Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
CDM212364_Setup.exe

Overview

General Information

Sample name:CDM212364_Setup.exe
Analysis ID:1430184
MD5:0c97e7b5de1b46fb723bed38f0de28a2
SHA1:3ab353adb602908eddb884c8b2b587fcc0691bfa
SHA256:835dd64b199190d20dc37c0cadeb064b7eaaaef271703781b2b259b7085437a4
Infos:

Detection

Score:6
Range:0 - 100
Whitelisted:false
Confidence:20%

Signatures

Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates driver files
Creates files inside the driver directory
Creates files inside the system directory
Deletes files inside the Windows folder
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Drops certificate files (DER)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Analysis Advice

Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox
Sample may be VM or Sandbox-aware, try analysis on a native machine
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
  • System is w10x64
  • CDM212364_Setup.exe (PID: 7300 cmdline: "C:\Users\user\Desktop\CDM212364_Setup.exe" MD5: 0C97E7B5DE1B46FB723BED38F0DE28A2)
    • dp-chooser.exe (PID: 7360 cmdline: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exe MD5: 461A3CE2E77143EC0E0015D80675911B)
      • dpinst-amd64.exe (PID: 7372 cmdline: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe /sa MD5: 0E7E8820A977D3B4B81C5188FA841C52)
  • drvinst.exe (PID: 7496 cmdline: DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\ftdibus.inf" "9" "4aa35cc23" "0000000000000150" "WinSta0\Default" "0000000000000160" "208" "c:\users\user\appdata\local\temp\ftdi-driver" MD5: 294990C88B9D1FE0A54A1FA8BF4324D9)
  • drvinst.exe (PID: 7732 cmdline: DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\ftdiport.inf" "9" "47472827f" "0000000000000160" "WinSta0\Default" "000000000000015C" "208" "c:\users\user\appdata\local\temp\ftdi-driver" MD5: 294990C88B9D1FE0A54A1FA8BF4324D9)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: CDM212364_Setup.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: CDM212364_Setup.exeStatic PE information: certificate valid
Source: CDM212364_Setup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: c:\Jenkins2\workspace\J171-Windows-D2XX-VCP-VS2013\FTBUSUI\x64\Release\FTBUSUI.pdb source: ftbusui.dll
Source: Binary string: c:\Jenkins2\workspace\J171-Windows-D2XX-VCP-VS2013\FTBUSUI\x64\Release\FTBUSUI.pdb~~ source: ftbusui.dll
Source: Binary string: c:\Jenkins2\workspace\J171-Windows-D2XX-VCP-VS2013\FTBUSUI\Release\FTBUSUI.pdb source: ftbusui.dll
Source: Binary string: d:\wm\minkernel\crts\crtw32\misc\nt\vc110.pdb source: ftd2xx.lib
Source: Binary string: c:\Jenkins2\workspace\J171-Windows-D2XX-VCP-VS2015\x64\Release\FTDIBUS.pdb source: ftdibus.sys
Source: Binary string: c:\Jenkins2\workspace\J171-Windows-D2XX-VCP-VS2015\Release\FTSER2K.pdb source: ftser2k.sys
Source: Binary string: c:\Jenkins2\workspace\J171-Windows-D2XX-VCP-VS2013\FTLang\x64\Release\FTLang.pdb source: ftlang.dll
Source: Binary string: c:\jenkins2\worksp~1\j11a5a~1\pp\ftserui2\objfre_wnet_x86\i386\ftserui2.pdb source: ftserui2.dll
Source: Binary string: c:\Jenkins2\workspace\J171-Windows-D2XX-VCP-VS2015\x64\Release\FTSER2K.pdb source: ftser2k.sys
Source: Binary string: c:\Jenkins2\workspace\J171-Windows-D2XX-VCP-VS2015\x64\Release\FTD2XX.pdb source: ftd2xx64.dll
Source: Binary string: c:\Jenkins2\workspace\J171-Windows-D2XX-VCP-VS2013\FTLang\Release\FTLang.pdb source: ftlang.dll
Source: Binary string: d:\8180\enduser\databaseaccess\src\mdac\odbc\core\cplib\vc110.pdb source: ftd2xx.lib
Source: Binary string: c:\jenkins2\worksp~1\j11a5a~1\coinst\ftcserco\objfre_wnet_amd64\amd64\ftcserco.pdbH source: ftcserco.dll
Source: Binary string: c:\jenkins2\worksp~1\j11a5a~1\coinst\ftcserco\objfre_wnet_amd64\amd64\ftcserco.pdb source: ftcserco.dll
Source: Binary string: c:\Jenkins2\workspace\J171-Windows-D2XX-VCP-VS2015\Release\FTD2XX.pdb source: ftd2xx.dll
Source: Binary string: DpInst.pdbH source: dpinst-amd64.exe
Source: Binary string: c:\Jenkins2\workspace\J171-Windows-D2XX-VCP-VS2015\Release\FTDIBUS.pdb source: ftdibus.sys
Source: Binary string: c:\jenkins2\worksp~1\j11a5a~1\pp\ftserui2\objfre_wnet_amd64\amd64\ftserui2.pdbH source: ftserui2.dll
Source: Binary string: c:\jenkins2\worksp~1\j11a5a~1\coinst\ftcserco\objfre_wnet_x86\i386\ftcserco.pdb source: ftcserco.dll
Source: Binary string: c:\jenkins2\worksp~1\j11a5a~1\pp\ftserui2\objfre_wnet_amd64\amd64\ftserui2.pdb source: ftserui2.dll
Source: Binary string: DpInst.pdb source: dpinst-amd64.exe, dpinst-x86.exe
Source: Binary string: DpInst.pdbp source: dpinst-x86.exe
Source: ftbusui.dll, ftcserco.dll, ftdibus.sys, ftlang.dll, ftser2k.sys, ftserui2.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: ftbusui.dll, ftcserco.dll, ftdibus.sys, ftlang.dll, ftser2k.sys, ftserui2.dllString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: ftbusui.dll, ftcserco.dll, ftdibus.sys, ftlang.dll, ftser2k.sys, ftserui2.dllString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: ftbusui.dll, ftcserco.dll, ftdibus.sys, ftlang.dll, ftser2k.sys, ftserui2.dllString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: ftbusui.dll, ftcserco.dll, ftdibus.sys, ftlang.dll, ftser2k.sys, ftserui2.dllString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: ftbusui.dll, ftcserco.dll, ftdibus.sys, ftlang.dll, ftser2k.sys, ftserui2.dllString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: ftbusui.dll, ftcserco.dll, ftdibus.sys, ftlang.dll, ftser2k.sys, ftserui2.dllString found in binary or memory: http://ocsp.digicert.com0C
Source: ftbusui.dll, ftcserco.dll, ftdibus.sys, ftlang.dll, ftser2k.sys, ftserui2.dllString found in binary or memory: http://ocsp.digicert.com0O
Source: ftbusui.dll, ftcserco.dll, ftdibus.sys, ftlang.dll, ftser2k.sys, ftserui2.dllString found in binary or memory: http://s.symcb.com/pca3-g5.crl0
Source: ftbusui.dll, ftcserco.dll, ftdibus.sys, ftlang.dll, ftser2k.sys, ftserui2.dllString found in binary or memory: http://s.symcd.com0_
Source: ftbusui.dll, ftcserco.dll, ftdibus.sys, ftlang.dll, ftser2k.sys, ftserui2.dllString found in binary or memory: http://sw.symcb.com/sw.crl0
Source: ftbusui.dll, ftcserco.dll, ftdibus.sys, ftlang.dll, ftser2k.sys, ftserui2.dllString found in binary or memory: http://sw.symcd.com0
Source: ftbusui.dll, ftcserco.dll, ftdibus.sys, ftlang.dll, ftser2k.sys, ftserui2.dllString found in binary or memory: http://sw1.symcb.com/sw.crt0
Source: ftbusui.dll, ftcserco.dll, ftdibus.sys, ftlang.dll, ftser2k.sys, ftserui2.dllString found in binary or memory: http://www.digicert.com/CPS0
Source: CDM212364_Setup.exeString found in binary or memory: http://www.disoriented.com(
Source: CDM212364_Setup.exeString found in binary or memory: http://www.disoriented.com/
Source: CDM212364_Setup.exeString found in binary or memory: http://www.disoriented.com/openConfirm
Source: ftbusui.dll, ftcserco.dll, ftdibus.sys, ftlang.dll, ftser2k.sys, ftserui2.dllString found in binary or memory: https://d.symcb.com/cps0%
Source: ftbusui.dll, ftcserco.dll, ftdibus.sys, ftlang.dll, ftser2k.sys, ftserui2.dllString found in binary or memory: https://d.symcb.com/rpa0
Source: ftbusui.dll, ftcserco.dll, ftdibus.sys, ftlang.dll, ftser2k.sys, ftserui2.dllString found in binary or memory: https://d.symcb.com/rpa0)
Source: ftbusui.dll, ftcserco.dll, ftdibus.sys, ftlang.dll, ftser2k.sys, ftserui2.dllString found in binary or memory: https://www.digicert.com/CPS0
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeFile created: C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\SETAA8E.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeFile created: C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\SET95D7.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeFile created: C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\ftdibus.cat (copy)Jump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeFile created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\ftdibus.catJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\SETA095.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\ftdiport.cat (copy)Jump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeFile created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\ftdiport.catJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeFile created: C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\ftdiport.cat (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\ftdibus.cat (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\SETACF8.tmpJump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeFile created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftdibus.sysJump to behavior
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeFile created: C:\Windows\DPINST.LOGJump to behavior
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\ftdibus.inf_amd64_27ad3b85ed46c2a0Jump to behavior
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\ftdibus.inf_amd64_27ad3b85ed46c2a0\amd64Jump to behavior
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\ftdibus.inf_amd64_27ad3b85ed46c2a0\i386Jump to behavior
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\drvstore.tmpJump to behavior
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\inf\oem4.infJump to behavior
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\ftdiport.inf_amd64_02e6e8b10f1ee812Jump to behavior
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\FileRepository\ftdiport.inf_amd64_02e6e8b10f1ee812\amd64Jump to behavior
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\drvstore.tmpJump to behavior
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\inf\oem5.infJump to behavior
Source: C:\Windows\System32\drvinst.exeFile deleted: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\SETA024.tmpJump to behavior
Source: C:\Users\user\Desktop\CDM212364_Setup.exeCode function: 0_2_009C3F220_2_009C3F22
Source: C:\Users\user\Desktop\CDM212364_Setup.exeCode function: 0_2_009C11FC0_2_009C11FC
Source: C:\Users\user\Desktop\CDM212364_Setup.exeCode function: 0_2_009C2A180_2_009C2A18
Source: C:\Users\user\Desktop\CDM212364_Setup.exeCode function: 0_2_009C11140_2_009C1114
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeCode function: 1_2_00403ABC1_2_00403ABC
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeCode function: String function: 00404084 appears 38 times
Source: SETAA3D.tmp.2.drStatic PE information: Number of sections : 11 > 10
Source: SETACA7.tmp.6.drStatic PE information: Number of sections : 11 > 10
Source: ftser2k.sys.0.drStatic PE information: Number of sections : 11 > 10
Source: CDM212364_Setup.exe, 00000000.00000003.1683012927.0000000004BA0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFTD2XX.LIBJ vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1676851182.00000000033B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFTBUSUI.dllJ vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1682742092.0000000004B80000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFTD2XX.LIBJ vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1676912429.0000000003520000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFTBUSUI.dllJ vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1677168708.00000000033D0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameftcserco.dllJ vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1677989063.0000000003520000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFTD2XX.DLLJ vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1682344066.0000000004B40000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameftserui2.dllJ vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1679198359.0000000003630000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameftserui2.dllJ vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1680154796.0000000003690000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDPInst.exed" vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1680154796.0000000003690000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDPInst.exe vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1680154796.0000000003690000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDPInst.exe|. vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1680154796.0000000003690000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDPInst.exex, vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1680154796.0000000003690000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDPInst.exep( vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1680154796.0000000003690000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDPInst.exev+ vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1680154796.0000000003690000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDPInst.exel& vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1680154796.0000000003690000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDPInst.exef# vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1680154796.0000000003690000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDPInst.exe~/ vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1679764173.0000000003670000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDPInst.exed" vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1679764173.0000000003670000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDPInst.exe vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1679764173.0000000003670000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDPInst.exe|. vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1679764173.0000000003670000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDPInst.exex, vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1679764173.0000000003670000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDPInst.exep( vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1679764173.0000000003670000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDPInst.exev+ vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1679764173.0000000003670000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDPInst.exel& vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1679764173.0000000003670000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDPInst.exef# vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1679764173.0000000003670000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDPInst.exe~/ vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1678662641.0000000003610000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFTSER2KJ vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1681529752.00000000037B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFTD2XX.DLLJ vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1681055575.0000000003770000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFTBUSUI.dllJ vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1681271823.0000000003790000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameftcserco.dllJ vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1682178707.0000000004B20000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFTSER2KJ vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1677196163.00000000035D0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameftcserco.dllJ vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1681830936.0000000004AE0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFTDIBUSJ vs CDM212364_Setup.exe
Source: CDM212364_Setup.exe, 00000000.00000003.1678178038.00000000035D0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameFTDIBUSJ vs CDM212364_Setup.exe
Source: CDM212364_Setup.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: ftdibus.sysBinary string: \Device\USBFDO-USB#ROOT_HUB20#\DosDevices\
Source: ftdibus.sysBinary string: CompositeDriverFTDIBUS\VID_PID_FTDIBUS\COMPORT&VID_&PID_&MI_\Device\Ftdiport_Com_0\DosDevices\Ftdiport_Com_0FTDIBUS\0000\REGISTRY\Machine\System\CurrentControlSet\SERVICES\FTDIBUS\ParametersRetryResetCountMaxDevsLocIdsNULLConfigDataSSIdleTimeoutIN
Source: ftdibus.sysBinary string: \Device\Ftdiport_Com_0
Source: ftser2k.sysBinary string: \Device\VCP
Source: ftdibus.sysBinary string: \REGISTRY\Machine\System\CurrentControlSet\Control\usbflagsIgnoreHWSerNum\COMDeviceDescPortName ()FriendlyNameENUMEnum\\0000ConfigFlags\REGISTRY\Machine\System\CurrentControlSet\Enum\\Control\REGISTRY\Machine\System\CurrentControlSet\Hardware Profiles\Current\System\CurrentControlSet\Enum\\Device ParametersActiveServiceCSConfigFlags\Device\USBFDO-USB#ROOT_HUB20#\DosDevices\SymbolicNameIRP_MN_CHANGE_SINGLE_INSTANCEIRP_MN_CHANGE_SINGLE_ITEMIRP_MN_DISABLE_COLLECTIONIRP_MN_DISABLE_EVENTSIRP_MN_ENABLE_COLLECTION
Source: ftser2k.sysBinary string: \Device\VCPIRP_MN_????UnknownRelations
Source: classification engineClassification label: clean6.winEXE@7/82@0/0
Source: C:\Users\user\Desktop\CDM212364_Setup.exeCode function: 0_2_009C6130 ReadFile,GetLastError,GetLastError,FormatMessageA,wsprintfA,MessageBoxA,0_2_009C6130
Source: C:\Users\user\Desktop\CDM212364_Setup.exeCode function: 0_2_009C6B05 lstrcpyA,CoInitialize,CoCreateInstance,MultiByteToWideChar,CoUninitialize,0_2_009C6B05
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeMutant created: \Sessions\1\BaseNamedObjects\Global\DPINST_LOG_SCROLLER_MUTEX
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeMutant created: NULL
Source: C:\Users\user\Desktop\CDM212364_Setup.exeFile created: C:\Users\user\AppData\Local\Temp\FE5EB6.tmpJump to behavior
Source: CDM212364_Setup.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\CDM212364_Setup.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: dpinst-amd64.exeString found in binary or memory: Could not re-add '%s' to reference list of driver store entry '%s'
Source: dpinst-amd64.exeString found in binary or memory: Successfully re-added '%s' to reference list of driver store entry '%s'
Source: dpinst-amd64.exeString found in binary or memory: Install option set: Suppress pre-install of Plug and Play drivers if no matching devices are present.
Source: dpinst-amd64.exeString found in binary or memory: Error 0x%X - Could not delete service info key for '%ws', even though there are no more DIFx-installed driver stores using this se
Source: dpinst-amd64.exeString found in binary or memory: Some post-install cleanup tasks failed. Error code is 0x%X
Source: dpinst-amd64.exeString found in binary or memory: During undo of install, we failed to re-install the driver. Error code 0x%X
Source: dpinst-amd64.exeString found in binary or memory: ,Software\Policies\Microsoft\Windows\DriverInstall\RestrictionsAllowUserDeviceClasses DummyWindowWindow_CaptionRunAs****************************************Failed to get command line.Command Line: '%s'DPInst is a multi-lingual binary.DPInst is not multi-lingual.The module name was too long.There was an error getting the module name.Failed to initialize MUI or Multi-Lingual language support.Title: %s.Option to dump log info on console not available under Windows 2000. Ignoring the option.Option set: dumping log info to console.Failed to set option to dump log info to console.Failed to set the current working directory to: '%ws'Current working directory: '%ws'Returning with code 0x%XRunning on path '%ws'Invalid path '%ws'No valid '%s' file provided.Install option refused: will not force install if driver is not better because of command to prompt if driver is not better.Install option refused: Can't run in Quiet mode, command to prompt user in case driver is not better is set!Install option refused: Can't run in Quiet mode, UI will be shown because a EULA is required and not suppressed!Install option refused: 'Scan Hardware Display' will be ignored because not running in 'Scan Hardware Mode'.Install option refused: can't test wizard because quiet mode enabled.Install option set: Suppressing Wizard but no OS popups.Install option set: Running in quiet mode. Suppressing Wizard and OS popups.Install option set: legacy mode on.Install option set: Suppressing EULA.Install option set: create user uninstall script file '%s'.Install option set: Prompt if driver is not better.Install option set: Force install if driver is not better.Install option set: Suppress pre-install of Plug and Play drivers if no matching devices are present.Install option set: Suppress Add or Remove Programs entries.Install option set: Install all driver packages or none.Install option set: uninstall will be set to delete driver binaries.Install option set: test wizard cycling through all finish pages.Install option set: using scan hardware display mode. Will only display successfull installs or failures.Uninstall option set: Suppressing Wizard but no OS popups.Uninstall option set: Running in quiet mode. Suppressing Wizard and OS popups.Uninstall command: uninstall Inf '%ws'Uninstall command: uninstall script '%ws'Uninstall option set: if driver was installed, will make best effort to delete driver binaries.User cancelled uninstall.Starting uninstall of '%ws'Starting uninstall of script '%ws'Machine has to be rebooted to complete uninstall.Uninstall script self-reference. Script '%s' already uninstalled.Invalid uninstall script file: '%s'Uninstall script file '%s' not found.Failed to delete 'Add or Remove Programs' entry '%s'.User cancelled uninstall of driver package '%s'ERROR: Access denied to Non-admin user to install/uninstall driver package.DPInst.exe not supported on current OS.User UI Language is 0x%X.Will enable language 0x%X although not listed in descriptor.Current confi
Source: dpinst-amd64.exeString found in binary or memory: Pronto all'uso/Installazione non riuscita (driver non firmato)0Installazione non riuscita (certificato scaduto)
Source: dpinst-amd64.exeString found in binary or memory: re.4Guiden Installation af enhedsdriver blev annulleret.-Installationen mislykkedes (ugyldig signatur)eEs wird bereits der beste Ger
Source: dpinst-amd64.exeString found in binary or memory: stata rilevata nessuna periferica da aggiornare.1Non necessario (nessuna periferica da aggiornare)8Annullamento installazione driver in corso. Attendere...5Installazione guidata driver di periferica annullata.-Installazione non riuscita (firma non valida):
Source: dpinst-amd64.exeString found in binary or memory: FileDescriptionTreiberpaket-Installationsprogramm(
Source: dpinst-amd64.exeString found in binary or memory: ProductNameTreiberpaket-Installationsprogramm (DPInst),
Source: dpinst-x86.exeString found in binary or memory: ERROR: (Error code 0x%X.) (Error code 0x%X: %s)%02d/%02d/%04d %02d:%02d:%02dNon-Interactive Windows StationInteractive Windows StationFailed to check if running under Local System AccountRunning under Local System AccountArchitecture: X86.Suite: 0x%04x, Product Type: %uService Pack: %u.%uPlatform ID: %u (%s)9XNTVersion: %u.%u.%u %sProduct Version %s.****************************************Failed to delete 'Add or Remove Programs' entry '%s'.User cancelled uninstall of driver package '%s'Access denied to Non-admin user to install/uninstall driver package.System requires 64-bit version of DPInst.exe.DPInst.exe not supported on current OS.Requested language 0x%X is not supported on current systemDescriptor (DPInst.xml) does not support requested language 0x%X.Will read descriptor(DPInst.xml) elements in language 0x%X, but some or all of the other elements might be in the UI default language 0x%X.Will read descriptor(DPInst.xml) elements in language 0x%X.Running with language 0x%X.Current configuration does not support UI language 0x%X.Will enable language 0x%X although not listed in descriptor.User UI Language is 0x%X.Invalid path '%ws'Install option set: using scan hardware display mode. Will only display successfull installs or failures.Install option set: test wizard cycling through all finish pages.Install option set: uninstall will be set to delete driver binaries.Install option set: Install all driver packages or none.Install option set: Suppress Add or Remove Programs entries.Install option set: Suppress pre-install of Plug and Play drivers if no matching devices are present.Install option set: Force install if driver is not better.Install option set: Prompt if driver is not better.Install option set: create user uninstall script file '%s'.Install option set: Suppressing EULA.Install option set: legacy mode on.Install option set: Running in quiet mode. Suppressing Wizard and OS popups.Install option set: Suppressing Wizard but no OS popups.Install option refused: can't test wizard because quiet mode enabled.Install option refused: 'Scan Hardware Display' will be ignored because not running in 'Scan Hardware Mode'.Install option refused: Can't run in Quiet mode, UI will be shown because a EULA is required and not suppressed!Install option refused: Can't run in Quiet mode, command to prompt user in case driver is not better is set!Install option refused: will not force install if driver is not better because of command to prompt if driver is not better.No valid '%s' file provided.Running on path '%ws'Invalid uninstall script file '%s', invalid entry '%s'.Invalid uninstall script file '%s', missing hash after ID entry.Invalid uninstall script file '%s', missing path after USCRIPT entry.Invalid uninstall script file '%s', missing path after INF entry.IDUSCRIPTINFUninstall script self-reference. Script '%s' already uninstalled.Invalid uninstall script file: '%s'Machine has to be rebooted to complete uninstall.Starting uninstall of script '%ws'St
Source: dpinst-x86.exeString found in binary or memory: @Error encountered while adding reference of installer '%s' to driver storeError encountered while setting installer information for driver storeUnknown ProductUnknown ManufacturerUnknown Display NameParameter is NULL.RETURN: DriverPackageGetPathW (0x%X)ENTER: DriverPackageGetPathWOne or more files referenced by '%s' cannot be found in the package.Unsigned driver. Possibly rejected by user.Invalid signature. Possibly rejected by user.Could not delete driver store entry '%s'.Failed to add catalog file for '%s'.Driver package is already preinstalled '%s'.The driver package type of %s is not supported.Could not remove driver store entry '%s'.Driver Store entry '%s' removed.Successfully removed '%s' from reference list of driver store entry '%s'Implementation error: Invalid Type %u.Installing INF file '%s' of Type %u.Could not get name of the inf file.Could not remove '%s' from reference list of driver store entry '%s'Could not get Type property for driver package.Installation completed with code 0x%X.Can't repair driver packages from the INF directory.The INSTALLERINFO structure passed in by the caller was non-NULL, but one or more fields of the structure was NULL or an empty string.Successfully deleted properties for driver store entry '%s'.Could not delete properties for driver store entry '%s'.Successfully deleted driver store entry '%s'.Installing INF file '%s' (Plug and Play).Can't preinstall and then install driver packages from the INF directory.DRIVER_PACKAGE_LEGACY_MODE flag set but not supported on Plug and Play driver on VISTA. Flag will be ignored.Successfully re-added '%s' to reference list of driver store entry '%s'Could not re-add '%s' to reference list of driver store entry '%s'Uninstall completed.Uninstall: Invalid Driver Store entry '%s'.Driver store entry '%s' removed.Best effort to delete driver package files copied to system...Error occurred while uninstalling driver package '%s'Uninstalling driver package %s...Could not remove the reference of driver '%s' from driver storeWill not uninstall because other Application depend on this package %s.Could not get Type property for driver package '%s'.Could not get INF PATH property for driver package '%s'.No driver store entry for '%s' found.An error occurred while uninstalling driver package '%s'Cannot uninstall inbox driver package '%s'Could not verify if there are any applications that are still dependent on driver '%s'.Could not remove the reference of application '%s' from driver '%s'RETURN: DriverPackagePreinstallW (0x%X)%s is preinstalled.ENTER: DriverPackagePreinstallWRETURN: DriverPackageInstallW (0x%X)ENTER: DriverPackageInstallWRETURN: DriverPackageUninstallW (0x%X)ENTER: DriverPackageUninstallWl
Source: dpinst-x86.exeString found in binary or memory: Pronto all'uso/Installazione non riuscita (driver non firmato)0Installazione non riuscita (certificato scaduto)
Source: dpinst-x86.exeString found in binary or memory: re.4Guiden Installation af enhedsdriver blev annulleret.-Installationen mislykkedes (ugyldig signatur)eEs wird bereits der beste Ger
Source: dpinst-x86.exeString found in binary or memory: stata rilevata nessuna periferica da aggiornare.1Non necessario (nessuna periferica da aggiornare)8Annullamento installazione driver in corso. Attendere...5Installazione guidata driver di periferica annullata.-Installazione non riuscita (firma non valida):
Source: dpinst-x86.exeString found in binary or memory: FileDescriptionTreiberpaket-Installationsprogramm(
Source: dpinst-x86.exeString found in binary or memory: ProductNameTreiberpaket-Installationsprogramm (DPInst),
Source: C:\Users\user\Desktop\CDM212364_Setup.exeFile read: C:\Users\user\Desktop\CDM212364_Setup.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\CDM212364_Setup.exe "C:\Users\user\Desktop\CDM212364_Setup.exe"
Source: C:\Users\user\Desktop\CDM212364_Setup.exeProcess created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exe C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exe
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeProcess created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe /sa
Source: unknownProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\ftdibus.inf" "9" "4aa35cc23" "0000000000000150" "WinSta0\Default" "0000000000000160" "208" "c:\users\user\appdata\local\temp\ftdi-driver"
Source: unknownProcess created: C:\Windows\System32\drvinst.exe DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\ftdiport.inf" "9" "47472827f" "0000000000000160" "WinSta0\Default" "000000000000015C" "208" "c:\users\user\appdata\local\temp\ftdi-driver"
Source: C:\Users\user\Desktop\CDM212364_Setup.exeProcess created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exe C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeProcess created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe /saJump to behavior
Source: C:\Users\user\Desktop\CDM212364_Setup.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\CDM212364_Setup.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\CDM212364_Setup.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\CDM212364_Setup.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\CDM212364_Setup.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\CDM212364_Setup.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\CDM212364_Setup.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\CDM212364_Setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\CDM212364_Setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\CDM212364_Setup.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\CDM212364_Setup.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\CDM212364_Setup.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeSection loaded: msxml3.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeSection loaded: drvstore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeSection loaded: devrtl.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeSection loaded: spinf.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeSection loaded: devobj.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: devrtl.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: drvstore.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\drvinst.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{2933BF90-7B36-11D2-B20E-00C04F983E60}\InProcServer32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeWindow found: window name: SysTabControl32Jump to behavior
Source: C:\Users\user\Desktop\CDM212364_Setup.exeAutomated click: Extract
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeAutomated click: I accept this agreement
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeAutomated click: Next >
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeAutomated click: I accept this agreement
Source: CDM212364_Setup.exeStatic PE information: certificate valid
Source: CDM212364_Setup.exeStatic file information: File size 2264632 > 1048576
Source: CDM212364_Setup.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: c:\Jenkins2\workspace\J171-Windows-D2XX-VCP-VS2013\FTBUSUI\x64\Release\FTBUSUI.pdb source: ftbusui.dll
Source: Binary string: c:\Jenkins2\workspace\J171-Windows-D2XX-VCP-VS2013\FTBUSUI\x64\Release\FTBUSUI.pdb~~ source: ftbusui.dll
Source: Binary string: c:\Jenkins2\workspace\J171-Windows-D2XX-VCP-VS2013\FTBUSUI\Release\FTBUSUI.pdb source: ftbusui.dll
Source: Binary string: d:\wm\minkernel\crts\crtw32\misc\nt\vc110.pdb source: ftd2xx.lib
Source: Binary string: c:\Jenkins2\workspace\J171-Windows-D2XX-VCP-VS2015\x64\Release\FTDIBUS.pdb source: ftdibus.sys
Source: Binary string: c:\Jenkins2\workspace\J171-Windows-D2XX-VCP-VS2015\Release\FTSER2K.pdb source: ftser2k.sys
Source: Binary string: c:\Jenkins2\workspace\J171-Windows-D2XX-VCP-VS2013\FTLang\x64\Release\FTLang.pdb source: ftlang.dll
Source: Binary string: c:\jenkins2\worksp~1\j11a5a~1\pp\ftserui2\objfre_wnet_x86\i386\ftserui2.pdb source: ftserui2.dll
Source: Binary string: c:\Jenkins2\workspace\J171-Windows-D2XX-VCP-VS2015\x64\Release\FTSER2K.pdb source: ftser2k.sys
Source: Binary string: c:\Jenkins2\workspace\J171-Windows-D2XX-VCP-VS2015\x64\Release\FTD2XX.pdb source: ftd2xx64.dll
Source: Binary string: c:\Jenkins2\workspace\J171-Windows-D2XX-VCP-VS2013\FTLang\Release\FTLang.pdb source: ftlang.dll
Source: Binary string: d:\8180\enduser\databaseaccess\src\mdac\odbc\core\cplib\vc110.pdb source: ftd2xx.lib
Source: Binary string: c:\jenkins2\worksp~1\j11a5a~1\coinst\ftcserco\objfre_wnet_amd64\amd64\ftcserco.pdbH source: ftcserco.dll
Source: Binary string: c:\jenkins2\worksp~1\j11a5a~1\coinst\ftcserco\objfre_wnet_amd64\amd64\ftcserco.pdb source: ftcserco.dll
Source: Binary string: c:\Jenkins2\workspace\J171-Windows-D2XX-VCP-VS2015\Release\FTD2XX.pdb source: ftd2xx.dll
Source: Binary string: DpInst.pdbH source: dpinst-amd64.exe
Source: Binary string: c:\Jenkins2\workspace\J171-Windows-D2XX-VCP-VS2015\Release\FTDIBUS.pdb source: ftdibus.sys
Source: Binary string: c:\jenkins2\worksp~1\j11a5a~1\pp\ftserui2\objfre_wnet_amd64\amd64\ftserui2.pdbH source: ftserui2.dll
Source: Binary string: c:\jenkins2\worksp~1\j11a5a~1\coinst\ftcserco\objfre_wnet_x86\i386\ftcserco.pdb source: ftcserco.dll
Source: Binary string: c:\jenkins2\worksp~1\j11a5a~1\pp\ftserui2\objfre_wnet_amd64\amd64\ftserui2.pdb source: ftserui2.dll
Source: Binary string: DpInst.pdb source: dpinst-amd64.exe, dpinst-x86.exe
Source: Binary string: DpInst.pdbp source: dpinst-x86.exe
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeCode function: 1_2_004098C4 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,1_2_004098C4
Source: ftd2xx64.dll.0.drStatic PE information: section name: .00cfg
Source: ftser2k.sys.0.drStatic PE information: section name: PAGESRP0
Source: ftser2k.sys.0.drStatic PE information: section name: PAGESER
Source: ftser2k.sys0.0.drStatic PE information: section name: PAGESRP0
Source: ftser2k.sys0.0.drStatic PE information: section name: PAGESER
Source: SETAA3D.tmp.2.drStatic PE information: section name: PAGESRP0
Source: SETAA3D.tmp.2.drStatic PE information: section name: PAGESER
Source: SET948B.tmp.2.drStatic PE information: section name: .00cfg
Source: SETA024.tmp.4.drStatic PE information: section name: .00cfg
Source: SETACA7.tmp.6.drStatic PE information: section name: PAGESRP0
Source: SETACA7.tmp.6.drStatic PE information: section name: PAGESER
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeCode function: 1_2_004040C9 push ecx; ret 1_2_004040DC
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeFile created: C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\amd64\ftcserco.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeFile created: C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\SET951B.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\ftserui2.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeFile created: C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\amd64\SETAA4E.tmpJump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeFile created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftbusui.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\ftdibus.sys (copy)Jump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeFile created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeFile created: C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\ftd2xx64.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeFile created: C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\SET94DA.tmpJump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeFile created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftbusui.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\ftd2xx64.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeFile created: C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\ftdibus.sys (copy)Jump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeFile created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftserui2.dllJump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeFile created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftser2k.sysJump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeFile created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeFile created: C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\amd64\SETAA6E.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\ftbusui.dll (copy)Jump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeFile created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftd2xx64.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\SETA064.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\SETACE7.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeFile created: C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\i386\SET9721.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\i386\ftd2xx.dll (copy)Jump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeFile created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-x86.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeFile created: C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\amd64\SETAA3D.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\SETA075.tmpJump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeFile created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftcserco.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\FTLang.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeFile created: C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\ftbusui.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeFile created: C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\amd64\ftserui2.dll (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\SETA044.tmpJump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeFile created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftserui2.dllJump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeFile created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftcserco.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\ftcserco.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeFile created: C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\i386\ftd2xx.dll (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\SETACA7.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeFile created: C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\SET94FA.tmpJump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeFile created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftlang.dllJump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeFile created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftser2k.sysJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\i386\SETA0B6.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeFile created: C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\FTLang.dll (copy)Jump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeFile created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftlang.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\ftser2k.sys (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeFile created: C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\amd64\ftser2k.sys (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\SETACC7.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\SETA024.tmpJump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeFile created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftdibus.sysJump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeFile created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftdibus.sysJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeFile created: C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\SET948B.tmpJump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeFile created: C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftd2xx.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\ftbusui.dll (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\ftserui2.dll (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\SETA064.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\SETACE7.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\i386\SETA0B6.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\i386\ftd2xx.dll (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\ftser2k.sys (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\SETA044.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\ftdibus.sys (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\SETACC7.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\SETA075.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\ftd2xx64.dll (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\SETA024.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\ftcserco.dll (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\FTLang.dll (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeFile created: C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\SETACA7.tmpJump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeCode function: 0_2_009C5D38 lstrlenA,lstrcpyA,GetPrivateProfileStringA,VirtualAlloc,lstrcatA,lstrcatA,ExpandEnvironmentStringsA,lstrcpyA,lstrcpyA,GetCurrentDirectoryA,lstrlenA,lstrcatA,GetTempPathA,lstrcpyA,RegOpenKeyExA,RegQueryValueExA,RegCloseKey,GetSystemDirectoryA,lstrcpyA,lstrcatA,lstrcatA,lstrcpyA,lstrlenA,lstrcpyA,0_2_009C5D38
Source: C:\Users\user\Desktop\CDM212364_Setup.exeCode function: 0_2_009C5344 lstrlenA,GetTempPathA,GetCurrentDirectoryA,GetCurrentProcess,GetModuleFileNameA,CreateFileA,SetFilePointer,SetFilePointer,ReadFile,SetFilePointer,ReadFile,SetFilePointer,ReadFile,SetFilePointer,VirtualAlloc,ReadFile,GetTempPathA,GetTempFileNameA,CreateFileA,WriteFile,CloseHandle,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,wsprintfA,wsprintfA,GetPrivateProfileStringA,lstrlenA,lstrlenA,wsprintfA,GetPrivateProfileStringA,lstrlenA,lstrlenA,lstrcpyA,lstrcpyA,lstrcpyA,lstrcpyA,lstrcpyA,lstrcpyA,lstrcpyA,VirtualFree,DeleteFileA,0_2_009C5344
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\drvinst.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\CDM212364_Setup.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-2387
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\amd64\ftcserco.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\ftbusui.dll (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\ftserui2.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\SET951B.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\amd64\SETAA4E.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\amd64\ftserui2.dll (copy)Jump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftbusui.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\SETA044.tmpJump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftserui2.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\ftdibus.sys (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\ftd2xx64.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\SET94DA.tmpJump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftbusui.dllJump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftcserco.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\ftd2xx64.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\ftdibus.sys (copy)Jump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftserui2.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\ftcserco.dll (copy)Jump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftser2k.sysJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\i386\ftd2xx.dll (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\SETACA7.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\amd64\SETAA6E.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\SET94FA.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\ftbusui.dll (copy)Jump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftd2xx64.dllJump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftser2k.sysJump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftlang.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\SETACE7.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\SETA064.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\i386\SETA0B6.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\FTLang.dll (copy)Jump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\i386\SET9721.tmpJump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftlang.dllJump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\ftser2k.sys (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\i386\ftd2xx.dll (copy)Jump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-x86.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\amd64\SETAA3D.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\amd64\ftser2k.sys (copy)Jump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\amd64\SETACC7.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\SETA075.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\SETA024.tmpJump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftcserco.dllJump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftdibus.sysJump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftdibus.sysJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\amd64\SET948B.tmpJump to dropped file
Source: C:\Windows\System32\drvinst.exeDropped PE file which has not been started: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\amd64\FTLang.dll (copy)Jump to dropped file
Source: C:\Users\user\Desktop\CDM212364_Setup.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftd2xx.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_1-9404
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_1-7602
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeAPI coverage: 9.2 %
Source: setupapi.dev.log.2.drBinary or memory string: sig: Key = vmci.inf
Source: setupapi.dev.log.2.drBinary or memory string: dvs: {Driver Setup Import Driver Package: C:\Windows\SoftwareDistribution\Download\Install\vmci.inf} 11:48:39.178
Source: setupapi.dev.log.2.drBinary or memory string: idb: Activating driver package 'vmci.inf_amd64_68ed49469341f563'.
Source: setupapi.dev.log.2.drBinary or memory string: cpy: Published 'vmci.inf_amd64_68ed49469341f563\vmci.inf' to 'oem2.inf'.
Source: setupapi.dev.log.2.drBinary or memory string: inf: {Add Service: vmci}
Source: setupapi.dev.log.2.drBinary or memory string: inf: Created new service 'vmci'.
Source: setupapi.dev.log.2.drBinary or memory string: inf: Display Name = VMware VMCI Bus Driver
Source: setupapi.dev.log.2.drBinary or memory string: inf: Service Name = vmci
Source: setupapi.dev.log.2.drBinary or memory string: idb: {Publish Driver Package: C:\Windows\System32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563\vmci.inf} 11:48:39.707
Source: setupapi.dev.log.2.drBinary or memory string: idb: Indexed 4 device IDs for 'vmci.inf_amd64_68ed49469341f563'.
Source: setupapi.dev.log.2.drBinary or memory string: utl: Driver INF - oem2.inf (C:\Windows\System32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563\vmci.inf)
Source: setupapi.dev.log.2.drBinary or memory string: sto: {Configure Driver Package: C:\Windows\System32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563\vmci.inf}
Source: setupapi.dev.log.2.drBinary or memory string: sto: {Stage Driver Package: C:\Windows\SoftwareDistribution\Download\Install\vmci.inf} 11:48:39.634
Source: setupapi.dev.log.2.drBinary or memory string: sig: Installed catalog 'vmci.cat' as 'oem2.cat'.
Source: setupapi.dev.log.2.drBinary or memory string: cpy: Target Path = C:\Windows\System32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563
Source: setupapi.dev.log.2.drBinary or memory string: flq: Copying 'C:\Windows\SoftwareDistribution\Download\Install\vmci.inf' to 'C:\Windows\System32\DriverStore\Temp\{5a5b2f36-11ff-5a4a-b3b1-6fc00ed67f26}\vmci.inf'.
Source: setupapi.dev.log.2.drBinary or memory string: sig: FilePath = C:\Windows\System32\DriverStore\Temp\{5a5b2f36-11ff-5a4a-b3b1-6fc00ed67f26}\vmci.inf
Source: setupapi.dev.log.2.drBinary or memory string: inf: {Configure Driver Configuration: vmci.install.x64.NT}
Source: setupapi.dev.log.2.drBinary or memory string: idb: Created driver package object 'vmci.inf_amd64_68ed49469341f563' in SYSTEM database node.
Source: setupapi.dev.log.2.drBinary or memory string: inf: Image Path = System32\drivers\vmci.sys
Source: setupapi.dev.log.2.drBinary or memory string: flq: Copying 'C:\Windows\SoftwareDistribution\Download\Install\vmci.cat' to 'C:\Windows\System32\DriverStore\Temp\{5a5b2f36-11ff-5a4a-b3b1-6fc00ed67f26}\vmci.cat'.
Source: setupapi.dev.log.2.drBinary or memory string: sig: Catalog = C:\Windows\System32\DriverStore\Temp\{5a5b2f36-11ff-5a4a-b3b1-6fc00ed67f26}\vmci.cat
Source: setupapi.dev.log.2.drBinary or memory string: inf: Section Name = vmci.install.x64.NT
Source: setupapi.dev.log.2.drBinary or memory string: flq: Copying 'C:\Windows\SoftwareDistribution\Download\Install\vmci.sys' to 'C:\Windows\System32\DriverStore\Temp\{5a5b2f36-11ff-5a4a-b3b1-6fc00ed67f26}\vmci.sys'.
Source: setupapi.dev.log.2.drBinary or memory string: idb: Registered driver package 'vmci.inf_amd64_68ed49469341f563' with 'oem2.inf'.
Source: setupapi.dev.log.2.drBinary or memory string: inf: Driver package 'vmci.inf' is configurable.
Source: setupapi.dev.log.2.drBinary or memory string: inf: {Configure Driver: VMware VMCI Bus Device}
Source: setupapi.dev.log.2.drBinary or memory string: inf: {Query Configurability: C:\Windows\SoftwareDistribution\Download\Install\vmci.inf} 11:48:39.636
Source: setupapi.dev.log.2.drBinary or memory string: sto: {Core Driver Package Import: vmci.inf_amd64_68ed49469341f563} 11:48:39.704
Source: setupapi.dev.log.2.drBinary or memory string: idb: {Register Driver Package: C:\Windows\System32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563\vmci.inf} 11:48:39.707
Source: setupapi.dev.log.2.drBinary or memory string: flq: Copying 'C:\Windows\System32\DriverStore\FileRepository\vmci.inf_amd64_68ed49469341f563\vmci.sys' to 'C:\Windows\System32\drivers\vmci.sys'.
Source: C:\Users\user\Desktop\CDM212364_Setup.exeAPI call chain: ExitProcess graph end nodegraph_0-2429
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeCode function: 1_2_0040427B _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0040427B
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeCode function: 1_2_004098C4 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,1_2_004098C4
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeCode function: 1_2_00401B10 _memset,_memset,GetProcessHeap,_wcslen,HeapAlloc,CreateProcessW,WaitForSingleObject,GetExitCodeProcess,GetExitCodeThread,CloseHandle,CloseHandle,HeapFree,1_2_00401B10
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeCode function: 1_2_0040851F SetUnhandledExceptionFilter,1_2_0040851F
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeCode function: 1_2_0040427B _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0040427B
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeCode function: 1_2_00405608 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00405608
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeCode function: 1_2_00401E95 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00401E95
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeCode function: GetLocaleInfoA,1_2_0041051F
Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{f899b98f-10ca-f24e-afd1-784cf97872a3}\ftdibus.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\drvinst.exeQueries volume information: C:\Windows\System32\DriverStore\Temp\{bd487de8-903b-3d4c-bbd6-993dcd855b21}\ftdiport.cat VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeCode function: 1_2_00402EE7 GetSystemTimeAsFileTime,__aulldiv,1_2_00402EE7
Source: C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exeCode function: 1_2_0040D6BF __lock,__get_daylight,__invoke_watson,__get_daylight,__invoke_watson,__get_daylight,__invoke_watson,____lc_codepage_func,__getenv_helper_nolock,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,__invoke_watson,__invoke_watson,1_2_0040D6BF
Source: C:\Windows\System32\drvinst.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
Windows Service
1
Windows Service
3
Masquerading
OS Credential Dumping2
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts3
Native API
1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
LSASS Memory21
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Process Injection
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS23
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
File Deletion
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
CDM212364_Setup.exe0%ReversingLabs
CDM212364_Setup.exe0%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftbusui.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftbusui.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftcserco.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftcserco.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftd2xx64.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftd2xx64.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftdibus.sys0%ReversingLabs
C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftdibus.sys0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftlang.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftlang.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftser2k.sys0%ReversingLabs
C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftser2k.sys0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftserui2.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\FTDI-Driver\amd64\ftserui2.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exe0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-x86.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-x86.exe0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftbusui.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftbusui.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftcserco.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftcserco.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftd2xx.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftd2xx.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftdibus.sys0%ReversingLabs
C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftdibus.sys0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftlang.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftlang.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftser2k.sys0%ReversingLabs
C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftser2k.sys0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftserui2.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\FTDI-Driver\i386\ftserui2.dll0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\amd64\SETAA3D.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\amd64\SETAA3D.tmp0%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\amd64\SETAA4E.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\amd64\SETAA4E.tmp0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.disoriented.com/0%VirustotalBrowse
http://www.disoriented.com/openConfirm0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.disoriented.com(CDM212364_Setup.exefalse
    low
    http://www.disoriented.com/CDM212364_Setup.exefalseunknown
    http://www.disoriented.com/openConfirmCDM212364_Setup.exefalseunknown
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1430184
    Start date and time:2024-04-23 09:20:14 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 7m 10s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:10
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:CDM212364_Setup.exe
    Detection:CLEAN
    Classification:clean6.winEXE@7/82@0/0
    EGA Information:
    • Successful, ratio: 66.7%
    HCA Information:Failed
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target dpinst-amd64.exe, PID 7372 because there are no executed function
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtSetInformationFile calls found.
    No simulations
    No context
    No context
    No context
    No context
    No context
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:ASCII text
    Category:dropped
    Size (bytes):275
    Entropy (8bit):5.280241042166445
    Encrypted:false
    SSDEEP:6:eWlBB9sc29JfD9scWXK1ezbPqbrZEucMiRgOXLvEP:e+YcKfycQBPPU9iTXbg
    MD5:50F2BBF24A14BE4E408F94BC3849C38D
    SHA1:CA3512C6847A2B82A7DB2E2599EF7E5F7D18423D
    SHA-256:D99B9414E6B4C20127BD62BB105010BF980A5F1C2922B1D900629F498473095A
    SHA-512:0C341554D7891424BD4B4E96667F879589A1E76FDC58627AA813419D5E5F2127A218DD26F6F0F3328798D761D01B62CA84A961EEE112BCF124C9E6EFF72C298E
    Malicious:false
    Reputation:low
    Preview:[FE].Name=FTDI CDM Drivers.ZipSize=2184467.Exec=$temp$\FTDI-Driver\dp-chooser.exe.DefaultPath=$temp$\FTDI-Driver.Intro=Click 'Extract' to unpack version 2.12.36.4 of FTDI's Windows driver package and launch the installer..URL=www.ftdichip.com.Author=W.AutoExtract=1.Delete=1.
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:current ar archive
    Category:dropped
    Size (bytes):697006
    Entropy (8bit):5.53172072416843
    Encrypted:false
    SSDEEP:6144:BYIrAP1zgaVebdmSBP3AGGmj8OyLWbcbahChz9Tgn7KpXYXCMp3jw1bJGb/+8pa4:BYft+cg+JdHjzrsNl
    MD5:BA64A708FBF2A444D4E112A521805EDB
    SHA1:BEC9BEABCB47906500D4D59D5B086079CB9AFC22
    SHA-256:1121A0456624BCDF768C70FE73EA649741C70160E85EDB5007DE950D4C646A57
    SHA-512:CA1AE58D93070BE1DD840503C601A5F684D6B64D50CFB8F313D8F155004F423E532B1FB0F27BC1B03D793E094E36D39966FDE4FC30B060B542EC0B1640E57D8D
    Malicious:false
    Reputation:low
    Preview:!<arch>./ 1625488689 0 60971 `........L.........$...$.................p...p...........>...>.................z...z...........X...X...........,...,.................r...r...........L...L.........$...$.................d...d...........6...6.................x...x...........R...R...........,...,.................|...|...........X...X.................................h...h...........B...B........."..."...................d...d...........4...4.................n...n...........B...B...................~...~...........T...T...........*...*...................n...n...........@...@...................z...z...........N...N..........."..."...................f...f...........:...:...................|...|...........N...N...........*...*...................v...v...........T...T...........0...0...................h...h...........>...>...................~...~...........N...N...................................X...X..........."..."...................X...X....
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:current ar archive
    Category:dropped
    Size (bytes):574566
    Entropy (8bit):5.676338629359648
    Encrypted:false
    SSDEEP:6144:eEmHzfsK3HBcwMNs81YO5Gyry1VinPzud+kpJZft:eEUfsKJdy/6Vft
    MD5:9DFB51E72110BC90D87CF2D1E9610384
    SHA1:F1E199F43B49F3D0C42FA77043D4262449D00A1D
    SHA-256:D47E7AE0F5D17058677CDB84CF39F61EA2363020F9D01C14E91B9E71EA1598CA
    SHA-512:28D4B65D54E7F7190E661167C95674076ACA3A6E3A16051CBC8CD78AD5E04D8168B2C9AA926B208ABF2991649115B59A222ECC8738D1B93EAD5F2BA663C15056
    Malicious:false
    Reputation:low
    Preview:!<arch>./ 1625488758 0 66728 `............j...j...........X...X...........2...2...................r...r...........P...P...........6...6...................................d...d...........F...F...........&...&...................r...r...........L...L...........*...*...................|...|...........^...^...........F...F...........,...,...................z...z...........R...R...................................................j...j...........D...D.......... ... ... ... ... ... ...!f..!f..!...!..."@.."@.."..."...#...#...#...#...#...#...$d..$d..$...$...%B..%B..%...%...&"..&"..&...&...&...&...'h..'h..'...'...(B..(B..(...(...)...)...)...)...)...)...*j..*j..*...*...+J..+J..+...+...,&..,&..,...,...-...-...-t..-t..-...-....N...N........../2../2../.../...0...0...0...0...0...0...1p..1p..1...1...2T..2T..2...2...3*..3*..3...3...4...4...4r..4r..4...4...5P..5P..5...5...6&..6&..6...6...7...7...7n..7n..7...7...8J..8J..8...8...9...9...9...9...9...9...:\..:\..:...:...;2
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
    Category:dropped
    Size (bytes):168456
    Entropy (8bit):6.246480364593094
    Encrypted:false
    SSDEEP:3072:a+f/hrqTv5CgCn2p+WsDC7wQGXLCoeofwaqVcppnx1um75JXZ4:a+cTglYOQwQ4uoebaq4r5n4
    MD5:D79A5E34F684B547FA2F963DFCC15A21
    SHA1:81CCA464D4C8773B00F0A6F170F402FFE2D6A9C8
    SHA-256:4BBC0B301A7C5A6B1B73878CE3AEEB191F5FCEAC05835372142206D79AC81559
    SHA-512:E199F40F06F674EB8EC0E599FFF47A36D4495F4F2FFEE96CADFD00ABA9D5BB127F4461090322244EC973FCC2C8AE119FB12CE65AD585CCAA570115B7D957EA28
    Malicious:false
    Antivirus:
    • Antivirus: ReversingLabs, Detection: 0%
