10005079 DeleteCriticalSection 38577->38568 38584 100015a7 34 API calls 38578->38584 38588 100050c1 38579->38588 38581 10005169 38592 100015a7 34 API calls 38581->38592 38743 100033a2 34 API calls 38582->38743 38583 10004e60 DeleteCriticalSection 38656 10004e75 38583->38656 38584->38629 38593 10004ebc 38587->38593 38745 100033a2 34 API calls 38588->38745 38589 1000541f 38596 100015a7 34 API calls 38589->38596 38599 10005186 38592->38599 38742 100033a2 34 API calls 38593->38742 38594 100050fb 38608 100015a7 34 API calls 38594->38608 38602 10005430 38596->38602 38597 10004f27 DeleteCriticalSection 38598 10004f3c 38597->38598 38610 100015ec 34 API calls 38598->38610 38747 100033a2 34 API calls 38599->38747 38601 100050d0 DeleteCriticalSection 38601->38656 38755 100056b6 34 API calls 38602->38755 38603 100051c2 SysFreeString 38605 100051d6 38603->38605 38613 100015a7 34 API calls 38605->38613 38606 10004ecb DeleteCriticalSection 38606->38656 38616 1000511b 38608->38616 38618 10004f52 38610->38618 38611 100015ec 34 API calls 38619 10005298 38611->38619 38612 10005195 DeleteCriticalSection 38612->38656 38620 100051eb 38613->38620 38614 1000163d 30 API calls 38614->38643 38615 1000543f 38756 100056eb DeleteCriticalSection 38615->38756 38746 100033a2 34 API calls 38616->38746 38617 10002e98 30 API calls 38617->38643 38623 100015a7 34 API calls 38618->38623 38624 100015a7 34 API calls 38619->38624 38748 100033a2 34 API calls 38620->38748 38623->38629 38624->38629 38626 1000544a 38757 10003f63 34 API calls 38626->38757 38627 1000512a DeleteCriticalSection 38628 1000513f 38627->38628 38632 100015ec 34 API calls 38628->38632 38629->38431 38630 100051fa DeleteCriticalSection 38630->38656 38633 10005155 38632->38633 38635 100015a7 34 API calls 38633->38635 38634 1000521f 38637 1000109b 29 API calls 38634->38637 38635->38629 38636 1000109b 29 API calls 38636->38643 38638 10005224 38637->38638 38640 1000109b 29 API calls 38638->38640 38639 1000109b 29 API calls 38641 10004d6e SysFreeString 38639->38641 38642 10005233 SysFreeString 38640->38642 38641->38643 38645 10005249 38642->38645 38643->38559 38643->38568 38643->38581 38643->38594 38643->38603 38643->38614 38643->38617 38643->38634 38643->38636 38643->38639 38644 100040e5 30 API calls 38643->38644 38646 100015a7 34 API calls 38643->38646 38648 100052a9 38643->38648 38649 10005043 38643->38649 38740 1000124b 30 API calls 38643->38740 38644->38643 38647 100015a7 34 API calls 38645->38647 38646->38643 38650 1000525e 38647->38650 38651 100015a7 34 API calls 38648->38651 38713 10003db9 38649->38713 38749 100033a2 34 API calls 38650->38749 38653 100052b8 38651->38653 38655 100015a7 34 API calls 38653->38655 38654 1000526d DeleteCriticalSection 38654->38656 38657 100052c7 38655->38657 38656->38611 38658 100015a7 34 API calls 38657->38658 38659 100052d6 38658->38659 38750 100033a2 34 API calls 38659->38750 38661 100052e5 DeleteCriticalSection 38662 100052fa 38661->38662 38663 100015ec 34 API calls 38662->38663 38664 10005310 38663->38664 38665 100015a7 34 API calls 38664->38665 38665->38629 38666->38589 38669->38428 38670->38431 38671->38428 38672->38523 38675 1000688d 38673->38675 38674 1000670b 95 API calls 38674->38675 38675->38674 38677 10006706 38675->38677 38678 1000684d 8 API calls 38675->38678 38677->38431 38678->38675 38680 100081f9 38679->38680 38695 100083a5 38680->38695 38758 1000841c 35 API calls 38680->38758 38682 10008241 38684 100083ff 38682->38684 38759 1000841c 35 API calls 38682->38759 38685 100015a7 34 API calls 38684->38685 38685->38695 38686 100082b6 38687 100015a7 34 API calls 38686->38687 38692 100082c2 38687->38692 38688 10008292 38688->38684 38688->38686 38689 10008358 38690 100015a7 34 API calls 38689->38690 38693 10008399 38690->38693 38691 100040e5 30 API calls 38691->38692 38692->38689 38692->38691 38694 100015a7 34 API calls 38693->38694 38694->38695 38695->38531 38696->38545 38760 100055b0 38697->38760 38700 100015ec 34 API calls 38701 10005501 38700->38701 38707 10005524 38701->38707 38769 100034b0 30 API calls 38701->38769 38703 1000558b 38704 100055ab 38703->38704 38706 100040e5 30 API calls 38703->38706 38704->38536 38705 100034b0 30 API calls 38705->38707 38706->38703 38707->38703 38707->38705 38708 100040e5 30 API calls 38707->38708 38708->38707 38710 10001c8f 38709->38710 38770 10001bb2 38710->38770 38712 10001cb6 38712->38541 38714 10003dca 38713->38714 38716 10003df9 38714->38716 38783 100189b4 RaiseException 38714->38783 38716->38552 38716->38556 38784 10019cb8 38717->38784 38720 10017593 38720->38589 38721 10017598 GetLastError 38722 100175a2 38721->38722 38722->38589 38724 100015ec 34 API calls 38723->38724 38725 10003691 38724->38725 38726 100015ec 34 API calls 38725->38726 38730 1000369c 38726->38730 38727 10003706 38732 10003731 38727->38732 38845 1000224f 38727->38845 38728 100040e5 30 API calls 38728->38730 38729 100036cf 38729->38727 38731 100040e5 30 API calls 38729->38731 38730->38728 38730->38729 38731->38729 38732->38589 38734->38545 38735->38555 38736->38541 38737->38541 38738->38541 38739->38643 38740->38643 38741->38583 38742->38606 38743->38597 38744->38577 38745->38601 38746->38627 38747->38612 38748->38630 38749->38654 38750->38661 38751->38566 38849 10001615 38752->38849 38755->38615 38756->38626 38757->38629 38758->38682 38759->38688 38761 100015ec 34 API calls 38760->38761 38762 100055b8 38761->38762 38763 100015ec 34 API calls 38762->38763 38764 100055c0 38763->38764 38765 100015ec 34 API calls 38764->38765 38766 100055c8 38765->38766 38767 100015ec 34 API calls 38766->38767 38768 100054f9 38767->38768 38768->38700 38769->38701 38771 10001bb7 38770->38771 38772 10001075 30 API calls 38771->38772 38774 10001c5a 38771->38774 38773 10001c48 38772->38773 38773->38774 38776 10001f31 38773->38776 38774->38712 38777 10001f3b 38776->38777 38778 10012a20 VirtualAlloc 38777->38778 38779 10001fd1 38778->38779 38780 10001fed 38779->38780 38782 100189b4 RaiseException 38779->38782 38780->38774 38782->38780 38783->38716 38794 1001c480 38784->38794 38786 10019cc8 38787 10019d0b 38786->38787 38790 10019cd6 CreateThread 38786->38790 38788 100189ee 29 API calls 38787->38788 38789 10019d11 38788->38789 38791 10017589 38789->38791 38805 1001c3fb 35 API calls 38789->38805 38790->38791 38792 10019d03 GetLastError 38790->38792 38812 10019d23 TlsGetValue 38790->38812 38791->38720 38791->38721 38792->38787 38804 1001c4b5 38794->38804 38795 1001c59b 38795->38786 38797 1001c56d HeapAlloc 38797->38804 38803 1001c52f 38803->38797 38803->38804 38809 1001a13a 29 API calls 38803->38809 38810 1001b308 6 API calls 38803->38810 38811 1001c5a2 LeaveCriticalSection 38803->38811 38804->38795 38804->38797 38804->38803 38806 1001a13a 29 API calls 38804->38806 38807 1001a865 HeapReAlloc HeapAlloc VirtualAlloc HeapFree VirtualAlloc 38804->38807 38808 1001c519 LeaveCriticalSection 38804->38808 38805->38791 38806->38804 38807->38804 38808->38804 38809->38803 38810->38803 38811->38803 38813 10019d70 TlsSetValue 38812->38813 38814 10019d5b 38812->38814 38817 10019d87 38813->38817 38818 10019d8f GetCurrentThreadId 38813->38818 38815 1001c098 31 API calls 38814->38815 38815->38813 38832 1001a072 7 API calls 38817->38832 38820 10019da0 38818->38820 38824 10019de9 38820->38824 38821 10019d8e 38821->38818 38825 10019df2 38824->38825 38833 1001c031 GetLastError TlsGetValue 38825->38833 38827 10019dfa 38828 10019e07 38827->38828 38844 1001a072 7 API calls 38827->38844 38830 1001c098 31 API calls 38828->38830 38831 10019e0e ExitThread 38830->38831 38832->38821 38834 1001c04d 38833->38834 38835 1001c08c SetLastError 38833->38835 38836 1001c480 30 API calls 38834->38836 38835->38827 38837 1001c056 38836->38837 38838 1001c084 38837->38838 38839 1001c05e TlsSetValue 38837->38839 38841 1001a072 7 API calls 38838->38841 38839->38838 38840 1001c06f 38839->38840 38843 1001c075 GetCurrentThreadId 38840->38843 38842 1001c08b 38841->38842 38842->38835 38843->38835 38844->38828 38846 10002259 38845->38846 38847 10002f54 100 API calls 38846->38847 38848 10002288 38847->38848 38848->38732 38850 1000163c 38849->38850 38851 1000161d 38849->38851 38850->38569 38852 1000163d 30 API calls 38851->38852 38852->38850 38853->38459 38854->38459 38855->38459 38856->38480 38857->38481 38858->38480 38860 10006b39 38859->38860 38861 10006b4a 38859->38861 38860->38861 38865 10006b51 38860->38865 38861->37960 38864 1000109b 29 API calls 38864->38861 38866 10006b5b 38865->38866 38867 100015a7 34 API calls 38866->38867 38868 10006b74 38867->38868 38873 10006b9e 38868->38873 38871 10006b44 38871->38864 38874 10006ba8 38873->38874 38875 100015a7 34 API calls 38874->38875 38876 10006bc1 38875->38876 38877 100015a7 34 API calls 38876->38877 38878 10006bd0 38877->38878 38879 100015a7 34 API calls 38878->38879 38880 10006bdf 38879->38880 38881 100015a7 34 API calls 38880->38881 38882 10006bee 38881->38882 38883 100015a7 34 API calls 38882->38883 38884 10006bfd 38883->38884 38891 10006c15 38884->38891 38887 6a1518e0 38888 6a1518ef 38887->38888 38889 6a1518f8 38887->38889 38927 6a151950 38888->38927 38889->38871 38892 10006c1f 38891->38892 38893 100015a7 34 API calls 38892->38893 38894 10006c3a 38893->38894 38895 100015a7 34 API calls 38894->38895 38896 10006c4f 38895->38896 38897 100015a7 34 API calls 38896->38897 38898 10006c5a 38897->38898 38899 100015a7 34 API calls 38898->38899 38900 10006c6f 38899->38900 38901 100015a7 34 API calls 38900->38901 38902 10006c7a 38901->38902 38903 100015a7 34 API calls 38902->38903 38904 10006c8f 38903->38904 38905 100015a7 34 API calls 38904->38905 38906 10006c9a 38905->38906 38907 100015a7 34 API calls 38906->38907 38908 10006cac 38907->38908 38909 100015a7 34 API calls 38908->38909 38910 10006cb7 38909->38910 38911 100015ec 34 API calls 38910->38911 38912 10006cce 38911->38912 38913 100015a7 34 API calls 38912->38913 38914 10006cd9 38913->38914 38915 100015a7 34 API calls 38914->38915 38916 10006ce5 38915->38916 38917 100015ec 34 API calls 38916->38917 38918 10006cfc 38917->38918 38919 100015a7 34 API calls 38918->38919 38920 10006d07 38919->38920 38921 100015a7 34 API calls 38920->38921 38922 10006d13 38921->38922 38923 100015a7 34 API calls 38922->38923 38924 10006d1f 38923->38924 38925 100015a7 34 API calls 38924->38925 38926 10006b80 38925->38926 38926->38871 38926->38887 38928 6a15196b FindCloseChangeNotification 38927->38928 38929 6a151976 38927->38929 38928->38929 38930 6a151989 38929->38930 38932 6a175ff4 66 API calls 38929->38932 38930->38889 38932->38930 38933->37629 38934->37629 38935->37629 38936->37629 38937->37629 38938->37630 38939->37636 38940->37628 38941->37627 38942 6a173c8e 38944 6a173bd7 38942->38944 38943 6a173d60 38944->38943 38945 6a1682b0 276 API calls 38944->38945 38946 6a173c62 38945->38946 38947 1000331c 38948 10003336 38947->38948 38950 10003370 38948->38950 38951 100030fd 38948->38951 38952 10003107 38951->38952 38953 10003147 38952->38953 38955 1000ab8d 38952->38955 38953->38950 38956 1000ab97 38955->38956 38957 10001075 30 API calls 38956->38957 38958 1000aba2 38957->38958 38959 1000abb6 38958->38959 38961 10006a20 38958->38961 38959->38953 38962 10006a2a 38961->38962 38965 10001b41 GetSystemInfo 38962->38965 38964 10006a94 38964->38959 38965->38964 38966 6a17658b 38967 6a176596 38966->38967 38968 6a17659b 38966->38968 38980 6a17a8ed GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 38967->38980 38972 6a176495 38968->38972 38971 6a1765a9 38973 6a1764a1 38972->38973 38977 6a1764ee 38973->38977 38978 6a17653e 38973->38978 38981 6a176360 38973->38981 38975 6a17651e 38976 6a176360 155 API calls 38975->38976 38975->38978 38976->38978 38977->38975 38977->38978 38979 6a176360 155 API calls 38977->38979 38978->38971 38979->38975 38980->38968 38982 6a17636f 38981->38982 38983 6a1763eb 38981->38983 39030 6a1793e1 HeapCreate 38982->39030 38985 6a176422 38983->38985 38986 6a1763f1 38983->38986 38988 6a176427 38985->38988 38989 6a176480 38985->38989 38992 6a17640c 38986->38992 38998 6a17637a 38986->38998 39041 6a177a46 66 API calls 38986->39041 39045 6a1770ea 8 API calls 38988->39045 38989->38998 39050 6a177404 78 API calls 38989->39050 38991 6a176381 39032 6a177472 77 API calls 38991->39032 38992->38998 39042 6a177ee0 67 API calls 38992->39042 38993 6a17642c 39046 6a177653 66 API calls 38993->39046 38998->38977 38999 6a176386 39007 6a176396 GetCommandLineA 38999->39007 39023 6a17638a 38999->39023 39001 6a176438 39001->38998 39047 6a17706f 6 API calls 39001->39047 39002 6a176416 39043 6a17711e 69 API calls 39002->39043 39006 6a17641b 39044 6a179411 VirtualFree HeapFree HeapFree HeapDestroy 39006->39044 39034 6a17a76a 75 API calls 39007->39034 39008 6a176456 39014 6a176474 39008->39014 39015 6a17645d 39008->39015 39011 6a1763a6 39035 6a177c8c 71 API calls 39011->39035 39013 6a1763b0 39016 6a1763b4 39013->39016 39037 6a17a6af 111 API calls 39013->39037 39049 6a175ff4 66 API calls 39014->39049 39048 6a17715b 66 API calls 39015->39048 39036 6a17711e 69 API calls 39016->39036 39021 6a176464 GetCurrentThreadId 39021->38998 39022 6a17638f 39022->38998 39033 6a179411 VirtualFree HeapFree HeapFree HeapDestroy 39023->39033 39024 6a1763c0 39025 6a1763d4 39024->39025 39038 6a17a437 110 API calls 39024->39038 39025->39022 39040 6a177ee0 67 API calls 39025->39040 39028 6a1763c9 39028->39025 39039 6a17787f 73 API calls 39028->39039 39031 6a176375 39030->39031 39031->38991 39031->38998 39032->38999 39033->39022 39034->39011 39035->39013 39036->39023 39037->39024 39038->39028 39039->39025 39040->39016 39041->38992 39042->39002 39043->39006 39044->38998 39045->38993 39046->39001 39047->39008 39048->39021 39049->39022 39050->38998
                              APIs
                                • Part of subcall function 6A1607D0: CharUpperW.USER32(?,00000000,?,6A15FCF3,?,6A15FE6C,?,00000000,?,00000010,ED279CBA,?,00000000,00000000), ref: 6A1607F7
                                • Part of subcall function 6A1607D0: CharUpperW.USER32(?,?,6A15FE6C,?,00000000,?,00000010,ED279CBA,?,00000000,00000000), ref: 6A160804
                              • VariantClear.OLEAUT32(?), ref: 6A15BEEE
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: CharUpper$ClearVariant
                              • String ID: !$001$R$Unknown error$a$exe$iso$r$rar$udf
                              • API String ID: 3047578428-2136912355
                              • Opcode ID: 173c09885f63b77b8abac5a7531e21ff729e982be533c18273a03c4200ff01d6
                              • Instruction ID: a1e75fa7c0eb22d6babcb81262aa67afa627a2494513864f78d4aae82dd4a4ee
                              • Opcode Fuzzy Hash: 173c09885f63b77b8abac5a7531e21ff729e982be533c18273a03c4200ff01d6
                              • Instruction Fuzzy Hash: C9C28DB59052288FCB24DF28CC84BDEB7B5AF49314F1141D9D959AB342EB31AE91CF90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FindClose.KERNEL32(FFFFFFFF,?), ref: 6A1637C4
                              • GetLastError.KERNEL32(?), ref: 6A1637D1
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: CloseErrorFindLast
                              • String ID:
                              • API String ID: 754982922-0
                              • Opcode ID: eaaa8410b9e2f3fb74eab85bfd1890f0a8e56f0e03c32d857cb01b67bb9a2dc3
                              • Instruction ID: 54ba162d3e04e3d079c89e97bd76df866182695c8e5924d8bef3126b68515991
                              • Opcode Fuzzy Hash: eaaa8410b9e2f3fb74eab85bfd1890f0a8e56f0e03c32d857cb01b67bb9a2dc3
                              • Instruction Fuzzy Hash: A382DFB16083409FD724CF28C484B9BB7E5EF89318F155A1DF99A97381DB30E855CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 6A172B20
                              • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,00000000), ref: 6A172B3C
                              • FindClose.KERNEL32(00000000,?,?,?,?,?,?,00000000), ref: 6A172B48
                              • FindResourceW.KERNEL32(6A150000,00000068,RC_DATA), ref: 6A172B7E
                              • LoadLibraryW.KERNEL32(?,?), ref: 6A172BA7
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: Find$LibraryLoad$CloseFileFirstResource
                              • String ID: 7z.dll$RC_DATA
                              • API String ID: 2112305928-3209790242
                              • Opcode ID: ac01307017e778d9032818e6ec69721bc9138bb1566e040f0ab916c73a3fd514
                              • Instruction ID: f07cdbc496d0275bc2555874dc0786f8ceda566e176cd40cc059162cb6f21279
                              • Opcode Fuzzy Hash: ac01307017e778d9032818e6ec69721bc9138bb1566e040f0ab916c73a3fd514
                              • Instruction Fuzzy Hash: DC41E2B15083409FC720EF24C948B5BB7E8AF9A358F050A5DF95697281DF34E909CBA3
