General Info

File name

sfx.exe

Full analysis
https://app.any.run/tasks/97903ac4-ce4f-4d22-933b-0a5d4824b485
Verdict
Malicious activity
Analysis date
12/6/2018, 15:06:01
OS:
Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:

MIME:
application/x-dosexec
File info:
PE32 executable (GUI) Intel 80386, for MS Windows, RAR self-extracting archive
MD5

531d4aebe7811a13ec620771a6748c40

SHA1

301afed380bee985dd6f33761fc5e0ba00caeb28

SHA256

bbb0e793550bd5758a31dcd7c489ecc7a6c33d9d1872440330da68ab5d657906

SSDEEP

98304:jKDoMPf6SP4TQHJiWXRr+tLBAqFVaTfXlT/vTeWbu8lLwf:jaUSzHJiqEVAqFG/N/L/DLA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distored by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.

Software environment set and analysis options

Launch configuration

Task duration
300 seconds
Additional time used
240 seconds
Fakenet option
off
Heavy Evaision option
on
MITM proxy
off
Route via Tor
off
Network geolocation
off
Privacy
Public submission
Autoconfirmation of UAC
on

Software preset

  • Internet Explorer 8.0.7601.17514
  • Adobe Acrobat Reader DC MUI (15.023.20070)
  • Adobe Flash Player 26 ActiveX (26.0.0.131)
  • Adobe Flash Player 26 NPAPI (26.0.0.131)
  • Adobe Flash Player 26 PPAPI (26.0.0.131)
  • Adobe Refresh Manager (1.8.0)
  • CCleaner (5.35)
  • FileZilla Client 3.36.0 (3.36.0)
  • Google Chrome (68.0.3440.106)
  • Google Update Helper (1.3.33.17)
  • Java 8 Update 92 (8.0.920.14)
  • Java Auto Updater (2.8.92.14)
  • Microsoft .NET Framework 4.6.1 (4.6.01055)
  • Microsoft Office Access MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Excel MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office OneNote MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Outlook MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office PowerPoint MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Professional 2010 (14.0.6029.1000)
  • Microsoft Office Proof (English) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (French) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (Spanish) 2010 (14.0.6029.1000)
  • Microsoft Office Proofing (English) 2010 (14.0.6029.1000)
  • Microsoft Office Publisher MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Single Image 2010 (14.0.6029.1000)
  • Microsoft Office Word MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (9.0.30729.6161)
  • Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (10.0.40219)
  • Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 (12.0.30501.0)
  • Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2017 Redistributable (x86) - 14.15.26706 (14.15.26706.0)
  • Microsoft Visual C++ 2017 x86 Additional Runtime - 14.15.26706 (14.15.26706)
  • Microsoft Visual C++ 2017 x86 Minimum Runtime - 14.15.26706 (14.15.26706)
  • Mozilla Firefox 61.0.2 (x86 en-US) (61.0.2)
  • Notepad++ (32-bit x86) (7.5.1)
  • Opera 12.15 (12.15.1748)
  • Skype version 8.29 (8.29)
  • VLC media player (2.2.6)
  • WinRAR 5.60 (32-bit) (5.60.0)

Hotfixes

  • Client LanguagePack Package
  • Client Refresh LanguagePack Package
  • CodecPack Basic Package
  • Foundation Package
  • IE Troubleshooters Package
  • InternetExplorer Optional Package
  • KB2534111
  • KB2999226
  • KB976902
  • LocalPack AU Package
  • LocalPack CA Package
  • LocalPack GB Package
  • LocalPack US Package
  • LocalPack ZA Package
  • ProfessionalEdition
  • UltimateEdition

Behavior activities

MALICIOUS SUSPICIOUS INFO
Loads dropped or rewritten executable
  • MT-4E-RSS.exe (PID: 1812)
  • regsvr32.exe (PID: 1048)
  • setupUSB.exe (PID: 2600)
Application was dropped or rewritten from another process
  • MT-4E-RSS.exe (PID: 1812)
  • setupUSB.exe (PID: 2600)
  • setupAll.exe (PID: 2296)
  • setupAll.exe (PID: 3560)
Registers / Runs the DLL via REGSVR32.EXE
  • setupUSB.exe (PID: 2600)
Searches for installed software
  • DrvInst.exe (PID: 2272)
Executable content was dropped or overwritten
  • DrvInst.exe (PID: 2272)
  • setupUSB.exe (PID: 2600)
  • setupAll.tmp (PID: 2700)
  • setupAll.exe (PID: 2296)
  • setupAll.exe (PID: 3560)
  • sfx.exe (PID: 3772)
Removes files from Windows directory
  • DrvInst.exe (PID: 2272)
Uses RUNDLL32.EXE to load library
  • DrvInst.exe (PID: 2272)
Creates files in the driver directory
  • DrvInst.exe (PID: 2272)
Creates files in the Windows directory
  • DrvInst.exe (PID: 2272)
  • setupUSB.exe (PID: 2600)
Creates a software uninstall entry
  • setupUSB.exe (PID: 2600)
Creates COM task schedule object
  • regsvr32.exe (PID: 1048)
Creates files in the program directory
  • setupUSB.exe (PID: 2600)
Creates files in the user directory
  • setupAll.tmp (PID: 2700)
Low-level read access rights to disk partition
  • vssvc.exe (PID: 3716)
Changes settings of System certificates
  • DrvInst.exe (PID: 2272)
Creates a software uninstall entry
  • setupAll.tmp (PID: 2700)
Loads dropped or rewritten executable
  • setupAll.tmp (PID: 2700)
Application was dropped or rewritten from another process
  • setupAll.tmp (PID: 2608)
  • setupAll.tmp (PID: 2700)
Creates files in the program directory
  • setupAll.tmp (PID: 2700)

Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Static information

TRiD
.exe
|   Win32 Executable MS Visual C++ (generic) (42.2%)
.exe
|   Win64 Executable (generic) (37.3%)
.dll
|   Win32 Dynamic Link Library (generic) (8.8%)
.exe
|   Win32 Executable (generic) (6%)
.exe
|   Generic Win/DOS Executable (2.7%)
EXIF
EXE
MachineType:
Intel 386 or later, and compatibles
TimeStamp:
2014:12:02 11:07:30+01:00
PEType:
PE32
LinkerVersion:
9
CodeSize:
165376
InitializedDataSize:
64512
UninitializedDataSize:
null
EntryPoint:
0x1d5db
OSVersion:
5
ImageVersion:
null
SubsystemVersion:
5
Subsystem:
Windows GUI
Summary
Architecture:
IMAGE_FILE_MACHINE_I386
Subsystem:
IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date:
02-Dec-2014 10:07:30
Detected languages
English - United States
Process Default Language
Debug artifacts
d:\Projects\WinRAR\SFX\build\sfxrar32\Release\sfxrar.pdb
DOS Header
Magic number:
MZ
Bytes on last page of file:
0x0090
Pages in file:
0x0003
Relocations:
0x0000
Size of header:
0x0004
Min extra paragraphs:
0x0000
Max extra paragraphs:
0xFFFF
Initial SS value:
0x0000
Initial SP value:
0x00B8
Checksum:
0x0000
Initial IP value:
0x0000
Initial CS value:
0x0000
Overlay number:
0x0000
OEM identifier:
0x0000
OEM information:
0x0000
Address of NE header:
0x000000E8
PE Headers
Signature:
PE
Machine:
IMAGE_FILE_MACHINE_I386
Number of sections:
4
Time date stamp:
02-Dec-2014 10:07:30
Pointer to Symbol Table:
0x00000000
Number of symbols:
0
Size of Optional Header:
0x00E0
Characteristics
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_RELOCS_STRIPPED
Sections
Name Virtual Address Virtual Size Raw Size Charateristics Entropy
.text 0x00001000 0x0002859A 0x00028600 IMAGE_SCN_CNT_CODE,IMAGE_SCN_MEM_EXECUTE,IMAGE_SCN_MEM_READ 6.72265
.rdata 0x0002A000 0x00004FD3 0x00005000 IMAGE_SCN_CNT_INITIALIZED_DATA,IMAGE_SCN_MEM_READ 5.38632
.data 0x0002F000 0x00021428 0x00001600 IMAGE_SCN_CNT_INITIALIZED_DATA,IMAGE_SCN_MEM_READ,IMAGE_SCN_MEM_WRITE 3.46654
.rsrc 0x00051000 0x000095B0 0x00009600 IMAGE_SCN_CNT_INITIALIZED_DATA,IMAGE_SCN_MEM_READ 5.79957
Resources
1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

100

101

ASKNEXTVOL

GETPASSWORD1

LICENSEDLG

RENAMEDLG

REPLACEFILEDLG

STARTDLG

Imports
    COMCTL32.dll

    SHLWAPI.dll

    KERNEL32.dll

    USER32.dll

    GDI32.dll

    COMDLG32.dll

    ADVAPI32.dll

    SHELL32.dll

    ole32.dll

    OLEAUT32.dll

Exports

    No exports.

Screenshots

Processes

Total processes
47
Monitored processes
12
Malicious processes
7
Suspicious processes
1

Behavior graph

+
drop and start start drop and start drop and start drop and start sfx.exe setupall.exe setupall.tmp no specs setupall.exe setupall.tmp setupusb.exe regsvr32.exe no specs drvinst.exe rundll32.exe no specs vssvc.exe no specs drvinst.exe no specs mt-4e-rss.exe no specs
Specs description
Program did not start
Integrity level elevation
Task сontains an error or was rebooted
Process has crashed
Task contains several apps running
Executable file was dropped
Debug information is available
Process was injected
Network attacks were detected
Application downloaded the executable file
Actions similar to stealing personal data
Behavior similar to exploiting the vulnerability
Inspected object has sucpicious PE structure
File is detected by antivirus software
CPU overrun
RAM overrun
Process starts the services
Process was added to the startup
Behavior similar to spam
Low-level access to the HDD
Probably Tor was used
System was rebooted
Connects to the network
Known threat

Process information

Click at the process to see the details.

PID
3772
CMD
"C:\Users\admin\Desktop\sfx.exe"
Path
C:\Users\admin\Desktop\sfx.exe
Indicators
Parent process
––
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Description
Version
Modules
Image
c:\users\admin\desktop\sfx.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\shell32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\mpr.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\riched32.dll
c:\windows\system32\riched20.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\clbcatq.dll
c:\program files\common files\microsoft shared\ink\tiptsf.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\shdocvw.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\msasn1.dll
c:\users\admin\appdata\local\temp\rarsfx0\setupall.exe
c:\windows\system32\sfc.dll
c:\windows\system32\sfc_os.dll
c:\windows\system32\devrtl.dll
c:\program files\filezilla ftp client\fzshellext.dll
c:\windows\system32\ntshrui.dll
c:\windows\system32\srvcli.dll
c:\windows\system32\cscapi.dll
c:\windows\system32\slc.dll
c:\windows\system32\netutils.dll

PID
3560
CMD
"C:\Users\admin\AppData\Local\Temp\RarSFX0\setupAll.exe"
Path
C:\Users\admin\AppData\Local\Temp\RarSFX0\setupAll.exe
Indicators
Parent process
sfx.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Codan Radio Communications
Description
MT-4E-RSS Setup
Version
Modules
Image
c:\users\admin\appdata\local\temp\rarsfx0\setupall.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\shell32.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\mpr.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\uxtheme.dll
c:\users\admin\appdata\local\temp\is-gvv77.tmp\setupall.tmp

PID
2608
CMD
"C:\Users\admin\AppData\Local\Temp\is-GVV77.tmp\setupAll.tmp" /SL5="$10146,3487278,56832,C:\Users\admin\AppData\Local\Temp\RarSFX0\setupAll.exe"
Path
C:\Users\admin\AppData\Local\Temp\is-GVV77.tmp\setupAll.tmp
Indicators
No indicators
Parent process
setupAll.exe
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Description
Setup/Uninstall
Version
51.52.0.0
Modules
Image
c:\users\admin\appdata\local\temp\is-gvv77.tmp\setupall.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\mpr.dll
c:\windows\system32\version.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\propsys.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\shdocvw.dll
c:\program files\codan\mt-4e-rss\mt-4e-rss.exe

PID
2296
CMD
"C:\Users\admin\AppData\Local\Temp\RarSFX0\setupAll.exe" /SPAWNWND=$10152 /NOTIFYWND=$10146
Path
C:\Users\admin\AppData\Local\Temp\RarSFX0\setupAll.exe
Indicators
Parent process
setupAll.tmp
User
admin
Integrity Level
HIGH
Exit code
0
Version:
Company
Codan Radio Communications
Description
MT-4E-RSS Setup
Version
Modules
Image
c:\users\admin\appdata\local\temp\rarsfx0\setupall.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\shell32.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\apphelp.dll
c:\users\admin\appdata\local\temp\is-vueb8.tmp\setupall.tmp

PID
2700
CMD
"C:\Users\admin\AppData\Local\Temp\is-VUEB8.tmp\setupAll.tmp" /SL5="$20154,3487278,56832,C:\Users\admin\AppData\Local\Temp\RarSFX0\setupAll.exe" /SPAWNWND=$10152 /NOTIFYWND=$10146
Path
C:\Users\admin\AppData\Local\Temp\is-VUEB8.tmp\setupAll.tmp
Indicators
Parent process
setupAll.exe
User
admin
Integrity Level
HIGH
Exit code
0
Version:
Company
Description
Setup/Uninstall
Version
51.52.0.0
Modules
Image
c:\users\admin\appdata\local\temp\is-vueb8.tmp\setupall.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\mpr.dll
c:\windows\system32\version.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\shell32.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\profapi.dll
c:\users\admin\appdata\local\temp\is-bpem8.tmp\_isetup\_shfoldr.dll
c:\windows\system32\shfolder.dll
c:\windows\system32\rstrtmgr.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\bcryptprimitives.dll
c:\users\admin\appdata\local\temp\is-bpem8.tmp\isxdl.dll
c:\windows\system32\wininet.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\propsys.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\imageres.dll
c:\program files\common files\microsoft shared\ink\tiptsf.dll
c:\windows\system32\riched20.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\explorerframe.dll
c:\windows\system32\duser.dll
c:\windows\system32\dui70.dll
c:\windows\system32\sfc.dll
c:\windows\system32\sfc_os.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\linkinfo.dll
c:\windows\system32\ntshrui.dll
c:\windows\system32\srvcli.dll
c:\windows\system32\cscapi.dll
c:\windows\system32\slc.dll
c:\program files\codan\mt-4e-rss\mt-4e-rss.exe
c:\program files\codan\mt-4e-rss\unins000.exe
c:\windows\system32\apphelp.dll
c:\program files\codan\mt-4e-rss\usb installer\setupusb.exe
c:\windows\system32\netutils.dll

PID
2600
CMD
"C:\Program Files\Codan\MT-4E-RSS\USB Installer\setupUSB.exe"
Path
C:\Program Files\Codan\MT-4E-RSS\USB Installer\setupUSB.exe
Indicators
Parent process
setupAll.tmp
User
admin
Integrity Level
HIGH
Exit code
0
Version:
Company
Description
PnP Driver Installer
Version
1.7.0.0
Modules
Image
c:\program files\codan\mt-4e-rss\usb installer\setupusb.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\shell32.dll
c:\windows\system32\version.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\shfolder.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\profapi.dll
c:\users\admin\appdata\local\temp\nsvd70e.tmp\system.dll
c:\users\admin\appdata\local\temp\nskd71e.tmp\nsqd73f.tmp
c:\windows\system32\riched20.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\mssprxy.dll
c:\users\admin\appdata\local\temp\nsvd70e.tmp\registry.dll
c:\users\admin\appdata\local\temp\nsvd70e.tmp\md5dll.dll
c:\users\admin\appdata\local\temp\nsvd70e.tmp\installoptions.dll
c:\windows\system32\comdlg32.dll
c:\windows\system32\newdev.dll
c:\windows\system32\devrtl.dll
c:\program files\common files\microsoft shared\ink\tiptsf.dll
c:\windows\system32\spinf.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\regsvr32.exe
c:\windows\system32\drvstore.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\cabinet.dll
c:\users\admin\appdata\local\temp\nsvd70e.tmp\realprogress.dll

PID
1048
CMD
regsvr32 /s "C:\Program Files\Codan\Codan USB Driver\USBIOCOM.dll"
Path
C:\Windows\system32\regsvr32.exe
Indicators
No indicators
Parent process
setupUSB.exe
User
admin
Integrity Level
HIGH
Exit code
0
Version:
Company
Microsoft Corporation
Description
Microsoft(C) Register Server
Version
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\windows\system32\regsvr32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
c:\windows\system32\shlwapi.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\winmm.dll
c:\windows\system32\samcli.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msacm32.dll
c:\windows\system32\version.dll
c:\windows\system32\shell32.dll
c:\windows\system32\sfc.dll
c:\windows\system32\sfc_os.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\mpr.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\cryptbase.dll
c:\program files\codan\codan usb driver\usbiocom.dll

PID
2272
CMD
DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{67e871a3-381a-1b9b-4d28-377ca9e1780e}\codanusb.inf" "0" "6a15d52f7" "000002D0" "WinSta0\Default" "000003A8" "208" "C:\Program Files\Codan\Codan USB Driver"
Path
C:\Windows\system32\DrvInst.exe
Indicators
Parent process
––
User
SYSTEM
Integrity Level
SYSTEM
Exit code
0
Version:
Company
Microsoft Corporation
Description
Driver Installation Module
Version
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\windows\system32\drvinst.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\drvstore.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\cabinet.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\spinf.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\cryptnet.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\rundll32.exe
c:\windows\system32\ntmarta.dll
c:\windows\system32\srclient.dll
c:\windows\system32\spp.dll
c:\windows\system32\vssapi.dll
c:\windows\system32\atl.dll
c:\windows\system32\vsstrace.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\vss_ps.dll
c:\windows\system32\dsrole.dll
c:\windows\system32\msxml3.dll
c:\windows\system32\es.dll
c:\windows\system32\sxs.dll
c:\windows\system32\propsys.dll
c:\windows\system32\samcli.dll
c:\windows\system32\samlib.dll
c:\windows\system32\netutils.dll