    • Antivirus: Virustotal, Detection: 0%, Browse
    Reputation:low
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............d...d...d...5v..d...5w..d...5H..d....\..d...d...d..|.v..d..|.K..d...6L..d...d...d..|.I..d..Rich.d..........PE..d......`.........." .....x...........5.................................................... .................. ......................P...h.......d.......@....p.......V...<..............8...........................0...p............................................text...Tw.......x.................. ..`.rdata...............|..............@..@.data...`:...0......................@....pdata.......p.......(..............@..@.rsrc...@............>..............@..@.reloc...............P..............@..B................................................................................................................................................................................................................................................................
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
    Category:dropped
    Size (bytes):75272
    Entropy (8bit):6.176258876551271
    Encrypted:false
    SSDEEP:1536:lxRShQnixg3RolUmf71kjy3JIO64l7Xuuy+fk+QI:lHShQnixg3RolUmzCy3JIO64l7euVfkQ
    MD5:AA69BF96E10F463082A0664B7A2E9FAE
    SHA1:D9CC34D613E8655FD7DA5293093E050D4D24AF5F
    SHA-256:C0224B9EF14365F6DDA96134CC77D978E69FBD61EFDADE6FD1EB676418C41023
    SHA-512:778599EEEE6C6F3F8C46E4BB774697E8528F03B30381BE3BA06298E23D1514039CC926E89AADAC2771074657A9478DCF60D4D92BDD69C7A5A094D59ED32F2993
    Malicious:false
    Antivirus:
    • Antivirus: ReversingLabs, Detection: 0%
    • Antivirus: Virustotal, Detection: 0%, Browse
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........l..............................u.......u.......u.............u.......u.......u.......u......Rich....................PE..d...i..`.........." .........6......<d.......................................@............@.........................................p...Q... ...x.... ..X................<...0..`...0................................................................................text............................... ..`.data....&..........................@....pdata..............................@..@.rsrc...X.... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:current ar archive
    Category:dropped
    Size (bytes):20260
    Entropy (8bit):5.168343134023792
    Encrypted:false
    SSDEEP:384:J8L2SzQdYpFvkSgIIMxim0e9D5tLvpc8Dj4ioCQtfc0j59jQ:J8L4dYpFvkSkqim0gDLvpbDcBCQtfR5i
    MD5:2C6C133941002E602D1AC6831CBB7368
    SHA1:A1006940F09C815F37F6B850532EF95EE9A9E538
    SHA-256:7C3A73D3A2441B460F03358BC8CC81E5F3FB43523BFA35E4EEF3BBE8BAD5788D
    SHA-512:0DEA1BC4AC315E27896E6D4AB5E52FA25ECD70116A88B5686331B99D1A303A4C5A70C69188A4FBEBD511B618BA9362459CAC84B69AE3CFCD72877ABB556FB464
    Malicious:false
    Preview:!<arch>./ 1625488698 0 4440 `.......#:..%`..&...7l..7l..'...'...8...8...NZ..NZ..6...6...:0..:0..;n..;n..=~..=~..?...?...>...>...(R..(R..@...@...(...(...4...4...=...=...86..86..A`..A`..4...4...?4..?4..34..34..5...5...<...<...<B..<B..B:..B:..M...M...>d..>d..7...7...7...7...@...@...3...3...;...;...0...0...A...A.../.../...8...8...N...N...+...+...,...,....&...&..................F...F...F...F...J|..J|..M...M...I...I...E...E...E...E...F...F...G...G...HH..HH..H...H...I*..I*..J...J...J...J...KX..KX..K...K...L6..L6..L...L...M...M...1v..1v..D...D...B...B...;...;...@...@...:...:...,...,...-...-...*l..*l..)...)...2T..2T..1...1...=...=...2...2...4...4...Gd..Gd..9...9...9d..9d..1...1...,...,.../`../`..-T..-T..5\..5\..+B..+B..*...*...)...)...)...)...C...C...C...C...Cz..Cz..DT..DT..64..64..04..04__IMPORT_DESCRIPTOR_FTD2XX.__NULL_IMPORT_DESCRIPTOR..FTD2XX_NULL_THUNK_DATA.FT_Open.__imp_FT_Open.FT_Close.__imp_FT_Close.FT_Read.__imp_FT_Read.FT_Write.__imp_FT_Write.FT_I
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
    Category:dropped
    Size (bytes):647616
    Entropy (8bit):5.8372260150013044
    Encrypted:false
    SSDEEP:12288:k2Ruad22Cu6+wfhZLF5lfDOHc/aFMmymLRt+i2:332xNfhZLF5lfDOHvMTmLRt2
    MD5:BEFBC1A8F6C2B8E143DDD97CCB6561B5
    SHA1:44B085C25026DABE6280C539F43DD0755FB28499
    SHA-256:774AF8B12C85D03562742ACDF222AF5E0432167BF107BA4B260757E4A5E36866
    SHA-512:A41B29E0493AD8ED57F55B8AA557AED460794894A5A53B057EEEF017A81F071A09DD298FB63EB0277344A9B69D790699131642106124320FB80BA87D1AD60DD4
    Malicious:false
    Antivirus:
    • Antivirus: ReversingLabs, Detection: 0%
    • Antivirus: Virustotal, Detection: 0%, Browse
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........(.H.I...I...I..p.J..I..p.H.VI..p.I..I.......I.......I.......I....p..I...I..GI..S....I..S....I..V.D..I...I,..I..S....I..Rich.I..................PE..d...;..`.........." .........D......3A.......................................0.......'....`.................................................@...d.......i....`...U.......!...........w..8............................x..................@............................text...J........................... ..`.rdata...k.......l..................@..@.data....:... ......................@....pdata..4_...`...`...$..............@..@.idata..............................@..@.gfids..............................@..@.00cfg..............................@..@.rsrc...i...........................@..@.reloc..P...........................@..B........................................................................................................
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:PE32+ executable (native) x86-64, for MS Windows
    Category:dropped
    Size (bytes):145192
    Entropy (8bit):6.492981302114183
    Encrypted:false
    SSDEEP:3072:np+Tpx5m9iS1H41Un58rdppcZxPtlGU1WopW:n8x5sJ4q58rdppcjPt9WoU
    MD5:AB7418C8DFBBB97BEFB4F0ADED3D4663
    SHA1:B9A7A3FBBA707BA52F8AC4339070473A486CE7B7
    SHA-256:3BD5BB7E646E67469EC25A37CAA5131CF992759703B0FC170DF7AF265B9F8E74
    SHA-512:BE19D2CFE8C9198CE43470FDB6B6030EB4BD1B4080887CB6F1D69C2B661BBD79FFA85B4B70FDBE97BADADF2B75CE7FBE7B627FE08FB1DF3104CC16842E609A40
    Malicious:false
    Antivirus:
    • Antivirus: ReversingLabs, Detection: 0%
    • Antivirus: Virustotal, Detection: 0%, Browse
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........VAA.7/..7/..7/..W)..7/..7...7/..W...7/..W,..7/..W+..7/..i+..7/..i...7/..i-..7/.Rich.7/.................PE..d......`.........."..........<.................@.............................@......W.....`.....................................................P.... ..p...............(G...0..|.......8............................................................................text...3z.......|.................. ..h.rdata..p........ ..................@..H.data...............................@....pdata..............................@..H.gfids..............................@..HPAGE.....%.......&.................. ..`INIT....B........................... ..b.rsrc...p.... ......................@..B.reloc..|....0......................@..B................................................................................................................................................
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
    Category:dropped
    Size (bytes):274944
    Entropy (8bit):5.978951711504469
    Encrypted:false
    SSDEEP:3072:VTwkcrbAg7JNtvh8vULQzOdtsK9g0BIGpY29ZR0qhJRYxEda6sEsOkXlYJkveT/s:VTPzg5JSULQz2tsKi0B9305E9P+3
    MD5:662679682F491FBAF3D15953D13EC72E
    SHA1:9EA41242F7945A6814D757DA232359DFD7D421BD
    SHA-256:C2729911C4B82D8F9E22E057A1570D0265D7A9ECA44D6FE8DC0658F47263CE12
    SHA-512:E5305020F3BC11342EE9073780BAAE37FF700434B7C695980345C7E9DB56B03F8199CE0C278E549C4EB92B4294F1FC91A0DBBB1C033B13794648A24DC94837E5
    Malicious:false
    Antivirus:
    • Antivirus: ReversingLabs, Detection: 0%
    • Antivirus: Virustotal, Detection: 0%, Browse
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........;L..hL..hL..h..\hn..h..]h(..h..bhE..h.MvhO..hL..h...h.,\hN..h.,ahM..hA.fhM..hL.*hM..h.,chM..hRichL..h........................PE..d......`.........." .........:...............................................P............ .................................................@...(.......h0...............<...@..@... ...8............................c..p............................................text...;........................... ..`.rdata..&...........................@..@.data...X<..........................@....pdata..............................@..@.rsrc...h0.......2..................@..@.reloc..@....@......................@..B................................................................................................................................................................................................................................................
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:PE32+ executable (native) x86-64, for MS Windows
    Category:dropped
    Size (bytes):99296
    Entropy (8bit):6.544765616961625
    Encrypted:false
    SSDEEP:1536:ateH5nh6Lk8irGapY1hgw+8wWXZ43CV5h9zYWSYZz8ITF:LZhck8irB4gXWp43g53UWSYtJF
    MD5:B66678FF4E347E22146609B3D5B7B2C4
    SHA1:632A3B4365F9256B13FF0F671260463A8972070D
    SHA-256:7A303AA880CC746D13F71E565874FB7C174747372CCF358B928A72219D2A50DD
    SHA-512:07D73174638953074165EEFB804394F21A1A115116459B96903FCB34A6656450BDCD2A9ABD0590EC5A63D3DF153301A8DDB527405D67DFF3065BB5108C52F575
    Malicious:false
    Antivirus:
    • Antivirus: ReversingLabs, Detection: 0%
    • Antivirus: Virustotal, Detection: 0%, Browse
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........x....{...{...{...z..{..yz...{..yx...{..y....{.]G....{.XG....{.]Gy...{.Rich..{.........PE..d......`.........."...........................@..........................................`.....................................................<....................>...E.......... ...8...........................`...................@............................text....n.......n.................. ..h.rdata..p............r..............@..H.data...............................@....pdata..............................@..H.gfids..............................@..HPAGESRP0.E.......F.................. ..`PAGESER..@... ...B.................. ..`PAGE.........p.......".............. ..`INIT.................(.............. ..b.rsrc................8..............@..B.reloc...............<..............@..B................................................................................
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
    Category:dropped
    Size (bytes):65544
    Entropy (8bit):6.240264971246993
    Encrypted:false
    SSDEEP:768:eNz2GaueQUOHlpEhZf25HY/Q2KDJko4zfrW86F+12Rer30bbYrc/a0FpJvh9Rebt:ex7eWvE3KMSQT12R60T/PP8H/3F
    MD5:3E5BCD980AF8B20313005D9A492CEC8A
    SHA1:060B9D1444327D3FAA56E3B35FC2BB606B692DD7
    SHA-256:55A23A2AC263E10B77D7E95601439F771062F2C248A8D93039A968D66100C39C
    SHA-512:DC4BA803EB3EAB0D5BA452ACA2C57095A74B1B3DBD82078ED17BBC34C5DB3F791EAB4A418D4C822C170B4D561D36D0E47BA6A2DA915A8B1797A88666B19C69F3
    Malicious:false
    Antivirus:
    • Antivirus: ReversingLabs, Detection: 0%
    • Antivirus: Virustotal, Detection: 0%, Browse
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........0...Q.\.Q.\.Q.\..\.Q.\.)H\.Q.\.)^\.Q.\.)Y\.Q.\.Q.\)Q.\.)N\.Q.\..\.Q.\.)O\.Q.\.)T\.Q.\...\.Q.\.)I\.Q.\.)L\.Q.\Rich.Q.\........PE..d......`.........." .........B......@]...............................................&....@......................................... ....................$...............<......0....................................................................................text.............................. ..`.data... ...........................@....pdata..............................@..@.rsrc....$.......&..................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):90160
    Entropy (8bit):6.501864323247129
    Encrypted:false
    SSDEEP:1536:lspRtFBtCzec2R7ixCiyLab5t2HLCvXSrPPr5wg5I:8LtCVKicTLabEi89wg5I
    MD5:461A3CE2E77143EC0E0015D80675911B
    SHA1:3D39E3C12D1424CFBBDDA20CCE48F18CBECA1D06
    SHA-256:003310B93A1A237FB022C7D7F40515DAF25FA1B91690965D3B98C1829A92ED37
    SHA-512:95B4F646FD655ED598360638D0A384E548F40C00B6FE8373C070719FD1F37BCC42522A7C0006AD33E63DF9179A8E8302A962F40C81249476BA530D64B6F1AD3A
    Malicious:false
    Antivirus:
    • Antivirus: ReversingLabs, Detection: 0%
    • Antivirus: Virustotal, Detection: 0%, Browse
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........\...2...2...2.....2.....2...g.2...I...2...3...2.....2.....2.Rich..2.................PE..L.....R`.....................X......D2....... ....@..................................D......................................d<..P....................F..0............................................6..@............ ..p............................text...$........................... ..`.rdata...$... ...&..................@..@.data....1...P.......0..............@...........................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:PE32+ executable (GUI) x86-64, for MS Windows
    Category:dropped
    Size (bytes):1047056
    Entropy (8bit):5.608247345375391
    Encrypted:false
    SSDEEP:6144:ksSOzpPId26dQcEaUrPvwgwkRVagRoDHTj8K1sqI6VLp4XOigSbduP/1HHm/hHAn:4IId79EaUTvwieMozMEcOigSpuPMaLiW
    MD5:0E7E8820A977D3B4B81C5188FA841C52
    SHA1:A6D6831A4A097BD47AF267727A4AD6B38B14CDE3
    SHA-256:65054D27C91C21AF7C7F1838427A0AC64089DC51DD27EB220B589C26B94903A1
    SHA-512:5A2D572B77D59A342ED997586CC7F7741DFB386A2C4243638F1C6933AB1722720953AC8AFF3A8097BDC60E807CA51B9912A534D91C76D359E3D819D61235BE3D
    Malicious:false
    Antivirus:
    • Antivirus: ReversingLabs, Detection: 0%
    • Antivirus: Virustotal, Detection: 0%, Browse
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g9I.#X'.#X'.#X'.* ..!X'.* ..7X'.* ..<X'.#X&.Y'.* ..fX'.* ...X'...Y."X'.* .."X'.* .."X'.Rich#X'.................PE..d......J..........".................................................................d.....@.......... ......................................H...@.......pY...0..\m...................................................................................................text............................... ..`.data... ...........................@....pdata..\m...0...n..................@..@.rsrc....`.......Z...v..............@..@.reloc..<...........................@..B........................................................................................................................................................................................................................................................................................................
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):921616
    Entropy (8bit):5.697380535538133
    Encrypted:false
    SSDEEP:6144:pZtaKSpwmx5ATm/LC3fwf3OoU9xkYSr/mdBTRhKWIjsRP/1HHm/hHAM8i6r+LyIt:pZxSpwmxvL/f3vCN1PMaLi6rAyIQjY
    MD5:C2F2C1398C5CDB55A67676527EA29404
    SHA1:891ABFAC154546FFF98EE70C542C8908EDB32F81
    SHA-256:2BCA1650E3F7B9F98B06ED894CFD5EBC758E2B96EEB5D6C340D96E3F137D4472
    SHA-512:983AF518FCC6100E43B5F80A0665ACBB2E69BFF94B4D37618D9FD728745E77556724ADD40E7C413916B3BC12925C384B30CB1A5524CB23CA87895F4587AD9A06
    Malicious:false
    Antivirus:
    • Antivirus: ReversingLabs, Detection: 0%
    • Antivirus: Virustotal, Detection: 0%, Browse
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......p..o4..<4..<4..<=.`<"..<=.v<...<=.f<)..<4..<@..<=.q<o..<=.a<5..<=.d<5..<Rich4..<................PE..L......J................. ..........j........0...............................0......u.....@...... ..............................,....p..lY......................XC...................................=..@...............L............................text............ .................. ..`.data...`>...0.......$..............@....rsrc....`...p...Z...<..............@..@.reloc..._.......`..................@..B................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):19875
    Entropy (8bit):4.57337875560836
    Encrypted:false
    SSDEEP:384:GhdradsTChQnGFUcDyRAX2XARyDcN+fnQhCTsPup47Kl0HmeZor6VoZe/kV6rgxh:GhdradsTChQnGFUcDyRAX2XARyDcN+fJ
    MD5:BBB46E3360F3FCABC5D03CA33DC10458
    SHA1:C442CAB7EA74D8A1DD3BF97786BAD844E8913B44
    SHA-256:65E9BC1F59DE53462ED2E6B002C0BE26CD3F37B1E360938A0A32AA452ED58030
    SHA-512:1594E0BD1BA7D9541FF5A44F65DA6ACDF1B27CFDD72F4A04C07BE0F815F6D05D773D8980595DA18ECC1AB1BC2587FC248E0997873B02C151DCA096A741CD4D78
    Malicious:false
    Preview:<?xml version="1.0" ?><dpinst>..<language code="0x0000"><eula type="txt" path="licence.txt"/></language>..<language code="0x0004"><eula type="txt" path="licence.txt"/></language>..<language code="0x001A"><eula type="txt" path="licence.txt"/></language>..<language code="0x007F"><eula type="txt" path="licence.txt"/></language>..<language code="0x0400"><eula type="txt" path="licence.txt"/></language>..<language code="0x0401"><eula type="txt" path="licence.txt"/></language>..<language code="0x0402"><eula type="txt" path="licence.txt"/></language>..<language code="0x0403"><eula type="txt" path="licence.txt"/></language>..<language code="0x0404"><eula type="txt" path="licence.txt"/></language>..<language code="0x0405"><eula type="txt" path="licence.txt"/></language>..<language code="0x0406"><eula type="txt" path="licence.txt"/></language>..<language code="0x0407"><eula type="txt" path="licence.txt"/></language>..<language code="0x0408"><eula type="txt" path="licence.txt"/></language>..<langu
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:C source, ISO-8859 text, with CRLF line terminators
    Category:dropped
    Size (bytes):51546
    Entropy (8bit):5.526589371806313
    Encrypted:false
    SSDEEP:1536:WUZMw6FdU0yCSg9OU3bTn87cnRx6EHzRR0zBUIwUfTuxTGpQA:Llg9OUHnpnyKXA
    MD5:08FBBF757A92B079CA66FF62D99A6C82
    SHA1:905BA742B149172E5EC437C13B0E2D2816A83775
    SHA-256:EE0C6358BA2F13015EC7B07AEA16BF3ADA33508851CC494FC256A8B28AF31147
    SHA-512:8A2F64CC408FEE0933517529727E48CDCEC74CB1DFB3D8E169510D763774EEE7F0F60DC04A4792D102E39F3194DDA102476F493F6997A68A0625E9366AEF6926
    Malicious:false
    Preview:/*++....Copyright . 2001-2021 Future Technology Devices International Limited....THIS SOFTWARE IS PROVIDED BY FUTURE TECHNOLOGY DEVICES INTERNATIONAL LIMITED "AS IS"..AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES..OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL..FUTURE TECHNOLOGY DEVICES INTERNATIONAL LIMITED BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,..SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT..OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS OR BUSINESS INTERRUPTION)..HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR..TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,..EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.....FTDI DRIVERS MAY BE USED ONLY IN CONJUNCTION WITH PRODUCTS BASED ON FTDI PARTS.....FTDI DRIVERS MAY BE DISTRIBUTED IN ANY FORM AS LONG
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:data
    Category:dropped
    Size (bytes):23417
    Entropy (8bit):5.948769892863068
    Encrypted:false
    SSDEEP:192:wIWIdFWkGHHPj24Y2f22U222bk2L2h2d2N252Z2L22V2z21232S282e282C2a22g:vyl4rPFRXp4hlTJdkC
    MD5:B392C785B9C2AA31187D1BD0A4F5EBA5
    SHA1:BD80456EAC30AE84B2A0E1CE9A4A364A01C68F39
    SHA-256:B286055896DEA79D4521368293DEEE801930F3FB503CC3076AC97716B338B0F7
    SHA-512:A22007089580CF066FF30D405F607B88F499754F7859EA98915FA2F5E35D21E91BBE4C25271F8C62357F11C2469FD20556D805A52071B96E30FBA8657C6338E6
    Malicious:false
    Preview:0.[u..*.H........[f0.[b...1.0...`.H.e......0.:...+.....7....:.0.:.0...+.....7............@..5;.t.u..210708145418Z0...+.....7.....0...0....R2.F.D.9.A.3.9.F.1.7.B.4.F.8.9.C.E.C.D.7.5.2.8.F.5.8.7.6.7.2.7.D.C.0.0.C.7.A.7.8...1..G08..+.....7...1*0(...F.i.l.e........f.t.d.2.x.x...d.l.l...0M..+.....7...1?0=0...+.....7...0...........0!0...+......../........R.Xvr}..zx0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...1.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R4.5.C.D.6.B.7.1.5.A.A.2.D.4.E.7.E.E.1.9.1.E.C.B.D.F.B.8.C.7.F.7.5.4.D.4.1.7.6.2...1..I0:..+.....7...1,0*...F.i.l.e........f.t.d.i.b.u.s...s.y.s...0M..+.....7...1?0=0...+.....7...0...........0!0...+........E.kqZ..........T..b0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...1.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.3.F.D.E.7.C.9.4.8.8
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:ISO-8859 text, with CRLF line terminators
    Category:dropped
    Size (bytes):30650
    Entropy (8bit):5.516268884073016
    Encrypted:false
    SSDEEP:768:tDAm640CejlZtOojWnXD8yVxaQZdHwG5B8ZJDsyPxSQZXH4G7tVB03F3PPvZh/6:tbSjWJD8/5B03DU
    MD5:B404B591DCAE1E28603479A7963CB6F6
    SHA1:5D4AE8370FB8A05189B0ED9430459BCB97BB9E54
    SHA-256:FF361CDD7C814DB0BEA98578A731EF5C03BF457E06BCA9950FDBAB57A4D3C7F6
    SHA-512:F928FD950A1F57172DFDF2CC8D23A54381715EE79D492D3491EAEAF4ADCC11241F87A00E91F03B504F78DF1DEF4D7C4569A192D62E21088ABD6DBFD721134B04
    Malicious:false
    Preview:; FTDIBUS.INF..; ..; Copyright . 2000-2021 Future Technology Devices International Limited..; ..; USB serial converter driver installation file for Windows 7, Windows 8, Windows 8.1, Windows 10,..; Server 2008 R2, Server 2012 R2 and Server 2016...; ..; ..; IMPORTANT NOTICE: PLEASE READ CAREFULLY BEFORE INSTALLING THE RELEVANT ..; SOFTWARE: This licence agreement (Licence) is a legal agreement between you (Licensee or ..; you) and Future Technology Devices International Limited of 2 Seaward Place, Centurion Business ..; Park, Glasgow G41 1HH, Scotland (UK Company Number SC136640) (Licensor or we) for use of ..; driver software provided by the Licensor(Software)...; ..; BY INSTALLING OR USING THIS SOFTWARE YOU AGREE TO THE TERMS OF THIS LICENCE ..; WHICH WILL BIND YOU. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENCE, WE ARE ..; UNWILLING TO LICENSE THE SOFTWARE TO YOU AND YOU MUST DISCONTINUE ..; INSTALLATION OF THE SOFTWARE NOW...; ..; 1..GRANT AND SCOPE OF LICENCE..; ..; 1.1.In cons
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:data
    Category:dropped
    Size (bytes):22608
    Entropy (8bit):5.965323528440976
    Encrypted:false
    SSDEEP:192:whASiyWWICmejj24Y2f22U222bk2L2h2d2N252Z2L22V2z21232S282e282C2a2E:YAw4rPFRO+NJ/AlGsJPY9
    MD5:60238C00694F838EED4757D1CE167D8B
    SHA1:0E39502D2CBD03ECF3973AD2F5F94DDB21C74B37
    SHA-256:113A35E6161F3AE8BB9D0E0F31913872C4B32FD6211ECE27DDDEB238F601EB59
    SHA-512:578A026793F2A30814A31BB9A63360BC2142E3263CB752B67CF8FFD3A65253D30E0BBA5BBD5D57759BA3455AB8F2D766FC14F6D6B5085833EA44936A08B8C713
    Malicious:false
    Preview:0.XL..*.H........X=0.X9...1.0...`.H.e......0.6...+.....7....6.0.6.0...+.....7.......;...@..:.T8-...210708145418Z0...+.....7.....0...0....R0.3.A.4.7.E.F.E.F.0.0.6.9.1.7.6.4.3.0.A.C.8.A.2.E.3.9.0.8.5.F.D.3.2.2.E.8.2.D.3...1..I0:..+.....7...1,0*...F.i.l.e........f.t.s.e.r.2.k...s.y.s...0M..+.....7...1?0=0...+.....7...0...........0!0...+..........~....vC....2...0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...1.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R1.6.4.D.6.B.E.E.E.6.1.A.B.B.F.2.0.5.7.4.D.E.3.B.4.2.5.5.F.3.C.5.E.2.1.2.E.2.7.6...1..K0<..+.....7...1.0,...F.i.l.e........f.t.s.e.r.u.i.2...d.l.l...0M..+.....7...1?0=0...+.....7...0...........0!0...+.........Mk......t.;BU.....v0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...1.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R1.9.2.9.B.B.A.B.9
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:ISO-8859 text, with CRLF line terminators
    Category:dropped
    Size (bytes):18369
    Entropy (8bit):5.49132972724957
    Encrypted:false
    SSDEEP:384:KRD7TYsKwdRFr+40CejlZtOoggvxUkHlfD0fsEc886YVeZgTey:WDAm640CejlZtOoV5DfX88t
    MD5:B16B75B545A296EFC49805C94DFD334C
    SHA1:88DA6E6C3C9D94F6725D854CD866EA2CF305D67A
    SHA-256:00627112CF622CC6FB99A6B5DE24FCC61B6D0A211A6BD1E90B985BCF9950F6D9
    SHA-512:18C2B08A06AE87F5F2EEB79DEE4A3725FB5F8516D9C9F1CA60C5C96F06BA07493D4FB4199FBD67A042132201EC32C3E5B4331CF0671F787B3DA7A2C5A7197357
    Malicious:false
    Preview:; FTDIPORT.INF..; ..; Copyright . 2000-2021 Future Technology Devices International Limited..;..; USB serial port driver installation file for Windows 7, Windows 8, Windows 8.1, Windows 10,..; Server 2008 R2, Server 2012 R2 and Server 2016.....; ..; ..; IMPORTANT NOTICE: PLEASE READ CAREFULLY BEFORE INSTALLING THE RELEVANT ..; SOFTWARE: This licence agreement (Licence) is a legal agreement between you (Licensee or ..; you) and Future Technology Devices International Limited of 2 Seaward Place, Centurion Business ..; Park, Glasgow G41 1HH, Scotland (UK Company Number SC136640) (Licensor or we) for use of ..; driver software provided by the Licensor(Software)...; ..; BY INSTALLING OR USING THIS SOFTWARE YOU AGREE TO THE TERMS OF THIS LICENCE ..; WHICH WILL BIND YOU. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENCE, WE ARE ..; UNWILLING TO LICENSE THE SOFTWARE TO YOU AND YOU MUST DISCONTINUE ..; INSTALLATION OF THE SOFTWARE NOW...; ..; 1..GRANT AND SCOPE OF LICENCE..; ..; 1.1.In conside
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):156168
    Entropy (8bit):6.6398910374074775
    Encrypted:false
    SSDEEP:3072:Ha9TWOAIKR1PA/RrTjzgKcKb9OoyYAJgsP:iWwKbP6Rr01P
    MD5:107815287E29854DEF48BFB8341B9453
    SHA1:AD65501AF88E92E9E17A0E23C0F99231375B83B3
    SHA-256:CE0B628933BECB2060A3B11A85C06146807ED03949F756036E6F93F597EC54C2
    SHA-512:55856D5158B4C689464031F4785DEAA3E3EBB82F07D80CD8BD39C3F22846F3451DF1D8E1D0994B064AAFA03C5163F386D771B74C72029076315834F1A1BB06CA
    Malicious:false
    Antivirus:
    • Antivirus: ReversingLabs, Detection: 0%
    • Antivirus: Virustotal, Detection: 0%, Browse
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........J...+.[.+.[.+.[.z.[.+.[.z#[.+.[.z.[.+.[}.7[.+.[.+.[.+.[...[.+.[.. [.+.[.y'[.+.[.+k[.+.[.."[.+.[Rich.+.[........PE..L......`...........!.................1.......................................p.......a............... ..................h...H...d....0..@............&...<...P..,......8...............................@............................................text............................... ..`.rdata..._.......`..................@..@.data..../..........................@....rsrc...@....0......................@..@.reloc..,....P......................@..B........................................................................................................................................................................................................................................................................................................................
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):78856
    Entropy (8bit):6.448107183476905
    Encrypted:false
    SSDEEP:1536:JwpJ3AxCnwhDpQnP8xat+h4siLIgHmE4KtMxPMpBT:JwpJ3AxCnwhNQP8xb4sngNtMt+T
    MD5:73FF9164F917526997E2838715FA7779
    SHA1:1DCEA840FC97445898777D40571C09D410D90911
    SHA-256:239161AB87C6BE9D7996033777FFB62786A0F609D9F7270ACF56AD7A03008070
    SHA-512:30919855C0129218C73C64F300177B519017A57E47EBE12B7ADA9E1408FADBCF812CBFBB334BCBB1B78E80FAD5D481447B4BD50F4D771070E2FC9E7EBE65D796
    Malicious:false
    Antivirus:
    • Antivirus: ReversingLabs, Detection: 0%
    • Antivirus: Virustotal, Detection: 0%, Browse
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........=k..S8..S8..S8s..8..S8..R8..S8...8..S8...8..S8...8..S8...8..S8...8..S8...8..S8Rich..S8................PE..L......`...........!.........0......D_....................................... ...........@.........................0...Q.......x.......X................<...........................................E..@...............|............................text............................... ..`.data...............................@....rsrc...X...........................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):392128
    Entropy (8bit):6.675882265173621
    Encrypted:false
    SSDEEP:6144:6cumjO3f6acDJuRkgm3qP12tHi3b+cVZhPTlqWMTZ4Rp71RpeRjK3q:6cBjQf6acERkkP12tqbBxTlqWUop5ywa
    MD5:6FFEB45E0137622EBBBA8361107D304E
    SHA1:01B3F848148A276F6317D6C98EDBDB1133F458DA
    SHA-256:60BB0D6348B1EB0127401AA902F34C963D9196D2778C66F4008A6CF0C6F098A5
    SHA-512:BC3D9DDCB1FC249CF1A3A11EEFE9131280F18CB538C381C46B1818354E947690D52FD38B14674A7BB51CE5FF73F4B8721D19FD4960694B3442ECC90C58F75052
    Malicious:false
    Antivirus:
    • Antivirus: ReversingLabs, Detection: 0%
    • Antivirus: Virustotal, Detection: 0%, Browse
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........>.6._je._je._jei.e._jei.eO_jei.e._je..id._je..od._je..nd._je...e._je._ke\_jeJ.od._jeJ.jd._jeO..e._je._.e._jeJ.hd._jeRich._je................PE..L......`...........!.........................................................0......Tq..........................................d.......X................!.......(.....T...........................(...@............................................text............................... ..`.rdata..............................@..@.data...X$..........................@....gfids..............................@..@.rsrc...X...........................@..@.reloc...(.......(..................@..B................................................................................................................................................................................................................................................
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:current ar archive
    Category:dropped
    Size (bytes):22190
    Entropy (8bit):5.177107513443205
    Encrypted:false
    SSDEEP:384:w+I6eDqEP41C1plVjZ/C/nkemxe9iTkR98jHFHgrS/pJj+pl4fFF6ripgpSQSE0h:w+FEP4qTG/aTK98jHv+T4olpSzE0ebR+
    MD5:0BEC36AA3B1CF8C98D9B4F4A2D433FAE
    SHA1:6320C8F1027FADD63652F75D05D8A0523F45DB51
    SHA-256:3E9C6D57C4B3563E04B20BE5ADC419A0854D3A2ABAD93A39F49B973B52475314
    SHA-512:C392159578E892E70C97CC6A8BB3DB3BC9D7BF870849CC2A85171E6BE922A4D0ECC37E5EBAE5A8C79B2636BE649BA8475AF5048BD5CE958C790B945E1DDAF835
    Malicious:false
    Preview:!<arch>./ 1625488767 0 5072 `.......)...+...,...>:..>:...B...B..?r..?r..U...U...=d..=d..A...A...B^..B^..D...D...F...F...E...E...........H...H.../.../...;:..;:..D...D...?...?...H~..H~..;...;...FB..FB..9...9...<...<...C...C...C:..C:..I`..I`..Up..Up..En..En..>...>...=...=...G,..G,..:T..:T..B...B...7:..7:..H...H...6f..6f..?...?...VD..VD..2...2...2...2...4...4...5...5...5...5...M...M...MV..MV..Q...Q...U...U...P...P...Ll..Ll..L...L...N:..N:..O$..O$..O...O...P...P...P...P...Qp..Qp..RP..RP..R...R...S4..S4..S...S...T...T...T...T...8...8...K...K...I...I...A...A...G...G...A...A...2...2...4B..4B..0...0...0\..0\..8...8...8...8...D...D...9r..9r..:...:...N...N...@...@...@D..@D..7...7...3d..3d..5...5...3...3...<...<...1...1...1>..1>../.../.../z../z..J:..J:..K...K...J...J...K...K...<...<...6...6.__IMPORT_DESCRIPTOR_FTD2XX.__NULL_IMPORT_DESCRIPTOR..FTD2XX_NULL_THUNK_DATA._FT_Open@8.__imp__FT_Open@8._FT_Close@4.__imp__FT_Close@4._FT_Read@16.__imp__FT_Read@16._FT_Writ
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:PE32 executable (native) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):119376
    Entropy (8bit):6.73457938895639
    Encrypted:false
    SSDEEP:1536:516Fjux5YtPCotU4eAiJHDrgdXUR0JgN1srjQM9F9L2URlW96VTvsTVBIU:f6FjubcPC1Dr2UlYfFcUDDVTAVj
    MD5:AD4D72EEA5D4D9E6823C606104AD3984
    SHA1:B577FF68EC18F733DEC282AA714992F01F58BC67
    SHA-256:65B3DDE7820B256ECFA4BA3F8B757E3D4E30B139C005E8C00D1F831E5A378B5D
    SHA-512:48851E057AC02F79989F627FF25AC1B487024B0E4F0F600CFBEFDBBEF30BBC991AA4BF590828FFDFF26F1232ACBECC8047AFB922BF7558528B2337AFA84DBD8E
    Malicious:false
    Antivirus:
    • Antivirus: ReversingLabs, Detection: 0%
    • Antivirus: Virustotal, Detection: 0%, Browse
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........`\f.3\f.3\f.3~..2[f.3\f.3(f.3~..2Uf.3~..2Yf.3.8.2|f.3.8,3]f.3.8.2]f.3Rich\f.3................PE..L...R..`.................f...&...............P....@..................................a....@.................................L...d.......p...............PF..........@W..8...........................xW..@............P...............................text....5.......6.................. ..h.rdata.......P.......:..............@..H.data...P....`.......D..............@...PAGE..... ...p..."...F.............. ..`INIT.................h.............. ..b.rsrc...p............v..............@..B.reloc...............z..............@..B........................................................................................................................................................................................................................................................
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):255496
    Entropy (8bit):6.224431630683055
    Encrypted:false
    SSDEEP:3072:7NyYHXj3jtoBavVDctpMrNnIMpZ+vsViALa6sEsOkXlYJkveT/nQmiAj:79OBadOICAvPQmN
    MD5:D7F0ED8E9DB372C643E4E2F65A0561B7
    SHA1:DB0931D58D3AD19E6CF8FA71F577E62F6736631C
    SHA-256:8509256648E0797098F59978C2DC8CE5159152ED76301C88C0A72E2557E1A4C6
    SHA-512:9D936FDBE5559B9C0E910F03613CF5C27707B92A4965245747CBD21B2BFA5E4BC9CA4FC80797BABE002A19A79260A7DC96A7901B25A01B77C67F46D087319B13
    Malicious:false
    Antivirus:
    • Antivirus: ReversingLabs, Detection: 0%
    • Antivirus: Virustotal, Detection: 0%, Browse
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........~..-..-..-...-..-..!-..-...-...-.a5-...-..-...-v..-...-v."-..-..%-..-.i-..-v. -..-Rich..-........................PE..L.../..`...........!.................................................................{...............................Q.......R..(.......h0...............<..............8............................G..@...............@............................text............................... ..`.rdata...i.......j..................@..@.data....1...`.......J..............@....rsrc...h0.......2...^..............@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:PE32 executable (native) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):85256
    Entropy (8bit):6.703919353941749
    Encrypted:false
    SSDEEP:1536:vVafdJikomtrqzLYuYk5/FM7deMu6IMjxp0uZh1lPP1D:aJipmlqYuY/deMuPcZhxD
    MD5:890A2E572CC94CF2D9CE7408CE9C2C49
    SHA1:1E58A6D04F93C8234F083DCC0A6EB11C21D40009
    SHA-256:C43D9D3940B212DB26471D240351E1DED48082A6ED3DD2B440688AADF672E74B
    SHA-512:E06D43B4ADF3AC23669530B75692C0A1F1D0241EB9A4400E7FF8EF0A43E590B76CCF1BD5BA2A87AFD6FDAE4F9DE0C5E855913749F8E77D7E877ADF0672778E93
    Malicious:false
    Antivirus:
    • Antivirus: ReversingLabs, Detection: 0%
    • Antivirus: Virustotal, Detection: 0%, Browse
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........FT..':W.':W.':W.';W.':W.G;V.':W.G9V.':W.G>V.':W.y>V.':W.y.W.':W.y8V.':WRich.':W........PE..L...d..`.............................$.......p....@..........................P......s@....@..................................%..P....0...................E...@......@z..8...........................xz..@............p..H............................text...h\.......^.................. ..h.rdata..D....p.......b..............@..H.data................p..............@...PAGESRP0@8.......:...r.............. ..`PAGESER..7.......8.................. ..`PAGE................................ ..`INIT....D.... ...................... ..b.rsrc........0......................@..B.reloc.......@......................@..B................................................................................................................................................................................
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):63496
    Entropy (8bit):6.349433261481209
    Encrypted:false
    SSDEEP:768:s3A4LlOEsxNaCSUeR4rJ+9rMr+5AMAaWAaWbH+Dda0FpJFo2Lh9W6Hbdgk:CA4LmsIeA+tMrAAMAaXEDdPPc967N
    MD5:6C13E579F94763A2299FB4AD27100E8C
    SHA1:95DF447E8895A28669AFB8D02E6C66AA6EEB865B
    SHA-256:4B8D9B66F76599DD8E309E08A92A63470CFF5AFC5814261B2E1C3C2023E4284E
    SHA-512:FAF4E73A7324AA3230A2CECE743C862B40A8D441A2B8394797A85CB1ADB9EB2585B83D755CC37D32CEA62C8A3F0256B6984F53DE5F7D22C9C3C8E0C5CB5A2D2D
    Malicious:false
    Antivirus:
    • Antivirus: ReversingLabs, Detection: 0%
    • Antivirus: Virustotal, Detection: 0%, Browse
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........E....................C......R.........T....E......D......U......'.......B......G.....Rich....................PE..L...'..`...........!.....z...D......G]....................................................@..................................|...........$...............<......8.......................................@............................................text...qx.......z.................. ..`.data...P............~..............@....CRT................................@..@.rsrc....$.......&..................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................
    Process:C:\Users\user\Desktop\CDM212364_Setup.exe
    File Type:ASCII text, with very long lines (583), with CRLF, LF line terminators
    Category:dropped
    Size (bytes):9143
    Entropy (8bit):4.831278761499327
    Encrypted:false
    SSDEEP:192:ICqecUMJI11ixmC0SD7TjVONTT3fmGJ0+Ga:IE/bvmdD7TjVYfDS+V
    MD5:5F2BD5BD92FB7740033159C59A8D1215
    SHA1:B8E38A2F4EBCC4DAD9DD5E73CFF82509F6043511
    SHA-256:4097665303729E520334B2DB9915DC3EF955E3518D08846AF73D464BFDAEA3A6
    SHA-512:18B59C28AF8BA6BAB439FBDF32868E63AEF6E8A6432847CE44B551F40ECB3C66F797C77D6EBD4E271563BCF71E7357A9301FF73FF0E5E70577584A91807C4E28
    Malicious:false
    Preview:IMPORTANT NOTICE: PLEASE READ CAREFULLY BEFORE INSTALLING THE RELEVANT SOFTWARE: ..This licence agreement (Licence) is a legal agreement between you (Licensee or you) and Future Technology Devices International Limited of 2 Seaward Place, Centurion Business Park, Glasgow G41 1HH, Scotland (UK Company Number SC136640) (Licensor or we) for use of driver software provided by the Licensor(Software).....BY INSTALLING OR USING THIS SOFTWARE YOU AGREE TO THE TERMS OF THIS LICENCE WHICH WILL BIND YOU. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENCE, WE ARE UNWILLING TO LICENSE THE SOFTWARE TO YOU AND YOU MUST DISCONTINUE INSTALLATION OF THE SOFTWARE NOW.....1..GRANT AND SCOPE OF LICENCE....1.1.In consideration of you agreeing to abide by the terms of this Licence, the Licensor hereby grants to you a non-exclusive, non-transferable, royalty free licence to use the Software on the terms of this Licence.....1.2.In this Licence a "Genuine FTDI Component" means an item of hardware that was manufa
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:data
    Category:dropped
    Size (bytes):22608
    Entropy (8bit):5.965323528440976
    Encrypted:false
    SSDEEP:192:whASiyWWICmejj24Y2f22U222bk2L2h2d2N252Z2L22V2z21232S282e282C2a2E:YAw4rPFRO+NJ/AlGsJPY9
    MD5:60238C00694F838EED4757D1CE167D8B
    SHA1:0E39502D2CBD03ECF3973AD2F5F94DDB21C74B37
    SHA-256:113A35E6161F3AE8BB9D0E0F31913872C4B32FD6211ECE27DDDEB238F601EB59
    SHA-512:578A026793F2A30814A31BB9A63360BC2142E3263CB752B67CF8FFD3A65253D30E0BBA5BBD5D57759BA3455AB8F2D766FC14F6D6B5085833EA44936A08B8C713
    Malicious:false
    Preview:0.XL..*.H........X=0.X9...1.0...`.H.e......0.6...+.....7....6.0.6.0...+.....7.......;...@..:.T8-...210708145418Z0...+.....7.....0...0....R0.3.A.4.7.E.F.E.F.0.0.6.9.1.7.6.4.3.0.A.C.8.A.2.E.3.9.0.8.5.F.D.3.2.2.E.8.2.D.3...1..I0:..+.....7...1,0*...F.i.l.e........f.t.s.e.r.2.k...s.y.s...0M..+.....7...1?0=0...+.....7...0...........0!0...+..........~....vC....2...0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...1.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R1.6.4.D.6.B.E.E.E.6.1.A.B.B.F.2.0.5.7.4.D.E.3.B.4.2.5.5.F.3.C.5.E.2.1.2.E.2.7.6...1..K0<..+.....7...1.0,...F.i.l.e........f.t.s.e.r.u.i.2...d.l.l...0M..+.....7...1?0=0...+.....7...0...........0!0...+.........Mk......t.;BU.....v0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...1.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R1.9.2.9.B.B.A.B.9
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:ISO-8859 text, with CRLF line terminators
    Category:dropped
    Size (bytes):18369
    Entropy (8bit):5.49132972724957
    Encrypted:false
    SSDEEP:384:KRD7TYsKwdRFr+40CejlZtOoggvxUkHlfD0fsEc886YVeZgTey:WDAm640CejlZtOoV5DfX88t
    MD5:B16B75B545A296EFC49805C94DFD334C
    SHA1:88DA6E6C3C9D94F6725D854CD866EA2CF305D67A
    SHA-256:00627112CF622CC6FB99A6B5DE24FCC61B6D0A211A6BD1E90B985BCF9950F6D9
    SHA-512:18C2B08A06AE87F5F2EEB79DEE4A3725FB5F8516D9C9F1CA60C5C96F06BA07493D4FB4199FBD67A042132201EC32C3E5B4331CF0671F787B3DA7A2C5A7197357
    Malicious:false
    Preview:; FTDIPORT.INF..; ..; Copyright . 2000-2021 Future Technology Devices International Limited..;..; USB serial port driver installation file for Windows 7, Windows 8, Windows 8.1, Windows 10,..; Server 2008 R2, Server 2012 R2 and Server 2016.....; ..; ..; IMPORTANT NOTICE: PLEASE READ CAREFULLY BEFORE INSTALLING THE RELEVANT ..; SOFTWARE: This licence agreement (Licence) is a legal agreement between you (Licensee or ..; you) and Future Technology Devices International Limited of 2 Seaward Place, Centurion Business ..; Park, Glasgow G41 1HH, Scotland (UK Company Number SC136640) (Licensor or we) for use of ..; driver software provided by the Licensor(Software)...; ..; BY INSTALLING OR USING THIS SOFTWARE YOU AGREE TO THE TERMS OF THIS LICENCE ..; WHICH WILL BIND YOU. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENCE, WE ARE ..; UNWILLING TO LICENSE THE SOFTWARE TO YOU AND YOU MUST DISCONTINUE ..; INSTALLATION OF THE SOFTWARE NOW...; ..; 1..GRANT AND SCOPE OF LICENCE..; ..; 1.1.In conside
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:PE32+ executable (native) x86-64, for MS Windows
    Category:dropped
    Size (bytes):99296
    Entropy (8bit):6.544765616961625
    Encrypted:false
    SSDEEP:1536:ateH5nh6Lk8irGapY1hgw+8wWXZ43CV5h9zYWSYZz8ITF:LZhck8irB4gXWp43g53UWSYtJF
    MD5:B66678FF4E347E22146609B3D5B7B2C4
    SHA1:632A3B4365F9256B13FF0F671260463A8972070D
    SHA-256:7A303AA880CC746D13F71E565874FB7C174747372CCF358B928A72219D2A50DD
    SHA-512:07D73174638953074165EEFB804394F21A1A115116459B96903FCB34A6656450BDCD2A9ABD0590EC5A63D3DF153301A8DDB527405D67DFF3065BB5108C52F575
    Malicious:false
    Antivirus:
    • Antivirus: ReversingLabs, Detection: 0%
    • Antivirus: Virustotal, Detection: 0%, Browse
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........x....{...{...{...z..{..yz...{..yx...{..y....{.]G....{.XG....{.]Gy...{.Rich..{.........PE..d......`.........."...........................@..........................................`.....................................................<....................>...E.......... ...8...........................`...................@............................text....n.......n.................. ..h.rdata..p............r..............@..H.data...............................@....pdata..............................@..H.gfids..............................@..HPAGESRP0.E.......F.................. ..`PAGESER..@... ...B.................. ..`PAGE.........p.......".............. ..`INIT.................(.............. ..b.rsrc................8..............@..B.reloc...............<..............@..B................................................................................
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
    Category:dropped
    Size (bytes):65544
    Entropy (8bit):6.240264971246993
    Encrypted:false
    SSDEEP:768:eNz2GaueQUOHlpEhZf25HY/Q2KDJko4zfrW86F+12Rer30bbYrc/a0FpJvh9Rebt:ex7eWvE3KMSQT12R60T/PP8H/3F
    MD5:3E5BCD980AF8B20313005D9A492CEC8A
    SHA1:060B9D1444327D3FAA56E3B35FC2BB606B692DD7
    SHA-256:55A23A2AC263E10B77D7E95601439F771062F2C248A8D93039A968D66100C39C
    SHA-512:DC4BA803EB3EAB0D5BA452ACA2C57095A74B1B3DBD82078ED17BBC34C5DB3F791EAB4A418D4C822C170B4D561D36D0E47BA6A2DA915A8B1797A88666B19C69F3
    Malicious:false
    Antivirus:
    • Antivirus: ReversingLabs, Detection: 0%
    • Antivirus: Virustotal, Detection: 0%, Browse
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........0...Q.\.Q.\.Q.\..\.Q.\.)H\.Q.\.)^\.Q.\.)Y\.Q.\.Q.\)Q.\.)N\.Q.\..\.Q.\.)O\.Q.\.)T\.Q.\...\.Q.\.)I\.Q.\.)L\.Q.\Rich.Q.\........PE..d......`.........." .........B......@]...............................................&....@......................................... ....................$...............<......0....................................................................................text.............................. ..`.data... ...........................@....pdata..............................@..@.rsrc....$.......&..................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
    Category:dropped
    Size (bytes):75272
    Entropy (8bit):6.176258876551271
    Encrypted:false
    SSDEEP:1536:lxRShQnixg3RolUmf71kjy3JIO64l7Xuuy+fk+QI:lHShQnixg3RolUmzCy3JIO64l7euVfkQ
    MD5:AA69BF96E10F463082A0664B7A2E9FAE
    SHA1:D9CC34D613E8655FD7DA5293093E050D4D24AF5F
    SHA-256:C0224B9EF14365F6DDA96134CC77D978E69FBD61EFDADE6FD1EB676418C41023
    SHA-512:778599EEEE6C6F3F8C46E4BB774697E8528F03B30381BE3BA06298E23D1514039CC926E89AADAC2771074657A9478DCF60D4D92BDD69C7A5A094D59ED32F2993
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........l..............................u.......u.......u.............u.......u.......u.......u......Rich....................PE..d...i..`.........." .........6......<d.......................................@............@.........................................p...Q... ...x.... ..X................<...0..`...0................................................................................text............................... ..`.data....&..........................@....pdata..............................@..@.rsrc...X.... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
    Category:dropped
    Size (bytes):75272
    Entropy (8bit):6.176258876551271
    Encrypted:false
    SSDEEP:1536:lxRShQnixg3RolUmf71kjy3JIO64l7Xuuy+fk+QI:lHShQnixg3RolUmzCy3JIO64l7euVfkQ
    MD5:AA69BF96E10F463082A0664B7A2E9FAE
    SHA1:D9CC34D613E8655FD7DA5293093E050D4D24AF5F
    SHA-256:C0224B9EF14365F6DDA96134CC77D978E69FBD61EFDADE6FD1EB676418C41023
    SHA-512:778599EEEE6C6F3F8C46E4BB774697E8528F03B30381BE3BA06298E23D1514039CC926E89AADAC2771074657A9478DCF60D4D92BDD69C7A5A094D59ED32F2993
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........l..............................u.......u.......u.............u.......u.......u.......u......Rich....................PE..d...i..`.........." .........6......<d.......................................@............@.........................................p...Q... ...x.... ..X................<...0..`...0................................................................................text............................... ..`.data....&..........................@....pdata..............................@..@.rsrc...X.... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:PE32+ executable (native) x86-64, for MS Windows
    Category:dropped
    Size (bytes):99296
    Entropy (8bit):6.544765616961625
    Encrypted:false
    SSDEEP:1536:ateH5nh6Lk8irGapY1hgw+8wWXZ43CV5h9zYWSYZz8ITF:LZhck8irB4gXWp43g53UWSYtJF
    MD5:B66678FF4E347E22146609B3D5B7B2C4
    SHA1:632A3B4365F9256B13FF0F671260463A8972070D
    SHA-256:7A303AA880CC746D13F71E565874FB7C174747372CCF358B928A72219D2A50DD
    SHA-512:07D73174638953074165EEFB804394F21A1A115116459B96903FCB34A6656450BDCD2A9ABD0590EC5A63D3DF153301A8DDB527405D67DFF3065BB5108C52F575
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........x....{...{...{...z..{..yz...{..yx...{..y....{.]G....{.XG....{.]Gy...{.Rich..{.........PE..d......`.........."...........................@..........................................`.....................................................<....................>...E.......... ...8...........................`...................@............................text....n.......n.................. ..h.rdata..p............r..............@..H.data...............................@....pdata..............................@..H.gfids..............................@..HPAGESRP0.E.......F.................. ..`PAGESER..@... ...B.................. ..`PAGE.........p.......".............. ..`INIT.................(.............. ..b.rsrc................8..............@..B.reloc...............<..............@..B................................................................................
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
    Category:dropped
    Size (bytes):65544
    Entropy (8bit):6.240264971246993
    Encrypted:false
    SSDEEP:768:eNz2GaueQUOHlpEhZf25HY/Q2KDJko4zfrW86F+12Rer30bbYrc/a0FpJvh9Rebt:ex7eWvE3KMSQT12R60T/PP8H/3F
    MD5:3E5BCD980AF8B20313005D9A492CEC8A
    SHA1:060B9D1444327D3FAA56E3B35FC2BB606B692DD7
    SHA-256:55A23A2AC263E10B77D7E95601439F771062F2C248A8D93039A968D66100C39C
    SHA-512:DC4BA803EB3EAB0D5BA452ACA2C57095A74B1B3DBD82078ED17BBC34C5DB3F791EAB4A418D4C822C170B4D561D36D0E47BA6A2DA915A8B1797A88666B19C69F3
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........0...Q.\.Q.\.Q.\..\.Q.\.)H\.Q.\.)^\.Q.\.)Y\.Q.\.Q.\)Q.\.)N\.Q.\..\.Q.\.)O\.Q.\.)T\.Q.\...\.Q.\.)I\.Q.\.)L\.Q.\Rich.Q.\........PE..d......`.........." .........B......@]...............................................&....@......................................... ....................$...............<......0....................................................................................text.............................. ..`.data... ...........................@....pdata..............................@..@.rsrc....$.......&..................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:data
    Category:dropped
    Size (bytes):22608
    Entropy (8bit):5.965323528440976
    Encrypted:false
    SSDEEP:192:whASiyWWICmejj24Y2f22U222bk2L2h2d2N252Z2L22V2z21232S282e282C2a2E:YAw4rPFRO+NJ/AlGsJPY9
    MD5:60238C00694F838EED4757D1CE167D8B
    SHA1:0E39502D2CBD03ECF3973AD2F5F94DDB21C74B37
    SHA-256:113A35E6161F3AE8BB9D0E0F31913872C4B32FD6211ECE27DDDEB238F601EB59
    SHA-512:578A026793F2A30814A31BB9A63360BC2142E3263CB752B67CF8FFD3A65253D30E0BBA5BBD5D57759BA3455AB8F2D766FC14F6D6B5085833EA44936A08B8C713
    Malicious:false
    Preview:0.XL..*.H........X=0.X9...1.0...`.H.e......0.6...+.....7....6.0.6.0...+.....7.......;...@..:.T8-...210708145418Z0...+.....7.....0...0....R0.3.A.4.7.E.F.E.F.0.0.6.9.1.7.6.4.3.0.A.C.8.A.2.E.3.9.0.8.5.F.D.3.2.2.E.8.2.D.3...1..I0:..+.....7...1,0*...F.i.l.e........f.t.s.e.r.2.k...s.y.s...0M..+.....7...1?0=0...+.....7...0...........0!0...+..........~....vC....2...0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...1.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R1.6.4.D.6.B.E.E.E.6.1.A.B.B.F.2.0.5.7.4.D.E.3.B.4.2.5.5.F.3.C.5.E.2.1.2.E.2.7.6...1..K0<..+.....7...1.0,...F.i.l.e........f.t.s.e.r.u.i.2...d.l.l...0M..+.....7...1?0=0...+.....7...0...........0!0...+.........Mk......t.;BU.....v0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...1.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R1.9.2.9.B.B.A.B.9
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:ISO-8859 text, with CRLF line terminators
    Category:dropped
    Size (bytes):18369
    Entropy (8bit):5.49132972724957
    Encrypted:false
    SSDEEP:384:KRD7TYsKwdRFr+40CejlZtOoggvxUkHlfD0fsEc886YVeZgTey:WDAm640CejlZtOoV5DfX88t
    MD5:B16B75B545A296EFC49805C94DFD334C
    SHA1:88DA6E6C3C9D94F6725D854CD866EA2CF305D67A
    SHA-256:00627112CF622CC6FB99A6B5DE24FCC61B6D0A211A6BD1E90B985BCF9950F6D9
    SHA-512:18C2B08A06AE87F5F2EEB79DEE4A3725FB5F8516D9C9F1CA60C5C96F06BA07493D4FB4199FBD67A042132201EC32C3E5B4331CF0671F787B3DA7A2C5A7197357
    Malicious:false
    Preview:; FTDIPORT.INF..; ..; Copyright . 2000-2021 Future Technology Devices International Limited..;..; USB serial port driver installation file for Windows 7, Windows 8, Windows 8.1, Windows 10,..; Server 2008 R2, Server 2012 R2 and Server 2016.....; ..; ..; IMPORTANT NOTICE: PLEASE READ CAREFULLY BEFORE INSTALLING THE RELEVANT ..; SOFTWARE: This licence agreement (Licence) is a legal agreement between you (Licensee or ..; you) and Future Technology Devices International Limited of 2 Seaward Place, Centurion Business ..; Park, Glasgow G41 1HH, Scotland (UK Company Number SC136640) (Licensor or we) for use of ..; driver software provided by the Licensor(Software)...; ..; BY INSTALLING OR USING THIS SOFTWARE YOU AGREE TO THE TERMS OF THIS LICENCE ..; WHICH WILL BIND YOU. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENCE, WE ARE ..; UNWILLING TO LICENSE THE SOFTWARE TO YOU AND YOU MUST DISCONTINUE ..; INSTALLATION OF THE SOFTWARE NOW...; ..; 1..GRANT AND SCOPE OF LICENCE..; ..; 1.1.In conside
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:data
    Category:dropped
    Size (bytes):23417
    Entropy (8bit):5.948769892863068
    Encrypted:false
    SSDEEP:192:wIWIdFWkGHHPj24Y2f22U222bk2L2h2d2N252Z2L22V2z21232S282e282C2a22g:vyl4rPFRXp4hlTJdkC
    MD5:B392C785B9C2AA31187D1BD0A4F5EBA5
    SHA1:BD80456EAC30AE84B2A0E1CE9A4A364A01C68F39
    SHA-256:B286055896DEA79D4521368293DEEE801930F3FB503CC3076AC97716B338B0F7
    SHA-512:A22007089580CF066FF30D405F607B88F499754F7859EA98915FA2F5E35D21E91BBE4C25271F8C62357F11C2469FD20556D805A52071B96E30FBA8657C6338E6
    Malicious:false
    Preview:0.[u..*.H........[f0.[b...1.0...`.H.e......0.:...+.....7....:.0.:.0...+.....7............@..5;.t.u..210708145418Z0...+.....7.....0...0....R2.F.D.9.A.3.9.F.1.7.B.4.F.8.9.C.E.C.D.7.5.2.8.F.5.8.7.6.7.2.7.D.C.0.0.C.7.A.7.8...1..G08..+.....7...1*0(...F.i.l.e........f.t.d.2.x.x...d.l.l...0M..+.....7...1?0=0...+.....7...0...........0!0...+......../........R.Xvr}..zx0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...1.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R4.5.C.D.6.B.7.1.5.A.A.2.D.4.E.7.E.E.1.9.1.E.C.B.D.F.B.8.C.7.F.7.5.4.D.4.1.7.6.2...1..I0:..+.....7...1,0*...F.i.l.e........f.t.d.i.b.u.s...s.y.s...0M..+.....7...1?0=0...+.....7...0...........0!0...+........E.kqZ..........T..b0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...1.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.3.F.D.E.7.C.9.4.8.8
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:ISO-8859 text, with CRLF line terminators
    Category:dropped
    Size (bytes):30650
    Entropy (8bit):5.516268884073016
    Encrypted:false
    SSDEEP:768:tDAm640CejlZtOojWnXD8yVxaQZdHwG5B8ZJDsyPxSQZXH4G7tVB03F3PPvZh/6:tbSjWJD8/5B03DU
    MD5:B404B591DCAE1E28603479A7963CB6F6
    SHA1:5D4AE8370FB8A05189B0ED9430459BCB97BB9E54
    SHA-256:FF361CDD7C814DB0BEA98578A731EF5C03BF457E06BCA9950FDBAB57A4D3C7F6
    SHA-512:F928FD950A1F57172DFDF2CC8D23A54381715EE79D492D3491EAEAF4ADCC11241F87A00E91F03B504F78DF1DEF4D7C4569A192D62E21088ABD6DBFD721134B04
    Malicious:false
    Preview:; FTDIBUS.INF..; ..; Copyright . 2000-2021 Future Technology Devices International Limited..; ..; USB serial converter driver installation file for Windows 7, Windows 8, Windows 8.1, Windows 10,..; Server 2008 R2, Server 2012 R2 and Server 2016...; ..; ..; IMPORTANT NOTICE: PLEASE READ CAREFULLY BEFORE INSTALLING THE RELEVANT ..; SOFTWARE: This licence agreement (Licence) is a legal agreement between you (Licensee or ..; you) and Future Technology Devices International Limited of 2 Seaward Place, Centurion Business ..; Park, Glasgow G41 1HH, Scotland (UK Company Number SC136640) (Licensor or we) for use of ..; driver software provided by the Licensor(Software)...; ..; BY INSTALLING OR USING THIS SOFTWARE YOU AGREE TO THE TERMS OF THIS LICENCE ..; WHICH WILL BIND YOU. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENCE, WE ARE ..; UNWILLING TO LICENSE THE SOFTWARE TO YOU AND YOU MUST DISCONTINUE ..; INSTALLATION OF THE SOFTWARE NOW...; ..; 1..GRANT AND SCOPE OF LICENCE..; ..; 1.1.In cons
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
    Category:dropped
    Size (bytes):274944
    Entropy (8bit):5.978951711504469
    Encrypted:false
    SSDEEP:3072:VTwkcrbAg7JNtvh8vULQzOdtsK9g0BIGpY29ZR0qhJRYxEda6sEsOkXlYJkveT/s:VTPzg5JSULQz2tsKi0B9305E9P+3
    MD5:662679682F491FBAF3D15953D13EC72E
    SHA1:9EA41242F7945A6814D757DA232359DFD7D421BD
    SHA-256:C2729911C4B82D8F9E22E057A1570D0265D7A9ECA44D6FE8DC0658F47263CE12
    SHA-512:E5305020F3BC11342EE9073780BAAE37FF700434B7C695980345C7E9DB56B03F8199CE0C278E549C4EB92B4294F1FC91A0DBBB1C033B13794648A24DC94837E5
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........;L..hL..hL..h..\hn..h..]h(..h..bhE..h.MvhO..hL..h...h.,\hN..h.,ahM..hA.fhM..hL.*hM..h.,chM..hRichL..h........................PE..d......`.........." .........:...............................................P............ .................................................@...(.......h0...............<...@..@... ...8............................c..p............................................text...;........................... ..`.rdata..&...........................@..@.data...X<..........................@....pdata..............................@..@.rsrc...h0.......2..................@..@.reloc..@....@......................@..B................................................................................................................................................................................................................................................
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
    Category:dropped
    Size (bytes):647616
    Entropy (8bit):5.8372260150013044
    Encrypted:false
    SSDEEP:12288:k2Ruad22Cu6+wfhZLF5lfDOHc/aFMmymLRt+i2:332xNfhZLF5lfDOHvMTmLRt2
    MD5:BEFBC1A8F6C2B8E143DDD97CCB6561B5
    SHA1:44B085C25026DABE6280C539F43DD0755FB28499
    SHA-256:774AF8B12C85D03562742ACDF222AF5E0432167BF107BA4B260757E4A5E36866
    SHA-512:A41B29E0493AD8ED57F55B8AA557AED460794894A5A53B057EEEF017A81F071A09DD298FB63EB0277344A9B69D790699131642106124320FB80BA87D1AD60DD4
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........(.H.I...I...I..p.J..I..p.H.VI..p.I..I.......I.......I.......I....p..I...I..GI..S....I..S....I..V.D..I...I,..I..S....I..Rich.I..................PE..d...;..`.........." .........D......3A.......................................0.......'....`.................................................@...d.......i....`...U.......!...........w..8............................x..................@............................text...J........................... ..`.rdata...k.......l..................@..@.data....:... ......................@....pdata..4_...`...`...$..............@..@.idata..............................@..@.gfids..............................@..@.00cfg..............................@..@.rsrc...i...........................@..@.reloc..P...........................@..B........................................................................................................
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
    Category:dropped
    Size (bytes):168456
    Entropy (8bit):6.246480364593094
    Encrypted:false
    SSDEEP:3072:a+f/hrqTv5CgCn2p+WsDC7wQGXLCoeofwaqVcppnx1um75JXZ4:a+cTglYOQwQ4uoebaq4r5n4
    MD5:D79A5E34F684B547FA2F963DFCC15A21
    SHA1:81CCA464D4C8773B00F0A6F170F402FFE2D6A9C8
    SHA-256:4BBC0B301A7C5A6B1B73878CE3AEEB191F5FCEAC05835372142206D79AC81559
    SHA-512:E199F40F06F674EB8EC0E599FFF47A36D4495F4F2FFEE96CADFD00ABA9D5BB127F4461090322244EC973FCC2C8AE119FB12CE65AD585CCAA570115B7D957EA28
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............d...d...d...5v..d...5w..d...5H..d....\..d...d...d..|.v..d..|.K..d...6L..d...d...d..|.I..d..Rich.d..........PE..d......`.........." .....x...........5.................................................... .................. ......................P...h.......d.......@....p.......V...<..............8...........................0...p............................................text...Tw.......x.................. ..`.rdata...............|..............@..@.data...`:...0......................@....pdata.......p.......(..............@..@.rsrc...@............>..............@..@.reloc...............P..............@..B................................................................................................................................................................................................................................................................
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:PE32+ executable (native) x86-64, for MS Windows
    Category:dropped
    Size (bytes):145192
    Entropy (8bit):6.492981302114183
    Encrypted:false
    SSDEEP:3072:np+Tpx5m9iS1H41Un58rdppcZxPtlGU1WopW:n8x5sJ4q58rdppcjPt9WoU
    MD5:AB7418C8DFBBB97BEFB4F0ADED3D4663
    SHA1:B9A7A3FBBA707BA52F8AC4339070473A486CE7B7
    SHA-256:3BD5BB7E646E67469EC25A37CAA5131CF992759703B0FC170DF7AF265B9F8E74
    SHA-512:BE19D2CFE8C9198CE43470FDB6B6030EB4BD1B4080887CB6F1D69C2B661BBD79FFA85B4B70FDBE97BADADF2B75CE7FBE7B627FE08FB1DF3104CC16842E609A40
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........VAA.7/..7/..7/..W)..7/..7...7/..W...7/..W,..7/..W+..7/..i+..7/..i...7/..i-..7/.Rich.7/.................PE..d......`.........."..........<.................@.............................@......W.....`.....................................................P.... ..p...............(G...0..|.......8............................................................................text...3z.......|.................. ..h.rdata..p........ ..................@..H.data...............................@....pdata..............................@..H.gfids..............................@..HPAGE.....%.......&.................. ..`INIT....B........................... ..b.rsrc...p.... ......................@..B.reloc..|....0......................@..B................................................................................................................................................
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
    Category:dropped
    Size (bytes):274944
    Entropy (8bit):5.978951711504469
    Encrypted:false
    SSDEEP:3072:VTwkcrbAg7JNtvh8vULQzOdtsK9g0BIGpY29ZR0qhJRYxEda6sEsOkXlYJkveT/s:VTPzg5JSULQz2tsKi0B9305E9P+3
    MD5:662679682F491FBAF3D15953D13EC72E
    SHA1:9EA41242F7945A6814D757DA232359DFD7D421BD
    SHA-256:C2729911C4B82D8F9E22E057A1570D0265D7A9ECA44D6FE8DC0658F47263CE12
    SHA-512:E5305020F3BC11342EE9073780BAAE37FF700434B7C695980345C7E9DB56B03F8199CE0C278E549C4EB92B4294F1FC91A0DBBB1C033B13794648A24DC94837E5