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1133 6a158ab0-6a158b3b 1134 6a158b42-6a158b45 1133->1134 1135 6a158b3d-6a158b40 1133->1135 1136 6a158b48-6a158b52 1134->1136 1135->1136 1137 6a158b58-6a158baf call 6a17514c 1136->1137 1138 6a158cab-6a158cba call 6a175f2a 1136->1138 1143 6a158bb1-6a158bde call 6a162470 1137->1143 1144 6a158c1c-6a158c24 1137->1144 1145 6a158cfd-6a158d25 call 6a158400 1138->1145 1146 6a158cbc-6a158cca call 6a17663b 1138->1146 1152 6a158be3-6a158bf6 1143->1152 1149 6a158c26-6a158c2e 1144->1149 1150 6a158c4d-6a158ca2 call 6a1751d6 1144->1150 1163 6a158d27-6a158d2c 1145->1163 1164 6a158d2f-6a158d80 1145->1164 1153 6a158ccf-6a158ce1 call 6a17663b 1146->1153 1154 6a158c37-6a158c3a 1149->1154 1155 6a158c30-6a158c35 1149->1155 1150->1137 1168 6a158ca8 1150->1168 1158 6a158bff-6a158c03 1152->1158 1159 6a158bf8-6a158bf9 FindClose 1152->1159 1170 6a158ce6-6a158cf8 call 6a17663b 1153->1170 1161 6a158c41-6a158c48 call 6a160880 1154->1161 1162 6a158c3c 1154->1162 1155->1161 1158->1153 1169 6a158c09-6a158c16 1158->1169 1159->1158 1161->1150 1162->1161 1163->1164 1166 6a158de4-6a158dee 1164->1166 1167 6a158d82-6a158d9d 1164->1167 1173 6a158df4-6a158e4e call 6a17514c 1166->1173 1174 6a159562-6a1595fb call 6a1751d6 1166->1174 1167->1166 1178 6a158d9f-6a158ddf call 6a1751d6 1167->1178 1168->1138 1169->1144 1169->1170 1170->1145 1180 6a158e67-6a158e85 call 6a162470 1173->1180 1181 6a158e50-6a158e65 1173->1181 1195 6a1595ff-6a159617 1174->1195 1178->1195 1186 6a158e8a-6a158e9d 1180->1186 1185 6a158ec3-6a158ede 1181->1185 1200 6a158ee4-6a158f8d call 6a159f10 1185->1200 1201 6a159618-6a15966a call 6a1751d6 * 2 1185->1201 1188 6a158ea6-6a158eaa 1186->1188 1189 6a158e9f-6a158ea0 FindClose 1186->1189 1193 6a158eb0-6a158ebd 1188->1193 1194 6a159969-6a159980 call 6a17663b 1188->1194 1189->1188 1193->1185 1193->1194 1209 6a158f93-6a158f98 1200->1209 1210 6a1590ff-6a15912d call 6a15cae0 1200->1210 1201->1195 1209->1210 1211 6a158f9e-6a158faa 1209->1211 1221 6a159133-6a159158 1210->1221 1222 6a15966c-6a159709 call 6a1751d6 call 6a1582a0 call 6a1751d6 * 2 1210->1222 1214 6a158fc1-6a158fc9 1211->1214 1215 6a158fac 1211->1215 1214->1210 1220 6a158fcf-6a158ff9 call 6a151640 call 6a167240 1214->1220 1219 6a158fb0-6a158fb2 1215->1219 1219->1210 1223 6a158fb8-6a158fbf 1219->1223 1236 6a1590e6-6a1590fc call 6a1751d6 1220->1236 1237 6a158fff-6a15900f call 6a160790 1220->1237 1233 6a15970e-6a159761 call 6a1751d6 call 6a1582a0 1221->1233 1234 6a15915e-6a159160 1221->1234 1222->1195 1223->1214 1223->1219 1278 6a159762-6a1597a8 call 6a1751d6 * 2 1233->1278 1238 6a159162-6a1591c6 call 6a1751d6 call 6a1582a0 call 6a1751d6 1234->1238 1239 6a1591cb-6a1591d0 1234->1239 1236->1210 1237->1236 1254 6a159015-6a159058 call 6a151660 call 6a151460 call 6a1751d6 1237->1254 1297 6a159549-6a159559 1238->1297 1246 6a1591d6-6a1591e3 1239->1246 1247 6a1592a8 1239->1247 1252 6a1592af 1246->1252 1253 6a1591e9 1246->1253 1247->1252 1259 6a1592b1-6a1592e4 1252->1259 1260 6a1592ea-6a15931a call 6a17514c 1252->1260 1257 6a1591f0-6a159206 call 6a159ae0 1253->1257 1254->1236 1295 6a15905e-6a15906c 1254->1295 1273 6a159296-6a1592a2 1257->1273 1274 6a15920c-6a159210 1257->1274 1259->1233 1259->1260 1276 6a159344-6a159375 1260->1276 1277 6a15931c-6a159322 1260->1277 1273->1247 1273->1257 1274->1273 1281 6a159216-6a159251 1274->1281 1298 6a1597ad-6a15980e call 6a1751d6 * 2 call 6a1582a0 1276->1298 1299 6a15937b-6a159382 1276->1299 1283 6a159324-6a159335 1277->1283 1284 6a159337-6a159341 call 6a1751d6 1277->1284 1278->1195 1315 6a159253-6a159259 1281->1315 1316 6a15925b-6a159284 call 6a1755f0 1281->1316 1283->1283 1283->1284 1284->1276 1301 6a15907d-6a159085 1295->1301 1302 6a15906e-6a159072 1295->1302 1297->1173 1306 6a15955f 1297->1306 1298->1278 1304 6a159384-6a159396 1299->1304 1305 6a15939c-6a1593ab 1299->1305 1301->1236 1312 6a159087-6a1590b6 call 6a151640 call 6a167240 call 6a1751d6 1301->1312 1302->1236 1311 6a159074-6a15907b 1302->1311 1304->1298 1304->1305 1308 6a1593ad 1305->1308 1309 6a1593e9-6a1593f9 1305->1309 1306->1174 1314 6a1593b0-6a1593bd 1308->1314 1318 6a15940b 1309->1318 1319 6a1593fb-6a159402 1309->1319 1311->1301 1311->1302 1312->1236 1351 6a1590b8-6a1590cc call 6a1607d0 1312->1351 1322 6a1593e0-6a1593e7 1314->1322 1323 6a1593bf-6a1593cf 1314->1323 1315->1316 1324 6a159288-6a159292 1315->1324 1316->1324 1328 6a15940d-6a159459 call 6a158670 1318->1328 1319->1318 1327 6a159404-6a159409 1319->1327 1322->1309 1322->1314 1323->1298 1342 6a1593d5-6a1593dc 1323->1342 1324->1273 1327->1328 1338 6a15945e-6a159465 1328->1338 1339 6a159813-6a1598b9 call 6a1751d6 * 2 call 6a1582a0 call 6a1751d6 * 2 1338->1339 1340 6a15946b-6a159470 1338->1340 1339->1195 1344 6a159472-6a15949c 1340->1344 1345 6a15949e-6a1594a5 1340->1345 1342->1322 1349 6a1594ac-6a1594d6 1344->1349 1345->1349 1353 6a1594dc-6a159544 call 6a1751d6 * 2 call 6a1582a0 call 6a1751d6 1349->1353 1354 6a1598be-6a159964 call 6a1751d6 * 2 call 6a1582a0 call 6a1751d6 * 2 1349->1354 1351->1236 1359 6a1590ce-6a1590e1 call 6a159d00 * 2 1351->1359 1353->1297 1354->1195 1359->1236
                              APIs
                              • FindClose.KERNEL32(FFFFFFFF,?), ref: 6A158BF9
                              • FindClose.KERNEL32(FFFFFFFF,?), ref: 6A158EA0
                                • Part of subcall function 6A17663B: RaiseException.KERNEL32(?,6A170629,ED279CBA,?,?,6A170629,?,6A188388,ED279CBA), ref: 6A17667D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: CloseFind$ExceptionRaise
                              • String ID: 001$rar
                              • API String ID: 1045303971-402399766
                              • Opcode ID: 568d7b227f1e04c7bb564895fe66a6fd3261ec7e550e17d775f20b4477a01aa7
                              • Instruction ID: 7a9bfd4f0ea3553062f213f7a2dc49d60f9ff3e8c3552b6581df3b13d4c748b5
                              • Opcode Fuzzy Hash: 568d7b227f1e04c7bb564895fe66a6fd3261ec7e550e17d775f20b4477a01aa7
                              • Instruction Fuzzy Hash: BD9257B55083819FC324DF68C880A9BFBE5BF89314F518A1DE5AA87341DB31E855CF92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2338 6a162470-6a1624c1 2339 6a1624c3-6a1624cc FindClose 2338->2339 2340 6a1624d8-6a1624e9 FindFirstFileW 2338->2340 2341 6a1624d2 2339->2341 2342 6a16258f-6a162591 2339->2342 2343 6a16255b-6a162568 call 6a162410 2340->2343 2344 6a1624eb-6a162526 call 6a151680 call 6a1628a0 2340->2344 2341->2340 2345 6a16256a-6a16258c call 6a1751c7 2342->2345 2343->2345 2354 6a162542-6a162559 call 6a1751d6 2344->2354 2355 6a162528-6a162532 2344->2355 2354->2342 2354->2343 2355->2354 2356 6a162534-6a162540 FindFirstFileW 2355->2356 2356->2354
                              APIs
                              • FindClose.KERNEL32(?,ED279CBA,6A180658,00000000), ref: 6A1624C4
                              • FindFirstFileW.KERNEL32(6A1850B8,?,ED279CBA,6A180658,00000000), ref: 6A1624DE
                              • FindFirstFileW.KERNEL32(?,?), ref: 6A16253A
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: Find$FileFirst$Close
                              • String ID:
                              • API String ID: 2810966245-0
                              • Opcode ID: 71f81366787c223f23f2e4cc1143b4d5d66f8e94aad1eaa54c18af519ba5ac1b
                              • Instruction ID: 2c2de15d53694269007f6791ddb968e8856ef1dd685acb21bfdcedad82e27f16
                              • Opcode Fuzzy Hash: 71f81366787c223f23f2e4cc1143b4d5d66f8e94aad1eaa54c18af519ba5ac1b
                              • Instruction Fuzzy Hash: C63181B19083519FC720DF24C848BAAB7E4FF59324F110B59E8A9D32C0EB35A915CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6A162470: FindClose.KERNEL32(?,ED279CBA,6A180658,00000000), ref: 6A1624C4
                                • Part of subcall function 6A162470: FindFirstFileW.KERNEL32(6A1850B8,?,ED279CBA,6A180658,00000000), ref: 6A1624DE
                                • Part of subcall function 6A162470: FindFirstFileW.KERNEL32(?,?), ref: 6A16253A
                              • FindClose.KERNEL32(FFFFFFFF,?,?,?,?,?,?,?,?,?,?), ref: 6A164CE0
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID:
                              • API String ID: 2295610775-0
                              • Opcode ID: 6c016b42bbdc7711d62f42caaf17af93eeb09ddd860e6937c74148fbbb641272
                              • Instruction ID: eba5952084be446debc8c3a1480c20be6b8ee3dc0e45ee380689cd3ab14d33ff
                              • Opcode Fuzzy Hash: 6c016b42bbdc7711d62f42caaf17af93eeb09ddd860e6937c74148fbbb641272
                              • Instruction Fuzzy Hash: 773267B15083808FC320CF68C880A9BF7E4BFD9314F159A2EE99997351DB71E955CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 10017690: InitializeCriticalSection.KERNEL32 ref: 100176BE
                              • DeleteCriticalSection.KERNEL32(?), ref: 10004A99
                              • SysFreeString.OLEAUT32(?), ref: 10004D73
                              • DeleteCriticalSection.KERNEL32(?,00000000,?,00000000), ref: 10004E67
                              • DeleteCriticalSection.KERNEL32(?,00000000,?,00000000), ref: 10004ED2
                              • DeleteCriticalSection.KERNEL32(?,00000000,?,00000000), ref: 10004F2E
                              • DeleteCriticalSection.KERNEL32(?), ref: 10005080
                              • DeleteCriticalSection.KERNEL32(?), ref: 100050D7
                              • DeleteCriticalSection.KERNEL32(?), ref: 10005131
                              • DeleteCriticalSection.KERNEL32(?), ref: 1000519C
                              • SysFreeString.OLEAUT32(?), ref: 100051C5
                              • DeleteCriticalSection.KERNEL32(?), ref: 10005201
                              • SysFreeString.OLEAUT32(?), ref: 10005238
                              • DeleteCriticalSection.KERNEL32(?), ref: 10005274
                              • DeleteCriticalSection.KERNEL32(?), ref: 100052EC
                              • DeleteCriticalSection.KERNEL32(?), ref: 1000537C
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: CriticalSection$Delete$FreeString$Initialize
                              • String ID: *
                              • API String ID: 858148593-163128923
                              • Opcode ID: 8d515e06e490fc0e037fbab827e854e363c9577b9e0b0373954554861fc9b88c
                              • Instruction ID: ecb8a8915c69c7c96d6c908040f4422d87eeaffb21051c4ea884642e96cadca4
                              • Opcode Fuzzy Hash: 8d515e06e490fc0e037fbab827e854e363c9577b9e0b0373954554861fc9b88c
                              • Instruction Fuzzy Hash: C3926B74900289DFEF04CFA4C884ADDBBB5FF19344F21849CE446AB256CB71AA89CF51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1122 1001a421-1001a42b 1123 1001a493-1001a496 1122->1123 1124 1001a42d-1001a43d 1122->1124 1127 1001a498-1001a49d 1123->1127 1128 1001a4ba-1001a4c8 HeapDestroy 1123->1128 1125 1001a47f-1001a491 HeapFree 1124->1125 1126 1001a43f-1001a44a 1124->1126 1125->1128 1129 1001a44d-1001a47d VirtualFree * 2 HeapFree 1126->1129 1130 1001a49f-1001a4a4 1127->1130 1129->1125 1129->1129 1131 1001a4b4-1001a4b8 1130->1131 1132 1001a4a6-1001a4ae VirtualFree 1130->1132 1131->1128 1131->1130 1132->1131
                              APIs
                              • VirtualFree.KERNEL32(?,00100000,00004000,?,?,?,?,10019FC1,1001A015,?,?,?), ref: 1001A459
                              • VirtualFree.KERNEL32(?,00000000,00008000,?,?,?,?,10019FC1,1001A015,?,?,?), ref: 1001A464
                              • HeapFree.KERNEL32(00000000,?,?,?,?,?,10019FC1,1001A015,?,?,?), ref: 1001A471
                              • HeapFree.KERNEL32(00000000,?,?,?,?,10019FC1,1001A015,?,?,?), ref: 1001A48D
                              • VirtualFree.KERNEL32(FFFFFFFF,00000000,00008000,?,?,10019FC1,1001A015,?,?,?), ref: 1001A4AE
                              • HeapDestroy.KERNELBASE(?,?,10019FC1,1001A015,?,?,?), ref: 1001A4C0
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: Free$HeapVirtual$Destroy
                              • String ID:
                              • API String ID: 716807051-0
                              • Opcode ID: a134391120f2aacd7473546f5f7e68fbc99744a2b02380d7265d2bcfbbc009a3
                              • Instruction ID: 1c740d521b0f7e213dbb02f6402200852ca7cbed31c7f2444751ff5461a08e8a
                              • Opcode Fuzzy Hash: a134391120f2aacd7473546f5f7e68fbc99744a2b02380d7265d2bcfbbc009a3
                              • Instruction Fuzzy Hash: 5A110035240365BBE661EB10DCCAF05B7A6E785750F314026FA456A571C7B2BCA2CB14
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2111 6a1542e0-6a154319 2112 6a154325-6a15433c call 6a1526e0 2111->2112 2113 6a15431b-6a154320 call 6a152670 2111->2113 2117 6a15433e-6a154343 call 6a152670 2112->2117 2118 6a154348-6a15436a 2112->2118 2113->2112 2117->2118 2120 6a15436c-6a154378 2118->2120 2121 6a15437e-6a154387 2118->2121 2120->2121 2122 6a1543a4 2121->2122 2123 6a154389-6a154392 2121->2123 2126 6a1543a9-6a1543e1 call 6a153cf0 * 2 2122->2126 2124 6a154394-6a154397 2123->2124 2125 6a15439d-6a1543a2 2123->2125 2124->2122 2127 6a154399-6a15439b 2124->2127 2125->2126 2132 6a1543e3-6a1543ff call 6a152d80 2126->2132 2133 6a154402-6a15440c 2126->2133 2127->2126 2132->2133 2135 6a15440e-6a154425 call 6a152d80 2133->2135 2136 6a154428-6a15443b 2133->2136 2135->2136 2139 6a15443d-6a154443 2136->2139 2140 6a15444e 2136->2140 2139->2140 2142 6a154445-6a15444c 2139->2142 2143 6a154453-6a15445c 2140->2143 2142->2140 2142->2143 2144 6a154462 2143->2144 2145 6a15452b-6a154533 2143->2145 2146 6a154466-6a15446e 2144->2146 2145->2146 2147 6a154539 2145->2147 2148 6a15453e-6a154543 2146->2148 2149 6a154474 2146->2149 2147->2148 2150 6a154479-6a1544ba call 6a152940 2148->2150 2151 6a154549-6a15454d 2148->2151 2149->2150 2158 6a1544d3-6a1544e9 2150->2158 2159 6a1544bc-6a1544cf call 6a151460 2150->2159 2153 6a15454f-6a154554 call 6a152670 2151->2153 2154 6a154559-6a154573 call 6a151460 2151->2154 2153->2154 2154->2150 2164 6a154579-6a15457e call 6a152670 2154->2164 2162 6a154504-6a154509 2158->2162 2163 6a1544eb-6a154500 call 6a151460 2158->2163 2159->2158 2168 6a15450f-6a154513 2162->2168 2169 6a154738-6a15473d 2162->2169 2163->2162 2171 6a154583-6a1545ad 2164->2171 2172 6a154515-6a15451f 2168->2172 2173 6a154521-6a154526 call 6a152670 2168->2173 2174 6a15474d-6a154779 call 6a153750 call 6a1539a0 2169->2174 2175 6a15473f-6a154742 2169->2175 2176 6a1545af-6a1545c8 call 6a152d80 2171->2176 2177 6a1545cb-6a1545d5 2171->2177 2172->2171 2172->2173 2173->2145 2200 6a154782-6a154794 2174->2200 2201 6a15477b 2174->2201 2175->2174 2178 6a154744-6a154747 2175->2178 2176->2177 2183 6a1545f4-6a1545f9 2177->2183 2184 6a1545d7-6a1545f1 call 6a152d80 2177->2184 2178->2174 2182 6a1548a6-6a1548a9 2178->2182 2187 6a154a62-6a154a65 2182->2187 2188 6a1548af-6a1548dd 2182->2188 2189 6a15460d-6a154621 call 6a153250 call 6a16ed50 2183->2189 2190 6a1545fb-6a154608 call 6a16e950 2183->2190 2184->2183 2187->2113 2199 6a154a6b-6a154a86 call 6a16ed50 2187->2199 2195 6a154903-6a154915 2188->2195 2196 6a1548df-6a1548f7 call 6a153e30 2188->2196 2223 6a154623-6a15466d call 6a151420 call 6a154d10 * 2 call 6a1751d6 2189->2223 2224 6a15466f-6a15467b call 6a153e70 2189->2224 2190->2189 2195->2199 2204 6a15491b 2195->2204 2196->2195 2214 6a1548f9-6a1548fe call 6a152670 2196->2214 2206 6a1547b4-6a1547c5 2200->2206 2207 6a154796-6a15479b 2200->2207 2201->2200 2210 6a154920-6a15494e call 6a151420 CharUpperW 2204->2210 2216 6a1547c7-6a1547e9 call 6a151460 2206->2216 2217 6a154819 2206->2217 2212 6a1547a7-6a1547ab 2207->2212 2213 6a15479d-6a1547a1 2207->2213 2210->2113 2232 6a154954-6a15495b 2210->2232 2212->2206 2221 6a1547ad 2212->2221 2220 6a1547a3-6a1547a5 2213->2220 2213->2221 2214->2195 2216->2217 2239 6a1547eb-6a1547fd 2216->2239 2219 6a15481d-6a154838 2217->2219 2227 6a15487b-6a15487d 2219->2227 2228 6a15483a-6a154841 2219->2228 2220->2206 2220->2212 2221->2206 2243 6a154686-6a15468b 2223->2243 2235 6a154680-6a154683 2224->2235 2236 6a15487f-6a154893 call 6a151460 2227->2236 2237 6a154898-6a1548a1 call 6a153250 2227->2237 2233 6a154843-6a154855 call 6a17663b 2228->2233 2234 6a15485a-6a15485c 2228->2234 2240 6a1549a6-6a1549aa 2232->2240 2241 6a15495d-6a154967 2232->2241 2233->2234 2234->2227 2245 6a15485e-6a154862 2234->2245 2235->2243 2236->2237 2237->2199 2239->2219 2249 6a1547ff-6a154817 call 6a154b20 2239->2249 2240->2113 2244 6a1549b0-6a1549b8 2240->2244 2250 6a15496e-6a154981 call 6a153e30 2241->2250 2251 6a154969 2241->2251 2253 6a154721-6a154733 call 6a155110 2243->2253 2254 6a154691-6a1546a2 call 6a1539a0 2243->2254 2255 6a1549ed-6a1549f1 2244->2255 2256 6a1549ba-6a1549c4 2244->2256 2245->2227 2257 6a154864-6a154876 call 6a17663b 2245->2257 2249->2219 2250->2113 2270 6a154987-6a15498e 2250->2270 2251->2250 2253->2199 2281 6a1546a4-6a1546a8 2254->2281 2282 6a1546c7-6a1546d1 2254->2282 2255->2113 2268 6a1549f7-6a1549fc 2255->2268 2264 6a1549c6 2256->2264 2265 6a1549cb-6a1549d3 2256->2265 2257->2227 2264->2265 2272 6a1549d5-6a1549e5 call 6a153e30 2265->2272 2273 6a154a34-6a154a5a call 6a1751d6 2265->2273 2268->2273 2275 6a1549fe-6a154a31 call 6a151640 call 6a151460 call 6a1751d6 2268->2275 2270->2113 2279 6a154994-6a1549a1 2270->2279 2272->2113 2296 6a1549eb 2272->2296 2273->2210 2294 6a154a60 2273->2294 2275->2273 2279->2273 2281->2282 2287 6a1546aa-6a1546ae 2281->2287 2289 6a1546d3-6a1546ec call 6a151460 call 6a162cb0 2282->2289 2290 6a1546ef-6a154700 2282->2290 2287->2282 2295 6a1546b0-6a1546c2 call 6a17663b 2287->2295 2289->2290 2292 6a154714-6a154718 2290->2292 2293 6a154702-6a154712 2290->2293 2292->2253 2300 6a15471a 2292->2300 2293->2253 2294->2199 2295->2282 2296->2273 2300->2253