PID
2336
CMD
rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{6b9e9027-3780-4c35-78a2-0c2198374116} Global\{0219e9e4-f70e-17a8-bc42-5a7318bd313e} C:\Windows\System32\DriverStore\Temp\{3991c3eb-a874-4758-346c-487f3385ea21}\codanusb.inf C:\Windows\System32\DriverStore\Temp\{3991c3eb-a874-4758-346c-487f3385ea21}\codanusb.cat
Path
C:\Windows\system32\rundll32.exe
Indicators
No indicators
Parent process
DrvInst.exe
User
admin
Integrity Level
HIGH
Exit code
0
Version:
Company
Microsoft Corporation
Description
Windows host process (Rundll32)
Version
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\mpr.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\pnpui.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\dui70.dll
c:\windows\system32\cryptbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\spinf.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\cryptnet.dll
c:\windows\system32\cabinet.dll
c:\windows\system32\windowscodecs.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\ehstorshell.dll
c:\windows\system32\propsys.dll
c:\windows\system32\cscui.dll
c:\windows\system32\cscdll.dll
c:\windows\system32\cscapi.dll
c:\windows\system32\ntshrui.dll
c:\windows\system32\srvcli.dll
c:\windows\system32\slc.dll
c:\windows\system32\imageres.dll
c:\windows\system32\duser.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\xmllite.dll
c:\windows\system32\netutils.dll

PID
3716
CMD
C:\Windows\system32\vssvc.exe
Path
C:\Windows\system32\vssvc.exe
Indicators
No indicators
Parent process
––
User
SYSTEM
Integrity Level
SYSTEM
Version:
Company
Microsoft Corporation
Description
Microsoft® Volume Shadow Copy Service
Version
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\windows\system32\vssvc.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\atl.dll
c:\windows\system32\ole32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\vssapi.dll
c:\windows\system32\vsstrace.dll
c:\windows\system32\netapi32.dll
c:\windows\system32\netutils.dll
c:\windows\system32\srvcli.dll
c:\windows\system32\wkscli.dll
c:\windows\system32\samcli.dll
c:\windows\system32\clusapi.dll
c:\windows\system32\cryptdll.dll
c:\windows\system32\xolehlp.dll
c:\windows\system32\version.dll
c:\windows\system32\resutils.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\authz.dll
c:\windows\system32\virtdisk.dll
c:\windows\system32\fltlib.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\vss_ps.dll
c:\windows\system32\samlib.dll
c:\windows\system32\es.dll
c:\windows\system32\propsys.dll
c:\windows\system32\catsrvut.dll
c:\windows\system32\mfcsubs.dll
c:\windows\system32\sxs.dll
c:\windows\system32\msxml3.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll

PID
2680
CMD
DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot18" "" "" "6792c44eb" "00000000" "000005E4" "000005EC"
Path
C:\Windows\system32\DrvInst.exe
Indicators
No indicators
Parent process
––
User
SYSTEM
Integrity Level
SYSTEM
Exit code
0
Version:
Company
Microsoft Corporation
Description
Driver Installation Module
Version
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Image
c:\windows\system32\drvinst.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\devrtl.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\spinf.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\gpapi.dll
c:\windows\system32\cryptnet.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\spfileq.dll

PID
1812
CMD
"C:\Program Files\Codan\MT-4E-RSS\MT-4E-RSS.exe"
Path
C:\Program Files\Codan\MT-4E-RSS\MT-4E-RSS.exe
Indicators
No indicators
Parent process
setupAll.tmp
User
admin
Integrity Level
MEDIUM
Version:
Company
Codan Radio Communications
Description
MT-4E RSS
Version
1.7.7.0
Modules
Image
c:\program files\codan\mt-4e-rss\mt-4e-rss.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\userenv.dll
c:\windows\system32\profapi.dll
c:\windows\system32\winspool.drv
c:\windows\system32\mpr.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
c:\windows\system32\version.dll
c:\windows\microsoft.net\framework\v2.0.50727\mscorwks.dll
c:\windows\winsxs\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.4940_none_d08cc06a442b34fc\msvcr80.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\mscorlib\62a0b3e4b40ec0e8c5cfaa0c8848e64a\mscorlib.ni.dll
c:\windows\microsoft.net\framework\v2.0.50727\mscorsec.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\system32\riched20.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\imagehlp.dll
c:\windows\system32\ncrypt.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\gpapi.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system\9e0a3b9b9f457233a335d7fba8f95419\system.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\microsoft.visualbas#\08d608378aa405adc844f3cf36974b8c\microsoft.visualbasic.ni.dll
c:\windows\microsoft.net\framework\v2.0.50727\mscorjit.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system.drawing\dbfe8642a8ed7b2b103ad28e0c96418a\system.drawing.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system.windows.forms\3afcd5168c7a6cb02eab99d7fd71e102\system.windows.forms.ni.dll
c:\windows\assembly\nativeimages_v2.0.50727_32\system.runtime.remo#\5cae93d923c8378370758489e5535820\system.runtime.remoting.ni.dll
c:\windows\system32\uxtheme.dll
c:\windows\assembly\gac_msil\system.windows.forms\2.0.0.0__b77a5c561934e089\system.windows.forms.dll
c:\program files\codan\mt-4e-rss\interop.usbiocomlibcodan.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\clbcatq.dll
c:\program files\codan\codan usb driver\usbiocom.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\windowscodecs.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\program files\codan\mt-4e-rss\daniels.deployment.autoupdater.dll
c:\windows\system32\sxs.dll