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........;L..hL..hL..h..\hn..h..]h(..h..bhE..h.MvhO..hL..h...h.,\hN..h.,ahM..hA.fhM..hL.*hM..h.,chM..hRichL..h........................PE..d......`.........." .........:...............................................P............ .................................................@...(.......h0...............<...@..@... ...8............................c..p............................................text...;........................... ..`.rdata..&...........................@..@.data...X<..........................@....pdata..............................@..@.rsrc...h0.......2..................@..@.reloc..@....@......................@..B................................................................................................................................................................................................................................................
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
    Category:dropped
    Size (bytes):168456
    Entropy (8bit):6.246480364593094
    Encrypted:false
    SSDEEP:3072:a+f/hrqTv5CgCn2p+WsDC7wQGXLCoeofwaqVcppnx1um75JXZ4:a+cTglYOQwQ4uoebaq4r5n4
    MD5:D79A5E34F684B547FA2F963DFCC15A21
    SHA1:81CCA464D4C8773B00F0A6F170F402FFE2D6A9C8
    SHA-256:4BBC0B301A7C5A6B1B73878CE3AEEB191F5FCEAC05835372142206D79AC81559
    SHA-512:E199F40F06F674EB8EC0E599FFF47A36D4495F4F2FFEE96CADFD00ABA9D5BB127F4461090322244EC973FCC2C8AE119FB12CE65AD585CCAA570115B7D957EA28
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............d...d...d...5v..d...5w..d...5H..d....\..d...d...d..|.v..d..|.K..d...6L..d...d...d..|.I..d..Rich.d..........PE..d......`.........." .....x...........5.................................................... .................. ......................P...h.......d.......@....p.......V...<..............8...........................0...p............................................text...Tw.......x.................. ..`.rdata...............|..............@..@.data...`:...0......................@....pdata.......p.......(..............@..@.rsrc...@............>..............@..@.reloc...............P..............@..B................................................................................................................................................................................................................................................................
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
    Category:dropped
    Size (bytes):647616
    Entropy (8bit):5.8372260150013044
    Encrypted:false
    SSDEEP:12288:k2Ruad22Cu6+wfhZLF5lfDOHc/aFMmymLRt+i2:332xNfhZLF5lfDOHvMTmLRt2
    MD5:BEFBC1A8F6C2B8E143DDD97CCB6561B5
    SHA1:44B085C25026DABE6280C539F43DD0755FB28499
    SHA-256:774AF8B12C85D03562742ACDF222AF5E0432167BF107BA4B260757E4A5E36866
    SHA-512:A41B29E0493AD8ED57F55B8AA557AED460794894A5A53B057EEEF017A81F071A09DD298FB63EB0277344A9B69D790699131642106124320FB80BA87D1AD60DD4
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........(.H.I...I...I..p.J..I..p.H.VI..p.I..I.......I.......I.......I....p..I...I..GI..S....I..S....I..V.D..I...I,..I..S....I..Rich.I..................PE..d...;..`.........." .........D......3A.......................................0.......'....`.................................................@...d.......i....`...U.......!...........w..8............................x..................@............................text...J........................... ..`.rdata...k.......l..................@..@.data....:... ......................@....pdata..4_...`...`...$..............@..@.idata..............................@..@.gfids..............................@..@.00cfg..............................@..@.rsrc...i...........................@..@.reloc..P...........................@..B........................................................................................................
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:PE32+ executable (native) x86-64, for MS Windows
    Category:dropped
    Size (bytes):145192
    Entropy (8bit):6.492981302114183
    Encrypted:false
    SSDEEP:3072:np+Tpx5m9iS1H41Un58rdppcZxPtlGU1WopW:n8x5sJ4q58rdppcjPt9WoU
    MD5:AB7418C8DFBBB97BEFB4F0ADED3D4663
    SHA1:B9A7A3FBBA707BA52F8AC4339070473A486CE7B7
    SHA-256:3BD5BB7E646E67469EC25A37CAA5131CF992759703B0FC170DF7AF265B9F8E74
    SHA-512:BE19D2CFE8C9198CE43470FDB6B6030EB4BD1B4080887CB6F1D69C2B661BBD79FFA85B4B70FDBE97BADADF2B75CE7FBE7B627FE08FB1DF3104CC16842E609A40
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........VAA.7/..7/..7/..W)..7/..7...7/..W...7/..W,..7/..W+..7/..i+..7/..i...7/..i-..7/.Rich.7/.................PE..d......`.........."..........<.................@.............................@......W.....`.....................................................P.... ..p...............(G...0..|.......8............................................................................text...3z.......|.................. ..h.rdata..p........ ..................@..H.data...............................@....pdata..............................@..H.gfids..............................@..HPAGE.....%.......&.................. ..`INIT....B........................... ..b.rsrc...p.... ......................@..B.reloc..|....0......................@..B................................................................................................................................................
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:data
    Category:dropped
    Size (bytes):23417
    Entropy (8bit):5.948769892863068
    Encrypted:false
    SSDEEP:192:wIWIdFWkGHHPj24Y2f22U222bk2L2h2d2N252Z2L22V2z21232S282e282C2a22g:vyl4rPFRXp4hlTJdkC
    MD5:B392C785B9C2AA31187D1BD0A4F5EBA5
    SHA1:BD80456EAC30AE84B2A0E1CE9A4A364A01C68F39
    SHA-256:B286055896DEA79D4521368293DEEE801930F3FB503CC3076AC97716B338B0F7
    SHA-512:A22007089580CF066FF30D405F607B88F499754F7859EA98915FA2F5E35D21E91BBE4C25271F8C62357F11C2469FD20556D805A52071B96E30FBA8657C6338E6
    Malicious:false
    Preview:0.[u..*.H........[f0.[b...1.0...`.H.e......0.:...+.....7....:.0.:.0...+.....7............@..5;.t.u..210708145418Z0...+.....7.....0...0....R2.F.D.9.A.3.9.F.1.7.B.4.F.8.9.C.E.C.D.7.5.2.8.F.5.8.7.6.7.2.7.D.C.0.0.C.7.A.7.8...1..G08..+.....7...1*0(...F.i.l.e........f.t.d.2.x.x...d.l.l...0M..+.....7...1?0=0...+.....7...0...........0!0...+......../........R.Xvr}..zx0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...1.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R4.5.C.D.6.B.7.1.5.A.A.2.D.4.E.7.E.E.1.9.1.E.C.B.D.F.B.8.C.7.F.7.5.4.D.4.1.7.6.2...1..I0:..+.....7...1,0*...F.i.l.e........f.t.d.i.b.u.s...s.y.s...0M..+.....7...1?0=0...+.....7...0...........0!0...+........E.kqZ..........T..b0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...1.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.3.F.D.E.7.C.9.4.8.8
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:ISO-8859 text, with CRLF line terminators
    Category:dropped
    Size (bytes):30650
    Entropy (8bit):5.516268884073016
    Encrypted:false
    SSDEEP:768:tDAm640CejlZtOojWnXD8yVxaQZdHwG5B8ZJDsyPxSQZXH4G7tVB03F3PPvZh/6:tbSjWJD8/5B03DU
    MD5:B404B591DCAE1E28603479A7963CB6F6
    SHA1:5D4AE8370FB8A05189B0ED9430459BCB97BB9E54
    SHA-256:FF361CDD7C814DB0BEA98578A731EF5C03BF457E06BCA9950FDBAB57A4D3C7F6
    SHA-512:F928FD950A1F57172DFDF2CC8D23A54381715EE79D492D3491EAEAF4ADCC11241F87A00E91F03B504F78DF1DEF4D7C4569A192D62E21088ABD6DBFD721134B04
    Malicious:false
    Preview:; FTDIBUS.INF..; ..; Copyright . 2000-2021 Future Technology Devices International Limited..; ..; USB serial converter driver installation file for Windows 7, Windows 8, Windows 8.1, Windows 10,..; Server 2008 R2, Server 2012 R2 and Server 2016...; ..; ..; IMPORTANT NOTICE: PLEASE READ CAREFULLY BEFORE INSTALLING THE RELEVANT ..; SOFTWARE: This licence agreement (Licence) is a legal agreement between you (Licensee or ..; you) and Future Technology Devices International Limited of 2 Seaward Place, Centurion Business ..; Park, Glasgow G41 1HH, Scotland (UK Company Number SC136640) (Licensor or we) for use of ..; driver software provided by the Licensor(Software)...; ..; BY INSTALLING OR USING THIS SOFTWARE YOU AGREE TO THE TERMS OF THIS LICENCE ..; WHICH WILL BIND YOU. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENCE, WE ARE ..; UNWILLING TO LICENSE THE SOFTWARE TO YOU AND YOU MUST DISCONTINUE ..; INSTALLATION OF THE SOFTWARE NOW...; ..; 1..GRANT AND SCOPE OF LICENCE..; ..; 1.1.In cons
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):392128
    Entropy (8bit):6.675882265173621
    Encrypted:false
    SSDEEP:6144:6cumjO3f6acDJuRkgm3qP12tHi3b+cVZhPTlqWMTZ4Rp71RpeRjK3q:6cBjQf6acERkkP12tqbBxTlqWUop5ywa
    MD5:6FFEB45E0137622EBBBA8361107D304E
    SHA1:01B3F848148A276F6317D6C98EDBDB1133F458DA
    SHA-256:60BB0D6348B1EB0127401AA902F34C963D9196D2778C66F4008A6CF0C6F098A5
    SHA-512:BC3D9DDCB1FC249CF1A3A11EEFE9131280F18CB538C381C46B1818354E947690D52FD38B14674A7BB51CE5FF73F4B8721D19FD4960694B3442ECC90C58F75052
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........>.6._je._je._jei.e._jei.eO_jei.e._je..id._je..od._je..nd._je...e._je._ke\_jeJ.od._jeJ.jd._jeO..e._je._.e._jeJ.hd._jeRich._je................PE..L......`...........!.........................................................0......Tq..........................................d.......X................!.......(.....T...........................(...@............................................text............................... ..`.rdata..............................@..@.data...X$..........................@....gfids..............................@..@.rsrc...X...........................@..@.reloc...(.......(..................@..B................................................................................................................................................................................................................................................
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):392128
    Entropy (8bit):6.675882265173621
    Encrypted:false
    SSDEEP:6144:6cumjO3f6acDJuRkgm3qP12tHi3b+cVZhPTlqWMTZ4Rp71RpeRjK3q:6cBjQf6acERkkP12tqbBxTlqWUop5ywa
    MD5:6FFEB45E0137622EBBBA8361107D304E
    SHA1:01B3F848148A276F6317D6C98EDBDB1133F458DA
    SHA-256:60BB0D6348B1EB0127401AA902F34C963D9196D2778C66F4008A6CF0C6F098A5
    SHA-512:BC3D9DDCB1FC249CF1A3A11EEFE9131280F18CB538C381C46B1818354E947690D52FD38B14674A7BB51CE5FF73F4B8721D19FD4960694B3442ECC90C58F75052
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........>.6._je._je._jei.e._jei.eO_jei.e._je..id._je..od._je..nd._je...e._je._ke\_jeJ.od._jeJ.jd._jeO..e._je._.e._jeJ.hd._jeRich._je................PE..L......`...........!.........................................................0......Tq..........................................d.......X................!.......(.....T...........................(...@............................................text............................... ..`.rdata..............................@..@.data...X$..........................@....gfids..............................@..@.rsrc...X...........................@..@.reloc...(.......(..................@..B................................................................................................................................................................................................................................................
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:modified
    Size (bytes):6322
    Entropy (8bit):3.6711467130211832
    Encrypted:false
    SSDEEP:96:857JdrR40Q2uEQ6TDQ63Uy9saGJsaxhHJBy9iJN8HB57k:a75WaFaXqBP7k
    MD5:3A9C494A395BFC495BA8C3901352844C
    SHA1:A8CA0A1B302FDE87058555B072F7679A37523FC9
    SHA-256:157FD4E008C74C6AE5D21F6483F3973CA87E669EA6F13F3B2D78FA1CDF762F68
    SHA-512:97C5992B8352A79B8BF80AE1C572DD1B198C227E28447F192132B7C618F4C24E13CFA7C79B59C0B8B2814C953FB05BE15C7000671FF4369381077195CCB9976C
    Malicious:false
    Preview:..I.N.F.O.:. . . .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....I.N.F.O.:. . . .0.4./.2.3./.2.0.2.4. .0.9.:.2.1.:.0.6.....I.N.F.O.:. . . .P.r.o.d.u.c.t. .V.e.r.s.i.o.n. .2...1...0...0.......I.N.F.O.:. . . .V.e.r.s.i.o.n.:. .6...2...9.2.0.0. .....I.N.F.O.:. . . .P.l.a.t.f.o.r.m. .I.D.:. .2. .(.N.T.).....I.N.F.O.:. . . .S.e.r.v.i.c.e. .P.a.c.k.:. .0...0.....I.N.F.O.:. . . .S.u.i.t.e.:. .0.x.0.1.0.0.,. .P.r.o.d.u.c.t. .T.y.p.e.:. .1.....I.N.F.O.:. . . .A.r.c.h.i.t.e.c.t.u.r.e.:. .A.M.D.6.4.......I.N.F.O.:. . . .I.n.t.e.r.a.c.t.i.v.e. .W.i.n.d.o.w.s. .S.t.a.t.i.o.n.....I.N.F.O.:. . . .C.o.m.m.a.n.d. .L.i.n.e.:. .'.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.F.T.D.I.-.D.r.i.v.e.r.\.d.p.i.n.s.t.-.a.m.d.6.4...e.x.e. ./.s.a.'.....I.N.F.O.:. . . .D.P.I.n.s.t. .i.s. .n.o.t. .m.u.l.t.i.-.l.i.n.g.u.a.l.......I.N.F.O.:. . . .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....I.N.F.O.:. . . .C.u.r.r.e.n.t.
    Process:C:\Windows\System32\drvinst.exe
    File Type:ISO-8859 text, with CRLF line terminators
    Category:dropped
    Size (bytes):30650
    Entropy (8bit):5.516268884073016
    Encrypted:false
    SSDEEP:768:tDAm640CejlZtOojWnXD8yVxaQZdHwG5B8ZJDsyPxSQZXH4G7tVB03F3PPvZh/6:tbSjWJD8/5B03DU
    MD5:B404B591DCAE1E28603479A7963CB6F6
    SHA1:5D4AE8370FB8A05189B0ED9430459BCB97BB9E54
    SHA-256:FF361CDD7C814DB0BEA98578A731EF5C03BF457E06BCA9950FDBAB57A4D3C7F6
    SHA-512:F928FD950A1F57172DFDF2CC8D23A54381715EE79D492D3491EAEAF4ADCC11241F87A00E91F03B504F78DF1DEF4D7C4569A192D62E21088ABD6DBFD721134B04
    Malicious:false
    Preview:; FTDIBUS.INF..; ..; Copyright . 2000-2021 Future Technology Devices International Limited..; ..; USB serial converter driver installation file for Windows 7, Windows 8, Windows 8.1, Windows 10,..; Server 2008 R2, Server 2012 R2 and Server 2016...; ..; ..; IMPORTANT NOTICE: PLEASE READ CAREFULLY BEFORE INSTALLING THE RELEVANT ..; SOFTWARE: This licence agreement (Licence) is a legal agreement between you (Licensee or ..; you) and Future Technology Devices International Limited of 2 Seaward Place, Centurion Business ..; Park, Glasgow G41 1HH, Scotland (UK Company Number SC136640) (Licensor or we) for use of ..; driver software provided by the Licensor(Software)...; ..; BY INSTALLING OR USING THIS SOFTWARE YOU AGREE TO THE TERMS OF THIS LICENCE ..; WHICH WILL BIND YOU. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENCE, WE ARE ..; UNWILLING TO LICENSE THE SOFTWARE TO YOU AND YOU MUST DISCONTINUE ..; INSTALLATION OF THE SOFTWARE NOW...; ..; 1..GRANT AND SCOPE OF LICENCE..; ..; 1.1.In cons
    Process:C:\Windows\System32\drvinst.exe
    File Type:ISO-8859 text, with CRLF line terminators
    Category:dropped
    Size (bytes):18369
    Entropy (8bit):5.49132972724957
    Encrypted:false
    SSDEEP:384:KRD7TYsKwdRFr+40CejlZtOoggvxUkHlfD0fsEc886YVeZgTey:WDAm640CejlZtOoV5DfX88t
    MD5:B16B75B545A296EFC49805C94DFD334C
    SHA1:88DA6E6C3C9D94F6725D854CD866EA2CF305D67A
    SHA-256:00627112CF622CC6FB99A6B5DE24FCC61B6D0A211A6BD1E90B985BCF9950F6D9
    SHA-512:18C2B08A06AE87F5F2EEB79DEE4A3725FB5F8516D9C9F1CA60C5C96F06BA07493D4FB4199FBD67A042132201EC32C3E5B4331CF0671F787B3DA7A2C5A7197357
    Malicious:false
    Preview:; FTDIPORT.INF..; ..; Copyright . 2000-2021 Future Technology Devices International Limited..;..; USB serial port driver installation file for Windows 7, Windows 8, Windows 8.1, Windows 10,..; Server 2008 R2, Server 2012 R2 and Server 2016.....; ..; ..; IMPORTANT NOTICE: PLEASE READ CAREFULLY BEFORE INSTALLING THE RELEVANT ..; SOFTWARE: This licence agreement (Licence) is a legal agreement between you (Licensee or ..; you) and Future Technology Devices International Limited of 2 Seaward Place, Centurion Business ..; Park, Glasgow G41 1HH, Scotland (UK Company Number SC136640) (Licensor or we) for use of ..; driver software provided by the Licensor(Software)...; ..; BY INSTALLING OR USING THIS SOFTWARE YOU AGREE TO THE TERMS OF THIS LICENCE ..; WHICH WILL BIND YOU. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENCE, WE ARE ..; UNWILLING TO LICENSE THE SOFTWARE TO YOU AND YOU MUST DISCONTINUE ..; INSTALLATION OF THE SOFTWARE NOW...; ..; 1..GRANT AND SCOPE OF LICENCE..; ..; 1.1.In conside
    Process:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    File Type:Generic INItialization configuration [BeginLog]
    Category:dropped
    Size (bytes):49873
    Entropy (8bit):5.263777111024947
    Encrypted:false
    SSDEEP:768:Own95cdyYloiwQ+c2mwPvvYCVdTaEAg8eo/iD:O+5cdyeoiwQ+cJiD
    MD5:A6CB45DCFE03B70C5E7CBAC7DBE7FAE0
    SHA1:DC003D46581E21E6DADDC4EE804339D029233EFB
    SHA-256:FD15E5AA69EF9CE8933DAB759EEEC04AC3444DC09500DD48316E1E518136279E
    SHA-512:AF4A461BDAB6684C48B804DAD34736E200C09057D66DEFE5680865413A93425F48D12F8E8FC2F9260D0EE775877DB8FD43869B4377A411A8017E7AFFBCE767F0
    Malicious:false
    Preview:[Device Install Log].. OS Version = 10.0.19045.. Service Pack = 0.0.. Suite = 0x0100.. ProductType = 1.. Architecture = amd64....[BeginLog]....[Boot Session: 2023/10/03 09:57:02.288]....>>> [Setup Import Driver Package - C:\Windows\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf]..>>> Section start 2023/10/03 09:57:37.904.. cmd: C:\Windows\System32\spoolsv.exe.. inf: Provider: Microsoft.. inf: Class GUID: {4D36E979-E325-11CE-BFC1-08002BE10318}.. inf: Driver Version: 06/21/2006,10.0.19041.1806.. inf: Catalog File: prnms009.cat.. ump: Import flags: 0x0000000D.. pol: {Driver package policy check} 09:57:37.920.. pol: {Driver package policy check - exit(0x00000000)} 09:57:37.920.. sto: {Stage Driver Package: C:\Windows\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf} 09:57:37.920.. inf: {Query Configurability: C:\Windows\system32\spool\tools\Microsoft Print To PDF\prnms009.Inf} 09:57:37.920.. inf:
    Process:C:\Windows\System32\drvinst.exe
    File Type:data
    Category:dropped
    Size (bytes):22608
    Entropy (8bit):5.965323528440976
    Encrypted:false
    SSDEEP:192:whASiyWWICmejj24Y2f22U222bk2L2h2d2N252Z2L22V2z21232S282e282C2a2E:YAw4rPFRO+NJ/AlGsJPY9
    MD5:60238C00694F838EED4757D1CE167D8B
    SHA1:0E39502D2CBD03ECF3973AD2F5F94DDB21C74B37
    SHA-256:113A35E6161F3AE8BB9D0E0F31913872C4B32FD6211ECE27DDDEB238F601EB59
    SHA-512:578A026793F2A30814A31BB9A63360BC2142E3263CB752B67CF8FFD3A65253D30E0BBA5BBD5D57759BA3455AB8F2D766FC14F6D6B5085833EA44936A08B8C713
    Malicious:false
    Preview:0.XL..*.H........X=0.X9...1.0...`.H.e......0.6...+.....7....6.0.6.0...+.....7.......;...@..:.T8-...210708145418Z0...+.....7.....0...0....R0.3.A.4.7.E.F.E.F.0.0.6.9.1.7.6.4.3.0.A.C.8.A.2.E.3.9.0.8.5.F.D.3.2.2.E.8.2.D.3...1..I0:..+.....7...1,0*...F.i.l.e........f.t.s.e.r.2.k...s.y.s...0M..+.....7...1?0=0...+.....7...0...........0!0...+..........~....vC....2...0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...1.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R1.6.4.D.6.B.E.E.E.6.1.A.B.B.F.2.0.5.7.4.D.E.3.B.4.2.5.5.F.3.C.5.E.2.1.2.E.2.7.6...1..K0<..+.....7...1.0,...F.i.l.e........f.t.s.e.r.u.i.2...d.l.l...0M..+.....7...1?0=0...+.....7...0...........0!0...+.........Mk......t.;BU.....v0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...1.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R1.9.2.9.B.B.A.B.9
    Process:C:\Windows\System32\drvinst.exe
    File Type:ISO-8859 text, with CRLF line terminators
    Category:dropped
    Size (bytes):18369
    Entropy (8bit):5.49132972724957
    Encrypted:false
    SSDEEP:384:KRD7TYsKwdRFr+40CejlZtOoggvxUkHlfD0fsEc886YVeZgTey:WDAm640CejlZtOoV5DfX88t
    MD5:B16B75B545A296EFC49805C94DFD334C
    SHA1:88DA6E6C3C9D94F6725D854CD866EA2CF305D67A
    SHA-256:00627112CF622CC6FB99A6B5DE24FCC61B6D0A211A6BD1E90B985BCF9950F6D9
    SHA-512:18C2B08A06AE87F5F2EEB79DEE4A3725FB5F8516D9C9F1CA60C5C96F06BA07493D4FB4199FBD67A042132201EC32C3E5B4331CF0671F787B3DA7A2C5A7197357
    Malicious:false
    Preview:; FTDIPORT.INF..; ..; Copyright . 2000-2021 Future Technology Devices International Limited..;..; USB serial port driver installation file for Windows 7, Windows 8, Windows 8.1, Windows 10,..; Server 2008 R2, Server 2012 R2 and Server 2016.....; ..; ..; IMPORTANT NOTICE: PLEASE READ CAREFULLY BEFORE INSTALLING THE RELEVANT ..; SOFTWARE: This licence agreement (Licence) is a legal agreement between you (Licensee or ..; you) and Future Technology Devices International Limited of 2 Seaward Place, Centurion Business ..; Park, Glasgow G41 1HH, Scotland (UK Company Number SC136640) (Licensor or we) for use of ..; driver software provided by the Licensor(Software)...; ..; BY INSTALLING OR USING THIS SOFTWARE YOU AGREE TO THE TERMS OF THIS LICENCE ..; WHICH WILL BIND YOU. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENCE, WE ARE ..; UNWILLING TO LICENSE THE SOFTWARE TO YOU AND YOU MUST DISCONTINUE ..; INSTALLATION OF THE SOFTWARE NOW...; ..; 1..GRANT AND SCOPE OF LICENCE..; ..; 1.1.In conside
    Process:C:\Windows\System32\drvinst.exe
    File Type:PE32+ executable (native) x86-64, for MS Windows
    Category:dropped
    Size (bytes):99296
    Entropy (8bit):6.544765616961625
    Encrypted:false
    SSDEEP:1536:ateH5nh6Lk8irGapY1hgw+8wWXZ43CV5h9zYWSYZz8ITF:LZhck8irB4gXWp43g53UWSYtJF
    MD5:B66678FF4E347E22146609B3D5B7B2C4
    SHA1:632A3B4365F9256B13FF0F671260463A8972070D
    SHA-256:7A303AA880CC746D13F71E565874FB7C174747372CCF358B928A72219D2A50DD
    SHA-512:07D73174638953074165EEFB804394F21A1A115116459B96903FCB34A6656450BDCD2A9ABD0590EC5A63D3DF153301A8DDB527405D67DFF3065BB5108C52F575
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........x....{...{...{...z..{..yz...{..yx...{..y....{.]G....{.XG....{.]Gy...{.Rich..{.........PE..d......`.........."...........................@..........................................`.....................................................<....................>...E.......... ...8...........................`...................@............................text....n.......n.................. ..h.rdata..p............r..............@..H.data...............................@....pdata..............................@..H.gfids..............................@..HPAGESRP0.E.......F.................. ..`PAGESER..@... ...B.................. ..`PAGE.........p.......".............. ..`INIT.................(.............. ..b.rsrc................8..............@..B.reloc...............<..............@..B................................................................................
    Process:C:\Windows\System32\drvinst.exe
    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
    Category:dropped
    Size (bytes):65544
    Entropy (8bit):6.240264971246993
    Encrypted:false
    SSDEEP:768:eNz2GaueQUOHlpEhZf25HY/Q2KDJko4zfrW86F+12Rer30bbYrc/a0FpJvh9Rebt:ex7eWvE3KMSQT12R60T/PP8H/3F
    MD5:3E5BCD980AF8B20313005D9A492CEC8A
    SHA1:060B9D1444327D3FAA56E3B35FC2BB606B692DD7
    SHA-256:55A23A2AC263E10B77D7E95601439F771062F2C248A8D93039A968D66100C39C
    SHA-512:DC4BA803EB3EAB0D5BA452ACA2C57095A74B1B3DBD82078ED17BBC34C5DB3F791EAB4A418D4C822C170B4D561D36D0E47BA6A2DA915A8B1797A88666B19C69F3
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........0...Q.\.Q.\.Q.\..\.Q.\.)H\.Q.\.)^\.Q.\.)Y\.Q.\.Q.\)Q.\.)N\.Q.\..\.Q.\.)O\.Q.\.)T\.Q.\...\.Q.\.)I\.Q.\.)L\.Q.\Rich.Q.\........PE..d......`.........." .........B......@]...............................................&....@......................................... ....................$...............<......0....................................................................................text.............................. ..`.data... ...........................@....pdata..............................@..@.rsrc....$.......&..................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\drvinst.exe
    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
    Category:dropped
    Size (bytes):75272
    Entropy (8bit):6.176258876551271
    Encrypted:false
    SSDEEP:1536:lxRShQnixg3RolUmf71kjy3JIO64l7Xuuy+fk+QI:lHShQnixg3RolUmzCy3JIO64l7euVfkQ
    MD5:AA69BF96E10F463082A0664B7A2E9FAE
    SHA1:D9CC34D613E8655FD7DA5293093E050D4D24AF5F
    SHA-256:C0224B9EF14365F6DDA96134CC77D978E69FBD61EFDADE6FD1EB676418C41023
    SHA-512:778599EEEE6C6F3F8C46E4BB774697E8528F03B30381BE3BA06298E23D1514039CC926E89AADAC2771074657A9478DCF60D4D92BDD69C7A5A094D59ED32F2993
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........l..............................u.......u.......u.............u.......u.......u.......u......Rich....................PE..d...i..`.........." .........6......<d.......................................@............@.........................................p...Q... ...x.... ..X................<...0..`...0................................................................................text............................... ..`.data....&..........................@....pdata..............................@..@.rsrc...X.... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\drvinst.exe
    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
    Category:dropped
    Size (bytes):75272
    Entropy (8bit):6.176258876551271
    Encrypted:false
    SSDEEP:1536:lxRShQnixg3RolUmf71kjy3JIO64l7Xuuy+fk+QI:lHShQnixg3RolUmzCy3JIO64l7euVfkQ
    MD5:AA69BF96E10F463082A0664B7A2E9FAE
    SHA1:D9CC34D613E8655FD7DA5293093E050D4D24AF5F
    SHA-256:C0224B9EF14365F6DDA96134CC77D978E69FBD61EFDADE6FD1EB676418C41023
    SHA-512:778599EEEE6C6F3F8C46E4BB774697E8528F03B30381BE3BA06298E23D1514039CC926E89AADAC2771074657A9478DCF60D4D92BDD69C7A5A094D59ED32F2993
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........l..............................u.......u.......u.............u.......u.......u.......u......Rich....................PE..d...i..`.........." .........6......<d.......................................@............@.........................................p...Q... ...x.... ..X................<...0..`...0................................................................................text............................... ..`.data....&..........................@....pdata..............................@..@.rsrc...X.... ......................@..@.reloc.......0......................@..B................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\drvinst.exe
    File Type:PE32+ executable (native) x86-64, for MS Windows
    Category:dropped
    Size (bytes):99296
    Entropy (8bit):6.544765616961625
    Encrypted:false
    SSDEEP:1536:ateH5nh6Lk8irGapY1hgw+8wWXZ43CV5h9zYWSYZz8ITF:LZhck8irB4gXWp43g53UWSYtJF
    MD5:B66678FF4E347E22146609B3D5B7B2C4
    SHA1:632A3B4365F9256B13FF0F671260463A8972070D
    SHA-256:7A303AA880CC746D13F71E565874FB7C174747372CCF358B928A72219D2A50DD
    SHA-512:07D73174638953074165EEFB804394F21A1A115116459B96903FCB34A6656450BDCD2A9ABD0590EC5A63D3DF153301A8DDB527405D67DFF3065BB5108C52F575
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........x....{...{...{...z..{..yz...{..yx...{..y....{.]G....{.XG....{.]Gy...{.Rich..{.........PE..d......`.........."...........................@..........................................`.....................................................<....................>...E.......... ...8...........................`...................@............................text....n.......n.................. ..h.rdata..p............r..............@..H.data...............................@....pdata..............................@..H.gfids..............................@..HPAGESRP0.E.......F.................. ..`PAGESER..@... ...B.................. ..`PAGE.........p.......".............. ..`INIT.................(.............. ..b.rsrc................8..............@..B.reloc...............<..............@..B................................................................................
    Process:C:\Windows\System32\drvinst.exe
    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
    Category:dropped
    Size (bytes):65544
    Entropy (8bit):6.240264971246993
    Encrypted:false
    SSDEEP:768:eNz2GaueQUOHlpEhZf25HY/Q2KDJko4zfrW86F+12Rer30bbYrc/a0FpJvh9Rebt:ex7eWvE3KMSQT12R60T/PP8H/3F
    MD5:3E5BCD980AF8B20313005D9A492CEC8A
    SHA1:060B9D1444327D3FAA56E3B35FC2BB606B692DD7
    SHA-256:55A23A2AC263E10B77D7E95601439F771062F2C248A8D93039A968D66100C39C
    SHA-512:DC4BA803EB3EAB0D5BA452ACA2C57095A74B1B3DBD82078ED17BBC34C5DB3F791EAB4A418D4C822C170B4D561D36D0E47BA6A2DA915A8B1797A88666B19C69F3
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........0...Q.\.Q.\.Q.\..\.Q.\.)H\.Q.\.)^\.Q.\.)Y\.Q.\.Q.\)Q.\.)N\.Q.\..\.Q.\.)O\.Q.\.)T\.Q.\...\.Q.\.)I\.Q.\.)L\.Q.\Rich.Q.\........PE..d......`.........." .........B......@]...............................................&....@......................................... ....................$...............<......0....................................................................................text.............................. ..`.data... ...........................@....pdata..............................@..@.rsrc....$.......&..................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\drvinst.exe
    File Type:data
    Category:dropped
    Size (bytes):22608
    Entropy (8bit):5.965323528440976
    Encrypted:false
    SSDEEP:192:whASiyWWICmejj24Y2f22U222bk2L2h2d2N252Z2L22V2z21232S282e282C2a2E:YAw4rPFRO+NJ/AlGsJPY9
    MD5:60238C00694F838EED4757D1CE167D8B
    SHA1:0E39502D2CBD03ECF3973AD2F5F94DDB21C74B37
    SHA-256:113A35E6161F3AE8BB9D0E0F31913872C4B32FD6211ECE27DDDEB238F601EB59
    SHA-512:578A026793F2A30814A31BB9A63360BC2142E3263CB752B67CF8FFD3A65253D30E0BBA5BBD5D57759BA3455AB8F2D766FC14F6D6B5085833EA44936A08B8C713
    Malicious:false
    Preview:0.XL..*.H........X=0.X9...1.0...`.H.e......0.6...+.....7....6.0.6.0...+.....7.......;...@..:.T8-...210708145418Z0...+.....7.....0...0....R0.3.A.4.7.E.F.E.F.0.0.6.9.1.7.6.4.3.0.A.C.8.A.2.E.3.9.0.8.5.F.D.3.2.2.E.8.2.D.3...1..I0:..+.....7...1,0*...F.i.l.e........f.t.s.e.r.2.k...s.y.s...0M..+.....7...1?0=0...+.....7...0...........0!0...+..........~....vC....2...0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...1.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R1.6.4.D.6.B.E.E.E.6.1.A.B.B.F.2.0.5.7.4.D.E.3.B.4.2.5.5.F.3.C.5.E.2.1.2.E.2.7.6...1..K0<..+.....7...1.0,...F.i.l.e........f.t.s.e.r.u.i.2...d.l.l...0M..+.....7...1?0=0...+.....7...0...........0!0...+.........Mk......t.;BU.....v0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...1.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R1.9.2.9.B.B.A.B.9
    Process:C:\Windows\System32\drvinst.exe
    File Type:ISO-8859 text, with CRLF line terminators
    Category:dropped
    Size (bytes):18369
    Entropy (8bit):5.49132972724957
    Encrypted:false
    SSDEEP:384:KRD7TYsKwdRFr+40CejlZtOoggvxUkHlfD0fsEc886YVeZgTey:WDAm640CejlZtOoV5DfX88t
    MD5:B16B75B545A296EFC49805C94DFD334C
    SHA1:88DA6E6C3C9D94F6725D854CD866EA2CF305D67A
    SHA-256:00627112CF622CC6FB99A6B5DE24FCC61B6D0A211A6BD1E90B985BCF9950F6D9
    SHA-512:18C2B08A06AE87F5F2EEB79DEE4A3725FB5F8516D9C9F1CA60C5C96F06BA07493D4FB4199FBD67A042132201EC32C3E5B4331CF0671F787B3DA7A2C5A7197357
    Malicious:false
    Preview:; FTDIPORT.INF..; ..; Copyright . 2000-2021 Future Technology Devices International Limited..;..; USB serial port driver installation file for Windows 7, Windows 8, Windows 8.1, Windows 10,..; Server 2008 R2, Server 2012 R2 and Server 2016.....; ..; ..; IMPORTANT NOTICE: PLEASE READ CAREFULLY BEFORE INSTALLING THE RELEVANT ..; SOFTWARE: This licence agreement (Licence) is a legal agreement between you (Licensee or ..; you) and Future Technology Devices International Limited of 2 Seaward Place, Centurion Business ..; Park, Glasgow G41 1HH, Scotland (UK Company Number SC136640) (Licensor or we) for use of ..; driver software provided by the Licensor(Software)...; ..; BY INSTALLING OR USING THIS SOFTWARE YOU AGREE TO THE TERMS OF THIS LICENCE ..; WHICH WILL BIND YOU. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENCE, WE ARE ..; UNWILLING TO LICENSE THE SOFTWARE TO YOU AND YOU MUST DISCONTINUE ..; INSTALLATION OF THE SOFTWARE NOW...; ..; 1..GRANT AND SCOPE OF LICENCE..; ..; 1.1.In conside
    Process:C:\Windows\System32\drvinst.exe
    File Type:data
    Category:dropped
    Size (bytes):23417
    Entropy (8bit):5.948769892863068
    Encrypted:false
    SSDEEP:192:wIWIdFWkGHHPj24Y2f22U222bk2L2h2d2N252Z2L22V2z21232S282e282C2a22g:vyl4rPFRXp4hlTJdkC
    MD5:B392C785B9C2AA31187D1BD0A4F5EBA5
    SHA1:BD80456EAC30AE84B2A0E1CE9A4A364A01C68F39
    SHA-256:B286055896DEA79D4521368293DEEE801930F3FB503CC3076AC97716B338B0F7
    SHA-512:A22007089580CF066FF30D405F607B88F499754F7859EA98915FA2F5E35D21E91BBE4C25271F8C62357F11C2469FD20556D805A52071B96E30FBA8657C6338E6
    Malicious:false
    Preview:0.[u..*.H........[f0.[b...1.0...`.H.e......0.:...+.....7....:.0.:.0...+.....7............@..5;.t.u..210708145418Z0...+.....7.....0...0....R2.F.D.9.A.3.9.F.1.7.B.4.F.8.9.C.E.C.D.7.5.2.8.F.5.8.7.6.7.2.7.D.C.0.0.C.7.A.7.8...1..G08..+.....7...1*0(...F.i.l.e........f.t.d.2.x.x...d.l.l...0M..+.....7...1?0=0...+.....7...0...........0!0...+......../........R.Xvr}..zx0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...1.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R4.5.C.D.6.B.7.1.5.A.A.2.D.4.E.7.E.E.1.9.1.E.C.B.D.F.B.8.C.7.F.7.5.4.D.4.1.7.6.2...1..I0:..+.....7...1,0*...F.i.l.e........f.t.d.i.b.u.s...s.y.s...0M..+.....7...1?0=0...+.....7...0...........0!0...+........E.kqZ..........T..b0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...1.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.3.F.D.E.7.C.9.4.8.8
    Process:C:\Windows\System32\drvinst.exe
    File Type:ISO-8859 text, with CRLF line terminators
    Category:dropped
    Size (bytes):30650
    Entropy (8bit):5.516268884073016
    Encrypted:false
    SSDEEP:768:tDAm640CejlZtOojWnXD8yVxaQZdHwG5B8ZJDsyPxSQZXH4G7tVB03F3PPvZh/6:tbSjWJD8/5B03DU
    MD5:B404B591DCAE1E28603479A7963CB6F6
    SHA1:5D4AE8370FB8A05189B0ED9430459BCB97BB9E54
    SHA-256:FF361CDD7C814DB0BEA98578A731EF5C03BF457E06BCA9950FDBAB57A4D3C7F6
    SHA-512:F928FD950A1F57172DFDF2CC8D23A54381715EE79D492D3491EAEAF4ADCC11241F87A00E91F03B504F78DF1DEF4D7C4569A192D62E21088ABD6DBFD721134B04
    Malicious:false
    Preview:; FTDIBUS.INF..; ..; Copyright . 2000-2021 Future Technology Devices International Limited..; ..; USB serial converter driver installation file for Windows 7, Windows 8, Windows 8.1, Windows 10,..; Server 2008 R2, Server 2012 R2 and Server 2016...; ..; ..; IMPORTANT NOTICE: PLEASE READ CAREFULLY BEFORE INSTALLING THE RELEVANT ..; SOFTWARE: This licence agreement (Licence) is a legal agreement between you (Licensee or ..; you) and Future Technology Devices International Limited of 2 Seaward Place, Centurion Business ..; Park, Glasgow G41 1HH, Scotland (UK Company Number SC136640) (Licensor or we) for use of ..; driver software provided by the Licensor(Software)...; ..; BY INSTALLING OR USING THIS SOFTWARE YOU AGREE TO THE TERMS OF THIS LICENCE ..; WHICH WILL BIND YOU. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENCE, WE ARE ..; UNWILLING TO LICENSE THE SOFTWARE TO YOU AND YOU MUST DISCONTINUE ..; INSTALLATION OF THE SOFTWARE NOW...; ..; 1..GRANT AND SCOPE OF LICENCE..; ..; 1.1.In cons
    Process:C:\Windows\System32\drvinst.exe
    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
    Category:dropped
    Size (bytes):274944
    Entropy (8bit):5.978951711504469
    Encrypted:false
    SSDEEP:3072:VTwkcrbAg7JNtvh8vULQzOdtsK9g0BIGpY29ZR0qhJRYxEda6sEsOkXlYJkveT/s:VTPzg5JSULQz2tsKi0B9305E9P+3
    MD5:662679682F491FBAF3D15953D13EC72E
    SHA1:9EA41242F7945A6814D757DA232359DFD7D421BD
    SHA-256:C2729911C4B82D8F9E22E057A1570D0265D7A9ECA44D6FE8DC0658F47263CE12
    SHA-512:E5305020F3BC11342EE9073780BAAE37FF700434B7C695980345C7E9DB56B03F8199CE0C278E549C4EB92B4294F1FC91A0DBBB1C033B13794648A24DC94837E5
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........;L..hL..hL..h..\hn..h..]h(..h..bhE..h.MvhO..hL..h...h.,\hN..h.,ahM..hA.fhM..hL.*hM..h.,chM..hRichL..h........................PE..d......`.........." .........:...............................................P............ .................................................@...(.......h0...............<...@..@... ...8............................c..p............................................text...;........................... ..`.rdata..&...........................@..@.data...X<..........................@....pdata..............................@..@.rsrc...h0.......2..................@..@.reloc..@....@......................@..B................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\drvinst.exe
    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
    Category:dropped
    Size (bytes):647616
    Entropy (8bit):5.8372260150013044
    Encrypted:false
    SSDEEP:12288:k2Ruad22Cu6+wfhZLF5lfDOHc/aFMmymLRt+i2:332xNfhZLF5lfDOHvMTmLRt2
    MD5:BEFBC1A8F6C2B8E143DDD97CCB6561B5
    SHA1:44B085C25026DABE6280C539F43DD0755FB28499
    SHA-256:774AF8B12C85D03562742ACDF222AF5E0432167BF107BA4B260757E4A5E36866
    SHA-512:A41B29E0493AD8ED57F55B8AA557AED460794894A5A53B057EEEF017A81F071A09DD298FB63EB0277344A9B69D790699131642106124320FB80BA87D1AD60DD4
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........(.H.I...I...I..p.J..I..p.H.VI..p.I..I.......I.......I.......I....p..I...I..GI..S....I..S....I..V.D..I...I,..I..S....I..Rich.I..................PE..d...;..`.........." .........D......3A.......................................0.......'....`.................................................@...d.......i....`...U.......!...........w..8............................x..................@............................text...J........................... ..`.rdata...k.......l..................@..@.data....:... ......................@....pdata..4_...`...`...$..............@..@.idata..............................@..@.gfids..............................@..@.00cfg..............................@..@.rsrc...i...........................@..@.reloc..P...........................@..B........................................................................................................
    Process:C:\Windows\System32\drvinst.exe
    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
    Category:dropped
    Size (bytes):168456
    Entropy (8bit):6.246480364593094
    Encrypted:false
    SSDEEP:3072:a+f/hrqTv5CgCn2p+WsDC7wQGXLCoeofwaqVcppnx1um75JXZ4:a+cTglYOQwQ4uoebaq4r5n4
    MD5:D79A5E34F684B547FA2F963DFCC15A21
    SHA1:81CCA464D4C8773B00F0A6F170F402FFE2D6A9C8
    SHA-256:4BBC0B301A7C5A6B1B73878CE3AEEB191F5FCEAC05835372142206D79AC81559
    SHA-512:E199F40F06F674EB8EC0E599FFF47A36D4495F4F2FFEE96CADFD00ABA9D5BB127F4461090322244EC973FCC2C8AE119FB12CE65AD585CCAA570115B7D957EA28
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............d...d...d...5v..d...5w..d...5H..d....\..d...d...d..|.v..d..|.K..d...6L..d...d...d..|.I..d..Rich.d..........PE..d......`.........." .....x...........5.................................................... .................. ......................P...h.......d.......@....p.......V...<..............8...........................0...p............................................text...Tw.......x.................. ..`.rdata...............|..............@..@.data...`:...0......................@....pdata.......p.......(..............@..@.rsrc...@............>..............@..@.reloc...............P..............@..B................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\drvinst.exe
    File Type:PE32+ executable (native) x86-64, for MS Windows
    Category:dropped
    Size (bytes):145192
    Entropy (8bit):6.492981302114183
    Encrypted:false
    SSDEEP:3072:np+Tpx5m9iS1H41Un58rdppcZxPtlGU1WopW:n8x5sJ4q58rdppcjPt9WoU
    MD5:AB7418C8DFBBB97BEFB4F0ADED3D4663
    SHA1:B9A7A3FBBA707BA52F8AC4339070473A486CE7B7
    SHA-256:3BD5BB7E646E67469EC25A37CAA5131CF992759703B0FC170DF7AF265B9F8E74
    SHA-512:BE19D2CFE8C9198CE43470FDB6B6030EB4BD1B4080887CB6F1D69C2B661BBD79FFA85B4B70FDBE97BADADF2B75CE7FBE7B627FE08FB1DF3104CC16842E609A40
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........VAA.7/..7/..7/..W)..7/..7...7/..W...7/..W,..7/..W+..7/..i+..7/..i...7/..i-..7/.Rich.7/.................PE..d......`.........."..........<.................@.............................@......W.....`.....................................................P.... ..p...............(G...0..|.......8............................................................................text...3z.......|.................. ..h.rdata..p........ ..................@..H.data...............................@....pdata..............................@..H.gfids..............................@..HPAGE.....%.......&.................. ..`INIT....B........................... ..b.rsrc...p.... ......................@..B.reloc..|....0......................@..B................................................................................................................................................
    Process:C:\Windows\System32\drvinst.exe
    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
    Category:dropped
    Size (bytes):274944
    Entropy (8bit):5.978951711504469
    Encrypted:false
    SSDEEP:3072:VTwkcrbAg7JNtvh8vULQzOdtsK9g0BIGpY29ZR0qhJRYxEda6sEsOkXlYJkveT/s:VTPzg5JSULQz2tsKi0B9305E9P+3
    MD5:662679682F491FBAF3D15953D13EC72E
    SHA1:9EA41242F7945A6814D757DA232359DFD7D421BD
    SHA-256:C2729911C4B82D8F9E22E057A1570D0265D7A9ECA44D6FE8DC0658F47263CE12
    SHA-512:E5305020F3BC11342EE9073780BAAE37FF700434B7C695980345C7E9DB56B03F8199CE0C278E549C4EB92B4294F1FC91A0DBBB1C033B13794648A24DC94837E5
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........;L..hL..hL..h..\hn..h..]h(..h..bhE..h.MvhO..hL..h...h.,\hN..h.,ahM..hA.fhM..hL.*hM..h.,chM..hRichL..h........................PE..d......`.........." .........:...............................................P............ .................................................@...(.......h0...............<...@..@... ...8............................c..p............................................text...;........................... ..`.rdata..&...........................@..@.data...X<..........................@....pdata..............................@..@.rsrc...h0.......2..................@..@.reloc..@....@......................@..B................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\drvinst.exe
    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
    Category:dropped
    Size (bytes):168456
    Entropy (8bit):6.246480364593094
    Encrypted:false
    SSDEEP:3072:a+f/hrqTv5CgCn2p+WsDC7wQGXLCoeofwaqVcppnx1um75JXZ4:a+cTglYOQwQ4uoebaq4r5n4
    MD5:D79A5E34F684B547FA2F963DFCC15A21
    SHA1:81CCA464D4C8773B00F0A6F170F402FFE2D6A9C8
    SHA-256:4BBC0B301A7C5A6B1B73878CE3AEEB191F5FCEAC05835372142206D79AC81559
    SHA-512:E199F40F06F674EB8EC0E599FFF47A36D4495F4F2FFEE96CADFD00ABA9D5BB127F4461090322244EC973FCC2C8AE119FB12CE65AD585CCAA570115B7D957EA28
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............d...d...d...5v..d...5w..d...5H..d....\..d...d...d..|.v..d..|.K..d...6L..d...d...d..|.I..d..Rich.d..........PE..d......`.........." .....x...........5.................................................... .................. ......................P...h.......d.......@....p.......V...<..............8...........................0...p............................................text...Tw.......x.................. ..`.rdata...............|..............@..@.data...`:...0......................@....pdata.......p.......(..............@..@.rsrc...@............>..............@..@.reloc...............P..............@..B................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\drvinst.exe
    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
    Category:dropped
    Size (bytes):647616
    Entropy (8bit):5.8372260150013044
    Encrypted:false
    SSDEEP:12288:k2Ruad22Cu6+wfhZLF5lfDOHc/aFMmymLRt+i2:332xNfhZLF5lfDOHvMTmLRt2
    MD5:BEFBC1A8F6C2B8E143DDD97CCB6561B5
    SHA1:44B085C25026DABE6280C539F43DD0755FB28499
    SHA-256:774AF8B12C85D03562742ACDF222AF5E0432167BF107BA4B260757E4A5E36866
    SHA-512:A41B29E0493AD8ED57F55B8AA557AED460794894A5A53B057EEEF017A81F071A09DD298FB63EB0277344A9B69D790699131642106124320FB80BA87D1AD60DD4
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........(.H.I...I...I..p.J..I..p.H.VI..p.I..I.......I.......I.......I....p..I...I..GI..S....I..S....I..V.D..I...I,..I..S....I..Rich.I..................PE..d...;..`.........." .........D......3A.......................................0.......'....`.................................................@...d.......i....`...U.......!...........w..8............................x..................@............................text...J........................... ..`.rdata...k.......l..................@..@.data....:... ......................@....pdata..4_...`...`...$..............@..@.idata..............................@..@.gfids..............................@..@.00cfg..............................@..@.rsrc...i...........................@..@.reloc..P...........................@..B........................................................................................................
    Process:C:\Windows\System32\drvinst.exe
    File Type:PE32+ executable (native) x86-64, for MS Windows
    Category:dropped
    Size (bytes):145192
    Entropy (8bit):6.492981302114183
    Encrypted:false
    SSDEEP:3072:np+Tpx5m9iS1H41Un58rdppcZxPtlGU1WopW:n8x5sJ4q58rdppcjPt9WoU
    MD5:AB7418C8DFBBB97BEFB4F0ADED3D4663
    SHA1:B9A7A3FBBA707BA52F8AC4339070473A486CE7B7
    SHA-256:3BD5BB7E646E67469EC25A37CAA5131CF992759703B0FC170DF7AF265B9F8E74
    SHA-512:BE19D2CFE8C9198CE43470FDB6B6030EB4BD1B4080887CB6F1D69C2B661BBD79FFA85B4B70FDBE97BADADF2B75CE7FBE7B627FE08FB1DF3104CC16842E609A40
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........VAA.7/..7/..7/..W)..7/..7...7/..W...7/..W,..7/..W+..7/..i+..7/..i...7/..i-..7/.Rich.7/.................PE..d......`.........."..........<.................@.............................@......W.....`.....................................................P.... ..p...............(G...0..|.......8............................................................................text...3z.......|.................. ..h.rdata..p........ ..................@..H.data...............................@....pdata..............................@..H.gfids..............................@..HPAGE.....%.......&.................. ..`INIT....B........................... ..b.rsrc...p.... ......................@..B.reloc..|....0......................@..B................................................................................................................................................
    Process:C:\Windows\System32\drvinst.exe
    File Type:data
    Category:dropped
    Size (bytes):23417
    Entropy (8bit):5.948769892863068
    Encrypted:false
    SSDEEP:192:wIWIdFWkGHHPj24Y2f22U222bk2L2h2d2N252Z2L22V2z21232S282e282C2a22g:vyl4rPFRXp4hlTJdkC
    MD5:B392C785B9C2AA31187D1BD0A4F5EBA5
    SHA1:BD80456EAC30AE84B2A0E1CE9A4A364A01C68F39
    SHA-256:B286055896DEA79D4521368293DEEE801930F3FB503CC3076AC97716B338B0F7
    SHA-512:A22007089580CF066FF30D405F607B88F499754F7859EA98915FA2F5E35D21E91BBE4C25271F8C62357F11C2469FD20556D805A52071B96E30FBA8657C6338E6
    Malicious:false
    Preview:0.[u..*.H........[f0.[b...1.0...`.H.e......0.:...+.....7....:.0.:.0...+.....7............@..5;.t.u..210708145418Z0...+.....7.....0...0....R2.F.D.9.A.3.9.F.1.7.B.4.F.8.9.C.E.C.D.7.5.2.8.F.5.8.7.6.7.2.7.D.C.0.0.C.7.A.7.8...1..G08..+.....7...1*0(...F.i.l.e........f.t.d.2.x.x...d.l.l...0M..+.....7...1?0=0...+.....7...0...........0!0...+......../........R.Xvr}..zx0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...1.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R4.5.C.D.6.B.7.1.5.A.A.2.D.4.E.7.E.E.1.9.1.E.C.B.D.F.B.8.C.7.F.7.5.4.D.4.1.7.6.2...1..I0:..+.....7...1,0*...F.i.l.e........f.t.d.i.b.u.s...s.y.s...0M..+.....7...1?0=0...+.....7...0...........0!0...+........E.kqZ..........T..b0X..+.....7...1J0H...O.S.A.t.t.r.......22.:.6...1.,.2.:.6...2.,.2.:.6...3.,.2.:.1.0...0...0b..+.....7...1T0R.L.{.C.6.8.9.A.A.B.8.-.8.E.7.8.-.1.1.D.0.-.8.C.4.7.-.0.0.C.0.4.F.C.2.9.5.E.E.}....0....R5.3.F.D.E.7.C.9.4.8.8
    Process:C:\Windows\System32\drvinst.exe
    File Type:ISO-8859 text, with CRLF line terminators
    Category:dropped
    Size (bytes):30650
    Entropy (8bit):5.516268884073016
    Encrypted:false
    SSDEEP:768:tDAm640CejlZtOojWnXD8yVxaQZdHwG5B8ZJDsyPxSQZXH4G7tVB03F3PPvZh/6:tbSjWJD8/5B03DU
    MD5:B404B591DCAE1E28603479A7963CB6F6
    SHA1:5D4AE8370FB8A05189B0ED9430459BCB97BB9E54
    SHA-256:FF361CDD7C814DB0BEA98578A731EF5C03BF457E06BCA9950FDBAB57A4D3C7F6
    SHA-512:F928FD950A1F57172DFDF2CC8D23A54381715EE79D492D3491EAEAF4ADCC11241F87A00E91F03B504F78DF1DEF4D7C4569A192D62E21088ABD6DBFD721134B04
    Malicious:false
    Preview:; FTDIBUS.INF..; ..; Copyright . 2000-2021 Future Technology Devices International Limited..; ..; USB serial converter driver installation file for Windows 7, Windows 8, Windows 8.1, Windows 10,..; Server 2008 R2, Server 2012 R2 and Server 2016...; ..; ..; IMPORTANT NOTICE: PLEASE READ CAREFULLY BEFORE INSTALLING THE RELEVANT ..; SOFTWARE: This licence agreement (Licence) is a legal agreement between you (Licensee or ..; you) and Future Technology Devices International Limited of 2 Seaward Place, Centurion Business ..; Park, Glasgow G41 1HH, Scotland (UK Company Number SC136640) (Licensor or we) for use of ..; driver software provided by the Licensor(Software)...; ..; BY INSTALLING OR USING THIS SOFTWARE YOU AGREE TO THE TERMS OF THIS LICENCE ..; WHICH WILL BIND YOU. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENCE, WE ARE ..; UNWILLING TO LICENSE THE SOFTWARE TO YOU AND YOU MUST DISCONTINUE ..; INSTALLATION OF THE SOFTWARE NOW...; ..; 1..GRANT AND SCOPE OF LICENCE..; ..; 1.1.In cons
    Process:C:\Windows\System32\drvinst.exe
    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):392128
    Entropy (8bit):6.675882265173621
    Encrypted:false
    SSDEEP:6144:6cumjO3f6acDJuRkgm3qP12tHi3b+cVZhPTlqWMTZ4Rp71RpeRjK3q:6cBjQf6acERkkP12tqbBxTlqWUop5ywa
    MD5:6FFEB45E0137622EBBBA8361107D304E
    SHA1:01B3F848148A276F6317D6C98EDBDB1133F458DA
    SHA-256:60BB0D6348B1EB0127401AA902F34C963D9196D2778C66F4008A6CF0C6F098A5
    SHA-512:BC3D9DDCB1FC249CF1A3A11EEFE9131280F18CB538C381C46B1818354E947690D52FD38B14674A7BB51CE5FF73F4B8721D19FD4960694B3442ECC90C58F75052
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........>.6._je._je._jei.e._jei.eO_jei.e._je..id._je..od._je..nd._je...e._je._ke\_jeJ.od._jeJ.jd._jeO..e._je._.e._jeJ.hd._jeRich._je................PE..L......`...........!.........................................................0......Tq..........................................d.......X................!.......(.....T...........................(...@............................................text............................... ..`.rdata..............................@..@.data...X$..........................@....gfids..............................@..@.rsrc...X...........................@..@.reloc...(.......(..................@..B................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\drvinst.exe
    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):392128
    Entropy (8bit):6.675882265173621
    Encrypted:false
    SSDEEP:6144:6cumjO3f6acDJuRkgm3qP12tHi3b+cVZhPTlqWMTZ4Rp71RpeRjK3q:6cBjQf6acERkkP12tqbBxTlqWUop5ywa
    MD5:6FFEB45E0137622EBBBA8361107D304E
    SHA1:01B3F848148A276F6317D6C98EDBDB1133F458DA
    SHA-256:60BB0D6348B1EB0127401AA902F34C963D9196D2778C66F4008A6CF0C6F098A5
    SHA-512:BC3D9DDCB1FC249CF1A3A11EEFE9131280F18CB538C381C46B1818354E947690D52FD38B14674A7BB51CE5FF73F4B8721D19FD4960694B3442ECC90C58F75052
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........>.6._je._je._jei.e._jei.eO_jei.e._je..id._je..od._je..nd._je...e._je._ke\_jeJ.od._jeJ.jd._jeO..e._je._.e._jeJ.hd._jeRich._je................PE..L......`...........!.........................................................0......Tq..........................................d.......X................!.......(.....T...........................(...@............................................text............................... ..`.rdata..............................@..@.data...X$..........................@....gfids..............................@..@.rsrc...X...........................@..@.reloc...(.......(..................@..B................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\drvinst.exe
    File Type:ASCII text, with CRLF line terminators
    Category:modified
    Size (bytes):4627
    Entropy (8bit):5.38191832705647
    Encrypted:false
    SSDEEP:96:QO00eO00erMwUgWUg0B1kE3ZhpJp8ZpkRepk3hpTpbCpEpDk+psNVpsLX2oa5oG:QO00eO00erMwmkB1kAIrN4tBG
    MD5:513C92CDA39AD67BF9E2EBE2C92A4C53
    SHA1:11C97A98DF35CB4979D22E90EB15699768C07EF4
    SHA-256:0789A6D840B052949E3AED8E22BE6E458E05A038617040E7618269E9C729ECD3
    SHA-512:EEDBFA2EF0D1BDBB706D4988ED594226264BED678ED9F7D5923989E8AAABDB146DD1DD0906FA71F408B555CDB559BDFEF890952585DB211033C85782C32694CB
    Malicious:false
    Preview:CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6041 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6699 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #4398 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6041 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #6699 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #4398 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #2083 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #2459 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: SyncAllDBs Corruption or Schema Change..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #891 encountered JET error -1409..CatalogDB: 08:57:12 03/10/2023: catdbsvc.cpp at line #1307 encountered JET error -1601..CatalogDB: 08:57:12 03/10/2023: SyncDB:: Sync sta
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):7.989700528926337
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:CDM212364_Setup.exe
    File size:2'264'632 bytes
    MD5:0c97e7b5de1b46fb723bed38f0de28a2
    SHA1:3ab353adb602908eddb884c8b2b587fcc0691bfa
    SHA256:835dd64b199190d20dc37c0cadeb064b7eaaaef271703781b2b259b7085437a4
    SHA512:534e698728462b5103263194b42619da560ed9547e8e9de0240190606097eff1f20d560cf7d320164d0609b474a3d3dceb788e3c2ff813ae8bccd629833ebee0
    SSDEEP:49152:e0YNuL7q5Mj5dWZdLUVK5IECejW+N5X6kQ9rY/vuvs0SS/y:e0YEL758dLU0vC1+skQxY/vgsE/y
    TLSH:ABA5230E97B3F269EE33D07E8F96096A54E21483677E8DB5C60BA49C9C13141DF5B283
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....... #.NdB{.dB{.dB{.....fB{.....eB{.....iB{.dBz..B{.....eB{.....hB{.i...eB{.dB..eB{.....eB{.RichdB{.................PE..L.....Q`...
    Icon Hash:1b2f575757572f9b
    Entrypoint:0x406700
    Entrypoint Section:.text
    Digitally signed:true
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Time Stamp:0x6051F6A5 [Wed Mar 17 12:31:33 2021 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:1
    File Version Major:5
    File Version Minor:1
    Subsystem Version Major:5
    Subsystem Version Minor:1
    Import Hash:02184023c46b09c1acf1ff24f0feed1e
    Signature Valid:true
    Signature Issuer:CN=Symantec Class 3 Extended Validation Code Signing CA - G2, OU=Symantec Trust Network, O=Symantec Corporation, C=US
    Signature Validation Error:The operation completed successfully
    Error Number:0
    Not Before, Not After
    • 26/11/2018 00:00:00 24/11/2021 23:59:59
    Subject Chain
    • CN=Future Technology Devices International Ltd, O=Future Technology Devices International Ltd, L=Glasgow, C=GB, SERIALNUMBER=SC136640, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.1=Glasgow, OID.1.3.6.1.4.1.311.60.2.1.2=ABD, OID.1.3.6.1.4.1.311.60.2.1.3=GB
    Version:3
    Thumbprint MD5:A2390DBD0652FF86FDC61933410F06DC
    Thumbprint SHA-1:116E4D55D3691C00D3C96500A4CE15D73BC4B377
    Thumbprint SHA-256:90E354805042603C3A1F5498AF2403457647FB107458DB3123F3BD6C9C70111A
    Serial:53B59D44F72E8BB2764D4193926E95AF
    Instruction
    push ebp
    mov ebp, esp
    sub esp, 44h
    push esi
    call dword ptr [004070D0h]
    mov esi, eax
    mov al, byte ptr [esi]
    cmp al, 22h
    jne 00007F9C9CFB2BC3h
    cmp al, 22h
    je 00007F9C9CFB2BCFh
    inc esi
    mov al, byte ptr [esi]
    test al, al
    jne 00007F9C9CFB2BA7h
    cmp al, 22h
    jne 00007F9C9CFB2BC5h
    jmp 00007F9C9CFB2BC2h
    cmp al, 20h
    jle 00007F9C9CFB2BBFh
    inc esi
    cmp byte ptr [esi], 00000020h
    jnle 00007F9C9CFB2BACh
    jmp 00007F9C9CFB2BB7h
    cmp al, 20h
    jnle 00007F9C9CFB2BB9h
    inc esi
    mov al, byte ptr [esi]
    test al, al
    jne 00007F9C9CFB2BA7h
    and dword ptr [ebp-18h], 00000000h
    lea eax, dword ptr [ebp-44h]
    push eax
    call dword ptr [00407098h]
    test byte ptr [ebp-18h], 00000001h
    movzx eax, word ptr [ebp-14h]
    push 0000000Ah
    pop ecx
    cmovne ecx, eax
    push ecx
    push esi
    push 00000000h
    push 00000000h
    call dword ptr [00407078h]
    push eax
    call 00007F9C9CFB2A7Bh
    push eax
    call dword ptr [00407060h]
    int3
    push ebp
    mov ebp, esp
    push esi
    push edi
    push dword ptr [ebp+08h]
    xor esi, esi
    call dword ptr [004070D4h]
    mov edi, dword ptr [ebp+10h]
    cmp edi, eax
    jle 00007F9C9CFB2BC9h
    mov eax, 00407872h
    jmp 00007F9C9CFB2BE9h
    push esi
    call 00007F9C9CFB2BEAh
    mov esi, eax
    add esp, 0Ch
    test esi, esi
    je 00007F9C9CFB2B9Ch
    dec edi
    push dword ptr [ebp+0Ch]
    push dword ptr [ebp+08h]
    test edi, edi
    jnle 00007F9C9CFB2B98h
    inc esi
    push esi
    call 00007F9C9CFB2BCFh
    add esp, 0Ch
    test eax, eax
    jle 00007F9C9CFB2B83h
    sub eax, esi
    push eax
    push esi
    push dword ptr [ebp+08h]
    call 00007F9C9CFB2DA8h
    add esp, 0Ch
    Programming Language:
    • [C++] VS2013 UPD5 build 40629
    • [ C ] VS2013 UPD5 build 40629
    • [RES] VS2013 build 21005
    • [LNK] VS2013 UPD5 build 40629
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x7eac0x8c.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0xf0000x89c8.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x2274280x1a10
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x180000x604.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x70000x198.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x5c3e0x5e00d1a237469fd265ab32438fafe0e9f632False0.5597157579787234data6.3422506068151225IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x70000x176c0x1800cf87202b318f36dcf2ed62f72a2523aaFalse0.57080078125data5.760277047752672IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x90000x58a80x12005beaa4553d7aa210dc7640059c344f1cFalse0.23914930555555555data2.518593090870782IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0xf0000x89c80x8a00405597a0a0904d53b8fce03c6e62d462False0.1908401268115942data3.966180350876218IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x180000x6040x8002c223a97e77912b6cfdb18d3dc2ef5d7False0.67578125data5.7257335131649745IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_CURSOR0x16c880x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.37662337662337664
    RT_BITMAP0xfa580x66aeDevice independent bitmap graphic, 163 x 312 x 4, image size 0, resolution 2834 x 2834 px/m, 9 important colorsEnglishUnited States0.08552080955641786
    RT_BITMAP0x161080xb60Device independent bitmap graphic, 43 x 42 x 8, image size 1848EnglishUnited States0.4491758241758242
    RT_ICON0x16dd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.5573104693140795
    RT_MENU0x16c680x20dataEnglishUnited States1.09375
    RT_DIALOG0xf3400x182dataEnglishUnited States0.5673575129533679
    RT_DIALOG0xf4c80xa0dataEnglishUnited States0.6375
    RT_DIALOG0xf5680x1dcdataEnglishUnited States0.542016806722689
    RT_DIALOG0xf7480x12adataEnglishUnited States0.610738255033557
    RT_DIALOG0xf8780x1dcdataEnglishUnited States0.5630252100840336
    RT_GROUP_CURSOR0x16dc00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
    RT_GROUP_ICON0x176800x14dataEnglishUnited States1.25
    RT_MANIFEST0x176980x330XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (756), with CRLF line terminatorsEnglishUnited States0.5012254901960784
    DLLImport
    KERNEL32.dllLocalFileTimeToFileTime, RemoveDirectoryA, SetFileTime, WriteFile, GetLastError, WaitForSingleObject, Sleep, GetCurrentProcess, ExitProcess, CreateThread, CreateProcessA, GetSystemDirectoryA, MapViewOfFile, GetModuleFileNameA, GetModuleHandleA, GetFullPathNameA, DosDateTimeToFileTime, FormatMessageA, lstrcmpA, lstrcpyA, lstrcatA, CreateFileMappingA, GetStartupInfoA, GetPrivateProfileIntA, GetPrivateProfileStringA, GetTempPathA, GetTempFileNameA, IsBadReadPtr, MultiByteToWideChar, GetFileAttributesA, DeleteFileA, CreateDirectoryA, GetCurrentDirectoryA, SetCurrentDirectoryA, CreateFileA, ExpandEnvironmentStringsA, GetCommandLineA, lstrlenA, VirtualFree, VirtualAlloc, CloseHandle, SetFilePointer, ReadFile, WinExec
    USER32.dllReleaseDC, BeginPaint, EndPaint, SetWindowTextA, MessageBoxA, SetCursor, ClientToScreen, ChildWindowFromPoint, SetClassLongA, LoadBitmapA, LoadCursorA, LoadIconA, GetDC, DestroyMenu, LoadMenuA, EnableWindow, GetDialogBaseUnits, GetDlgItemTextA, SetDlgItemTextA, GetDlgItem, EndDialog, DialogBoxParamA, CreateDialogParamA, ShowWindow, DestroyWindow, UpdateWindow, TrackPopupMenu, GetSubMenu, wsprintfA, SendMessageA, PostMessageA, SetWindowPos
    GDI32.dllRectangle, SelectObject, SetBkMode, GetStockObject, SetROP2, SetTextColor, GetObjectA, DeleteObject, CreateFontIndirectA, StretchBlt, CreateCompatibleDC
    SHELL32.dllSHBrowseForFolderA, SHGetPathFromIDListA, ShellExecuteA
    ole32.dllCoCreateInstance, CoUninitialize, CoInitialize
    ADVAPI32.dllRegOpenKeyExA, RegCloseKey, RegQueryValueExA
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:09:21:01
    Start date:23/04/2024
    Path:C:\Users\user\Desktop\CDM212364_Setup.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\CDM212364_Setup.exe"
    Imagebase:0x9c0000
    File size:2'264'632 bytes
    MD5 hash:0C97E7B5DE1B46FB723BED38F0DE28A2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:1
    Start time:09:21:06
    Start date:23/04/2024
    Path:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exe
    Wow64 process (32bit):true
    Commandline:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dp-chooser.exe
    Imagebase:0x400000
    File size:90'160 bytes
    MD5 hash:461A3CE2E77143EC0E0015D80675911B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Antivirus matches:
    • Detection: 0%, ReversingLabs
    • Detection: 0%, Virustotal, Browse
    Reputation:low
    Has exited:true