                              APIs
                              • CharUpperW.USER32(?), ref: 6A154943
                                • Part of subcall function 6A17663B: RaiseException.KERNEL32(?,6A170629,ED279CBA,?,?,6A170629,?,6A188388,ED279CBA), ref: 6A17667D
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: CharExceptionRaiseUpper
                              • String ID: Cannot use absolute pathnames for this command$Incorrect command line
                              • API String ID: 1023082840-724315024
                              • Opcode ID: 57392e80117517ef09de0f633658104c77385836267872f1e280281a3d9a8e45
                              • Instruction ID: f2913436fd155fa05c0e1fe32e8453754bd1ccfd7b8adb8e4f1b193932e544c1
                              • Opcode Fuzzy Hash: 57392e80117517ef09de0f633658104c77385836267872f1e280281a3d9a8e45
                              • Instruction Fuzzy Hash: 8122D9B15083409FD711CF14C484B9ABBE6BF95308F09899CE4F94B392DB74E965CBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2306 6a162a70-6a162a9c 2307 6a162ab3-6a162ad7 CreateFileW 2306->2307 2308 6a162a9e-6a162aa7 CloseHandle 2306->2308 2309 6a162b3c-6a162b54 2307->2309 2310 6a162ad9-6a162b08 call 6a151680 call 6a1628a0 2307->2310 2311 6a162b57-6a162b69 2308->2311 2312 6a162aad 2308->2312 2317 6a162b33-6a162b39 call 6a1751d6 2310->2317 2318 6a162b0a-6a162b13 2310->2318 2312->2307 2317->2309 2318->2317 2319 6a162b15-6a162b31 CreateFileW 2318->2319 2319->2317
                              APIs
                              • CloseHandle.KERNEL32(?,ED279CBA,?,00000000,?,?,00000000,?,?,?,00000000,6A180C38,000000FF), ref: 6A162A9F
                              • CreateFileW.KERNEL32(?,?,00000000,00000000,?,00000080,00000000,ED279CBA,?,00000000,?,?,00000000), ref: 6A162ACC
                              • CreateFileW.KERNEL32(?,?,?,00000000,00000000,00000080,00000000), ref: 6A162B2B
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: CreateFile$CloseHandle
                              • String ID:
                              • API String ID: 1443461169-0
                              • Opcode ID: b41c809410920ddc5026452ff5b2c1d0fa8bac8c94313f909c53663d0eba9fdf
                              • Instruction ID: 28b4aec2271fc3d6ecb6f192dc2b9fe66a72dc219d9e5eb062adafd463d9783f
                              • Opcode Fuzzy Hash: b41c809410920ddc5026452ff5b2c1d0fa8bac8c94313f909c53663d0eba9fdf
                              • Instruction Fuzzy Hash: 6F315CB5A00219AFDB10CF64D845BABBBB8FB05764F104719FC25E72C0DB71AA11CBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2322 6a161340-6a161376 CreateDirectoryW 2323 6a16138c-6a161397 GetLastError 2322->2323 2324 6a161378-6a16138b 2322->2324 2325 6a16140b-6a16141e 2323->2325 2326 6a161399-6a1613c4 call 6a151680 call 6a1628a0 2323->2326 2331 6a1613c6-6a1613cf 2326->2331 2332 6a1613ff-6a161408 call 6a1751d6 2326->2332 2331->2332 2333 6a1613d1-6a1613fe CreateDirectoryW call 6a1751d6 2331->2333 2332->2325
                              APIs
                              • CreateDirectoryW.KERNEL32(?,00000000,ED279CBA,?,?,?,?,?,00000000), ref: 6A16136E
                              • GetLastError.KERNEL32 ref: 6A16138C
                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 6A1613D7
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: CreateDirectory$ErrorLast
                              • String ID:
                              • API String ID: 2485089472-0
                              • Opcode ID: 7ae9976ff1a2d097298dd3b3e6dd515c80898a2c2a8f2b97dc02e75a04cced6f
                              • Instruction ID: 567eec0d554d9f84bc78a614fcd2bc121003a859b4c8e89ce57fb1554ed3990f
                              • Opcode Fuzzy Hash: 7ae9976ff1a2d097298dd3b3e6dd515c80898a2c2a8f2b97dc02e75a04cced6f
                              • Instruction Fuzzy Hash: E9210073E04204ABDB10DF98D805BAFFBB8EB46625F11016AED05E3280DF365905C7E1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2359 6a151ab0-6a151ac1 2360 6a151ad0-6a151aff SetFilePointer 2359->2360 2361 6a151ac3-6a151acd 2359->2361 2362 6a151b01-6a151b09 GetLastError 2360->2362 2363 6a151b0f 2360->2363 2362->2363 2364 6a151b0b-6a151b0d 2362->2364 2365 6a151b11-6a151b1a 2363->2365 2364->2365 2366 6a151b21-6a151b23 2365->2366 2367 6a151b1c-6a151b1e 2365->2367 2368 6a151b25-6a151b2c 2366->2368 2369 6a151b2f-6a151b33 GetLastError 2366->2369 2367->2366 2370 6a151b35-6a151b3f 2369->2370 2371 6a151b42 2369->2371 2372 6a151b44-6a151b49 2371->2372 2373 6a151b4e-6a151b53 2371->2373 2372->2373
                              APIs
                              • SetFilePointer.KERNEL32(?,?,?,?), ref: 6A151AEC
                              • GetLastError.KERNEL32 ref: 6A151B01
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: ErrorFileLastPointer
                              • String ID:
                              • API String ID: 2976181284-0
                              • Opcode ID: 268d957b9990d43df9c06f5a4fb55db687ee574060676f733222a5b5c9b09758
                              • Instruction ID: b310de93342337385a5b6a5e62b0fa2ba1e6601a619a1c284db9a2f2bf6b560c
                              • Opcode Fuzzy Hash: 268d957b9990d43df9c06f5a4fb55db687ee574060676f733222a5b5c9b09758
                              • Instruction Fuzzy Hash: 00110BB77051094B8700DE6CE9409ABB7E4EB95321F00822EFD28C7250E732D42597F1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2374 6a158670-6a1586c9 2375 6a158857-6a158881 2374->2375 2376 6a1586cf-6a1586df 2374->2376 2377 6a158883-6a15888d call 6a151680 2375->2377 2378 6a15888f-6a158892 2375->2378 2383 6a158706-6a15870b 2376->2383 2384 6a1586e1-6a158701 2376->2384 2377->2378 2381 6a158895-6a1588a4 2378->2381 2381->2381 2382 6a1588a6-6a158904 call 6a154a90 call 6a15a5c0 call 6a1599d0 call 6a1751d6 * 2 2381->2382 2423 6a158906-6a15890a call 6a161420 2382->2423 2424 6a158931-6a15897c call 6a155e10 call 6a15d1b0 2382->2424 2387 6a158711-6a158757 call 6a17514c call 6a15abe0 2383->2387 2388 6a1587d0-6a1587d3 2383->2388 2394 6a158a91-6a158a96 call 6a1751d6 2384->2394 2405 6a15875d-6a158773 call 6a15ab10 2387->2405 2406 6a15881f-6a158852 call 6a1751d6 * 2 2387->2406 2388->2375 2392 6a1587d9-6a15881e call 6a1751d6 2388->2392 2407 6a158a98-6a158aac 2394->2407 2405->2406 2417 6a158779-6a158799 call 6a16e6e0 2405->2417 2406->2407 2426 6a1587a0-6a1587a7 2417->2426 2427 6a15879b-6a15879e 2417->2427 2433 6a15890f-6a158914 2423->2433 2442 6a1589c3-6a1589c6 2424->2442 2443 6a15897e-6a1589be call 6a1751d6 call 6a154c80 call 6a1751d6 2424->2443 2432 6a1587b9-6a1587c7 call 6a1751d6 2426->2432 2427->2426 2431 6a1587a9-6a1587b8 call 6a159d00 2427->2431 2431->2432 2432->2387 2444 6a1587cd 2432->2444 2433->2424 2437 6a158916-6a15892c GetLastError call 6a17663b 2433->2437 2437->2424 2446 6a1589d4 2442->2446 2447 6a1589c8-6a1589cb 2442->2447 2443->2407 2444->2388 2449 6a1589d6-6a1589df 2446->2449 2447->2446 2448 6a1589cd-6a1589d2 2447->2448 2448->2449 2451 6a1589e1-6a158a0c 2449->2451 2452 6a158a3c-6a158a47 2449->2452 2462 6a158a2e-6a158a3a call 6a162e40 2451->2462 2463 6a158a0e-6a158a16 2451->2463 2476 6a158a48 call 10005aa5 2452->2476 2477 6a158a48 call 100061aa 2452->2477 2455 6a158a4a 2457 6a158a4c-6a158a90 call 6a1751d6 call 6a154c80 2455->2457 2457->2394 2462->2457 2466 6a158a1e-6a158a2b call 6a162f70 2463->2466 2467 6a158a18-6a158a1c 2463->2467 2466->2462 2467->2462 2467->2466 2476->2455 2477->2455
                              APIs
                              • GetLastError.KERNEL32(?,?,00000000,?,00000000), ref: 6A158916
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: ErrorLast
                              • String ID: <H
                              • API String ID: 1452528299-4022674625
                              • Opcode ID: e9da1ac345df53c9dd1519e6a4210cfb08c52a471f3c50206f25b9db1cf830ad
                              • Instruction ID: 2373c3bd3826a369ea99420419901dc99db24ece927370fba2902db55918e131
                              • Opcode Fuzzy Hash: e9da1ac345df53c9dd1519e6a4210cfb08c52a471f3c50206f25b9db1cf830ad
                              • Instruction Fuzzy Hash: F3E1A1F5D00248AFCB04DFE8C8849DEBBB5FF49314F24815DE516AB241DB34AA55CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2478 6a176360-6a17636d 2479 6a17636f-6a176370 call 6a1793e1 2478->2479 2480 6a1763eb-6a1763ef 2478->2480 2484 6a176375-6a176378 2479->2484 2482 6a176422-6a176425 2480->2482 2483 6a1763f1-6a1763f7 2480->2483 2487 6a176427-6a17643e call 6a1770ea call 6a177653 2482->2487 2488 6a176480-6a176483 2482->2488 2485 6a17637a-6a17637c 2483->2485 2486 6a1763f9-6a176405 2483->2486 2484->2485 2492 6a176381-6a176388 call 6a177472 2484->2492 2493 6a17648f-6a176492 2485->2493 2494 6a176407 call 6a177a46 2486->2494 2495 6a17640c-6a17640f 2486->2495 2487->2485 2509 6a176444-6a17645b call 6a17706f 2487->2509 2490 6a176485-6a17648b call 6a177404 2488->2490 2491 6a17648c-6a17648e 2488->2491 2490->2491 2491->2493 2506 6a176391-6a1763b2 call 6a17a8a1 GetCommandLineA call 6a17a76a call 6a177c8c 2492->2506 2507 6a17638a-6a17638f call 6a179411 2492->2507 2494->2495 2495->2491 2500 6a176411-6a176420 call 6a177ee0 call 6a17711e call 6a179411 2495->2500 2500->2491 2527 6a1763b4-6a1763b9 call 6a17711e 2506->2527 2528 6a1763bb-6a1763c2 call 6a17a6af 2506->2528 2507->2485 2525 6a176474-6a17647b call 6a175ff4 2509->2525 2526 6a17645d-6a176472 call 6a17715b GetCurrentThreadId 2509->2526 2525->2485 2526->2491 2527->2507 2537 6a1763e4-6a1763e9 call 6a177ee0 2528->2537 2538 6a1763c4-6a1763cb call 6a17a437 2528->2538 2537->2527 2538->2537 2543 6a1763cd-6a1763d7 call 6a17787f 2538->2543 2543->2537 2546 6a1763d9-6a1763df 2543->2546 2546->2491
                              APIs
                                • Part of subcall function 6A1793E1: HeapCreate.KERNEL32(00000000,00001000,00000000,?,6A176375,00000001,?,?,?,6A1764EE,?,?,?,6A187F18,0000000C,6A1765A9), ref: 6A1793F6
                              • GetCommandLineA.KERNEL32(?,?,?,6A1764EE,?,?,?,6A187F18,0000000C,6A1765A9,?), ref: 6A176396
                                • Part of subcall function 6A17A76A: GetEnvironmentStringsW.KERNEL32(?,?,?), ref: 6A17A788
                                • Part of subcall function 6A17A76A: GetEnvironmentStringsW.KERNEL32(?,?,?), ref: 6A17A7C3
                                • Part of subcall function 6A177C8C: GetStartupInfoA.KERNEL32(?), ref: 6A177CA1
                                • Part of subcall function 6A177C8C: GetFileType.KERNEL32(00000040,?,?,?,6A1764EE,?,?,?,6A187F18,0000000C,6A1765A9,?), ref: 6A177DCB
                                • Part of subcall function 6A17711E: TlsFree.KERNEL32(00000015,6A17641B,?,?,?,6A1764EE,?,?,?,6A187F18,0000000C,6A1765A9,?), ref: 6A177149
                                • Part of subcall function 6A17711E: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,6A17641B,?,?,?,6A1764EE,?,?,?,6A187F18,0000000C,6A1765A9,?), ref: 6A1780C0
                                • Part of subcall function 6A17711E: DeleteCriticalSection.KERNEL32(00000015,?,?,6A17641B,?,?,?,6A1764EE,?,?,?,6A187F18,0000000C,6A1765A9,?), ref: 6A1780EA
                                • Part of subcall function 6A1770EA: TlsGetValue.KERNEL32(6A15FA7E,6A177259,?,6A154D3F,0000000C,ED279CBA,?,?,00000000,?,?,6A17EF9B,000000FF,?,6A15FA7E,?), ref: 6A1770F3
                                • Part of subcall function 6A1770EA: TlsSetValue.KERNEL32(00000000,6A154D3F,0000000C,ED279CBA,?,?,00000000,?,?,6A17EF9B,000000FF,?,6A15FA7E,?), ref: 6A177114
                                • Part of subcall function 6A177653: Sleep.KERNEL32(00000000,?,6A15FA7E,?), ref: 6A17767B
                              • GetCurrentThreadId.KERNEL32 ref: 6A176466
                                • Part of subcall function 6A175FF4: HeapFree.KERNEL32(00000000,6A15FA7E,6A187EB0,0000000C,6A1781B5,00000000,6A188028,0000000C,6A1781EF,6A15FA7E,?,?,6A17C6AB,00000004,6A1882E8,0000000C), ref: 6A17605C
                                • Part of subcall function 6A175FF4: GetLastError.KERNEL32(?,6A17C6AB,00000004,6A1882E8,0000000C,6A177669,6A15FA7E,?,00000000,00000000,00000000,?,6A17726D,00000001,00000214), ref: 6A17606D
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: CriticalDeleteEnvironmentFreeHeapSectionStringsValue$CommandCreateCurrentErrorFileInfoLastLineSleepStartupThreadType
                              • String ID:
                              • API String ID: 3748246414-0
                              • Opcode ID: b45c563d43ad9dfc0bdfb2652cbf759bc3c52389d5dbe814a39b02c44b1e79e9
                              • Instruction ID: d773ce0600cb217a76a7f815c41bec779779c83b3d15883f08a312fd3f076ede
                              • Opcode Fuzzy Hash: b45c563d43ad9dfc0bdfb2652cbf759bc3c52389d5dbe814a39b02c44b1e79e9
                              • Instruction Fuzzy Hash: 2421D33158836A9AE77167B54C4C60A36F4EF57769B237827E47AC2043FF21C441CABA
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • SetFileAttributesW.KERNEL32(00000000,00000000,ED279CBA,?,00000000,?,?,00000000,?,ED279CBA,00000000), ref: 6A16108F
                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 6A1610ED
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: 90bebf0c973f86125aa5b8af65e223d951fadc19cc84945e17019df837bbbd4d
                              • Instruction ID: 2a05cc78a5b1b654f711d49e7acda01c2e9208000aa7312a9dc3217dd6eb33b4
                              • Opcode Fuzzy Hash: 90bebf0c973f86125aa5b8af65e223d951fadc19cc84945e17019df837bbbd4d
                              • Instruction Fuzzy Hash: 5F21C177E04208ABDF00CFA4D845B9EFBF8EB45665F01016AED08D3340EB36AA05C7A0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2561 10019cb8-10019cce call 1001c480 2564 10019cd0-10019d01 call 1001c01e CreateThread 2561->2564 2565 10019d0b-10019d14 call 100189ee 2561->2565 2572 10019d03-10019d09 GetLastError 2564->2572 2573 10019d1f-10019d22 2564->2573 2570 10019d16-10019d1c call 1001c3fb 2565->2570 2571 10019d1d 2565->2571 2570->2571 2571->2573 2572->2565
                              APIs
                                • Part of subcall function 1001C480: HeapAlloc.KERNEL32(00000008,?,00000000,00000000,00000001,10019E24,10021318,000000FF,?,1001C056,00000001,00000074), ref: 1001C576
                              • CreateThread.KERNEL32(00000000,00000000,Function_00019D23,00000000,?,?), ref: 10019CF9
                              • GetLastError.KERNEL32(?,10017589,00000000,00000000,10002FF6,00000000,00000000,00000000,?,10002FF2,?,?,?,?,10003E76,?), ref: 10019D03
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: AllocCreateErrorHeapLastThread
                              • String ID:
                              • API String ID: 3580101977-0
                              • Opcode ID: 53b11fc37b3e5cb832321f1eb73cf4aff9b5aac8ba68efd3095b3517519951be
                              • Instruction ID: 578384fe474d0b562f95e97df9c8fae57dcf2a9e42d60c7228f8a9f52e2ea293
                              • Opcode Fuzzy Hash: 53b11fc37b3e5cb832321f1eb73cf4aff9b5aac8ba68efd3095b3517519951be
                              • Instruction Fuzzy Hash: 77F028372043156BDB21DF65EC05DAF3BA5DF446B0B104029FA18CA190CB31D8918B91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2576 6a151c20-6a151c2b 2577 6a151c32-6a151c67 WriteFile 2576->2577 2578 6a151c2d 2576->2578 2579 6a151c69 2577->2579 2580 6a151c6b-6a151c6d 2577->2580 2578->2577 2579->2580 2581 6a151c75-6a151c7d GetLastError 2580->2581 2582 6a151c6f-6a151c72 2580->2582 2583 6a151c7f-6a151c85 2581->2583 2584 6a151c88 2581->2584 2585 6a151c94-6a151c95 2584->2585 2586 6a151c8a-6a151c8f 2584->2586 2586->2585
                              APIs
                              • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 6A151C4C
                              • GetLastError.KERNEL32 ref: 6A151C75
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: ErrorFileLastWrite
                              • String ID:
                              • API String ID: 442123175-0
                              • Opcode ID: 63ffb4cebd8dfcc49da1a063671e578e87392d4bc1c7cf49421b0ce43a4ea51a
                              • Instruction ID: d4afe5ea1b12bea7fe4d6f914aabf0d0bc78716a6adb3fffc43c8c5c49d7a5d4
                              • Opcode Fuzzy Hash: 63ffb4cebd8dfcc49da1a063671e578e87392d4bc1c7cf49421b0ce43a4ea51a
                              • Instruction Fuzzy Hash: 4601867220030A9FD750DE58D844BA737E8BF55750F00492AF926CB580D776EC618BB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 6A1519EB