Registry activity

Total events
1373
Read events
1094
Write events
278
Delete events
1

Modification events

PID
Process
Operation
Key
Name
Value
3772
sfx.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
3772
sfx.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
2700
setupAll.tmp
write
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Owner
8C0A000038E0EBE46C8DD401
2700
setupAll.tmp
write
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
SessionHash
BDB9E418BEDF6C7EF960A617C84AA367885D69E4A0FA66B80A63437FC4AE5F51
2700
setupAll.tmp
write
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Sequence
1
2700
setupAll.tmp
write
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
RegFiles0000
C:\Program Files\Codan\MT-4E-RSS\MT-4E-RSS.exe
2700
setupAll.tmp
write
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
RegFilesHash
199E468347C429950C58C33CEC6B7DFEC4E3ABACB6FC3850248CF09714EC404C
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Program Files\Codan\MT-4E-RSS\USB Installer\codanusb.cat
1
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Program Files\Codan\MT-4E-RSS\USB Installer\codanusb.inf
1
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Program Files\Codan\MT-4E-RSS\USB Installer\codanusb.sys
1
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Program Files\Codan\MT-4E-RSS\USB Installer\codanusb_x64.sys
1
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Program Files\Codan\MT-4E-RSS\USB Installer\setup.bmp
1
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Program Files\Codan\MT-4E-RSS\USB Installer\setup.ini
1
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Program Files\Codan\MT-4E-RSS\USB Installer\setupUSB.exe
1
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Program Files\Codan\MT-4E-RSS\USB Installer\USBIOCOM.dll
1
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Program Files\Codan\MT-4E-RSS\USB Installer\usbiocom.tlb
1
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Program Files\Codan\MT-4E-RSS\USB Installer\USBIOCOM_x64.dll
1
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\SharedDLLs
C:\Program Files\Codan\MT-4E-RSS\USB Installer\usbiocom_x64.tlb
1
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\RSS.EXE
C:\Program Files\Codan\MT-4E-RSS\MT-4E-RSS.exe
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MT-4E-RSS_is1
Inno Setup: Setup Version
5.5.5 (a)
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MT-4E-RSS_is1
Inno Setup: App Path
C:\Program Files\Codan\MT-4E-RSS
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MT-4E-RSS_is1
InstallLocation
C:\Program Files\Codan\MT-4E-RSS\
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MT-4E-RSS_is1
Inno Setup: Icon Group
Codan\MT-4E-RSS
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MT-4E-RSS_is1
Inno Setup: User
admin
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MT-4E-RSS_is1
Inno Setup: Selected Tasks
desktopicon,quicklaunchicon
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MT-4E-RSS_is1
Inno Setup: Deselected Tasks
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MT-4E-RSS_is1
Inno Setup: Language
english
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MT-4E-RSS_is1
DisplayName
MT-4E-RSS v1.7.7
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MT-4E-RSS_is1
UninstallString
"C:\Program Files\Codan\MT-4E-RSS\unins000.exe"
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MT-4E-RSS_is1
QuietUninstallString
"C:\Program Files\Codan\MT-4E-RSS\unins000.exe" /SILENT
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MT-4E-RSS_is1
Publisher
Codan Radio Communications
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MT-4E-RSS_is1
URLInfoAbout
http://www.danelec.com/products/softwaredownloads/downloads.aspx?appid=12
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MT-4E-RSS_is1
HelpLink
http://www.danelec.com/support/
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MT-4E-RSS_is1
URLUpdateInfo
http://www.danelec.com/products/softwaredownloads/downloads.aspx?appid=12
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MT-4E-RSS_is1
NoModify
1
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MT-4E-RSS_is1
NoRepair
1
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MT-4E-RSS_is1
InstallDate
20181206
2700
setupAll.tmp
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MT-4E-RSS_is1
EstimatedSize
6717
2700
setupAll.tmp
delete key
HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
2600
setupUSB.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Codan USB Driver v2.71.1.0
DisplayName
Codan USB Driver v2.71.1.0
2600
setupUSB.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Codan USB Driver v2.71.1.0
DisplayVersion
2.71.1.0
2600
setupUSB.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Codan USB Driver v2.71.1.0
UninstallString
"C:\Program Files\Codan\Codan USB Driver\uninstall.exe"
2600
setupUSB.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Codan USB Driver v2.71.1.0
DisplayIcon
C:\Program Files\Codan\Codan USB Driver\uninstall.exe
2600
setupUSB.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Codan USB Driver v2.71.1.0
InstallLocation
C:\Program Files\Codan\Codan USB Driver\
2600
setupUSB.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Codan USB Driver v2.71.1.0
NoModify
1
2600
setupUSB.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Codan USB Driver v2.71.1.0
NoRepair
1
2600
setupUSB.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Codan USB Driver v2.71.1.0
Publisher
Codan Radio Communications
2600
setupUSB.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Codan\Codan USB Driver
InstallPath
C:\Program Files\Codan\Codan USB Driver
2600
setupUSB.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Codan\Codan USB Driver
UninstallCmd
C:\Program Files\Codan\Codan USB Driver\uninstall.exe
2600
setupUSB.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Codan\Codan USB Driver
UninstallCmdArgs
2600
setupUSB.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Codan\Codan USB Driver
DriverMajorVer
2600
setupUSB.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Codan\Codan USB Driver
DriverMinorVer
2600
setupUSB.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Codan\Codan USB Driver
DriverSubVer
2600
setupUSB.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Codan\Codan USB Driver
DriverBuildNb
2600
setupUSB.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Codan\Codan USB Driver
DriverVersion
2.71.1.0
2600
setupUSB.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Codan\Codan USB Driver
ProductName
Codan USB Driver
2600
setupUSB.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Codan\Codan USB Driver
SetupHashValue
19f7d483bb5acba0e87ef30d1c970ae1
2600
setupUSB.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\Setup\SetupapiLogStatus
setupapi.dev.log
4096
2600
setupUSB.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
LanguageList
en-US
2600
setupUSB.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Codan\Codan USB Driver
Language
1033
1048
regsvr32.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\USBIOCOM.USBIOInterface.1
USBIOInterface Class
1048
regsvr32.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\USBIOCOM.USBIOInterface.1\CLSID
{83999BCA-630B-410A-85C6-B606300EF1D3}
1048
regsvr32.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\USBIOCOM.USBIOInterface.1\CurVer
USBIOCOM.USBIOInterface.1
1048
regsvr32.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{83999BCA-630B-410A-85C6-B606300EF1D3}
USBIOInterface Class
1048
regsvr32.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{83999BCA-630B-410A-85C6-B606300EF1D3}\ProgID
USBIOCOM.USBIOInterface.1
1048
regsvr32.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{83999BCA-630B-410A-85C6-B606300EF1D3}\VersionIndependentProgID
USBIOCOM.USBIOInterface
1048
regsvr32.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{83999BCA-630B-410A-85C6-B606300EF1D3}\InprocServer32
C:\Program Files\Codan\Codan USB Driver\USBIOCOM.dll
1048
regsvr32.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{83999BCA-630B-410A-85C6-B606300EF1D3}\InprocServer32
ThreadingModel
Free
1048
regsvr32.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{83999BCA-630B-410A-85C6-B606300EF1D3}\TypeLib
{F1D7BB74-8D01-4944-BB68-AE6DD1667E82}
1048
regsvr32.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F1D7BB74-8D01-4944-BB68-AE6DD1667E82}\1.0
USBIOCOM Type Library Codan
1048
regsvr32.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F1D7BB74-8D01-4944-BB68-AE6DD1667E82}\1.0\FLAGS
0
1048
regsvr32.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F1D7BB74-8D01-4944-BB68-AE6DD1667E82}\1.0\0\win32
C:\Program Files\Codan\Codan USB Driver\USBIOCOM.tlb
1048
regsvr32.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\TypeLib\{F1D7BB74-8D01-4944-BB68-AE6DD1667E82}\1.0\HELPDIR
1048
regsvr32.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{BF1DFD90-5CAB-4F6F-8763-5CBF88BA5D2F}
_IUSBIOInterfaceEvents
1048
regsvr32.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{BF1DFD90-5CAB-4F6F-8763-5CBF88BA5D2F}\ProxyStubClsid
{00020420-0000-0000-C000-000000000046}
1048
regsvr32.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{BF1DFD90-5CAB-4F6F-8763-5CBF88BA5D2F}\ProxyStubClsid32
{00020420-0000-0000-C000-000000000046}
1048
regsvr32.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{BF1DFD90-5CAB-4F6F-8763-5CBF88BA5D2F}\TypeLib
{F1D7BB74-8D01-4944-BB68-AE6DD1667E82}
1048
regsvr32.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{BF1DFD90-5CAB-4F6F-8763-5CBF88BA5D2F}\TypeLib
Version
1.0
1048
regsvr32.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{78BE8C13-08CF-4F16-818F-8607A07C14A8}
IUSBIOInterface
1048
regsvr32.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{78BE8C13-08CF-4F16-818F-8607A07C14A8}\ProxyStubClsid
{00020424-0000-0000-C000-000000000046}
1048
regsvr32.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{78BE8C13-08CF-4F16-818F-8607A07C14A8}\ProxyStubClsid32
{00020424-0000-0000-C000-000000000046}
1048
regsvr32.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{78BE8C13-08CF-4F16-818F-8607A07C14A8}\TypeLib
{F1D7BB74-8D01-4944-BB68-AE6DD1667E82}
1048
regsvr32.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{78BE8C13-08CF-4F16-818F-8607A07C14A8}\TypeLib
Version
1.0
2272
DrvInst.exe
write
HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\5F\52C64B7E
LanguageList
en-US
2272
DrvInst.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\TrustedPublisher\Certificates\48E6AC1275B245E4D253F27959F542A1F176DE1E
Blob
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
2272
DrvInst.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
SrCreateRp (Enter)
40000000000000004EB366F96C8DD401E00800000C0D0000D5070000000000000000000000000000000000000000000000000000000000000000000000000000
2272
DrvInst.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
SppCreate (Enter)
4000000000000000A81569F96C8DD401E00800000C0D0000D0070000000000000000000000000000000000000000000000000000000000000000000000000000
2272
DrvInst.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
LastIndex
20
2272
DrvInst.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
SppGatherWriterMetadata (Enter)
4000000000000000F00FE5F96C8DD401E00800000C0D0000D3070000000000000000000000000000000000000000000000000000000000000000000000000000
2272
DrvInst.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
IDENTIFY (Enter)
40000000000000004A72E7F96C8DD401E0080000FC0D0000E80300000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
2272
DrvInst.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
IDENTIFY (Leave)
4000000000000000F6B4EDFA6C8DD401E0080000FC0D0000E80300000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
2272
DrvInst.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
SppGatherWriterMetadata (Leave)
400000000000000070B4A4016D8DD401E00800000C0D0000D3070000010000000000000000000000000000000000000000000000000000000000000000000000
2272
DrvInst.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
SppAddInterestingComponents (Enter)
400000000000000070B4A4016D8DD401E00800000C0D0000D4070000000000000000000000000000000000000000000000000000000000000000000000000000
2272
DrvInst.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
SppAddInterestingComponents (Leave)
40000000000000009A29BA016D8DD401E00800000C0D0000D4070000010000000000000000000000000000000000000000000000000000000000000000000000
2272
DrvInst.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
PREPAREBACKUP (Enter)
40000000000000001E01D2016D8DD401E0080000E8090000E90300000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
2272
DrvInst.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
PREPAREBACKUP (Leave)
4000000000000000BE26F8016D8DD401E0080000E8090000E90300000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
2272
DrvInst.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
GETSTATE (Enter)
4000000000000000BE26F8016D8DD401E0080000EC090000F90300000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
2272
DrvInst.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
GETSTATE (Leave)
400000000000000034D708026D8DD401E0080000EC090000F90300000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
2272
DrvInst.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
DOSNAPSHOT (Enter)
4000000000000000E89B0D026D8DD401E00800000C0D00000A0400000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
2272
DrvInst.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssapiPublisher
DOSNAPSHOT (Leave)
40000000000000002E8C62036D8DD401E00800005C0A00000A0400000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
2272
DrvInst.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SPP
SppCreate (Leave)
400000000000000088EE64036D8DD401E00800000C0D0000D0070000010000000000000000000000000000000000000000000000000000000000000000000000
2272
DrvInst.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SystemRestore
SrCreateRp (Leave)
400000000000000088EE64036D8DD401E00800000C0D0000D5070000010000000000000000000000000000000000000000000000000000000000000000000000
2272
DrvInst.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
FirstRun
0
2272
DrvInst.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
LastIndex
20
2272
DrvInst.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
NestingLevel
1
2272
DrvInst.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
StartNesting
4EB366F96C8DD401
2272
DrvInst.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore\Volatile
NestingLevel
0
2336
rundll32.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
LanguageList
en-US
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
IDENTIFY (Enter)
400000000000000074E7FCF96C8DD401840E0000B40E0000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
IDENTIFY (Enter)
400000000000000074E7FCF96C8DD401840E0000180A0000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\ASR Writer
IDENTIFY (Enter)
400000000000000074E7FCF96C8DD401840E0000140A0000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
IDENTIFY (Enter)
400000000000000074E7FCF96C8DD401840E0000C40E0000E8030000010000000100000000000000000000000000000000000000000000000000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
IDENTIFY (Leave)
4000000000000000820E04FA6C8DD401840E0000B40E0000E8030000000000000100000000000000000000000000000000000000000000000000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
IDENTIFY (Leave)
4000000000000000820E04FA6C8DD401840E0000C40E0000E8030000000000000100000000000000000000000000000000000000000000000000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\ASR Writer
IDENTIFY (Leave)
400000000000000036D308FA6C8DD401840E0000140A0000E8030000000000000100000000000000000000000000000000000000000000000000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
IDENTIFY (Leave)
400000000000000090350BFA6C8DD401840E0000180A0000E8030000000000000100000000000000000000000000000000000000000000000000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_BEGINPREPARE (Enter)
4000000000000000C49ECF016D8DD401840E0000180A0000010400000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_BEGINPREPARE (Leave)
40000000000000001E01D2016D8DD401840E0000180A0000010400000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
PREPAREBACKUP (Enter)
4000000000000000868ADB016D8DD401840E0000180A0000E90300000100000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
PREPAREBACKUP (Enter)
4000000000000000868ADB016D8DD401840E0000C40E0000E90300000100000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
PREPAREBACKUP (Enter)
4000000000000000868ADB016D8DD401840E0000140A0000E90300000100000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
PREPAREBACKUP (Leave)
40000000000000003A4FE0016D8DD401840E0000C40E0000E90300000000000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
VSS_WS_STABLE (SetCurrentState)
40000000000000003A4FE0016D8DD401840E0000C40E0000010000000100000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
PREPAREBACKUP (Leave)
40000000000000003A4FE0016D8DD401840E0000180A0000E90300000000000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
VSS_WS_STABLE (SetCurrentState)
40000000000000003A4FE0016D8DD401840E0000180A0000010000000100000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
PREPAREBACKUP (Leave)
40000000000000003A4FE0016D8DD401840E0000140A0000E90300000000000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
VSS_WS_STABLE (SetCurrentState)
400000000000000094B1E2016D8DD401840E0000140A0000010000000100000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
GETSTATE (Enter)
4000000000000000DA7406026D8DD401840E0000140A0000F90300000100000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
GETSTATE (Enter)
4000000000000000DA7406026D8DD401840E0000180A0000F90300000100000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
GETSTATE (Enter)
4000000000000000DA7406026D8DD401840E0000C40E0000F90300000100000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
GETSTATE (Leave)
4000000000000000DA7406026D8DD401840E0000140A0000F90300000000000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
GETSTATE (Leave)
4000000000000000DA7406026D8DD401840E0000C40E0000F90300000000000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
GETSTATE (Leave)
4000000000000000DA7406026D8DD401840E0000180A0000F90300000000000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_ENDPREPARE (Enter)
4000000000000000E89B0D026D8DD401840E0000340A0000020400000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_ENDPREPARE (Leave)
40000000000000000ED0A3026D8DD401840E0000340A0000020400000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher
PREPARESNAPSHOT (Enter)
40000000000000000ED0A3026D8DD401840E0000340A0000EA0300000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
PREPARESNAPSHOT (Enter)
40000000000000008480B4026D8DD401840E0000C8080000EA0300000100000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
PREPARESNAPSHOT (Enter)
40000000000000008480B4026D8DD401840E0000CC090000EA0300000100000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
PREPARESNAPSHOT (Enter)
40000000000000008480B4026D8DD401840E0000A40D0000EA0300000100000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
PREPARESNAPSHOT (Leave)
400000000000000032CDE1026D8DD401840E0000A40D0000EA0300000000000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
VSS_WS_WAITING_FOR_FREEZE (SetCurrentState)
400000000000000032CDE1026D8DD401840E0000A40D0000020000000100000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
PREPARESNAPSHOT (Leave)
400000000000000032CDE1026D8DD401840E0000C8080000EA0300000000000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
VSS_WS_WAITING_FOR_FREEZE (SetCurrentState)
400000000000000032CDE1026D8DD401840E0000C8080000020000000100000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
PREPARESNAPSHOT (Leave)
40000000000000008C2FE4026D8DD401840E0000CC090000EA0300000000000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
VSS_WS_WAITING_FOR_FREEZE (SetCurrentState)
40000000000000008C2FE4026D8DD401840E0000CC090000020000000100000001000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher
PREPARESNAPSHOT (Leave)
4000000000000000E0190F036D8DD401840E0000340A0000EA0300000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher
FREEZE (Enter)
4000000000000000E0190F036D8DD401840E0000340A0000EB0300000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher
FREEZE_FRONT (Enter)
4000000000000000E0190F036D8DD401840E0000340A0000EC0300000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
FREEZE (Enter)
400000000000000094DE13036D8DD401840E0000A40D0000EB0300000100000002000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
FREEZE (Leave)
400000000000000094DE13036D8DD401840E0000A40D0000EB0300000000000002000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
VSS_WS_WAITING_FOR_THAW (SetCurrentState)
400000000000000094DE13036D8DD401840E0000A40D0000030000000100000002000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
BKGND_FREEZE_THREAD (Enter)
400000000000000094DE13036D8DD401840E0000100B0000FC0300000100000003000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher
FREEZE_FRONT (Leave)
4000000000000000EE4016036D8DD401840E0000340A0000EC0300000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher
FREEZE_BACK (Enter)
4000000000000000EE4016036D8DD401840E0000340A0000ED0300000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher
FREEZE_BACK (Leave)
4000000000000000FC671D036D8DD401840E0000340A0000ED0300000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher
FREEZE_SYSTEM (Enter)
4000000000000000FC671D036D8DD401840E0000340A0000EE0300000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
FREEZE (Enter)
4000000000000000B02C22036D8DD401840E0000C8090000EB0300000100000002000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
FREEZE (Leave)
4000000000000000B02C22036D8DD401840E0000C8090000EB0300000000000002000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
VSS_WS_WAITING_FOR_THAW (SetCurrentState)
4000000000000000B02C22036D8DD401840E0000C8090000030000000100000002000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
BKGND_FREEZE_THREAD (Enter)
4000000000000000B02C22036D8DD401840E00004C0B0000FC0300000100000003000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher
FREEZE_SYSTEM (Leave)
400000000000000018B62B036D8DD401840E0000340A0000EE0300000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher
FREEZE_KTM (Enter)
400000000000000018B62B036D8DD401840E0000340A0000F00300000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher
FREEZE_KTM (Leave)
400000000000000018B62B036D8DD401840E0000340A0000F00300000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher
FREEZE_RM (Enter)
400000000000000018B62B036D8DD401840E0000340A0000EF0300000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
FREEZE (Enter)
4000000000000000CC7A30036D8DD401840E0000C8080000EB0300000100000002000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
FREEZE (Leave)
4000000000000000DAA137036D8DD401840E0000C8080000EB0300000000000002000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
VSS_WS_WAITING_FOR_THAW (SetCurrentState)
4000000000000000DAA137036D8DD401840E0000C8080000030000000100000002000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
BKGND_FREEZE_THREAD (Enter)
4000000000000000DAA137036D8DD401840E0000740C0000FC0300000100000003000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher
FREEZE_RM (Leave)
4000000000000000DAA137036D8DD401840E0000340A0000EF0300000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher
FREEZE (Leave)
4000000000000000DAA137036D8DD401840E0000340A0000EB0300000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_PRECOMMIT (Enter)
4000000000000000DAA137036D8DD401840E0000340A0000030400000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_PRECOMMIT (Leave)
4000000000000000DAA137036D8DD401840E0000340A0000030400000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Lovelace
OPEN_VOLUME_HANDLE (Enter)
4000000000000000DAA137036D8DD401840E0000340A0000FD0300000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Lovelace(__?_Volume{e1a82db4-a9f0-11e7-b142-806e6f6e6963}_)
OPEN_VOLUME_HANDLE (Enter)
4000000000000000DAA137036D8DD401840E0000600C0000FD0300000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Lovelace(__?_Volume{e1a82db4-a9f0-11e7-b142-806e6f6e6963}_)
OPEN_VOLUME_HANDLE (Leave)
4000000000000000B8DB51036D8DD401840E0000600C0000FD0300000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Lovelace
OPEN_VOLUME_HANDLE (Leave)
4000000000000000B8DB51036D8DD401840E0000340A0000FD0300000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Lovelace(__?_Volume{e1a82db4-a9f0-11e7-b142-806e6f6e6963}_)
IOCTL_FLUSH_AND_HOLD (Enter)
4000000000000000B8DB51036D8DD401840E0000600C0000FE0300000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Lovelace(__?_Volume{e1a82db4-a9f0-11e7-b142-806e6f6e6963}_)
IOCTL_FLUSH_AND_HOLD (Leave)
4000000000000000D42960036D8DD401840E0000600C0000FE0300000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Lovelace(__?_Volume{e1a82db4-a9f0-11e7-b142-806e6f6e6963}_)
IOCTL_RELEASE (Enter)
4000000000000000D42960036D8DD401840E0000600C0000FF0300000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Lovelace(__?_Volume{e1a82db4-a9f0-11e7-b142-806e6f6e6963}_)
IOCTL_RELEASE (Leave)
4000000000000000D42960036D8DD401840E0000600C0000FF0300000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Lovelace
IOCTL_FLUSH_AND_HOLD (Enter)
4000000000000000B8DB51036D8DD401840E0000340A0000FE0300000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Lovelace
IOCTL_FLUSH_AND_HOLD (Leave)
4000000000000000D42960036D8DD401840E0000340A0000FE0300000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Lovelace
IOCTL_RELEASE (Enter)
4000000000000000D42960036D8DD401840E0000340A0000FF030000010000000000000000000000000000000000000000000000000000000000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Lovelace
IOCTL_RELEASE (Leave)
4000000000000000D42960036D8DD401840E0000340A0000FF030000000000000000000000000000000000000000000000000000000000000000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_COMMIT (Enter)
4000000000000000D42960036D8DD401840E0000940C0000040400000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_COMMIT (Leave)
4000000000000000D42960036D8DD401840E0000940C0000040400000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_POSTCOMMIT (Enter)
4000000000000000D42960036D8DD401840E0000340A0000050400000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_POSTCOMMIT (Leave)
40000000000000002E8C62036D8DD401840E0000340A0000050400000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher
THAW_KTM (Enter)
40000000000000002E8C62036D8DD401840E0000340A0000F40300000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher
THAW_KTM (Leave)
40000000000000002E8C62036D8DD401840E0000340A0000F40300000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher
THAW (Enter)
40000000000000002E8C62036D8DD401840E0000340A0000F20300000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
THAW (Enter)
4000000000000000A43C73036D8DD401840E0000C8080000F20300000100000003000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
BKGND_FREEZE_THREAD (Leave)
4000000000000000A43C73036D8DD401840E00004C0B0000FC0300000000000003000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
THAW (Enter)
4000000000000000A43C73036D8DD401840E0000DC090000F20300000100000003000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
THAW (Enter)
4000000000000000A43C73036D8DD401840E0000A40D0000F20300000100000003000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
THAW (Leave)
4000000000000000A43C73036D8DD401840E0000C8080000F20300000000000003000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
BKGND_FREEZE_THREAD (Leave)
4000000000000000FE9E75036D8DD401840E0000100B0000FC0300000000000003000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
VSS_WS_WAITING_FOR_POST_SNAPSHOT (SetCurrentState)
4000000000000000FE9E75036D8DD401840E0000C8080000040000000100000003000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
THAW (Leave)
4000000000000000FE9E75036D8DD401840E0000DC090000F20300000000000003000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
VSS_WS_WAITING_FOR_POST_SNAPSHOT (SetCurrentState)
4000000000000000FE9E75036D8DD401840E0000DC090000040000000100000003000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
BKGND_FREEZE_THREAD (Leave)
4000000000000000FE9E75036D8DD401840E0000740C0000FC0300000000000003000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
THAW (Leave)
4000000000000000FE9E75036D8DD401840E0000A40D0000F20300000000000003000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
VSS_WS_WAITING_FOR_POST_SNAPSHOT (SetCurrentState)
4000000000000000FE9E75036D8DD401840E0000A40D0000040000000100000003000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher
THAW (Leave)
4000000000000000FE9E75036D8DD401840E0000340A0000F20300000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_PREFINALCOMMIT (Enter)
4000000000000000FE9E75036D8DD401840E0000340A0000060400000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_PREFINALCOMMIT (Leave)
40000000000000004C11C9036D8DD401840E0000340A0000060400000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher
POSTSNAPSHOT (Enter)
40000000000000004C11C9036D8DD401840E0000340A0000F50300000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
POSTSNAPSHOT (Enter)
40000000000000002A4BE3036D8DD401840E0000DC090000F50300000100000004000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
POSTSNAPSHOT (Enter)
40000000000000002A4BE3036D8DD401840E0000CC090000F50300000100000004000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
POSTSNAPSHOT (Enter)
40000000000000002A4BE3036D8DD401840E0000C8080000F50300000100000004000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
POSTSNAPSHOT (Leave)
40000000000000002A4BE3036D8DD401840E0000DC090000F50300000000000004000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
VSS_WS_WAITING_FOR_BACKUP_COMPLETE (SetCurrentState)
40000000000000002A4BE3036D8DD401840E0000DC090000050000000100000004000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
POSTSNAPSHOT (Leave)
400000000000000084ADE5036D8DD401840E0000C8080000F50300000000000004000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
VSS_WS_WAITING_FOR_BACKUP_COMPLETE (SetCurrentState)
400000000000000084ADE5036D8DD401840E0000C8080000050000000100000004000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
POSTSNAPSHOT (Leave)
4000000000000000D45691046D8DD401840E0000CC090000F50300000000000004000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
VSS_WS_WAITING_FOR_BACKUP_COMPLETE (SetCurrentState)
4000000000000000D45691046D8DD401840E0000CC090000050000000100000004000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher
POSTSNAPSHOT (Leave)
4000000000000000D45691046D8DD401840E0000340A0000F50300000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_POSTFINALCOMMIT (Enter)
4000000000000000D45691046D8DD401840E0000340A0000070400000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5}
PROVIDER_POSTFINALCOMMIT (Leave)
4000000000000000FECBA6046D8DD401840E0000340A0000070400000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher
BACKUPSHUTDOWN (Enter)
4000000000000000747CB7046D8DD401840E0000340A0000FB0300000100000000000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
BACKUPSHUTDOWN (Enter)
40000000000000002841BC046D8DD401840E0000CC090000FB0300000100000005000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Registry Writer
BACKUPSHUTDOWN (Leave)
40000000000000002841BC046D8DD401840E0000CC090000FB0300000000000005000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
BACKUPSHUTDOWN (Enter)
40000000000000002841BC046D8DD401840E0000DC090000FB0300000100000005000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\COM+ REGDB Writer
BACKUPSHUTDOWN (Leave)
40000000000000002841BC046D8DD401840E0000DC090000FB0300000000000005000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
BACKUPSHUTDOWN (Enter)
40000000000000002841BC046D8DD401840E0000C8080000FB0300000100000005000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\Shadow Copy Optimization Writer
BACKUPSHUTDOWN (Leave)
40000000000000002841BC046D8DD401840E0000C8080000FB0300000000000005000000000000001B93E909773977499051185852BA821C0000000000000000
3716
vssvc.exe
write
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\VSS\Diag\VssvcPublisher
BACKUPSHUTDOWN (Leave)
40000000000000002841BC046D8DD401840E0000340A0000FB0300000000000000000000000000001B93E909773977499051185852BA821C0000000000000000
2680
DrvInst.exe
write
HKEY_USERS\.DEFAULT\Software\Classes\Local Settings\MuiCache\5F\52C64B7E
LanguageList
en-US
1812
MT-4E-RSS.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
LanguageList
en-US