    Target ID:2
    Start time:09:21:06
    Start date:23/04/2024
    Path:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe
    Wow64 process (32bit):false
    Commandline:C:\Users\user\AppData\Local\Temp\FTDI-Driver\dpinst-amd64.exe /sa
    Imagebase:0x7ff6d88c0000
    File size:1'047'056 bytes
    MD5 hash:0E7E8820A977D3B4B81C5188FA841C52
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Antivirus matches:
    • Detection: 0%, ReversingLabs
    • Detection: 0%, Virustotal, Browse
    Reputation:low
    Has exited:true

    Target ID:4
    Start time:09:21:16
    Start date:23/04/2024
    Path:C:\Windows\System32\drvinst.exe
    Wow64 process (32bit):false
    Commandline:DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{acb1cab5-f3d4-1e43-9370-b4e26f098f9f}\ftdibus.inf" "9" "4aa35cc23" "0000000000000150" "WinSta0\Default" "0000000000000160" "208" "c:\users\user\appdata\local\temp\ftdi-driver"
    Imagebase:0x7ff6adc40000
    File size:337'920 bytes
    MD5 hash:294990C88B9D1FE0A54A1FA8BF4324D9
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    Target ID:6
    Start time:09:21:21
    Start date:23/04/2024
    Path:C:\Windows\System32\drvinst.exe
    Wow64 process (32bit):false
    Commandline:DrvInst.exe "4" "0" "C:\Users\user\AppData\Local\Temp\{a2d08f8b-9618-ed46-a926-40b2e07ae3d4}\ftdiport.inf" "9" "47472827f" "0000000000000160" "WinSta0\Default" "000000000000015C" "208" "c:\users\user\appdata\local\temp\ftdi-driver"
    Imagebase:0x7ff6adc40000
    File size:337'920 bytes
    MD5 hash:294990C88B9D1FE0A54A1FA8BF4324D9
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:36.4%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:17.3%
      Total number of Nodes:595
      Total number of Limit Nodes:13
      execution_graph 1875 9c3d1c VirtualFree 2527 9c3d2e 2528 9c3e96 9 API calls 2527->2528 2529 9c3d46 2527->2529 2532 9c3db5 2528->2532 2530 9c3e65 wsprintfA SetDlgItemTextA 2529->2530 2531 9c3d51 2529->2531 2530->2532 2533 9c3d58 2531->2533 2534 9c3e0a 2531->2534 2537 9c3d5d 2533->2537 2538 9c3d7e GetDlgItem 2533->2538 2535 9c3e3f EndDialog UpdateWindow UpdateWindow 2534->2535 2536 9c3e13 2534->2536 2535->2532 2536->2532 2539 9c3e21 ShellExecuteA 2536->2539 2537->2532 2540 9c3d68 PostMessageA 2537->2540 2541 9c3dbd GetDlgItem 2538->2541 2542 9c3d95 2538->2542 2539->2532 2540->2532 2541->2542 2543 9c3de4 GetDlgItem 2541->2543 2545 9c51b0 9 API calls 2542->2545 2543->2532 2543->2542 2545->2532 1876 9c58d8 1877 9c5c2e 1876->1877 1878 9c58ef 1876->1878 1881 9c5cc0 GetDlgItem 1877->1881 1888 9c5c40 1877->1888 1889 9c5cb2 1877->1889 1879 9c58f5 1878->1879 1880 9c5aa0 1878->1880 1886 9c58fe 1879->1886 1887 9c59c3 1879->1887 1882 9c5c08 MessageBoxA 1880->1882 1883 9c5ab2 1880->1883 1884 9c5cdb 1881->1884 1885 9c5d04 GetDlgItem 1881->1885 1892 9c59a1 1882->1892 1893 9c5c29 1882->1893 1890 9c5bee 1883->1890 1896 9c5ac2 1883->1896 1897 9c5af3 1883->1897 2074 9c51b0 9 API calls 1884->2074 1885->1884 1885->1892 1891 9c59ad PostMessageA 1886->1891 1899 9c590d 1886->1899 1887->1892 1894 9c59d0 12 API calls 1887->1894 1888->1892 1895 9c5c49 6 API calls 1888->1895 1889->1881 1902 9c61a1 157 API calls 1890->1902 1891->1892 2075 9c43af 1893->2075 1894->1892 1895->1892 1896->1893 1900 9c5aca 1896->1900 1897->1890 1920 9c5bbd 1897->1920 1972 9c4342 1897->1972 1899->1892 1928 9c61a1 1899->1928 1900->1892 1904 9c5ad1 DialogBoxParamA 1900->1904 1901 9c5cfc 1901->1892 1902->1892 1904->1892 1907 9c5bc7 2005 9c4878 1907->2005 1913 9c5b37 1980 9c446f 1913->1980 1914 9c5b40 GetDlgItemTextA 1915 9c5b3d 1914->1915 1996 9c4752 GetFileAttributesA 1915->1996 1916 9c5bd8 ShellExecuteA 1916->1893 1920->1890 1920->1907 1921 9c5b6a GetDlgItem SendMessageA 1922 9c5b8d MessageBoxA 1921->1922 1923 9c5bab 1921->1923 1922->1892 1924 9c5ba9 1922->1924 1925 9c4752 GetFileAttributesA 1923->1925 1924->1920 1998 9c43e8 1924->1998 1925->1924 1929 9c61aa DestroyWindow 1928->1929 1930 9c61b1 ShowWindow 1928->1930 1929->1930 2082 9c589e CreateDialogParamA SetWindowPos 1930->2082 1932 9c61d5 15 API calls 2083 9c523b 1932->2083 1935 9c523b 8 API calls 1936 9c62e9 GetDlgItem 1935->1936 1937 9c523b 8 API calls 1936->1937 1938 9c630c GetDlgItem 1937->1938 1939 9c523b 8 API calls 1938->1939 1940 9c632f 1939->1940 1941 9c64dd 16 API calls 1940->1941 1942 9c633e 1940->1942 1945 9c65bc 1941->1945 1971 9c65fe SetDlgItemTextA 1941->1971 1943 9c63ca lstrlenA 1942->1943 1944 9c6345 1942->1944 1950 9c63da 12 API calls 1943->1950 1946 9c5928 7 API calls 1944->1946 1947 9c634c GetDlgItem KiUserCallbackDispatcher GetDlgItem KiUserCallbackDispatcher GetDlgItem 1944->1947 2090 9c6856 VirtualAlloc 1945->2090 1946->1892 1951 9c523b 8 API calls 1947->1951 1955 9c523b 8 API calls 1950->1955 1954 9c6390 GetDlgItem 1951->1954 1952 9c661a SetDlgItemTextA 1952->1946 1956 9c523b 8 API calls 1954->1956 1957 9c647f GetDlgItem 1955->1957 1959 9c63ae CreateThread 1956->1959 1958 9c523b 8 API calls 1957->1958 1961 9c6499 GetDlgItem 1958->1961 1959->1946 2102 9c4d4c lstrcatA GetFullPathNameA 1959->2102 1960 9c65c9 1960->1971 2092 9c67cc 1960->2092 1963 9c523b 8 API calls 1961->1963 1965 9c64b7 GetDlgItem 1963->1965 1964 9c65e3 1966 9c65ea lstrlenA 1964->1966 1967 9c65f2 1964->1967 1968 9c523b 8 API calls 1965->1968 1966->1967 2096 9c69b8 1967->2096 1970 9c64d5 1968->1970 1970->1946 1971->1946 1971->1952 1973 9c67cc lstrlenA 1972->1973 1977 9c436d 1973->1977 1974 9c4394 1976 9c43a5 lstrcpyA 1974->1976 1978 9c6a4f 8 API calls 1974->1978 1976->1913 1976->1914 1977->1974 1979 9c67cc lstrlenA 1977->1979 2328 9c6a4f lstrlenA lstrlenA lstrcmpA 1977->2328 1978->1976 1979->1977 1981 9c4496 1980->1981 1982 9c44a6 GetFullPathNameA lstrcatA 1981->1982 2336 9c6773 lstrlenA 1982->2336 1985 9c4500 1986 9c457e 1985->1986 1987 9c4504 lstrlenA 1985->1987 1986->1915 1988 9c451d lstrcatA 1987->1988 1989 9c4515 lstrcpyA 1987->1989 1990 9c451f lstrcatA GetFullPathNameA 1988->1990 1989->1990 1991 9c4752 GetFileAttributesA 1990->1991 1992 9c4549 1991->1992 1993 9c454e CreateDirectoryA 1992->1993 1994 9c6773 3 API calls 1992->1994 1993->1992 1995 9c4574 lstrlenA 1994->1995 1995->1985 1997 9c4761 1996->1997 1997->1920 1997->1921 1999 9c446f 14 API calls 1998->1999 2000 9c43fb 1999->2000 2001 9c4400 GetLastError 2000->2001 2004 9c4468 2000->2004 2002 9c4411 GetLastError FormatMessageA 2001->2002 2003 9c4432 wsprintfA MessageBoxA 2001->2003 2002->2003 2003->2004 2004->1920 2049 9c488d 2005->2049 2006 9c49fb lstrlenA 2007 9c4d1c 2006->2007 2010 9c4a0f 2006->2010 2008 9c4d2d CreateThread 2007->2008 2009 9c4d41 2007->2009 2008->2009 2400 9c458b GetDlgItem 2008->2400 2009->1893 2009->1916 2011 9c4342 9 API calls 2010->2011 2012 9c4a49 SetCurrentDirectoryA 2011->2012 2344 9c5d38 2012->2344 2015 9c6773 3 API calls 2017 9c48f2 lstrcpyA 2015->2017 2016 9c4342 9 API calls 2018 9c4a6c 2016->2018 2019 9c490d 2017->2019 2379 9c6a2e lstrlenA 2018->2379 2021 9c6773 3 API calls 2019->2021 2022 9c4914 lstrcpyA 2021->2022 2023 9c5d38 34 API calls 2022->2023 2026 9c492f lstrcpyA 2023->2026 2024 9c4c5d 2381 9c47e6 CreateFileA 2024->2381 2025 9c4a7a 2025->2024 2027 9c6a2e lstrlenA 2025->2027 2029 9c5d38 34 API calls 2026->2029 2037 9c4a9b 2027->2037 2031 9c4948 lstrcpyA 2029->2031 2034 9c4342 9 API calls 2031->2034 2032 9c4d07 WinExec 2032->2007 2033 9c4c70 CreateProcessA 2035 9c4cba 2033->2035 2036 9c4c93 ShowWindow WaitForSingleObject ShowWindow 2033->2036 2034->2049 2040 9c4cd4 wsprintfA MessageBoxA 2035->2040 2036->2007 2037->2024 2039 9c6a2e lstrlenA 2037->2039 2038 9c4342 9 API calls 2038->2049 2041 9c4abc 2039->2041 2040->2007 2041->2024 2042 9c4ad2 2041->2042 2043 9c6a2e lstrlenA 2042->2043 2048 9c4add 2043->2048 2044 9c52e9 7 API calls 2044->2049 2045 9c446f 14 API calls 2045->2049 2046 9c4752 GetFileAttributesA 2046->2049 2047 9c4c2d GetCurrentDirectoryA ShellExecuteA 2047->2007 2048->2047 2050 9c6a2e lstrlenA 2048->2050 2049->2006 2049->2015 2049->2038 2049->2044 2049->2045 2049->2046 2056 9c49bf 2049->2056 2054 9c4afe 2050->2054 2051 9c446f 14 API calls 2051->2056 2054->2047 2055 9c6a2e lstrlenA 2054->2055 2057 9c4b1f 2055->2057 2056->2049 2056->2051 2389 9c6b05 CoInitialize CoCreateInstance 2056->2389 2394 9c6bc7 2056->2394 2057->2047 2058 9c6a2e lstrlenA 2057->2058 2059 9c4b40 2058->2059 2059->2047 2060 9c6a2e lstrlenA 2059->2060 2061 9c4b61 2060->2061 2061->2047 2062 9c6a2e lstrlenA 2061->2062 2063 9c4b82 2062->2063 2063->2047 2064 9c6a2e lstrlenA 2063->2064 2065 9c4ba3 2064->2065 2065->2047 2066 9c6a2e lstrlenA 2065->2066 2067 9c4bc0 2066->2067 2067->2047 2068 9c6a2e lstrlenA 2067->2068 2069 9c4bdd 2068->2069 2069->2047 2070 9c6a2e lstrlenA 2069->2070 2071 9c4bfa 2070->2071 2071->2047 2072 9c6a2e lstrlenA 2071->2072 2073 9c4c17 2072->2073 2073->2007 2073->2047 2074->1901 2076 9c43bf 2075->2076 2077 9c43b8 DestroyWindow 2075->2077 2078 9c43cf 2076->2078 2079 9c43c8 DestroyWindow 2076->2079 2077->2076 2080 9c43df ExitProcess 2078->2080 2081 9c43d8 FindCloseChangeNotification 2078->2081 2079->2078 2081->2080 2082->1932 2100 9c698a 2083->2100 2086 9c5266 SendMessageA GetObjectA lstrcpyA CreateFontIndirectA 2088 9c52d7 ReleaseDC 2086->2088 2089 9c52c3 SetBkMode SendMessageA 2086->2089 2087 9c52e3 GetDlgItem 2087->1935 2088->2087 2089->2088 2091 9c6874 2090->2091 2091->1960 2093 9c67d8 lstrlenA 2092->2093 2094 9c67d5 2092->2094 2095 9c67ec 2093->2095 2094->1964 2095->1964 2097 9c69c2 2096->2097 2098 9c6856 VirtualAlloc 2097->2098 2099 9c69d2 2098->2099 2099->1971 2101 9c5253 GetDC 2100->2101 2101->2086 2101->2087 2123 9c326d CreateFileA 2102->2123 2104 9c4d8b 2105 9c4eda 2104->2105 2106 9c4da3 GetDlgItem SendMessageA 2104->2106 2208 9c6130 GetLastError 2105->2208 2107 9c4e89 2106->2107 2120 9c4ddc 2106->2120 2191 9c311b 2107->2191 2110 9c4ed3 2114 9c6130 9 API calls 2110->2114 2115 9c4eee 2114->2115 2116 9c4e95 SendMessageA Sleep PostMessageA 2117 9c4e05 wsprintfA SetDlgItemTextA 2149 9c4eef 2117->2149 2120->2110 2120->2117 2121 9c4e70 SendMessageA 2120->2121 2146 9c3190 2120->2146 2187 9c6bf4 VirtualAlloc 2120->2187 2203 9c3211 2120->2203 2121->2107 2121->2120 2213 9c3aed SetFilePointer 2123->2213 2130 9c3cb6 ReadFile 2131 9c32f0 2130->2131 2132 9c3cb6 ReadFile 2131->2132 2133 9c3300 2132->2133 2134 9c3cb6 ReadFile 2133->2134 2135 9c3310 2134->2135 2136 9c3c2e ReadFile 2135->2136 2137 9c333e 2136->2137 2138 9c3c2e ReadFile 2137->2138 2139 9c334e 2138->2139 2140 9c3cb6 ReadFile 2139->2140 2141 9c335e 2140->2141 2142 9c3380 CloseHandle 2141->2142 2143 9c338b VirtualAlloc 2141->2143 2144 9c33cc 2142->2144 2234 9c31d5 2143->2234 2144->2104 2147 9c3821 7 API calls 2146->2147 2148 9c31b2 2147->2148 2148->2120 2150 9c4f0c 2149->2150 2151 9c3190 7 API calls 2150->2151 2152 9c4f2c 2151->2152 2153 9c5156 2152->2153 2154 9c4f37 VirtualAlloc 2152->2154 2155 9c6130 9 API calls 2153->2155 2156 9c50fd wsprintfA 2154->2156 2157 9c4f63 2154->2157 2172 9c5076 2155->2172 2158 9c4342 9 API calls 2156->2158 2157->2156 2163 9c4f7f wsprintfA 2157->2163 2159 9c5129 lstrcpyA 2158->2159 2161 9c446f 14 API calls 2159->2161 2160 9c6130 9 API calls 2162 9c516a 2160->2162 2164 9c50f9 2161->2164 2287 9c33da 2163->2287 2164->2120 2166 9c4fa4 2167 9c4faf GetFullPathNameA 2166->2167 2166->2172 2168 9c4342 9 API calls 2167->2168 2169 9c4fd1 lstrcpyA CreateFileA 2168->2169 2170 9c5005 2169->2170 2174 9c5074 2169->2174 2170->2172 2297 9c68de 2170->2297 2172->2160 2174->2172 2176 9c50af DosDateTimeToFileTime LocalFileTimeToFileTime SetFileTime FindCloseChangeNotification VirtualFree 2174->2176 2177 9c509b WriteFile 2174->2177 2301 9c34f8 2174->2301 2179 9c311b 2 API calls 2176->2179 2177->2174 2178 9c67cc lstrlenA 2180 9c502b lstrlenA 2178->2180 2179->2164 2181 9c68de lstrlenA 2180->2181 2182 9c5040 2181->2182 2183 9c6856 VirtualAlloc 2182->2183 2184 9c5047 2183->2184 2185 9c446f 14 API calls 2184->2185 2186 9c504d CreateFileA 2185->2186 2186->2174 2188 9c6c0f 2187->2188 2189 9c6c11 lstrcpyA 2187->2189 2188->2120 2190 9c6c26 2189->2190 2190->2120 2192 9c3127 2191->2192 2193 9c312c 2191->2193 2197 9c30e6 2192->2197 2193->2192 2194 9c3160 2193->2194 2195 9c3150 VirtualFree 2193->2195 2196 9c3174 VirtualFree 2194->2196 2195->2194 2196->2192 2198 9c30ef 2197->2198 2199 9c30f4 2197->2199 2198->2116 2200 9c3101 FindCloseChangeNotification VirtualFree 2199->2200 2201 9c311b 2 API calls 2199->2201 2200->2116 2202 9c3100 2201->2202 2202->2200 2204 9c321f 2203->2204 2205 9c321a 2203->2205 2206 9c3230 2204->2206 2207 9c3821 7 API calls 2204->2207 2205->2120 2206->2120 2207->2206 2209 9c614d GetLastError FormatMessageA 2208->2209 2210 9c616b wsprintfA MessageBoxA 2208->2210 2209->2210 2211 9c43af 4 API calls 2210->2211 2212 9c61a0 2211->2212 2214 9c32ac SetFilePointer 2213->2214 2215 9c3b23 VirtualAlloc 2213->2215 2220 9c3c2e 2214->2220 2215->2214 2216 9c3b49 2215->2216 2217 9c3bda VirtualFree 2216->2217 2218 9c3b51 SetFilePointer 2216->2218 2217->2214 2218->2217 2219 9c3b86 ReadFile 2218->2219 2219->2216 2219->2217 2239 9c3bf3 ReadFile 2220->2239 2223 9c3c58 2225 9c3bf3 ReadFile 2223->2225 2226 9c3c76 2223->2226 2224 9c3bf3 ReadFile 2224->2223 2225->2226 2227 9c3bf3 ReadFile 2226->2227 2228 9c32d0 2226->2228 2227->2228 2229 9c3cb6 2228->2229 2230 9c3bf3 ReadFile 2229->2230 2231 9c3cc7 2230->2231 2232 9c32e0 2231->2232 2233 9c3bf3 ReadFile 2231->2233 2232->2130 2233->2232 2235 9c31de 2234->2235 2236 9c31e3 2234->2236 2235->2144 2241 9c3821 2236->2241 2240 9c3c15 2239->2240 2240->2223 2240->2224 2242 9c3835 SetFilePointer 2241->2242 2277 9c3202 2241->2277 2243 9c385e 2242->2243 2244 9c3852 2242->2244 2246 9c3cb6 ReadFile 2243->2246 2245 9c3c2e ReadFile 2244->2245 2245->2243 2247 9c3884 2246->2247 2248 9c3cb6 ReadFile 2247->2248 2249 9c3895 2248->2249 2250 9c3cb6 ReadFile 2249->2250 2251 9c38a6 2250->2251 2252 9c3cb6 ReadFile 2251->2252 2253 9c38b7 2252->2253 2254 9c3c2e ReadFile 2253->2254 2255 9c38c8 2254->2255 2256 9c3c2e ReadFile 2255->2256 2257 9c38d9 2256->2257 2258 9c3c2e ReadFile 2257->2258 2259 9c38ea 2258->2259 2260 9c3c2e ReadFile 2259->2260 2261 9c38fb 2260->2261 2262 9c3cb6 ReadFile 2261->2262 2263 9c390f 2262->2263 2264 9c3cb6 ReadFile 2263->2264 2265 9c3920 2264->2265 2266 9c3cb6 ReadFile 2265->2266 2267 9c3931 2266->2267 2268 9c3cb6 ReadFile 2267->2268 2269 9c3942 2268->2269 2270 9c3cb6 ReadFile 2269->2270 2271 9c3953 2270->2271 2272 9c3c2e ReadFile 2271->2272 2273 9c3964 2272->2273 2274 9c3c2e ReadFile 2273->2274 2276 9c3975 2274->2276 2275 9c39c3 2278 9c3a36 2275->2278 2279 9c3a09 2275->2279 2280 9c39eb SetFilePointer 2275->2280 2276->2275 2276->2278 2283 9c39aa ReadFile 2276->2283 2277->2144 2278->2277 2284 9c3a7a SetFilePointer 2278->2284 2285 9c3a96 2278->2285 2279->2278 2282 9c3a17 ReadFile 2279->2282 2281 9c3a03 2280->2281 2281->2279 2282->2278 2283->2275 2284->2285 2285->2277 2286 9c3aa4 ReadFile 2285->2286 2286->2277 2288 9c33ed 2287->2288 2289 9c33e5 2287->2289 2288->2289 2290 9c3404 2288->2290 2291 9c311b 2 API calls 2288->2291 2289->2166 2306 9c3668 SetFilePointer 2290->2306 2291->2290 2294 9c3429 VirtualAlloc 2294->2289 2295 9c3440 VirtualAlloc 2294->2295 2295->2289 2296 9c346b VirtualFree 2295->2296 2296->2289 2298 9c68e7 2297->2298 2299 9c501a 2297->2299 2298->2299 2300 9c68ec lstrlenA 2298->2300 2299->2178 2300->2299 2302 9c3511 2301->2302 2304 9c3519 2301->2304 2302->2174 2303 9c355e SetFilePointer 2303->2302 2305 9c3583 ReadFile 2303->2305 2304->2302 2304->2303 2305->2302 2305->2304 2307 9c36a4 2306->2307 2327 9c341a 2306->2327 2308 9c3c2e ReadFile 2307->2308 2309 9c36b0 2308->2309 2310 9c3cb6 ReadFile 2309->2310 2311 9c36d4 2310->2311 2312 9c3cb6 ReadFile 2311->2312 2313 9c36e5 2312->2313 2314 9c3cb6 ReadFile 2313->2314 2315 9c36f6 2314->2315 2316 9c3c2e ReadFile 2315->2316 2317 9c372e 2316->2317 2318 9c3c2e ReadFile 2317->2318 2319 9c373f 2318->2319 2320 9c3c2e ReadFile 2319->2320 2321 9c376e 2320->2321 2322 9c3c2e ReadFile 2321->2322 2323 9c379c 2322->2323 2324 9c3cb6 ReadFile 2323->2324 2325 9c37ca 2324->2325 2326 9c3cb6 ReadFile 2325->2326 2326->2327 2327->2289 2327->2294 2329 9c6ac2 2328->2329 2330 9c6a7f 2328->2330 2329->1977 2330->2329 2331 9c6a95 lstrlenA 2330->2331 2331->2329 2332 9c6aa9 VirtualAlloc 2331->2332 2332->2329 2333 9c6ac6 lstrcpyA 2332->2333 2334 9c6ad8 2333->2334 2335 9c6ae3 lstrcpyA VirtualFree 2333->2335 2334->2335 2335->2329 2337 9c44ee lstrlenA 2336->2337 2339 9c6791 2336->2339 2337->1985 2338 9c67ab 2341 9c67cc lstrlenA 2338->2341 2339->2337 2339->2338 2340 9c67cc lstrlenA 2339->2340 2340->2339 2342 9c67b2 2341->2342 2342->2337 2343 9c69b8 VirtualAlloc 2342->2343 2343->2337 2345 9c5d63 2344->2345 2346 9c5d79 VirtualAlloc 2345->2346 2347 9c6856 VirtualAlloc 2346->2347 2348 9c5da0 2347->2348 2349 9c5dba lstrcatA 2348->2349 2350 9c5db1 2348->2350 2349->2350 2351 9c67cc lstrlenA 2350->2351 2356 9c5dd1 2351->2356 2352 9c5dff ExpandEnvironmentStringsA 2353 9c6773 3 API calls 2352->2353 2355 9c5e22 lstrcpyA 2353->2355 2354 9c6a4f 8 API calls 2354->2356 2374 9c5e48 2355->2374 2356->2352 2356->2354 2357 9c67cc lstrlenA 2356->2357 2357->2356 2358 9c6106 2359 9c610e lstrlenA 2358->2359 2360 9c4a59 lstrcpyA 2358->2360 2361 9c6856 VirtualAlloc 2359->2361 2360->2016 2362 9c611d lstrcpyA 2361->2362 2362->2360 2363 9c69d5 RegOpenKeyExA RegQueryValueExA RegCloseKey 2363->2374 2364 9c60b0 lstrcpyA 2365 9c60c0 lstrcatA 2364->2365 2366 9c6773 3 API calls 2365->2366 2367 9c60dc lstrcpyA 2366->2367 2367->2374 2368 9c5f6d GetCurrentDirectoryA 2368->2374 2369 9c601b lstrcpyA RegOpenKeyExA 2372 9c6047 RegQueryValueExA RegCloseKey 2369->2372 2369->2374 2372->2374 2373 9c5fcf lstrcatA 2373->2374 2374->2358 2374->2363 2374->2364 2374->2368 2374->2369 2375 9c4752 GetFileAttributesA 2374->2375 2376 9c609b GetSystemDirectoryA 2374->2376 2377 9c60b5 lstrcatA 2374->2377 2378 9c5fee GetTempPathA 2374->2378 2397 9c69d5 RegOpenKeyExA 2374->2397 2375->2374 2376->2374 2377->2365 2378->2374 2380 9c6a40 2379->2380 2380->2025 2382 9c480f CreateFileMappingA 2381->2382 2387 9c480b 2381->2387 2383 9c4830 MapViewOfFile 2382->2383 2384 9c4823 CloseHandle 2382->2384 2385 9c484e 2383->2385 2386 9c4840 CloseHandle CloseHandle 2383->2386 2384->2387 2385->2387 2388 9c4858 IsBadReadPtr 2385->2388 2386->2387 2387->2032 2387->2033 2388->2387 2390 9c6ba1 CoUninitialize 2389->2390 2391 9c6b33 2389->2391 2390->2056 2392 9c6b48 MultiByteToWideChar 2391->2392 2393 9c6b6d 2391->2393 2392->2393 2393->2390 2395 9c6bd4 VirtualFree 2394->2395 2396 9c6bd0 2394->2396 2395->2056 2396->2056 2398 9c5fbd lstrlenA 2397->2398 2399 9c69fa RegQueryValueExA RegCloseKey 2397->2399 2398->2373 2398->2374 2399->2398 2418 9c6bac 2400->2418 2402 9c45b6 ShowWindow SetDlgItemTextA SetDlgItemTextA SetDlgItemTextA 2419 9c6bac 2402->2419 2404 9c460b SendMessageA SetDlgItemTextA Sleep 2416 9c4646 2404->2416 2405 9c4738 RemoveDirectoryA Sleep 2406 9c43af 4 API calls 2405->2406 2407 9c474f 2406->2407 2408 9c4663 wsprintfA 2408->2416 2409 9c467f wsprintfA SetDlgItemTextA 2409->2416 2410 9c4752 GetFileAttributesA 2410->2416 2411 9c46cf RemoveDirectoryA 2411->2416 2413 9c46e9 DeleteFileA 2413->2416 2414 9c6bc7 VirtualFree 2414->2416 2415 9c470b SendMessageA 2415->2416 2416->2405 2416->2408 2416->2409 2416->2410 2416->2411 2416->2413 2416->2414 2416->2415 2417 9c4732 2416->2417 2420 9c516b 2416->2420 2417->2405 2418->2402 2419->2404 2421 9c6a4f 8 API calls 2420->2421 2422 9c5189 2421->2422 2423 9c6a4f 8 API calls 2422->2423 2424 9c5195 GetFileAttributesA 2423->2424 2424->2416 2425 9c6700 GetCommandLineA 2426 9c6715 GetStartupInfoA GetModuleHandleA 2425->2426 2430 9c6631 2426->2430 2429 9c676b ExitProcess 2431 9c6646 2430->2431 2455 9c5344 2431->2455 2433 9c665a 2434 9c6664 2433->2434 2435 9c6695 2433->2435 2437 9c4752 GetFileAttributesA 2434->2437 2485 9c476e 2435->2485 2439 9c666f 2437->2439 2440 9c667f 2439->2440 2442 9c446f 14 API calls 2439->2442 2443 9c4d4c 85 API calls 2440->2443 2444 9c667a 2442->2444 2445 9c6685 2443->2445 2444->2440 2446 9c66df 2444->2446 2447 9c4878 100 API calls 2445->2447 2448 9c6130 9 API calls 2446->2448 2449 9c668b 2447->2449 2450 9c66e9 ShellExecuteA 2448->2450 2451 9c66fa 2449->2451 2452 9c6693 2449->2452 2450->2451 2453 9c43af 4 API calls 2451->2453 2452->2450 2454 9c66ff 2453->2454 2456 9c5374 2455->2456 2457 9c53ba 7 API calls 2456->2457 2458 9c5486 ReadFile 2457->2458 2459 9c549f 2458->2459 2460 9c5450 2458->2460 2462 9c6130 9 API calls 2459->2462 2461 9c546c SetFilePointer 2460->2461 2466 9c54a9 2460->2466 2461->2458 2461->2459 2463 9c589d 2462->2463 2464 9c54e4 ReadFile 2464->2459 2464->2466 2465 9c54c9 SetFilePointer 2465->2459 2465->2464 2466->2464 2466->2465 2467 9c5500 6 API calls 2466->2467 2467->2459 2468 9c5599 17 API calls 2467->2468 2469 9c5737 2468->2469 2472 9c578f 2468->2472 2470 9c6bf4 2 API calls 2469->2470 2471 9c574d wsprintfA GetPrivateProfileStringA lstrlenA 2470->2471 2471->2469 2471->2472 2473 9c57c2 lstrlenA 2472->2473 2474 9c5802 2473->2474 2476 9c57ea lstrcpyA 2473->2476 2475 9c5d38 34 API calls 2474->2475 2477 9c5808 lstrcpyA lstrcpyA lstrcpyA 2475->2477 2476->2474 2479 9c4342 9 API calls 2477->2479 2480 9c582e lstrcpyA 2479->2480 2481 9c4342 9 API calls 2480->2481 2482 9c5839 lstrcpyA 2481->2482 2491 9c6895 2482->2491 2486 9c4792 2485->2486 2487 9c69d5 3 API calls 2486->2487 2488 9c47a3 lstrcatA lstrcatA lstrcatA 2487->2488 2489 9c516b 9 API calls 2488->2489 2490 9c47e0 lstrcpyA DialogBoxParamA 2489->2490 2490->2429 2492 9c584d VirtualFree DeleteFileA 2491->2492 2492->2433 2493 9c3d02 VirtualAlloc 2494 9c3f22 2495 9c3f38 2494->2495 2496 9c4244 2494->2496 2497 9c41f1 ShowWindow 2495->2497 2498 9c3f43 2495->2498 2499 9c423c 2496->2499 2500 9c4251 13 API calls 2496->2500 2497->2499 2501 9c420f LoadCursorA LoadCursorA 2497->2501 2502 9c3f4a 2498->2502 2503 9c4154 2498->2503 2500->2499 2501->2499 2506 9c40aa 2502->2506 2507 9c3f53 2502->2507 2504 9c4165 2503->2504 2505 9c4193 SHBrowseForFolderA 2503->2505 2504->2499 2508 9c4170 DialogBoxParamA 2504->2508 2505->2499 2509 9c41cd SHGetPathFromIDListA SetDlgItemTextA 2505->2509 2506->2499 2510 9c40b7 GetDlgItem 2506->2510 2511 9c3f5e 2507->2511 2512 9c4050 ChildWindowFromPoint GetDlgItem 2507->2512 2508->2499 2509->2499 2514 9c4101 GetDlgItem 2510->2514 2521 9c40d5 2510->2521 2515 9c3fd6 ChildWindowFromPoint GetDlgItem 2511->2515 2516 9c3f61 2511->2516 2512->2499 2513 9c4086 lstrlenA 2512->2513 2513->2499 2519 9c4099 SetCursor 2513->2519 2520 9c412b GetDlgItem 2514->2520 2514->2521 2517 9c4008 lstrlenA 2515->2517 2518 9c4036 PostMessageA 2515->2518 2516->2499 2522 9c3f6a 6 API calls 2516->2522 2517->2518 2523 9c4018 ShellExecuteA 2517->2523 2518->2499 2519->2499 2520->2499 2520->2521 2526 9c51b0 9 API calls 2521->2526 2522->2499 2523->2499 2525 9c40f9 2525->2499 2526->2525

      Callgraph

      • Executed
      • Not Executed
      • Opacity -> Relevance
      • Disassembly available
      callgraph 0 Function_009C3D1C 1 Function_009C589E 2 Function_009C221F 3 Function_009C2A18 4 Function_009C311B 19 Function_009C28BC 4->19 5 Function_009C1114 6 Function_009C6895 7 Function_009C6916 8 Function_009C3190 36 Function_009C3821 8->36 9 Function_009C3211 9->36 10 Function_009C220E 11 Function_009C2188 68 Function_009C2FEC 11->68 12 Function_009C698A 13 Function_009C458B 30 Function_009C6BAC 13->30 34 Function_009C43AF 13->34 50 Function_009C4752 13->50 56 Function_009C6BC7 13->56 57 Function_009C6BC0 13->57 79 Function_009C516B 13->79 14 Function_009C2584 59 Function_009C11FC 14->59 82 Function_009C1B63 14->82 15 Function_009C6B05 16 Function_009C6700 29 Function_009C6631 16->29 17 Function_009C1000 18 Function_009C3D02 35 Function_009C1AA0 19->35 20 Function_009C2FBF 21 Function_009C5D38 21->6 21->12 46 Function_009C69D5 21->46 48 Function_009C6856 21->48 21->50 52 Function_009C67CC 21->52 53 Function_009C6A4F 21->53 67 Function_009C6773 21->67 22 Function_009C69B8 22->48 23 Function_009C523B 23->12 24 Function_009C6BB4 25 Function_009C3CB6 66 Function_009C3BF3 25->66 26 Function_009C31B7 27 Function_009C6130 27->34 28 Function_009C51B0 29->24 29->27 29->34 29->50 51 Function_009C4D4C 29->51 55 Function_009C5344 29->55 62 Function_009C4878 29->62 71 Function_009C476E 29->71 72 Function_009C446F 29->72 31 Function_009C3C2E 31->66 32 Function_009C6A2E 33 Function_009C3D2E 33->28 35->82 36->25 36->31 37 Function_009C61A1 37->1 37->6 37->22 37->23 37->48 37->51 37->52 38 Function_009C3F22 38->28 39 Function_009C68DE 40 Function_009C2EDF 40->3 41 Function_009C21DF 41->68 42 Function_009C58D8 42->28 42->34 42->37 42->50 58 Function_009C4342 42->58 42->62 42->72 77 Function_009C43E8 42->77 43 Function_009C29D9 43->82 44 Function_009C33DA 44->4 63 Function_009C28FB 44->63 75 Function_009C3668 44->75 45 Function_009C1AD4 45->82 47 Function_009C31D5 47->36 49 Function_009C2257 51->4 51->8 51->9 51->26 51->27 64 Function_009C6BF4 51->64 70 Function_009C326D 51->70 73 Function_009C4EEF 51->73 80 Function_009C30E6 51->80 53->7 54 Function_009C1BCA 54->49 54->68 55->6 55->12 55->21 55->27 55->58 55->64 58->52 58->53 59->2 59->10 59->20 59->40 59->54 65 Function_009C2E72 59->65 59->68 76 Function_009C6968 59->76 60 Function_009C207D 60->49 60->68 61 Function_009C34F8 61->5 61->14 62->6 62->12 62->13 62->15 62->21 62->30 62->32 62->50 62->56 62->57 62->58 62->67 62->72 78 Function_009C52E9 62->78 81 Function_009C47E6 62->81 63->19 63->43 63->45 65->3 67->22 67->52 68->76 69 Function_009C3AED 70->25 70->31 70->47 70->69 71->12 71->46 71->79 72->12 72->50 72->67 73->4 73->8 73->12 73->27 73->39 73->44 73->48 73->52 73->58 73->61 73->72 74 Function_009C1A6F 75->25 75->31 77->72 78->39 78->48 78->52 79->53 80->4 82->10