                              • GetLastError.KERNEL32 ref: 6A151A0C
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: ErrorFileLastRead
                              • String ID:
                              • API String ID: 1948546556-0
                              • Opcode ID: ca500aa0c9c7826d2c3c1097ed16826d044c52d8ae5bc097d3cbf395f7443254
                              • Instruction ID: 28f1871d257e112e89616f776a31932aff7f643a967f6304bf546a0b95b17376
                              • Opcode Fuzzy Hash: ca500aa0c9c7826d2c3c1097ed16826d044c52d8ae5bc097d3cbf395f7443254
                              • Instruction Fuzzy Hash: 50F062B535024A9BDB05DE54D854B6B33E9BB94310F04C52AF969CB280DB75D831DB70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapCreate.KERNEL32(00000000,00001000,00000000,10019F1B,00000001), ref: 1001A3D5
                                • Part of subcall function 1001A27C: GetVersionExA.KERNEL32 ref: 1001A29B
                              • HeapDestroy.KERNEL32 ref: 1001A414
                                • Part of subcall function 1001A4C9: HeapAlloc.KERNEL32(00000000,00000140,1001A3FD,000003F8), ref: 1001A4D6
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: Heap$AllocCreateDestroyVersion
                              • String ID:
                              • API String ID: 2507506473-0
                              • Opcode ID: bc4e9ed2508816d106b6c68f37e2140fc1a3498347a5ba50f7c2e7f5e8612b28
                              • Instruction ID: f49a4552e00520ddd5bd994c2c6f56530b3037705a70c7491d35245aff95e9ec
                              • Opcode Fuzzy Hash: bc4e9ed2508816d106b6c68f37e2140fc1a3498347a5ba50f7c2e7f5e8612b28
                              • Instruction Fuzzy Hash: 80F09274611302ABFF14EB309D8AB5935D1DB86791F308436F905CD0A6EBF0D8D2A611
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FindCloseChangeNotification.KERNEL32(00000002,6A16B356,?,?,?,?,?,?,6A185380,?), ref: 6A151BE9
                              • GetLastError.KERNEL32(?,?,?,?,?,?,6A185380,?), ref: 6A151BFD
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: ChangeCloseErrorFindLastNotification
                              • String ID:
                              • API String ID: 1687624791-0
                              • Opcode ID: ad48640506d675cb2f471392114b64fafbe2ed61a6b78879ff0dfac5bbe288ef
                              • Instruction ID: 4f8153d7cd67c31a26f50bb4edd5afb60950352f3163923e6e8240ac3fc77b43
                              • Opcode Fuzzy Hash: ad48640506d675cb2f471392114b64fafbe2ed61a6b78879ff0dfac5bbe288ef
                              • Instruction Fuzzy Hash: 94E012F83506035ADB115E35CD4832675E46B137717A18B28E07AC54E0EF2EC4528A24
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(00000000,?,?,?,10002894,?,?,?,?,?), ref: 1000281B
                              • LeaveCriticalSection.KERNEL32(00000000,?,?,?,10002894,?,?,?,?,?), ref: 1000284F
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave
                              • String ID:
                              • API String ID: 3168844106-0
                              • Opcode ID: 31ba921f93e0922ecbc56fece5b0bbad6d7110b5eb9d49f18265bee903e4b92a
                              • Instruction ID: a3f251eb98acb8aeedd518acfd2e06878d0524bbd79d22e0378b99734f5e22aa
                              • Opcode Fuzzy Hash: 31ba921f93e0922ecbc56fece5b0bbad6d7110b5eb9d49f18265bee903e4b92a
                              • Instruction Fuzzy Hash: D401467AA00214AFDB11CF94C848B9ABBB9FF48711F10841AFD01A7221C7B4A9119B60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetFileTime.KERNEL32(?,00000000,00000000,00000000,ED279CBA,?,?,?,?,?,6A180300,000000FF), ref: 6A157438
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: FileTime
                              • String ID:
                              • API String ID: 1425588814-0
                              • Opcode ID: 4f3ef1e32210bcaeef50482b2b128431856e597fb46236b39182963be840a039
                              • Instruction ID: dda01446917dfc335b9e833ef4fb99be06b767b3d7a422d7e570ef289ac87469
                              • Opcode Fuzzy Hash: 4f3ef1e32210bcaeef50482b2b128431856e597fb46236b39182963be840a039
                              • Instruction Fuzzy Hash: 4C518DB2A04A82BFD759CF74C481BA5FBA0FB49314F158A6ED47D87601DB31B864CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RtlAllocateHeap.NTDLL(00000000,?,?,?,?,?,?), ref: 1001899F
                                • Part of subcall function 1001A13A: InitializeCriticalSection.KERNEL32(00000000,?,?,?,10018A6D,00000009,?,?,?), ref: 1001A177
                                • Part of subcall function 1001A13A: EnterCriticalSection.KERNEL32(?,?,?,10018A6D,00000009,?,?,?), ref: 1001A192
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: CriticalSection$AllocateEnterHeapInitialize
                              • String ID:
                              • API String ID: 1616793339-0
                              • Opcode ID: 64ac742c6e18b1ebf1a9d12a1be87a2e2d80d958cc1a171f76a8005aa0769b83
                              • Instruction ID: bde266228d008e092059639ff97bb6b14f601e90ad82446575358dbeed7d10ff
                              • Opcode Fuzzy Hash: 64ac742c6e18b1ebf1a9d12a1be87a2e2d80d958cc1a171f76a8005aa0769b83
                              • Instruction Fuzzy Hash: C5219032A00255BAEB10DB68DC42BADB7A4FB01764F284215F924EF1C0C774EBC18B52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RtlAllocateHeap.NTDLL(00000000,6A15FA6F,?,00000000,?,?,6A154D3F,0000000C,ED279CBA,?,?,00000000,?,?,6A17EF9B,000000FF), ref: 6A175FA1
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: c524c3d35e129a379a1f49c2a8da8e1cc627a0a0235f07edb0f585804db5283c
                              • Instruction ID: ff657bc221d36583a9b33441c36328ac186ac5559f397642aee088e634f37313
                              • Opcode Fuzzy Hash: c524c3d35e129a379a1f49c2a8da8e1cc627a0a0235f07edb0f585804db5283c
                              • Instruction Fuzzy Hash: 6611C4326497256AD7712A28CC14B5AB7A8DF13778F672526F820EF1D1DF70DC8086E0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetLastError.KERNEL32(6A15890F,ED279CBA,?,?,00000000), ref: 6A161528
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: ErrorLast
                              • String ID:
                              • API String ID: 1452528299-0
                              • Opcode ID: 3c32191c75af88f9d1fe08f30b4bbe96fd63228db39d6f7f2eaf7ca1fa63d4dd
                              • Instruction ID: 5b6515359f9918a77759a5957f214ca5049366259302a9f09e5b77855f6754f5
                              • Opcode Fuzzy Hash: 3c32191c75af88f9d1fe08f30b4bbe96fd63228db39d6f7f2eaf7ca1fa63d4dd
                              • Instruction Fuzzy Hash: B1B10476E002088BCF10DFA8D984AEEB7B4FF54314F195169D902E7341EF71AA25CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6A162470: FindClose.KERNEL32(?,ED279CBA,6A180658,00000000), ref: 6A1624C4
                                • Part of subcall function 6A162470: FindFirstFileW.KERNEL32(6A1850B8,?,ED279CBA,6A180658,00000000), ref: 6A1624DE
                                • Part of subcall function 6A162470: FindFirstFileW.KERNEL32(?,?), ref: 6A16253A
                              • FindClose.KERNEL32(FFFFFFFF,?,ED279CBA,?,00000000,6A1850B8,?,6A180438,000000FF,?,6A16265E), ref: 6A1625EA
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID:
                              • API String ID: 2295610775-0
                              • Opcode ID: 55de221b9e115a7bc516763f8cc9a0d9396011898998628e0dacb5f826b4a603
                              • Instruction ID: abe75a7fd8da43622bba5a8c5952012bc7e4f7f9d90476fbff46767bf2d378ea
                              • Opcode Fuzzy Hash: 55de221b9e115a7bc516763f8cc9a0d9396011898998628e0dacb5f826b4a603
                              • Instruction Fuzzy Hash: D1F01DB6944648AFC710CF98C844FAAF7B8FB16624F50475AF831D37C0DB3569058A64
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FindCloseChangeNotification.KERNEL32(?), ref: 6A15196C
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: ChangeCloseFindNotification
                              • String ID:
                              • API String ID: 2591292051-0
                              • Opcode ID: bb8fa47d577f3c5aa614f202210f46666a550609756abe0a7f685358c434c654
                              • Instruction ID: d5efbab00efc2a38aead9588cd3aea003f77d24fa086fd320b82170b001441ae
                              • Opcode Fuzzy Hash: bb8fa47d577f3c5aa614f202210f46666a550609756abe0a7f685358c434c654
                              • Instruction Fuzzy Hash: 83E0DFF020071057C3116E699804B4ABBCC9F133B0B11CB28E8B9D72C0DF74E411CBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapCreate.KERNEL32(00000000,00001000,00000000,?,6A176375,00000001,?,?,?,6A1764EE,?,?,?,6A187F18,0000000C,6A1765A9), ref: 6A1793F6
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: CreateHeap
                              • String ID:
                              • API String ID: 10892065-0
                              • Opcode ID: 188ec095adf61b98999a2a735bc016124edc54f0bed82065c677ca406cad6ac2
                              • Instruction ID: b791ca0abb5afd7791afa71835f2e964ded0e5d0b9a323cc51f0e4593178bc8e
                              • Opcode Fuzzy Hash: 188ec095adf61b98999a2a735bc016124edc54f0bed82065c677ca406cad6ac2
                              • Instruction Fuzzy Hash: CED0A7325543485EDF006EB49C08B223BDCEB87795F048435F91DC7180F770C951D640
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: ExitThread
                              • String ID:
                              • API String ID: 2158977761-0
                              • Opcode ID: 0fe3482dfa25c527acbd858d9d887206c278c7a8d427f86923067702572674c7
                              • Instruction ID: 587474e3f6e270900c506b7264c4806e64e6eaefbf2122b89b9aa41b5ebd9e7a
                              • Opcode Fuzzy Hash: 0fe3482dfa25c527acbd858d9d887206c278c7a8d427f86923067702572674c7
                              • Instruction Fuzzy Hash: D6E08C3694052AABEB12E7A0CC46A9E37A0EF08380F040010F8005E062DB70FED24692
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: ExitThread
                              • String ID:
                              • API String ID: 2158977761-0
                              • Opcode ID: e83cf6b22c983a4ed28e69ad6d1585a06803cfa532badbaccde98c5e56e59925
                              • Instruction ID: 55bdce0fba70f3b5ff24939f3ea0e7f6c7887ef7bde984f872fb15fca6cc6046
                              • Opcode Fuzzy Hash: e83cf6b22c983a4ed28e69ad6d1585a06803cfa532badbaccde98c5e56e59925
                              • Instruction Fuzzy Hash: 4FD05E31540626ABE213E770DC86A5E2394DF05790B110115F8408D062DF70FEC24192
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6A175F2A: RtlAllocateHeap.NTDLL(00000000,6A15FA6F,?,00000000,?,?,6A154D3F,0000000C,ED279CBA,?,?,00000000,?,?,6A17EF9B,000000FF), ref: 6A175FA1
                              • GetLastError.KERNEL32(?,00000000,00000000), ref: 6A15CBD3
                                • Part of subcall function 6A17663B: RaiseException.KERNEL32(?,6A170629,ED279CBA,?,?,6A170629,?,6A188388,ED279CBA), ref: 6A17667D
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: AllocateErrorExceptionHeapLastRaise
                              • String ID:
                              • API String ID: 3847173015-0
                              • Opcode ID: 3927b700f9eba371a75bbc38601a52dfa60815cca2811090d6ad042c0738034b
                              • Instruction ID: 29f6065a2f4d0d6f527daa687beab85a8f4af9629bf3c5609ce90060497a17b5
                              • Opcode Fuzzy Hash: 3927b700f9eba371a75bbc38601a52dfa60815cca2811090d6ad042c0738034b
                              • Instruction Fuzzy Hash: 49A162B1D00248EFCB04DFA8D984ADEB7B4FF48318F118569E915A7341DB35EA15CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetSystemInfo.KERNEL32(?), ref: 10001B4B
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: InfoSystem
                              • String ID:
                              • API String ID: 31276548-0
                              • Opcode ID: 62b61814a3264c2a0f4f706347acbeacecd619b648c4921b8ba18a43bc66cf00
                              • Instruction ID: d3e97598432a4a316c69c7b199a975740681d618dafaa63f0622d860b7c48d59
                              • Opcode Fuzzy Hash: 62b61814a3264c2a0f4f706347acbeacecd619b648c4921b8ba18a43bc66cf00
                              • Instruction Fuzzy Hash: A9C09B7490431D97DB00E7E5D9C9D8EB7FCB608204F500451E555F3141E670F94587A1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 1001A0CE: DeleteCriticalSection.KERNEL32(00000000,?,?,1001C005,10019FBC,1001A015,?,?,?), ref: 1001A102
                                • Part of subcall function 1001A0CE: DeleteCriticalSection.KERNEL32(?,?,1001C005,10019FBC,1001A015,?,?,?), ref: 1001A11D
                                • Part of subcall function 1001A0CE: DeleteCriticalSection.KERNEL32 ref: 1001A125
                                • Part of subcall function 1001A0CE: DeleteCriticalSection.KERNEL32 ref: 1001A12D
                                • Part of subcall function 1001A0CE: DeleteCriticalSection.KERNEL32 ref: 1001A135
                              • TlsFree.KERNEL32(FFFFFFFF,10019FBC,1001A015,?,?,?), ref: 1001C010
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: CriticalDeleteSection$Free
                              • String ID:
                              • API String ID: 1584690612-0
                              • Opcode ID: 3aaa27bac5001039f89fed55244ff3c97aaca533f641e9855337a23d41bd91ec
                              • Instruction ID: 546efeec3206eed097d6fb3f9723a3f69e2227c44c0d9f166d3baed5ab6dace6
                              • Opcode Fuzzy Hash: 3aaa27bac5001039f89fed55244ff3c97aaca533f641e9855337a23d41bd91ec
                              • Instruction Fuzzy Hash: 97C04C74501715CAF511D7388CCA9083695F7493707F41744F1BAC60F5D774D8C38A00
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetLastError.KERNEL32(6A184C28,80000000,00000001,00000003), ref: 6A15C3BC
                                • Part of subcall function 6A175F2A: RtlAllocateHeap.NTDLL(00000000,6A15FA6F,?,00000000,?,?,6A154D3F,0000000C,ED279CBA,?,?,00000000,?,?,6A17EF9B,000000FF), ref: 6A175FA1
                                • Part of subcall function 6A17663B: RaiseException.KERNEL32(?,6A170629,ED279CBA,?,?,6A170629,?,6A188388,ED279CBA), ref: 6A17667D
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: AllocateErrorExceptionHeapLastRaise
                              • String ID:
                              • API String ID: 3847173015-0
                              • Opcode ID: 8947e375aae81190cd0149e7a563a0fd22c83adb721c6471cb2f6eefacff173e
                              • Instruction ID: 88caed18823fd782164c657614d2a12201311644e4cd0609eb185dea01cfeb4f
                              • Opcode Fuzzy Hash: 8947e375aae81190cd0149e7a563a0fd22c83adb721c6471cb2f6eefacff173e
                              • Instruction Fuzzy Hash: 8F41A4B1600209AFCB10CF98C884B9BBBF9EF59310F118159E96597381DF74E916CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 10019CB8: CreateThread.KERNEL32(00000000,00000000,Function_00019D23,00000000,?,?), ref: 10019CF9
                                • Part of subcall function 10019CB8: GetLastError.KERNEL32(?,10017589,00000000,00000000,10002FF6,00000000,00000000,00000000,?,10002FF2,?,?,?,?,10003E76,?), ref: 10019D03
                              • GetLastError.KERNEL32 ref: 10017598
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: ErrorLast$CreateThread
                              • String ID:
                              • API String ID: 665435222-0
                              • Opcode ID: 6a6f0967b860a04a4a08b52caf4fd14ddb262ad7e1e0691d2c85b8c655ef118e
                              • Instruction ID: 5da84cd6a30c0b06f2c1d8553272c344b363e72c39abfbd7409f2c23709d4e44
                              • Opcode Fuzzy Hash: 6a6f0967b860a04a4a08b52caf4fd14ddb262ad7e1e0691d2c85b8c655ef118e
                              • Instruction Fuzzy Hash: 2EE0ECB2254252AEF304DB648C46FA776E9EB94B81F50442DBA49CA180E6B0D944C7B5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,10001E62,?,?,1000B459,?), ref: 10012A31
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 0101ec0f5aa2d88080453061d33e9d0ea43cdee5597a4dbf4051f6854f2c80fe
                              • Instruction ID: 499c3da3a26d341c9e988975342de67c6826636d0b386d7712dafe969d9ecfde
                              • Opcode Fuzzy Hash: 0101ec0f5aa2d88080453061d33e9d0ea43cdee5597a4dbf4051f6854f2c80fe
                              • Instruction Fuzzy Hash: 18B012F07B238176FE6E87204C5BF662451A740BC7F601098F301DC0C4E7E094409015
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • VirtualFree.KERNELBASE(00000000,00000000,00008000,10001E7E,?,10001E58,?,?,1000B459,?), ref: 10012A4C
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: FreeVirtual
                              • String ID:
                              • API String ID: 1263568516-0
                              • Opcode ID: 66144b5ccae04c28c88a4e760bc3cd1d0957039cec557337da64c84822766760
                              • Instruction ID: 32e2f69f7c2909d2d391187de9ef312e1eea697864ad2fb4147c7fa98b3e1f25
                              • Opcode Fuzzy Hash: 66144b5ccae04c28c88a4e760bc3cd1d0957039cec557337da64c84822766760
                              • Instruction Fuzzy Hash: 96B012B034230023FD78C3110D45B1611506B00741E60405C73016C4C08570E4018504
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000D.00000002.168271035554.000000000045D000.00000020.00000001.01000000.0000000E.sdmp, Offset: 0045D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_45d000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3617e82bd60fd03c4f87f95ed51040e3e5dadaeb0a3bebd0a62139b9ab93b5fc
                              • Instruction ID: 9da881a1668667c5f5e61f0e74ea972f87722d8f5ad42a96f98ef7bce5f6fe0a
                              • Opcode Fuzzy Hash: 3617e82bd60fd03c4f87f95ed51040e3e5dadaeb0a3bebd0a62139b9ab93b5fc
                              • Instruction Fuzzy Hash: B301C4B17442046BCB12EB98DC42FAB3798EB09315F108116FE04D7292DA7DD8858BBD
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000D.00000002.168271035554.000000000045D000.00000020.00000001.01000000.0000000E.sdmp, Offset: 0045D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_45d000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b760d498d9366e2b8c008b5068de0d1edf9298eee5e882ad9278cafc15f1fbe1
                              • Instruction ID: 9eb0517791e028c6019ed048d3cd8418304ffda763c1f22c3199e77c15fb86ab
                              • Opcode Fuzzy Hash: b760d498d9366e2b8c008b5068de0d1edf9298eee5e882ad9278cafc15f1fbe1
                              • Instruction Fuzzy Hash: 9BC0026160663466562535A92CC5CEF01488D462AEB24136BBD209A293DAAD4DC542EE
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • IsDebuggerPresent.KERNEL32(?,?,00000314), ref: 6A175B66
                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,00000314), ref: 6A175B70
                              • UnhandledExceptionFilter.KERNEL32(?,?,?,00000314), ref: 6A175B7D
                              • GetCurrentProcess.KERNEL32(C0000417,?,?,00000314), ref: 6A175B98
                              • TerminateProcess.KERNEL32(00000000,?,?,00000314), ref: 6A175B9F
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                              • String ID:
                              • API String ID: 2579439406-0
                              • Opcode ID: dfa628f3c7e7d4bf2aad064f1e38cac3c8b16a761a2bfe5bdd28b4975a301c9e
                              • Instruction ID: 1d427a563bc23de03b53018a63a25007cf7e36b49078a32a953fb06b17cb8599
                              • Opcode Fuzzy Hash: dfa628f3c7e7d4bf2aad064f1e38cac3c8b16a761a2bfe5bdd28b4975a301c9e
                              • Instruction Fuzzy Hash: 9C31D1B4D013289BCB60DF64D989788BBB8AF19318F1050EAE50DA7250EB749FC58F08
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • IsDebuggerPresent.KERNEL32 ref: 6A176B91
                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6A176BA6
                              • UnhandledExceptionFilter.KERNEL32(6A183328), ref: 6A176BB1
                              • GetCurrentProcess.KERNEL32(C0000409), ref: 6A176BCD
                              • TerminateProcess.KERNEL32(00000000), ref: 6A176BD4
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                              • String ID:
                              • API String ID: 2579439406-0
                              • Opcode ID: 2339a3b90d43c255fb4ff1c1d175c38922c55c2c6bf2d4b69e86d7e223559f5b
                              • Instruction ID: 5bee4eab65b7939d1381427a706527be44094c9cc08bc6779c680c879b44439f
                              • Opcode Fuzzy Hash: 2339a3b90d43c255fb4ff1c1d175c38922c55c2c6bf2d4b69e86d7e223559f5b
                              • Instruction Fuzzy Hash: 4721A9B89002049FCB40EF68C588A447BF4FF2B715F61501AE929C6280EBB49D868F05
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • OpenFileMappingW.KERNEL32(00000004,00000000,?,00000002), ref: 6A152BB4
                              • GetLastError.KERNEL32 ref: 6A152BC3
                              • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 6A152BDF
                              • UnmapViewOfFile.KERNEL32(00000000), ref: 6A152C88
                              • CloseHandle.KERNEL32(?), ref: 6A152C96
                              • OpenEventW.KERNEL32(00000002,00000000,?), ref: 6A152CA8
                              • GetLastError.KERNEL32 ref: 6A152CBD
                              • SetEvent.KERNEL32(00000000), ref: 6A152CC4
                              • GetLastError.KERNEL32 ref: 6A152CCE
                              • CloseHandle.KERNEL32(00000000), ref: 6A152CD5
                              • GetLastError.KERNEL32 ref: 6A152CDF
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: ErrorLast$File$CloseEventHandleOpenView$MappingUnmap
                              • String ID: Can not open mapping$Incorrect command line$Incorrect mapping data$MapViewOfFile error$data error
                              • API String ID: 1601163770-464465891
                              • Opcode ID: ae80703c7e8258ae3935e86a8717b3f82598cc29608a31bff9d5fc1da76d46ba
                              • Instruction ID: a51c78b26f145af20f3a03da4da401b6897c26dea9f0e7aaac6edea34c71b5d8
                              • Opcode Fuzzy Hash: ae80703c7e8258ae3935e86a8717b3f82598cc29608a31bff9d5fc1da76d46ba
                              • Instruction Fuzzy Hash: B16149F6E002099BDB11DFA8C848B9EB7B4EF06358F154164E925BB241EF70ED11CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,6A176386,?,?,?,6A1764EE,?,?,?,6A187F18,0000000C,6A1765A9,?), ref: 6A17747C
                              • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 6A1774A3
                              • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 6A1774B0
                              • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 6A1774BD
                              • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 6A1774CA
                              • TlsAlloc.KERNEL32(?,?,6A176386,?,?,?,6A1764EE,?,?,?,6A187F18,0000000C,6A1765A9,?), ref: 6A17751A
                              • TlsSetValue.KERNEL32(00000000,?,?,6A176386,?,?,?,6A1764EE,?,?,?,6A187F18,0000000C,6A1765A9,?), ref: 6A177535
                              • GetCurrentThreadId.KERNEL32 ref: 6A1775E4
                                • Part of subcall function 6A177790: Sleep.KERNEL32(000003E8,?,?,6A1770BE,KERNEL32.DLL,?,6A1794A4,?,6A175FE3,6A15FA7E,?,?,6A154D3F,0000000C,ED279CBA,?), ref: 6A17779C
                                • Part of subcall function 6A177790: GetModuleHandleW.KERNEL32(6A15FA7E,?,6A1770BE,KERNEL32.DLL,?,6A1794A4,?,6A175FE3,6A15FA7E,?,?,6A154D3F,0000000C,ED279CBA,?,?), ref: 6A1777A5
                                • Part of subcall function 6A17711E: TlsFree.KERNEL32(00000015,6A17641B,?,?,?,6A1764EE,?,?,?,6A187F18,0000000C,6A1765A9,?), ref: 6A177149
                                • Part of subcall function 6A17711E: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,6A17641B,?,?,?,6A1764EE,?,?,?,6A187F18,0000000C,6A1765A9,?), ref: 6A1780C0
                                • Part of subcall function 6A17711E: DeleteCriticalSection.KERNEL32(00000015,?,?,6A17641B,?,?,?,6A1764EE,?,?,?,6A187F18,0000000C,6A1765A9,?), ref: 6A1780EA
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: AddressProc$CriticalDeleteHandleModuleSection$AllocCurrentFreeSleepThreadValue
                              • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                              • API String ID: 3695068788-3819984048
                              • Opcode ID: 1cd9d91edb90afccb61b5cd1da44ea7f3aadd8d33f4522a182ff4b31343a13c0
                              • Instruction ID: 092fb0ec608febd9e63f3a10d727e74405afc93c19adebfa7b9b2f31158e1173
                              • Opcode Fuzzy Hash: 1cd9d91edb90afccb61b5cd1da44ea7f3aadd8d33f4522a182ff4b31343a13c0
                              • Instruction Fuzzy Hash: 50317075901311AAFF209F75880CA157BE4EF1B768F25252BE8B2D2291EF36C842CF54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LCMapStringW.KERNEL32(00000000,00000100,6A184BBC,00000001,00000000,00000000,00000100,?,00000000,?,?,?,?,00000001,?,00000000), ref: 6A17D782
                              • GetLastError.KERNEL32 ref: 6A17D794
                              • MultiByteToWideChar.KERNEL32(00000100,00000000,?,?,00000000,00000000,00000100,?,00000000,?,?,?,?,00000001,?,00000000), ref: 6A17D820
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 6A17D88C
                              • LCMapStringW.KERNEL32(?,?,?,00000000,00000000,00000000), ref: 6A17D8A8
                              • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,?,?), ref: 6A17D8E2
                              • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,00000000,?), ref: 6A17D946
                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,?,?,00000000,00000000), ref: 6A17D969
                              • LCMapStringA.KERNEL32(?,?,00000000,?,00000000,00000000,?,?,?,00000100,?,00000000,?,?,?,?), ref: 6A17D9F9
                              • LCMapStringA.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,?,00000100,?,00000000,?), ref: 6A17DA6B
                              • LCMapStringA.KERNEL32(?,?,?,?,00000000,?,00000100,?,00000000,?,?,?,?,00000001,?,00000000), ref: 6A17DAB8
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: String$ByteCharMultiWide$ErrorLast
                              • String ID:
                              • API String ID: 1775797328-0
                              • Opcode ID: 250f23895906b4ae2888cc80b67e36a19e850d53f65bda8abb6322c3eda43c0f
                              • Instruction ID: 277763b31f95370eec2918e371aca623cb3094f6a0269c43965ece1be7442eb0
                              • Opcode Fuzzy Hash: 250f23895906b4ae2888cc80b67e36a19e850d53f65bda8abb6322c3eda43c0f
                              • Instruction Fuzzy Hash: 94B1AC7280411DFFDF218FA4CC8489E7BF6FB59368B166129F914A6150EB31C961DFA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryA.KERNEL32(USER32.DLL,6A18F410,00000000,00000314,?,6A176F7F,6A18F410,Microsoft Visual C++ Runtime Library), ref: 6A17B8C6
                              • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 6A17B8E2
                                • Part of subcall function 6A176FF4: TlsGetValue.KERNEL32(00000000,?,6A17706D,00000000,6A17B8AE,6A18F410,00000000,00000314,?,6A176F7F,6A18F410,Microsoft Visual C++ Runtime Library,00012010), ref: 6A177006
                                • Part of subcall function 6A176FF4: TlsGetValue.KERNEL32(00000005,?,6A17706D,00000000,6A17B8AE,6A18F410,00000000,00000314,?,6A176F7F,6A18F410,Microsoft Visual C++ Runtime Library,00012010), ref: 6A17701D
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 6A17B8FF
                                • Part of subcall function 6A176FF4: GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,6A17706D,00000000,6A17B8AE,6A18F410,00000000,00000314,?,6A176F7F,6A18F410,Microsoft Visual C++ Runtime Library,00012010), ref: 6A177033
                                • Part of subcall function 6A176FF4: GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 6A17704E
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 6A17B914
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 6A17B929
                              • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 6A17B941
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: AddressProc$Value$HandleLibraryLoadModule
                              • String ID: GetProcessWindowStation$MessageBoxA$USER32.DLL
                              • API String ID: 2739679353-2247880650
                              • Opcode ID: b5d73a80e2564064e0e967ebd02056400e562a4d8b662e7ea426556e16265907
                              • Instruction ID: 96153b8df3a2e0af44a5b24ac5ce688a5cfd23cc013eaecc09d73090693804ad
                              • Opcode Fuzzy Hash: b5d73a80e2564064e0e967ebd02056400e562a4d8b662e7ea426556e16265907
                              • Instruction Fuzzy Hash: C241CBB280430AABDF30ABB48C59B6E3BE99F56764F162429F835D2142EF34D940CB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryA.KERNEL32(user32.dll,?,00000000,?,1001CEDA,?,Microsoft Visual C++ Runtime Library,00012010,?,10021594,?,100215E4,?,?,?,Runtime Error!Program: ), ref: 1001D856
                              • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 1001D86E
                              • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 1001D87F
                              • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 1001D88C
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: AddressProc$LibraryLoad
                              • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                              • API String ID: 2238633743-4044615076
                              • Opcode ID: fdf4bd263d9911628fa84a0538cd68ee630e044ef978d7ae2b799142876d2cfd
                              • Instruction ID: 0f002242f215f962b8815e3b350398d74b100aa23eb915cf8c40db05b23b1dbb
                              • Opcode Fuzzy Hash: fdf4bd263d9911628fa84a0538cd68ee630e044ef978d7ae2b799142876d2cfd
                              • Instruction Fuzzy Hash: A9014431604221AFE750FFF59CC4AAA7BE9EB59194721043BF604C6121DF35C8829B70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LCMapStringW.KERNEL32(00000000,00000100,10021660,00000001,00000000,00000000,75F2E860,1002CE50,?,00000003,00000000,00000001,00000000,?,?,1001DA1F), ref: 1001DD7F
                              • LCMapStringA.KERNEL32(00000000,00000100,1002165C,00000001,00000000,00000000,?,?,1001DA1F,?), ref: 1001DD9B
                              • LCMapStringA.KERNEL32(?,?,00000000,00000001,00000000,00000003,75F2E860,1002CE50,?,00000003,00000000,00000001,00000000,?,?,1001DA1F), ref: 1001DDE4
                              • MultiByteToWideChar.KERNEL32(?,1002CE51,00000000,00000001,00000000,00000000,75F2E860,1002CE50,?,00000003,00000000,00000001,00000000,?,?,1001DA1F), ref: 1001DE1C
                              • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,?,00000000), ref: 1001DE74
                              • LCMapStringW.KERNEL32(?,?,?,00000000,00000000,00000000), ref: 1001DE8A
                              • LCMapStringW.KERNEL32(?,?,?,00000000,?,?), ref: 1001DEBD
                              • LCMapStringW.KERNEL32(?,?,?,?,?,00000000), ref: 1001DF25
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: String$ByteCharMultiWide
                              • String ID:
                              • API String ID: 352835431-0
                              • Opcode ID: 7282f78b9d4349d0a3e93c4e54105c3ff287b2395515df487960fdaa6e95e452
                              • Instruction ID: 295e34877b95ddc79519c14bcd414cd7068b9c5c0158a783dd3936514e77c558
                              • Opcode Fuzzy Hash: 7282f78b9d4349d0a3e93c4e54105c3ff287b2395515df487960fdaa6e95e452
                              • Instruction Fuzzy Hash: FB517B31400259ABDF22EF94CD85ADE3FF9FB59751F20411AF910A9160C732DDA1EB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetEnvironmentStringsW.KERNEL32(?,?,?), ref: 6A17A788
                              • GetLastError.KERNEL32(?,?,?), ref: 6A17A79C
                              • GetEnvironmentStringsW.KERNEL32(?,?,?), ref: 6A17A7C3
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,?,?), ref: 6A17A7FD
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,?,00000000,00000000,?,?,?), ref: 6A17A820
                              • FreeEnvironmentStringsW.KERNEL32(00000000,?,?,?), ref: 6A17A836
                              • GetEnvironmentStrings.KERNEL32(?,?,?), ref: 6A17A849
                              • FreeEnvironmentStringsA.KERNEL32(00000000,?,?,?), ref: 6A17A87B
                              • FreeEnvironmentStringsA.KERNEL32(00000000,?,?,?), ref: 6A17A894
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: EnvironmentStrings$Free$ByteCharMultiWide$ErrorLast
                              • String ID:
                              • API String ID: 4109468225-0
                              • Opcode ID: 925518f2d4d8334a3fe6de5f25c1e086d191574e44afa999859453f7d8018864
                              • Instruction ID: df2ec859095204e72f946297374fef4f3d1babf5ac81cf80f197954e8d137562
                              • Opcode Fuzzy Hash: 925518f2d4d8334a3fe6de5f25c1e086d191574e44afa999859453f7d8018864
                              • Instruction Fuzzy Hash: 523192B2D04125BEDB216FB88C88C1E7BBDEB5B7557262469F652D3100EE31CD8297A0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcAddress.KERNEL32(6A166AD8,GetHandlerProperty2), ref: 6A166584