Files activity

Executable files
30
Suspicious files
18
Text files
270
Unknown types
531

Dropped files

PID
Process
Filename
Type
3772
sfx.exe
C:\Users\admin\AppData\Local\Temp\RarSFX0\codanusb.sys
executable
MD5: 01fc677be7e13bd8eb00c85c115b1aab
SHA256: 160e57a95966d5d2d4a01e95a6730593a5bbed0343b8118a3435af7603d824d1
2700
setupAll.tmp
C:\Program Files\Codan\MT-4E-RSS\MT-4E-RSS.exe
executable
MD5: b46e1f98eace634af430f652f278bd5d
SHA256: 4797fa3eb03ee0a58165e8dee0a7c97984b9ccc035cb40230ce23a3ca34e530d
2600
setupUSB.exe
C:\Users\admin\AppData\Local\Temp\nsvD70E.tmp\registry.dll
executable
MD5: ad0c39f7ff92b650511117ffa94d2a65
SHA256: 45e8054f0ac9b39a187efc0365ab871ed3fbd16868721ad3bc9fbbf4f83a64d2
2700
setupAll.tmp
C:\Program Files\Codan\MT-4E-RSS\unins000.exe
executable
MD5: 6380c448a35d400989373c0a5acaaf25
SHA256: f349292319b59fb6d5bf92c093fcc379865af938b8ee9cb65c92720050a161b7
2600
setupUSB.exe
C:\Users\admin\AppData\Local\Temp\nsvD70E.tmp\md5dll.dll
executable
MD5: 0745ff646f5af1f1cdd784c06f40fce9
SHA256: fbed2f1160469f42ce97c33ad558201b2b43e3020257f9b2259e3ce295317a70
2700
setupAll.tmp
C:\Users\admin\AppData\Local\Temp\is-BPEM8.tmp\isxdl.dll
executable
MD5: 997a36e9e1dbbf7e280b52b4603327b3
SHA256: 80724cccc8487f37e76ff3d970a898e628fcab4c707ba6bfef7f332fbc9553bb
2600
setupUSB.exe
C:\Program Files\Codan\Codan USB Driver\uninstall.exe
executable
MD5: f38e4e3e1faf8b42d4de493bf3445b0d
SHA256: c0f5f3530608cd12ca8b00fd58164ae1b2a5ea26d1e52156fbc0f328ad737ca8
2700
setupAll.tmp
C:\Users\admin\AppData\Local\Temp\is-BPEM8.tmp\_isetup\_shfoldr.dll
executable
MD5: 92dc6ef532fbb4a5c3201469a5b5eb63
SHA256: 9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
2600
setupUSB.exe
C:\Program Files\Codan\Codan USB Driver\codanusb.sys
executable
MD5: 01fc677be7e13bd8eb00c85c115b1aab
SHA256: 160e57a95966d5d2d4a01e95a6730593a5bbed0343b8118a3435af7603d824d1
2296
setupAll.exe
C:\Users\admin\AppData\Local\Temp\is-VUEB8.tmp\setupAll.tmp
executable
MD5: 6380c448a35d400989373c0a5acaaf25
SHA256: f349292319b59fb6d5bf92c093fcc379865af938b8ee9cb65c92720050a161b7
2700
setupAll.tmp
C:\Program Files\Codan\MT-4E-RSS\LangInt.dll
executable
MD5: 3553a5346b4436b2f1e2afbb8a1debf8
SHA256: 7319a51c814b72b75f22b7a8ceff4afbdc175d85776f26ac2dd2f815f39d03aa
2600
setupUSB.exe
C:\Program Files\Codan\Codan USB Driver\USBIOCOM.dll
executable
MD5: d62f52ceea6dede22b4f2194592a7350
SHA256: 93f5e15f078cf9d3a527c576f571c6a544eaadd964607e674b4b0b0d2537ec0e
2700
setupAll.tmp
C:\Program Files\Codan\MT-4E-RSS\Interop.USBIOCOMLibCodan.dll
executable
MD5: dbc9001ef55ac92a1f6744138ef2255f
SHA256: 0729192941816227994052f988e43b8928982af7148b2665f1fe5e9939c24afc
3560
setupAll.exe
C:\Users\admin\AppData\Local\Temp\is-GVV77.tmp\setupAll.tmp
executable
MD5: 6380c448a35d400989373c0a5acaaf25
SHA256: f349292319b59fb6d5bf92c093fcc379865af938b8ee9cb65c92720050a161b7
2700
setupAll.tmp
C:\Program Files\Codan\MT-4E-RSS\Daniels.Deployment.AutoUpdater.dll
executable
MD5: 53dd2e1b132d1f4202f9809b2d36be63
SHA256: b9a74644dd697db5f7b8647adbfb285470170eae4574796f868721c51953677b
2600
setupUSB.exe
C:\Users\admin\AppData\Local\Temp\{67e871a3-381a-1b9b-4d28-377ca9e1780e}\codanusb.sys
executable
MD5: 01fc677be7e13bd8eb00c85c115b1aab
SHA256: 160e57a95966d5d2d4a01e95a6730593a5bbed0343b8118a3435af7603d824d1
2700
setupAll.tmp
C:\Program Files\Codan\MT-4E-RSS\USB Installer\codanusb.sys
executable
MD5: 01fc677be7e13bd8eb00c85c115b1aab
SHA256: 160e57a95966d5d2d4a01e95a6730593a5bbed0343b8118a3435af7603d824d1
3772
sfx.exe
C:\Users\admin\AppData\Local\Temp\RarSFX0\setupAll.exe
executable
MD5: 6a01ea7ac0b2bab535f1fce9f413fbb4
SHA256: 76c9d1aa05d0aa0eaf5ce68493846cdf56853d1144ac7fcecc66aa13294229d2
2700
setupAll.tmp
C:\Program Files\Codan\MT-4E-RSS\USB Installer\codanusb_x64.sys
executable
MD5: d00d993f016921be71e12cd69eace69b
SHA256: 8b31e7e0aced40c81f511dc12f86d3e296863b8ea82e2386605d93944276f94a
2272
DrvInst.exe
C:\Windows\System32\DriverStore\Temp\{3991c3eb-a874-4758-346c-487f3385ea21}\codanusb.sys
executable
MD5: 01fc677be7e13bd8eb00c85c115b1aab
SHA256: 160e57a95966d5d2d4a01e95a6730593a5bbed0343b8118a3435af7603d824d1
2600
setupUSB.exe
C:\Users\admin\AppData\Local\Temp\nskD71E.tmp\nsvD75F.tmp
executable
MD5: bd6f022e16e273edaa9db7761d544338
SHA256: 92dd48cfdba02c7b150af0def9e43dca709a88be2e93394a6bf72ee9d0e5ae93
3772
sfx.exe
C:\Users\admin\AppData\Local\Temp\RarSFX0\codanusb_x64.sys
executable
MD5: d00d993f016921be71e12cd69eace69b
SHA256: 8b31e7e0aced40c81f511dc12f86d3e296863b8ea82e2386605d93944276f94a
2700
setupAll.tmp
C:\Program Files\Codan\MT-4E-RSS\USB Installer\USBIOCOM.dll
executable
MD5: d62f52ceea6dede22b4f2194592a7350
SHA256: 93f5e15f078cf9d3a527c576f571c6a544eaadd964607e674b4b0b0d2537ec0e
2600
setupUSB.exe
C:\Users\admin\AppData\Local\Temp\nsvD70E.tmp\RealProgress.dll
executable
MD5: 34eb3de90b30d2c4d18ee625ac95369e
SHA256: e36cb3caabb806b27475080682837a7d379fbe903358aa189bd0e51511ef27f2
2700
setupAll.tmp
C:\Program Files\Codan\MT-4E-RSS\USB Installer\USBIOCOM_x64.dll
executable
MD5: 3e336445373af725471474b175881bb0
SHA256: f64149072e119f4e1af8b3de1360e2cc129ffa5c693311327971d4842a571b02
2700
setupAll.tmp
C:\Program Files\Codan\MT-4E-RSS\USB Installer\setupUSB.exe
executable
MD5: 06c39cb5d05bc90efbd1d1c2a071d488
SHA256: 5c046872f3ba688cdc0fee15b0335cc37987b6065dbb207c3287679fc40e040d
2600
setupUSB.exe
C:\Users\admin\AppData\Local\Temp\nsvD70E.tmp\System.dll
executable
MD5: 00a0194c20ee912257df53bfe258ee4a
SHA256: dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
2600
setupUSB.exe
C:\Users\admin\AppData\Local\Temp\nskD71E.tmp\nsqD73F.tmp
executable
MD5: 2db42296d229de3cdc5c368d4efcbbe0
SHA256: 830448fd966e46b2bcdb49926425a31b941536a4eda4c49a85aa0128771c3efb
2600
setupUSB.exe
C:\Users\admin\AppData\Local\Temp\nsvD70E.tmp\InstallOptions.dll
executable
MD5: 0dc0cc7a6d9db685bf05a7e5f3ea4781
SHA256: 8e287326f1cdd5ef2dcd7a72537c68cbe4299ceb1f820707c5820f3aa6d8206c
2600
setupUSB.exe
C:\Windows\inf\multiprt.PNF
pnf
MD5: c469ac66b7fdd6dd7cfca3ad4affd142
SHA256: 8fe4ca6abf7915f93232c3b28d4d42120d39ff54a361577746426c1c5efe62b3
2272
DrvInst.exe
C:\System Volume Information\SPP\metadata-2
––
MD5:  ––
SHA256:  ––
2272
DrvInst.exe
C:\System Volume Information\SPP\OnlineMetadataCache\{09e9931b-3977-4977-9051-185852ba821c}_OnDiskSnapshotProp
binary
MD5: 383834bc8865f96cb9f96656952b0e8f
SHA256: a72cc0864de6faf91eb50f9fe99c7ab9385d6fb4c75df9dfadaf715ed38b9153
2272
DrvInst.exe
C:\System Volume Information\SPP\snapshot-2
binary
MD5: 383834bc8865f96cb9f96656952b0e8f
SHA256: a72cc0864de6faf91eb50f9fe99c7ab9385d6fb4c75df9dfadaf715ed38b9153
2272
DrvInst.exe
C:\Windows\INF\setupapi.dev.log
ini
MD5: aec52788be406932b55bf80541647736
SHA256: 872dfba2bd85ec2bedf25b63cd846261e67cda73769cb47a5191befb098bb7b8
2272
DrvInst.exe
C:\Windows\TEMP\Tar2FB5.tmp
––
MD5:  ––
SHA256:  ––
2272
DrvInst.exe
C:\Windows\TEMP\Cab2FB4.tmp
––
MD5:  ––
SHA256:  ––
2336
rundll32.exe
C:\Users\admin\AppData\Local\Temp\Cab1E3B.tmp
––
MD5:  ––
SHA256:  ––
2336
rundll32.exe
C:\Users\admin\AppData\Local\Temp\Tar1E3C.tmp
––
MD5:  ––
SHA256:  ––
2336
rundll32.exe
C:\Users\admin\AppData\Local\Temp\Tar1E1B.tmp
––
MD5:  ––
SHA256:  ––
2336
rundll32.exe
C:\Users\admin\AppData\Local\Temp\Tar1E0A.tmp
––
MD5:  ––
SHA256:  ––
2336
rundll32.exe
C:\Users\admin\AppData\Local\Temp\Cab1E1A.tmp
––
MD5:  ––
SHA256:  ––
2336
rundll32.exe
C:\Users\admin\AppData\Local\Temp\Cab1E09.tmp
––
MD5:  ––
SHA256:  ––
2272
DrvInst.exe
C:\Windows\INF\setupapi.dev.log
ini
MD5: 5310c4209c2d30e0572eba91ef03f43f
SHA256: 60f0a187a6316d4486970bf5a847ccb3073748a77a63c43ca72182904c91645e
2272
DrvInst.exe
C:\Windows\TEMP\Tar1CC7.tmp
––
MD5:  ––
SHA256:  ––
2272
DrvInst.exe
C:\Windows\TEMP\Cab1CC6.tmp
––
MD5:  ––
SHA256:  ––
2272
DrvInst.exe
C:\Windows\TEMP\Tar1CA6.tmp
––
MD5:  ––
SHA256:  ––
2272
DrvInst.exe
C:\Windows\TEMP\Cab1CA5.tmp
––
MD5:  ––
SHA256:  ––
2272
DrvInst.exe
C:\Windows\TEMP\Cab1C74.tmp
––
MD5:  ––
SHA256:  ––
2272
DrvInst.exe
C:\Windows\TEMP\Tar1C75.tmp
––
MD5:  ––
SHA256:  ––
2272
DrvInst.exe
C:\Windows\TEMP\Tar1C64.tmp
––
MD5:  ––
SHA256:  ––
2272
DrvInst.exe
C:\Windows\TEMP\Cab1C63.tmp
––
MD5:  ––
SHA256:  ––
2600
setupUSB.exe
C:\Users\admin\AppData\Local\Temp\nsvD70E.tmp\ioSpecial.ini
––
MD5:  ––
SHA256:  ––
2272
DrvInst.exe
C:\Windows\System32\DriverStore\Temp\{3991c3eb-a874-4758-346c-487f3385ea21}\SET1C07.tmp
––
MD5:  ––
SHA256:  ––
2272
DrvInst.exe
C:\Windows\System32\DriverStore\Temp\{3991c3eb-a874-4758-346c-487f3385ea21}\codanusb.inf
binary
MD5: 54690341166e6435d090dce82dda8658
SHA256: 5aecde1bf1df5214fbdc16c3d9ab06d3363976f1541c91ca4fa75e3ee1490133
2272
DrvInst.exe
C:\Windows\System32\DriverStore\Temp\{3991c3eb-a874-4758-346c-487f3385ea21}\codanusb.cat
cat
MD5: 30d89657d9d555e6d7a0a4555d0f6f4a
SHA256: b06e8b2948d90c9a554fe0f87876546f979e4fe53a0bd3944446f5be13ddb793
2272
DrvInst.exe
C:\Windows\System32\DriverStore\Temp\{3991c3eb-a874-4758-346c-487f3385ea21}\SET1BE6.tmp
––
MD5:  ––
SHA256:  ––
2272
DrvInst.exe
C:\Windows\System32\DriverStore\Temp\{3991c3eb-a874-4758-346c-487f3385ea21}\SET1BF6.tmp
––
MD5:  ––
SHA256:  ––
2600
setupUSB.exe
C:\Users\admin\AppData\Local\Temp\nsvD70E.tmp\ioSpecial.ini
text
MD5: 1ba44368ce9644e7b658174cec428e70
SHA256: 422b20c06c2975545ba2fc4fbf5a16f9662be4274bffc6253b8a36348efc9706
2600
setupUSB.exe
C:\Users\admin\AppData\Local\Temp\{67e871a3-381a-1b9b-4d28-377ca9e1780e}\SET1B6B.tmp
––
MD5:  ––
SHA256:  ––
2600
setupUSB.exe
C:\Users\admin\AppData\Local\Temp\{67e871a3-381a-1b9b-4d28-377ca9e1780e}\codanusb.cat
cat
MD5: 30d89657d9d555e6d7a0a4555d0f6f4a
SHA256: b06e8b2948d90c9a554fe0f87876546f979e4fe53a0bd3944446f5be13ddb793
2600
setupUSB.exe
C:\Users\admin\AppData\Local\Temp\{67e871a3-381a-1b9b-4d28-377ca9e1780e}\codanusb.inf
binary
MD5: 54690341166e6435d090dce82dda8658
SHA256: 5aecde1bf1df5214fbdc16c3d9ab06d3363976f1541c91ca4fa75e3ee1490133
2600
setupUSB.exe
C:\Users\admin\AppData\Local\Temp\{67e871a3-381a-1b9b-4d28-377ca9e1780e}\SET1B59.tmp
––
MD5:  ––
SHA256:  ––
2600
setupUSB.exe
C:\Users\admin\AppData\Local\Temp\{67e871a3-381a-1b9b-4d28-377ca9e1780e}\SET1B5A.tmp
––
MD5:  ––
SHA256:  ––
2600
setupUSB.exe
C:\Windows\INF\setupapi.dev.log
ini
MD5: 5310c4209c2d30e0572eba91ef03f43f
SHA256: 60f0a187a6316d4486970bf5a847ccb3073748a77a63c43ca72182904c91645e
2600
setupUSB.exe
C:\Windows\INF\setupapi.dev.log
ini
MD5: 890a44e8e0cd1e37f147ac84410d6868
SHA256: 6ae806be565206a67f859a9671dfc3f00490e152e036e0bc44563ec4ecab37d1
2600
setupUSB.exe
C:\Windows\INF\setupapi.dev.log
ini
MD5: 4684451172beba517a0449b3407e10bb
SHA256: d57eccb59348429df2197a585919d1506e701d31267f818b177291d374dad5cb
2600
setupUSB.exe
C:\Windows\INF\setupapi.dev.log
ini
MD5: 635fa8c83b75d18d651b197c0e5cfbca
SHA256: 4bbeab4cff96deb6a5488ac0aa517fe6ffe53ed0b5b148ccef212eb55e0bfd4c
2600
setupUSB.exe
C:\Users\admin\AppData\Local\Temp\PnP Driver Installer.log
text
MD5: b4a3884b350ff603be34194e909e4aa5
SHA256: ff7d2d2c64bf086312d46cb4c854b05ebc54658c50536b241dc0de1536f1ff9d
2600
setupUSB.exe
C:\Users\admin\AppData\Local\Temp\nsvD70E.tmp\ioSpecial.ini
text
MD5: 553ec33f1b64226e5c48b5a840945d6e
SHA256: 3cf5a6e75e06a90fd03973fdad47de82f274d24ddeeee5c993cfa20a5b74fe6a
2600
setupUSB.exe
C:\Program Files\Codan\Codan USB Driver\usbiocom.tlb
tlb
MD5: a488c848fac7c730164df5587b7844ea
SHA256: c9f62b16893c17112c39ee2ebe3cf3d8503d28ab09003263e01a42014547b2ce
3716
vssvc.exe
C:
––
MD5:  ––
SHA256:  ––
2600
setupUSB.exe
C:\Program Files\Codan\Codan USB Driver\codanusb.inf
binary
MD5: 54690341166e6435d090dce82dda8658
SHA256: 5aecde1bf1df5214fbdc16c3d9ab06d3363976f1541c91ca4fa75e3ee1490133