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 9c5344-9c544e call 9c698a * 4 lstrlenA GetTempPathA GetCurrentDirectoryA GetCurrentProcess GetModuleFileNameA CreateFileA SetFilePointer 9 9c5486-9c549d ReadFile 0->9 10 9c549f-9c54a4 9->10 11 9c5450-9c5455 9->11 12 9c5898-9c589d call 9c6130 10->12 13 9c546c-9c5480 SetFilePointer 11->13 14 9c5457-9c545c 11->14 13->9 15 9c588c-9c5891 13->15 14->13 17 9c545e-9c5463 14->17 15->12 17->13 18 9c5465-9c546a 17->18 18->13 20 9c54a9-9c54ab 18->20 21 9c54e4-9c54fc ReadFile 20->21 22 9c54ad-9c54b2 21->22 23 9c54fe 21->23 24 9c54c9-9c54de SetFilePointer 22->24 25 9c54b4-9c54b9 22->25 23->10 24->15 24->21 25->24 26 9c54bb-9c54c0 25->26 26->24 27 9c54c2-9c54c7 26->27 27->24 28 9c5500-9c5593 SetFilePointer VirtualAlloc ReadFile GetTempPathA GetTempFileNameA CreateFileA 27->28 29 9c5599-9c5735 WriteFile CloseHandle GetPrivateProfileIntA * 4 GetPrivateProfileStringA * 8 wsprintfA GetPrivateProfileStringA lstrlenA 28->29 30 9c5893 28->30 31 9c5794-9c579b 29->31 32 9c5737 29->32 30->12 33 9c579d-9c57a0 31->33 34 9c57b3-9c57e8 call 9c6895 lstrlenA 31->34 35 9c573b-9c578d call 9c6bf4 wsprintfA GetPrivateProfileStringA lstrlenA 32->35 37 9c57ad-9c57b1 33->37 38 9c57a2-9c57a6 33->38 44 9c57ea-9c57f1 34->44 45 9c5802-9c588b call 9c5d38 lstrcpyA * 3 call 9c4342 lstrcpyA call 9c4342 lstrcpyA call 9c6895 VirtualFree DeleteFileA 34->45 43 9c578f 35->43 37->33 37->34 38->37 41 9c57a8 38->41 41->37 43->31 47 9c57fa 44->47 48 9c57f3-9c57f8 44->48 50 9c57ff-9c5800 lstrcpyA 47->50 48->50 50->45
      APIs
      • lstrlenA.KERNEL32(?,?,?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C53E8
      • GetTempPathA.KERNEL32(00000000,?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C53EF
      • GetCurrentDirectoryA.KERNEL32(00000104,C:\Users\user\Desktop,?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C53FE
      • GetCurrentProcess.KERNEL32(?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C5404
      • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\CDM212364_Setup.exe,00000104,?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C5418
      • CreateFileA.KERNELBASE(C:\Users\user\Desktop\CDM212364_Setup.exe,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,00000103,?,00000000,00000103), ref: 009C542D
      • SetFilePointer.KERNELBASE(00000000,00004E20,00000000,00000000,?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C5444
      • SetFilePointer.KERNELBASE(000000FD,00000000,00000001), ref: 009C5477
      • ReadFile.KERNELBASE(?,00000004,?,00000000,?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C5499
      • SetFilePointer.KERNELBASE(000000FD,00000000,00000001), ref: 009C54D5
      • ReadFile.KERNELBASE(?,00000004,0000005B,00000000), ref: 009C54F8
      • SetFilePointer.KERNELBASE(00004E20,00000000,00000000), ref: 009C5518
      • VirtualAlloc.KERNELBASE(00000000,00004E1E,00001000,00000004), ref: 009C552C
      • ReadFile.KERNEL32(00000000,00004E1C,00000050,00000000), ref: 009C5545
      • GetTempPathA.KERNEL32(00000104,?), ref: 009C5554
      • GetTempFileNameA.KERNELBASE(?,009C7C5C,00000000,?), ref: 009C556E
      • CreateFileA.KERNELBASE(?,40000000,00000003,00000000,00000002,00000000,00000000), ref: 009C5585
      • WriteFile.KERNELBASE(00000000,00004E1C,?,00000000), ref: 009C55A7
      • CloseHandle.KERNEL32 ref: 009C55B3
      • GetPrivateProfileIntA.KERNEL32(009C7C5C,ZipSize,00000000,?), ref: 009C55CB
      • GetPrivateProfileIntA.KERNEL32(009C7C5C,Delete,00000000,?), ref: 009C55DE
      • GetPrivateProfileIntA.KERNEL32(009C7C5C,NoGUI,00000000,?), ref: 009C55F1
      • GetPrivateProfileIntA.KERNEL32(009C7C5C,Debug,00000000,?), ref: 009C5604
      • GetPrivateProfileStringA.KERNEL32(009C7C5C,Name,Unnamed Archive,FTDI CDM Drivers,000000FF,?), ref: 009C562C
      • GetPrivateProfileStringA.KERNEL32(009C7C5C,Exec,009C7872,%temp%\FTDI-Driver\dp-chooser.exe\,000000FF,?), ref: 009C564A
      • GetPrivateProfileStringA.KERNEL32(009C7C5C,DefaultPath,009C7872,C:\Users\user\AppData\Local\Temp\FTDI-Driver,00000104,?), ref: 009C5662
      • GetPrivateProfileStringA.KERNEL32(009C7C5C,Intro,009C7872,Click 'Extract' to unpack version 2.12.36.4 of FTDI's Windows driver package and launch the installer.,00000400,?), ref: 009C567F
      • GetPrivateProfileStringA.KERNEL32(009C7C5C,AutoExtract,FALSE,?,00000006,?), ref: 009C569D
      • GetPrivateProfileStringA.KERNEL32(009C7C5C,OpenFolder,FALSE,?,00000006,?), ref: 009C56B7
      • GetPrivateProfileStringA.KERNEL32(009C7C5C,URL,009C7872,www.ftdichip.com,00000080,?), ref: 009C56D3
      • GetPrivateProfileStringA.KERNEL32(009C7C5C,Author,009C7872,009CADD0,000000FF,?), ref: 009C56EB
      • wsprintfA.USER32 ref: 009C56FF
      • GetPrivateProfileStringA.KERNEL32(009C7C5C,?,009C7872,?,00000400,?), ref: 009C5721
      • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C5731
      • wsprintfA.USER32 ref: 009C5759
      • GetPrivateProfileStringA.KERNEL32(009C7C5C,?,009C7872,?,00000400,?), ref: 009C577F
      • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000103,?,00000000), ref: 009C5789
      • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\FTDI-Driver,?,?,?,?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C57DE
      • lstrcpyA.KERNEL32(C:\Users\user\AppData\Local\Temp\FTDI-Driver,$curdir$,?,?,?,?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C5800
      • lstrcpyA.KERNEL32(?,00000000,?,?,?,?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C5812
      • lstrcpyA.KERNEL32(C:\Users\user\AppData\Local\Temp\FTDI-Driver,?,?,?,?,?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C581D
      • lstrcpyA.KERNEL32(C:\Users\user\AppData\Local\Temp\FTDI-Driver\,C:\Users\user\AppData\Local\Temp\FTDI-Driver,?,?,?,?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C5826
      • lstrcpyA.KERNEL32(C:\Users\user\AppData\Local\Temp\FTDI-Driver,00000000,?,?,?,?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C5831
      • lstrcpyA.KERNEL32(C:\Users\user\AppData\Local\Temp\FTDI-Driver\,00000000,?,?,?,?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C583C
      • VirtualFree.KERNELBASE(00000000,00008000,?,?,?,?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C5870
      • DeleteFileA.KERNELBASE(?,?,?,?,?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C587B
        • Part of subcall function 009C6BF4: VirtualAlloc.KERNELBASE(00000000,00000104,00001000,00000004,?,009C574D,009CD900,?,?,?,?,?,?,?,?,00000103), ref: 009C6C03
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: PrivateProfile$File$String$lstrcpy$Pointerlstrlen$ReadTempVirtual$AllocCreateCurrentNamePathwsprintf$CloseDeleteDirectoryFreeHandleModuleProcessWrite
      • String ID: $curdir$$$temp$$%temp%\FTDI-Driver\dp-chooser.exe\$Author$AutoExtract$C:\Users\user\AppData\Local\Temp\FTDI-Driver$C:\Users\user\AppData\Local\Temp\FTDI-Driver\$C:\Users\user\Desktop$C:\Users\user\Desktop\CDM212364_Setup.exe$Can't write temp file$Click 'Extract' to unpack version 2.12.36.4 of FTDI's Windows driver package and launch the installer.$Could not get file info. This archive is likely corrupted.$Could not read the source SFX.$Debug$DefaultPath$Delete$E$Exec$FALSE$FTDI CDM Drivers$Intro$K$Name$NoGUI$OpenFolder$P$Shortcut%d$URL$Unnamed Archive$ZipSize$]$www.ftdichip.com
      • API String ID: 3084389332-1662369998
      • Opcode ID: a229526f7b40bd7c85fe2c7cde46612c31c16367f18d2baf348cd96586b72490
      • Instruction ID: 512604cb6c2efe0be672a398a8b5ecf910459344dd1ce1b7b807a312be7c8c63
      • Opcode Fuzzy Hash: a229526f7b40bd7c85fe2c7cde46612c31c16367f18d2baf348cd96586b72490
      • Instruction Fuzzy Hash: 50E182B1D5C349BEE320DBA4DC85FABBBECEB84714F00082DBA45D2190D674A9449F63
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 180 9c3f22-9c3f32 181 9c3f38-9c3f3d 180->181 182 9c4244-9c424b 180->182 183 9c41f1-9c420d ShowWindow 181->183 184 9c3f43-9c3f44 181->184 185 9c4334 182->185 186 9c4251-9c4332 BeginPaint SetROP2 GetDialogBaseUnits * 2 Rectangle CreateCompatibleDC LoadBitmapA SelectObject GetDialogBaseUnits * 2 StretchBlt ReleaseDC EndPaint 182->186 187 9c423c-9c423f 183->187 188 9c420f-9c4237 LoadCursorA * 2 183->188 189 9c3f4a-9c3f4d 184->189 190 9c4154-9c4163 184->190 191 9c4336-9c433f 185->191 186->191 187->191 188->187 194 9c40aa-9c40b1 189->194 195 9c3f53-9c3f58 189->195 192 9c4165-9c416a 190->192 193 9c4193-9c41cb SHBrowseForFolderA 190->193 192->185 196 9c4170-9c418e DialogBoxParamA 192->196 193->187 197 9c41cd-9c41ef SHGetPathFromIDListA SetDlgItemTextA 193->197 194->187 198 9c40b7-9c40d3 GetDlgItem 194->198 199 9c3f5e-9c3f5f 195->199 200 9c4050-9c4080 ChildWindowFromPoint GetDlgItem 195->200 196->187 197->187 202 9c40d5-9c40e1 198->202 203 9c4101-9c4110 GetDlgItem 198->203 204 9c3fd6-9c4006 ChildWindowFromPoint GetDlgItem 199->204 205 9c3f61-9c3f64 199->205 200->187 201 9c4086-9c4093 lstrlenA 200->201 201->187 208 9c4099-9c40a5 SetCursor 201->208 209 9c40e7 202->209 210 9c412b-9c413a GetDlgItem 203->210 211 9c4112-9c4129 203->211 206 9c4008-9c4016 lstrlenA 204->206 207 9c4036-9c404b PostMessageA 204->207 205->185 212 9c3f6a-9c3fd1 LoadMenuA ClientToScreen GetSubMenu TrackPopupMenu DestroyMenu * 2 205->212 206->207 215 9c4018-9c4031 ShellExecuteA 206->215 207->187 208->187 213 9c40ec-9c40fc call 9c51b0 209->213 210->187 214 9c4140-9c4152 210->214 211->213 212->187 213->191 214->209 215->187
      APIs
      • LoadMenuA.USER32(00000071), ref: 009C3F72
      • ClientToScreen.USER32(?), ref: 009C3F9A
      • GetSubMenu.USER32(00000000,00000000), ref: 009C3FA4
      • TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,00000000), ref: 009C3FBF
      • DestroyMenu.USER32(00000000), ref: 009C3FCC
      • DestroyMenu.USER32(00000000), ref: 009C3FCF
      • ChildWindowFromPoint.USER32(?,?), ref: 009C3FEB
      • GetDlgItem.USER32(000003F2), ref: 009C3FFE
      • lstrlenA.KERNEL32(www.ftdichip.com), ref: 009C400E
      • ShellExecuteA.SHELL32(?,open,www.ftdichip.com,00000000,00000000,00000001), ref: 009C402B
      • ChildWindowFromPoint.USER32(?,?), ref: 009C4065
      • GetDlgItem.USER32(000003F2), ref: 009C4078
      • lstrlenA.KERNEL32(www.ftdichip.com), ref: 009C408B
      • SetCursor.USER32 ref: 009C409F
      • GetDlgItem.USER32(000003F9), ref: 009C40C8
      • DialogBoxParamA.USER32(00000081,Function_00003D2E,00000000), ref: 009C4188
      • ShowWindow.USER32(?,00000005), ref: 009C4200
      • LoadCursorA.USER32(0000007B), ref: 009C4227
      • LoadCursorA.USER32(00000000,00007F00), ref: 009C4235
      • BeginPaint.USER32(?), ref: 009C425D
      • SetROP2.GDI32(00000000,00000010), ref: 009C4268
      • GetDialogBaseUnits.USER32 ref: 009C4274
      • GetDialogBaseUnits.USER32 ref: 009C4289
      • Rectangle.GDI32(00000000,00000000,00000000,?), ref: 009C42A3
      • CreateCompatibleDC.GDI32(00000000), ref: 009C42AA
      • LoadBitmapA.USER32(00000067), ref: 009C42BA
      • SelectObject.GDI32(00000000,00000000), ref: 009C42C2
      • GetDialogBaseUnits.USER32 ref: 009C42DA
      • GetDialogBaseUnits.USER32 ref: 009C42EF
      • StretchBlt.GDI32(?,00000000,00000000,?), ref: 009C430A
      • ReleaseDC.USER32(00000000), ref: 009C4317
      • EndPaint.USER32(?), ref: 009C4328
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: DialogMenu$BaseLoadUnits$CursorItemWindow$ChildDestroyFromPaintPointlstrlen$BeginBitmapClientCompatibleCreateExecuteObjectParamPopupRectangleReleaseScreenSelectShellShowStretchTrack
      • String ID: MS Shell Dlg$Tahoma$open$www.ftdichip.com
      • API String ID: 1442380583-1245537460
      • Opcode ID: 473a9f9f6d86c788b4c303e0044cb264f61d199ee0cca9306c139f1725de5155
      • Instruction ID: 688bb9614ededc66ee5730b27e96a3e7380b1b64e7e2b661e02c3e8989812fde
      • Opcode Fuzzy Hash: 473a9f9f6d86c788b4c303e0044cb264f61d199ee0cca9306c139f1725de5155
      • Instruction Fuzzy Hash: AAA1F371E6C305AFD720AFA5DC09F2ABAACFB49354F444828F642E61A1D7719900FF52
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 218 9c5d38-9c5daf call 9c698a * 2 VirtualAlloc call 9c6856 225 9c5dba-9c5dc2 lstrcatA 218->225 226 9c5db1-9c5db8 218->226 227 9c5dc4-9c5dd4 call 9c67cc 225->227 226->227 230 9c5df6-9c5dfd 227->230 231 9c5dff-9c5e4c ExpandEnvironmentStringsA call 9c6773 lstrcpyA call 9c6895 230->231 232 9c5dd6-9c5df3 call 9c6a4f call 9c67cc 230->232 241 9c610a-9c610c 231->241 242 9c5e52 231->242 232->230 244 9c610e-9c6121 lstrlenA call 9c6856 lstrcpyA 241->244 245 9c6123-9c612f 241->245 243 9c5e56-9c5e6c call 9c6895 242->243 250 9c5e6e-9c5e94 call 9c698a call 9c69d5 243->250 251 9c5e99-9c5eaf call 9c6895 243->251 244->245 263 9c60ab-9c60af 250->263 256 9c5ebd-9c5ed3 call 9c6895 251->256 257 9c5eb1-9c5ebb 251->257 267 9c5ed5-9c5edf 256->267 268 9c5ee1-9c5ef7 call 9c6895 256->268 259 9c5f27-9c5f2e call 9c69d5 257->259 259->263 265 9c60b0-9c60b3 lstrcpyA 263->265 269 9c60c0-9c60d7 lstrcatA call 9c6773 265->269 267->259 274 9c5ef9-9c5f03 268->274 275 9c5f05-9c5f1b call 9c6895 268->275 273 9c60dc-9c6100 lstrcpyA call 9c6895 269->273 273->243 280 9c6106 273->280 274->259 281 9c5f1d-9c5f22 275->281 282 9c5f33-9c5f49 call 9c6895 275->282 280->241 281->259 285 9c5f4b-9c5f50 282->285 286 9c5f55-9c5f6b call 9c6895 282->286 285->265 289 9c5f6d-9c5f7d GetCurrentDirectoryA 286->289 290 9c5f82-9c5f98 call 9c6895 286->290 289->263 293 9c5f9a-9c5fcd call 9c698a call 9c69d5 lstrlenA 290->293 294 9c6003-9c6019 call 9c6895 290->294 305 9c5fcf-9c5fd9 lstrcatA 293->305 306 9c5fdb-9c5fe8 call 9c4752 293->306 299 9c601b-9c6045 lstrcpyA RegOpenKeyExA 294->299 300 9c6083-9c6099 call 9c6895 294->300 299->263 303 9c6047-9c6081 RegQueryValueExA RegCloseKey 299->303 309 9c609b-9c60a5 GetSystemDirectoryA 300->309 310 9c60b5-9c60be lstrcatA 300->310 303->263 305->306 306->263 312 9c5fee-9c5ffe GetTempPathA 306->312 309->263 310->269 312->263
      APIs
      • VirtualAlloc.KERNELBASE(00000000,00000105,00001000,00000004,?,?,74DEB530,74DE83C0,C:\Users\user\AppData\Local\Temp\FTDI-Driver,74DF0440), ref: 009C5D89
        • Part of subcall function 009C6856: VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,75BF6C10,009C65C9,www.ftdichip.com,00000007,mailto:), ref: 009C6868
      • lstrcatA.KERNEL32(?,009C78C4,?,?,74DEB530,74DE83C0,C:\Users\user\AppData\Local\Temp\FTDI-Driver,74DF0440), ref: 009C5DC2
      • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,?,?,?,?,?,?,74DEB530), ref: 009C5E08
      • lstrcpyA.KERNEL32(?,00000000), ref: 009C5E34
      • GetCurrentDirectoryA.KERNEL32(00000104,?), ref: 009C5F77
      • lstrcpyA.KERNEL32(00000000,?), ref: 009C60B1
      • lstrcatA.KERNEL32(00000000,?), ref: 009C60BE
      • lstrcatA.KERNEL32(00000000,009C78C4), ref: 009C60C6
      • lstrcpyA.KERNEL32(?,00000000), ref: 009C60E8
      • lstrlenA.KERNEL32(00000000), ref: 009C610F
      • lstrcpyA.KERNEL32(00000000,00000000), ref: 009C6121
        • Part of subcall function 009C6A4F: lstrlenA.KERNEL32(?,?,00000000,74DE8A60,?,009C5DE6,?,009C791C,009C7920,00000104,?,?,?,?,?,74DEB530), ref: 009C6A5D
        • Part of subcall function 009C6A4F: lstrlenA.KERNEL32(?,?,009C5DE6,?,009C791C,009C7920,00000104,?,?,?,?,?,74DEB530,74DE83C0,C:\Users\user\AppData\Local\Temp\FTDI-Driver,74DF0440), ref: 009C6A68
        • Part of subcall function 009C6A4F: lstrcmpA.KERNEL32(?,?,?,009C5DE6,?,009C791C,009C7920,00000104,?,?,?,?,?,74DEB530,74DE83C0,C:\Users\user\AppData\Local\Temp\FTDI-Driver), ref: 009C6A71
        • Part of subcall function 009C6A4F: lstrlenA.KERNEL32(?,00000000,?,009C5DE6,?,009C791C,009C7920,00000104,?,?,?,?,?,74DEB530,74DE83C0,C:\Users\user\AppData\Local\Temp\FTDI-Driver), ref: 009C6A99
        • Part of subcall function 009C6A4F: VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,?,009C5DE6,?,009C791C,009C7920,00000104,?,?,?,?,?,74DEB530), ref: 009C6AB6
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: lstrcpylstrlen$AllocVirtuallstrcat$CurrentDirectoryEnvironmentExpandStringslstrcmp
      • String ID: %curdir%$%desktop%$%favorites%$%programfiles%$%quicklaunch%$%sendto%$%startmenu%$%startup%$%sysdir%$%targetdir%$AppData$C:\Program Files$C:\Users\user\AppData\Local\Temp\FTDI-Driver$C:\Users\user\AppData\Local\Temp\FTDI-Driver\$Desktop$Favorites$ProgramFilesDir$Programs$SOFTWARE\Microsoft\Windows\CurrentVersion$SendTo$Startup$\Microsoft\Internet Explorer\Quick Launch
      • API String ID: 4187263582-1324585981
      • Opcode ID: 3ba31f342f1d50491207b2592efbbb63a79a0059c0c451f4a64eb893a527ce23
      • Instruction ID: 741eeaebe25f7e61eec697978f7cea5f5ce9a2614b427e85766766ac594cd153
      • Opcode Fuzzy Hash: 3ba31f342f1d50491207b2592efbbb63a79a0059c0c451f4a64eb893a527ce23
      • Instruction Fuzzy Hash: 52A17572D4C305BBD614EAA09C46FABB7ECABC9758F50082EF644D60C1E674E6448B23
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6b12f68b57cc0df2c5c788ea16277d731b5847035a9a21d8208ad53fdb187807
      • Instruction ID: e7e03de23df46b024b1c52bd50ffafd7a57cf03456359e00a1b8ac44adb5d734
      • Opcode Fuzzy Hash: 6b12f68b57cc0df2c5c788ea16277d731b5847035a9a21d8208ad53fdb187807
      • Instruction Fuzzy Hash: 555227B1A087069FC704CF29C890A2AFBF5FF89350F108A2DE49987652D375E954CF96
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • DestroyWindow.USER32(0002047C), ref: 009C61AB
      • ShowWindow.USER32(00000005,00000000,74DF3550,?,00004E21), ref: 009C61C3
      • GetDlgItem.USER32(000003EB,00000001), ref: 009C61E9
      • EnableWindow.USER32(00000000), ref: 009C61F2
      • GetDlgItem.USER32(000003E8,00000001), ref: 009C6201
      • EnableWindow.USER32(00000000), ref: 009C6204
      • SetDlgItemTextA.USER32(000003F7), ref: 009C6223
      • SetDlgItemTextA.USER32(000003F9), ref: 009C623C
      • GetDlgItem.USER32(000003FB,00000005), ref: 009C624B
      • ShowWindow.USER32(00000000), ref: 009C624E
      • GetDlgItem.USER32(000003FE,00000000), ref: 009C6265
      • SetWindowPos.USER32(00000000), ref: 009C626E
      • GetDlgItem.USER32(000003F7,00000000), ref: 009C6286
      • SetWindowPos.USER32(00000000), ref: 009C6289
      • GetDlgItem.USER32(000003F9,00000000), ref: 009C62A1
      • SetWindowPos.USER32(00000000), ref: 009C62A4
      • GetDlgItem.USER32(000003E8,Tahoma), ref: 009C62BE
      • GetDlgItem.USER32(000003EB,Tahoma), ref: 009C62E1
      • GetDlgItem.USER32(000003ED,Tahoma), ref: 009C6304
        • Part of subcall function 009C523B: GetDC.USER32(?), ref: 009C525A
        • Part of subcall function 009C523B: SendMessageA.USER32(?,00000031,00000000,00000000), ref: 009C527C
        • Part of subcall function 009C523B: GetObjectA.GDI32(00000000,?,75C08FB0), ref: 009C527F
        • Part of subcall function 009C523B: lstrcpyA.KERNEL32(?,?), ref: 009C52AC
        • Part of subcall function 009C523B: CreateFontIndirectA.GDI32(?), ref: 009C52B7
        • Part of subcall function 009C523B: SetBkMode.GDI32(00000000,00000002), ref: 009C52C6
        • Part of subcall function 009C523B: SendMessageA.USER32(00000000,00000030,00000000,00000001), ref: 009C52D5
        • Part of subcall function 009C523B: ReleaseDC.USER32(?,00000000), ref: 009C52DC
      • GetDlgItem.USER32(000003FB,Tahoma), ref: 009C6327
      • GetDlgItem.USER32(000003EB,00000000), ref: 009C635A
      • KiUserCallbackDispatcher.NTDLL(00000000), ref: 009C635D
      • GetDlgItem.USER32(000003E8,00000000), ref: 009C636B
      • KiUserCallbackDispatcher.NTDLL(00000000), ref: 009C636E
      • GetDlgItem.USER32(000003F8,Tahoma), ref: 009C6388
      • GetDlgItem.USER32(000003FA,Tahoma), ref: 009C63A6
      • CreateThread.KERNELBASE(00000000,00000000,009C4D4C,00000000,00000000,?), ref: 009C63BF
      • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\FTDI-Driver), ref: 009C63D0
      • SetDlgItemTextA.USER32(000003EA,C:\Users\user\AppData\Local\Temp\FTDI-Driver), ref: 009C63EE
      • GetDlgItem.USER32(000003EA,000000C5), ref: 009C6403
      • SendMessageA.USER32(00000000), ref: 009C640C
      • GetDlgItem.USER32(000003F6,000000F1), ref: 009C6422
      • SendMessageA.USER32(00000000), ref: 009C6425
      • GetDlgItem.USER32(000003E8,00000001), ref: 009C6434
      • EnableWindow.USER32(00000000), ref: 009C6437
      • GetDlgItem.USER32(000003EB,00000001), ref: 009C6446
      • EnableWindow.USER32(00000000), ref: 009C6449
      • GetDlgItem.USER32(000003ED,00000001), ref: 009C6458
      • EnableWindow.USER32(00000000), ref: 009C645B
      • GetDlgItem.USER32(000003F8,Tahoma), ref: 009C6477
      • GetDlgItem.USER32(000003EA,Tahoma), ref: 009C6491
      • GetDlgItem.USER32(000003EC,Tahoma), ref: 009C64AF
      • GetDlgItem.USER32(000003F6,Tahoma), ref: 009C64CD
      • GetDlgItem.USER32(000003F7,00000001), ref: 009C64F7
      • SetWindowPos.USER32(00000000), ref: 009C64FA
      • GetDlgItem.USER32(000003F9,00000001), ref: 009C6516
      • SetWindowPos.USER32(00000000), ref: 009C6519
      • GetDlgItem.USER32(000003FE,00000001), ref: 009C6535
      • SetWindowPos.USER32(00000000), ref: 009C6538
      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000001), ref: 009C6549
      • GetDlgItem.USER32(000003FB,00000000), ref: 009C6559
      • ShowWindow.USER32(00000000), ref: 009C655C
      • GetDlgItem.USER32(000003E8,00000000), ref: 009C656E
      • KiUserCallbackDispatcher.NTDLL(00000000), ref: 009C6571
      • GetDlgItem.USER32(000003EB,00000001), ref: 009C6580
      • EnableWindow.USER32(00000000), ref: 009C6583
      • SetDlgItemTextA.USER32(000003F1,FTDI CDM Drivers), ref: 009C6595
      • SetDlgItemTextA.USER32(000003F9,Click 'Extract' to unpack version 2.12.36.4 of FTDI's Windows driver package and launch the installer.), ref: 009C65A7
      • lstrlenA.KERNEL32(www.ftdichip.com), ref: 009C65B5
      • lstrlenA.KERNEL32(www.ftdichip.com), ref: 009C65EB
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: Item$Window$Enable$Text$MessageSend$CallbackDispatcherShowUserlstrlen$Create$DestroyFontIndirectModeObjectReleaseThreadlstrcpy
      • String ID: &Extract$C:\Users\user\AppData\Local\Temp\FTDI-Driver$C:\Users\user\AppData\Local\Temp\FTDI-Driver\$Click 'Extract' to unpack version 2.12.36.4 of FTDI's Windows driver package and launch the installer.$FTDI CDM Drivers$Tahoma$mailto:$www.ftdichip.com
      • API String ID: 2631855608-3092188083
      • Opcode ID: 7b60d0fde4ea3cd2631ea3d12ee8f7bebdb2d424e61aa2be1833024290787506
      • Instruction ID: 60f3534c3258fab4765c82d36860fb259d7eb66237c8d350d79745b8e7cd883e
      • Opcode Fuzzy Hash: 7b60d0fde4ea3cd2631ea3d12ee8f7bebdb2d424e61aa2be1833024290787506
      • Instruction Fuzzy Hash: A2B157B1EA93497FFA213B75DC8BF2B3E5DEB44744F050424B601A90F1C9A25E10AA26
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 107 9c58d8-9c58e9 108 9c5c2e-9c5c33 107->108 109 9c58ef 107->109 112 9c5c39-9c5c3e 108->112 113 9c5cc0-9c5cd9 GetDlgItem 108->113 110 9c58f5-9c58f8 109->110 111 9c5aa0-9c5aac 109->111 118 9c58fe-9c58ff 110->118 119 9c59c3-9c59ca 110->119 114 9c5c08-9c5c23 MessageBoxA 111->114 115 9c5ab2-9c5ab7 111->115 120 9c5c40-9c5c43 112->120 121 9c5cb2-9c5cb6 112->121 116 9c5cdb-9c5ced 113->116 117 9c5d04-9c5d13 GetDlgItem 113->117 128 9c59a1-9c59a3 114->128 129 9c5c29 114->129 122 9c5abd-9c5ac0 115->122 123 9c5c00-9c5c06 115->123 124 9c5cf2-9c5cff call 9c51b0 116->124 127 9c5d19-9c5d30 117->127 117->128 125 9c59ad-9c59c1 PostMessageA 118->125 126 9c5905-9c5907 118->126 130 9c5a99-9c5a9b 119->130 131 9c59d0-9c5a94 BeginPaint SetROP2 GetDialogBaseUnits Rectangle CreateCompatibleDC LoadBitmapA SelectObject GetDialogBaseUnits * 2 StretchBlt ReleaseDC EndPaint 119->131 120->130 132 9c5c49-9c5cad LoadMenuA ClientToScreen GetSubMenu TrackPopupMenu DestroyMenu * 2 120->132 121->113 134 9c5ac2-9c5ac4 122->134 135 9c5af3-9c5afb 122->135 138 9c5bef-9c5bfb call 9c61a1 123->138 133 9c59a4-9c59aa 124->133 125->128 126->125 137 9c590d-9c5912 126->137 127->124 128->133 139 9c5d32-9c5d37 call 9c43af 129->139 130->133 131->128 132->128 134->139 140 9c5aca-9c5acf 134->140 143 9c5afd-9c5b04 135->143 144 9c5b11-9c5b1a 135->144 137->130 145 9c5918-9c599b call 9c61a1 SetWindowTextA SetDlgItemTextA * 2 GetModuleHandleA LoadIconA SetClassLongA ShowWindow 137->145 138->128 140->130 147 9c5ad1-9c5aee DialogBoxParamA 140->147 149 9c5bee 143->149 150 9c5b0a-9c5b0c 143->150 152 9c5b20-9c5b35 call 9c4342 lstrcpyA 144->152 153 9c5bc2-9c5bc5 144->153 145->128 147->128 149->138 150->144 161 9c5b37-9c5b3e call 9c446f 152->161 162 9c5b40-9c5b51 GetDlgItemTextA 152->162 153->149 155 9c5bc7-9c5bd2 call 9c4878 153->155 155->139 164 9c5bd8-9c5be9 ShellExecuteA 155->164 163 9c5b57-9c5b60 call 9c4752 161->163 162->163 169 9c5bbd 163->169 170 9c5b62-9c5b68 163->170 164->139 169->153 170->169 171 9c5b6a-9c5b8b GetDlgItem SendMessageA 170->171 172 9c5b8d-9c5ba3 MessageBoxA 171->172 173 9c5bab-9c5bb4 call 9c4752 171->173 172->128 174 9c5ba9 172->174 173->169 176 9c5bb6-9c5bbc call 9c43e8 173->176 174->176 176->169
      APIs
      • SetWindowTextA.USER32(00000001), ref: 009C5935
      • SetDlgItemTextA.USER32(000003F7), ref: 009C5958
      • SetDlgItemTextA.USER32(000003F9), ref: 009C5971
      • GetModuleHandleA.KERNEL32(00000000,00000065), ref: 009C5977
      • LoadIconA.USER32(00000000), ref: 009C597E
      • SetClassLongA.USER32(000000F2,00000000), ref: 009C598D
      • ShowWindow.USER32(00000005), ref: 009C599B
      • PostMessageA.USER32(00000111,000003ED,00000000), ref: 009C59BB
      • BeginPaint.USER32(?), ref: 009C59DC
      • SetROP2.GDI32(00000000,00000010), ref: 009C59E7
      • GetDialogBaseUnits.USER32 ref: 009C59F5
      • Rectangle.GDI32(00000000,00000000,00000000,00000000), ref: 009C5A0F
      • CreateCompatibleDC.GDI32(00000000), ref: 009C5A16
      • LoadBitmapA.USER32(0000007E), ref: 009C5A26
      • SelectObject.GDI32(00000000,00000000), ref: 009C5A2E
      • GetDialogBaseUnits.USER32 ref: 009C5A44
      • GetDialogBaseUnits.USER32 ref: 009C5A56
      • StretchBlt.GDI32(?,?), ref: 009C5A6F
      • ReleaseDC.USER32(00000000), ref: 009C5A7C
      • EndPaint.USER32(?), ref: 009C5A8D
      • DialogBoxParamA.USER32(00000081,009C3D2E,?), ref: 009C5AE8
      • lstrcpyA.KERNEL32(C:\Users\user\AppData\Local\Temp\FTDI-Driver\,00000000), ref: 009C5B29
      • GetDlgItemTextA.USER32(000003EA,C:\Users\user\AppData\Local\Temp\FTDI-Driver\,00000104), ref: 009C5B51
      • GetDlgItem.USER32(000003F6,000000F0), ref: 009C5B7C
      • SendMessageA.USER32(00000000), ref: 009C5B83
      • MessageBoxA.USER32(00000000,The target directory doesn't exist. Create it?,Create Directory?,00000024), ref: 009C5B9A
      • ShellExecuteA.SHELL32(00000000,explore,C:\Users\user\AppData\Local\Temp\FTDI-Driver\,00000000,00000000,00000005), ref: 009C5BE3
      • MessageBoxA.USER32(Are you sure you want to exit?,Confirm exit,00000034), ref: 009C5C1A
      • LoadMenuA.USER32(00000071), ref: 009C5C51
      • ClientToScreen.USER32(?), ref: 009C5C76
      • GetSubMenu.USER32(00000000,00000000), ref: 009C5C80
      • TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,00000000), ref: 009C5C9B
      • DestroyMenu.USER32(00000000), ref: 009C5CA8
      • DestroyMenu.USER32(00000000), ref: 009C5CAB
      • GetDlgItem.USER32(000003F7), ref: 009C5CD1
      • GetDlgItem.USER32(000003F9), ref: 009C5D0F
        • Part of subcall function 009C61A1: DestroyWindow.USER32(0002047C), ref: 009C61AB
        • Part of subcall function 009C61A1: ShowWindow.USER32(00000005,00000000,74DF3550,?,00004E21), ref: 009C61C3
        • Part of subcall function 009C61A1: GetDlgItem.USER32(000003EB,00000001), ref: 009C61E9
        • Part of subcall function 009C61A1: EnableWindow.USER32(00000000), ref: 009C61F2
        • Part of subcall function 009C61A1: GetDlgItem.USER32(000003E8,00000001), ref: 009C6201
        • Part of subcall function 009C61A1: EnableWindow.USER32(00000000), ref: 009C6204
        • Part of subcall function 009C61A1: SetDlgItemTextA.USER32(000003F7), ref: 009C6223
        • Part of subcall function 009C61A1: SetDlgItemTextA.USER32(000003F9), ref: 009C623C
        • Part of subcall function 009C61A1: GetDlgItem.USER32(000003FB,00000005), ref: 009C624B
        • Part of subcall function 009C61A1: ShowWindow.USER32(00000000), ref: 009C624E
        • Part of subcall function 009C61A1: GetDlgItem.USER32(000003FE,00000000), ref: 009C6265
        • Part of subcall function 009C61A1: SetWindowPos.USER32(00000000), ref: 009C626E
        • Part of subcall function 009C61A1: GetDlgItem.USER32(000003F7,00000000), ref: 009C6286
        • Part of subcall function 009C61A1: SetWindowPos.USER32(00000000), ref: 009C6289
        • Part of subcall function 009C61A1: GetDlgItem.USER32(000003F9,00000000), ref: 009C62A1
        • Part of subcall function 009C61A1: SetWindowPos.USER32(00000000), ref: 009C62A4
        • Part of subcall function 009C61A1: GetDlgItem.USER32(000003E8,Tahoma), ref: 009C62BE
        • Part of subcall function 009C61A1: GetDlgItem.USER32(000003EB,Tahoma), ref: 009C62E1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: Item$Window$Text$Menu$DialogMessage$BaseDestroyLoadShowUnits$EnablePaint$BeginBitmapClassClientCompatibleCreateExecuteHandleIconLongModuleObjectParamPopupPostRectangleReleaseScreenSelectSendShellStretchTracklstrcpy
      • String ID: Are you sure you want to exit?$C:\Users\user\AppData\Local\Temp\FTDI-Driver\$Confirm exit$Create Directory?$FTDI CDM Drivers$Tahoma$The target directory doesn't exist. Create it?$explore
      • API String ID: 2714460918-2621332878
      • Opcode ID: d6d68bd7ec428f3b2793d465dada1c906d3632c9f0e713e74d6888572a9ad65a
      • Instruction ID: a22db34354de299b8e8d42e7dc01e70e4fad7c9d454b3a62ea4e2cda5c804b9b
      • Opcode Fuzzy Hash: d6d68bd7ec428f3b2793d465dada1c906d3632c9f0e713e74d6888572a9ad65a
      • Instruction Fuzzy Hash: BCA1E531E6C605BFDB106BA5EC0AF2A7AADEB45355F4A442CF502D90F0C671A940BF63
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 313 9c4878-9c489b call 9c6bac 316 9c49f3-9c49f5 313->316 317 9c49fb-9c4a09 lstrlenA 316->317 318 9c48a0-9c498f call 9c698a * 3 call 9c6bc0 call 9c6773 lstrcpyA call 9c6bc0 call 9c6773 lstrcpyA call 9c5d38 lstrcpyA call 9c5d38 lstrcpyA call 9c4342 * 2 call 9c52e9 call 9c4752 316->318 319 9c4d1c-9c4d2b 317->319 320 9c4a0f-9c4a8a call 9c698a * 2 call 9c4342 SetCurrentDirectoryA call 9c5d38 lstrcpyA call 9c4342 call 9c6a2e call 9c6895 317->320 384 9c499c-9c49bd call 9c52e9 call 9c4752 318->384 385 9c4991-9c499b call 9c446f 318->385 324 9c4d2d-9c4d3b CreateThread 319->324 325 9c4d41-9c4d4b 319->325 352 9c4c5d-9c4c6a call 9c47e6 320->352 353 9c4a90-9c4aab call 9c6a2e call 9c6895 320->353 324->325 362 9c4d07-9c4d16 WinExec 352->362 363 9c4c70-9c4c91 CreateProcessA 352->363 353->352 369 9c4ab1-9c4acc call 9c6a2e call 9c6895 353->369 362->319 366 9c4cba-9c4d05 call 9c698a wsprintfA MessageBoxA 363->366 367 9c4c93-9c4cb8 ShowWindow WaitForSingleObject ShowWindow 363->367 366->319 367->319 369->352 381 9c4ad2-9c4aed call 9c6a2e call 9c6895 369->381 394 9c4c2d-9c4c58 GetCurrentDirectoryA ShellExecuteA 381->394 395 9c4af3-9c4b0e call 9c6a2e call 9c6895 381->395 398 9c49bf-9c49c9 call 9c446f 384->398 399 9c49ca-9c49f0 call 9c6b05 call 9c6bc7 call 9c6bac 384->399 385->384 394->319 395->394 408 9c4b14-9c4b2f call 9c6a2e call 9c6895 395->408 398->399 399->316 408->394 416 9c4b35-9c4b50 call 9c6a2e call 9c6895 408->416 416->394 421 9c4b56-9c4b71 call 9c6a2e call 9c6895 416->421 421->394 426 9c4b77-9c4b92 call 9c6a2e call 9c6895 421->426 426->394 431 9c4b98-9c4bb3 call 9c6a2e call 9c6895 426->431 431->394 436 9c4bb5-9c4bd0 call 9c6a2e call 9c6895 431->436 436->394 441 9c4bd2-9c4bed call 9c6a2e call 9c6895 436->441 441->394 446 9c4bef-9c4c0a call 9c6a2e call 9c6895 441->446 446->394 451 9c4c0c-9c4c27 call 9c6a2e call 9c6895 446->451 451->319 451->394
      APIs
      • lstrcpyA.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,C:\Users\user\AppData\Local\Temp\FTDI-Driver\,00000000), ref: 009C48FE
      • lstrcpyA.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,C:\Users\user\AppData\Local\Temp\FTDI-Driver\,00000000), ref: 009C4920
      • lstrcpyA.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,C:\Users\user\AppData\Local\Temp\FTDI-Driver\,00000000), ref: 009C4939
      • lstrcpyA.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,C:\Users\user\AppData\Local\Temp\FTDI-Driver\,00000000), ref: 009C4952
      • lstrlenA.KERNEL32(%temp%\FTDI-Driver\dp-chooser.exe\), ref: 009C4A01
      • SetCurrentDirectoryA.KERNELBASE(C:\Users\user\AppData\Local\Temp\FTDI-Driver\,?,?,00000000,00000040,?,00000000,00000103), ref: 009C4A4D
        • Part of subcall function 009C5D38: VirtualAlloc.KERNELBASE(00000000,00000105,00001000,00000004,?,?,74DEB530,74DE83C0,C:\Users\user\AppData\Local\Temp\FTDI-Driver,74DF0440), ref: 009C5D89
        • Part of subcall function 009C5D38: ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,?,?,?,?,?,?,74DEB530), ref: 009C5E08
        • Part of subcall function 009C5D38: lstrcpyA.KERNEL32(?,00000000), ref: 009C5E34
        • Part of subcall function 009C5D38: lstrcpyA.KERNEL32(00000000,?), ref: 009C60B1
      • lstrcpyA.KERNEL32(?,00000000,?,?,00000000,00000040,?,00000000,00000103), ref: 009C4A60
        • Part of subcall function 009C6A2E: lstrlenA.KERNEL32(00000003,00000003,009C4A7A,?,00000003,?,?,?,00000000,00000040,?,00000000,00000103), ref: 009C6A34
      • GetCurrentDirectoryA.KERNEL32(00000104,009C7872), ref: 009C4C38
      • ShellExecuteA.SHELL32(open,?,00000000,009C7872,0000000A), ref: 009C4C52
      • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 009C4C89
      • ShowWindow.USER32(00000000,?,?,?,?,?,?,?,00000000,00000040,?,00000000,00000103), ref: 009C4CA0
      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,00000000,00000040,?,00000000,00000103), ref: 009C4CA8
      • ShowWindow.USER32(00000005,?,?,?,?,?,?,?,00000000,00000040,?,00000000,00000103), ref: 009C4CB6
      • wsprintfA.USER32 ref: 009C4CE6
      • MessageBoxA.USER32(00000000,?,Error,00000010), ref: 009C4CFF
      • WinExec.KERNEL32(?), ref: 009C4D16
      • CreateThread.KERNEL32(00000000,00000000,009C458B,00000000,00000000,?), ref: 009C4D3B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: lstrcpy$CreateCurrentDirectoryShowWindowlstrlen$AllocEnvironmentExecExecuteExpandMessageObjectProcessShellSingleStringsThreadVirtualWaitwsprintf
      • String ID: %s could not be executed.$%temp%\FTDI-Driver\dp-chooser.exe\$C:\Users\user\AppData\Local\Temp\FTDI-Driver\$D$Error$bat$chm$com$doc$exe$htm$mp3$open$pdf$ppt$prc$tml$txt$xls$xml
      • API String ID: 2626025147-2000828445
      • Opcode ID: fc3de33de5de644b8b529ca59dac5fcbb8a72207792c9cd5d1ce8fb60d88294b
      • Instruction ID: d0245458ff9cdc5a5cdad9574744d2d20dd5f8b0ebe1caffaea742cc93f67c25
      • Opcode Fuzzy Hash: fc3de33de5de644b8b529ca59dac5fcbb8a72207792c9cd5d1ce8fb60d88294b
      • Instruction Fuzzy Hash: 31B164B2D483047AD620F7B19D5AFEB76DCDF99754F04081DFA49D6082EA34E6048A73
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • VirtualAlloc.KERNELBASE(00000000,0000FFFF,00001000,00000004,C:\Users\user\AppData\Local\Temp\FTDI-Driver\,00000000), ref: 009C4F49
      • wsprintfA.USER32 ref: 009C4F98
      • GetFullPathNameA.KERNEL32(?,00000104,?,00000000), ref: 009C4FBE
      • lstrcpyA.KERNEL32(?,00000000), ref: 009C4FDB
      • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 009C4FF8
      • lstrlenA.KERNEL32(00000000), ref: 009C5031
      • CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 009C5069
      • WriteFile.KERNELBASE(00000000,00000000,00000000,?,00000000), ref: 009C50A5
      • DosDateTimeToFileTime.KERNEL32(?,?,?), ref: 009C50BC
      • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 009C50C8
      • SetFileTime.KERNELBASE(00000000,00000000,00000000,?), ref: 009C50D8
      • FindCloseChangeNotification.KERNELBASE(00000000), ref: 009C50DF
      • VirtualFree.KERNELBASE(00000000,00000000,00004000), ref: 009C50ED
      • wsprintfA.USER32 ref: 009C5116
      • lstrcpyA.KERNEL32(?,00000000), ref: 009C5135
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: File$Time$CreateVirtuallstrcpywsprintf$AllocChangeCloseDateFindFreeFullLocalNameNotificationPathWritelstrlen
      • String ID: %s%s$C:\Users\user\AppData\Local\Temp\FTDI-Driver\$Could not extract the current file.$Could not get file info. This archive is likely corrupted.
      • API String ID: 4283028209-2570833432
      • Opcode ID: 72482748f2593edca82935147d872dbca37aedebd1fee612b0184b56757b8d8d
      • Instruction ID: 5254ba37f5851270f67789c442dbb2b7e875c35943a62f0d707978cedc94f47e
      • Opcode Fuzzy Hash: 72482748f2593edca82935147d872dbca37aedebd1fee612b0184b56757b8d8d
      • Instruction Fuzzy Hash: D95181B2D0C3457FE620E7B09C49FABB7ACABC4744F44492DF645D2181EA34A9458B73
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\FTDI-Driver\,009C78C4,00000000), ref: 009C4D5F
      • GetFullPathNameA.KERNEL32(C:\Users\user\AppData\Local\Temp\FTDI-Driver\,00000104,C:\Users\user\AppData\Local\Temp\FTDI-Driver\,00000000), ref: 009C4D6E
        • Part of subcall function 009C326D: CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000,C:\Users\user\AppData\Local\Temp\FTDI-Driver\,00000000,?,C:\Users\user\AppData\Local\Temp\FTDI-Driver\), ref: 009C3290
        • Part of subcall function 009C326D: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000,?,?,C:\Users\user\AppData\Local\Temp\FTDI-Driver\), ref: 009C32B5
      • GetDlgItem.USER32(000003EF,C:\Users\user\AppData\Local\Temp\FTDI-Driver\), ref: 009C4DB0
      • SendMessageA.USER32(00000000,00000401,00000000,?), ref: 009C4DCF
      • wsprintfA.USER32 ref: 009C4E17
      • SetDlgItemTextA.USER32(000003FA,?), ref: 009C4E33
        • Part of subcall function 009C4EEF: VirtualAlloc.KERNELBASE(00000000,0000FFFF,00001000,00000004,C:\Users\user\AppData\Local\Temp\FTDI-Driver\,00000000), ref: 009C4F49
        • Part of subcall function 009C4EEF: wsprintfA.USER32 ref: 009C4F98
        • Part of subcall function 009C4EEF: GetFullPathNameA.KERNEL32(?,00000104,?,00000000), ref: 009C4FBE
        • Part of subcall function 009C4EEF: lstrcpyA.KERNEL32(?,00000000), ref: 009C4FDB
        • Part of subcall function 009C4EEF: CreateFileA.KERNELBASE(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 009C4FF8
        • Part of subcall function 009C6BF4: VirtualAlloc.KERNELBASE(00000000,00000104,00001000,00000004,?,009C574D,009CD900,?,?,?,?,?,?,?,?,00000103), ref: 009C6C03
      • SendMessageA.USER32(00000000,00000402,?,00000000), ref: 009C4E79
      • SendMessageA.USER32(00000000,00000402,?,00000000), ref: 009C4EA3
      • Sleep.KERNELBASE(0000012C), ref: 009C4EAA
      • PostMessageA.USER32(00000111,000003EB,00000000), ref: 009C4EC2
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: Message$FileSend$AllocCreateFullItemNamePathVirtualwsprintf$PointerPostSleepTextlstrcatlstrcpy
      • String ID: C:\Users\user\AppData\Local\Temp\FTDI-Driver\$C:\Users\user\Desktop\CDM212364_Setup.exe$Could not extract the current file.$Could not get file info. This archive is likely corrupted.$Could not read SFX info. It's likely corrupt.$Extracting %s ...
      • API String ID: 195090891-4207902004
      • Opcode ID: 98b9e6c4e90ad038dd56547911aa6e8a9696b78a25d91acf5fb1f27f533fed23
      • Instruction ID: 4a76dbc5ed73c7fa11d9375f80f14b4a59022d83e889add5cd97464e56e59ac2
      • Opcode Fuzzy Hash: 98b9e6c4e90ad038dd56547911aa6e8a9696b78a25d91acf5fb1f27f533fed23
      • Instruction Fuzzy Hash: 3431A0B2E4C3047FE711ABA4AC46FABB79CEB84705F00482DF611950D2E7B19A149B67
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 539 9c6631-9c6662 call 9c6bb4 * 2 call 9c5344 546 9c6664-9c6672 call 9c4752 539->546 547 9c6695-9c66a3 call 9c476e 539->547 554 9c667f-9c6680 call 9c4d4c 546->554 555 9c6674-9c667d call 9c446f 546->555 552 9c66a8 547->552 553 9c66a5-9c66a6 547->553 556 9c66ad-9c66dc lstrcpyA DialogBoxParamA 552->556 553->556 560 9c6685-9c6691 call 9c4878 554->560 555->554 561 9c66df-9c66e4 call 9c6130 555->561 566 9c66fa-9c66ff call 9c43af 560->566 567 9c6693 560->567 565 9c66e9-9c66f4 ShellExecuteA 561->565 565->566 567->565
      APIs
        • Part of subcall function 009C5344: lstrlenA.KERNEL32(?,?,?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C53E8
        • Part of subcall function 009C5344: GetTempPathA.KERNEL32(00000000,?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C53EF
        • Part of subcall function 009C5344: GetCurrentDirectoryA.KERNEL32(00000104,C:\Users\user\Desktop,?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C53FE
        • Part of subcall function 009C5344: GetCurrentProcess.KERNEL32(?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C5404
        • Part of subcall function 009C5344: GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\CDM212364_Setup.exe,00000104,?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C5418
        • Part of subcall function 009C5344: CreateFileA.KERNELBASE(C:\Users\user\Desktop\CDM212364_Setup.exe,80000000,00000001,00000000,00000003,00000000,00000000,?,?,?,?,00000103,?,00000000,00000103), ref: 009C542D