                              • GetProcAddress.KERNEL32(?,GetHandlerProperty), ref: 6A166595
                              • GetProcAddress.KERNEL32(?,GetNumberOfFormats), ref: 6A1665B1
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: AddressProc
                              • String ID: GetHandlerProperty$GetHandlerProperty2$GetNumberOfFormats
                              • API String ID: 190572456-3564775856
                              • Opcode ID: 37f369c1008be7048e4a68f86ff8f062f52e27d2a3e0643386e9c3c352547df3
                              • Instruction ID: 4656566cef702b7e7be3a8b426828f5bb9b459ad2ded2f3f155c7e08f7becce3
                              • Opcode Fuzzy Hash: 37f369c1008be7048e4a68f86ff8f062f52e27d2a3e0643386e9c3c352547df3
                              • Instruction Fuzzy Hash: 3AD16BB1D002189FDB28DFA8CC84B9EBBB9BF58310F1581ADD529E7241DB309A55CF61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,6A18F429,00000104,?,6A15FA7E,?), ref: 6A176EB3
                              • GetStdHandle.KERNEL32(000000F4,00000001,?,00000000,00000003,00000003,?,6A176FE7,000000FC,6A178132,6A188028,0000000C,6A1781EF,6A15FA7E,?), ref: 6A176F86
                              • WriteFile.KERNEL32(00000000,00000000,00000000,6A15FA7E,00000000,?,6A176FE7,000000FC,6A178132,6A188028,0000000C,6A1781EF,6A15FA7E,?,?,6A17C6AB), ref: 6A176FB0
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: File$HandleModuleNameWrite
                              • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                              • API String ID: 3784150691-4022980321
                              • Opcode ID: 2eb7bb78136330a9e74338c767626940f327f1204b23e16e7def911d4b1adbea
                              • Instruction ID: 8bd1dd633d2a7f391edc07b5ddc21e1c23033216c1f0a4d2d7670cad676fc252
                              • Opcode Fuzzy Hash: 2eb7bb78136330a9e74338c767626940f327f1204b23e16e7def911d4b1adbea
                              • Instruction Fuzzy Hash: 144147F2A042287AE73156748C98F6F769C8F13668F462625FD25E6183EF22CE0145F2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?), ref: 1001CE23
                              • GetStdHandle.KERNEL32(000000F4,10021594,00000000,?,00000000,?), ref: 1001CEF9
                              • WriteFile.KERNEL32(00000000), ref: 1001CF00
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: File$HandleModuleNameWrite
                              • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                              • API String ID: 3784150691-4022980321
                              • Opcode ID: 1d1f0148e6be3939dc2033fdbd363d62c3fffa52be97f4f1b611f55ef9c5ba02
                              • Instruction ID: d8c9acc08caec27d87d178c777f48a963db8df66c36a8e0edad6fccd900c7ff8
                              • Opcode Fuzzy Hash: 1d1f0148e6be3939dc2033fdbd363d62c3fffa52be97f4f1b611f55ef9c5ba02
                              • Instruction Fuzzy Hash: 4131C476A0022CAFEB11EAA0CD85FDE77BDFB45344F6001A6F945DA041E770EAC5CA61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,6A187F58,0000000C,6A177296,00000000,00000000,?,6A154D3F,0000000C,ED279CBA,?,?,00000000,?,?,6A17EF9B), ref: 6A17716D
                              • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 6A1771A1
                              • GetProcAddress.KERNEL32(?,DecodePointer), ref: 6A1771B1
                              • InterlockedIncrement.KERNEL32(02C08302), ref: 6A1771E0
                                • Part of subcall function 6A177790: Sleep.KERNEL32(000003E8,?,?,6A1770BE,KERNEL32.DLL,?,6A1794A4,?,6A175FE3,6A15FA7E,?,?,6A154D3F,0000000C,ED279CBA,?), ref: 6A17779C
                                • Part of subcall function 6A177790: GetModuleHandleW.KERNEL32(6A15FA7E,?,6A1770BE,KERNEL32.DLL,?,6A1794A4,?,6A175FE3,6A15FA7E,?,?,6A154D3F,0000000C,ED279CBA,?,?), ref: 6A1777A5
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc$IncrementInterlockedSleep
                              • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                              • API String ID: 3998264955-2843748187
                              • Opcode ID: 8319d0bf1cea3e038b2aa3561834e8d15e17fb7e52468d2efcf77e91b08bafd9
                              • Instruction ID: 64411d50d24d911b510a61155e73566df5f248b0ce5b60ad6d3b8613b3f5846f
                              • Opcode Fuzzy Hash: 8319d0bf1cea3e038b2aa3561834e8d15e17fb7e52468d2efcf77e91b08bafd9
                              • Instruction Fuzzy Hash: E9119AB1800701AFE7209F79C808B5AFBF0EF05328F15555AE4A9A6290CF34EA41CF64
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,10019F70), ref: 1001CC66
                              • GetEnvironmentStrings.KERNEL32(?,?,?,?,10019F70), ref: 1001CC7A
                              • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,10019F70), ref: 1001CCA6
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,?,?,?,?,?,10019F70), ref: 1001CCDE
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,?,10019F70), ref: 1001CD00
                              • FreeEnvironmentStringsW.KERNEL32(00000000,?,?,?,?,10019F70), ref: 1001CD19
                              • GetEnvironmentStrings.KERNEL32(?,?,?,?,?,?,10019F70), ref: 1001CD2C
                              • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 1001CD6A
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                              • String ID:
                              • API String ID: 1823725401-0
                              • Opcode ID: 27e7f926a98a65f15a8b3ff8da03a04564288c716e1c3f2051146ef706dc850c
                              • Instruction ID: 10dabb665d0db05ed410ab17b42963db07fe2840a9ab64d8aea903b972c4df90
                              • Opcode Fuzzy Hash: 27e7f926a98a65f15a8b3ff8da03a04564288c716e1c3f2051146ef706dc850c
                              • Instruction Fuzzy Hash: 7331A6B25043AE5FE311EBB8ACC5D2A7ADDEB4A1D4B220639F545CB111EA31DCC187A1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InterlockedDecrement.KERNEL32(00000000), ref: 6A17BD6D
                              • InterlockedDecrement.KERNEL32(?), ref: 6A17BD7A
                              • InterlockedDecrement.KERNEL32(?), ref: 6A17BD87
                              • InterlockedDecrement.KERNEL32(?), ref: 6A17BD94
                              • InterlockedDecrement.KERNEL32(?), ref: 6A17BDA1
                              • InterlockedDecrement.KERNEL32(?), ref: 6A17BDBD
                              • InterlockedDecrement.KERNEL32(?), ref: 6A17BDCD
                              • InterlockedDecrement.KERNEL32(?), ref: 6A17BDE3
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: DecrementInterlocked
                              • String ID:
                              • API String ID: 3448037634-0
                              • Opcode ID: 42ed13d07a29a3345450437b6936554988cf7137e3156da8a3ae3ad254415954
                              • Instruction ID: 868a6508ca7c8d1c57ac186f30c7dc65bbd83aeb6e501062ee645485220c7d8c
                              • Opcode Fuzzy Hash: 42ed13d07a29a3345450437b6936554988cf7137e3156da8a3ae3ad254415954
                              • Instruction Fuzzy Hash: AE116D71B04715ABEB10DF79CC84B9ABBEDAF54658F055416A829DB202CF34E900CBF0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InterlockedIncrement.KERNEL32(6A15FA7E), ref: 6A17BCD6
                              • InterlockedIncrement.KERNEL32(00000D89), ref: 6A17BCE3
                              • InterlockedIncrement.KERNEL32(E58B5B5E), ref: 6A17BCF0
                              • InterlockedIncrement.KERNEL32(5F590000), ref: 6A17BCFD
                              • InterlockedIncrement.KERNEL32(8B55CCCC), ref: 6A17BD0A
                              • InterlockedIncrement.KERNEL32(8B55CCCC), ref: 6A17BD26
                              • InterlockedIncrement.KERNEL32(F07589E0), ref: 6A17BD36
                              • InterlockedIncrement.KERNEL32(A157559F), ref: 6A17BD4C
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: IncrementInterlocked
                              • String ID:
                              • API String ID: 3508698243-0
                              • Opcode ID: 7640cfafed4d79f3a2b9013d8184d1a064b628517bc2faea91cd370a4bda984b
                              • Instruction ID: 70cafb1698680ab108c43bbcb5d006c8e0799cc50a2199e9543223e7989672e5
                              • Opcode Fuzzy Hash: 7640cfafed4d79f3a2b9013d8184d1a064b628517bc2faea91cd370a4bda984b
                              • Instruction Fuzzy Hash: F8112D71B04319ABEB10DF79CC88B9ABBECEF55694F059416A919DB142DF34E800CBB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetCPInfo.KERNEL32(?,00000001,?,00000000,00000000,?,?,?,?,6A17D6F0,00000000,?,00000001,?,?,?), ref: 6A17DF6F
                              • GetCPInfo.KERNEL32(?,00000001,?,6A17D6F0,00000000,?), ref: 6A17DF88
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,6A17D6F0,00000000,00000000,?,6A17D6F0,00000000,?,00000001,?,?,?,?,00000001), ref: 6A17DFE6
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,6A17D6F0,?,00000000,?,?,?,?,?,?,?,6A17D6F0,00000000,?), ref: 6A17E035
                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,6A17D6F0), ref: 6A17E050
                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,6A17D6F0), ref: 6A17E076
                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,6A17D6F0), ref: 6A17E09B
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$Info
                              • String ID:
                              • API String ID: 1775632426-0
                              • Opcode ID: d397277ef69f5008e609e4d14a28d5eb4f3bcc6e7a0f278739ba2ae88f409775
                              • Instruction ID: c49ee59752adf4f98816bbffcd94cd3b941c806b490303925b6db50a2de6e738
                              • Opcode Fuzzy Hash: d397277ef69f5008e609e4d14a28d5eb4f3bcc6e7a0f278739ba2ae88f409775
                              • Instruction Fuzzy Hash: E0514D31E00219AFCF218F95DC44DEEBBF9FB8A760F215119E524A6190DB31D951CFA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadResource.KERNEL32(6A150000,00000000,6A150000,?,?,6A172B94,?), ref: 6A172993
                              • SizeofResource.KERNEL32(6A150000,00000000), ref: 6A1729A1
                              • LockResource.KERNEL32(00000000), ref: 6A1729AE
                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000), ref: 6A1729CF
                              • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 6A1729E5
                              • CloseHandle.KERNEL32(00000000), ref: 6A1729FA
                              • DeleteFileW.KERNEL32(00000000), ref: 6A172A0A
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: FileResource$CloseCreateDeleteHandleLoadLockSizeofWrite
                              • String ID:
                              • API String ID: 406028064-0
                              • Opcode ID: e2086bce009cc1900930d69634a1a7ca7463ab30542403d3b758572a65e1e8fc
                              • Instruction ID: 48b0e398bf2d470d41cd44979e0ff2094a15f527a9641737bcc4c278d3982e5e
                              • Opcode Fuzzy Hash: e2086bce009cc1900930d69634a1a7ca7463ab30542403d3b758572a65e1e8fc
                              • Instruction Fuzzy Hash: 4211E9357403146BD7209B698C48F9BFBBCDB97661F1841A5FE51E7280DA71DC0786B0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • TlsGetValue.KERNEL32(00000000,?,6A17706D,00000000,6A17B8AE,6A18F410,00000000,00000314,?,6A176F7F,6A18F410,Microsoft Visual C++ Runtime Library,00012010), ref: 6A177006
                              • TlsGetValue.KERNEL32(00000005,?,6A17706D,00000000,6A17B8AE,6A18F410,00000000,00000314,?,6A176F7F,6A18F410,Microsoft Visual C++ Runtime Library,00012010), ref: 6A17701D
                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,6A17706D,00000000,6A17B8AE,6A18F410,00000000,00000314,?,6A176F7F,6A18F410,Microsoft Visual C++ Runtime Library,00012010), ref: 6A177033
                              • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 6A17704E
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: Value$AddressHandleModuleProc
                              • String ID: EncodePointer$KERNEL32.DLL
                              • API String ID: 1929421221-3682587211
                              • Opcode ID: c316dd216c5d28035ab43e420ad9ea4dddc359ab316b3fba7838feda2cce148b
                              • Instruction ID: 5008e637aa7a69b03a503b1b1b1d8b6ffe22268b3adeb6b5aee5338115a66447
                              • Opcode Fuzzy Hash: c316dd216c5d28035ab43e420ad9ea4dddc359ab316b3fba7838feda2cce148b
                              • Instruction Fuzzy Hash: 4DF0187960061AABDF219F25CC44E697BE8EF13364B151062FD28D7150DF31DD528A94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • TlsGetValue.KERNEL32(6A15FA7E,?,6A1794A4,?,6A175FE3,6A15FA7E,?,?,6A154D3F,0000000C,ED279CBA,?,?,00000000,?,?), ref: 6A177081
                              • TlsGetValue.KERNEL32(00000005,?,6A1794A4,?,6A175FE3,6A15FA7E,?,?,6A154D3F,0000000C,ED279CBA,?,?,00000000,?,?), ref: 6A177098
                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,6A1794A4,?,6A175FE3,6A15FA7E,?,?,6A154D3F,0000000C,ED279CBA,?,?,00000000,?,?), ref: 6A1770AE
                              • GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 6A1770C9
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: Value$AddressHandleModuleProc
                              • String ID: DecodePointer$KERNEL32.DLL
                              • API String ID: 1929421221-629428536
                              • Opcode ID: 657d3cb334c4d1550b63db78ae95425d3c09748ac12db05b9e10c427e47c7e33
                              • Instruction ID: 9b7936d23aedb820ca375345062ddd58a30d98a166eed2ec04a7c92107d32eb8
                              • Opcode Fuzzy Hash: 657d3cb334c4d1550b63db78ae95425d3c09748ac12db05b9e10c427e47c7e33
                              • Instruction Fuzzy Hash: 8EF0627550061AABDF21AF25CC08EAE7BE9DF43260B061166FC28E7190DF21DD528B94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6A162A70: CloseHandle.KERNEL32(?,ED279CBA,?,00000000,?,?,00000000,?,?,?,00000000,6A180C38,000000FF), ref: 6A162A9F
                                • Part of subcall function 6A162A70: CreateFileW.KERNEL32(?,?,00000000,00000000,?,00000080,00000000,ED279CBA,?,00000000,?,?,00000000), ref: 6A162ACC
                                • Part of subcall function 6A162A70: CreateFileW.KERNEL32(?,?,?,00000000,00000000,00000080,00000000), ref: 6A162B2B
                              • GetFileSize.KERNEL32(FFFFFFFF,?,00000004,80000000,00000001,00000003,ED279CBA,?,?,00000000,?,?,?,00000000,6A180C38,000000FF), ref: 6A1604A7
                              • GetLastError.KERNEL32(?,?,?,00000000,6A180C38,000000FF), ref: 6A1604B4
                              • CloseHandle.KERNEL32(FFFFFFFF,00000004,80000000,00000001,00000003,ED279CBA,?,?,00000000,?,?,?,00000000,6A180C38,000000FF), ref: 6A16051D
                              • CloseHandle.KERNEL32(FFFFFFFF,?,00000000,00000000,00000001,?,?,?,00000000,6A180C38,000000FF), ref: 6A16053D
                              • CloseHandle.KERNEL32(FFFFFFFF,FFFFFFFF,00000000,?,00000000,00000000,00000001,?,?,?,00000000,6A180C38,000000FF), ref: 6A16056C
                                • Part of subcall function 6A160A20: MultiByteToWideChar.KERNEL32(00000002,00000000,?,?,?,?,ED279CBA,00000000), ref: 6A160AA7
                              • CloseHandle.KERNEL32(FFFFFFFF,?,?,?,?,00000000,00000001,?,?,?,00000000), ref: 6A1606D8
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: CloseHandle$File$Create$ByteCharErrorLastMultiSizeWide
                              • String ID:
                              • API String ID: 2846089904-0
                              • Opcode ID: e659e58c23f3d170fe4b9139a83b93766875b7271925f9cab51e19d11f635c58
                              • Instruction ID: f4daa20b8ca2c931479606b9e9296f8ea19fa7ad80f655f948fccdf473401713
                              • Opcode Fuzzy Hash: e659e58c23f3d170fe4b9139a83b93766875b7271925f9cab51e19d11f635c58
                              • Instruction Fuzzy Hash: 9281A172E002089BCF10DFA4D844BEEB7B5EF55324F129629E825F7281EF35A915CB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStringTypeW.KERNEL32(00000001,6A184BBC,00000001,?,00000100,?,?,?,?,?,6A17D6F0,00000000,?,00000001,?,?), ref: 6A17D535
                              • GetLastError.KERNEL32(?,6A17D6F0,00000000,?,00000001,?,?,?,?,00000001,?,00000000,00000001,00000000), ref: 6A17D547
                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,00000100,?,?,?,?,?,6A17D6F0,00000000,?,00000001), ref: 6A17D5AC
                              • MultiByteToWideChar.KERNEL32(00000000,00000001,?,00000000,00000000,00000000,?,?,00000001,?,00000000,00000001,00000000), ref: 6A17D616
                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 6A17D624
                              • GetStringTypeA.KERNEL32(?,?,?,?,?,00000100,?,?,?,?,?,6A17D6F0,00000000,?,00000001,?), ref: 6A17D699