2600
setupUSB.exe
C:\Program Files\Codan\Codan USB Driver\codanusb.cat
cat
MD5: 30d89657d9d555e6d7a0a4555d0f6f4a
SHA256: b06e8b2948d90c9a554fe0f87876546f979e4fe53a0bd3944446f5be13ddb793
2600
setupUSB.exe
C:\Program Files\Codan\Codan USB Driver\setup.ini
text
MD5: 1fd6696aecca6e6de5ce885e36253a6e
SHA256: 17e808a26c91bbe746382dc2cb69cc2d80bb47ccfeb36419ff92fff98ec9a4e8
2600
setupUSB.exe
C:\Program Files\Codan\Codan USB Driver\setup.bmp
image
MD5: e2568edd8bd23735fe5304661fa3c4bf
SHA256: fb51285d85875cc0aa83f612e8b3977557dc1e84b4a3ae02f24ea2e8182cd84d
2600
setupUSB.exe
C:\Users\admin\AppData\Local\Temp\PnP Driver Installer.log
text
MD5: d8661b5c03084a50e6210c6fb42b8751
SHA256: 210c857943da4dc01155d939e5eef98f36cdd103beeb3b072aac45af5a8d4a32
2600
setupUSB.exe
C:\Users\admin\AppData\Local\Temp\PnP Driver Installer.log
text
MD5: 9ba5bb93a2cdc2149406dd6614974ad2
SHA256: 9997daefbba42d6e2ec5129508c1a2c1cf225b95dd7bab0c9048ed860bb73714
2600
setupUSB.exe
C:\Windows\inf\xnacc.PNF
pnf
MD5: 3ff3178bf1908a7353e078458363895f
SHA256: 8a2dc8c39a6d0530edf4c72e9b4cac073e7391d8f196582eb8de1e1beb654a8a
2600
setupUSB.exe
C:\Windows\inf\wvmic.PNF
pnf
MD5: b69b1925eb482bb48778a8e8305fd6ac
SHA256: 23fa653cfcf08f95e7ce65ad060ff4338e48c450294ca746393f7f4c13e6f5d5
2600
setupUSB.exe
C:\Windows\inf\xcbdav.PNF
pnf
MD5: da64f203164717c983a8f32b6095821b
SHA256: f4c27aea3ffaa495df8aa94baaed6a71516c1c283094898412c6ad0e1cac4fea
2600
setupUSB.exe
C:\Windows\inf\wvmbusvideo.PNF
pnf
MD5: 3c16ce420cddb54baedf79778da50e7f
SHA256: 1f3fa5eba943eb31703a5e28c2749bae4b2a224b756146304297b6e6134b5648
2600
setupUSB.exe
C:\Windows\inf\wvmbus.PNF
pnf
MD5: 6291ef21798a207413b5c3bbcfbb185e
SHA256: e1fb8b339b3a506eb84474e3dfec2dfce28f2967a2f81d3294ab65dccb89aaea
2600
setupUSB.exe
C:\Windows\inf\wudfusbcciddriver.PNF
pnf
MD5: 633cf02912cac54b6dbff9e2e36575b0
SHA256: cf94a91236176dde84d2fa2fdacbea5340b9fdd38ab323ff54cd9536c1efa941
2600
setupUSB.exe
C:\Windows\inf\wstorvsc.PNF
pnf
MD5: 4a8018f3a41529730960e69ad9daafa3
SHA256: 9fb2998eae38a94030e41c757320afffd57cef708288ea386dc727e91649d23a
2600
setupUSB.exe
C:\Windows\inf\wvmbushid.PNF
pnf
MD5: 60852595dc7ac1a900b2bc876b623e20
SHA256: da58bd86d112c2ea2cc0b51334279e0f06ecfb0839cf99c64f7ab999663f0af2
2600
setupUSB.exe
C:\Windows\inf\wsdscdrv.PNF
pnf
MD5: 1d3ebc0c60759257cc36a43a1553586f
SHA256: 617674c2b7b60ff5cdc4155b1dc462b0b32dc9a6aaae6fe8060d914e9653a41e
2600
setupUSB.exe
C:\Windows\inf\wstorflt.PNF
pnf
MD5: 26116404f623f19a54710c6e77a61d98
SHA256: b865330307aa0822b82d9810dfbe62c2a9ec57cc562c86ae9253199d9090c237
2600
setupUSB.exe
C:\Windows\inf\ws3cap.PNF
pnf
MD5: 6588de5e409f8b4e7a02acd97abdc4e0
SHA256: d941a2e2b91bd64f27d84955d9bbbf7d10718fd596e9da70b239dcc246b1f478
2600
setupUSB.exe
C:\Windows\inf\wsdprint.PNF
pnf
MD5: 55d19bb6f60a0394ced4e15fbaaef9db
SHA256: e6d41c18ac53c18a0b4f13ad1062ec55d73167205d58ac6a2b79f739772669ba
2600
setupUSB.exe
C:\Windows\inf\wpdmtp.PNF
pnf
MD5: 4aaec074aeadf829d0990fb28f1b8acd
SHA256: c51173978f1302594313f56b52fa4ff37cb2be72c2a08579c89db1d8515f2623
2600
setupUSB.exe
C:\Windows\inf\wpdmtphw.PNF
pnf
MD5: f00cf7597d765fb67a656badfa2a419e
SHA256: 234e5cef6094747de85a4ddc8b4c6c0242a80d6c938339f9bd224d9520ad75f1
2600
setupUSB.exe
C:\Windows\inf\wpdfs.PNF
pnf
MD5: f4ee535d7a0d434373b7fb099c445cbd
SHA256: 66724cc815d4a8fc4088b0fdd53fa2f4435420887117397852f9cd06ad72f63d
2600
setupUSB.exe
C:\Windows\inf\wpdcomp.PNF
pnf
MD5: c010f4b2ab609512c16f30814aaf1f2d
SHA256: 081afbaf22dc069d8b695c05079287213b613caf38d5f08b6b136ee55fd0b572
2600
setupUSB.exe
C:\Windows\inf\winusb.PNF
pnf
MD5: b30dd88ed4319d58b271815b50bff219
SHA256: f06ae2f896f8db8d06f03fe151168b1b386334a0a3a645e255429fe07a8061e1
2600
setupUSB.exe
C:\Windows\inf\wnetvsc.PNF
pnf
MD5: 170f447547d7a22c93f361ad7e547fcc
SHA256: 71380c7a57d275afbcf4eb2b9c78ec6fd264c9812c85b8a2798cae46e5cf61dd
2600
setupUSB.exe
C:\Windows\inf\windowssideshowenhanceddriver.PNF
pnf
MD5: 9bd5191ce8c120acb152d6331e8ee84f
SHA256: c176723a1a216c1b8c5503f4e23ab4150d138602f5d977586be36dd8a5717f6f
2600
setupUSB.exe
C:\Windows\inf\wiaxx002.PNF
pnf
MD5: 10e8fc72351810e730f2dc35a9aa6aef
SHA256: aaa6ee6618e1772fbc1fbd6f64b38981affd9d480189e61e8068b4233de8c0aa
2600
setupUSB.exe
C:\Windows\inf\wiasa002.PNF
pnf
MD5: f192410f95d13cef00824d30a673f98e
SHA256: f756af23a20b07bb16aa42f3bcace088e5c2c9da216ae136d8554d5547f194de
2600
setupUSB.exe
C:\Windows\inf\wialx004.PNF
pnf
MD5: 7a40967243b6f39acc4cde97885fdc4e
SHA256: 93cf6626302dc434fe8823772a2aa39bc574833a9f2944e36577404b071ddfed
2600
setupUSB.exe
C:\Windows\inf\wialx006.PNF
pnf
MD5: 0d0553229cd42cd8ca4effab9308383d
SHA256: 788e85c603e9ba44ddaec360ed771732589159a7a133be3b875b7e4369829cb0
2600
setupUSB.exe
C:\Windows\inf\wialx005.PNF
pnf
MD5: e476c54c84a0b28de6e772a6cfac4812
SHA256: 4dd0aa1739f6f27f0fdb82a17871fa4dfdb4280e5364a5d2783059ca08e792a0
2600
setupUSB.exe
C:\Windows\inf\wialx003.PNF
pnf
MD5: 3cfea8348c26f5e3da385ce97869a2bc
SHA256: f2eab356cca3354674cdb729c89b93f33c329f570b73749ec3e3566943c1cb28
2600
setupUSB.exe
C:\Windows\inf\wiahp001.PNF
pnf
MD5: f9fb127f973a3b52737be077f0cfe527
SHA256: ce5ed7a857c75f2debd04af24324850e59347d70974a49576f6fc35738bd7bfe
2600
setupUSB.exe
C:\Windows\inf\wialx002.PNF
pnf
MD5: 48ebc229622934fb164c37145fe58e94
SHA256: 663efb65901862eeafb9b8ce4abf0a3e791d83925b426964f81cff3a191c15be
2600
setupUSB.exe
C:\Windows\inf\wiaky002.PNF
pnf
MD5: 74b08c9173dc9fe5c1351fc71d8b7387
SHA256: 995d7a56899f1f911c2b57a917416895168fd6abc65ed0e0a54f48ece3767472
2600
setupUSB.exe
C:\Windows\inf\wiaep003.PNF
pnf
MD5: 90adb4ddf98e1af525636db6482dec35
SHA256: 0838221f8f7471dc2481ca18854d6e21bb21e35953ece6aab6e57c7dced5949c
2600
setupUSB.exe
C:\Windows\inf\wiaep002.PNF
pnf
MD5: f0b40836b11553c817b6bde0c2b72cf2
SHA256: 71dfc20bdfa0d90fe93a950f8f83fb8f00c66830f6a9980a71f3370bba9695d4
2600
setupUSB.exe
C:\Windows\inf\wiacn001.PNF
pnf
MD5: c551e5ce14cf8a7daa403e55b5368fb5
SHA256: 70832a4f19290ae70a1d74d8f6896c78b775403e4283f081519c5318bd4df975
2600
setupUSB.exe
C:\Windows\inf\wiaca00i.PNF
pnf
MD5: f76d798548ec79381b82c80cacde2432
SHA256: c54aea32dbcf504950a3da1064b25d8b4a32c37dd2b4b6d7ebb641e4ba2f4af2
2600
setupUSB.exe
C:\Windows\inf\wiaca00f.PNF
pnf
MD5: 3551d52b63cef3390ef3ad0fce1ab1e0
SHA256: 6405df970f875c1a94ac036792849db5a6ec0fddec8cfd4c698ec11a230f6b14
2600
setupUSB.exe
C:\Windows\inf\wiaca00e.PNF
pnf
MD5: 32e7bf85d3c4c94996b0cf14f715f24d
SHA256: d49c047c64515e8bac0298c1c88c457da6799cab0f585cf3388ca0c005ed714e
2600
setupUSB.exe
C:\Windows\inf\wiaca00d.PNF
pnf
MD5: 02ddcc8ba420386df6778255d7616d95
SHA256: 29760328062beb93fc0e5c0af69ba8921e025a60e32d6050754609b08a373a19
2600
setupUSB.exe
C:\Windows\inf\wiaca00a.PNF
pnf
MD5: 09d276917e844cd2efd5989d701ad1a3
SHA256: 4f4ed608d0c6f8424d059366a7c6821bfe564e59b4d04d7f3d700fa9dbcdfab2
2600
setupUSB.exe
C:\Windows\inf\wiaca00b.PNF
pnf
MD5: 06299cb9f07adf1a91d3fa6bdef74b6b
SHA256: f299061c6f9cd0e7c021c2a0353bd42e353c55947af2bea9c16325d350daf2a8
2600
setupUSB.exe
C:\Windows\inf\wiaca00c.PNF
pnf
MD5: e86c0019457cca081eaf57702382b369
SHA256: 0173e65d4e074a824108ef00368363efeba36a150f228338e31e162a76b6adba
2600
setupUSB.exe
C:\Windows\inf\wiabr009.PNF
pnf
MD5: ba0d5c9f3d30f94da2a425c0ae87d1c5
SHA256: 742452f52f99edb2335a231e7523fef7f1f9a41353ba3cfc6f18b3a2c4d27103
2600
setupUSB.exe
C:\Windows\inf\wiabr00a.PNF
pnf
MD5: 88d99dc11ed7557e0a7ae32006d12740
SHA256: bb1bad0ff19eff749444a153429451db4162bb93c9ef033fa6af4e1abf5d0ea6
2600
setupUSB.exe
C:\Windows\inf\wiabr006.PNF
pnf
MD5: 799bffe52a529549678c8355f6769f8f
SHA256: b618da1a9e47b66fb6ea36b1e1ea21ca8660d4d5a845a0ee381d131c189209dd
2600
setupUSB.exe
C:\Windows\inf\wiabr007.PNF
pnf
MD5: e0870aabc14af04765e9cd02a4a622f1
SHA256: f15342cc4668ac0255e61cf45e5941be676f80da79f3aa41ef051f8005bbb6eb
2600
setupUSB.exe
C:\Windows\inf\wiabr008.PNF
pnf
MD5: f82056e6066e8101dfa1d916167c4c70
SHA256: 27fe5dd7a51145beb4689aebf0d0738763b933ffeba9f4a1330e68f4f1be9586
2600
setupUSB.exe
C:\Windows\inf\wiabr005.PNF
pnf
MD5: 0add482a236c15fc1a19d6616f7e9e5f
SHA256: 5f29584a5fba585523447d3229144e9018d043a9b3347ee7bbde42c765e1d107
2600
setupUSB.exe
C:\Windows\inf\wiabr002.PNF
pnf
MD5: 56112e223e821ae02c394fd08223d7b0
SHA256: 39780b4b505a0966fb44e3c688913237c64205502da6d88a3636fccb4657d6b4
2600
setupUSB.exe
C:\Windows\inf\wiabr004.PNF
pnf
MD5: 2c143b07024da34d00ef8efe2fccbdd9
SHA256: a9a1202eb8117034889c9d313b5d5e0af8769a014a80f4132d2c984bdc72fe23
2600
setupUSB.exe
C:\Windows\inf\wdma_usb.PNF
pnf
MD5: 6120f15469720dc1ba4ee054f115a229
SHA256: ac56e28b8aa2d010f52a5429a60a8645d254a68f80c82d30f328cec63424b02e
2600
setupUSB.exe
C:\Windows\inf\wdmvsc.PNF
pnf
MD5: 7c47bcd9b689285670703b8f79b9f93d
SHA256: 59738ec018434997c5dc1305993ad5e2bd678041fb96291a6a6ccf31b45666cf
2600
setupUSB.exe
C:\Windows\inf\wave.PNF
pnf
MD5: cc75a7f413cb5855fc65b1d26a0ea023
SHA256: 64e1d59dcf58def7a8b9863ce2203988709eb6bd820d573e797fa5122d53fa87
2600
setupUSB.exe
C:\Windows\inf\wd.PNF
pnf
MD5: 5e5e50adcc06827c2be7ee935f49f784
SHA256: 193b35bfd80ac4c2984e2a915a5d89370e4213cb0815f4150b0cbd11c04912de
2600
setupUSB.exe
C:\Windows\inf\wceisvista.PNF
pnf
MD5: faa621eef5fd33f467f61096883bf35b
SHA256: 884ec088b165b41f20b917e9c70375ac6b767492e08c4c37e4d4723004f395da
2600
setupUSB.exe
C:\Windows\inf\v_mscdsc.PNF
pnf
MD5: 89b0fe5dfa55a2b78d50a08d0d1849d4
SHA256: de98fa8bff017767988ded4434ca4632ca5309a294ad97a1227f81b1f6603186
2600
setupUSB.exe
C:\Windows\inf\vhdmp.PNF
pnf
MD5: 5c7fdfa0f1568bbc9e336a1f272bab26
SHA256: 94b1a456b2e64f9f276e01b92ea5aec0a0226e1aec476a41d3d0f3dea62eec15
2600
setupUSB.exe
C:\Windows\inf\vsmraid.PNF
pnf
MD5: 7f9432c23b8850254df8b07c5eeaf191
SHA256: 02016dd7e0d427bc21829007b6255a3070ca93158f1764ea54448f123465b2e6
2600
setupUSB.exe
C:\Windows\inf\usbprint.PNF
pnf
MD5: 3502f4bf05eba56ba94deb665c86dae8
SHA256: 314a420a22f4c5947bc6176574ac6e58d12ad3af39403acda9389529a41868b3
2600
setupUSB.exe
C:\Windows\inf\usbvideo.PNF
pnf
MD5: dff9e2aa0c5a68dae9cda1b9a6c16e89
SHA256: c9d3753dce425397f892b27cade5208de2848aa95561dbddcd027625e321331c
2600
setupUSB.exe
C:\Windows\inf\usbstor.PNF
pnf
MD5: 78f7830d366a7b8b0f03d49dd0bd29a5
SHA256: 385c5aaf09bdb4d8cf1e1f2e383578eaeb025a8e0b814d4143b48dbeebbc5207
2600
setupUSB.exe
C:\Windows\inf\usbcir.PNF
pnf
MD5: 96330ae3e7680215d23c81a632da72c3
SHA256: 01e0fad8d27ae1912547861f02b756da881005210be75ac92f6b09f7c4cd6c6f
2600
setupUSB.exe
C:\Windows\inf\usb.PNF
pnf
MD5: 34fb162ed9cefba5e7f1b496ad70b5f8
SHA256: e3ea4686acb360c3c94a1d7c2527bfe8e25ede04efdd3bd315b818724d8bac09
2600
setupUSB.exe
C:\Windows\inf\unknown.PNF
pnf
MD5: f38b130f4d9b2d5f9fa90557da85b7c4
SHA256: 385a19d256e03b4d1951768078f4104be733ca86c01d5abd2a1d6a0908dccbb1
2600
setupUSB.exe
C:\Windows\inf\ts_wpdmtp.PNF
pnf
MD5: a2a01af2ed52eb3a9020cb4d86e91dbe
SHA256: 0cab0779f38a7520badb0609f6a6c4082f328bf94e2a98b5ff7a77a30caf0fdc
2600
setupUSB.exe
C:\Windows\inf\umpass.PNF
pnf
MD5: 335399ead0e877d5de3a4843ee5873b3
SHA256: 84b2df8583a65d073b651bf13ca3975863d8b74cfb1fb19e3d8683fee6f881ee
2600
setupUSB.exe
C:\Windows\inf\tsusbhubfilter.PNF
pnf
MD5: b24f1dde2c032ca0c0beaa1ef8876bb1
SHA256: b1b72430a9e28d61f0fddceb6412cda923a7c76a781a84f00deb5ee0543d0e1e
2600
setupUSB.exe
C:\Windows\inf\ts_generic.PNF
pnf
MD5: 9c1f7f7122d6c4e126f75788ccb834b0
SHA256: 6464593542ed9123eaa5d0d84e416584cc1ab39f9dbb02e5414d7c6c75e563c9
2600
setupUSB.exe
C:\Windows\inf\tsprint.PNF
pnf
MD5: 368f60971277616bc255fe5a38cebd12
SHA256: 01ed16520efcfee3eb8590af17add7c57c1c9a5292fdfe085ef0a8feef504510
2600
setupUSB.exe
C:\Windows\inf\transfercable.PNF
pnf
MD5: 868249dc78bf7994f2e7ef8ca8830d17