        • Part of subcall function 009C5344: SetFilePointer.KERNELBASE(00000000,00004E20,00000000,00000000,?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C5444
        • Part of subcall function 009C5344: ReadFile.KERNELBASE(?,00000004,?,00000000,?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C5499
      • lstrcpyA.KERNEL32(Tahoma,MS Shell Dlg,?,00000000,009C676B,00000000), ref: 009C66B2
      • DialogBoxParamA.USER32(00000066,00000000,009C58D8,00000000), ref: 009C66D1
        • Part of subcall function 009C4752: GetFileAttributesA.KERNELBASE(?,009C5FE5,?), ref: 009C4756
      • ShellExecuteA.SHELL32(00000000,explore,C:\Users\user\AppData\Local\Temp\FTDI-Driver\,00000000,00000000,00000005), ref: 009C66F4
        • Part of subcall function 009C446F: GetFullPathNameA.KERNEL32(?,00000104,?,00000000,?,?,00000000,?,00000000,?), ref: 009C44C2
        • Part of subcall function 009C446F: lstrcatA.KERNEL32(?,009C78C4,?,?,00000000,?,00000000,?), ref: 009C44DC
        • Part of subcall function 009C446F: lstrlenA.KERNEL32(00000000,?,?,?,?,?,00000000,?,00000000,?), ref: 009C44FA
        • Part of subcall function 009C446F: lstrlenA.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?), ref: 009C4509
        • Part of subcall function 009C446F: lstrcpyA.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,00000000,?,00000000,?), ref: 009C4515
        • Part of subcall function 009C446F: lstrcatA.KERNEL32(?,00000000,?,?,?,?,?,00000000,?,00000000,?), ref: 009C451D
        • Part of subcall function 009C446F: lstrcatA.KERNEL32(?,009C78C4,?,?,?,?,?,00000000,?,00000000,?), ref: 009C452A
        • Part of subcall function 009C446F: GetFullPathNameA.KERNEL32(?,00000104,?,00000000,?,?,?,?,?,00000000,?,00000000,?), ref: 009C4539
        • Part of subcall function 009C446F: CreateDirectoryA.KERNELBASE(?,00000000,?,?,?,?,?,?,?,?,00000000,?,00000000,?), ref: 009C4554
        • Part of subcall function 009C446F: lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000,?,00000000,?), ref: 009C457A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: File$lstrlen$NamePathlstrcat$CreateCurrentDirectoryFulllstrcpy$AttributesDialogExecuteModuleParamPointerProcessReadShellTemp
      • String ID: C:\Users\user\AppData\Local\Temp\FTDI-Driver\$Couldn't create output directory.$MS Shell Dlg$Tahoma$Tahoma$explore
      • API String ID: 2524295343-4059282012
      • Opcode ID: ae2045db155f37e79086c0f3c132fc8d203a9214212ea0d2421d7454a78b4e4f
      • Instruction ID: c90b0840a166636fa36892bfa3597d8ea011d0cf9f92bc05304ad7dc616c2eab
      • Opcode Fuzzy Hash: ae2045db155f37e79086c0f3c132fc8d203a9214212ea0d2421d7454a78b4e4f
      • Instruction Fuzzy Hash: FD110831E5E712A6D72077A2AC1AF6F6AA8DFC2B65B10042DF00555081CB749541DB77
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • GetFullPathNameA.KERNEL32(?,00000104,?,00000000,?,?,00000000,?,00000000,?), ref: 009C44C2
      • lstrcatA.KERNEL32(?,009C78C4,?,?,00000000,?,00000000,?), ref: 009C44DC
        • Part of subcall function 009C6773: lstrlenA.KERNEL32(009C78C4,?,00000000,00000000,009C5E22,?,009C78C4,00000000), ref: 009C677D
      • lstrlenA.KERNEL32(00000000,?,?,?,?,?,00000000,?,00000000,?), ref: 009C44FA
      • lstrlenA.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?), ref: 009C4509
      • lstrcpyA.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,00000000,?,00000000,?), ref: 009C4515
      • lstrcatA.KERNEL32(?,00000000,?,?,?,?,?,00000000,?,00000000,?), ref: 009C451D
      • lstrcatA.KERNEL32(?,009C78C4,?,?,?,?,?,00000000,?,00000000,?), ref: 009C452A
      • GetFullPathNameA.KERNEL32(?,00000104,?,00000000,?,?,?,?,?,00000000,?,00000000,?), ref: 009C4539
      • CreateDirectoryA.KERNELBASE(?,00000000,?,?,?,?,?,?,?,?,00000000,?,00000000,?), ref: 009C4554
      • lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000,?,00000000,?), ref: 009C457A
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: lstrlen$lstrcat$FullNamePath$CreateDirectorylstrcpy
      • String ID:
      • API String ID: 3912926673-0
      • Opcode ID: ee9d3e19baa8ff3dc074b3cee9f7e05287924a93ce752550bdf25d0a4fdd8688
      • Instruction ID: 4e5944f0af13a02a04dddc090dcdd59a3e79e1e1c199b7f8065a69a3a64e7da7
      • Opcode Fuzzy Hash: ee9d3e19baa8ff3dc074b3cee9f7e05287924a93ce752550bdf25d0a4fdd8688
      • Instruction Fuzzy Hash: 103132B1908349ABD610DBA4DC85FEBB7ECEB89754F00082EB654D3101E634DD088BB3
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 589 9c47e6-9c4809 CreateFileA 590 9c480f-9c4821 CreateFileMappingA 589->590 591 9c480b-9c480d 589->591 593 9c4830-9c483e MapViewOfFile 590->593 594 9c4823-9c4824 CloseHandle 590->594 592 9c482d-9c482f 591->592 596 9c484e-9c4856 593->596 597 9c4840-9c484c CloseHandle * 2 593->597 595 9c482a 594->595 598 9c482c 595->598 596->595 599 9c4858-9c486b IsBadReadPtr 596->599 597->595 598->592 599->595 600 9c486d-9c4873 599->600 600->595 601 9c4875-9c4876 600->601 601->598
      APIs
      • CreateFileA.KERNELBASE(00000001,80000000,00000001,00000000,00000003,00000080,00000000,C:\Users\user\AppData\Local\Temp\FTDI-Driver\,00000000,009C4C67,?), ref: 009C47FE
      • CreateFileMappingA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000000), ref: 009C4817
      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,00000000,00000040,?,00000000,00000103), ref: 009C4824
      • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000000,?,?,?,?,?,?,?,00000000,00000040,?,00000000), ref: 009C4836
      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,00000000,00000040,?,00000000,00000103), ref: 009C4847
      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,00000000,00000040,?,00000000,00000103), ref: 009C484A
      • IsBadReadPtr.KERNEL32(?,000000F8,?,?,?,?,?,?,?,00000000,00000040,?,00000000,00000103), ref: 009C4863
      Strings
      • C:\Users\user\AppData\Local\Temp\FTDI-Driver\, xrefs: 009C47E7
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: CloseFileHandle$Create$MappingReadView
      • String ID: C:\Users\user\AppData\Local\Temp\FTDI-Driver\
      • API String ID: 3293654376-1448782821
      • Opcode ID: 5ffdc15f5caa9b5d68a475843aa9061543d53221c23f30c5a6b7450833a5815a
      • Instruction ID: 84d0b0e5e2b7e9967e4a28bb02dce7e51f79cacc87e88e0e5e8e57a07bd0f749
      • Opcode Fuzzy Hash: 5ffdc15f5caa9b5d68a475843aa9061543d53221c23f30c5a6b7450833a5815a
      • Instruction Fuzzy Hash: DF019271F18125BFF6311B709CA8F7B256CEF45BEAF114528FA01A60D1E6644C016BB2
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • GetDC.USER32(?), ref: 009C525A
      • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 009C527C
      • GetObjectA.GDI32(00000000,?,75C08FB0), ref: 009C527F
      • lstrcpyA.KERNEL32(?,?), ref: 009C52AC
      • CreateFontIndirectA.GDI32(?), ref: 009C52B7
      • SetBkMode.GDI32(00000000,00000002), ref: 009C52C6
      • SendMessageA.USER32(00000000,00000030,00000000,00000001), ref: 009C52D5
      • ReleaseDC.USER32(?,00000000), ref: 009C52DC
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: MessageSend$CreateFontIndirectModeObjectReleaselstrcpy
      • String ID:
      • API String ID: 603193727-0
      • Opcode ID: 3e16706cc2991718459bffeca474f08da2baa12d928b92ff9ffec872ab4528b9
      • Instruction ID: 58c4cd1784f849a2ce13ca58942cef5f6d4ec2a823fed9ddb04575992eb744c8
      • Opcode Fuzzy Hash: 3e16706cc2991718459bffeca474f08da2baa12d928b92ff9ffec872ab4528b9
      • Instruction Fuzzy Hash: 8E116A7590C304AFD7119BA4DC84F6BBBECEB88751F00082DFA44D2260D6B5D9089F22
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 609 9c3aed-9c3b1a SetFilePointer 610 9c3b1c-9c3b1e 609->610 611 9c3b23-9c3b43 VirtualAlloc 609->611 612 9c3bed-9c3bf2 610->612 613 9c3bec 611->613 614 9c3b49-9c3b4b 611->614 613->612 615 9c3bda-9c3be8 VirtualFree 614->615 616 9c3b51-9c3b84 SetFilePointer 614->616 615->613 616->615 617 9c3b86-9c3b9b ReadFile 616->617 617->615 618 9c3b9d-9c3ba0 617->618 619 9c3bbe-9c3bc0 618->619 620 9c3ba2-9c3ba7 619->620 621 9c3bc2 619->621 620->619 622 9c3ba9-9c3bae 620->622 623 9c3bce-9c3bd4 621->623 622->619 624 9c3bb0-9c3bb5 622->624 623->615 623->616 624->619 625 9c3bb7-9c3bbc 624->625 625->619 626 9c3bc4-9c3bcc 625->626 626->615 626->623
      APIs
      • SetFilePointer.KERNELBASE(00000000,009C32AC,00000000,00000002,00000000,00000000,00000000,?,?,009C32AC,00000000,?,?,?,C:\Users\user\AppData\Local\Temp\FTDI-Driver\), ref: 009C3B11
      • VirtualAlloc.KERNELBASE(00000000,00000404,00001000,00000004,C:\Users\user\AppData\Local\Temp\FTDI-Driver\,?,?,009C32AC,00000000,?,?,?,C:\Users\user\AppData\Local\Temp\FTDI-Driver\), ref: 009C3B39
      • SetFilePointer.KERNELBASE(00000000,009C32AC,00000000,00000000,?,?,009C32AC,00000000,?,?,?,C:\Users\user\AppData\Local\Temp\FTDI-Driver\), ref: 009C3B7B
      • ReadFile.KERNELBASE(009C32AC,00000000,009C32AC,009C32AC,00000000,?,?,009C32AC,00000000,?,?,?,C:\Users\user\AppData\Local\Temp\FTDI-Driver\), ref: 009C3B93
      • VirtualFree.KERNELBASE(00000000,00000000,00008000,?,?,009C32AC,00000000,?,?,?,C:\Users\user\AppData\Local\Temp\FTDI-Driver\), ref: 009C3BE2
      Strings
      • C:\Users\user\AppData\Local\Temp\FTDI-Driver\, xrefs: 009C3B23
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: File$PointerVirtual$AllocFreeRead
      • String ID: C:\Users\user\AppData\Local\Temp\FTDI-Driver\
      • API String ID: 3108635511-1448782821
      • Opcode ID: 929f651043d6f3e5268978cfae15b54a85f2540655752f89dbe3547f690f7ff0
      • Instruction ID: 2dd915832ca940efdd6b0de0f60ab104d2fe7b2bab26a0400414f69a46427a46
      • Opcode Fuzzy Hash: 929f651043d6f3e5268978cfae15b54a85f2540655752f89dbe3547f690f7ff0
      • Instruction Fuzzy Hash: 5C310071A083046FE7208A669C48F3BBB99EB84758F10C66DF655860E1D771DE048B52
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 627 9c6a4f-9c6a79 lstrlenA * 2 lstrcmpA 628 9c6a7f-9c6a93 call 9c6916 627->628 629 9c6b00-9c6b04 627->629 632 9c6a95-9c6aa7 lstrlenA 628->632 633 9c6ac2-9c6ac4 628->633 632->633 634 9c6aa9-9c6ac0 VirtualAlloc 632->634 635 9c6aff 633->635 634->633 636 9c6ac6-9c6ad6 lstrcpyA 634->636 635->629 637 9c6ad8 636->637 638 9c6ae3-9c6afd lstrcpyA VirtualFree 636->638 639 9c6ada-9c6ae1 637->639 638->635 639->638 639->639
      APIs
      • lstrlenA.KERNEL32(?,?,00000000,74DE8A60,?,009C5DE6,?,009C791C,009C7920,00000104,?,?,?,?,?,74DEB530), ref: 009C6A5D
      • lstrlenA.KERNEL32(?,?,009C5DE6,?,009C791C,009C7920,00000104,?,?,?,?,?,74DEB530,74DE83C0,C:\Users\user\AppData\Local\Temp\FTDI-Driver,74DF0440), ref: 009C6A68
      • lstrcmpA.KERNEL32(?,?,?,009C5DE6,?,009C791C,009C7920,00000104,?,?,?,?,?,74DEB530,74DE83C0,C:\Users\user\AppData\Local\Temp\FTDI-Driver), ref: 009C6A71
      • lstrlenA.KERNEL32(?,00000000,?,009C5DE6,?,009C791C,009C7920,00000104,?,?,?,?,?,74DEB530,74DE83C0,C:\Users\user\AppData\Local\Temp\FTDI-Driver), ref: 009C6A99
      • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,?,009C5DE6,?,009C791C,009C7920,00000104,?,?,?,?,?,74DEB530), ref: 009C6AB6
      • lstrcpyA.KERNEL32(00000000,?,?,009C5DE6,?,009C791C,009C7920,00000104,?,?,?,?,?,74DEB530,74DE83C0,C:\Users\user\AppData\Local\Temp\FTDI-Driver), ref: 009C6ACE
      • lstrcpyA.KERNEL32(00000000,00000000,?,009C5DE6,?,009C791C,009C7920,00000104,?,?,?,?,?,74DEB530,74DE83C0,C:\Users\user\AppData\Local\Temp\FTDI-Driver), ref: 009C6AE5
      • VirtualFree.KERNELBASE(00000000,00000000,00008000,?,009C5DE6,?,009C791C,009C7920,00000104,?,?,?,?,?,74DEB530,74DE83C0), ref: 009C6AF3
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: lstrlen$Virtuallstrcpy$AllocFreelstrcmp
      • String ID:
      • API String ID: 1979252130-0
      • Opcode ID: 09e614850b475128c3029e86740a077e52184c9a5eefcdca5812a4a59425d37e
      • Instruction ID: 8a19a059f59a94d5ca5d6eeb37eadde67d5b50a9c34975a9f7e0f2e292d49931
      • Opcode Fuzzy Hash: 09e614850b475128c3029e86740a077e52184c9a5eefcdca5812a4a59425d37e
      • Instruction Fuzzy Hash: 3011B272A0C345AFD610DFA9DC04F1BFBACEF94B50F10492DF681A2190DB71E8089B66
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 640 9c3821-9c382b 641 9c382d-9c3830 640->641 642 9c3835-9c3850 SetFilePointer 640->642 643 9c3ae8-9c3aec 641->643 644 9c3864-9c3866 642->644 645 9c3852-9c3862 call 9c3c2e 642->645 647 9c3878-9c3983 call 9c3cb6 * 4 call 9c3c2e * 4 call 9c3cb6 * 5 call 9c3c2e * 2 644->647 645->644 650 9c3868-9c3875 645->650 680 9c3a3e 647->680 681 9c3989-9c398f 647->681 650->647 684 9c3a42-9c3a44 680->684 682 9c39c9-9c39d1 681->682 683 9c3991-9c3997 681->683 682->680 689 9c39d3-9c39e9 682->689 685 9c3999-9c399e 683->685 686 9c39a0 683->686 687 9c3a4a-9c3a53 684->687 688 9c3ae3-9c3ae7 684->688 690 9c39a2-9c39a4 685->690 686->690 691 9c3ac4-9c3aca 687->691 692 9c3a55-9c3a60 687->692 688->643 693 9c3a09-9c3a0b 689->693 694 9c39eb-9c3a01 SetFilePointer 689->694 699 9c39a6-9c39a8 690->699 700 9c39c3-9c39c7 690->700 695 9c3acc-9c3ad3 691->695 696 9c3ad5-9c3adb 691->696 701 9c3a6b-9c3a72 692->701 702 9c3a62-9c3a69 692->702 697 9c3a0d-9c3a15 693->697 698 9c3a36-9c3a3c 693->698 703 9c3a07 694->703 704 9c3a03-9c3a05 694->704 695->696 696->688 706 9c3add-9c3ae1 696->706 697->698 705 9c3a17-9c3a33 ReadFile 697->705 698->684 699->700 707 9c39aa-9c39c0 ReadFile 699->707 700->680 700->682 708 9c3a76-9c3a78 701->708 702->708 703->693 704->693 705->698 706->688 707->700 709 9c3a7a-9c3a93 SetFilePointer 708->709 710 9c3a96-9c3a98 708->710 709->710 711 9c3a9a-9c3aa2 710->711 712 9c3ac0-9c3ac2 710->712 711->712 713 9c3aa4-9c3abd ReadFile 711->713 712->688 712->691 713->712
      APIs
      • SetFilePointer.KERNELBASE(?,?,00000000,00000000,?,00000000,00000000,00000000), ref: 009C3845
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: FilePointer
      • String ID:
      • API String ID: 973152223-0
      • Opcode ID: aadb4083c6b64a645ff14e18a8fdcd014086d7699b4209958e5d8ab4c3cb6a74
      • Instruction ID: 15a22dc8b9113a4b6f672955ae5ef240a02a70855dd693963d3007dba051e904
      • Opcode Fuzzy Hash: aadb4083c6b64a645ff14e18a8fdcd014086d7699b4209958e5d8ab4c3cb6a74
      • Instruction Fuzzy Hash: 44918176A08305AFE7219E61CC80F6BB7E9AF84350F50C52DF9A5D21A0EB71DD248B52
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • CreateFileA.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000,C:\Users\user\AppData\Local\Temp\FTDI-Driver\,00000000,?,C:\Users\user\AppData\Local\Temp\FTDI-Driver\), ref: 009C3290
        • Part of subcall function 009C3AED: SetFilePointer.KERNELBASE(00000000,009C32AC,00000000,00000002,00000000,00000000,00000000,?,?,009C32AC,00000000,?,?,?,C:\Users\user\AppData\Local\Temp\FTDI-Driver\), ref: 009C3B11
      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000,?,?,C:\Users\user\AppData\Local\Temp\FTDI-Driver\), ref: 009C32B5
      • CloseHandle.KERNEL32(00000000), ref: 009C3381
      • VirtualAlloc.KERNELBASE(00000000,00000080,00001000,00000004), ref: 009C33B3
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: File$Pointer$AllocCloseCreateHandleVirtual
      • String ID: C:\Users\user\AppData\Local\Temp\FTDI-Driver\
      • API String ID: 4021238690-1448782821
      • Opcode ID: 2234325f7fc5d58a41f202f2fb2dca027ddf9a2a32360eccd3ce181954f9f7ad
      • Instruction ID: 03eeb9624b616a7134d45da514541a435b66f4bfcd7a40040bdc6a7f15df1378
      • Opcode Fuzzy Hash: 2234325f7fc5d58a41f202f2fb2dca027ddf9a2a32360eccd3ce181954f9f7ad
      • Instruction Fuzzy Hash: FD41B672A08344AFD3219E61DC40FAB76ECEBC9794F00C62DFD85E6181EA25DE494793
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 009C69D5: RegOpenKeyExA.KERNELBASE(80000001,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,00020019,00000103,?,00000000,00000103), ref: 009C69F0
        • Part of subcall function 009C69D5: RegQueryValueExA.KERNELBASE(?,00000104,00000000,?,?,?), ref: 009C6A1B
        • Part of subcall function 009C69D5: RegCloseKey.KERNELBASE(?), ref: 009C6A24
      • lstrcatA.KERNEL32(00000000,009C78C4,?,?,?,?,00000000), ref: 009C47B8
      • lstrcatA.KERNEL32(00000000,00000000,?,?,?,?,00000000), ref: 009C47C4
      • lstrcatA.KERNEL32(00000000,.ttf,?,?,?,?,00000000), ref: 009C47D2
        • Part of subcall function 009C516B: GetFileAttributesA.KERNELBASE(?,?,?,?,Tahoma,74DE8A60,?,009C47E0,00000000,?,?,?,?,00000000), ref: 009C519C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: lstrcat$AttributesCloseFileOpenQueryValue
      • String ID: .ttf$Fonts
      • API String ID: 2582290769-938498235
      • Opcode ID: 18623c6b6805f32e0491770d717d86f22091352ea80501ece5c0e34027424a4d
      • Instruction ID: 09629a03cc2aa3af661ce52e229c57baa32b3e33e84f6199656a9b216884907f
      • Opcode Fuzzy Hash: 18623c6b6805f32e0491770d717d86f22091352ea80501ece5c0e34027424a4d
      • Instruction Fuzzy Hash: E6F036B1C0422C67DF20E6A49D86FDABB6CDB54718F0000D6BA4CA3041D5B4A7D48F91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • RegOpenKeyExA.KERNELBASE(80000001,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00000000,00020019,00000103,?,00000000,00000103), ref: 009C69F0
      • RegQueryValueExA.KERNELBASE(?,00000104,00000000,?,?,?), ref: 009C6A1B
      • RegCloseKey.KERNELBASE(?), ref: 009C6A24
      Strings
      • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 009C69E6
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: CloseOpenQueryValue
      • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
      • API String ID: 3677997916-2036018995
      • Opcode ID: 217b9d6361f36d86f9ff67b516b6299650bcba19b4794bf17adcb78845b5c9e2
      • Instruction ID: 09b533269466365173970034ac754777742df204a70edaa2ff324d3e010b28b4
      • Opcode Fuzzy Hash: 217b9d6361f36d86f9ff67b516b6299650bcba19b4794bf17adcb78845b5c9e2
      • Instruction Fuzzy Hash: 5FF0D47494420CBFEB11DF90DD49F9CBB78EB04718F504094BE04A1190D7B15A54AF81
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID:
      • String ID: 1.1.3
      • API String ID: 0-2347784635
      • Opcode ID: 8cb414bf44e197a9a9002ee910cec8fd4ef921a8df888ab50287ad5b800b3927
      • Instruction ID: 0912537dc52a36ed8fd3a5c789b44208b9384e73252d4db983cc96a0f4a9c46a
      • Opcode Fuzzy Hash: 8cb414bf44e197a9a9002ee910cec8fd4ef921a8df888ab50287ad5b800b3927
      • Instruction Fuzzy Hash: 6B414AB1909B16AFD325CF2AD841F52B7E8FB48750B10C91EE996D2A90DB30F540CF55
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • DestroyWindow.USER32(0002047C,009C61A0), ref: 009C43B9
      • DestroyWindow.USER32(00020460,009C61A0), ref: 009C43C9
      • FindCloseChangeNotification.KERNELBASE(00000190,009C61A0), ref: 009C43D9
      • ExitProcess.KERNEL32 ref: 009C43E1
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: DestroyWindow$ChangeCloseExitFindNotificationProcess
      • String ID:
      • API String ID: 1096592630-0
      • Opcode ID: 4ae0c1677e9d84da88c9be8254d7b4fab15d87c5267318ce910a19a931f6e3b4
      • Instruction ID: 5ae20a55755c9af46eace810b628a9e2564de579ece21256d6507995fc7e6d6d
      • Opcode Fuzzy Hash: 4ae0c1677e9d84da88c9be8254d7b4fab15d87c5267318ce910a19a931f6e3b4
      • Instruction Fuzzy Hash: B7E04270F6C3419BDB10AFBAAE5CF1676ECBB447417084418B906D22A4DA64D900EF21
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 009C6A4F: lstrlenA.KERNEL32(?,?,00000000,74DE8A60,?,009C5DE6,?,009C791C,009C7920,00000104,?,?,?,?,?,74DEB530), ref: 009C6A5D
        • Part of subcall function 009C6A4F: lstrlenA.KERNEL32(?,?,009C5DE6,?,009C791C,009C7920,00000104,?,?,?,?,?,74DEB530,74DE83C0,C:\Users\user\AppData\Local\Temp\FTDI-Driver,74DF0440), ref: 009C6A68
        • Part of subcall function 009C6A4F: lstrcmpA.KERNEL32(?,?,?,009C5DE6,?,009C791C,009C7920,00000104,?,?,?,?,?,74DEB530,74DE83C0,C:\Users\user\AppData\Local\Temp\FTDI-Driver), ref: 009C6A71
        • Part of subcall function 009C6A4F: lstrlenA.KERNEL32(?,00000000,?,009C5DE6,?,009C791C,009C7920,00000104,?,?,?,?,?,74DEB530,74DE83C0,C:\Users\user\AppData\Local\Temp\FTDI-Driver), ref: 009C6A99
        • Part of subcall function 009C6A4F: VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,?,009C5DE6,?,009C791C,009C7920,00000104,?,?,?,?,?,74DEB530), ref: 009C6AB6
        • Part of subcall function 009C6A4F: lstrcpyA.KERNEL32(00000000,?,?,009C5DE6,?,009C791C,009C7920,00000104,?,?,?,?,?,74DEB530,74DE83C0,C:\Users\user\AppData\Local\Temp\FTDI-Driver), ref: 009C6ACE
        • Part of subcall function 009C6A4F: lstrcpyA.KERNEL32(00000000,00000000,?,009C5DE6,?,009C791C,009C7920,00000104,?,?,?,?,?,74DEB530,74DE83C0,C:\Users\user\AppData\Local\Temp\FTDI-Driver), ref: 009C6AE5
        • Part of subcall function 009C6A4F: VirtualFree.KERNELBASE(00000000,00000000,00008000,?,009C5DE6,?,009C791C,009C7920,00000104,?,?,?,?,?,74DEB530,74DE83C0), ref: 009C6AF3
      • GetFileAttributesA.KERNELBASE(?,?,?,?,Tahoma,74DE8A60,?,009C47E0,00000000,?,?,?,?,00000000), ref: 009C519C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: lstrlen$Virtuallstrcpy$AllocAttributesFileFreelstrcmp
      • String ID: Tahoma
      • API String ID: 446193826-3580928618
      • Opcode ID: 251004778c635f561c0ac7ed40407f3881fa7d44436414ca18d395825d915cce
      • Instruction ID: 441961ceda8fd816e6b2c67f62787dce29302027c518d40373f6c540e23c23ee
      • Opcode Fuzzy Hash: 251004778c635f561c0ac7ed40407f3881fa7d44436414ca18d395825d915cce
      • Instruction Fuzzy Hash: CCE086B29082103FD7115A699C99E5FBEEDDFCA770B10953DF124A51E0C6628C50D673
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • SetFilePointer.KERNELBASE(?,?,00000000,00000000,?,00000000,00000000,?,?,?,009C508C,?,00000000,0000FFFF), ref: 009C3574
      • ReadFile.KERNELBASE(?,?,00004000,?,00000000,?,?,009C508C,?,00000000,0000FFFF), ref: 009C3590
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: File$PointerRead
      • String ID:
      • API String ID: 3154509469-0
      • Opcode ID: 8fffc68718d75a293aa8068e246cfaddd69ab733e1505b78fb45cfd04521fafc
      • Instruction ID: 904928eab97cd6e2e3c9e4b9fa7e7647fd5c6b9a92f62151a74314df141b5c3b
      • Opcode Fuzzy Hash: 8fffc68718d75a293aa8068e246cfaddd69ab733e1505b78fb45cfd04521fafc
      • Instruction Fuzzy Hash: D9513371A04359AFCF11CF29C985AAA7BA9FF84760F24C52EF85986240D770DE50CB92
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • FindCloseChangeNotification.KERNELBASE(?,00000000,009C4E95,00000000,00000000), ref: 009C3103
      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 009C3111
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: ChangeCloseFindFreeNotificationVirtual
      • String ID:
      • API String ID: 560371109-0
      • Opcode ID: 750c50348f906839b42ba5db32ab8511077e46245e84f3b0d9bab36ef7cd9130
      • Instruction ID: 47eea3377517d831f24358e8f8c4ba55bef26f8f1052ef2bf53ed4bf7bf1901e
      • Opcode Fuzzy Hash: 750c50348f906839b42ba5db32ab8511077e46245e84f3b0d9bab36ef7cd9130
      • Instruction Fuzzy Hash: 3EE0C23291C620AEEA329B54BC09F9A7794AF08770F25C40DF191A50E0CB605A818F85
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • CreateDialogParamA.USER32(?,009C3F22,00000000,74DF3550,009C61D5), ref: 009C58BB
      • SetWindowPos.USER32(00000000,00000000,0000002C,00000046,00000000,00000000,00000001,?,00004E21), ref: 009C58D0
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: CreateDialogParamWindow
      • String ID:
      • API String ID: 1135826248-0
      • Opcode ID: 1ffb9e4c85ceb34bce06c9f40cd3ef2df65fa5d7133a159a8359f4f29628e2ac
      • Instruction ID: 91e3b60ce182d3f1d483eec0a4178e2ea613dda6ad2605ad77f7c0c886ca75f8
      • Opcode Fuzzy Hash: 1ffb9e4c85ceb34bce06c9f40cd3ef2df65fa5d7133a159a8359f4f29628e2ac
      • Instruction Fuzzy Hash: 2BE01271D6D220BFEA605F95BC0DFA77EADEB4A750F444405B209D50A0C2654800FBA1
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 0cefd2eeb41b204236065d8ecc9bbb055378bb85eb1bea734c16eb12342bde10
      • Instruction ID: 74bf6a505b888eaacda6971813c4a750e687d44cb5bf6497c50cdad0897f2e25
      • Opcode Fuzzy Hash: 0cefd2eeb41b204236065d8ecc9bbb055378bb85eb1bea734c16eb12342bde10
      • Instruction Fuzzy Hash: 09018432608B10AFD7318E55DC45F52B3E4BB45B66F24CA1DE1669A0E0C774E448CB55
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • VirtualAlloc.KERNELBASE(00000000,00000104,00001000,00000004,?,009C574D,009CD900,?,?,?,?,?,?,?,?,00000103), ref: 009C6C03
      • lstrcpyA.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000103,?,00000000,00000103,?,00000000), ref: 009C6C16
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: AllocVirtuallstrcpy
      • String ID:
      • API String ID: 4117716100-0
      • Opcode ID: 1108a5fdfda8f0019bae9627dc5c86b19d8097bd00d514cb275d92233cf66be4
      • Instruction ID: c79b7999a312aaac6445062615b7891083230feefd11698b26e1fc069154d598
      • Opcode Fuzzy Hash: 1108a5fdfda8f0019bae9627dc5c86b19d8097bd00d514cb275d92233cf66be4
      • Instruction Fuzzy Hash: 02E0927599A3109FD7228F10EC04FE6BBA4EF19762F01846DFAC69B290C77088819F51
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • SetFilePointer.KERNELBASE(?,?,00000000,00000000,?,?,00000000,?,009C341A,?,?,00000000,?,00000000,00000000), ref: 009C3690
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: FilePointer
      • String ID:
      • API String ID: 973152223-0
      • Opcode ID: c2ecb1b47e668711009feb87f7f0a29cb41dc9c69c7256d41b7b7730f4566945
      • Instruction ID: 0f2e4202ac805c77a8d25181af56b42637b7e1b55dd0adac604253f6f3a42969
      • Opcode Fuzzy Hash: c2ecb1b47e668711009feb87f7f0a29cb41dc9c69c7256d41b7b7730f4566945
      • Instruction Fuzzy Hash: 785195B29083129F9721CE25DD50F6AB7D8EF84360F10CA2DFC51D7191DB21EE548B92
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • ReadFile.KERNELBASE(00000000,?,00000001,00000000,00000000,?,?,?,009C3C3F,00000000,?,00000000,?,00000000,009C32D0,00000000), ref: 009C3C07
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: FileRead
      • String ID:
      • API String ID: 2738559852-0
      • Opcode ID: ed02633bfe25bf37228c3a0a89bb50f2d728d6beee3a7194a1c62aa5e7222bcc
      • Instruction ID: c0f0c913ad147ea28f7bf0a2b1a6388a5488ef6482b925189338a7a24a4be64f
      • Opcode Fuzzy Hash: ed02633bfe25bf37228c3a0a89bb50f2d728d6beee3a7194a1c62aa5e7222bcc
      • Instruction Fuzzy Hash: A4E0927061810DBFEB08CB91CC15FBE7BACEB04340F0085A8FC46D6180E7729E448B61
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetFileAttributesA.KERNELBASE(?,009C5FE5,?), ref: 009C4756
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: AttributesFile
      • String ID:
      • API String ID: 3188754299-0
      • Opcode ID: 0b89fd83990b0859caf35c45bfdadfa1a61d66078d153193e69084d5636f6e48
      • Instruction ID: 9894ea57ba36b1ab3498bbcc744df9e7d7649ba02e64435e2e70360836f9b0a8
      • Opcode Fuzzy Hash: 0b89fd83990b0859caf35c45bfdadfa1a61d66078d153193e69084d5636f6e48
      • Instruction Fuzzy Hash: 52C09271928500669A005734AE199697593FBD2A36BD48BE8F275C08F0C729CA15FA12
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,75BF6C10,009C65C9,www.ftdichip.com,00000007,mailto:), ref: 009C6868
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: AllocVirtual
      • String ID:
      • API String ID: 4275171209-0
      • Opcode ID: e45fd8ba87ab367b44723afa623e2dda96a68d751d6bb3341f298ac107895d30
      • Instruction ID: bb782bc60a6df5e3626c2f2cb9cb17dd7afbb31a381a57f8dd017b62886fe8de
      • Opcode Fuzzy Hash: e45fd8ba87ab367b44723afa623e2dda96a68d751d6bb3341f298ac107895d30
      • Instruction Fuzzy Hash: 77E02B32A492515EE315867C9C10F66F7DE6FDAB50F19405DF1C08B194C5B05C4183A1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 009C3D15
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: AllocVirtual
      • String ID:
      • API String ID: 4275171209-0
      • Opcode ID: 34b0e98da92b837252510b91d98e1de23fe64942fb63a9213db4e675750c9389
      • Instruction ID: facbdb41caa5adce9967c64e0926ebf502b05f7728eb0de31767d459414efa56
      • Opcode Fuzzy Hash: 34b0e98da92b837252510b91d98e1de23fe64942fb63a9213db4e675750c9389
      • Instruction Fuzzy Hash: 01C09B7164C341BFF910C740DD46F16B794D794752F008404F3449D0D0C1B094408B15
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 009C3D27
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: FreeVirtual
      • String ID:
      • API String ID: 1263568516-0
      • Opcode ID: 227ed292042aeb00ab62df2dbde57c8654d9baedd5d70dacfcdc61c486cb6146
      • Instruction ID: 0badd9c8d3b958152850b7b18d74e02a43f00bfb1e2e50581c369a2052ede6f3
      • Opcode Fuzzy Hash: 227ed292042aeb00ab62df2dbde57c8654d9baedd5d70dacfcdc61c486cb6146
      • Instruction Fuzzy Hash: 79A00230AAC741ABFE61DF51DD0AF09FB61BB90B02F204854B295A80F08BA1645CEF09
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetLastError.KERNEL32(00000000), ref: 009C6141
      • GetLastError.KERNEL32(00000400,009C7872,00000000,00000000), ref: 009C6158
      • FormatMessageA.KERNEL32(00001100,00000000,00000000), ref: 009C6165
      • wsprintfA.USER32 ref: 009C617D
      • MessageBoxA.USER32(00000000,?,FreeExtractor Error,00000010), ref: 009C6195
      Strings
      • FreeExtractor Error, xrefs: 009C618E
      • An error prevents this program from continuing: %s %s, xrefs: 009C6177
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: ErrorLastMessage$Formatwsprintf
      • String ID: An error prevents this program from continuing: %s %s$FreeExtractor Error
      • API String ID: 1581998817-4084750130
      • Opcode ID: a08e8fff25515dc8e794be98c5f156edcfbf26ec05940764f99a6e6322be7c06
      • Instruction ID: 2f98f93c8fef08e4709471b59f735736f057868cf7173bd83d9d96b0e51e560d
      • Opcode Fuzzy Hash: a08e8fff25515dc8e794be98c5f156edcfbf26ec05940764f99a6e6322be7c06
      • Instruction Fuzzy Hash: FAF01DB5D4C108BBDB10ABE59D4DFAEBA7CAB88B05F000098B715A1091D6708611EF26
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • CoInitialize.OLE32(00000000), ref: 009C6B12
      • CoCreateInstance.OLE32(009C7E9C,00000000,00000001,009C7E7C,?), ref: 009C6B29
      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 009C6B5B
      • CoUninitialize.OLE32 ref: 009C6BA1
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: ByteCharCreateInitializeInstanceMultiUninitializeWide
      • String ID:
      • API String ID: 2968213145-0
      • Opcode ID: 96029eb0b060ac6b8ef550eba53fb69eeddeeceaa229a7b1aad6854c74b5f0a4
      • Instruction ID: f51f13ce9e93e7c3ff26d7b21dbe98f50ea7afcc7ae3722574df6d697e64bac1
      • Opcode Fuzzy Hash: 96029eb0b060ac6b8ef550eba53fb69eeddeeceaa229a7b1aad6854c74b5f0a4
      • Instruction Fuzzy Hash: 7B210875A04118BFDB00DF94CC88EAABBB9EF49715F100198B509DB1A0CB71AE45DF61
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b04263c2ff9d96fd38a895ad8ef9b974066c304e932d3302d1531fd5a9585c8b
      • Instruction ID: f64b71123d29b66c873ae65de54d1698c9f152bf5c45a871ea790a6c808673ad
      • Opcode Fuzzy Hash: b04263c2ff9d96fd38a895ad8ef9b974066c304e932d3302d1531fd5a9585c8b
      • Instruction Fuzzy Hash: FEE13370A083598FC724DF28C080A6ABBE5FBD9714F604A2EE599C7351E770E945CF92
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 75b2ec2cef3ecba2fd2295ceed20fea03133440fd447a3d8aa8a6f6ea2d88776
      • Instruction ID: c91d0206dd84a958bb109413840c4e337fb3a406be616ce78f49b69d08c5fee6
      • Opcode Fuzzy Hash: 75b2ec2cef3ecba2fd2295ceed20fea03133440fd447a3d8aa8a6f6ea2d88776
      • Instruction Fuzzy Hash: FD216873E2C0920B871DCF65DCA2932F751FB5620270E467DDA97D6481C52DE621DBA0
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • PostMessageA.USER32(?,000000A1,00000002,?), ref: 009C3D73
      • GetDlgItem.USER32(?,000003F2), ref: 009C3D8C
      • ShellExecuteA.SHELL32(?,open,http://www.disoriented.com/,00000000,00000000,00000001), ref: 009C3E34
      • wsprintfA.USER32 ref: 009C3E76
      • SetDlgItemTextA.USER32(?,00002732,?), ref: 009C3E8E
      • BeginPaint.USER32(?,?), ref: 009C3E9D
      • SetROP2.GDI32(00000000,00000010), ref: 009C3EA8
      • Rectangle.GDI32(00000000,00000000,00000000,000001F4,000001F4), ref: 009C3EBA
      • CreateCompatibleDC.GDI32(00000000), ref: 009C3EC1
      • LoadBitmapA.USER32(0000007E), ref: 009C3ED1
      • SelectObject.GDI32(00000000,00000000), ref: 009C3ED9
      • StretchBlt.GDI32(?,00000008,00000012,0000002B,0000002A,00000000,00000000,00000000,0000002B,0000002A,00CC0020), ref: 009C3EF6
      • ReleaseDC.USER32(?,00000000), ref: 009C3F00
      • EndPaint.USER32(?,?), ref: 009C3F0D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: ItemPaint$BeginBitmapCompatibleCreateExecuteLoadMessageObjectPostRectangleReleaseSelectShellStretchTextwsprintf
      • String ID: FreeExtractor %s$MS Shell Dlg$Tahoma$http://www.disoriented.com/$open$v1.44
      • API String ID: 1220389699-1489544392
      • Opcode ID: 1d0980ce7d7535fb0dd1628e0e2c3288e43210dca71b1e56459eaeb66548afcc
      • Instruction ID: 751c5db2fd420b52ea1b6ca0118c49839cf3a0aa1efe916119556f56cc308a57
      • Opcode Fuzzy Hash: 1d0980ce7d7535fb0dd1628e0e2c3288e43210dca71b1e56459eaeb66548afcc
      • Instruction Fuzzy Hash: CA419871E9C209BFEB215FA1DC49FBA7A6CEB04785F04C428FA06A50E1C7B14E51AF51
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetDlgItem.USER32(000003EF), ref: 009C459F
      • ShowWindow.USER32(00000005), ref: 009C45C3
      • SetDlgItemTextA.USER32(000003F7,File Cleanup), ref: 009C45DF
      • SetDlgItemTextA.USER32(000003F9,Removing temp files), ref: 009C45F1
      • SetDlgItemTextA.USER32(000003FA,Cleaning up ...), ref: 009C4603
      • SendMessageA.USER32(00000000,00000401,00000000,?), ref: 009C461B
      • SetDlgItemTextA.USER32(000003F8,The extracted files are being removed.), ref: 009C4631
      • Sleep.KERNEL32(000001F4), ref: 009C463E
      • wsprintfA.USER32 ref: 009C4673
      • wsprintfA.USER32 ref: 009C468D
      • SetDlgItemTextA.USER32(000003FA,?), ref: 009C46A5
      • RemoveDirectoryA.KERNEL32(00000000), ref: 009C46D4
      • DeleteFileA.KERNEL32(00000000), ref: 009C46EE
      • SendMessageA.USER32(?,00000402,?,00000000), ref: 009C4719
      • RemoveDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\FTDI-Driver\), ref: 009C473D
      • Sleep.KERNEL32(000001F4), ref: 009C4748
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: Item$Text$DirectoryMessageRemoveSendSleepwsprintf$DeleteFileShowWindow
      • String ID: %s%s$C:\Users\user\AppData\Local\Temp\FTDI-Driver\$Cleaning up ...$Deleting %s ...$File Cleanup$Removing temp files$The extracted files are being removed.
      • API String ID: 2665098269-4245776221
      • Opcode ID: 359d3701607ea537f39954f0aa1c58692fc11f3208d4edb24c605698cad25944
      • Instruction ID: 8311e6f24117cb0898527ce80cd2d751e2dd196217bc3a0666d9426b602415b4
      • Opcode Fuzzy Hash: 359d3701607ea537f39954f0aa1c58692fc11f3208d4edb24c605698cad25944
      • Instruction Fuzzy Hash: 38419671E5D3057FD700ABB4ED4AF6A7B9CEB85B00F00082DF645A50E2DA719A449B23
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 009C446F: GetFullPathNameA.KERNEL32(?,00000104,?,00000000,?,?,00000000,?,00000000,?), ref: 009C44C2
        • Part of subcall function 009C446F: lstrcatA.KERNEL32(?,009C78C4,?,?,00000000,?,00000000,?), ref: 009C44DC
        • Part of subcall function 009C446F: lstrlenA.KERNEL32(00000000,?,?,?,?,?,00000000,?,00000000,?), ref: 009C44FA
        • Part of subcall function 009C446F: lstrlenA.KERNEL32(?,?,?,?,?,?,00000000,?,00000000,?), ref: 009C4509
        • Part of subcall function 009C446F: lstrcpyA.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,00000000,?,00000000,?), ref: 009C4515
        • Part of subcall function 009C446F: lstrcatA.KERNEL32(?,00000000,?,?,?,?,?,00000000,?,00000000,?), ref: 009C451D
        • Part of subcall function 009C446F: lstrcatA.KERNEL32(?,009C78C4,?,?,?,?,?,00000000,?,00000000,?), ref: 009C452A
        • Part of subcall function 009C446F: GetFullPathNameA.KERNEL32(?,00000104,?,00000000,?,?,?,?,?,00000000,?,00000000,?), ref: 009C4539
        • Part of subcall function 009C446F: CreateDirectoryA.KERNELBASE(?,00000000,?,?,?,?,?,?,?,?,00000000,?,00000000,?), ref: 009C4554
        • Part of subcall function 009C446F: lstrlenA.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000,?,00000000,?), ref: 009C457A
      • GetLastError.KERNEL32 ref: 009C4407
      • GetLastError.KERNEL32(00000400,009C7872,00000000,00000000), ref: 009C441E
      • FormatMessageA.KERNEL32(00001100,00000000,00000000), ref: 009C442C
      • wsprintfA.USER32 ref: 009C4441
      • MessageBoxA.USER32(?,Couldn't create directory,00000010), ref: 009C445E
      Strings
      • Could not create the target directory. %sBe sure that it does not contain an invalid character: / \ : * ? " < > | , xrefs: 009C443B
      • C:\Users\user\AppData\Local\Temp\FTDI-Driver\, xrefs: 009C43F1
      • Couldn't create directory, xrefs: 009C4452
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: lstrcatlstrlen$ErrorFullLastMessageNamePath$CreateDirectoryFormatlstrcpywsprintf
      • String ID: C:\Users\user\AppData\Local\Temp\FTDI-Driver\$Could not create the target directory. %sBe sure that it does not contain an invalid character: / \ : * ? " < > | $Couldn't create directory
      • API String ID: 3332223613-3842080595
      • Opcode ID: f8f94aa62f04e8af6d7136aa9f3f833315a2d734f9020df854628d0afc1b3264
      • Instruction ID: c39293418cafe2ceefcb6b784bd51e3a62cc60f83fe42c28788f2b6b7e0a7b35
      • Opcode Fuzzy Hash: f8f94aa62f04e8af6d7136aa9f3f833315a2d734f9020df854628d0afc1b3264
      • Instruction Fuzzy Hash: F1016D71F5C208BBDB10DBF09D06FA9B7BC9B44B05F500058BB05E50D1D67059159F57
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • SendMessageA.USER32(?,00000031,00000000,00000000), ref: 009C51C5
      • GetObjectA.GDI32(00000000), ref: 009C51CC
      • lstrcpyA.KERNEL32(00000000,?,?,?,00000000,009C5CFC,?,?,000001F4,00000000,Tahoma,00000000,00000002,00000000), ref: 009C51EB
      • CreateFontIndirectA.GDI32(?), ref: 009C51F5
      • SelectObject.GDI32(?,00000000), ref: 009C5204
      • SetBkMode.GDI32(?,000001F4), ref: 009C5210
      • SetTextColor.GDI32(?,00000000), ref: 009C521C
      • DeleteObject.GDI32 ref: 009C5228
      • GetStockObject.GDI32(?), ref: 009C5231
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: Object$ColorCreateDeleteFontIndirectMessageModeSelectSendStockTextlstrcpy
      • String ID:
      • API String ID: 3306163807-0
      • Opcode ID: 044ec9351cd64a96a972046291dacb901af66a9b339ccf90b2e6228220e92ebf
      • Instruction ID: 4a8f8338be2810a486522785c939c0adebed6cfd6082bf53d82acad9b3e67493
      • Opcode Fuzzy Hash: 044ec9351cd64a96a972046291dacb901af66a9b339ccf90b2e6228220e92ebf
      • Instruction Fuzzy Hash: 5E119072C18208EFCF01AFE4EC09E9DBBB9FB08211F008115FA15A6260D6319920AF60
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetCommandLineA.KERNEL32 ref: 009C6707
      • GetStartupInfoA.KERNEL32(?), ref: 009C6745
      • GetModuleHandleA.KERNEL32(00000000,00000000,00000000,0000000A), ref: 009C675F
      • ExitProcess.KERNEL32 ref: 009C676C
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: CommandExitHandleInfoLineModuleProcessStartup
      • String ID:
      • API String ID: 2164999147-0
      • Opcode ID: 621bc9420892257b85a3443267e5a8b32e152f6d4c8c5ab8acaed6cb145528bc
      • Instruction ID: 6af4cac44dc4e4054663fa9622cec1037b1c041257ab934768aca0c1c0b546b8
      • Opcode Fuzzy Hash: 621bc9420892257b85a3443267e5a8b32e152f6d4c8c5ab8acaed6cb145528bc
      • Instruction Fuzzy Hash: 0901A771C583485AEF304BA88849FB97BECAB1E318F24081DE8C1D1182D2584D839767
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 009C68DE: lstrlenA.KERNEL32(009C501A,00000000,?,009C501A,?), ref: 009C68F0
      • lstrcpyA.KERNEL32(00000000,00000000,009CD900,74DE83C0,00000000,009C4980,?,?,?,?), ref: 009C5302
      • lstrcpyA.KERNEL32(00000000,00000000), ref: 009C531E
      • lstrlenA.KERNEL32(00000000), ref: 009C5321
        • Part of subcall function 009C6856: VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,75BF6C10,009C65C9,www.ftdichip.com,00000007,mailto:), ref: 009C6868
      • lstrcpyA.KERNEL32(00000000,00000000), ref: 009C5334
      Memory Dump Source
      • Source File: 00000000.00000002.1871378385.00000000009C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 009C0000, based on PE: true
      • Associated: 00000000.00000002.1871346781.00000000009C0000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871410051.00000000009C7000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871442928.00000000009C9000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CA000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871475800.00000000009CD000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.1871539768.00000000009CF000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_9c0000_CDM212364_Setup.jbxd
      Similarity
      • API ID: lstrcpy$lstrlen$AllocVirtual
      • String ID:
      • API String ID: 1716591843-0
      • Opcode ID: 39670086fbc585195a384360b9601a423bc6de2af7fc816c48b3d087a84af4f9
      • Instruction ID: 69011f5e8ba4602d7030d1bddcb985c4a1ed818c5a2257b71b42d9a4d8652deb
      • Opcode Fuzzy Hash: 39670086fbc585195a384360b9601a423bc6de2af7fc816c48b3d087a84af4f9
      • Instruction Fuzzy Hash: 3FF039E29083557FF120BB75AC8EF2BAF6CDAC0364B10086DF50582193DA25AC118A72
      Uniqueness