                                • Part of subcall function 6A17DF24: GetCPInfo.KERNEL32(?,00000001,?,00000000,00000000,?,?,?,?,6A17D6F0,00000000,?,00000001,?,?,?), ref: 6A17DF6F
                                • Part of subcall function 6A17DF24: GetCPInfo.KERNEL32(?,00000001,?,6A17D6F0,00000000,?), ref: 6A17DF88
                                • Part of subcall function 6A17DF24: MultiByteToWideChar.KERNEL32(?,00000001,?,6A17D6F0,?,00000000,?,?,?,?,?,?,?,6A17D6F0,00000000,?), ref: 6A17E035
                                • Part of subcall function 6A17DF24: WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,?,6A17D6F0), ref: 6A17E050
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$StringType$Info$ErrorLast
                              • String ID:
                              • API String ID: 2250435928-0
                              • Opcode ID: fcf33fa3a4560406c489e8193653c41f509f45a9bda8098d09c3a2db1f4ab660
                              • Instruction ID: fa4b25a86c59bc77537eff3fa3d87d09bb245db48f30c83e204761b513156bfb
                              • Opcode Fuzzy Hash: fcf33fa3a4560406c489e8193653c41f509f45a9bda8098d09c3a2db1f4ab660
                              • Instruction Fuzzy Hash: A45147B150010EAFDF209F68CC85DAE7BF9EB19368B225529F914DB150DB30D9A18FA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStringTypeW.KERNEL32(00000001,10021660,00000001,?,75F2E860,1002CE50,?,?,00000002,00000000,?,?,1001DA1F,?), ref: 1001DFCB
                              • GetStringTypeA.KERNEL32(00000000,00000001,1002165C,00000001,?,?,?,1001DA1F,?), ref: 1001DFE5
                              • GetStringTypeA.KERNEL32(?,?,?,00000000,00000002,75F2E860,1002CE50,?,?,00000002,00000000,?,?,1001DA1F,?), ref: 1001E019
                              • MultiByteToWideChar.KERNEL32(?,1002CE51,?,00000000,00000000,00000000,75F2E860,1002CE50,?,?,00000002,00000000,?,?,1001DA1F,?), ref: 1001E051
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,?), ref: 1001E0A7
                              • GetStringTypeW.KERNEL32(?,?,00000000,?,?,?), ref: 1001E0B9
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: StringType$ByteCharMultiWide
                              • String ID:
                              • API String ID: 3852931651-0
                              • Opcode ID: 9cb96698784a2f131f153e3bcad8cc4bc2e41755872ea77c6cd091048275da51
                              • Instruction ID: 73f36e6d74bf66f6ce57e3c8a420cabe8a1af6d8c6052cc8844ff2d98f481940
                              • Opcode Fuzzy Hash: 9cb96698784a2f131f153e3bcad8cc4bc2e41755872ea77c6cd091048275da51
                              • Instruction Fuzzy Hash: 0041577250029AAFDB21DF94CC85EDE7BBAEB09790F20052AFA119A150C735DDD1CBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetVersionExA.KERNEL32 ref: 1001A29B
                              • GetEnvironmentVariableA.KERNEL32(__MSVCRT_HEAP_SELECT,?,00001090), ref: 1001A2D0
                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 1001A330
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: EnvironmentFileModuleNameVariableVersion
                              • String ID: __GLOBAL_HEAP_SELECTED$__MSVCRT_HEAP_SELECT
                              • API String ID: 1385375860-4131005785
                              • Opcode ID: 8d68a081adb5fb00688b35fa97c12b05e84aee0a2816abf6642aa1a3e48e784b
                              • Instruction ID: ff41b7170f7c9f9639ed0085cf635e38180a7bd29c628196ad01e98acd5c5e28
                              • Opcode Fuzzy Hash: 8d68a081adb5fb00688b35fa97c12b05e84aee0a2816abf6642aa1a3e48e784b
                              • Instruction Fuzzy Hash: DB310575C412986EEB61D6745C81BDD37E9DB17344F2400EAF195DE042E631DFC99B20
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryExW.KERNEL32(?,00000000,00000002,ED279CBA,6A18FCC8,00000000), ref: 6A166A18
                              • FreeLibrary.KERNEL32(00000000), ref: 6A166A38
                              • FreeLibrary.KERNEL32(00000000,ED279CBA,6A18FCC8,00000000), ref: 6A166A84
                              • GetProcAddress.KERNEL32(?,CreateObject), ref: 6A166AA5
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: Library$Free$AddressLoadProc
                              • String ID: CreateObject
                              • API String ID: 1386263645-166191583
                              • Opcode ID: d1a4945cf5d61681f53205bf68833e895b4ec3526e73a52cb7f70d9a9e3c1373
                              • Instruction ID: 13d44148e7aa0f3a453385be3c57eb92b92762e271cbe41517a10fd26b012e9e
                              • Opcode Fuzzy Hash: d1a4945cf5d61681f53205bf68833e895b4ec3526e73a52cb7f70d9a9e3c1373
                              • Instruction Fuzzy Hash: 6C416A75A00209EFDB04CF69C984B9ABBF5FF49310F14851AE829DB380DB34E950DB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStartupInfoA.KERNEL32(?), ref: 6A177CA1
                                • Part of subcall function 6A177653: Sleep.KERNEL32(00000000,?,6A15FA7E,?), ref: 6A17767B
                              • GetFileType.KERNEL32(00000040,?,?,?,6A1764EE,?,?,?,6A187F18,0000000C,6A1765A9,?), ref: 6A177DCB
                              • GetStdHandle.KERNEL32(-000000F6,?,?,?,6A1764EE,?,?,?,6A187F18,0000000C,6A1765A9,?), ref: 6A177E55
                              • GetFileType.KERNEL32(00000000,?,?,?,6A1764EE,?,?,?,6A187F18,0000000C,6A1765A9,?), ref: 6A177E67
                              • SetHandleCount.KERNEL32 ref: 6A177EBF
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: FileHandleType$CountInfoSleepStartup
                              • String ID:
                              • API String ID: 1302456922-0
                              • Opcode ID: 82bec9ffe326026b725861608d3b28dfa49e47a9872dc5895ecf0577db30f8e2
                              • Instruction ID: a56dc2959ed0d6d9e6028c623023cc66e1257cab3bae0004f63e5831b2f22e6d
                              • Opcode Fuzzy Hash: 82bec9ffe326026b725861608d3b28dfa49e47a9872dc5895ecf0577db30f8e2
                              • Instruction Fuzzy Hash: 75710E715047418EEB208B28C888B697BE0EF27334F2A965AD1759B2E2DF34D845CB11
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStartupInfoA.KERNEL32(?), ref: 1001C793
                              • GetFileType.KERNEL32(00000480), ref: 1001C83E
                              • GetStdHandle.KERNEL32(-000000F6), ref: 1001C8A1
                              • GetFileType.KERNEL32(00000000), ref: 1001C8AF
                              • SetHandleCount.KERNEL32 ref: 1001C8E6
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: FileHandleType$CountInfoStartup
                              • String ID:
                              • API String ID: 1710529072-0
                              • Opcode ID: 96bd8d765951caf66320892a5d82298be417aadad03bc705412f471f5a66fdb5
                              • Instruction ID: 9e0b50c6418c78b4ce1b27a1f486aee3850f1a3a2b75f6582e04b96d90fbb996
                              • Opcode Fuzzy Hash: 96bd8d765951caf66320892a5d82298be417aadad03bc705412f471f5a66fdb5
                              • Instruction Fuzzy Hash: 0C51243190436A8FE710DB68C8C4F697BE0EB05768F354669D5A29F2E2DB30DC86CB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • WriteConsoleW.KERNEL32(FFFFFFFE,?,00000001,?,00000000,00000000), ref: 6A17CE2B
                              • GetLastError.KERNEL32 ref: 6A17CE3E
                              • GetConsoleOutputCP.KERNEL32(00000000,?,00000001,00000083,00000005,00000000,00000000,00000000), ref: 6A17CE5E
                              • WideCharToMultiByte.KERNEL32(00000000), ref: 6A17CE65
                              • WriteConsoleA.KERNEL32(FFFFFFFE,00000083,00000000,?,00000000), ref: 6A17CE81
                                • Part of subcall function 6A17DC35: CreateFileA.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6A17CE0E,00000000), ref: 6A17DC48
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide
                              • String ID:
                              • API String ID: 1850339568-0
                              • Opcode ID: 135dbbc5a40b927e0aadb9adf43a41ebdf5d4419800d689cd519ddb30597e270
                              • Instruction ID: a63f3ce5998e9bf5f22aab0aaac1b0ab7bd368e6e66b7b91f1a64f12b6e28538
                              • Opcode Fuzzy Hash: 135dbbc5a40b927e0aadb9adf43a41ebdf5d4419800d689cd519ddb30597e270
                              • Instruction Fuzzy Hash: 22216D71501218ABDB20DB64CC48EEF7BF9EB57760B81121AF511C7180DF70EA45CBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 6A17A924
                              • GetCurrentProcessId.KERNEL32 ref: 6A17A930
                              • GetCurrentThreadId.KERNEL32 ref: 6A17A938
                              • GetTickCount.KERNEL32 ref: 6A17A940
                              • QueryPerformanceCounter.KERNEL32(?), ref: 6A17A94C
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                              • String ID:
                              • API String ID: 1445889803-0
                              • Opcode ID: 7618429e382567cdebf76b7d25983f17b3fe28ab7a9cff46e2d87e7718dee73e
                              • Instruction ID: 831f70884812aca271834ba207524064e60ba30e74d67db17ceff50d196f9cb4
                              • Opcode Fuzzy Hash: 7618429e382567cdebf76b7d25983f17b3fe28ab7a9cff46e2d87e7718dee73e
                              • Instruction Fuzzy Hash: AA115E72D00224ABDF209BB8C94869EFBF8EB5E751F971516E901E7200EE30DD158798
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetLastError.KERNEL32(00000103,7FFFFFFF,1001C473,1001D0D7,00000000,?,?,00000000,00000001), ref: 1001C033
                              • TlsGetValue.KERNEL32 ref: 1001C041
                              • SetLastError.KERNEL32(00000000), ref: 1001C08D
                                • Part of subcall function 1001C480: HeapAlloc.KERNEL32(00000008,?,00000000,00000000,00000001,10019E24,10021318,000000FF,?,1001C056,00000001,00000074), ref: 1001C576
                              • TlsSetValue.KERNEL32(00000000), ref: 1001C065
                              • GetCurrentThreadId.KERNEL32 ref: 1001C076
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: ErrorLastValue$AllocCurrentHeapThread
                              • String ID:
                              • API String ID: 2020098873-0
                              • Opcode ID: 2a7b4345b55e60806f6563897d190d9d6c15b8e2791512da656746999b9ff8e8
                              • Instruction ID: c7b26c2ea065f329baa6dbda2ade13875997561f4633f5fb0c8b07fada39eb07
                              • Opcode Fuzzy Hash: 2a7b4345b55e60806f6563897d190d9d6c15b8e2791512da656746999b9ff8e8
                              • Instruction Fuzzy Hash: 0DF0BB35901331DBF2329B749C89F1A3AA6EF097B1F214318F6559E1A1CB30D8C29690
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • DeleteCriticalSection.KERNEL32(00000000,?,?,1001C005,10019FBC,1001A015,?,?,?), ref: 1001A102
                                • Part of subcall function 100189EE: HeapFree.KERNEL32(00000000,?,?,?,?), ref: 10018AC2
                              • DeleteCriticalSection.KERNEL32(?,?,1001C005,10019FBC,1001A015,?,?,?), ref: 1001A11D
                              • DeleteCriticalSection.KERNEL32 ref: 1001A125
                              • DeleteCriticalSection.KERNEL32 ref: 1001A12D
                              • DeleteCriticalSection.KERNEL32 ref: 1001A135
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: CriticalDeleteSection$FreeHeap
                              • String ID:
                              • API String ID: 447823528-0
                              • Opcode ID: 31fd23f1ab8c03e9a7f37bef3c6a7256c8a93bd33ca8f004c8e74067c6c1dcf0
                              • Instruction ID: 436f94670acdd869086ea8be0b95e1bb75b4415bd69928cd2107d9a27a45b4f1
                              • Opcode Fuzzy Hash: 31fd23f1ab8c03e9a7f37bef3c6a7256c8a93bd33ca8f004c8e74067c6c1dcf0
                              • Instruction Fuzzy Hash: 1AF0F4268002647AEA65F719AD8C8A97BD5DB822B27920476EC53B7030CD778CC29DA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcAddress.KERNEL32(00000000,GetMethodProperty), ref: 6A165F83
                              • GetProcAddress.KERNEL32(00000000,GetNumberOfMethods), ref: 6A165F9F
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: AddressProc
                              • String ID: GetMethodProperty$GetNumberOfMethods
                              • API String ID: 190572456-2134343882
                              • Opcode ID: 06fe88c58fa660d7be3086bcdf4628abaef97eea969aeb035e61cf0f5007d4de
                              • Instruction ID: 3025e58598038de154e841c6bf83d4e1006aed074838435cd1bc0a4a53ab0805
                              • Opcode Fuzzy Hash: 06fe88c58fa660d7be3086bcdf4628abaef97eea969aeb035e61cf0f5007d4de
                              • Instruction Fuzzy Hash: C8216B75E01319EBCB04CFA4D98499EF7B9FF48318B11406AED14E7202EB31E916CBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RegOpenKeyExW.ADVAPI32(80000001,Software\7-zip,00000000,00020019,6A17FD48,ED279CBA,00000000,?,80000001,00000000,6A17FD48,000000FF,?,6A165DBD,?,6A18FCC8), ref: 6A165C1D
                                • Part of subcall function 6A162FE0: RegQueryValueExW.ADVAPI32(00000000,Path,00000000,?,00000000,6A165DBD,?,?,6A165C37,?,6A165DBD,?,6A18FCC8,00000000,00000000), ref: 6A16300E
                                • Part of subcall function 6A162FE0: RegQueryValueExW.ADVAPI32(6A165DBD,Path,00000000,6A165DBD,?,6A165DBD,?,6A165DBD,?,6A18FCC8,00000000,00000000), ref: 6A16304E
                              • RegCloseKey.ADVAPI32(?,?,6A165DBD,?,6A18FCC8,00000000,00000000,?,?,?,?,?,?,?,?,00000000), ref: 6A165C47
                              • RegCloseKey.ADVAPI32(?,?,6A165DBD,?,6A18FCC8,00000000,00000000,?,?,?,?,?,?,?,?,00000000), ref: 6A165C65
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: CloseQueryValue$Open
                              • String ID: Software\7-zip
                              • API String ID: 4082589901-3321436535
                              • Opcode ID: 59e4bedc1c1ab97f5c3c80286e55bf0e25b2d8b6f265ae9ed175387274cb9cfd
                              • Instruction ID: af3713335592d12ffc27610245e289ae56c0cb68b88d8866e222808178dd6f60
                              • Opcode Fuzzy Hash: 59e4bedc1c1ab97f5c3c80286e55bf0e25b2d8b6f265ae9ed175387274cb9cfd
                              • Instruction Fuzzy Hash: 74118276D05A28ABCB118F44DC44AAFFBBCFB06B60F01066AFC15E7340DB3469158AE4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNEL32(mscoree.dll,?,6A177821,6A15FA7E,?,6A178143,000000FF,0000001E,6A188028,0000000C,6A1781EF,6A15FA7E,?,?,6A17C6AB,00000004), ref: 6A1777F3
                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6A177803
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: AddressHandleModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 1646373207-1276376045
                              • Opcode ID: 40697952105db7a6984714f28315e7a807bb17ff8d05fd09dfb2563e559e8bbe
                              • Instruction ID: 9e5ac56c44d4efee06e6021e0abbd53a56c8283b1d9a957d45105ba56c41201a
                              • Opcode Fuzzy Hash: 40697952105db7a6984714f28315e7a807bb17ff8d05fd09dfb2563e559e8bbe
                              • Instruction Fuzzy Hash: 6AD01270700205B7EF102AB2DD0CA16BEEDDA82B507898425BA1CD1081DF21CC12DD60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: fd9724b1c61d381fd748c7ffe039d77dfbf158c8da40872393acd8e509287be1
                              • Instruction ID: c5e9eab5286596022c0fc86455b854ac72cbfdbbf2fd81343e62aa3bf37372db
                              • Opcode Fuzzy Hash: fd9724b1c61d381fd748c7ffe039d77dfbf158c8da40872393acd8e509287be1
                              • Instruction Fuzzy Hash: 7791C371D01664AADB11EB68CC81ADE7AF9EF497A0F600226F854BE191D731DDC0CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6A175F2A: RtlAllocateHeap.NTDLL(00000000,6A15FA6F,?,00000000,?,?,6A154D3F,0000000C,ED279CBA,?,?,00000000,?,?,6A17EF9B,000000FF), ref: 6A175FA1
                              • GetLastError.KERNEL32(?,6A1752D8,00000000,00000010,?,?,?,6A175364,?,6A187E10,0000000C,6A175390,?,?,6A1778CA,6A17A8C7), ref: 6A17C8C3
                              • GetLastError.KERNEL32(?,6A1752D8,00000000,00000010,?,?,?,6A175364,?,6A187E10,0000000C,6A175390,?,?,6A1778CA,6A17A8C7), ref: 6A17C950
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: ErrorLast$AllocateHeap
                              • String ID:
                              • API String ID: 4219743298-0
                              • Opcode ID: dc5b8da90e17ba81d4566b056ffb010e729b8bcfbda22845752342a2ecfb0bf1
                              • Instruction ID: b2dd07fee2f8318a3a99cbc55e5176accfc407543da9a1125c9cf982e1a5d2c9
                              • Opcode Fuzzy Hash: dc5b8da90e17ba81d4566b056ffb010e729b8bcfbda22845752342a2ecfb0bf1