SHA256: 16bcc65fb4e423efdf0bf426375be47d48ca95551eab660cc5208b9f4b340efa
2600
setupUSB.exe
C:\Windows\inf\tsgenericusbdriver.PNF
pnf
MD5: 3198f9ab2f9b6b1bac940ad0f1376dc9
SHA256: 10f7877963b7d1b4ed3b46ab96bc8ab7ab4d6b3d555ac0cd4373b295eda462e0
2600
setupUSB.exe
C:\Windows\inf\tdibth.PNF
pnf
MD5: ef7926dcf53a4b6c97432e3ca0ee1449
SHA256: af8d595a6d0fb81f22e311131135e38f824b0fc934bb41bf9749022a3fd89cbf
2600
setupUSB.exe
C:\Windows\inf\tpm.PNF
pnf
MD5: 95940a9c17817aa779f0a6273cd8947a
SHA256: 048588441dd23dfc90b550e79c8672365faededa6dd372a72d88023d4bbeff52
2600
setupUSB.exe
C:\Windows\inf\tape.PNF
pnf
MD5: 985b013a71243519b0607d990823a104
SHA256: b935cf7f9e8733c73e688c9892e3f4cdd0aeb446d2f38733013cde2f880cc859
2600
setupUSB.exe
C:\Windows\inf\sti.PNF
pnf
MD5: 48f5dc63b00a9a4a2bdb0bba7f3028ba
SHA256: 84d49a7fe06cb1423b8c1ec322e1b12b22d07e2e43f9e142f63029cf4081eb47
2600
setupUSB.exe
C:\Windows\inf\smartcrd.PNF
pnf
MD5: 24e51cdbf8c8b27c1e0b45c60c7e6eab
SHA256: dada4bc34c9e381c2a0df8090ad283c9f141898e323f2bf0f3fbb9be3d9b9c2e
2600
setupUSB.exe
C:\Windows\inf\stexstor.PNF
pnf
MD5: d506590713664093a3205450322a8dd3
SHA256: 19510cd6e3bbcff91957d13312513655fbe9c436e7efa818b0c622978e17f1ab
2600
setupUSB.exe
C:\Windows\inf\sisraid2.PNF
pnf
MD5: 2da599b154730eae00158f7214654d9b
SHA256: beb81914e093a3d9e5971d2a84cae5dbf45de75586dc3de395c1a03707c36b62
2600
setupUSB.exe
C:\Windows\inf\sisraid4.PNF
pnf
MD5: 58368789d35dbd38fd1e51baea21c56f
SHA256: 8b79405552b5d841071d305d4ca6a5ae7d840d140ac383d8b14828d74d147abe
2600
setupUSB.exe
C:\Windows\inf\sffdisk.PNF
pnf
MD5: 77f03155e7333da792a832fe9c60ba20
SHA256: 50b54b27b62d2734351f5aa4bea5888ccd1a98bc673b29404b6c815b5103a160
2600
setupUSB.exe
C:\Windows\inf\sensorsalsdriver.PNF
pnf
MD5: 04f3b959d320396b9b2a12f4886e1fc3
SHA256: eb4f6032451ee4aaa76486ffa441244b9a583c0b16d7eec6b29f783dab711d86
2600
setupUSB.exe
C:\Windows\inf\sdbus.PNF
pnf
MD5: e0beaed3f82ca887e1975de40a23c7f8
SHA256: 589f7e196c036a47250f29cbecf72447b8f45908b2ad5a5588da9fdf7e17579f
2600
setupUSB.exe
C:\Windows\inf\scsidev.PNF
pnf
MD5: 54e859ec4193dff2b7ad0ada500059a7
SHA256: 1156c8ff782f26d1e6bdb3bbe649f4f1ba1d1c4aa5c1c79bddbcef02857e4c95
2600
setupUSB.exe
C:\Windows\inf\scrawpdo.PNF
pnf
MD5: 22d1e4f6fce05f91ebf374041a3178da
SHA256: 8ff8023e693e768ea98495de684ac0ca562ed4569f857131bda2860cba63ebd8
2600
setupUSB.exe
C:\Windows\inf\sbp2.PNF
pnf
MD5: e941725011e7a4f754eaba158c247b3f
SHA256: bb920d98d4ef52df1535ee9564e1feea085db29ab433d858440be6ca0a075112
2600
setupUSB.exe
C:\Windows\inf\ricoh.PNF
pnf
MD5: c216d857b0c805e2c08e4864bd9cb034
SHA256: 33f751fdf120b4aea556b364ad34f97cac2b62ec221a23215bf74a0cc991ab25
2600
setupUSB.exe
C:\Windows\inf\rndiscmp.PNF
pnf
MD5: 2b722e8322eb3e9f19447094d7ec5a6f
SHA256: 3c6df6bc2fd6acecd6df69f67780f00bdf8bd0101477c96f7691fa291e250293
2600
setupUSB.exe
C:\Windows\inf\rawsilo.PNF
pnf
MD5: f1a04fe29b7632ecb3239f27f56511d7
SHA256: fb65b6f95ade37aa50f349140ee3a94faf4fcf5756cdd3a22061d9c1fce83336
2600
setupUSB.exe
C:\Windows\inf\ql40xx2.PNF
pnf
MD5: a316c5f555bebc547daade5b34f37a57
SHA256: 8094b7e5734f1b6a005c13601ed5858888018e47899c51923be9ff8cb8d5c373
2600
setupUSB.exe
C:\Windows\inf\ramdisk.PNF
pnf
MD5: 346c1bb809144ba42fc18359a12059c0
SHA256: d489d72e914337445c7b13ad2a998a305b220b3b6d794c4c1aaae0062ca3d02d
2600
setupUSB.exe
C:\Windows\inf\ql40xx.PNF
pnf
MD5: 42165fec5ff930ef04cca22f84c25a44
SHA256: dd4915d216c13504f5a6f2c77eec32c4f3076616ab2f8439517fc87d4f50961e
2600
setupUSB.exe
C:\Windows\inf\ql2300.PNF
pnf
MD5: 8821979f829732de31d36a7bd939b156
SHA256: 7353e659ef61b56520d548c9c669b8d3a3986342c3d5cd61c6cff67a4d0625b9
2600
setupUSB.exe
C:\Windows\inf\qd3x86.PNF
pnf
MD5: 12e547af795d255de603de36edff6d2d
SHA256: 767bcc909400add73ddce72d1b56d94be617fc9e5fc7339ec4629b121dbc95d3
2600
setupUSB.exe
C:\Windows\inf\prnts002.PNF
pnf
MD5: 3d34cf8a842a4a2ccabbcf2864b3f627
SHA256: 5b665c9893b61da68061ed70be93c20c46991194d6666b2e965f42f02195f0e3
2600
setupUSB.exe
C:\Windows\inf\prnxx002.PNF
pnf
MD5: adfe67e649266259a893828d9f830e22
SHA256: be26b39dd32c5ba936287bf80f1fe22d222887f77a5326dbe4385c519528e17d
2600
setupUSB.exe
C:\Windows\inf\prnts003.PNF
pnf
MD5: d51c85fd8e7e6620da667600d98c4085
SHA256: e7ca215e8bf27fbdc3486c1ba6b601bfb22889f786890555e29e4dd87f8268f3
2600
setupUSB.exe
C:\Windows\inf\prnsv004.PNF
pnf
MD5: 594964afa0cfbce932f1115f1316cb74
SHA256: 891031015b6729f7240fa0417adf6c3b09ff44c0a234186bceab23c4a8a15ad1
2600
setupUSB.exe
C:\Windows\inf\prnsv003.PNF
pnf
MD5: 01516cfeb24d28cd2e46ae1393c5da8e
SHA256: bfeaa581c300f1d56e5d4c2e4a8651453c1aa5868989ea0b9f216c6502421d15
2600
setupUSB.exe
C:\Windows\inf\prnso002.PNF
pnf
MD5: 679fb5254d4c3b5b9464c4bcc1478105
SHA256: cddf7934d794558f68f1c91e59ed8c3280a2de626809a28299c241f160b2bd2c
2600
setupUSB.exe
C:\Windows\inf\prnsv002.PNF
pnf
MD5: ca876e2b3aa1fddc388af57ee1e3a9f7
SHA256: d48b22106c5341e58f085ea1747bde648de6b4baf4971889f2741102a5c3dc4a
2600
setupUSB.exe
C:\Windows\inf\prnsh002.PNF
pnf
MD5: ce31fdb53e3473924a0e17f754401ebe
SHA256: 82758d94960d46457d0ea4c4fbbb33c773eaad805c0f51c6b8a14c3d0297334b
2600
setupUSB.exe
C:\Windows\inf\prnrc00c.PNF
pnf
MD5: d3b96ffe8054c37085632ccaedfdb29d
SHA256: 5b98cb1c8261ee4e16cdeb13f32d4aff82dfe7a936c8557bd8765230b2067b55
2600
setupUSB.exe
C:\Windows\inf\prnsa002.PNF
pnf
MD5: b7436400abc3f44c86d6514b0e975c1b
SHA256: 9890ab45e64c1a3758f956d6b0c8bd218e5ca80e843076bb5d29ed0bae41afb4
2600
setupUSB.exe
C:\Windows\inf\prnrc00b.PNF
pnf
MD5: d93e8c85635fbb65503f889948b7acdb
SHA256: 55e0f61ce6c049fbc953562bb0f56e39b60bab2db76993d4f59393a327cab1fe
2600
setupUSB.exe
C:\Windows\inf\prnrc007.PNF
pnf
MD5: 542503807e7558c1396cfcf2d9b80707
SHA256: 29f91af9a809922d1a62e546387c8b57cc61044b8502c2037412b391898a78ed
2600
setupUSB.exe
C:\Windows\inf\prnrc00a.PNF
pnf
MD5: 75e0f93fba5fbca46aeac2ddefd56247
SHA256: fbe550e4cd2ba767aed478c037690dccc1a68a1ec56821f29bad2e5fdb156728
2600
setupUSB.exe
C:\Windows\inf\prnrc005.PNF
pnf
MD5: 7f13080eaa3004b90f4ce026b5187f52
SHA256: 564d0e3c7cb87172c11c5b9f654abf7ac9987bcc0e2570a39e0675e89a2d305e
2600
setupUSB.exe
C:\Windows\inf\prnrc006.PNF
pnf
MD5: f4d56be8d814552ab97f3ffc51f9c965
SHA256: 5fe5cecddde939bfd8c23687e0864ed21c4ee45d78dc714b8825518be48f5c11
2600
setupUSB.exe
C:\Windows\inf\prnrc003.PNF
pnf
MD5: ada8e354d57c3fea0d515f54f25a4f55
SHA256: 9ca21251b2e9409b3f59ee197df78703bc99b82f4f89cb073268e5b30d0a7c2b
2600
setupUSB.exe
C:\Windows\inf\prnrc004.PNF
pnf
MD5: 5e0b3bfe92bbfb10eb2177e30a2d9dfb
SHA256: d2d5a0a17b6bf755592b47a8a38aa5b6197924db4f74d767e9bd68736ac65e54
2600
setupUSB.exe
C:\Windows\inf\prnrc002.PNF
pnf
MD5: 201da9253092437e4ef4788759b923e7
SHA256: 25fb6f54008f3b3ede6b2f1e1678ac405f9a248d1b0071498dc73e7f97c46982
2600
setupUSB.exe
C:\Windows\inf\prnok002.PNF
pnf
MD5: abb0e8a5d705619606b934841fa4f8d6
SHA256: 78895ceeab2f32cf13051a3b7a4b54ff883ca6a517f8c9539bc138a0ca951ab8
2600
setupUSB.exe
C:\Windows\inf\prnod002.PNF
pnf
MD5: 43a7756762fa086a2755dc74fb17616d
SHA256: 36059b510636072603dc6ddf94ea549536cf184cba1e028c01ee877200d75deb
2600
setupUSB.exe
C:\Windows\inf\prnnr002.PNF
pnf
MD5: f6a4449639aafdcfcc9429962976546c
SHA256: 642360fe73e4760754a923f0f3370c4c4d053b6dcb0905c3280e782f7645ae78
2600
setupUSB.exe
C:\Windows\inf\prnnr003.PNF
pnf
MD5: ca47725dcc66a6c08d41ed573afa589e
SHA256: 733a93a146afb090ae44c3cf426654561901ea310bef4814908d8c773021d7a6
2600
setupUSB.exe
C:\Windows\inf\prnnr004.PNF
pnf
MD5: ea16c6dfcffc15964c39e4721ec800a5
SHA256: a37f7e53febdc7e37e74db0852b6a591b97bcdc6080bf6463f74dc2167cb9e86
2600
setupUSB.exe
C:\Windows\inf\prnms002.PNF
pnf
MD5: d1c18b691c638ab458625b88db14ffff
SHA256: 5bf264449285f892ba4f7378aa91ff95cb02ce95b236449e08149f39512325f4
2600
setupUSB.exe
C:\Windows\inf\prnlx00z.PNF
pnf
MD5: f3b2c8e46db050c874a34de4504ea3ca
SHA256: 17ed53fb4ba48bfb3fe4163d1a1b9b97e73f18818290d5dd5808b3adbf610d15
2600
setupUSB.exe
C:\Windows\inf\prnlx00x.PNF
pnf
MD5: 6054e81f6a20b3ccecd50e74be891bb7
SHA256: 4afdaf5c70708dd21c2a6efab9e3ca14e506522dfc8662f815e249a66dfd57c2
2600
setupUSB.exe
C:\Windows\inf\prnlx00y.PNF
pnf
MD5: 217fd90cf4c3c5ed5c34e9c726221bac
SHA256: 46f7ff5bedc6b4d367f9b5f825f59b6760e0073a21b8e3f3db37cf8af6f9b597
2600
setupUSB.exe
C:\Windows\inf\prnlx00v.PNF
pnf
MD5: e16d48997b56f137deb0b108123a996d
SHA256: bbb210a1b8808dff132b331b764bb9b8eb6621adad3f680dcf0de6ebfb246e3f
2600
setupUSB.exe
C:\Windows\inf\prnlx00w.PNF
pnf
MD5: 2b923aaf5c5aae989c3e8b3d8cb9000e
SHA256: 35ce2f91cabc0413d2e58bcb4488cbefa1d312f44504936e36a84b7cc5f64c49
2600
setupUSB.exe
C:\Windows\inf\prnlx00e.PNF
pnf
MD5: cddd225c9f448605599e5639794d51cd
SHA256: cdca208ee1d0dd76525a60ca7740e91eea8e30d60748e0000c5dc1591e498341
2600
setupUSB.exe
C:\Windows\inf\prnlx00d.PNF
pnf
MD5: f2742ec07e2db5427ce226b4d65cca13
SHA256: 38d20df1136974bd11f0fa2e9ac1221579cefb9af78f93cf6694bd388fc6a52a
2600
setupUSB.exe
C:\Windows\inf\prnlx00c.PNF
pnf
MD5: 9b43375ed21ca64cc6467c5de15a7091
SHA256: 37cd18c1fd7a203fc13724ec80947f10d20323e9c215720c90d01089c1dce4d8
2600
setupUSB.exe
C:\Windows\inf\prnlx00b.PNF
pnf
MD5: 437bd0b7c6d26ad87264378ba546421a
SHA256: 455e3d1332eda066997ee1647d39fe64b11f4d0129c2da9be8ceab8e777e7c30
2600
setupUSB.exe
C:\Windows\inf\prnlx00a.PNF
pnf
MD5: ab7579827e599f3591637ebd53e4556c
SHA256: ad1778915c86684232764c92a227858e1a7d6f8a662774b625fa54a41adee621
2600
setupUSB.exe
C:\Windows\inf\prnlx006.PNF
pnf
MD5: a1be6f51049d0988cb279e4bde3f962e
SHA256: 15f16d441719a6a131f7148a8e065a176d6f68e9054ec8be4bb4b204f6a57f73
2600
setupUSB.exe
C:\Windows\inf\prnlx009.PNF
pnf
MD5: 3e14598852fb5c0a99efc6cef40b0e13
SHA256: 162816f4dcc1d906e252890a6be360381da44e662363d66ceef2154a7ad442c4
2600
setupUSB.exe
C:\Windows\inf\prnlx007.PNF
pnf
MD5: 0fbdacf3e24964358042b2731f00e27c
SHA256: b66830adcad441916e606b766386bfae7673472c8bdb94d5d20bcbf9f036891c
2600
setupUSB.exe
C:\Windows\inf\prnlx008.PNF
pnf
MD5: 062727b90b40ef00fc43f72144ee1d80
SHA256: 0fe9d6aaea8e0ac3bd9577469f077faf88156d5e0aa1764a35abd30b5d48966b
2600
setupUSB.exe
C:\Windows\inf\prnlx005.PNF
pnf
MD5: 38768ebd96436b64da7fab0faa821669
SHA256: a87c1fd90dc185e9f31cb2f3a4a9579d8129e301317bb10f21762fc84a1a41f9
2600
setupUSB.exe
C:\Windows\inf\prnlx004.PNF
pnf
MD5: 349e395f609534cebd491bdeb3d98030
SHA256: 02afc6a884b94a43707bacc55f469564f3f8cc8854e96f9c9e94afe160873324
2600
setupUSB.exe
C:\Windows\inf\prnle004.PNF
pnf
MD5: d2239b03b486c037bdb8b18d5507e9ef
SHA256: 7f9414f265bdf02367845d0a84c25e69576a63cca52dc11a47f83333faefda0a
2600
setupUSB.exe
C:\Windows\inf\prnlx003.PNF
pnf
MD5: c8e22d561377f8d891d38b116b3308a1
SHA256: 34bc285287ccdbbddd791d7233a553915096054321011319d71f62c2a1700be4
2600
setupUSB.exe
C:\Windows\inf\prnlx002.PNF
pnf
MD5: de8a282b8435e0d4792d0aa7281d9e1d
SHA256: 116c584568611ac5b5d8786d16a56e8fc49d9a89cb55e1102960442bc978a8f3
2600
setupUSB.exe
C:\Windows\inf\prnle003.PNF
pnf
MD5: eaa54c18f8c9b17fd65d05a5d6bc610b
SHA256: 195977c970eb607690846692f179695124532e6468aab125cafb3c1e1b8751fb
2600
setupUSB.exe
C:\Windows\inf\prnky009.PNF
pnf
MD5: f576c59adcdcfbde8b877aee75031f8d
SHA256: 93583d40deba90c0e9242861e55f2a6d6433bed7e0784e4c315c4e329117a8d5
2600
setupUSB.exe
C:\Windows\inf\prnle002.PNF
pnf
MD5: 6e3a231e40522d11a729c62905d06e69
SHA256: 1ba06870c8a783b6a82a15dcf44a65bccd350eb47f2268a90fa70be2ee307fdd
2600
setupUSB.exe
C:\Windows\inf\prnky008.PNF
pnf
MD5: c8909b31577be1025d54f2be00a7ba6f
SHA256: 2033faa1247dfe4404e22ec3f2efbb18faf4147f484f8b37285333c0e7d20cc7
2600
setupUSB.exe
C:\Windows\inf\prnky007.PNF
pnf
MD5: 66057d93c2cdd35a23ad4422ed41af90
SHA256: 528ac7734264c393a9b856a9f01d6138e9689296da36b8decbfd3d350d71f33d
2600
setupUSB.exe