      Uniqueness Score: -1.00%

      Execution Graph

      Execution Coverage:3.8%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:5.9%
      Total number of Nodes:2000
      Total number of Limit Nodes:69
      execution_graph 10045 404aa6 10052 40546d 10045->10052 10048 404ab9 10050 401ea4 __freebuf 67 API calls 10048->10050 10051 404ac4 10050->10051 10053 405340 _flsall 105 API calls 10052->10053 10054 404aab 10053->10054 10054->10048 10055 409c53 10054->10055 10056 409c5f __wfsopen 10055->10056 10057 40358b __lock 67 API calls 10056->10057 10060 409c6b 10057->10060 10058 409cd4 10065 409ce9 10058->10065 10060->10058 10062 402c28 __fcloseall 106 API calls 10060->10062 10063 409ca9 DeleteCriticalSection 10060->10063 10061 409ce0 __wfsopen 10061->10048 10062->10060 10064 401ea4 __freebuf 67 API calls 10063->10064 10064->10060 10068 4034b1 LeaveCriticalSection 10065->10068 10067 409cf0 10067->10061 10068->10067 7565 4030f6 7566 403107 7565->7566 7600 4033df HeapCreate 7566->7600 7569 403146 7602 408e6a GetModuleHandleW 7569->7602 7573 403157 __RTC_Initialize 7636 407a13 7573->7636 7574 40309e _fast_error_exit 67 API calls 7574->7573 7576 403165 7577 403171 GetCommandLineW 7576->7577 7699 4043f9 7576->7699 7651 4089b1 GetEnvironmentStringsW 7577->7651 7581 403180 7658 408903 GetModuleFileNameW 7581->7658 7584 403195 7664 4086d4 7584->7664 7585 4043f9 __amsg_exit 67 API calls 7585->7584 7588 4031a6 7677 4044b8 7588->7677 7589 4043f9 __amsg_exit 67 API calls 7589->7588 7591 4031ad 7592 4043f9 __amsg_exit 67 API calls 7591->7592 7593 4031b8 __wwincmdln 7591->7593 7592->7593 7683 401430 GetCommandLineW CommandLineToArgvW 7593->7683 7596 4031e7 7706 404695 7596->7706 7599 4031ec __wfsopen 7601 40313a 7600->7601 7601->7569 7691 40309e 7601->7691 7603 408e85 7602->7603 7604 408e7e 7602->7604 7606 408fed 7603->7606 7607 408e8f GetProcAddress GetProcAddress GetProcAddress GetProcAddress 7603->7607 7709 4043c9 7604->7709 7768 408b84 7606->7768 7609 408ed8 TlsAlloc 7607->7609 7612 40314c 7609->7612 7613 408f26 TlsSetValue 7609->7613 7612->7573 7612->7574 7613->7612 7614 408f37 7613->7614 7713 4046b3 7614->7713 7619 408a5a __encode_pointer 6 API calls 7620 408f57 7619->7620 7621 408a5a __encode_pointer 6 API calls 7620->7621 7622 408f67 7621->7622 7623 408a5a __encode_pointer 6 API calls 7622->7623 7624 408f77 7623->7624 7730 40340f 7624->7730 7631 408ad5 __decode_pointer 6 API calls 7632 408fcb 7631->7632 7632->7606 7633 408fd2 7632->7633 7750 408bc1 7633->7750 7635 408fda GetCurrentThreadId 7635->7612 8095 404084 7636->8095 7638 407a1f GetStartupInfoA 7639 409149 __calloc_crt 67 API calls 7638->7639 7645 407a40 7639->7645 7640 407c5e __wfsopen 7640->7576 7641 407bdb GetStdHandle 7646 407ba5 7641->7646 7642 409149 __calloc_crt 67 API calls 7642->7645 7643 407c40 SetHandleCount 7643->7640 7644 407bed GetFileType 7644->7646 7645->7640 7645->7642 7645->7646 7648 407b28 7645->7648 7646->7640 7646->7641 7646->7643 7646->7644 7649 4090a4 __getstream InitializeCriticalSectionAndSpinCount 7646->7649 7647 407b51 GetFileType 7647->7648 7648->7640 7648->7646 7648->7647 7650 4090a4 __getstream InitializeCriticalSectionAndSpinCount 7648->7650 7649->7646 7650->7648 7652 4089c2 7651->7652 7654 4089c6 7651->7654 7652->7581 7655 409104 __malloc_crt 67 API calls 7654->7655 7656 4089e7 _realloc 7655->7656 7657 4089ee FreeEnvironmentStringsW 7656->7657 7657->7581 7659 408938 _wparse_cmdline 7658->7659 7660 40318a 7659->7660 7661 408975 7659->7661 7660->7584 7660->7585 7662 409104 __malloc_crt 67 API calls 7661->7662 7663 40897b _wparse_cmdline 7662->7663 7663->7660 7665 4086ec _wcslen 7664->7665 7669 40319b 7664->7669 7666 409149 __calloc_crt 67 API calls 7665->7666 7672 408710 _wcslen 7666->7672 7667 408775 7668 401ea4 __freebuf 67 API calls 7667->7668 7668->7669 7669->7588 7669->7589 7670 409149 __calloc_crt 67 API calls 7670->7672 7671 40879b 7673 401ea4 __freebuf 67 API calls 7671->7673 7672->7667 7672->7669 7672->7670 7672->7671 7676 40875a 7672->7676 8096 405caa 7672->8096 7673->7669 7675 40427b __invoke_watson 10 API calls 7675->7676 7676->7672 7676->7675 7678 4044c6 __IsNonwritableInCurrentImage 7677->7678 8105 40983b 7678->8105 7680 4044e4 __initterm_e 7682 404503 __IsNonwritableInCurrentImage __initterm 7680->7682 8109 409824 7680->8109 7682->7591 7684 401457 7683->7684 7685 40145e 7683->7685 7684->7596 7688 404669 7684->7688 8209 401490 7685->8209 7689 40453d _doexit 67 API calls 7688->7689 7690 40467a 7689->7690 7690->7596 7692 4030b1 7691->7692 7693 4030ac 7691->7693 7695 404701 __NMSG_WRITE 67 API calls 7692->7695 7694 4048ac __FF_MSGBANNER 67 API calls 7693->7694 7694->7692 7696 4030b9 7695->7696 7697 40444d __mtinitlocknum 3 API calls 7696->7697 7698 4030c3 7697->7698 7698->7569 7700 4048ac __FF_MSGBANNER 67 API calls 7699->7700 7701 404403 7700->7701 7702 404701 __NMSG_WRITE 67 API calls 7701->7702 7703 40440b 7702->7703 7704 408ad5 __decode_pointer 6 API calls 7703->7704 7705 403170 7704->7705 7705->7577 7707 40453d _doexit 67 API calls 7706->7707 7708 4046a0 7707->7708 7708->7599 7710 4043d4 Sleep GetModuleHandleW 7709->7710 7711 4043f2 7710->7711 7712 4043f6 7710->7712 7711->7710 7711->7712 7712->7603 7774 408acc 7713->7774 7715 4046bb __init_pointers 7777 409895 7715->7777 7718 408a5a __encode_pointer 6 API calls 7719 4046f7 7718->7719 7720 408a5a TlsGetValue 7719->7720 7721 408a72 7720->7721 7722 408a93 GetModuleHandleW 7720->7722 7721->7722 7723 408a7c TlsGetValue 7721->7723 7724 408aa3 7722->7724 7725 408aae GetProcAddress 7722->7725 7728 408a87 7723->7728 7726 4043c9 __crt_waiting_on_module_handle 2 API calls 7724->7726 7727 408a8b 7725->7727 7729 408aa9 7726->7729 7727->7619 7728->7722 7728->7727 7729->7725 7729->7727 7732 40341a 7730->7732 7733 403448 7732->7733 7780 4090a4 7732->7780 7733->7606 7734 408ad5 TlsGetValue 7733->7734 7735 408aed 7734->7735 7736 408b0e GetModuleHandleW 7734->7736 7735->7736 7737 408af7 TlsGetValue 7735->7737 7738 408b29 GetProcAddress 7736->7738 7739 408b1e 7736->7739 7742 408b02 7737->7742 7740 408b06 7738->7740 7741 4043c9 __crt_waiting_on_module_handle 2 API calls 7739->7741 7740->7606 7744 409149 7740->7744 7743 408b24 7741->7743 7742->7736 7742->7740 7743->7738 7743->7740 7746 409152 7744->7746 7747 408fb1 7746->7747 7748 409170 Sleep 7746->7748 7785 40e212 7746->7785 7747->7606 7747->7631 7749 409185 7748->7749 7749->7746 7749->7747 8074 404084 7750->8074 7752 408bcd GetModuleHandleW 7753 408be3 7752->7753 7754 408bdd 7752->7754 7756 408bfb GetProcAddress GetProcAddress 7753->7756 7757 408c1f 7753->7757 7755 4043c9 __crt_waiting_on_module_handle 2 API calls 7754->7755 7755->7753 7756->7757 7758 40358b __lock 63 API calls 7757->7758 7759 408c3e InterlockedIncrement 7758->7759 8075 408c96 7759->8075 7762 40358b __lock 63 API calls 7763 408c5f 7762->7763 8078 40cf4b InterlockedIncrement 7763->8078 7765 408c7d 8090 408c9f 7765->8090 7767 408c8a __wfsopen 7767->7635 7769 408b9a 7768->7769 7770 408b8e 7768->7770 7772 408bbc 7769->7772 7773 408bae TlsFree 7769->7773 7771 408ad5 __decode_pointer 6 API calls 7770->7771 7771->7769 7772->7772 7773->7772 7775 408a5a __encode_pointer 6 API calls 7774->7775 7776 408ad3 7775->7776 7776->7715 7778 408a5a __encode_pointer 6 API calls 7777->7778 7779 4046ed 7778->7779 7779->7718 7784 404084 7780->7784 7782 4090b0 InitializeCriticalSectionAndSpinCount 7783 4090f4 __wfsopen 7782->7783 7783->7732 7784->7782 7786 40e21e __wfsopen 7785->7786 7787 40e236 7786->7787 7797 40e255 _memset 7786->7797 7798 403396 7787->7798 7791 40e2c7 HeapAlloc 7791->7797 7792 40e24b __wfsopen 7792->7746 7797->7791 7797->7792 7804 40358b 7797->7804 7811 403d9d 7797->7811 7817 40e30e 7797->7817 7820 4048f4 7797->7820 7823 408ca8 GetLastError 7798->7823 7800 40339b 7801 4043a3 7800->7801 7802 408ad5 __decode_pointer 6 API calls 7801->7802 7803 4043b3 __invoke_watson 7802->7803 7805 4035a0 7804->7805 7806 4035b3 EnterCriticalSection 7804->7806 7870 4034c8 7805->7870 7806->7797 7808 4035a6 7808->7806 7809 4043f9 __amsg_exit 66 API calls 7808->7809 7810 4035b2 7809->7810 7810->7806 7813 403dcb 7811->7813 7812 403e64 7816 403e6d 7812->7816 8069 4039b4 7812->8069 7813->7812 7813->7816 8062 403904 7813->8062 7816->7797 8073 4034b1 LeaveCriticalSection 7817->8073 7819 40e315 7819->7797 7821 408ad5 __decode_pointer 6 API calls 7820->7821 7822 404904 7821->7822 7822->7797 7837 408b50 TlsGetValue 7823->7837 7826 408d15 SetLastError 7826->7800 7827 409149 __calloc_crt 64 API calls 7828 408cd3 7827->7828 7828->7826 7829 408ad5 __decode_pointer 6 API calls 7828->7829 7830 408ced 7829->7830 7831 408cf4 7830->7831 7832 408d0c 7830->7832 7834 408bc1 __initptd 64 API calls 7831->7834 7842 401ea4 7832->7842 7836 408cfc GetCurrentThreadId 7834->7836 7835 408d12 7835->7826 7836->7826 7838 408b80 7837->7838 7839 408b65 7837->7839 7838->7826 7838->7827 7840 408ad5 __decode_pointer 6 API calls 7839->7840 7841 408b70 TlsSetValue 7840->7841 7841->7838 7843 401eb0 __wfsopen 7842->7843 7844 401f29 __wfsopen _realloc 7843->7844 7846 40358b __lock 65 API calls 7843->7846 7854 401eef 7843->7854 7844->7835 7845 401f04 HeapFree 7845->7844 7847 401f16 7845->7847 7851 401ec7 ___sbh_find_block 7846->7851 7848 403396 __vswprintf_helper 65 API calls 7847->7848 7849 401f1b GetLastError 7848->7849 7849->7844 7850 401ee1 7862 401efa 7850->7862 7851->7850 7855 4035ee 7851->7855 7854->7844 7854->7845 7856 40362d 7855->7856 7861 4038cf 7855->7861 7857 403819 VirtualFree 7856->7857 7856->7861 7858 40387d 7857->7858 7859 40388c VirtualFree HeapFree 7858->7859 7858->7861 7865 409240 7859->7865 7861->7850 7869 4034b1 LeaveCriticalSection 7862->7869 7864 401f01 7864->7854 7866 409258 7865->7866 7867 409287 7866->7867 7868 40927f __VEC_memcpy 7866->7868 7867->7861 7868->7867 7869->7864 7871 4034d4 __wfsopen 7870->7871 7872 4034fa 7871->7872 7896 4048ac 7871->7896 7878 40350a __wfsopen 7872->7878 7942 409104 7872->7942 7878->7808 7880 40352b 7884 40358b __lock 67 API calls 7880->7884 7881 40351c 7883 403396 __vswprintf_helper 67 API calls 7881->7883 7883->7878 7885 403532 7884->7885 7886 403566 7885->7886 7887 40353a 7885->7887 7889 401ea4 __freebuf 67 API calls 7886->7889 7888 4090a4 __getstream InitializeCriticalSectionAndSpinCount 7887->7888 7890 403545 7888->7890 7891 403557 7889->7891 7890->7891 7892 401ea4 __freebuf 67 API calls 7890->7892 7947 403582 7891->7947 7894 403551 7892->7894 7895 403396 __vswprintf_helper 67 API calls 7894->7895 7895->7891 7950 405d19 7896->7950 7899 405d19 __set_error_mode 67 API calls 7904 4048c0 7899->7904 7900 404701 __NMSG_WRITE 67 API calls 7901 4048d8 7900->7901 7902 404701 __NMSG_WRITE 67 API calls 7901->7902 7903 4034e9 7902->7903 7905 404701 7903->7905 7904->7900 7904->7903 7906 404715 7905->7906 7907 405d19 __set_error_mode 64 API calls 7906->7907 7938 4034f0 7906->7938 7908 404737 7907->7908 7909 404875 GetStdHandle 7908->7909 7911 405d19 __set_error_mode 64 API calls 7908->7911 7910 404883 _strlen 7909->7910 7909->7938 7914 40489c WriteFile 7910->7914 7910->7938 7912 404748 7911->7912 7912->7909 7913 40475a 7912->7913 7913->7938 7956 409beb 7913->7956 7914->7938 7917 404790 GetModuleFileNameA 7919 4047ae 7917->7919 7923 4047d1 _strlen 7917->7923 7921 409beb _strcpy_s 64 API calls 7919->7921 7922 4047be 7921->7922 7922->7923 7925 40427b __invoke_watson 10 API calls 7922->7925 7924 404814 7923->7924 7972 409aa1 7923->7972 7981 409a2d 7924->7981 7925->7923 7930 404838 7932 409a2d _strcat_s 64 API calls 7930->7932 7931 40427b __invoke_watson 10 API calls 7931->7930 7935 40484c 7932->7935 7933 40427b __invoke_watson 10 API calls 7933->7924 7934 40485d 7990 4098c4 7934->7990 7935->7934 7937 40427b __invoke_watson 10 API calls 7935->7937 7937->7934 7939 40444d 7938->7939 8028 404422 GetModuleHandleW 7939->8028 7945 40910d 7942->7945 7944 403515 7944->7880 7944->7881 7945->7944 7946 409124 Sleep 7945->7946 8032 401ffe 7945->8032 7946->7945 8061 4034b1 LeaveCriticalSection 7947->8061 7949 403589 7949->7878 7951 405d28 7950->7951 7952 4048b3 7951->7952 7953 403396 __vswprintf_helper 67 API calls 7951->7953 7952->7899 7952->7904 7954 405d4b 7953->7954 7955 4043a3 __vswprintf_helper 6 API calls 7954->7955 7955->7952 7957 409c03 7956->7957 7958 409bfc 7956->7958 7959 403396 __vswprintf_helper 67 API calls 7957->7959 7958->7957 7962 409c29 7958->7962 7964 409c08 7959->7964 7960 4043a3 __vswprintf_helper 6 API calls 7961 40477c 7960->7961 7961->7917 7965 40427b 7961->7965 7962->7961 7963 403396 __vswprintf_helper 67 API calls 7962->7963 7963->7964 7964->7960 8017 402de0 7965->8017 7967 4042a8 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7968 404384 GetCurrentProcess TerminateProcess 7967->7968 7969 404378 __invoke_watson 7967->7969 8019 401e95 7968->8019 7969->7968 7971 4043a1 7971->7917 7977 409ab3 7972->7977 7973 409ab7 7974 404801 7973->7974 7975 403396 __vswprintf_helper 67 API calls 7973->7975 7974->7924 7974->7933 7976 409ad3 7975->7976 7978 4043a3 __vswprintf_helper 6 API calls 7976->7978 7977->7973 7977->7974 7979 409afd 7977->7979 7978->7974 7979->7974 7980 403396 __vswprintf_helper 67 API calls 7979->7980 7980->7976 7982 409a45 7981->7982 7984 409a3e 7981->7984 7983 403396 __vswprintf_helper 67 API calls 7982->7983 7989 409a4a 7983->7989 7984->7982 7987 409a79 7984->7987 7985 4043a3 __vswprintf_helper 6 API calls 7986 404827 7985->7986 7986->7930 7986->7931 7987->7986 7988 403396 __vswprintf_helper 67 API calls 7987->7988 7988->7989 7989->7985 7991 408acc ___crtMessageBoxW 6 API calls 7990->7991 7992 4098d4 7991->7992 7993 40996f 7992->7993 7994 4098e7 LoadLibraryA 7992->7994 8000 408ad5 __decode_pointer 6 API calls 7993->8000 8008 409999 7993->8008 7995 409a11 7994->7995 7996 4098fc GetProcAddress 7994->7996 7995->7938 7996->7995 7997 409912 7996->7997 8001 408a5a __encode_pointer 6 API calls 7997->8001 7998 408ad5 __decode_pointer 6 API calls 7998->7995 7999 408ad5 __decode_pointer 6 API calls 8011 4099dc 7999->8011 8002 40998c 8000->8002 8003 409918 GetProcAddress 8001->8003 8004 408ad5 __decode_pointer 6 API calls 8002->8004 8005 408a5a __encode_pointer 6 API calls 8003->8005 8004->8008 8006 40992d GetProcAddress 8005->8006 8007 408a5a __encode_pointer 6 API calls 8006->8007 8009 409942 GetProcAddress 8007->8009 8008->7999 8016 4099c4 8008->8016 8010 408a5a __encode_pointer 6 API calls 8009->8010 8012 409957 8010->8012 8013 408ad5 __decode_pointer 6 API calls 8011->8013 8011->8016 8012->7993 8014 409961 GetProcAddress 8012->8014 8013->8016 8015 408a5a __encode_pointer 6 API calls 8014->8015 8015->7993 8016->7998 8018 402dec __VEC_memzero 8017->8018 8018->7967 8020 401e9d 8019->8020 8021 401e9f IsDebuggerPresent 8019->8021 8020->7971 8027 40908d 8021->8027 8024 40331b SetUnhandledExceptionFilter UnhandledExceptionFilter 8025 403340 GetCurrentProcess TerminateProcess 8024->8025 8026 403338 __invoke_watson 8024->8026 8025->7971 8026->8025 8027->8024 8029 404436 GetProcAddress 8028->8029 8030 40444b ExitProcess 8028->8030 8029->8030 8031 404446 8029->8031 8031->8030 8033 4020b1 8032->8033 8038 402010 8032->8038 8034 4048f4 _malloc 6 API calls 8033->8034 8035 4020b7 8034->8035 8037 403396 __vswprintf_helper 66 API calls 8035->8037 8036 4048ac __FF_MSGBANNER 66 API calls 8036->8038 8043 4020a9 8037->8043 8038->8036 8040 404701 __NMSG_WRITE 66 API calls 8038->8040 8041 40206d HeapAlloc 8038->8041 8042 40444d __mtinitlocknum 3 API calls 8038->8042 8038->8043 8044 40209d 8038->8044 8046 4048f4 _malloc 6 API calls 8038->8046 8047 4020a2 8038->8047 8049 401faf 8038->8049 8040->8038 8041->8038 8042->8038 8043->7945 8045 403396 __vswprintf_helper 66 API calls 8044->8045 8045->8047 8046->8038 8048 403396 __vswprintf_helper 66 API calls 8047->8048 8048->8043 8050 401fbb __wfsopen 8049->8050 8051 40358b __lock 67 API calls 8050->8051 8053 401fec __wfsopen 8050->8053 8052 401fd1 8051->8052 8054 403d9d ___sbh_alloc_block 5 API calls 8052->8054 8053->8038 8055 401fdc 8054->8055 8057 401ff5 8055->8057 8060 4034b1 LeaveCriticalSection 8057->8060 8059 401ffc 8059->8053 8060->8059 8061->7949 8063 403917 HeapReAlloc 8062->8063 8064 40394b HeapAlloc 8062->8064 8065 403939 8063->8065 8067 403935 8063->8067 8066 40396e VirtualAlloc 8064->8066 8064->8067 8065->8064 8066->8067 8068 403988 HeapFree 8066->8068 8067->7812 8068->8067 8070 4039cb VirtualAlloc 8069->8070 8072 403a12 8070->8072 8072->7816 8073->7819 8074->7752 8093 4034b1 LeaveCriticalSection 8075->8093 8077 408c58 8077->7762 8079 40cf69 InterlockedIncrement 8078->8079 8080 40cf6c 8078->8080 8079->8080 8081 40cf76 InterlockedIncrement 8080->8081 8082 40cf79 8080->8082 8081->8082 8083 40cf83 InterlockedIncrement 8082->8083 8084 40cf86 8082->8084 8083->8084 8085 40cf90 InterlockedIncrement 8084->8085 8086 40cf93 8084->8086 8085->8086 8087 40cfac InterlockedIncrement 8086->8087 8088 40cfbc InterlockedIncrement 8086->8088 8089 40cfc7 InterlockedIncrement 8086->8089 8087->8086 8088->8086 8089->7765 8094 4034b1 LeaveCriticalSection 8090->8094 8092 408ca6 8092->7767 8093->8077 8094->8092 8095->7638 8097 405cc2 8096->8097 8098 405cbb 8096->8098 8099 403396 __vswprintf_helper 67 API calls 8097->8099 8098->8097 8100 405cee 8098->8100 8104 405cc7 8099->8104 8102 405cd6 8100->8102 8103 403396 __vswprintf_helper 67 API calls 8100->8103 8101 4043a3 __vswprintf_helper 6 API calls 8101->8102 8102->7672 8103->8104 8104->8101 8106 409841 8105->8106 8107 408a5a __encode_pointer 6 API calls 8106->8107 8108 409859 8106->8108 8107->8106 8108->7680 8112 4097e8 8109->8112 8111 409831 8111->7682 8113 4097f4 __wfsopen 8112->8113 8120 404465 8113->8120 8119 409815 __wfsopen 8119->8111 8121 40358b __lock 67 API calls 8120->8121 8122 40446c 8121->8122 8123 4096fd 8122->8123 8124 408ad5 __decode_pointer 6 API calls 8123->8124 8125 409711 8124->8125 8126 408ad5 __decode_pointer 6 API calls 8125->8126 8127 409721 8126->8127 8128 4097a4 8127->8128 8143 40e832 8127->8143 8140 40981e 8128->8140 8130 40978b 8131 408a5a __encode_pointer 6 API calls 8130->8131 8132 409799 8131->8132 8135 408a5a __encode_pointer 6 API calls 8132->8135 8133 409763 8133->8128 8137 409195 __realloc_crt 73 API calls 8133->8137 8138 409779 8133->8138 8134 40973f 8134->8130 8134->8133 8156 409195 8134->8156 8135->8128 8137->8138 8138->8128 8139 408a5a __encode_pointer 6 API calls 8138->8139 8139->8130 8205 40446e 8140->8205 8144 40e83e __wfsopen 8143->8144 8145 40e86b 8144->8145 8146 40e84e 8144->8146 8147 40e8ac HeapSize 8145->8147 8150 40358b __lock 67 API calls 8145->8150 8148 403396 __vswprintf_helper 67 API calls 8146->8148 8152 40e863 __wfsopen 8147->8152 8149 40e853 8148->8149 8151 4043a3 __vswprintf_helper 6 API calls 8149->8151 8153 40e87b ___sbh_find_block 8150->8153 8151->8152 8152->8134 8161 40e8cc 8153->8161 8157 40919e 8156->8157 8159 4091dd 8157->8159 8160 4091be Sleep 8157->8160 8165 40e432 8157->8165 8159->8133 8160->8157 8164 4034b1 LeaveCriticalSection 8161->8164 8163 40e8a7 8163->8147 8163->8152 8164->8163 8166 40e43e __wfsopen 8165->8166 8167 40e453 8166->8167 8168 40e445 8166->8168 8170 40e466 8167->8170 8171 40e45a 8167->8171 8169 401ffe _malloc 67 API calls 8168->8169 8192 40e44d __wfsopen _realloc 8169->8192 8181 40e5d8 8170->8181 8199 40e473 ___sbh_resize_block _realloc ___sbh_find_block 8170->8199 8172 401ea4 __freebuf 67 API calls 8171->8172 8172->8192 8173 40e60b 8176 4048f4 _malloc 6 API calls 8173->8176 8174 40e5dd HeapReAlloc 8174->8181 8174->8192 8175 40358b __lock 67 API calls 8175->8199 8177 40e611 8176->8177 8179 403396 __vswprintf_helper 67 API calls 8177->8179 8178 40e62f 8182 403396 __vswprintf_helper 67 API calls 8178->8182 8178->8192 8179->8192 8180 4048f4 _malloc 6 API calls 8180->8181 8181->8173 8181->8174 8181->8178 8181->8180 8183 40e625 8181->8183 8184 40e638 GetLastError 8182->8184 8186 403396 __vswprintf_helper 67 API calls 8183->8186 8184->8192 8188 40e5a6 8186->8188 8187 40e4fe HeapAlloc 8187->8199 8189 40e5ab GetLastError 8188->8189 8188->8192 8189->8192 8190 40e553 HeapReAlloc 8190->8199 8191 403d9d ___sbh_alloc_block 5 API calls 8191->8199 8192->8157 8193 40e5be 8193->8192 8195 403396 __vswprintf_helper 67 API calls 8193->8195 8194 4048f4 _malloc 6 API calls 8194->8199 8197 40e5cb 8195->8197 8196 40e5a1 8198 403396 __vswprintf_helper 67 API calls 8196->8198 8197->8184 8197->8192 8198->8188 8199->8173 8199->8175 8199->8187 8199->8190 8199->8191 8199->8192 8199->8193 8199->8194 8199->8196 8200 4035ee VirtualFree VirtualFree HeapFree __VEC_memcpy ___sbh_free_block 8199->8200 8201 40e576 8199->8201 8200->8199 8204 4034b1 LeaveCriticalSection 8201->8204 8203 40e57d 8203->8199 8204->8203 8208 4034b1 LeaveCriticalSection 8205->8208 8207 404475 8207->8119 8208->8207 8266 401960 8209->8266 8216 401550 8220 401819 8216->8220 8225 402ca4 swprintf 101 API calls 8216->8225 8218 401575 8472 401850 8218->8472 8219 40155e 8325 402439 8219->8325 8224 401ea4 __freebuf 67 API calls 8220->8224 8228 401825 8224->8228 8229 401794 8225->8229 8227 401586 8231 401850 151 API calls 8227->8231 8232 401ea4 __freebuf 67 API calls 8228->8232 8233 401850 151 API calls 8229->8233 8235 40159a 8231->8235 8236 401834 8232->8236 8237 4017aa GetWindowsDirectoryW 8233->8237 8273 401310 GetModuleFileNameW 8235->8273 8239 401e95 __getdrive 5 API calls 8236->8239 8240 4017c3 8237->8240 8241 4017f6 8237->8241 8238 401850 151 API calls 8242 401631 8238->8242 8243 40146b LocalFree 8239->8243 8244 402ca4 swprintf 101 API calls 8240->8244 8245 401850 151 API calls 8241->8245 8246 401642 8242->8246 8247 40168b 8242->8247 8243->7684 8249 4017e0 8244->8249 8250 40180a 8245->8250 8251 402ca4 swprintf 101 API calls 8246->8251 8248 402ca4 swprintf 101 API calls 8247->8248 8252 4016bd 8248->8252 8253 401850 151 API calls 8249->8253 8485 402c28 8250->8485 8255 40166d 8251->8255 8257 401850 151 API calls 8252->8257 8253->8241 8256 401850 151 API calls 8255->8256 8256->8216 8258 4016d3 8257->8258 8259 402ca4 swprintf 101 API calls 8258->8259 8260 401705 8259->8260 8261 401850 151 API calls 8260->8261 8262 40171b 8261->8262 8262->8216 8263 402ca4 swprintf 101 API calls 8262->8263 8264 401745 8263->8264 8265 401850 151 API calls 8264->8265 8265->8216 8270 401976 _wcslen 8266->8270 8267 401526 8267->8235 8307 401190 8267->8307 8268 4019a6 8269 402439 __wassert 121 API calls 8268->8269 8268->8270 8269->8268 8270->8267 8270->8268 8271 401ea4 __freebuf 67 API calls 8270->8271 8498 401a80 8270->8498 8271->8270 8274 40134c 8273->8274 8277 401345 8273->8277 8645 4020e2 8274->8645 8276 401e95 __getdrive 5 API calls 8279 401423 8276->8279 8277->8276 8279->8216 8285 401b10 8279->8285 8280 4013b0 8667 401000 GetModuleHandleW 8280->8667 8286 401b38 _memset 8285->8286 8287 401b48 GetProcessHeap 8286->8287 8288 401850 151 API calls 8287->8288 8289 401b68 _wcslen 8288->8289 8290 401b74 HeapAlloc 8289->8290 8291 401b98 8290->8291 8292 401b9d 8290->8292 8293 401c39 8291->8293 8294 401c2f CloseHandle 8291->8294 8295 401bae CreateProcessW 8292->8295 8298 401c49 8293->8298 8299 401c3f CloseHandle 8293->8299 8294->8293 8296 401be4 8295->8296 8297 401bd5 8295->8297 8296->8291 8301 401bec WaitForSingleObject 8296->8301 8700 401df0 GetLastError FormatMessageW 8297->8700 8302 4015db 8298->8302 8303 401c4f HeapFree 8298->8303 8299->8298 8301->8291 8304 401c03 GetExitCodeProcess 8301->8304 8302->8216 8482 402ca4 8302->8482 8303->8302 8305 401c15 8304->8305 8306 401c1b GetExitCodeThread 8304->8306 8305->8306 8306->8291 8308 4011d2 8307->8308 8309 4011be 8307->8309 8703 4023c8 8308->8703 8311 402439 __wassert 121 API calls 8309->8311 8311->8308 8313 4011ee 8315 401e95 __getdrive 5 API calls 8313->8315 8314 4020e2 __wsplitpath_s 67 API calls 8316 401219 8314->8316 8317 401281 8315->8317 8318 401225 8316->8318 8319 401080 67 API calls 8316->8319 8317->8216 8317->8218 8317->8219 8320 401ea4 __freebuf 67 API calls 8318->8320 8321 401239 8319->8321 8320->8313 8321->8318 8713 401290 8321->8713 8324 4023c8 __wfopen_s 84 API calls 8324->8318 8326 405d19 __set_error_mode 67 API calls 8325->8326 8327 40246a 8326->8327 8328 402aaa GetStdHandle 8327->8328 8330 405d19 __set_error_mode 67 API calls 8327->8330 8329 402ac0 8328->8329 8334 402b25 __wassert 8328->8334 8329->8334 8938 40241b 8329->8938 8331 40247b 8330->8331 8331->8328 8333 40248d 8331->8333 8336 405caa __wsetenvp 67 API calls 8333->8336 8339 402b45 __wassert 8334->8339 8953 40550a 8334->8953 8338 4024a4 8336->8338 8337 402aec GetFileType 8337->8334 8340 402af8 _wcslen 8337->8340 8344 40427b __invoke_watson 10 API calls 8338->8344 8348 4024b7 8338->8348 8970 405476 8339->8970 8347 402b0c WriteConsoleW 8340->8347 8341 401f32 __wassert 67 API calls 8345 4024cd 8341->8345 8344->8348 8349 4024de 8345->8349 8351 40427b __invoke_watson 10 API calls 8345->8351 8346 402b66 __wassert 8987 40541a 8346->8987 8347->8334 8350 402b20 8347->8350 8348->8341 8352 401f32 __wassert 67 API calls 8349->8352 8941 405608 8350->8941 8351->8349 8354 4024f3 8352->8354 8356 402507 GetModuleFileNameW 8354->8356 8357 40427b __invoke_watson 10 API calls 8354->8357 8358 402527 8356->8358 8365 40254e _wcslen 8356->8365 8359 402504 8357->8359 8360 405caa __wsetenvp 67 API calls 8358->8360 8359->8356 8363 40253d 8360->8363 8361 405608 _abort 69 API calls 8362 402a96 8361->8362 8364 401e95 __getdrive 5 API calls 8362->8364 8363->8365 8367 40427b __invoke_watson 10 API calls 8363->8367 8368 401572 8364->8368 8366 4025aa 8365->8366 8372 40491c __wassert 67 API calls 8365->8372 8369 401f32 __wassert 67 API calls 8366->8369 8367->8365 8368->8218 8370 4025bb 8369->8370 8371 4025cc 8370->8371 8373 40427b __invoke_watson 10 API calls 8370->8373 8374 401f32 __wassert 67 API calls 8371->8374 8375 402599 8372->8375 8373->8371 8376 4025e2 8374->8376 8375->8366 8378 40427b __invoke_watson 10 API calls 8375->8378 8377 4025f3 8376->8377 8379 40427b __invoke_watson 10 API calls 8376->8379 8380 401f32 __wassert 67 API calls 8377->8380 8378->8366 8379->8377 8381 402608 8380->8381 8382 40427b __invoke_watson 10 API calls 8381->8382 8386 402619 _wcslen 8381->8386 8382->8386 8383 401f32 __wassert 67 API calls 8384 402847 8383->8384 8385 402858 8384->8385 8387 40427b __invoke_watson 10 API calls 8384->8387 8388 401f32 __wassert 67 API calls 8385->8388 8389 40270e 8386->8389 8393 4026a2 8386->8393 8424 4026f7 8386->8424 8387->8385 8390 40286e 8388->8390 8391 402713 8389->8391 8392 402785 8389->8392 8395 40287f 8390->8395 8399 40427b __invoke_watson 10 API calls 8390->8399 8396 405bbc __wassert 67 API calls 8391->8396 8394 405bbc __wassert 67 API calls 8392->8394 8874 405bbc 8393->8874 8398 40279a 8394->8398 8402 401f32 __wassert 67 API calls 8395->8402 8400 402736 8396->8400 8404 4027ab 8398->8404 8410 40427b __invoke_watson 10 API calls 8398->8410 8399->8395 8405 402747 8400->8405 8412 40427b __invoke_watson 10 API calls 8400->8412 8403 402894 8402->8403 8414 40427b __invoke_watson 10 API calls 8403->8414 8422 4028a5 _wcslen 8403->8422 8411 401f32 __wassert 67 API calls 8404->8411 8408 401f32 __wassert 67 API calls 8405->8408 8406 4026d0 8409 401f32 __wassert 67 API calls 8406->8409 8407 40427b __invoke_watson 10 API calls 8407->8406 8415 40275d 8408->8415 8416 4026e6 8409->8416 8410->8404 8413 4027c1 8411->8413 8412->8405 8417 4027d2 8413->8417 8418 40427b __invoke_watson 10 API calls 8413->8418 8414->8422 8420 40427b __invoke_watson 10 API calls 8415->8420 8415->8424 8421 40427b __invoke_watson 10 API calls 8416->8421 8416->8424 8419 405bbc __wassert 67 API calls 8417->8419 8418->8417 8423 4027f4 8419->8423 8420->8424 8421->8424 8883 405b90 8422->8883 8425 402805 8423->8425 8427 40427b __invoke_watson 10 API calls 8423->8427 8424->8383 8429 401f32 __wassert 67 API calls 8425->8429 8427->8425 8431 40281b 8429->8431 8430 4028ea 8433 401f32 __wassert 67 API calls 8430->8433 8431->8424 8435 40427b __invoke_watson 10 API calls 8431->8435 8432 40427b __invoke_watson 10 API calls 8432->8430 8434 402900 8433->8434 8436 402911 8434->8436 8437 40427b __invoke_watson 10 API calls 8434->8437 8435->8424 8438 401f32 __wassert 67 API calls 8436->8438 8437->8436 8439 402926 8438->8439 8440 40427b __invoke_watson 10 API calls 8439->8440 8441 402937 _wcslen 8439->8441 8440->8441 8443 405bbc __wassert 67 API calls 8441->8443 8452 402998 8441->8452 8442 401f32 __wassert 67 API calls 8444 4029b6 8442->8444 8445 402987 8443->8445 8446 4029c7 8444->8446 8448 40427b __invoke_watson 10 API calls 8444->8448 8450 40427b __invoke_watson 10 API calls 8445->8450 8445->8452 8447 401f32 __wassert 67 API calls 8446->8447 8449 4029dd 8447->8449 8448->8446 8451 4029ee 8449->8451 8453 40427b __invoke_watson 10 API calls 8449->8453 8450->8452 8454 401f32 __wassert 67 API calls 8451->8454 8452->8442 8453->8451 8455 402a03 8454->8455 8456 402a14 8455->8456 8457 40427b __invoke_watson 10 API calls 8455->8457 8458 401f32 __wassert 67 API calls 8456->8458 8457->8456 8459 402a2a 8458->8459 8460 402a3b 8459->8460 8462 40427b __invoke_watson 10 API calls 8459->8462 8461 401f32 __wassert 67 API calls 8460->8461 8463 402a50 8461->8463 8462->8460 8464 402a61 8463->8464 8465 40427b __invoke_watson 10 API calls 8463->8465 8887 405931 8464->8887 8465->8464 8468 402a91 8468->8361 8468->8362 8473 401872 _memset 8472->8473 8481 40186d 8472->8481 9377 401940 8473->9377 8474 401e95 __getdrive 5 API calls 8476 40190e 8474->8476 8476->8227 8481->8474 9632 405205 8482->9632 8486 402c34 __wfsopen 8485->8486 8487 402c65 8486->8487 8488 402c48 8486->8488 8491 404ac6 __lock_file 68 API calls 8487->8491 8495 402c5d __wfsopen 8487->8495 8489 403396 __vswprintf_helper 67 API calls 8488->8489 8490 402c4d 8489->8490 8492 4043a3 __vswprintf_helper 6 API calls 8490->8492 8493 402c7d 8491->8493 8492->8495 9647 402bb1 8493->9647 8495->8220 8499 401aa0 8498->8499 8500 401ab4 8498->8500 8501 402439 __wassert 121 API calls 8499->8501 8508 402f90 8500->8508 8501->8500 8505 401ad3 8506 401e95 __getdrive 5 API calls 8505->8506 8507 401b00 8506->8507 8507->8270 8509 402fa7 8508->8509 8510 40308c 8508->8510 8509->8510 8511 402fb0 8509->8511 8559 408494 8510->8559 8513 403019 8511->8513 8514 402fbb GetFullPathNameW 8511->8514 8516 403020 8513->8516 8517 40303a 8513->8517 8515 402fc5 GetLastError 8514->8515 8520 402fd8 8514->8520 8547 4033bc 8515->8547 8519 403396 __vswprintf_helper 67 API calls 8516->8519 8521 403040 GetFullPathNameW 8517->8521 8522 403025 8519->8522 8523 402fe9 8520->8523 8524 402ffb 8520->8524 8525 403051 8521->8525 8526 40306c 8521->8526 8529 4043a3 __vswprintf_helper 6 API calls 8522->8529 8530 403396 __vswprintf_helper 67 API calls 8523->8530 8552 408308 8524->8552 8527 40305e 8525->8527 8531 401ea4 __freebuf 67 API calls 8525->8531 8526->8515 8534 401acc 8526->8534 8536 401ea4 __freebuf 67 API calls 8526->8536 8533 403396 __vswprintf_helper 67 API calls 8527->8533 8529->8534 8530->8534 8531->8527 8533->8534 8534->8505 8539 402f38 8534->8539 8535 40300c 8537 403396 __vswprintf_helper 67 API calls 8535->8537 8538 403081 8536->8538 8537->8534 8538->8515 8540 402f49 _wcslen 8539->8540 8543 402f45 8539->8543 8541 408308 _calloc 67 API calls 8540->8541 8542 402f5e 8541->8542 8542->8543 8544 405caa __wsetenvp 67 API calls 8542->8544 8543->8505 8545 402f71 8544->8545 8545->8543 8546 40427b __invoke_watson 10 API calls 8545->8546 8546->8543 8567 4033a9 8547->8567 8549 4033c7 _realloc 8550 403396 __vswprintf_helper 67 API calls 8549->8550 8551 4033da 8550->8551 8551->8534 8553 40e212 __calloc_impl 67 API calls 8552->8553 8554 408322 8553->8554 8555 403396 __vswprintf_helper 67 API calls 8554->8555 8558 403003 8554->8558 8556 408335 8555->8556 8557 403396 __vswprintf_helper 67 API calls 8556->8557 8556->8558 8557->8558 8558->8521 8558->8535 8560 4084a0 __wfsopen 8559->8560 8561 40358b __lock 67 API calls 8560->8561 8562 4084a7 8561->8562 8570 408348 8562->8570 8566 4084cb __wfsopen 8566->8534 8568 408ca8 __getptd_noexit 67 API calls 8567->8568 8569 4033ae 8568->8569 8569->8549 8571 408369 8570->8571 8572 40839c 8570->8572 8607 40e3f9 8571->8607 8610 40e330 GetCurrentDirectoryA 8572->8610 8575 4083a1 8578 4083bb GetFullPathNameW 8575->8578 8580 4083ae 8575->8580 8577 408374 8579 4033a9 __commit 67 API calls 8577->8579 8586 408476 GetLastError 8578->8586 8587 40840e 8578->8587 8581 408379 8579->8581 8582 403396 __vswprintf_helper 67 API calls 8580->8582 8583 403396 __vswprintf_helper 67 API calls 8581->8583 8584 408384 8582->8584 8583->8584 8588 4043a3 __vswprintf_helper 6 API calls 8584->8588 8591 4033bc __dosmaperr 67 API calls 8586->8591 8589 408412 8587->8589 8590 40842d 8587->8590 8592 408394 8588->8592 8589->8592 8593 403396 __vswprintf_helper 67 API calls 8589->8593 8594 408308 _calloc 67 API calls 8590->8594 8591->8592 8595 401e95 __getdrive 5 API calls 8592->8595 8593->8592 8596 40843f 8594->8596 8597 408492 8595->8597 8598 408447 8596->8598 8599 40845f GetFullPathNameW 8596->8599 8604 4084d4 8597->8604 8601 403396 __vswprintf_helper 67 API calls 8598->8601 8599->8586 8600 408471 8599->8600 8600->8586 8600->8592 8602 40844c 8601->8602 8603 4033a9 __commit 67 API calls 8602->8603 8603->8592 8644 4034b1 LeaveCriticalSection 8604->8644 8606 4084db 8606->8566 8608 40e40a GetDriveTypeA 8607->8608 8609 40836f 8607->8609 8608->8609 8609->8575 8609->8577 8611 40e36f 8610->8611 8626 40e38d 8610->8626 8614 409149 __calloc_crt 67 API calls 8611->8614 8612 40e3b6 8615 40e3c5 8612->8615 8628 41036a 8612->8628 8613 40e3cd 8616 403396 __vswprintf_helper 67 API calls 8613->8616 8617 40e380 8614->8617 8619 40e3e7 8615->8619 8623 401ea4 __freebuf 67 API calls 8615->8623 8616->8615 8620 40e397 8617->8620 8621 40e388 8617->8621 8625 401e95 __getdrive 5 API calls 8619->8625 8622 40e3a5 GetCurrentDirectoryA 8620->8622 8620->8626 8624 403396 __vswprintf_helper 67 API calls 8621->8624 8622->8626 8623->8619 8624->8626 8627 40e3f7 8625->8627 8626->8612 8626->8613 8627->8575 8629 410388 8628->8629 8630 410378 8628->8630 8632 410254 8629->8632 8630->8615 8633 406094 _LocaleUpdate::_LocaleUpdate 77 API calls 8632->8633 8634 410268 8633->8634 8635 410273 8634->8635 8636 4102c7 8634->8636 8639 410396 __isctype_l 91 API calls 8635->8639 8643 41028b 8635->8643 8637 4102ec 8636->8637 8640 40d3f5 __isleadbyte_l 77 API calls 8636->8640 8638 403396 __vswprintf_helper 67 API calls 8637->8638 8641 4102f2 8637->8641 8638->8641 8639->8643 8640->8637 8642 40f730 ___crtLCMapStringA 102 API calls 8641->8642 8642->8643 8643->8630 8644->8606 8646 40217d 8645->8646 8652 4020fb 8645->8652 8647 4022b1 8646->8647 8648 4022cc 8646->8648 8650 403396 __vswprintf_helper 67 API calls 8647->8650 8649 403396 __vswprintf_helper 67 API calls 8648->8649 8651 4022b6 8649->8651 8650->8651 8653 401375 8651->8653 8654 4043a3 __vswprintf_helper 6 API calls 8651->8654 8652->8646 8656 40216b 8652->8656 8682 40491c 8652->8682 8653->8277 8653->8280 8654->8653 8656->8646 8665 40491c __wassert 67 API calls 8656->8665 8666 4021ea 8656->8666 8657 402254 8657->8646 8657->8653 8660 4022df 8657->8660 8658 402208 8658->8646 8659 402226 8658->8659 8662 40491c __wassert 67 API calls 8658->8662 8659->8646 8659->8653 8663 40223f 8659->8663 8661 40491c __wassert 67 API calls 8660->8661 8661->8653 8662->8659 8664 40491c __wassert 67 API calls 8663->8664 8664->8653 8665->8666 8666->8657 8666->8658 8668 401027 8667->8668 8669 40102b GetProcAddress 8667->8669 8671 401e95 __getdrive 5 API calls 8668->8671 8669->8668 8670 401047 8669->8670 8670->8668 8673 40105a GetLastError 8670->8673 8672 401078 8671->8672 8674 401080 8672->8674 8673->8668 8675 4010aa _wcslen 8674->8675 8676 401ffe _malloc 67 API calls 8675->8676 8679 4010fc 8676->8679 8678 401144 8680 401ea4 __freebuf 67 API calls 8678->8680 8681 401108 8678->8681 8679->8678 8679->8681 8691 401f32 8679->8691 8680->8681 8681->8277 8686 40492e 8682->8686 8683 404932 8684 404937 8683->8684 8685 403396 __vswprintf_helper 67 API calls 8683->8685 8684->8656 8687 40494e 8685->8687 8686->8683 8686->8684 8689 40497e 8686->8689 8688 4043a3 __vswprintf_helper 6 API calls 8687->8688 8688->8684 8689->8684 8690 403396 __vswprintf_helper 67 API calls 8689->8690 8690->8687 8693 401f43 8691->8693 8694 401f4a 8691->8694 8692 403396 __vswprintf_helper 67 API calls 8695 401f4f 8692->8695 8693->8694 8697 401f86 8693->8697 8694->8692 8696 4043a3 __vswprintf_helper 6 API calls 8695->8696 8698 401f5e 8696->8698 8697->8698 8699 403396 __vswprintf_helper 67 API calls 8697->8699 8698->8679 8699->8695 8701 401e21 MessageBoxW LocalFree 8700->8701 8702 401e3e 8700->8702 8701->8702 8702->8291 8704 4023f3 8703->8704 8705 4023d8 8703->8705 8717 402302 8704->8717 8706 403396 __vswprintf_helper 67 API calls 8705->8706 8708 4023dd 8706->8708 8710 4043a3 __vswprintf_helper 6 API calls 8708->8710 8709 402403 8711 4011e7 8709->8711 8712 403396 __vswprintf_helper 67 API calls 8709->8712 8710->8711 8711->8313 8711->8314 8712->8711 8714 4012a3 _wcschr 8713->8714 8715 401250 8714->8715 8716 4012c8 CreateDirectoryW 8714->8716 8715->8324 8716->8714 8719 40230e __wfsopen 8717->8719 8718 402321 8720 403396 __vswprintf_helper 67 API calls 8718->8720 8719->8718 8721 402357 8719->8721 8722 402326 8720->8722 8736 404e58 8721->8736 8723 4043a3 __vswprintf_helper 6 API calls 8722->8723 8734 402336 __wfsopen @_EH4_CallFilterFunc@8 8723->8734 8725 40235c 8726 402370 8725->8726 8727 402363 8725->8727 8729 402398 8726->8729 8730 402378 8726->8730 8728 403396 __vswprintf_helper 67 API calls 8727->8728 8728->8734 8754 404ba4 8729->8754 8732 403396 __vswprintf_helper 67 API calls 8730->8732 8732->8734 8734->8709 8737 404e64 __wfsopen 8736->8737 8738 40358b __lock 67 API calls 8737->8738 8749 404e72 8738->8749 8739 404ee7 8782 404f87 8739->8782 8740 404eee 8742 409104 __malloc_crt 67 API calls 8740->8742 8744 404ef8 8742->8744 8743 404f7c __wfsopen 8743->8725 8744->8739 8745 4090a4 __getstream InitializeCriticalSectionAndSpinCount 8744->8745 8748 404f1d 8745->8748 8746 4034c8 __mtinitlocknum 67 API calls 8746->8749 8750 404f28 8748->8750 8751 404f3b EnterCriticalSection 8748->8751 8749->8739 8749->8740 8749->8746 8772 404b07 8749->8772 8777 404b75 8749->8777 8753 401ea4 __freebuf 67 API calls 8750->8753 8751->8739 8753->8739 8763 404bc7 __wopenfile 8754->8763 8755 404be1 8757 403396 __vswprintf_helper 67 API calls 8755->8757 8756 404db5 8756->8755 8759 404e13 8756->8759 8758 404be6 8757->8758 8760 4043a3 __vswprintf_helper 6 API calls 8758->8760 8795 40a4de 8759->8795 8762 4023a3 8760->8762 8769 4023be 8762->8769 8763->8755 8763->8756 8787 40a5e8 8763->8787 8766 40a5e8 __wcsnicmp 79 API calls 8767 404dcd 8766->8767 8767->8756 8768 40a5e8 __wcsnicmp 79 API calls 8767->8768 8768->8756 8867 404b39 8769->8867 8771 4023c6 8771->8734 8773 404b14 8772->8773 8774 404b2a EnterCriticalSection 8772->8774 8775 40358b __lock 67 API calls 8773->8775 8774->8749 8776 404b1d 8775->8776 8776->8749 8778 404b85 8777->8778 8779 404b98 LeaveCriticalSection 8777->8779 8785 4034b1 LeaveCriticalSection 8778->8785 8779->8749 8781 404b95 8781->8749 8786 4034b1 LeaveCriticalSection 8782->8786 8784 404f8e 8784->8743 8785->8781 8786->8784 8788 40a678 8787->8788 8789 40a5f9 8787->8789 8798 40a4fe 8788->8798 8791 403396 __vswprintf_helper 67 API calls 8789->8791 8793 404dae 8789->8793 8792 40a610 8791->8792 8794 4043a3 __vswprintf_helper 6 API calls 8792->8794 8793->8756 8793->8766 8794->8793 8853 40a412 8795->8853 8797 40a4f9 8797->8762 8799 40a516 8798->8799 8806 40a532 8798->8806 8800 40a51d 8799->8800 8802 40a546 8799->8802 8801 403396 __vswprintf_helper 67 API calls 8800->8801 8803 40a522 8801->8803 8809 406094 8802->8809 8805 4043a3 __vswprintf_helper 6 API calls 8803->8805 8805->8806 8806->8793 8807 40f1e0 79 API calls __towlower_l 8808 40a551 8807->8808 8808->8806 8808->8807 8810 4060a7 8809->8810 8816 4060f4 8809->8816 8817 408d21 8810->8817 8813 4060d4 8813->8816 8837 40c945 8813->8837 8816->8808 8818 408ca8 __getptd_noexit 67 API calls 8817->8818 8820 408d29 8818->8820 8819 4060ac 8819->8813 8822 40d0b1 8819->8822 8820->8819 8821 4043f9 __amsg_exit 67 API calls 8820->8821 8821->8819 8823 40d0bd __wfsopen 8822->8823 8824 408d21 __getptd 67 API calls 8823->8824 8825 40d0c2 8824->8825 8826 40d0f0 8825->8826 8827 40d0d4 8825->8827 8828 40358b __lock 67 API calls 8826->8828 8830 408d21 __getptd 67 API calls 8827->8830 8829 40d0f7 8828->8829 8831 40d073 _LocaleUpdate::_LocaleUpdate 75 API calls 8829->8831 8832 40d0d9 8830->8832 8833 40d10a 8831->8833 8835 40d0e7 __wfsopen 8832->8835 8836 4043f9 __amsg_exit 67 API calls 8832->8836 8834 40d11b _LocaleUpdate::_LocaleUpdate LeaveCriticalSection 8833->8834 8834->8832 8835->8813 8836->8835 8838 40c951 __wfsopen 8837->8838 8839 408d21 __getptd 67 API calls 8838->8839 8840 40c956 8839->8840 8841 40c968 8840->8841 8842 40358b __lock 67 API calls 8840->8842 8845 40c976 __wfsopen 8841->8845 8849 4043f9 __amsg_exit 67 API calls 8841->8849 8843 40c986 8842->8843 8844 40c9cf 8843->8844 8846 40c9b7 InterlockedIncrement 8843->8846 8847 40c99d InterlockedDecrement 8843->8847 8848 40c9e0 _LocaleUpdate::_LocaleUpdate LeaveCriticalSection 8844->8848 8845->8816 8846->8844 8847->8846 8850 40c9a8 8847->8850 8848->8841 8849->8845 8850->8846 8851 401ea4 __freebuf 67 API calls 8850->8851 8852 40c9b6 8851->8852 8852->8846 8856 40a41e __wfsopen 8853->8856 8854 40a431 8855 403396 __vswprintf_helper 67 API calls 8854->8855 8857 40a436 8855->8857 8856->8854 8858 40a46f 8856->8858 8859 4043a3 __vswprintf_helper 6 API calls 8857->8859 8862 40a4b0 8858->8862 8861 40a445 __wfsopen 8859->8861 8861->8797 8863 40a4b5 8862->8863 8864 40a4dc 8862->8864 8866 40c313 LeaveCriticalSection 8863->8866 8864->8861 8866->8864 8868 404b69 LeaveCriticalSection 8867->8868 8869 404b4a 8867->8869 8868->8771 8869->8868 8870 404b51 8869->8870 8873 4034b1 LeaveCriticalSection 8870->8873 8872 404b66 8872->8771 8873->8872 8877 405bcf 8874->8877 8875 405bd3 8876 403396 __vswprintf_helper 67 API calls 8875->8876 8880 4026bf 8875->8880 8882 405bef 8876->8882 8877->8875 8879 405c31 8877->8879 8878 4043a3 __vswprintf_helper 6 API calls 8878->8880 8879->8880 8881 403396 __vswprintf_helper 67 API calls 8879->8881 8880->8406 8880->8407 8881->8882 8882->8878 8884 405b9b 8883->8884 8998 405a9a 8884->8998 8888 408acc ___crtMessageBoxW 6 API calls 8887->8888 8889 405941 8888->8889 8890 405954 LoadLibraryW 8889->8890 8892 4059dc 8889->8892 8891 405969 GetProcAddress 8890->8891 8899 402a7a 8890->8899 8891->8899 8897 408ad5 __decode_pointer 6 API calls 8892->8897 8909 405a06 8892->8909 8900 4059f9 8897->8900 8899->8468 8914 405781 8899->8914 9041 4051db 8938->9041 8942 405627 8941->8942 8943 40562e 8941->8943 8944 404701 __NMSG_WRITE 67 API calls 8942->8944 9248 405774 8943->9248 8944->8943 8947 405781 _raise 67 API calls 8949 40563f _memset 8947->8949 8948 405717 8950 40467f _abort 67 API calls 8948->8950 8949->8948 8951 4056d7 SetUnhandledExceptionFilter UnhandledExceptionFilter 8949->8951 8952 40571e 8950->8952 8951->8948 8956 405516 __wfsopen 8953->8956 8954 405529 8955 403396 __vswprintf_helper 67 API calls 8954->8955 8957 40552e 8955->8957 8956->8954 8959 405572 8956->8959 8958 4043a3 __vswprintf_helper 6 API calls 8957->8958 8964 40553e __wfsopen 8958->8964 9251 404ac6 8959->9251 8964->8339 8967 4055a3 9267 4055fe 8967->9267 8968 409104 __malloc_crt 67 API calls 8968->8967 8971 405482 __wfsopen 8970->8971 8972 405492 8971->8972 8974 4054bb 8971->8974 8973 403396 __vswprintf_helper 67 API calls 8972->8973 8975 405497 8973->8975 8976 404ac6 __lock_file 68 API calls 8974->8976 8978 4043a3 __vswprintf_helper 6 API calls 8975->8978 8977 4054c4 8976->8977 9270 406d05 8977->9270 8981 4054a7 __wfsopen 8978->8981 8981->8346 8988 405426 __wfsopen 8987->8988 8989 405436 8988->8989 8990 40542d 8988->8990 8992 404ac6 __lock_file 68 API calls 8989->8992 9308 405340 8990->9308 8993 40543e 8992->8993 9318 4052f8 8993->9318 8997 405433 __wfsopen 8997->8468 8999 405ac8 8998->8999 9000 405aaa 8998->9000 9002 405ace 8999->9002 9009 405afd 8999->9009 9001 403396 __vswprintf_helper 67 API calls 9000->9001 9003 405aaf 9001->9003 9004 403396 __vswprintf_helper 67 API calls 9002->9004 9005 4043a3 __vswprintf_helper 6 API calls 9003->9005 9006 405ad3 9004->9006 9010 4028d9 9005->9010 9008 4043a3 __vswprintf_helper 6 API calls 9006->9008 9007 403396 __vswprintf_helper 67 API calls 9007->9006 9008->9010 9009->9007 9009->9010 9010->8430 9010->8432 9044 4050e3 9041->9044 9045 405113 9044->9045 9046 4050f3 9044->9046 9048 405123 9045->9048 9055 405143 9045->9055 9047 403396 __vswprintf_helper 67 API calls 9046->9047 9049 4050f8 9047->9049 9050 403396 __vswprintf_helper 67 API calls 9048->9050 9051 4043a3 __vswprintf_helper 6 API calls 9049->9051 9052 405128 9050->9052 9054 402434 9051->9054 9053 4043a3 __vswprintf_helper 6 API calls 9052->9053 9053->9054 9054->8334 9054->8337 9055->9054 9056 40518a 9055->9056 9059 405f30 9055->9059 9056->9054 9058 405f30 __flsbuf 101 API calls 9056->9058 9058->9054 9080 405ecd 9059->9080 9062 405f62 9065 405f66 9062->9065 9073 405f73 __wassert 9062->9073 9063 405f4b 9064 403396 __vswprintf_helper 67 API calls 9063->9064 9075 405f50 9064->9075 9066 403396 __vswprintf_helper 67 API calls 9065->9066 9066->9075 9067 405fd4 9068 406063 9067->9068 9069 405fe3 9067->9069 9070 40bb28 __locking 101 API calls 9068->9070 9071 405ffa 9069->9071 9076 406017 9069->9076 9070->9075 9098 40bb28 9071->9098 9073->9067 9073->9075 9077 405fc9 9073->9077 9086 40c6bb 9073->9086 9075->9056 9076->9075 9123 40c559 9076->9123 9077->9067 9095 40c672 9077->9095 9081 405ef1 9080->9081 9082 405edc 9080->9082 9081->9062 9081->9063 9083 403396 __vswprintf_helper 67 API calls 9082->9083 9084 405ee1 9083->9084 9085 4043a3 __vswprintf_helper 6 API calls 9084->9085 9085->9081 9087 40c6d7 9086->9087 9088 40c6c8 9086->9088 9091 40c6fb 9087->9091 9092 403396 __vswprintf_helper 67 API calls 9087->9092 9089 403396 __vswprintf_helper 67 API calls 9088->9089 9090 40c6cd 9089->9090 9090->9077 9091->9077 9093 40c6eb 9092->9093 9094 4043a3 __vswprintf_helper 6 API calls 9093->9094 9094->9091 9096 409104 __malloc_crt 67 API calls 9095->9096 9097 40c687 9096->9097 9097->9067 9099 40bb34 __wfsopen 9098->9099 9100 40bb57 9099->9100 9101 40bb3c 9099->9101 9103 40bb65 9100->9103 9106 40bba6 9100->9106 9102 4033a9 __commit 67 API calls 9101->9102 9104 40bb41 9102->9104 9105 4033a9 __commit 67 API calls 9103->9105 9107 403396 __vswprintf_helper 67 API calls 9104->9107 9108 40bb6a 9105->9108 9155 40c273 9106->9155 9118 40bb49 __wfsopen 9107->9118 9110 403396 __vswprintf_helper 67 API calls 9108->9110 9112 40bb71 9110->9112 9111 40bbac 9113 40bbb9 9111->9113 9114 40bbcf 9111->9114 9115 4043a3 __vswprintf_helper 6 API calls 9112->9115 9165 40b3f5 9113->9165 9117 403396 __vswprintf_helper 67 API calls 9114->9117 9115->9118 9120 40bbd4 9117->9120 9118->9075 9119 40bbc7 9224 40bbfa 9119->9224 9121 4033a9 __commit 67 API calls 9120->9121 9121->9119 9124 40c565 __wfsopen 9123->9124 9125 40c592 9124->9125 9126 40c576 9124->9126 9128 40c5a0 9125->9128 9129 40c5c1 9125->9129 9127 4033a9 __commit 67 API calls 9126->9127 9131 40c57b 9127->9131 9130 4033a9 __commit 67 API calls 9128->9130 9133 40c5e1 9129->9133 9134 40c607 9129->9134 9132 40c5a5 9130->9132 9135 403396 __vswprintf_helper 67 API calls 9131->9135 9137 403396 __vswprintf_helper 67 API calls 9132->9137 9138 4033a9 __commit 67 API calls 9133->9138 9136 40c273 ___lock_fhandle 68 API calls 9134->9136 9149 40c583 __wfsopen 9135->9149 9139 40c60d 9136->9139 9140 40c5ac 9137->9140 9141 40c5e6 9138->9141 9142 40c636 9139->9142 9143 40c61a 9139->9143 9144 4043a3 __vswprintf_helper 6 API calls 9140->9144 9145 403396 __vswprintf_helper 67 API calls 9141->9145 9147 403396 __vswprintf_helper 67 API calls 9142->9147 9146 40c4d4 __lseeki64_nolock 69 API calls 9143->9146 9144->9149 9148 40c5ed 9145->9148 9150 40c62b 9146->9150 9151 40c63b 9147->9151 9152 4043a3 __vswprintf_helper 6 API calls 9148->9152 9149->9075 9244 40c668 9150->9244 9153 4033a9 __commit 67 API calls 9151->9153 9152->9149 9153->9150 9156 40c27f __wfsopen 9155->9156 9157 40c2da 9156->9157 9159 40358b __lock 67 API calls 9156->9159 9158 40c2df EnterCriticalSection 9157->9158 9161 40c2fc __wfsopen 9157->9161 9158->9161 9160 40c2ab 9159->9160 9162 40c2c2 9160->9162 9163 4090a4 __getstream InitializeCriticalSectionAndSpinCount 9160->9163 9161->9111 9227 40c30a 9162->9227 9163->9162 9166 40b404 __write_nolock 9165->9166 9167 40b436 9166->9167 9168 40b45d 9166->9168 9197 40b42b 9166->9197 9170 4033a9 __commit 67 API calls 9167->9170 9171 40b4c5 9168->9171 9172 40b49f 9168->9172 9169 401e95 __getdrive 5 API calls 9173 40bb26 9169->9173 9174 40b43b 9170->9174 9176 40b4d9 9171->9176 9230 40c4d4 9171->9230 9175 4033a9 __commit 67 API calls 9172->9175 9173->9119 9177 403396 __vswprintf_helper 67 API calls 9174->9177 9180 40b4a4 9175->9180 9179 40c6bb __write_nolock 67 API calls 9176->9179 9178 40b442 9177->9178 9182 4043a3 __vswprintf_helper 6 API calls 9178->9182 9183 40b4e4 9179->9183 9184 403396 __vswprintf_helper 67 API calls 9180->9184 9182->9197 9185 40b78a 9183->9185 9190 408d21 __getptd 67 API calls 9183->9190 9186 40b4ad 9184->9186 9188 40ba59 WriteFile 9185->9188 9189 40b79a 9185->9189 9187 4043a3 __vswprintf_helper 6 API calls 9186->9187 9187->9197 9193 40b76c 9188->9193 9194 40ba8c GetLastError 9188->9194 9191 40b878 9189->9191 9213 40b7ae 9189->9213 9192 40b4ff GetConsoleMode 9190->9192 9211 40b958 9191->9211 9217 40b887 9191->9217 9192->9185 9196 40b52a 9192->9196 9195 40bad7 9193->9195 9193->9197 9199 40baaa 9193->9199 9194->9193 9195->9197 9200 403396 __vswprintf_helper 67 API calls 9195->9200 9196->9185 9198 40b53c GetConsoleCP 9196->9198 9197->9169 9198->9193 9221 40b55f 9198->9221 9203 40bab5 9199->9203 9204 40bac9 9199->9204 9201 40bafa 9200->9201 9206 4033a9 __commit 67 API calls 9201->9206 9202 40b9be WideCharToMultiByte 9202->9194 9208 40b9f5 WriteFile 9202->9208 9207 403396 __vswprintf_helper 67 API calls 9203->9207 9210 4033bc __dosmaperr 67 API calls 9204->9210 9205 40b81c WriteFile 9205->9194 9205->9213 9206->9197 9214 40baba 9207->9214 9208->9211 9212 40ba2c GetLastError 9208->9212 9209 40b8fc WriteFile 9209->9194 9209->9217 9210->9197 9211->9193 9211->9195 9211->9202 9211->9208 9212->9211 9213->9193 9213->9195 9213->9205 9216 4033a9 __commit 67 API calls 9214->9216 9216->9197 9217->9193 9217->9195 9217->9209 9218 40d3db 79 API calls __fassign 9218->9221 9219 40b60b WideCharToMultiByte 9219->9193 9220 40b63c WriteFile 9219->9220 9220->9194 9220->9221 9221->9193 9221->9194 9221->9218 9221->9219 9222 40f295 11 API calls __putwch_nolock 9221->9222 9223 40b690 WriteFile 9221->9223 9240 40d42d 9221->9240 9222->9221 9223->9194 9223->9221 9243 40c313 LeaveCriticalSection 9224->9243 9226 40bc02 9226->9118 9228 4034b1 _doexit LeaveCriticalSection 9227->9228 9229 40c311 9228->9229 9229->9157 9231 40c1fc __commit 67 API calls 9230->9231 9232 40c4f2 9231->9232 9233 40c4fa 9232->9233 9234 40c50b SetFilePointer 9232->9234 9235 403396 __vswprintf_helper 67 API calls 9233->9235 9236 40c523 GetLastError 9234->9236 9238 40c4ff 9234->9238 9235->9238 9237 40c52d 9236->9237 9236->9238 9239 4033bc __dosmaperr 67 API calls 9237->9239 9238->9176 9239->9238 9241 40d3f5 __isleadbyte_l 77 API calls 9240->9241 9242 40d43c 9241->9242 9242->9221 9243->9226 9247 40c313 LeaveCriticalSection 9244->9247 9246 40c670 9246->9149 9247->9246 9249 408ad5 __decode_pointer 6 API calls 9248->9249 9250 405634 9249->9250 9250->8947 9250->8949 9252 404ad8 9251->9252 9253 404afa EnterCriticalSection 9251->9253 9252->9253 9254 404ae0 9252->9254 9255 404af0 9253->9255 9256 40358b __lock 67 API calls 9254->9256 9257 405290 9255->9257 9256->9255 9258 4052a9 9257->9258 9262 4052cb 9257->9262 9259 405ecd __fileno 67 API calls 9258->9259 9258->9262 9260 4052c4 9259->9260 9261 40bb28 __locking 101 API calls 9260->9261 9261->9262 9263 405eff 9262->9263 9264 405591 9263->9264 9265 405f0f 9263->9265 9264->8967 9264->8968 9265->9264 9266 401ea4 __freebuf 67 API calls 9265->9266 9266->9264 9268 404b39 _setvbuf 2 API calls 9267->9268 9269 405606 9268->9269 9269->8964 9271 405ecd __fileno 67 API calls 9270->9271 9272 406d14 9271->9272 9273 40c6bb __write_nolock 67 API calls 9272->9273 9275 406d1a __wassert 9273->9275 9274 4054ce 9277 40616d 9274->9277 9275->9274 9276 409104 __malloc_crt 67 API calls 9275->9276 9276->9274 9278 406094 _LocaleUpdate::_LocaleUpdate 77 API calls 9277->9278 9279 4061d4 9278->9279 9280 4061dc 9279->9280 9289 406213 __aulldvrm __woutput_l _strlen 9279->9289 9281 403396 __vswprintf_helper 67 API calls 9280->9281 9282 4061e1 9281->9282 9283 4043a3 __vswprintf_helper 6 API calls 9282->9283 9285 4061f1 9283->9285 9284 401e95 __getdrive 5 API calls 9286 4054de 9284->9286 9285->9284 9298 406da1 9286->9298 9287 40a7ff 103 API calls _write_string 9287->9289 9288 401ea4 __freebuf 67 API calls 9288->9289 9289->9285 9289->9287 9289->9288 9291 406ca3 9289->9291 9292 409104 __malloc_crt 67 API calls 9289->9292 9294 40a82e 103 API calls _write_multi_char 9289->9294 9295 40611b 103 API calls _write_string 9289->9295 9296 40d2c4 79 API calls __fassign 9289->9296 9297 408ad5 6 API calls __decode_pointer 9289->9297 9305 40d3f5 9289->9305 9293 403396 __vswprintf_helper 67 API calls 9291->9293 9292->9289 9293->9282 9294->9289 9295->9289 9296->9289 9297->9289 9299 4054e8 9298->9299 9300 406dac 9298->9300 9302 405500 9299->9302 9300->9299 9301 405290 __flush 101 API calls 9300->9301 9301->9299 9303 404b39 _setvbuf 2 API calls 9302->9303 9304 405508 9303->9304 9304->8981 9306 406094 _LocaleUpdate::_LocaleUpdate 77 API calls 9305->9306 9307 40d408 9306->9307 9307->9289 9309 40534c __wfsopen 9308->9309 9310 40358b __lock 67 API calls 9309->9310 9311 40535b 9310->9311 9312 4053f3 9311->9312 9315 404b07 __getstream 68 API calls 9311->9315 9317 4052f8 105 API calls __fflush_nolock 9311->9317 9331 4053e2 9311->9331 9334 405411 9312->9334 9314 4053ff __wfsopen 9314->8997 9315->9311 9317->9311 9319 405305 9318->9319 9320 40530e 9318->9320 9321 405340 _flsall 105 API calls 9319->9321 9322 405290 __flush 101 API calls 9320->9322 9323 40530b 9321->9323 9324 405314 9322->9324 9328 405463 9323->9328 9324->9323 9325 405ecd __fileno 67 API calls 9324->9325 9326 40532d 9325->9326 9338 40bc04 9326->9338 9329 404b39 _setvbuf 2 API calls 9328->9329 9330 40546b 9329->9330 9330->8997 9332 404b75 __getstream 2 API calls 9331->9332 9333 4053f0 9332->9333 9333->9311 9337 4034b1 LeaveCriticalSection 9334->9337 9336 405418 9336->9314 9337->9336 9339 40bc10 __wfsopen 9338->9339 9340 40bc18 9339->9340 9341 40bc2b 9339->9341 9342 403396 __vswprintf_helper 67 API calls 9340->9342 9343 40bc39 9341->9343 9346 40bc73 9341->9346 9349 40bc1d __wfsopen 9342->9349 9344 403396 __vswprintf_helper 67 API calls 9343->9344 9345 40bc3e 9344->9345 9347 4043a3 __vswprintf_helper 6 API calls 9345->9347 9348 40c273 ___lock_fhandle 68 API calls 9346->9348 9347->9349 9350 40bc79 9348->9350 9349->9323 9351 40bcb2 9350->9351 9360 40c1fc 9350->9360 9352 403396 __vswprintf_helper 67 API calls 9351->9352 9354 40bcbc 9352->9354 9373 40bcdb 9354->9373 9355 40bc8e FlushFileBuffers 9356 40bca5 9355->9356 9357 40bc9a GetLastError 9355->9357 9356->9354 9359 4033a9 __commit 67 API calls 9356->9359 9357->9356 9359->9351 9361 40c209 9360->9361 9362 40c221 9360->9362 9363 4033a9 __commit 67 API calls 9361->9363 9364 4033a9 __commit 67 API calls 9362->9364 9366 40c266 9362->9366 9365 40c20e 9363->9365 9367 40c24f 9364->9367 9368 403396 __vswprintf_helper 67 API calls 9365->9368 9366->9355 9370 403396 __vswprintf_helper 67 API calls 9367->9370 9369 40c216 9368->9369 9369->9355 9371 40c256 9370->9371 9372 4043a3 __vswprintf_helper 6 API calls 9371->9372 9372->9366 9376 40c313 LeaveCriticalSection 9373->9376 9375 40bce3 9375->9349 9376->9375 9404 402ee7 GetSystemTimeAsFileTime 9377->9404 9379 40188b 9380 401920 9379->9380 9406 402e5a 9380->9406 9383 402cc2 9384 402cce __wfsopen 9383->9384 9385 402ce1 9384->9385 9386 402d0d 9384->9386 9387 403396 __vswprintf_helper 67 API calls 9385->9387 9388 404ac6 __lock_file 68 API calls 9386->9388 9389 402ce6 9387->9389 9390 402d16 9388->9390 9391 4043a3 __vswprintf_helper 6 API calls 9389->9391 9392 405ecd __fileno 67 API calls 9390->9392 9403 402d90 9390->9403 9395 402cf6 __wfsopen 9391->9395 9401 402d26 9392->9401 9393 406d05 __stbuf 67 API calls 9396 402da2 9393->9396 9395->8481 9398 406da1 __ftbuf 101 API calls 9396->9398 9397 403396 __vswprintf_helper 67 API calls 9399 402d80 9397->9399 9400 402dbc 9398->9400 9402 4043a3 __vswprintf_helper 6 API calls 9399->9402 9629 402dd4 9400->9629 9401->9397 9401->9403 9402->9403 9403->9393 9403->9400 9405 402f17 __aulldiv 9404->9405 9405->9379 9407 402e72 9406->9407 9408 402e6d 9406->9408 9409 403396 __vswprintf_helper 67 API calls 9407->9409 9408->9407 9415 402e99 9408->9415 9410 402e77 9409->9410 9411 4043a3 __vswprintf_helper 6 API calls 9410->9411 9419 40189d 9411->9419 9412 402ea8 9414 403396 __vswprintf_helper 67 API calls 9412->9414 9413 402ec3 9420 407fda 9413->9420 9414->9419 9415->9412 9415->9413 9417 402ecd 9417->9419 9459 407e28 9417->9459 9419->9383 9421 408014 _memset 9420->9421 9422 407ff6 9420->9422 9426 40802c 9421->9426 9431 408045 9421->9431 9423 403396 __vswprintf_helper 67 API calls 9422->9423 9424 407ffb 9423->9424 9425 4043a3 __vswprintf_helper 6 API calls 9424->9425 9458 40800a __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 9425->9458 9427 403396 __vswprintf_helper 67 API calls 9426->9427 9430 408031 9427->9430 9428 408063 9432 403396 __vswprintf_helper 67 API calls 9428->9432 9429 408074 9470 40ddd4 9429->9470 9434 4043a3 __vswprintf_helper 6 API calls 9430->9434 9431->9428 9431->9429 9432->9458 9434->9458 9435 408079 9478 40d5c9 9435->9478 9438 408091 9484 40d602 9438->9484 9439 40427b __invoke_watson 10 API calls 9439->9438 9442 4080ac 9490 40d63b 9442->9490 9443 40427b __invoke_watson 10 API calls 9443->9442 9446 4080c7 9447 408144 9446->9447 9449 4080e0 9446->9449 9450 40de64 __gmtime64_s 67 API calls 9447->9450 9448 40427b __invoke_watson 10 API calls 9448->9446 9496 40de64 9449->9496 9452 40814b 9450->9452 9454 40de23 __localtime64_s 67 API calls 9452->9454 9452->9458 9453 4080f8 9453->9458 9505 40de23 9453->9505 9454->9458 9456 408111 9457 40de64 __gmtime64_s 67 API calls 9456->9457 9456->9458 9457->9458 9458->9417 9460 407e3e 9459->9460 9463 407e39 9459->9463 9461 403396 __vswprintf_helper 67 API calls 9460->9461 9462 407e43 9461->9462 9464 4043a3 __vswprintf_helper 6 API calls 9462->9464 9463->9460 9466 407ea2 9463->9466 9469 407e52 _store_dt 9464->9469 9465 403396 __vswprintf_helper 67 API calls 9467 407f13 9465->9467 9466->9465 9466->9469 9468 4043a3 __vswprintf_helper 6 API calls 9467->9468 9468->9469 9469->9419 9471 40dde0 __wfsopen 9470->9471 9472 40de14 __wfsopen 9471->9472 9473 40358b __lock 67 API calls 9471->9473 9472->9435 9474 40ddf1 9473->9474 9475 40de02 9474->9475 9513 40d6bf 9474->9513 9566 40de1a 9475->9566 9479 408082 9478->9479 9480 40d5d8 9478->9480 9479->9438 9479->9439 9481 403396 __vswprintf_helper 67 API calls 9480->9481 9482 40d5dd 9481->9482 9483 4043a3 __vswprintf_helper 6 API calls 9482->9483 9483->9479 9485 40d611 9484->9485 9486 40809d 9484->9486 9487 403396 __vswprintf_helper 67 API calls 9485->9487 9486->9442 9486->9443 9488 40d616 9487->9488 9489 4043a3 __vswprintf_helper 6 API calls 9488->9489 9489->9486 9491 40d64a 9490->9491 9495 4080b8 9490->9495 9492 403396 __vswprintf_helper 67 API calls 9491->9492 9493 40d64f 9492->9493 9494 4043a3 __vswprintf_helper 6 API calls 9493->9494 9494->9495 9495->9446 9495->9448 9497 40de98 _memset 9496->9497 9498 40de7a 9496->9498 9497->9498 9501 40deaf 9497->9501 9499 403396 __vswprintf_helper 67 API calls 9498->9499 9500 40de7f 9499->9500 9502 4043a3 __vswprintf_helper 6 API calls 9500->9502 9503 403396 __vswprintf_helper 67 API calls 9501->9503 9504 40de8e __gmtime64_s __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 9501->9504 9502->9504 9503->9504 9504->9453 9506 40de2f __wfsopen 9505->9506 9507 40358b __lock 67 API calls 9506->9507 9508 40de36 9507->9508 9605 40dbfc 9508->9605 9512 40de52 __wfsopen 9512->9456 9514 40d6cb __wfsopen 9513->9514 9515 40358b __lock 67 API calls 9514->9515 9516 40d6e6 __tzset_nolock 9515->9516 9517 40d63b __get_daylight 67 API calls 9516->9517 9518 40d6fb 9517->9518 9519 40d70a 9518->9519 9520 40427b __invoke_watson 10 API calls 9518->9520 9521 40d5c9 __get_daylight 67 API calls 9519->9521 9520->9519 9522 40d716 9521->9522 9523 40d725 9522->9523 9524 40427b __invoke_watson 10 API calls 9522->9524 9525 40d602 __get_daylight 67 API calls 9523->9525 9524->9523 9526 40d731 9525->9526 9527 40d740 9526->9527 9528 40427b __invoke_watson 10 API calls 9526->9528 9569 40fbd9 9527->9569 9528->9527 9533 40d7f0 9534 40d806 GetTimeZoneInformation 9533->9534 9536 401ea4 __freebuf 67 API calls 9533->9536 9539 40d819 WideCharToMultiByte 9534->9539 9545 40d7e8 __tzset_nolock 9534->9545 9535 40d7a1 _strlen 9541 409104 __malloc_crt 67 API calls 9535->9541 9537 40d7ff 9536->9537 9537->9534 9538 40d778 __tzset_nolock 9538->9535 9544 401ea4 __freebuf 67 API calls 9538->9544 9538->9545 9542 40d88f WideCharToMultiByte 9539->9542 9546 40d7af _strlen 9541->9546 9542->9545 9544->9535 9580 40d96b 9545->9580 9546->9545 9547 409beb _strcpy_s 67 API calls 9546->9547 9549 40d7d3 9547->9549 9549->9545 9551 40427b __invoke_watson 10 API calls 9549->9551 9551->9545 9552 409aa1 __NMSG_WRITE 67 API calls 9553 40d921 9552->9553 9554 40d932 9553->9554 9555 40427b __invoke_watson 10 API calls 9553->9555 9583 410178 9554->9583 9555->9554 9558 40d9a0 9560 409aa1 __NMSG_WRITE 67 API calls 9558->9560 9563 40d9e1 __wfsopen __tzset_nolock 9558->9563 9559 410178 ___ansicp 91 API calls 9562 40d980 9559->9562 9561 40d9d0 9560->9561 9561->9563 9564 40427b __invoke_watson 10 API calls 9561->9564 9562->9558 9565 410178 ___ansicp 91 API calls 9562->9565 9563->9475 9564->9563 9565->9558 9604 4034b1 LeaveCriticalSection 9566->9604 9568 40de21 9568->9472 9570 408d21 __getptd 67 API calls 9569->9570 9572 40fbde 9570->9572 9571 40d748 9574 41018e 9571->9574 9572->9571 9573 40d0b1 _LocaleUpdate::_LocaleUpdate 75 API calls 9572->9573 9573->9571 9575 4101a7 9574->9575 9576 40d76a 9574->9576 9575->9576 9578 4101b9 _strlen 9575->9578 9586 410954 9575->9586 9576->9533 9576->9538 9578->9576 9596 41093a 9578->9596 9599 4034b1 LeaveCriticalSection 9580->9599 9582 40d909 9582->9552 9582->9563 9600 41014d 9583->9600 9589 41096f 9586->9589 9594 4109d4 9586->9594 9587 410975 WideCharToMultiByte 9587->9589 9587->9594 9588 409149 __calloc_crt 67 API calls 9588->9589 9589->9587 9589->9588 9590 410998 WideCharToMultiByte 9589->9590 9593 4110d7 ___crtsetenv 119 API calls 9589->9593 9589->9594 9595 401ea4 __freebuf 67 API calls 9589->9595 9590->9589 9591 4109e0 9590->9591 9592 401ea4 __freebuf 67 API calls 9591->9592 9592->9594 9593->9589 9594->9578 9595->9589 9597 41084c __mbsnbicoll_l 111 API calls 9596->9597 9598 41094f 9597->9598 9598->9578 9599->9582 9601 410166 9600->9601 9602 40ff1e strtoxl 91 API calls 9601->9602 9603 40d94b 9602->9603 9603->9558 9603->9559 9604->9568 9606 40d5c9 __get_daylight 67 API calls 9605->9606 9607 40dc13 9606->9607 9608 40427b __invoke_watson 10 API calls 9607->9608 9609 40dc22 9607->9609 9608->9609 9610 40dd10 9609->9610 9611 40dc58 9609->9611 9615 40dc2a 9609->9615 9612 40da05 _cvtdate 67 API calls 9610->9612 9622 40da05 9611->9622 9613 40dd49 9612->9613 9616 40da05 _cvtdate 67 API calls 9613->9616 9619 40de5b 9615->9619 9616->9615 9618 40da05 _cvtdate 67 API calls 9618->9615 9628 4034b1 LeaveCriticalSection 9619->9628 9621 40de62 9621->9512 9623 40da25 9622->9623 9624 40db78 9623->9624 9625 40d602 __get_daylight 67 API calls 9623->9625 9624->9618 9626 40dba1 9625->9626 9626->9624 9627 40427b __invoke_watson 10 API calls 9626->9627 9627->9624 9628->9621 9630 404b39 _setvbuf 2 API calls 9629->9630 9631 402ddc 9630->9631 9631->9395 9633 405212 9632->9633 9634 40522f 9632->9634 9635 403396 __vswprintf_helper 67 API calls 9633->9635 9636 40523c 9634->9636 9638 405249 9634->9638 9637 405217 9635->9637 9639 403396 __vswprintf_helper 67 API calls 9636->9639 9640 4043a3 __vswprintf_helper 6 API calls 9637->9640 9642 4050e3 __vswprintf_helper 101 API calls 9638->9642 9641 405241 9639->9641 9645 40161b 9640->9645 9644 4043a3 __vswprintf_helper 6 API calls 9641->9644 9643 405260 9642->9643 9643->9645 9646 403396 __vswprintf_helper 67 API calls 9643->9646 9644->9645 9645->8238 9646->9641 9648 402be1 9647->9648 9649 402bc5 9647->9649 9650 402bda 9648->9650 9652 405290 __flush 101 API calls 9648->9652 9651 403396 __vswprintf_helper 67 API calls 9649->9651 9663 402c9c 9650->9663 9653 402bca 9651->9653 9654 402bed 9652->9654 9655 4043a3 __vswprintf_helper 6 API calls 9653->9655 9656 405eff __freebuf 67 API calls 9654->9656 9655->9650 9657 402bf5 9656->9657 9658 405ecd __fileno 67 API calls 9657->9658 9659 402bfb 9658->9659 9666 405e00 9659->9666 9661 402c01 9661->9650 9662 401ea4 __freebuf 67 API calls 9661->9662 9662->9650 9664 404b39 _setvbuf 2 API calls 9663->9664 9665 402ca2 9664->9665 9665->8495 9667 405e0c __wfsopen 9666->9667 9668 405e14 9667->9668 9672 405e2f 9667->9672 9669 4033a9 __commit 67 API calls 9668->9669 9671 405e19 9669->9671 9670 405e3d 9673 4033a9 __commit 67 API calls 9670->9673 9676 403396 __vswprintf_helper 67 API calls 9671->9676 9672->9670 9675 405e7e 9672->9675 9674 405e42 9673->9674 9677 403396 __vswprintf_helper 67 API calls 9674->9677 9678 40c273 ___lock_fhandle 68 API calls 9675->9678 9684 405e21 __wfsopen 9676->9684 9679 405e49 9677->9679 9680 405e84 9678->9680 9681 4043a3 __vswprintf_helper 6 API calls 9679->9681 9682 405e91 9680->9682 9683 405e9f 9680->9683 9681->9684 9689 405d64 9682->9689 9686 403396 __vswprintf_helper 67 API calls 9683->9686 9684->9661 9687 405e99 9686->9687 9704 405ec3 9687->9704 9690 40c1fc __commit 67 API calls 9689->9690 9693 405d74 9690->9693 9691 405dca 9707 40c176 9691->9707 9693->9691 9694 405da8 9693->9694 9696 40c1fc __commit 67 API calls 9693->9696 9694->9691 9697 40c1fc __commit 67 API calls 9694->9697 9699 405d9f 9696->9699 9700 405db4 CloseHandle 9697->9700 9698 405df4 9698->9687 9703 40c1fc __commit 67 API calls 9699->9703 9700->9691 9701 405dc0 GetLastError 9700->9701 9701->9691 9702 4033bc __dosmaperr 67 API calls 9702->9698 9703->9694 9716 40c313 LeaveCriticalSection 9704->9716 9706 405ecb 9706->9684 9708 40c1e2 9707->9708 9711 40c187 9707->9711 9709 403396 __vswprintf_helper 67 API calls 9708->9709 9710 40c1e7 9709->9710 9712 4033a9 __commit 67 API calls 9710->9712 9711->9708 9714 40c1b2 9711->9714 9713 405dd2 9712->9713 9713->9698 9713->9702 9714->9713 9715 40c1d2 SetStdHandle 9714->9715 9715->9713 9716->9706 10149 40c33a 10150 40c346 __wfsopen 10149->10150 10151 4034c8 __mtinitlocknum 67 API calls 10150->10151 10152 40c356 10151->10152 10153 40c35b __wfsopen 10152->10153 10154 40358b __lock 67 API calls 10152->10154 10166 40c36a 10154->10166 10155 40c4ad 10170 40c4cb 10155->10170 10157 40c443 10158 409149 __calloc_crt 67 API calls 10157->10158 10161 40c44c 10158->10161 10159 40358b __lock 67 API calls 10159->10166 10160 40c3eb EnterCriticalSection 10162 40c3fb LeaveCriticalSection 10160->10162 10160->10166 10161->10155 10163 40c273 ___lock_fhandle 68 API calls 10161->10163 10162->10166 10163->10155 10164 4090a4 __getstream InitializeCriticalSectionAndSpinCount 10164->10166 10166->10155 10166->10157 10166->10159 10166->10160 10166->10164 10167 40c40d 10166->10167 10173 4034b1 LeaveCriticalSection 10167->10173 10169 40c414 10169->10166 10174 4034b1 LeaveCriticalSection 10170->10174 10172 40c4d2 10172->10153 10173->10169 10174->10172 10175 408d3b 10177 408d47 __wfsopen 10175->10177 10176 408d5f 10180 408d6d 10176->10180 10182 401ea4 __freebuf 67 API calls 10176->10182 10177->10176 10178 408e49 __wfsopen 10177->10178 10179 401ea4 __freebuf 67 API calls 10177->10179 10179->10176 10181 408d7b 10180->10181 10183 401ea4 __freebuf 67 API calls 10180->10183 10184 401ea4 __freebuf 67 API calls 10181->10184 10185 408d89 10181->10185 10182->10180 10183->10181 10184->10185 10186 401ea4 __freebuf 67 API calls 10185->10186 10188 408d97 10185->10188 10186->10188 10187 408da5 10189 408db3 10187->10189 10191 401ea4 __freebuf 67 API calls 10187->10191 10188->10187 10190 401ea4 __freebuf 67 API calls 10188->10190 10192 408dc4 10189->10192 10193 401ea4 __freebuf 67 API calls 10189->10193 10190->10187 10191->10189 10194 40358b __lock 67 API calls 10192->10194 10193->10192 10195 408dcc 10194->10195 10196 408df1 10195->10196 10197 408dd8 InterlockedDecrement 10195->10197 10211 408e55 10196->10211 10197->10196 10199 408de3 10197->10199 10199->10196 10202 401ea4 __freebuf 67 API calls 10199->10202 10201 40358b __lock 67 API calls 10203 408e05 10201->10203 10202->10196 10204 408e36 10203->10204 10214 40cfda 10203->10214 10258 408e61 10204->10258 10208 401ea4 __freebuf 67 API calls 10208->10178 10261 4034b1 LeaveCriticalSection 10211->10261 10213 408dfe 10213->10201 10215 40cfeb InterlockedDecrement 10214->10215 10216 408e1a 10214->10216 10217 40d000 InterlockedDecrement 10215->10217 10218 40d003 10215->10218 10216->10204 10228 40ce02 10216->10228 10217->10218 10219 40d010 10218->10219 10220 40d00d InterlockedDecrement 10218->10220 10221 40d01a InterlockedDecrement 10219->10221 10222 40d01d 10219->10222 10220->10219 10221->10222 10223 40d027 InterlockedDecrement 10222->10223 10224 40d02a 10222->10224 10223->10224 10225 40d043 InterlockedDecrement 10224->10225 10226 40d05e InterlockedDecrement 10224->10226 10227 40d053 InterlockedDecrement 10224->10227 10225->10224 10226->10216 10227->10224 10229 40ce86 10228->10229 10230 40ce19 10228->10230 10231 40ced3 10229->10231 10232 401ea4 __freebuf 67 API calls 10229->10232 10230->10229 10238 40ce4d 10230->10238 10241 401ea4 __freebuf 67 API calls 10230->10241 10248 40cefa 10231->10248 10286 40f971 10231->10286 10233 40cea7 10232->10233 10235 401ea4 __freebuf 67 API calls 10233->10235 10237 40ceba 10235->10237 10243 401ea4 __freebuf 67 API calls 10237->10243 10244 401ea4 __freebuf 67 API calls 10238->10244 10257 40ce6e 10238->10257 10239 401ea4 __freebuf 67 API calls 10245 40ce7b 10239->10245 10240 40cf3f 10246 401ea4 __freebuf 67 API calls 10240->10246 10247 40ce42 10241->10247 10242 401ea4 __freebuf 67 API calls 10242->10248 10249 40cec8 10243->10249 10250 40ce63 10244->10250 10252 401ea4 __freebuf 67 API calls 10245->10252 10253 40cf45 10246->10253 10262 40fb4b 10247->10262 10248->10240 10251 401ea4 67 API calls __freebuf 10248->10251 10255 401ea4 __freebuf 67 API calls 10249->10255 10278 40fb06 10250->10278 10251->10248 10252->10229 10253->10204 10255->10231 10257->10239 10374 4034b1 LeaveCriticalSection 10258->10374 10260 408e43 10260->10208 10261->10213 10263 40fb58 10262->10263 10277 40fbd5 10262->10277 10264 401ea4 __freebuf 67 API calls 10263->10264 10268 40fb69 10263->10268 10264->10268 10265 401ea4 __freebuf 67 API calls 10266 40fb7b 10265->10266 10267 40fb8d 10266->10267 10269 401ea4 __freebuf 67 API calls 10266->10269 10270 40fb9f 10267->10270 10271 401ea4 __freebuf 67 API calls 10267->10271 10268->10265 10268->10266 10269->10267 10272 40fbb1 10270->10272 10274 401ea4 __freebuf 67 API calls 10270->10274 10271->10270 10273 40fbc3 10272->10273 10275 401ea4 __freebuf 67 API calls 10272->10275 10276 401ea4 __freebuf 67 API calls 10273->10276 10273->10277 10274->10272 10275->10273 10276->10277 10277->10238 10279 40fb13 10278->10279 10285 40fb47 10278->10285 10280 40fb23 10279->10280 10281 401ea4 __freebuf 67 API calls 10279->10281 10282 401ea4 __freebuf 67 API calls 10280->10282 10283 40fb35 10280->10283 10281->10280 10282->10283 10284 401ea4 __freebuf 67 API calls 10283->10284 10283->10285 10284->10285 10285->10257 10287 40f982 10286->10287 10288 40cef3 10286->10288 10289 401ea4 __freebuf 67 API calls 10287->10289 10288->10242 10290 40f98a 10289->10290 10291 401ea4 __freebuf 67 API calls 10290->10291 10292 40f992 10291->10292 10293 401ea4 __freebuf 67 API calls 10292->10293 10294 40f99a 10293->10294 10295 401ea4 __freebuf 67 API calls 10294->10295 10296 40f9a2 10295->10296 10297 401ea4 __freebuf 67 API calls 10296->10297 10298 40f9aa 10297->10298 10299 401ea4 __freebuf 67 API calls 10298->10299 10300 40f9b2 10299->10300 10301 401ea4 __freebuf 67 API calls 10300->10301 10302 40f9b9 10301->10302 10303 401ea4 __freebuf 67 API calls 10302->10303 10304 40f9c1 10303->10304 10305 401ea4 __freebuf 67 API calls 10304->10305 10306 40f9c9 10305->10306 10307 401ea4 __freebuf 67 API calls 10306->10307 10308 40f9d1 10307->10308 10309 401ea4 __freebuf 67 API calls 10308->10309 10310 40f9d9 10309->10310 10311 401ea4 __freebuf 67 API calls 10310->10311 10312 40f9e1 10311->10312 10313 401ea4 __freebuf 67 API calls 10312->10313 10314 40f9e9 10313->10314 10315 401ea4 __freebuf 67 API calls 10314->10315 10316 40f9f1 10315->10316 10317 401ea4 __freebuf 67 API calls 10316->10317 10318 40f9f9 10317->10318 10319 401ea4 __freebuf 67 API calls 10318->10319 10320 40fa01 10319->10320 10321 401ea4 __freebuf 67 API calls 10320->10321 10322 40fa0c 10321->10322 10323 401ea4 __freebuf 67 API calls 10322->10323 10324 40fa14 10323->10324 10325 401ea4 __freebuf 67 API calls 10324->10325 10326 40fa1c 10325->10326 10327 401ea4 __freebuf 67 API calls 10326->10327 10328 40fa24 10327->10328 10329 401ea4 __freebuf 67 API calls 10328->10329 10330 40fa2c 10329->10330 10331 401ea4 __freebuf 67 API calls 10330->10331 10332 40fa34 10331->10332 10333 401ea4 __freebuf 67 API calls 10332->10333 10334 40fa3c 10333->10334 10335 401ea4 __freebuf 67 API calls 10334->10335 10336 40fa44 10335->10336 10337 401ea4 __freebuf 67 API calls 10336->10337 10338 40fa4c 10337->10338 10339 401ea4 __freebuf 67 API calls 10338->10339 10340 40fa54 10339->10340 10341 401ea4 __freebuf 67 API calls 10340->10341 10342 40fa5c 10341->10342 10343 401ea4 __freebuf 67 API calls 10342->10343 10344 40fa64 10343->10344 10345 401ea4 __freebuf 67 API calls 10344->10345 10346 40fa6c 10345->10346 10347 401ea4 __freebuf 67 API calls 10346->10347 10348 40fa74 10347->10348 10349 401ea4 __freebuf 67 API calls 10348->10349 10350 40fa7c 10349->10350 10351 401ea4 __freebuf 67 API calls 10350->10351 10352 40fa84 10351->10352 10353 401ea4 __freebuf 67 API calls 10352->10353 10354 40fa92 10353->10354 10355 401ea4 __freebuf 67 API calls 10354->10355 10356 40fa9d 10355->10356 10357 401ea4 __freebuf 67 API calls 10356->10357 10358 40faa8 10357->10358 10359 401ea4 __freebuf 67 API calls 10358->10359 10360 40fab3 10359->10360 10361 401ea4 __freebuf 67 API calls 10360->10361 10362 40fabe 10361->10362 10363 401ea4 __freebuf 67 API calls 10362->10363 10364 40fac9 10363->10364 10365 401ea4 __freebuf 67 API calls 10364->10365 10366 40fad4 10365->10366 10367 401ea4 __freebuf 67 API calls 10366->10367 10368 40fadf 10367->10368 10369 401ea4 __freebuf 67 API calls 10368->10369 10370 40faea 10369->10370 10371 401ea4 __freebuf 67 API calls 10370->10371 10372 40faf5 10371->10372 10373 401ea4 __freebuf 67 API calls 10372->10373 10373->10288 10374->10260