                              • Instruction Fuzzy Hash: AF51E571C04625ABCFB16B788C4C64E77B5EF56364F262516E864EB281EF34D940CBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapAlloc.KERNEL32(00000000,00002020,10025958,10025958,?,?,1001B4DC,?,00000010,?,00000009,00000009,?,10018964,00000010,?), ref: 1001B031
                              • VirtualAlloc.KERNEL32(00000000,00400000,00002000,00000004,?,?,1001B4DC,?,00000010,?,00000009,00000009,?,10018964,00000010,?), ref: 1001B055
                              • VirtualAlloc.KERNEL32(00000000,00010000,00001000,00000004,?,?,1001B4DC,?,00000010,?,00000009,00000009,?,10018964,00000010,?), ref: 1001B06F
                              • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,1001B4DC,?,00000010,?,00000009,00000009,?,10018964,00000010,?,?), ref: 1001B130
                              • HeapFree.KERNEL32(00000000,00000000,?,?,1001B4DC,?,00000010,?,00000009,00000009,?,10018964,00000010,?,?,?), ref: 1001B147
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: AllocVirtual$FreeHeap
                              • String ID:
                              • API String ID: 714016831-0
                              • Opcode ID: 08a6be7fdf41f6db4eaa31ea6addab7da968f7782194b53cc123b6d70fe20246
                              • Instruction ID: 9791cdc1e8676e8be9240cb2db72b85fdf48b460ca22e9baef45e6ba91bfb517
                              • Opcode Fuzzy Hash: 08a6be7fdf41f6db4eaa31ea6addab7da968f7782194b53cc123b6d70fe20246
                              • Instruction Fuzzy Hash: F4312670500B56EBE332CF24CCC5B2677E0EB447A5FA14529F5669B290E771E8C5CB48
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 6A17C1F1: GetOEMCP.KERNEL32(00000000,?,6A17A6C9,?,?,?), ref: 6A17C21A
                                • Part of subcall function 6A17760E: Sleep.KERNEL32(00000000,00000001,6A15FA7E,?,6A17815E,00000018,6A188028,0000000C,6A1781EF,6A15FA7E,?,?,6A17C6AB,00000004,6A1882E8,0000000C), ref: 6A17762F
                              • InterlockedDecrement.KERNEL32(C03314C4), ref: 6A17C4C8
                              • InterlockedIncrement.KERNEL32(00000000), ref: 6A17C4ED
                              • InterlockedDecrement.KERNEL32 ref: 6A17C57F
                              • InterlockedIncrement.KERNEL32(00000000), ref: 6A17C5A3
                                • Part of subcall function 6A175FF4: HeapFree.KERNEL32(00000000,6A15FA7E,6A187EB0,0000000C,6A1781B5,00000000,6A188028,0000000C,6A1781EF,6A15FA7E,?,?,6A17C6AB,00000004,6A1882E8,0000000C), ref: 6A17605C
                                • Part of subcall function 6A175FF4: GetLastError.KERNEL32(?,6A17C6AB,00000004,6A1882E8,0000000C,6A177669,6A15FA7E,?,00000000,00000000,00000000,?,6A17726D,00000001,00000214), ref: 6A17606D
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: Interlocked$DecrementIncrement$ErrorFreeHeapLastSleep
                              • String ID:
                              • API String ID: 1703371082-0
                              • Opcode ID: 5159e9afa72178108108d58ef5d6554f10c5c1141570a0ce43a4d434f6bd82b3
                              • Instruction ID: b04a943f9de0b7f8a90a69ce40caedadf21c18e9f25510f7608ac82281d4f6d2
                              • Opcode Fuzzy Hash: 5159e9afa72178108108d58ef5d6554f10c5c1141570a0ce43a4d434f6bd82b3
                              • Instruction Fuzzy Hash: 24419F71A043049BDB209F78C8887997BF0EF0A725F16556AD851DB692CF35E981CFA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateFileW.KERNEL32(00000000,40000000,00000003,00000000,00000003,02000000,00000000,ED279CBA,00000000,?,?,00000000,00000000,00000000), ref: 6A160FAE
                              • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000), ref: 6A16100C
                              • SetFileTime.KERNEL32(00000000,?,?,?,?,?,?), ref: 6A161033
                              • CloseHandle.KERNEL32(00000000,?,?,?), ref: 6A16103F
                                • Part of subcall function 6A1628A0: GetCurrentDirectoryW.KERNEL32(00000105,?,ED279CBA,FFFFFFFF,?,00000004), ref: 6A162994
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: File$Create$CloseCurrentDirectoryHandleTime
                              • String ID:
                              • API String ID: 2622452211-0
                              • Opcode ID: 3675cbaf6edd0359fb4198b50d086a7ddbd84020cff65c28f4c00305245d949c
                              • Instruction ID: 4a4c65594c601199651b2ca8a7ad162c35cfbad8b3e6e27f0ff25263d755be5f
                              • Opcode Fuzzy Hash: 3675cbaf6edd0359fb4198b50d086a7ddbd84020cff65c28f4c00305245d949c
                              • Instruction Fuzzy Hash: 0D21D3B5A40204BBEB109F54CC85FAFB7B8EB46768F114229FA10E72C0CB746E0586A0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(6A18FC98,ED279CBA,?,?,?,6A17FB68,000000FF), ref: 6A16D4F2
                              • LeaveCriticalSection.KERNEL32(6A18FC98,?,?,?,6A17FB68,000000FF), ref: 6A16D50A
                              • LeaveCriticalSection.KERNEL32(6A18FC98,?,?,?,?,6A17FB68,000000FF), ref: 6A16D547
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: CriticalSection$Leave$Enter
                              • String ID: [Content]
                              • API String ID: 2978645861-3799411330
                              • Opcode ID: 8724d8bf70ea354cc3eb2e4a71a17d14556ade4322b2d2f2f2b4046af4dddce4
                              • Instruction ID: 14bcc0614a1d720cc8c1076d94376ddd16888d61bc4b3d7d02c5bc0e5c719eb0
                              • Opcode Fuzzy Hash: 8724d8bf70ea354cc3eb2e4a71a17d14556ade4322b2d2f2f2b4046af4dddce4
                              • Instruction Fuzzy Hash: 9E0184B2904608AFD711DF59C809F9DB7F8FB0A620F51465AE811E7680DF756D04CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStdHandle.KERNEL32(000000F6,?,00100000,?,00000000), ref: 6A151A4E
                              • ReadFile.KERNEL32(00000000), ref: 6A151A55
                              • GetLastError.KERNEL32 ref: 6A151A72
                              • GetLastError.KERNEL32 ref: 6A151A80
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: ErrorLast$FileHandleRead
                              • String ID:
                              • API String ID: 2244327787-0
                              • Opcode ID: 8635c93c03f7be62c67a01fb6177d5256dc7f75bed02919a157e170bd213afca
                              • Instruction ID: 57b71992850682d357a8f8f2657c2ae7db42f7bf9c8f3d00089c02d10b451b7c
                              • Opcode Fuzzy Hash: 8635c93c03f7be62c67a01fb6177d5256dc7f75bed02919a157e170bd213afca
                              • Instruction Fuzzy Hash: 7201F9B634024A5BDB02EE949C00BB773ACDB55360F144536FD26C6180DB30DC2187B0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetLastError.KERNEL32 ref: 100010CD
                              • WideCharToMultiByte.KERNEL32(?,?,?,00000001,?,00000004), ref: 100010E8
                              • CharUpperA.USER32(?,?,?,?,00000001,?,00000004), ref: 10001101
                              • MultiByteToWideChar.KERNEL32(?,?,?,00000000,?,00000001,?,?,?,00000001,?,00000004), ref: 10001114
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: Char$ByteMultiWide$ErrorLastUpper
                              • String ID:
                              • API String ID: 1367601523-0
                              • Opcode ID: 72820ca4cf70397f8d93897b94b6977d73b437a33a5f1a0a67e4fe9fcbc230e4
                              • Instruction ID: 8a9f6ad633896971aa68c1c487645b7fc150f811c31040e311e3666a4a254741
                              • Opcode Fuzzy Hash: 72820ca4cf70397f8d93897b94b6977d73b437a33a5f1a0a67e4fe9fcbc230e4
                              • Instruction Fuzzy Hash: F7F01DBA800269BAFB15DB909CC9EDFBBADEB08294F100561FB42E2141D2749E858760
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • VirtualFree.KERNEL32(?,00000000,00008000,?,00000000,?,6A176420,?,?,?,6A1764EE,?,?,?,6A187F18,0000000C), ref: 6A179440
                              • HeapFree.KERNEL32(00000000,-00000010,?,00000000,?,6A176420,?,?,?,6A1764EE,?,?,?,6A187F18,0000000C,6A1765A9), ref: 6A179450
                              • HeapFree.KERNEL32(00000000,00000000,?,6A176420,?,?,?,6A1764EE,?,?,?,6A187F18,0000000C,6A1765A9,?), ref: 6A17946D
                              • HeapDestroy.KERNEL32(6A176420,?,?,?,6A1764EE,?,?,?,6A187F18,0000000C,6A1765A9,?), ref: 6A179477
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: FreeHeap$DestroyVirtual
                              • String ID:
                              • API String ID: 765507482-0
                              • Opcode ID: 67043fe2e331259237cbb6bbdb1a6319f23788aa03f68d81df98c5583e3e486e
                              • Instruction ID: 8ad7c943e3f58584236120a2e4c81fd87fcd4110bdf1d1ff7be5c21f6aab07b4
                              • Opcode Fuzzy Hash: 67043fe2e331259237cbb6bbdb1a6319f23788aa03f68d81df98c5583e3e486e
                              • Instruction Fuzzy Hash: 51F0443A100220AFDF21AB14CD95B05BBE1FF83755F228125E221E60A5C7722C25CB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: Info
                              • String ID: $
                              • API String ID: 1807457897-3032137957
                              • Opcode ID: 14eba8f351f7a606bf476568831cf335b29103052037c0e04881c2f51051340a
                              • Instruction ID: 27a1dab1f5f815cb8d427bf576b62c8b4ec6ff9cec70f847aa7466e11b016868
                              • Opcode Fuzzy Hash: 14eba8f351f7a606bf476568831cf335b29103052037c0e04881c2f51051340a
                              • Instruction Fuzzy Hash: 2B41483140436C1AEB11FA64CD85FEA7F9ADB01744F1006F7D585CF092D271C989DBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RegQueryValueExW.ADVAPI32(00000000,Path,00000000,?,00000000,6A165DBD,?,?,6A165C37,?,6A165DBD,?,6A18FCC8,00000000,00000000), ref: 6A16300E
                              • RegQueryValueExW.ADVAPI32(6A165DBD,Path,00000000,6A165DBD,?,6A165DBD,?,6A165DBD,?,6A18FCC8,00000000,00000000), ref: 6A16304E
                              Strings
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: QueryValue
                              • String ID: Path
                              • API String ID: 3660427363-2875597873
                              • Opcode ID: 5966ca8d4deb975840512aef692bdfbbf30d937b145d2c7bb3d16800d207e719
                              • Instruction ID: c8e211bd8c3c776bb4c8007e32caecd825ad516181a99411e3caa55ec9e71547
                              • Opcode Fuzzy Hash: 5966ca8d4deb975840512aef692bdfbbf30d937b145d2c7bb3d16800d207e719
                              • Instruction Fuzzy Hash: 32114FB5A04204AFEB14DFA8C8D08AEF7F9FF59700B21946EE546D3241EB709D558B60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapReAlloc.KERNEL32(00000000,-00000010,00000000,00000000,6A1791C3,00000000,?,00000000,6A17EF9B,000000FF,?,6A15FA7E,?), ref: 6A178C8A
                              • HeapAlloc.KERNEL32(00000008,000041C4,00000000,00000000,6A1791C3,00000000,?,00000000,6A17EF9B,000000FF,?,6A15FA7E,?), ref: 6A178CC0
                              • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004,?,6A15FA7E,?), ref: 6A178CDA
                              • HeapFree.KERNEL32(00000000,?,?,6A15FA7E,?), ref: 6A178CF1
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275885990.000000006A151000.00000020.00000001.01000000.0000000F.sdmp, Offset: 6A150000, based on PE: true
                              • Associated: 0000000D.00000002.168275819717.000000006A150000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276081808.000000006A183000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276167603.000000006A18D000.00000004.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A193000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              • Associated: 0000000D.00000002.168276251655.000000006A1B8000.00000002.00000001.01000000.0000000F.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_6a150000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: AllocHeap$FreeVirtual
                              • String ID:
                              • API String ID: 3499195154-0
                              • Opcode ID: 49beebf6679276f2ced041496e9c6a4988b808ab041c6703fb99118a5ea4a83a
                              • Instruction ID: f60bd6584f41d82ccd5881b94dbb03c220dcde13a84d0bc3db10868aeed41071
                              • Opcode Fuzzy Hash: 49beebf6679276f2ced041496e9c6a4988b808ab041c6703fb99118a5ea4a83a
                              • Instruction Fuzzy Hash: D7118872600710AFDB219F28CC05945BBF1FFD77A0B258A19F6A2E7194D7309C82CB40
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • HeapReAlloc.KERNEL32(00000000,?,?,00000000,1001A936,?,?,?,10018906,?,?,?,?,?,?), ref: 1001AB96
                              • HeapAlloc.KERNEL32(00000008,000041C4,?,00000000,1001A936,?,?,?,10018906,?,?,?,?,?,?), ref: 1001ABCA
                              • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004), ref: 1001ABE4
                              • HeapFree.KERNEL32(00000000,?), ref: 1001ABFB
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: AllocHeap$FreeVirtual
                              • String ID:
                              • API String ID: 3499195154-0
                              • Opcode ID: 6f699eca9e893f575dde21e6c4b4ec1254527531fada708ecaea67c30c461b13
                              • Instruction ID: 484c1ce75c38baac158856a15f7ab205fd40ab6127819ea80900b3ceb95b3c03
                              • Opcode Fuzzy Hash: 6f699eca9e893f575dde21e6c4b4ec1254527531fada708ecaea67c30c461b13
                              • Instruction Fuzzy Hash: E8112570240321AFE721EF19CCC6A167BF6FB86764B61491AF552C69B1D3729CA2CF40
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InitializeCriticalSection.KERNEL32(?,1001BFB2,?,10019F53), ref: 1001A0B2
                              • InitializeCriticalSection.KERNEL32 ref: 1001A0BA
                              • InitializeCriticalSection.KERNEL32 ref: 1001A0C2
                              • InitializeCriticalSection.KERNEL32 ref: 1001A0CA
                              Memory Dump Source
                              • Source File: 0000000D.00000002.168275395272.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 0000000D.00000002.168275332831.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275529893.0000000010020000.00000002.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275603687.0000000010025000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275668326.0000000010027000.00000004.00000001.01000000.00000007.sdmpDownload File
                              • Associated: 0000000D.00000002.168275744390.000000001002F000.00000002.00000001.01000000.00000007.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_13_2_10000000_TechkonDriver64Bit.jbxd
                              Similarity
                              • API ID: CriticalInitializeSection
                              • String ID:
                              • API String ID: 32694325-0
                              • Opcode ID: 9eddfc3165ec3fc15766a975bd316014652016b7c432d0d5cadee5ee0f614abc
                              • Instruction ID: bb73eb11f573fb0f18e311b5dd9e76b2e5dde51fe535fe889abf8312516ef5db
                              • Opcode Fuzzy Hash: 9eddfc3165ec3fc15766a975bd316014652016b7c432d0d5cadee5ee0f614abc
                              • Instruction Fuzzy Hash: BEC00231801138AFFA556B55DC848493FA6EB042723210063E10561030CEB31C93DFE8
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000013.00000002.167797030807.00007FF666971000.00000020.00000001.01000000.00000012.sdmp, Offset: 00007FF666970000, based on PE: true
                              • Associated: 00000013.00000002.167796997987.00007FF666970000.00000002.00000001.01000000.00000012.sdmpDownload File
                              • Associated: 00000013.00000002.167797156824.00007FF6669F1000.00000004.00000001.01000000.00000012.sdmpDownload File
                              • Associated: 00000013.00000002.167797195281.00007FF6669F3000.00000002.00000001.01000000.00000012.sdmpDownload File
                              • Associated: 00000013.00000002.167797195281.00007FF666A08000.00000002.00000001.01000000.00000012.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_19_2_7ff666970000_x64DPInst.jbxd
                              Similarity
                              • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                              • String ID:
                              • API String ID: 1445889803-0
                              • Opcode ID: 404986f5cc30a85b1b110af08f269cf27d5de7fe2ab396615c35e90afeb4e3b4
                              • Instruction ID: 193ff66b5462934c5023217f32974299c26f01df60566f780df646e514a299ff
                              • Opcode Fuzzy Hash: 404986f5cc30a85b1b110af08f269cf27d5de7fe2ab396615c35e90afeb4e3b4
                              • Instruction Fuzzy Hash: 8F013021758A02C2E7508F22F4501657370FB46F90F452730EE5E8F795CE3EE9858B00
                              Uniqueness

                              Uniqueness Score: -1.00%