C:\Windows\inf\prnky006.PNF
pnf
MD5: 1614eddd55db925bb39e49db46951dde
SHA256: da8e57da1813735d8f80e8558894351e103ede3b938596a6682ca8dce50ff2b5
2600
setupUSB.exe
C:\Windows\inf\prnky005.PNF
pnf
MD5: cc880ca4b3e2e5857647fcd7a765ef5e
SHA256: 3625ecd9753cf16e460e8d65f2b59833c5b53cec776b765ed6cd74240cb9c826
2600
setupUSB.exe
C:\Windows\inf\prnky004.PNF
pnf
MD5: 2a1e2eb9176c09506f8025aca43d8c62
SHA256: deb60c57192c696dee0bacf7d1ac1ec7a6876883cbd1b8b768f2eab660a6cd4a
2600
setupUSB.exe
C:\Windows\inf\prnky003.PNF
pnf
MD5: 9eaf6642d5f51fea3d075dd84d716edc
SHA256: a0f642a601e584fc6c7d1c6522b23cdb6ff302d019eb7cea64d015ab385a853c
2600
setupUSB.exe
C:\Windows\inf\prnky002.PNF
pnf
MD5: 1df90e969214d223dd621c1f55967502
SHA256: 2bc1048ebaf984715ae8883e6fd89112bf6cd71c39a2bc31e8cf8c7a49d84ca4
2600
setupUSB.exe
C:\Windows\inf\prnkm005.PNF
pnf
MD5: 9251de76efe7d220c62847d6c2f3549c
SHA256: 370945b6eab4197d929b930cd801f3d5c263df03c836be133c5bec17007e2598
2600
setupUSB.exe
C:\Windows\inf\prnkm004.PNF
pnf
MD5: d15c8bd331abc9032ddc2f86e7cd8688
SHA256: 3760d0ae7cd303d9a2f5029fd414b1c10436f42b61b2297f867a96e174bc270f
2600
setupUSB.exe
C:\Windows\inf\prnkm003.PNF
pnf
MD5: 5fd81427649448760a9bd607b3059917
SHA256: 78be011eaa30223132f1a564fa53486ae236a13589c42b0aed04daa63a0f8413
2600
setupUSB.exe
C:\Windows\inf\prnkm002.PNF
pnf
MD5: 2dbe051d94191b70abb4bb60a4dc52cb
SHA256: 8bc9d794d6a174c9a91849d93d7b601f995bfbc02c7cd837c9688d075e3b579d
2600
setupUSB.exe
C:\Windows\inf\prnin004.PNF
pnf
MD5: dd076783fe0e6bd89f923e61fbcc00a0
SHA256: 793fc87099ab8eebf3a92d03f65f66df72ee601d6108978c59721cc7c1dd9f47
2600
setupUSB.exe
C:\Windows\inf\prnin003.PNF
pnf
MD5: 713b5e400dad2701449ce820851f6d29
SHA256: 973595e9cfda3e54fd65a50053a77875bca459961fe359fa176566681bc0bae3
2600
setupUSB.exe
C:\Windows\inf\prnin002.PNF
pnf
MD5: ac7f2be4993637ec1f7bac16b7dd1f2b
SHA256: a684c8a60722a34d207a699e8040e7f425458937a9ae7d4f7dc51ea57b689668
2600
setupUSB.exe
C:\Windows\inf\prnhp005.PNF
pnf
MD5: 5f42a56a11d0b3b5c8c318185bc770da
SHA256: 35ac5c46a22351983dd8de240a1b928e992cfb1f85eb1530e991604fe313caee
2600
setupUSB.exe
C:\Windows\inf\prnhp004.PNF
pnf
MD5: a7a078b13552dc2fa6b22047287df9bc
SHA256: 897a9dc6ee274cf912f998ccc4a5523bbc4faed7ae244e0ba50c0dd1e36fd252
2600
setupUSB.exe
C:\Windows\inf\prnhp003.PNF
pnf
MD5: eaf90a6e5e47c174c062b9ce55c8afbb
SHA256: fc0884a0f960e49dbe6bb86eda9ff6a93793964233817b1f1b77ad84bbc14838
2600
setupUSB.exe
C:\Windows\inf\prnhp002.PNF
pnf
MD5: b48a303c889a8a1bc3464b9a707005e8
SHA256: 1e75d756862fe11dccb78d010b52b2e9dbd869376bcf1927eff49a6850787e46
2600
setupUSB.exe
C:\Windows\inf\prngt003.PNF
pnf
MD5: 038a0e73e0c4c4fae4d1189787458b05
SHA256: 8ca00f678dbcaf8558bf772658ead731e970ea2fc4f2b770ba98a69f68f55a1b
2600
setupUSB.exe
C:\Windows\inf\prngt004.PNF
pnf
MD5: 62e31ef234c03d561e3dcb13ed17f2c7
SHA256: 18d2ef9cc6118ee88539fcbd6584d57ac7953c1a72db8e03001d28ce00c19c0b
2600
setupUSB.exe
C:\Windows\inf\prngt002.PNF
pnf
MD5: 2b4eaf86ba0264a4eb56511e9ec3dc7a
SHA256: a5444856dfa53bdcc6e3e9fbf83c4872c9faaaf00d400cc83c521007a6271b4b
2600
setupUSB.exe
C:\Windows\inf\prnfx002.PNF
pnf
MD5: e3897a76d61db481261b9f7c022440ae
SHA256: b905bd042faeb484348d4fbacc238b8e9bc1b702af1cbb668f3e8439fb94880f
2600
setupUSB.exe
C:\Windows\inf\prnge001.PNF
pnf
MD5: d48cca4909832c8c764e9e20a219ef48
SHA256: 31b8e3905281ed3ba15c2541a87ef596dc50755c939a18e17060042047d3353a
2600
setupUSB.exe
C:\Windows\inf\prnep00g.PNF
pnf
MD5: 8c5721e57ec891d9cc8a7ce91d31f7e5
SHA256: b0a8802e8f9c801804e91af09077c95c9c574108b0755a70d5aaa79eddf7f73c
2600
setupUSB.exe
C:\Windows\inf\prnep00f.PNF
pnf
MD5: f03e7d5aa2b6aea20ca53218036640d5
SHA256: df76f8023d76e15c053154cd2f8be8bc9789acfdbb9bd0fa35e98bc25ff37422
2600
setupUSB.exe
C:\Windows\inf\prnep00l.PNF
pnf
MD5: 7d33265f4eefc63750c700cbf6ec5a2b
SHA256: 442e51f9306a8af55a198b96b0ed3220c4f7509f696f37e21e11515a8f5049eb
2600
setupUSB.exe
C:\Windows\inf\prnep00e.PNF
pnf
MD5: 2d779f05680e33aee763c0ff43a3c700
SHA256: 427bc2031a6a818ba9ebe37da77347629b6af9fcafa401b232adc79636e6bac7
2600
setupUSB.exe
C:\Windows\inf\prnep00c.PNF
pnf
MD5: d12443ce3c6d908481fcd522b5daa9fc
SHA256: 48f7d64ddeaf287b6b81f1924f20419c2d32501357e356c41f8dc37d1d3551ed
2600
setupUSB.exe
C:\Windows\inf\prnep00d.PNF
pnf
MD5: 0f25b88a4df58cca19b1ca2e9beb5609
SHA256: 54ced9227ef9692635c6a5a1078cf22045a43873f5a12e1592e8ae30e852b576
2600
setupUSB.exe
C:\Windows\inf\prnep00b.PNF
pnf
MD5: 268930e1a8f701e6f05843848c9de0bc
SHA256: 311450b9c4c6d9365b178213690231c89babe30e246792c8a626ed186564c637
2600
setupUSB.exe
C:\Windows\inf\prnep00a.PNF
pnf
MD5: 148f7b8f7d8a09d47b1ad0d9e093a73a
SHA256: 9b48f67a01612dbdc287eeb79c8b277065e532c63fdf17e31bf39f497bae9be6
2600
setupUSB.exe
C:\Windows\inf\prnep005.PNF
pnf
MD5: e6d90f468b7619a7d83eac9196d38009
SHA256: 201894bd37b70dc77f9c7f3c66a92d2b26618373da31a150441d48e4650bc866
2600
setupUSB.exe
C:\Windows\inf\prnep003.PNF
pnf
MD5: 4dfaaae9a460063d9fb7eef28cf7ee4e
SHA256: f56ce467a1cf589cbcb77078ac2dff1d46bf8630f4b07de858ef4d667f347b4e
2600
setupUSB.exe
C:\Windows\inf\prnep004.PNF
pnf
MD5: a9e39297beeebaa62041cd94a4505e09
SHA256: e0963a384c0300d270b66cb4fd255f0fd7046ad49ebd7111d976d113f24fc1a0
2600
setupUSB.exe
C:\Windows\inf\prnca00z.PNF
pnf
MD5: 903c893c69084a9bde9e8471516908cc
SHA256: a319617c8fc8797809e5962c864c6ae17f22d976b453cc31283aca23b1413ee6
2600
setupUSB.exe
C:\Windows\inf\prnep002.PNF
pnf
MD5: 162b917932f43639c9f12dc638c6384a
SHA256: e2da623a1fbdfeac7998bc7585365a88d3c5ad54e71c4f52ee94e9af59ef04e5
2600
setupUSB.exe
C:\Windows\inf\prnca00h.PNF
pnf
MD5: ca71f74237373d9ccd48dd8121e2ae2a
SHA256: cf58e4e3510b1abe64cbe22db717587086394a621d4c8cf019ead66e12158521
2600
setupUSB.exe
C:\Windows\inf\prnca00x.PNF
pnf
MD5: 0c2c26bca993e7f27d312c55cfbc255b
SHA256: fdf364e5125557681b269257ad8f1d4351cd6036b398c571c1f8518d7f375f39
2600
setupUSB.exe
C:\Windows\inf\prnca00i.PNF
pnf
MD5: 0698149e8a1b85c2cace89bc5c08c41e
SHA256: 090cf3849866099b63ceb980f9140eba2e18a93b142e032bc7485741317c4cd5
2600
setupUSB.exe
C:\Windows\inf\prnca00y.PNF
pnf
MD5: 4b77e07e5c1535469b9797af71ae3c00
SHA256: 36fc42d9a4861aa1bebe45d896f83225659fc2b83d2479b4d20cbc0eecd79787
2600
setupUSB.exe
C:\Windows\inf\prnca00f.PNF
pnf
MD5: 6b1878ea0067e2b0fd4f5ca58a2ed2bf
SHA256: 39caa310b3c678ca9142cd8900c407f80e90276815e129ba5997e3481d33e3cd
2600
setupUSB.exe
C:\Windows\inf\prnca00e.PNF
pnf
MD5: 6d082c534e29bff149c4036ac0b05f3b
SHA256: 70a31b26123105e77b53c56e53af4ca68f1b4dbf7a60410193973ca4085dc816
2600
setupUSB.exe
C:\Windows\inf\prnca00d.PNF
pnf
MD5: 3f166992be4f84c7a80d70374154552f
SHA256: 11a068ba6402deabee73860acff7580c7c4f5d6b976e0daaefb391c7481586b0
2600
setupUSB.exe
C:\Windows\inf\prnca00g.PNF
pnf
MD5: 41c241bea5ab78a72b86714b738ce1a0
SHA256: d200bcd6c771e6dc70db552d229be0cca28d128af0dfa687421f4dffa6f33303
2600
setupUSB.exe
C:\Windows\inf\prnca00c.PNF
pnf
MD5: 8367070cb5a193a857559aa3eb8a28cf
SHA256: c6e4a9e5c3511ebc96b96025cbd82d8fb905d4e3beeed8f831ce4d901ff61c1f
2600
setupUSB.exe
C:\Windows\inf\prnca00b.PNF
pnf
MD5: 6f6717499f6456bc5f828288e68f6632
SHA256: a3b3a6014849bd473a614e554c874b28e620bf688be3ae2d57c3c2e6415a4a56
2600
setupUSB.exe
C:\Windows\inf\prnca00a.PNF
pnf
MD5: a075cf7b9b473d7c86096425ab81c22b
SHA256: 768ae2fac7c152cf7c9d7a1184627fc7c39ba77a654e0bd0cbb8d04596fad7b6
2600
setupUSB.exe
C:\Windows\inf\prnca003.PNF
pnf
MD5: aabacf7c459ac6ff539771cd8bbcbdd1
SHA256: 2306bb9aa7b85188085025419858565518e47d7f23a8ab006269e3c277c6b8a4
2600
setupUSB.exe
C:\Windows\inf\prnbr009.PNF
pnf
MD5: 87ec46e19032ad97df3f16f75cd6c50c
SHA256: 13ee2d68c9c81545c319db0203557f7f0b62250a6d71c7b10eb1edc6450b600a
2600
setupUSB.exe
C:\Windows\inf\prnbr00a.PNF
pnf
MD5: 30c45af77721938971558c3aff317a2b
SHA256: b8f5abf34e45a346e8116ed236402ce31314fdf3b357a3d652e7c0afa6f5f065
2600
setupUSB.exe
C:\Windows\inf\prnbr007.PNF
pnf
MD5: fb681a635d4a6d53e4b286076821aaf5
SHA256: 208e76c8bc0d03c88eafc8818acd23b790114dfaf5e76d29c216bfe2983e9631
2600
setupUSB.exe
C:\Windows\inf\prnbr008.PNF
pnf
MD5: 88a26152898a02554e84c7b5e4d0b30e
SHA256: 46a9aff543c89f288197bb3b227b7c83b1aded08f2deadc3a36b2b8401c9f4b4
2600
setupUSB.exe
C:\Windows\inf\prnbr006.PNF
pnf
MD5: c734784822a264e871a1365b4693190e
SHA256: ad00257d4e5d76cdfe3d235397965f31134de49769bb213d39658e2073d43a9f
2600
setupUSB.exe
C:\Windows\inf\prnbr005.PNF
pnf
MD5: 42d4f17c67b78333472494ceb88a064f
SHA256: 2cd2e00a44042a2cf5cc4bd4dde5a2516a8fbbeed345433700b15b7560497089
2600
setupUSB.exe
C:\Windows\inf\prnbr004.PNF
pnf
MD5: 0ca918e603da7c2f7a99d5f1b32e39b4
SHA256: d4043aae7daf91e06c4b8d0e7cc9ae622aa564cbde10739a7df5edc9420e34aa
2600
setupUSB.exe
C:\Windows\inf\prnbr003.PNF
pnf
MD5: 4e554e9a47162eb69030d8fe13c05fa3
SHA256: a40439fa9f3e2af6a091f6fca58f066eb2d85464b1d01bb35c1910e3e9b6e58f
2600
setupUSB.exe
C:\Windows\inf\prnbr002.PNF
pnf
MD5: 9782ea02ebbd0d69f0f9c390673565dd
SHA256: 021426b052f059bbca14bb3df4c364131ef89b0ddf8f5d67177583b4a71a6327
2600
setupUSB.exe
C:\Windows\inf\ph6xib32c1.PNF
pnf
MD5: 6fee06609536037ee35e4d4299833a79
SHA256: a462b104f6f5e4c1a01ff56d85fd24a064001fd354cedc098b7688f3e86e2051
2600
setupUSB.exe
C:\Windows\inf\ph6xib32c0.PNF
pnf
MD5: 0ca16ba50479a75487674e273857c9e1
SHA256: cb22ae311e896c742d85c44531fc7b234c48874a56e1df56cd41b89be0a4f0dd
2600
setupUSB.exe
C:\Windows\inf\ph3xibc9.PNF
pnf
MD5: e51e76af9801f233181702c61b51706b
SHA256: 4140396221d6b2d03d051e596e553ad2e5f2e7e68c51bf08ed63360649da123f
2600
setupUSB.exe
C:\Windows\inf\ph3xibc7.PNF
pnf
MD5: dde11bc947abb251def6213d090b7f4a
SHA256: 53af5b59fd98f39ec5f37edb4c7105681c70072305b6f8449e62de7e299b2118
2600
setupUSB.exe
C:\Windows\inf\ph3xibc8.PNF
pnf
MD5: b6b4b717e6014fafce0dc16a28347c6a
SHA256: 9f5ae25d4a4088a1a11015e49137af5d653bd88949550495c575c6b56bef0228
2600
setupUSB.exe
C:\Windows\inf\ph3xibc5.PNF
pnf
MD5: 9cf88c84fc3d6957f7108bb021747a0f
SHA256: 466681e92c38d696d9fd9f7b2d84729bbda41b0527c9383d0d0a8f2b78fc9b75
2600
setupUSB.exe
C:\Windows\inf\ph3xibc6.PNF
pnf
MD5: a34459189a2b510e4aed398efecae36c
SHA256: bf4b83ba5ea81d68f1dcb628ef5e79ea2504d0a70c77adfe8a54a86f6612a35f
2600
setupUSB.exe
C:\Windows\inf\ph3xibc3.PNF
pnf
MD5: cc7760b9f74ee3ab80f16f0c1006e7c0
SHA256: b8c325173196e64d41afa8ce711f7adc3149fdd0b27006db62a3c0e757809f87
2600
setupUSB.exe
C:\Windows\inf\ph3xibc4.PNF
pnf
MD5: df29aa7596b7f598ecce1a440c8dc49f
SHA256: c10ad97f9d72f68fba6e02f787f34bb1be6bb8119ea20612cc8b617e5fae7a3a
2600
setupUSB.exe
C:\Windows\inf\ph3xibc2.PNF
pnf
MD5: 765b8572e683a66f295c0baeeb42462c
SHA256: a3889a421b460d2c33d37518c151cc86754ca114caa415a7b251ce35ffeecbaf
2600
setupUSB.exe
C:\Windows\inf\ph3xibc12.PNF
pnf
MD5: b96356aa4d0c0099f2639c6b5ccd9b1d
SHA256: 34929dcc01564dc54532264362b08b6ce064a74436526bed5093419be56bea98
2600
setupUSB.exe
C:\Windows\inf\ph3xibc11.PNF
pnf
MD5: fe119d7bb75898416af1100325a22445
SHA256: d32937545251949abaf833f65163efb65f4b3336655d7de271f65eb3a529fc7b
2600
setupUSB.exe
C:\Windows\inf\ph3xibc10.PNF
pnf
MD5: 464c244a857c10086f4c024a2ac8880f
SHA256: a0b5c4fb1b767f0b8d7b8972e26b4371da4a1f9d75cb7da62daeeb5e9938a767
2600
setupUSB.exe
C:\Windows\inf\ph3xibc1.PNF
pnf
MD5: 0d11f88e798dc021fb9fd1ad4b81a1e2
SHA256: e2876deec9ba12262ed121c70d17ab5d4ef7d0fa7db5f781f4df45a724261ae7
2600
setupUSB.exe
C:\Windows\inf\ph3xibc0.PNF
pnf
MD5: a4794dfd42de4b0951a984aec2981226
SHA256: c4bb08bdb0de0499c1feb5463193ed9bea6353e8319a4dc84b4a744ade4fc758
2600
setupUSB.exe
C:\Windows\inf\pcmcia.PNF
pnf
MD5: fed18d4826251d84afbb362ca6818040
SHA256: 80b4a4e930a2ac907d3f8e78c432c297e07e60124ab7ef3caff3831cb84b898a
2600
setupUSB.exe
C:\Windows\inf\oem1.PNF
pnf
MD5: 112748450b47aae13923579f9941d7fb