      Control-flow Graph

      APIs
      • _memset.LIBCMT ref: 00401B33
      • _memset.LIBCMT ref: 00401B43
      • GetProcessHeap.KERNEL32 ref: 00401B52
      • _wcslen.LIBCMT ref: 00401B6F
      • HeapAlloc.KERNEL32(?,00000000,00000000), ref: 00401B89
      • CreateProcessW.KERNELBASE(00000000,00000000,00000000,00000000,00000000,08000000,00000000,00000000,00000044,?,00000000,00000000,00000000), ref: 00401BCB
      • CloseHandle.KERNEL32(00000000), ref: 00401C33
      • CloseHandle.KERNEL32(00000000), ref: 00401C43
      • HeapFree.KERNEL32(?,00000000,00000000), ref: 00401C59
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1869672502.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.1869640615.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869710759.0000000000412000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869744562.0000000000415000.00000004.00000001.01000000.00000006.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_dp-chooser.jbxd
      Similarity
      • API ID: Heap$CloseHandleProcess_memset$AllocCreateFree_wcslen
      • String ID: CreateProcess$D
      • API String ID: 1666308248-1329926510
      • Opcode ID: 20ab9308e1e1c26868c00edbb6ea90f406d726e51395cc1f3feb6fb268d50c95
      • Instruction ID: 3acb6ec7c73ae5423c3dcef7ba7d9905e27e3eac382146a571e97e23c8031e46
      • Opcode Fuzzy Hash: 20ab9308e1e1c26868c00edbb6ea90f406d726e51395cc1f3feb6fb268d50c95
      • Instruction Fuzzy Hash: F1416EB1D00208EBDB10DBE5CD49BDEBB79AB48704F108229F605BB2D0D7B99A44CB58
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
        • Part of subcall function 00401960: _wcslen.LIBCMT ref: 00401995
        • Part of subcall function 00401960: __wassert.LIBCMT ref: 004019B5
      • __wassert.LIBCMT ref: 0040156D
      • swprintf.LIBCMT ref: 0040178F
      • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004017B9
      • swprintf.LIBCMT ref: 004017DB
        • Part of subcall function 00401190: __wassert.LIBCMT ref: 004011CD
        • Part of subcall function 00401190: __wfopen_s.LIBCMT ref: 004011E2
      Strings
      • logFile != NULL, xrefs: 00401568
      • Further information might be found in %s\DPINST.LOG, xrefs: 004017CA
      • Not enough (or too many) driver package(s) installed., xrefs: 0040172F
      • ResultCode = %d, xrefs: 0040177E
      • FTDI installer ended., xrefs: 004017F9
      • main.c, xrefs: 00401563
      • DPInst returned 0x%08X, xrefs: 00401605
      • FTDI installer started., xrefs: 00401575
      • %d driver package(s) could not be installed., xrefs: 00401657
      • $Rev: 1031 $, xrefs: 00401589
      • Copied %d driver package(s)., xrefs: 004016A7
      • Installed %d driver package(s)., xrefs: 004016EF
      Memory Dump Source
      • Source File: 00000001.00000002.1869672502.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.1869640615.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869710759.0000000000412000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869744562.0000000000415000.00000004.00000001.01000000.00000006.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_dp-chooser.jbxd
      Similarity
      • API ID: __wassert$swprintf$DirectoryWindows__wfopen_s_wcslen
      • String ID: $Rev: 1031 $$%d driver package(s) could not be installed.$Copied %d driver package(s).$DPInst returned 0x%08X$FTDI installer ended.$FTDI installer started.$Further information might be found in %s\DPINST.LOG$Installed %d driver package(s).$Not enough (or too many) driver package(s) installed.$ResultCode = %d$logFile != NULL$main.c
      • API String ID: 2947281746-2661179990
      • Opcode ID: d6eaacdd840932ac38cec4fe94fdc6c2bfac7612f9a6c7f02e7a5f3e0bea199b
      • Instruction ID: 484ba96ead3dfa6146db54edbd7b7b9dea31c8accaf61f7106540faa07a17432
      • Opcode Fuzzy Hash: d6eaacdd840932ac38cec4fe94fdc6c2bfac7612f9a6c7f02e7a5f3e0bea199b
      • Instruction Fuzzy Hash: 569181B2D41218ABEB24EB60DC4AFDD7374AB58308F1441EDE60D77291E7789B848F58
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 102 4030f6-403105 103 403107-403113 102->103 104 40312e 102->104 103->104 105 403115-40311c 103->105 106 403131-40313d call 4033df 104->106 105->104 107 40311e-40312c 105->107 110 403147-40314e call 408e6a 106->110 111 40313f-403146 call 40309e 106->111 107->106 116 403150-403157 call 40309e 110->116 117 403158-403167 call 408a0e call 407a13 110->117 111->110 116->117 124 403171-40318c GetCommandLineW call 4089b1 call 408903 117->124 125 403169-403170 call 4043f9 117->125 132 403196-40319d call 4086d4 124->132 133 40318e-403195 call 4043f9 124->133 125->124 138 4031a7-4031b0 call 4044b8 132->138 139 40319f-4031a6 call 4043f9 132->139 133->132 144 4031b2-4031b8 call 4043f9 138->144 145 4031b9-4031c1 call 40868e 138->145 139->138 144->145 150 4031c3-4031c7 145->150 151 4031c9-4031cb 145->151 152 4031cc-4031df call 401430 150->152 151->152 155 4031e1-4031e2 call 404669 152->155 156 4031e7-403243 call 404695 call 4040c9 152->156 155->156
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.1869672502.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.1869640615.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869710759.0000000000412000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869744562.0000000000415000.00000004.00000001.01000000.00000006.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_dp-chooser.jbxd
      Similarity
      • API ID: __amsg_exit$_fast_error_exit$CommandInitializeLine__cinit__ioinit__mtinit__wsetargv__wsetenvp__wwincmdln
      • String ID:
      • API String ID: 2477803136-0
      • Opcode ID: 861832da3e6310289cc748a1fa56adcf2919517b035b23b7a9df681ffc10cd83
      • Instruction ID: 4a1827040d1f0703309e421be1b468782f8e80d36599849b8495b8abb8375983
      • Opcode Fuzzy Hash: 861832da3e6310289cc748a1fa56adcf2919517b035b23b7a9df681ffc10cd83
      • Instruction Fuzzy Hash: 512191B0A503049ADB147FB3A94677E2A689F4070EF10483FF540BE1C2EE7C8A409B6D
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 164 401430-401455 GetCommandLineW CommandLineToArgvW 165 401457-40145c 164->165 166 40145e-401466 call 401490 164->166 167 40147e-401481 165->167 169 40146b-40147b LocalFree 166->169 169->167
      APIs
      • GetCommandLineW.KERNEL32(?), ref: 00401441
      • CommandLineToArgvW.SHELL32(00000000), ref: 00401448
      • LocalFree.KERNEL32(00000000), ref: 00401475
      Memory Dump Source
      • Source File: 00000001.00000002.1869672502.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.1869640615.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869710759.0000000000412000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869744562.0000000000415000.00000004.00000001.01000000.00000006.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_dp-chooser.jbxd
      Similarity
      • API ID: CommandLine$ArgvFreeLocal
      • String ID:
      • API String ID: 1415666456-0
      • Opcode ID: c6ac9a1cbfff1988d8d1e004cf089e05d44469c8248fcd75bbd96b16ed7fe844
      • Instruction ID: a342b854f37cd1745f27ca3db59662c3e5596d5c18dcc2d6371728c26bf67b1b
      • Opcode Fuzzy Hash: c6ac9a1cbfff1988d8d1e004cf089e05d44469c8248fcd75bbd96b16ed7fe844
      • Instruction Fuzzy Hash: 3BF0FE79D0020CABCB00DBE4D948ADDBBB8EB08301F1085A6E505E3250D6789A54DF55
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 170 40444d-40445e call 404422 ExitProcess
      APIs
      • ___crtCorExitProcess.LIBCMT ref: 00404455
        • Part of subcall function 00404422: GetModuleHandleW.KERNEL32(mscoree.dll,?,0040445A,004010FC,?,004034FA,000000FF,0000001E,00413808,0000000C,004035A6,004010FC,?,?,0040E293,00000004), ref: 0040442C
        • Part of subcall function 00404422: GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0040443C
      • ExitProcess.KERNEL32 ref: 0040445E
      Memory Dump Source
      • Source File: 00000001.00000002.1869672502.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.1869640615.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869710759.0000000000412000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869744562.0000000000415000.00000004.00000001.01000000.00000006.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_dp-chooser.jbxd
      Similarity
      • API ID: ExitProcess$AddressHandleModuleProc___crt
      • String ID:
      • API String ID: 2427264223-0
      • Opcode ID: 8a532a709fe30bb54004cd88c3994b86d3ff600b16a55a1d25812f80729a834c
      • Instruction ID: 7c793f781e6bfddcb2b4c9c8bcaa5f7cd33cff614bd7cc2c817c46c4df4c916d
      • Opcode Fuzzy Hash: 8a532a709fe30bb54004cd88c3994b86d3ff600b16a55a1d25812f80729a834c
      • Instruction Fuzzy Hash: 1EB0923100010CBFCB012F16DD0AA893F6AFB803A1B90C035FA0849071DFB2ADA2DA88
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 173 4033df-403401 HeapCreate 174 403403-403404 173->174 175 403405-40340e 173->175
      APIs
      • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 004033F4
      Memory Dump Source
      • Source File: 00000001.00000002.1869672502.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.1869640615.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869710759.0000000000412000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869744562.0000000000415000.00000004.00000001.01000000.00000006.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_dp-chooser.jbxd
      Similarity
      • API ID: CreateHeap
      • String ID:
      • API String ID: 10892065-0
      • Opcode ID: c524bde13de9b478851c672f967ddda832626126e13c55cb73d43075e7313a50
      • Instruction ID: e8f06c329b9a9b72761e70bfc2cef84193c9b19d8f0e1315e6d5e66aa704ee6f
      • Opcode Fuzzy Hash: c524bde13de9b478851c672f967ddda832626126e13c55cb73d43075e7313a50
      • Instruction Fuzzy Hash: 3CD05E36A94305AEDB009F706C097A33FDCD784395F148436FA0CCA190F674C551C508
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 176 404669-404675 call 40453d 178 40467a-40467e 176->178
      APIs
      • _doexit.LIBCMT ref: 00404675
        • Part of subcall function 0040453D: __lock.LIBCMT ref: 0040454B
        • Part of subcall function 0040453D: __decode_pointer.LIBCMT ref: 00404582
        • Part of subcall function 0040453D: __decode_pointer.LIBCMT ref: 00404597
        • Part of subcall function 0040453D: __decode_pointer.LIBCMT ref: 004045C1
        • Part of subcall function 0040453D: __decode_pointer.LIBCMT ref: 004045D7
        • Part of subcall function 0040453D: __decode_pointer.LIBCMT ref: 004045E4
        • Part of subcall function 0040453D: __initterm.LIBCMT ref: 00404613
        • Part of subcall function 0040453D: __initterm.LIBCMT ref: 00404623
      Memory Dump Source
      • Source File: 00000001.00000002.1869672502.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.1869640615.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869710759.0000000000412000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869744562.0000000000415000.00000004.00000001.01000000.00000006.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_dp-chooser.jbxd
      Similarity
      • API ID: __decode_pointer$__initterm$__lock_doexit
      • String ID:
      • API String ID: 1597249276-0
      • Opcode ID: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
      • Instruction ID: 7df0be61210875fca1dcea23ccfd344dfdd9d9465ce4bf9c7cd061f9649e3be0
      • Opcode Fuzzy Hash: 02276376eab60fb44a6de362a8cb41930a671a9c3f5feaa45b9c6d7d217bd1ad
      • Instruction Fuzzy Hash: 9DB0927258020833DA202542AC03F063A6987C0B68EA40061BB0C291E1A9A2A9658489
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • IsDebuggerPresent.KERNEL32 ref: 00403309
      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0040331E
      • UnhandledExceptionFilter.KERNEL32(0041243C), ref: 00403329
      • GetCurrentProcess.KERNEL32(C0000409), ref: 00403345
      • TerminateProcess.KERNEL32(00000000), ref: 0040334C
      Memory Dump Source
      • Source File: 00000001.00000002.1869672502.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.1869640615.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869710759.0000000000412000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869744562.0000000000415000.00000004.00000001.01000000.00000006.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_dp-chooser.jbxd
      Similarity
      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
      • String ID:
      • API String ID: 2579439406-0
      • Opcode ID: 0fcaa61a01a5a65c5835962a5d6060e3b9b403c52bba525712831fdf1eddb371
      • Instruction ID: 3377c8c6cb80db1faa1612c9126c8ba6d9e122c869a1c658892009bbfd72c89e
      • Opcode Fuzzy Hash: 0fcaa61a01a5a65c5835962a5d6060e3b9b403c52bba525712831fdf1eddb371
      • Instruction Fuzzy Hash: 5A21DDB4901200EFD700DF65F9456C43BBABB08345F52863AE908D72AAE7B5A981CF0D
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • SetUnhandledExceptionFilter.KERNEL32(Function_000084DD), ref: 00408524
      Memory Dump Source
      • Source File: 00000001.00000002.1869672502.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.1869640615.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869710759.0000000000412000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869744562.0000000000415000.00000004.00000001.01000000.00000006.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_dp-chooser.jbxd
      Similarity
      • API ID: ExceptionFilterUnhandled
      • String ID:
      • API String ID: 3192549508-0
      • Opcode ID: 8d1cde61a576b0c2af8279566cb17cacc78ccda57faa5f831edfb31dc79dc9ed
      • Instruction ID: 52a412ea41b4537fabbf33173f763ca88ad0c26342de1cb336fe76b27e07c7fa
      • Opcode Fuzzy Hash: 8d1cde61a576b0c2af8279566cb17cacc78ccda57faa5f831edfb31dc79dc9ed
      • Instruction Fuzzy Hash: 659002A06512015796001B707E0964639905A4C71275145756185E4094EEA44154A529
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 226 401190-4011bc 227 4011d5-4011ec call 4023c8 226->227 228 4011be-4011c8 226->228 233 4011f6-401223 call 4020e2 227->233 234 4011ee-4011f1 227->234 230 4011cd call 402439 228->230 232 4011d2 230->232 232->227 240 401225 233->240 241 401227-401243 call 401080 233->241 235 401277-401284 call 401e95 234->235 242 401268-401274 call 401ea4 240->242 247 401245 241->247 248 401247-40124a 241->248 242->235 247->242 249 40124b call 401290 248->249 250 401250-401265 call 4023c8 249->250 250->242
      APIs
      • __wassert.LIBCMT ref: 004011CD
        • Part of subcall function 00402439: __set_error_mode.LIBCMT ref: 00402465
        • Part of subcall function 00402439: __set_error_mode.LIBCMT ref: 00402476
        • Part of subcall function 00402439: __invoke_watson.LIBCMT ref: 004024B2
        • Part of subcall function 00402439: __invoke_watson.LIBCMT ref: 004024D9
        • Part of subcall function 00402439: __invoke_watson.LIBCMT ref: 004024FF
        • Part of subcall function 00402439: GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040251D
        • Part of subcall function 00402439: __invoke_watson.LIBCMT ref: 00402549
      • __wfopen_s.LIBCMT ref: 004011E2
      • __wsplitpath_s.LIBCMT ref: 00401214
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1869672502.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.1869640615.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869710759.0000000000412000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869744562.0000000000415000.00000004.00000001.01000000.00000006.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_dp-chooser.jbxd
      Similarity
      • API ID: __invoke_watson$__set_error_mode$FileModuleName__wassert__wfopen_s__wsplitpath_s
      • String ID: logName != NULL$main.c
      • API String ID: 805232850-4035294649
      • Opcode ID: d06006a28612ebbaa38e800c9836e341549ca1e7c9252f700fca6468652c183f
      • Instruction ID: 66167dbc3f1944252a9ed3b2d4c4b85a33f5340e4c886932b932fdbe62b15ed1
      • Opcode Fuzzy Hash: d06006a28612ebbaa38e800c9836e341549ca1e7c9252f700fca6468652c183f
      • Instruction Fuzzy Hash: F02141B1D40208FBDB10DBA0DC86BEE77749B54704F60416AFA057A2C1E6B86B84CB99
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 253 401310-401343 GetModuleFileNameW 254 401345-401347 253->254 255 40134c-401385 call 4020e2 253->255 256 401419-401426 call 401e95 254->256 260 401387-401389 255->260 261 40138e-401392 255->261 260->256 263 4013a0 261->263 264 401394-40139e 261->264 265 4013aa-4013ae 263->265 264->265 266 4013b0-4013ba 265->266 267 4013bc 265->267 268 4013c6-4013cd call 401000 266->268 267->268 271 4013db 268->271 272 4013cf-4013d9 268->272 273 4013e5-401416 call 401080 271->273 272->273 273->256
      APIs
      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040133B
      • __wsplitpath_s.LIBCMT ref: 00401370
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1869672502.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.1869640615.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869710759.0000000000412000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869744562.0000000000415000.00000004.00000001.01000000.00000006.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_dp-chooser.jbxd
      Similarity
      • API ID: FileModuleName__wsplitpath_s
      • String ID: 8QA$dpinst$hdA$ldA
      • API String ID: 1484437298-957887093
      • Opcode ID: 8c8b16ad581bf5b7d60825decf6549e9e687a637472e1f702b90c00870508684
      • Instruction ID: 7b619116ead3ceb45440403cc3a701ae282bacb6441f781067402afd167572f9
      • Opcode Fuzzy Hash: 8c8b16ad581bf5b7d60825decf6549e9e687a637472e1f702b90c00870508684
      • Instruction Fuzzy Hash: BC2149B1E40218AAEB20CF51CC85BED73B4AB58704F5081EEF609661D1D7B45AC4CF5D
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 276 4049f5-404a00 277 404a02-404a07 276->277 278 404a09-404a0b 276->278 279 404a0f 277->279 280 404a14-404a25 call 409149 278->280 281 404a0d 278->281 279->280 284 404a45-404a4c 280->284 285 404a27-404a3e call 409149 280->285 281->279 286 404a53-404a62 284->286 285->284 291 404a40-404a44 285->291 288 404a64-404a6e 286->288 289 404a4e 286->289 292 404a6f-404a89 288->292 289->286 293 404a93 292->293 294 404a8b-404a8d 292->294 296 404a95-404a9f 293->296 294->293 295 404a8f-404a91 294->295 295->293 295->296 296->292 297 404aa1-404aa5 296->297
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1869672502.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.1869640615.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869710759.0000000000412000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869744562.0000000000415000.00000004.00000001.01000000.00000006.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_dp-chooser.jbxd
      Similarity
      • API ID: __calloc_crt
      • String ID: @XA$PZA$`qA$WA
      • API String ID: 3494438863-2457306366
      • Opcode ID: 69431cfb514836f49a17becffea1442253718ff18f1140519ad8e4bee2f650c8
      • Instruction ID: 0b9293aa400fd5d4561111f83208c45616b306ae5218db8544ff208d5f7a754f
      • Opcode Fuzzy Hash: 69431cfb514836f49a17becffea1442253718ff18f1140519ad8e4bee2f650c8
      • Instruction Fuzzy Hash: 2A11ABB27846119BE7148E5EBC516D72695A7C4724B24413BE711EB3D0E778CC414A4C
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 298 401960-401974 299 40197f-401985 298->299 300 40198b-4019a4 call 4020c8 299->300 301 401a7c-401a7f 299->301 304 4019a6-4019ba call 402439 300->304 305 4019bd-4019c1 300->305 304->305 307 4019c3-4019d2 305->307 308 4019e5 305->308 310 4019d4-4019e3 307->310 311 4019e7-4019fb 307->311 312 401976-40197c 308->312 310->308 310->311 313 401a10-401a14 311->313 314 4019fd-401a01 311->314 312->299 317 401a16-401a26 313->317 318 401a28 313->318 315 401a03-401a72 314->315 316 401a05-401a0e 314->316 315->312 320 401a77 316->320 317->318 321 401a2d-401a42 317->321 318->312 320->312 322 401a52-401a69 call 401a80 321->322 323 401a44-401a4f call 401ea4 321->323 328 401a70 322->328 329 401a6b 322->329 323->322 328->320 329->312
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1869672502.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.1869640615.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869710759.0000000000412000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869744562.0000000000415000.00000004.00000001.01000000.00000006.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_dp-chooser.jbxd
      Similarity
      • API ID: __wassert_wcslen
      • String ID: argLen > 0$main.c$s
      • API String ID: 1319387696-1683257864
      • Opcode ID: d0dada5579b9b6d9739650150b4592d0d078d0c3a01b67bf551b65ab7316492a
      • Instruction ID: a46aed434699db92c8989c26b899086ba9f161fe337e7a5c5d7438da38d65dd2
      • Opcode Fuzzy Hash: d0dada5579b9b6d9739650150b4592d0d078d0c3a01b67bf551b65ab7316492a
      • Instruction Fuzzy Hash: C54132B4A04108DBCB14CF84C591AAEB7B1FF45305F1481ABE8466B3A4D778AE91DF4A
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 330 401a80-401a9e 331 401aa0-401aaa 330->331 332 401ab7-401ad1 call 402f90 330->332 333 401aaf call 402439 331->333 337 401ad3-401ad5 332->337 338 401ad7-401aed call 402f38 332->338 335 401ab4 333->335 335->332 339 401af6-401b03 call 401e95 337->339 343 401af3 338->343 344 401aef-401af1 338->344 343->339 344->339
      APIs
      • __wassert.LIBCMT ref: 00401AAF
        • Part of subcall function 00402439: __set_error_mode.LIBCMT ref: 00402465
        • Part of subcall function 00402439: __set_error_mode.LIBCMT ref: 00402476
        • Part of subcall function 00402439: __invoke_watson.LIBCMT ref: 004024B2
        • Part of subcall function 00402439: __invoke_watson.LIBCMT ref: 004024D9
        • Part of subcall function 00402439: __invoke_watson.LIBCMT ref: 004024FF
        • Part of subcall function 00402439: GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040251D
        • Part of subcall function 00402439: __invoke_watson.LIBCMT ref: 00402549
      • __wfullpath.LIBCMT ref: 00401AC7
      • __wcsdup.LIBCMT ref: 00401ADE
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1869672502.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.1869640615.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869710759.0000000000412000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869744562.0000000000415000.00000004.00000001.01000000.00000006.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_dp-chooser.jbxd
      Similarity
      • API ID: __invoke_watson$__set_error_mode$FileModuleName__wassert__wcsdup__wfullpath
      • String ID: inputPath != NULL$main.c
      • API String ID: 3732416915-3945383671
      • Opcode ID: 6419b95fe5d0e8b75fabdc104451437e162cc7f9823befeffa96ecbac4201fca
      • Instruction ID: 914e62909fb7dc97830072c4585825e423a64a22a180969a02ffc6e128853863
      • Opcode Fuzzy Hash: 6419b95fe5d0e8b75fabdc104451437e162cc7f9823befeffa96ecbac4201fca
      • Instruction Fuzzy Hash: 390167B0E4120CEBDB10DBE0C945BEE77B4AB54344F50447EE909B62C1E6F85A849A95
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 346 401000-401025 GetModuleHandleW 347 401027-401029 346->347 348 40102b-401041 GetProcAddress 346->348 349 40106e-40107b call 401e95 347->349 350 401043-401045 348->350 351 401047-401058 348->351 350->349 355 401069 351->355 356 40105a-401063 GetLastError 351->356 355->349 356->355 357 401065-401067 356->357 357->349
      APIs
      • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00401018
      • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00401034
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1869672502.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.1869640615.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869710759.0000000000412000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869744562.0000000000415000.00000004.00000001.01000000.00000006.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_dp-chooser.jbxd
      Similarity
      • API ID: AddressHandleModuleProc
      • String ID: GetSystemWow64DirectoryW$kernel32.dll
      • API String ID: 1646373207-1816364905
      • Opcode ID: ea6039910fb004354b57d25e5b93fcb5a2d6650296fb91b71c0a30b516fc4e3d
      • Instruction ID: d3ead10bd348eb2871986d51bf03d60be2c0891af79030d98874855ff79828fd
      • Opcode Fuzzy Hash: ea6039910fb004354b57d25e5b93fcb5a2d6650296fb91b71c0a30b516fc4e3d
      • Instruction Fuzzy Hash: BE016770E00248EFCB10DFB0C9487ED7BB4AB08305F504576D542F65D0DB788AC49B59
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 358 40d0b1-40d0cc call 404084 call 408d21 363 40d0f0-40d119 call 40358b call 40d073 call 40d11b 358->363 364 40d0ce-40d0d2 358->364 372 40d0dc-40d0de 363->372 364->363 365 40d0d4-40d0d9 call 408d21 364->365 365->372 374 40d0e0-40d0e7 call 4043f9 372->374 375 40d0e8-40d0ef call 4040c9 372->375 374->375
      APIs
      • __getptd.LIBCMT ref: 0040D0BD
        • Part of subcall function 00408D21: __getptd_noexit.LIBCMT ref: 00408D24
        • Part of subcall function 00408D21: __amsg_exit.LIBCMT ref: 00408D31
      • __getptd.LIBCMT ref: 0040D0D4
      • __amsg_exit.LIBCMT ref: 0040D0E2
      • __lock.LIBCMT ref: 0040D0F2
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1869672502.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.1869640615.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869710759.0000000000412000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869744562.0000000000415000.00000004.00000001.01000000.00000006.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_dp-chooser.jbxd
      Similarity
      • API ID: __amsg_exit__getptd$__getptd_noexit__lock
      • String ID: 0`A
      • API String ID: 3521780317-3205244451
      • Opcode ID: f4938d2bd1b828bacbd7ad545ef203ae448925ff2766fe8f4e43841991c42f38
      • Instruction ID: 8a50fc5c6cf24bc3e1f4629c987d5ceb0c5a446d7643dca26329b77e4d7aca42
      • Opcode Fuzzy Hash: f4938d2bd1b828bacbd7ad545ef203ae448925ff2766fe8f4e43841991c42f38
      • Instruction Fuzzy Hash: FAF09071D407049BEB20BFE5940274937A06F44729F11823FE944BB2D2CB3CA946DA5D
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetLastError.KERNEL32(00401BDF,CreateProcess), ref: 00401DF6
      • FormatMessageW.KERNEL32(00001100,00000000,00000000,00000400,00000000,00000000,00000000), ref: 00401E17
      • MessageBoxW.USER32(00000000,00000000,GetLastError,00000000), ref: 00401E2E
      • LocalFree.KERNEL32(?), ref: 00401E38
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1869672502.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.1869640615.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869710759.0000000000412000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869744562.0000000000415000.00000004.00000001.01000000.00000006.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_dp-chooser.jbxd
      Similarity
      • API ID: Message$ErrorFormatFreeLastLocal
      • String ID: GetLastError
      • API String ID: 2195691534-3538237111
      • Opcode ID: 9c05d61351b602662142ab80d13ac2b806e296be404d18cbf378bcb513e131dc
      • Instruction ID: e3ed02225cc40f927312e780d87c6f66bc5b2afc75476b16e5e441ce6aeda54b
      • Opcode Fuzzy Hash: 9c05d61351b602662142ab80d13ac2b806e296be404d18cbf378bcb513e131dc
      • Instruction Fuzzy Hash: 43F01C74B40308BBE710DBD09E0AFEE7B78EB48B01F104165BB00E62C0D6F06A10CBA9
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __getptd.LIBCMT ref: 0040C951
        • Part of subcall function 00408D21: __getptd_noexit.LIBCMT ref: 00408D24
        • Part of subcall function 00408D21: __amsg_exit.LIBCMT ref: 00408D31
      • __amsg_exit.LIBCMT ref: 0040C971
      • __lock.LIBCMT ref: 0040C981
      • InterlockedDecrement.KERNEL32(?), ref: 0040C99E
      • InterlockedIncrement.KERNEL32(02082D08), ref: 0040C9C9
      Memory Dump Source
      • Source File: 00000001.00000002.1869672502.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.1869640615.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869710759.0000000000412000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869744562.0000000000415000.00000004.00000001.01000000.00000006.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_dp-chooser.jbxd
      Similarity
      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
      • String ID:
      • API String ID: 4271482742-0
      • Opcode ID: 00655ec1678064faaedfc10e6b097968f079007e94bcf95313a5ebe14d9b038e
      • Instruction ID: 11204d5c9a5a25d21db1a7cfa5822357e150be6cf17aa59c9f24a34599d32d9b
      • Opcode Fuzzy Hash: 00655ec1678064faaedfc10e6b097968f079007e94bcf95313a5ebe14d9b038e
      • Instruction Fuzzy Hash: 0A01A1B1901A11EBCB11ABA5994679A7760AF54720F04433BE900B32D0CB3CA981CBDD
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __lock.LIBCMT ref: 00401EC2
        • Part of subcall function 0040358B: __mtinitlocknum.LIBCMT ref: 004035A1
        • Part of subcall function 0040358B: __amsg_exit.LIBCMT ref: 004035AD
        • Part of subcall function 0040358B: EnterCriticalSection.KERNEL32(?,?,?,0040E293,00000004,00413C08,0000000C,0040915F,004010FC,?,00000000,00000000,00000000,?,00408CD3,00000001), ref: 004035B5
      • ___sbh_find_block.LIBCMT ref: 00401ECD
      • ___sbh_free_block.LIBCMT ref: 00401EDC
      • HeapFree.KERNEL32(00000000,004010FC,00413740,0000000C,0040356C,00000000,00413808,0000000C,004035A6,004010FC,?,?,0040E293,00000004,00413C08,0000000C), ref: 00401F0C
      • GetLastError.KERNEL32(?,0040E293,00000004,00413C08,0000000C,0040915F,004010FC,?,00000000,00000000,00000000,?,00408CD3,00000001,00000214), ref: 00401F1D
      Memory Dump Source
      • Source File: 00000001.00000002.1869672502.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.1869640615.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869710759.0000000000412000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869744562.0000000000415000.00000004.00000001.01000000.00000006.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_dp-chooser.jbxd
      Similarity
      • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
      • String ID:
      • API String ID: 2714421763-0
      • Opcode ID: 29d72d71572c3c26d61ddddef0081ff42c0127134f7c485e224ce45e977da913
      • Instruction ID: ef7d3cb33ffc2cc5027f2f15be3cc7e00135dab692b9e3e761cd16df0c660e95
      • Opcode Fuzzy Hash: 29d72d71572c3c26d61ddddef0081ff42c0127134f7c485e224ce45e977da913
      • Instruction Fuzzy Hash: A6016271905202EBDF21AF729D0679E7EA8AF0076AF14413FFA14B71E1DB7C86408A5C
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • ___addlocaleref.LIBCMT ref: 0040D085
        • Part of subcall function 0040CF4B: InterlockedIncrement.KERNEL32(004010FC), ref: 0040CF5D
        • Part of subcall function 0040CF4B: InterlockedIncrement.KERNEL32(000000F8), ref: 0040CF6A
        • Part of subcall function 0040CF4B: InterlockedIncrement.KERNEL32(00000000), ref: 0040CF77
        • Part of subcall function 0040CF4B: InterlockedIncrement.KERNEL32(E845C700), ref: 0040CF84
        • Part of subcall function 0040CF4B: InterlockedIncrement.KERNEL32(62681775), ref: 0040CF91
        • Part of subcall function 0040CF4B: InterlockedIncrement.KERNEL32(62681775), ref: 0040CFAD
        • Part of subcall function 0040CF4B: InterlockedIncrement.KERNEL32(DBE852F4), ref: 0040CFBD
        • Part of subcall function 0040CF4B: InterlockedIncrement.KERNEL32(C482FF4C), ref: 0040CFD3
      • ___removelocaleref.LIBCMT ref: 0040D090
        • Part of subcall function 0040CFDA: InterlockedDecrement.KERNEL32(0040D408), ref: 0040CFF4
        • Part of subcall function 0040CFDA: InterlockedDecrement.KERNEL32(76C13B66), ref: 0040D001
        • Part of subcall function 0040CFDA: InterlockedDecrement.KERNEL32(76FB3B0F), ref: 0040D00E
        • Part of subcall function 0040CFDA: InterlockedDecrement.KERNEL32(74F33B36), ref: 0040D01B
        • Part of subcall function 0040CFDA: InterlockedDecrement.KERNEL32(FF5913E8), ref: 0040D028
        • Part of subcall function 0040CFDA: InterlockedDecrement.KERNEL32(FF5913E8), ref: 0040D044
        • Part of subcall function 0040CFDA: InterlockedDecrement.KERNEL32(C33B0845), ref: 0040D054
        • Part of subcall function 0040CFDA: InterlockedDecrement.KERNEL32(FFFF5E02), ref: 0040D06A
      • ___freetlocinfo.LIBCMT ref: 0040D0A4
        • Part of subcall function 0040CE02: ___free_lconv_mon.LIBCMT ref: 0040CE48
        • Part of subcall function 0040CE02: ___free_lconv_num.LIBCMT ref: 0040CE69
        • Part of subcall function 0040CE02: ___free_lc_time.LIBCMT ref: 0040CEEE
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1869672502.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.1869640615.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869710759.0000000000412000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869744562.0000000000415000.00000004.00000001.01000000.00000006.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_dp-chooser.jbxd
      Similarity
      • API ID: Interlocked$DecrementIncrement$___addlocaleref___free_lc_time___free_lconv_mon___free_lconv_num___freetlocinfo___removelocaleref
      • String ID: 0`A
      • API String ID: 467427115-3205244451
      • Opcode ID: 81e306bc9b5dc51fb59e922de5f1cdf4dab2cf5a8d9cd7fe421858cac6b5b766
      • Instruction ID: 06b2654e136eaaf5f79b2036e2af7c109ff259228391912bd834fad636ddfff3
      • Opcode Fuzzy Hash: 81e306bc9b5dc51fb59e922de5f1cdf4dab2cf5a8d9cd7fe421858cac6b5b766
      • Instruction Fuzzy Hash: 30E04832F0582289C635365DD44065B52D51F91719F16017BF419B72CCDB7C8C87C1DD
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0040D2F8
      • __isleadbyte_l.LIBCMT ref: 0040D32C
      • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,00000109,75FF5003,00BFBBEF,00000000,?,?,?,0040A2FA,00000109,00BFBBEF,00000003), ref: 0040D35D
      • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,00000109,00000001,00BFBBEF,00000000,?,?,?,0040A2FA,00000109,00BFBBEF,00000003), ref: 0040D3CB
      Memory Dump Source
      • Source File: 00000001.00000002.1869672502.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.1869640615.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869710759.0000000000412000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869744562.0000000000415000.00000004.00000001.01000000.00000006.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_dp-chooser.jbxd
      Similarity
      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
      • String ID:
      • API String ID: 3058430110-0
      • Opcode ID: 303501950a8e62d9866493ac393c92a1afa166bd2f80d6f956b2138c125a569c
      • Instruction ID: 2c0db2c687950d5bd7c3cfb4ad51ed7b489591e3544c8b7699c32fb2097b5c30
      • Opcode Fuzzy Hash: 303501950a8e62d9866493ac393c92a1afa166bd2f80d6f956b2138c125a569c
      • Instruction Fuzzy Hash: F5319D31E00246EFDB21DFE4C8809AE7BA5BF01310B1585BEF861AB2D1D734D944DB5A
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1869672502.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.1869640615.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869710759.0000000000412000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869744562.0000000000415000.00000004.00000001.01000000.00000006.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_dp-chooser.jbxd
      Similarity
      • API ID: _fprintf_memset
      • String ID: %S: %S
      • API String ID: 3021507156-2392186759
      • Opcode ID: cd24ebeb26f2e573dc3b130efb563529e20cb6b483258561b9948dad08a503e1
      • Instruction ID: 9ee0eab4f8e4c53a91baa93b3fd0f0a323340b18a8a5e3189bf63d28241d28d1
      • Opcode Fuzzy Hash: cd24ebeb26f2e573dc3b130efb563529e20cb6b483258561b9948dad08a503e1
      • Instruction Fuzzy Hash: 6E213D71D0020CEADB10EFD1D985BEE77B4AB44304F20846AE506AB291D7789B45DB89
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetDriveTypeA.KERNEL32(?,?,0040836F,00000000,?,?,00000000,?,00401ACC,?,00000000), ref: 0040E41F
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1869672502.0000000000401000.00000020.00000001.01000000.00000006.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000001.00000002.1869640615.0000000000400000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869710759.0000000000412000.00000002.00000001.01000000.00000006.sdmpDownload File
      • Associated: 00000001.00000002.1869744562.0000000000415000.00000004.00000001.01000000.00000006.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_400000_dp-chooser.jbxd
      Similarity
      • API ID: DriveType
      • String ID: :$\
      • API String ID: 338552980-1166558509
      • Opcode ID: 85c62079cab3b0618b3e987199a2b29ebd2f3d2a7b590a72069c6b932e1edd3d
      • Instruction ID: 8c0b51ff719e0afaf133a46607e8d7b38eee9f72d9495b930bef74de6b125482
      • Opcode Fuzzy Hash: 85c62079cab3b0618b3e987199a2b29ebd2f3d2a7b590a72069c6b932e1edd3d
      • Instruction Fuzzy Hash: 78E048312082886EEF21CEB6944879B3FCC9B51698F04C476F94CDE242D275D6568756
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000002.00000002.1869175378.00007FF6D88C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6D88C0000, based on PE: true
      • Associated: 00000002.00000002.1869138157.00007FF6D88C0000.00000002.00000001.01000000.00000007.sdmpDownload File
      • Associated: 00000002.00000002.1869263285.00007FF6D8941000.00000004.00000001.01000000.00000007.sdmpDownload File
      • Associated: 00000002.00000002.1869298216.00007FF6D8943000.00000002.00000001.01000000.00000007.sdmpDownload File
      • Associated: 00000002.00000002.1869298216.00007FF6D8958000.00000002.00000001.01000000.00000007.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_2_2_7ff6d88c0000_dpinst-amd64.jbxd
      Similarity
      • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
      • String ID:
      • API String ID: 1445889803-0
      • Opcode ID: 404986f5cc30a85b1b110af08f269cf27d5de7fe2ab396615c35e90afeb4e3b4
      • Instruction ID: 3d1df895e8d2cd6c72bb33c7c87ae31485570d61fb4e0d9d2b473b4de9fb4f8c
      • Opcode Fuzzy Hash: 404986f5cc30a85b1b110af08f269cf27d5de7fe2ab396615c35e90afeb4e3b4
      • Instruction Fuzzy Hash: 3901A525B18B0682E7508F35E4981692360FB49FD6F042632EE9E87795CF3CD8A48308
      Uniqueness

      Uniqueness Score: -1.00%