SHA256: eb1fc2267022bde3c8929067049764c00aa38d4b5845daad864ce7172465dbbb
2600
setupUSB.exe
C:\Windows\inf\nv_lh.PNF
pnf
MD5: 82578adc8838585f545e6e7445620150
SHA256: 642c341dacd1e9a6cf759c8e4aad80313398b2ddad61bfc17c7d55597f6696c1
2600
setupUSB.exe
C:\Windows\inf\oem0.PNF
pnf
MD5: 85a798b349b211ce30c297eee949f261
SHA256: 09037098772fccab291f4259ab9b70f599a9fa264d8be9b6817ef679df6a7b2b
2600
setupUSB.exe
C:\Windows\inf\nvraid.PNF
pnf
MD5: b000bc8791a3bfd01014f9488ff6ce68
SHA256: b594b12050fe28127a11991ed933c242a9c55ba5acdadb70cc66725a73a5daf2
2600
setupUSB.exe
C:\Windows\inf\nfrd960.PNF
pnf
MD5: 6e42787ee4eb9eea1eeb6c4d058f0426
SHA256: e3cd6568f6bd6a32c03262f4702e94a2c3f2f67bd010e42f46097b988ce23994
2600
setupUSB.exe
C:\Windows\inf\nulhpopr.PNF
pnf
MD5: 7852d9e380fc99469c051ac7ddac363b
SHA256: 4f84582ff157b15d0de2b2cfa4c4073db38c5dde37822e87c369a309a8947eb7
2600
setupUSB.exe
C:\Windows\inf\ntprint.PNF
pnf
MD5: faf1b3c2ed18a36b19e57e9c5c344303
SHA256: 50bf9fe2492c0524873d5c67b1a9b87020b4ace2178971677136e96779be376a
2600
setupUSB.exe
C:\Windows\inf\netxe32.PNF
pnf
MD5: ff39f629442a1a49aa9069de3795f478
SHA256: de991ba63fe364d04e4093c19971043c7cdb443c4f5065be65867dad79f384db
2600
setupUSB.exe
C:\Windows\inf\netw5v32.PNF
pnf
MD5: 9cff5713d4e15c888e754cb6a90abd1a
SHA256: a273ee3c399fff552ed13f49ec383721cbf89303dbdf6290f259b9039434f235
2600
setupUSB.exe
C:\Windows\inf\netvg62.PNF
pnf
MD5: a6fc75d505535f62b0cd909422bc2201
SHA256: 2d814609976b7cf2397a014ecbfdb653cad5ea8dd25324722ab9d893afe1525d
2600
setupUSB.exe
C:\Windows\inf\netvwifibus.PNF
pnf
MD5: e96afb2d64304ba553f8d115eea28065
SHA256: 30d919c4d0c87187a06efb3d26afba94e817e8e4e198094cccd042bb2a24f8fa
2600
setupUSB.exe
C:\Windows\inf\netvfx86.PNF
pnf
MD5: 1ce4c66c9d4193213f108630cd6a21da
SHA256: 863f1651c590f71c48ef4b7ec969dd13f4899773a3291e46588d2657debbc3af
2600
setupUSB.exe
C:\Windows\inf\netrtx32.PNF
pnf
MD5: 178e67ac0d9b86648d4a8893b9735e40
SHA256: dadb13e243c84c7e09a846cef946e8ab82a8b7cb26dfbd88accdf208489fc74b
2600
setupUSB.exe
C:\Windows\inf\netrndis.PNF
pnf
MD5: ba95227692c261208ae88c8af1cdcc69
SHA256: 500387c96165f4f1094a3f259cbac4d0e4a6f759030ca799c114b0b8df7dffe8
2600
setupUSB.exe
C:\Windows\inf\netrtl32.PNF
pnf
MD5: 8bb6276b4f22653eafd9136dd889b41f
SHA256: 5345e207ec60f8554bda97f2fa5743ac5bc22065719d699aa4f3502113eb546c
2600
setupUSB.exe
C:\Windows\inf\netr73.PNF
pnf
MD5: 9c491c030f01315bf3f64110ca7e2cc2
SHA256: e2c6b227d0fd4def4da88671c4c0b65b10d1c0789a888dac98b8136ac1ef638c
2600
setupUSB.exe
C:\Windows\inf\netr28u.PNF
pnf
MD5: 48cffa9ec255fb3ced48f5d35250cde9
SHA256: 599a4df5979344cffd0d60821a7c2f4424926bdfb6fe08d33eef5e43df54bb19
2600
setupUSB.exe
C:\Windows\inf\netr28.PNF
pnf
MD5: 145e8b05e216ef16afc85c75713a0a10
SHA256: 6190907714ac7b1ba5319d4269adac1585cad31c6f04144fa3a19e4e9bef3733
2600
setupUSB.exe
C:\Windows\inf\netnvm32.PNF
pnf
MD5: 5903b1c7acde33fbc381f22dd9d143be
SHA256: 9d18ddde9c688a76fa66d6378133bbd28bd4ef9e14df884bb05a4d7fefde3d75
2600
setupUSB.exe
C:\Windows\inf\netnvmx.PNF
pnf
MD5: e7187ae1cfc657b6f8b6569345420149
SHA256: 648926942e407760f8eab09927ecdc23b427da1ccdba9bc04b3bcc26f7ae3da4
2600
setupUSB.exe
C:\Windows\inf\netmyk01.PNF
pnf
MD5: 00c14d61953b9c6acdb4df914a17db4e
SHA256: 0b0965838982199e424684d567e4e63fef79375e4e64e69de7b7055b00f2389f
2600
setupUSB.exe
C:\Windows\inf\netl1e86.PNF
pnf
MD5: 371f4c899588599fac87574bc3d3a3e0
SHA256: f581e5feb1176e60d25bbda5eb17ed772bd11c66aa37c311df8c129790fa4cce
2600
setupUSB.exe
C:\Windows\inf\netloop.PNF
pnf
MD5: 107660205cbddcc3f2b87ba9fc823f8d
SHA256: ac83ba204d246163d6c114f10113158e8c2bf0e7b29dd6505da87058f8124027
2600
setupUSB.exe
C:\Windows\inf\netl260x.PNF
pnf
MD5: fa97e5ae5f1105b43b71e520deb1c678
SHA256: bf490331c93a4377fd20472fc09a032308f552066152be3d08fbcecc93cf5fc6
2600
setupUSB.exe
C:\Windows\inf\netl1c86.PNF
pnf
MD5: ed84ffe5dc315fee79fb57d474a393b4
SHA256: 34e2ed8f223f7e35c40da96610484e473ec254140424b36cea1fb38d2af3ec6a
2600
setupUSB.exe
C:\Windows\inf\netl160x.PNF
pnf
MD5: e68a9de6d6447da4bd76b8bcca667845
SHA256: ef6a49b89ed7a599ee6d9ce6e90b91df869f191d9314f541455712186df891d1
2600
setupUSB.exe
C:\Windows\inf\netk57x.PNF
pnf
MD5: 8e2e367222ce723cb07b6bef2a7daf27
SHA256: 9d926fad3a0e8dc16499fe7cad685a79edd9380dac625c690b5363e94cb8d791
2600
setupUSB.exe
C:\Windows\inf\netirda.PNF
pnf
MD5: c0874e778e858d0125b3815f05c64278
SHA256: 478ef66efdd825546f545fe7206a9cc68c706e0488ceb612147ec2cb7f976332
2600
setupUSB.exe
C:\Windows\inf\netimm.PNF
pnf
MD5: 195c66f97155d4c8a34f345095739d07
SHA256: 34a568f66226329d9bf0ac5eb0b6ffc55f27f98d4a5b67be1cbf9e0e824521ab
2600
setupUSB.exe
C:\Windows\inf\netgb6.PNF
pnf
MD5: 38630f9166364d222eec276c3c24e235
SHA256: 99c33403a94c1110fe2b5356d59dbe7186db6dc3cea83f43c869bc15dac3c4d9
2600
setupUSB.exe
C:\Windows\inf\netevbdx.PNF
pnf
MD5: ffa8eb24460021ff79802d075bccc410
SHA256: 8992cfcc44bf3184b619315883a1d05f851effbe5c7c9864e2bf26775fce0841
2600
setupUSB.exe
C:\Windows\inf\netefe32.PNF
pnf
MD5: b0d30cd26e107f51c12f1dd83ea39e1f
SHA256: 4fd8fbf665be5fb63312f481bf454c50b6262a247e9e4932e3745db272740c3c
2600
setupUSB.exe
C:\Windows\inf\nete1e32.PNF
pnf
MD5: 42bb4f4902f02b77b15947b64a08701b
SHA256: b1636d8cb0cf3670b69c0ab0c0feb8327de568a762511d5f956699181f947788
2600
setupUSB.exe
C:\Windows\inf\netbxndx.PNF
pnf
MD5: 7f15a4be8465c0cb513c5286c0e972a1
SHA256: 3c0812fdd1c1d9e23f6a7a81aee64f6cad159ea86bfa5979807e66771629ed00
2600
setupUSB.exe
C:\Windows\inf\netbvbdx.PNF
pnf
MD5: 46058f0de6f7d033b7f517c42e91c646
SHA256: 4508a7c64c38664b400e245aab8161fe4f7e662db93fc094922804e577749647
2600
setupUSB.exe
C:\Windows\inf\netbc6.PNF
pnf
MD5: 5ea8730f5d38850ae0759bc3fe91ad9d
SHA256: f2b32800a0651806f616ffa23b4ae8ae67911b06479130593108e0d1c3ae76c0
2600
setupUSB.exe
C:\Windows\inf\netb57vx.PNF
pnf
MD5: ad0447dc2e7f43df3079c3042a40d345
SHA256: 0af5903ecd0353dd6ab75fd600865704c037ee33c3caed67299aba0943a20aa9
2600
setupUSB.exe
C:\Windows\inf\netathr.PNF
pnf
MD5: b7324bee84ac9b563b59ebfb50a89b00
SHA256: 166cb0733dc87aee414627410fd26261dffbb15937fecd0285ad1efd40c71169
2600
setupUSB.exe
C:\Windows\inf\net8187se86.PNF
pnf
MD5: 323d9040021e4512c95f6c968baad5e9
SHA256: 725a0158f4cfdd7d5e23dca8a4efd61faf07a12b5e2abeb6a0b886510cd74f9f
2600
setupUSB.exe
C:\Windows\inf\net8187bv32.PNF
pnf
MD5: 758b135aa2b563ce7fbd6ff7394b9c75
SHA256: f22c000e731bbb73be09ec8a0ff92e3b02370f3f6130fb63648624be0b73167a
2600
setupUSB.exe
C:\Windows\inf\net44x32.PNF
pnf
MD5: 3d35d163eaa6cf56668186148d65611a
SHA256: 919f32628b3c429555b3fc5d7d784fc9f45d1f262698f853a6c44fc9efe5f5d4
2600
setupUSB.exe
C:\Windows\inf\net8185.PNF
pnf
MD5: 0b23a4965852ad3e27a90b9d983607b0
SHA256: 504f6a619c12e44fd7a165c6ee38bdf1a1d14e8e9d69ced1a1bbd4d98988a184
2600
setupUSB.exe
C:\Windows\inf\net1y32.PNF
pnf
MD5: 5192c939af102175c215a71a48cf4af8
SHA256: e2472bcf51ef050aeb0332ecf84911ba9c0b7bb087dbd71edcd4ba44eef024fc
2600
setupUSB.exe
C:\Windows\inf\net1q32.PNF
pnf
MD5: e626031b4eadb8a386496ab04371554b
SHA256: a295fff3359c1a0035426128ca71041dc44aea01f35bef0006dacadf98d525d0
2600
setupUSB.exe
C:\Windows\inf\net1k32.PNF
pnf
MD5: 63eb264b1b8ebf39b47274de5cc14069
SHA256: 028c0215557b0ce00966abf71fc295e23a18e1be869a6dd7dceb70fcc47cbd07
3772
sfx.exe
C:\Users\admin\AppData\Local\Temp\RarSFX0\codanusb.inf
binary
MD5: 54690341166e6435d090dce82dda8658
SHA256: 5aecde1bf1df5214fbdc16c3d9ab06d3363976f1541c91ca4fa75e3ee1490133
2600
setupUSB.exe
C:\Windows\inf\mtconfig.PNF
pnf
MD5: 96ddbbde9f14c66a5ded091543af5781
SHA256: 23ec95f2d952b122af11bd3d4698a2b3396ae65977337405951831ef0716ac3e
2600
setupUSB.exe
C:\Windows\inf\mstape.PNF
pnf
MD5: 2558eff976aca30e8112410c9537c39f
SHA256: 9d180badcdf058136196f9ac4a3dde79b7316354ef9545abff909934b4ac22d7
2600
setupUSB.exe
C:\Windows\inf\msdsm.PNF
pnf
MD5: c64fd304b20389e449378f4a74bb575e
SHA256: c159d0472b4236e4cddadc36e65e5f6edcc4acfa887e87e680ed98f015b7b316
2600
setupUSB.exe
C:\Windows\inf\msdv.PNF
pnf
MD5: 5959e8618e24ebba8b7ebb55f285cad7
SHA256: 90582b4726b3f3f853854549a6a4dac15eb241dcfa79834b452cfad65141abc2
2600
setupUSB.exe
C:\Windows\inf\msdri.PNF
pnf
MD5: a76d3562e2820c4c4e35cd2979962fc7
SHA256: 1b94fdb2560b70ef32474746dd1c2df2817c3030b999f2f0d321684516c5dc75
2600
setupUSB.exe
C:\Windows\inf\mpio.PNF
pnf
MD5: 8f650dc32aa9d41e93ebf8d451a6827e
SHA256: da82a962b621ca03f1c7efef26ff5766ec2a2d35b6ea6eac48a79e7a5fd20b6a
2600
setupUSB.exe
C:\Windows\inf\msclmd.PNF
pnf
MD5: aaea6efd079bfd745f075d165655d9ee
SHA256: 3bba46e7ce09bce48a8960b6403b2088a2eec4ce5c1daf7339a7b544a565445e
2600
setupUSB.exe
C:\Windows\inf\mf.PNF
pnf
MD5: 32ecc48b05447deb0c725fa55febe352
SHA256: d3b604dca895b7ae324c068dea6da9cec8b9eec8ad52e0509184a5e6cb5710f0
2600
setupUSB.exe
C:\Windows\inf\modemcsa.PNF
pnf
MD5: 7e9fbb49ba9ec5ed5971e143bbab9d0d
SHA256: 8a7ddd05328032bdbb8d8b3a5ab717e693897dc2839d8635d69545a0376a0c04
2600
setupUSB.exe
C:\Windows\inf\memory.PNF
pnf
MD5: dc3b8774c3ba3913ed90d3176a40d458
SHA256: 252fb2ad3f15b16054ea10e05371e31e5f057eb4f982b26c387d0090fea11145
2600
setupUSB.exe
C:\Windows\inf\megasr.PNF
pnf
MD5: e3a8257db8a0420e6f3b49af7ce87612
SHA256: cc204b7164f051c2cd359022b2dd4e378600c78be5111960d63432257a251dbb
2600
setupUSB.exe
C:\Windows\inf\megasas2.PNF
pnf
MD5: 5d4ac4f31a32cce03ec0f1b8351328e8
SHA256: 78d97903cacf408545c53e70188035c0e18b8730b0b78449df9324a6ce433cea
2600
setupUSB.exe
C:\Windows\inf\megasas.PNF
pnf
MD5: b20ca4d2e7ee4aa2211f584809864414
SHA256: b0e75643a5929767e0f2c8393ff3ed69d6e6b687e283b284425577002ee85b9f
2600
setupUSB.exe
C:\Windows\inf\mdmzyxlg.PNF
pnf
MD5: 79fb37bc975d51f895027659fed49448
SHA256: e41b78b9ca5a5f6bb1531a0391455c0c340800d6b41cea040f5f6b17a7631ff5
2600
setupUSB.exe
C:\Windows\inf\mdmzyxel.PNF
pnf
MD5: eaa3d9ff355add305644bea1d593ee84
SHA256: e09ab80d354cb8cf6b44d5c0a0a67bbae35f4a9c9d51e0b27c6972cc2b06c270
2600
setupUSB.exe
C:\Windows\inf\mdmzyp.PNF
pnf
MD5: b6d849e79d08d8c09431460b4a3c5937
SHA256: 8e147c76a1c70705577984358b7582922e24c8c4fe7969cf72ee357355f0a17f
2600
setupUSB.exe
C:\Windows\inf\mdmzoom.PNF
pnf
MD5: dadc239db683c3be9ee0fd88a4a98909
SHA256: 33c94152f2257b7f4c4710a92cdbf82d20858fdaf26bd1d0807327d86611dfd8
2600
setupUSB.exe
C:\Windows\inf\mdmx5560.PNF
pnf
MD5: 837e26283ddc2b9e21d9ecd2b4195632
SHA256: 10bd91b5e8bd75417eb828adc31bc1bef8d40f5a8222ea910e1540de628b767e
2600
setupUSB.exe
C:\Windows\inf\mdmwhql0.PNF
pnf
MD5: be18eb60500d894f56d829936e460cd3
SHA256: 8c93b37cc02e752ae54e8140990ba14bd685b26afdd61e81b282405384a15be6
2600
setupUSB.exe
C:\Windows\inf\mdmvv.PNF
pnf
MD5: 07428d28b3bd2f0e4570b2e144a1bfcd
SHA256: e189574fff9c573e8aee694fe804aa62e99759a8372d1715259288dd041e97ec
2600
setupUSB.exe
C:\Windows\inf\mdmvdot.PNF
pnf
MD5: 22573e0f8c1c477c14e6521ade92f5b7
SHA256: 4388a2ac38bfb06a96bb1750a3178a5c53a3a3ab60fc9509928ea481a20733fd
2600
setupUSB.exe
C:\Windows\inf\mdmusrsp.PNF
pnf
MD5: 2726d759127b91c93bf0c4bcf673d99a
SHA256: 05e6bba27871375152681c64e31b25d62d1db8aee0648a8d776d6eeba74f7bc1
2600
setupUSB.exe
C:\Windows\inf\mdmusrk1.PNF
pnf
MD5: 5ba156938bb4617a1ad861a3e9a26a71
SHA256: 3572f4b0c1003ba5b2e982a9cf55a9169635ad7587a5486ea56270a8f86dff23
2600
setupUSB.exe
C:\Windows\inf\mdmusrgl.PNF
pnf
MD5: 98b79721494b15f355f7b8b792f43fdb
SHA256: f7c04c5660169a7726df9396ca0535d65c994a3d5e21e84c2b60bf373d8562ba
2600
setupUSB.exe
C:\Windows\inf\mdmusrg.PNF
pnf
MD5: 0effba0a3a88edca867d3dcbbda79d03
SHA256: b242cd449b86b751d57be2fd6f3bf75b20a1a56477015f54d6a79da4e822ea79
2600
setupUSB.exe
C:\Windows\inf\mdmusrf.PNF
pnf
MD5: dbe18ff6c0c61a18b8f9f808efd55bb7
SHA256: feac447b26e16ed484175503f1c04ec6a5ca8a3b1ac3c5b77aed9f4fc08dc0e6
2600
setupUSB.exe
C:\Windows\inf\mdmtkr.PNF
pnf
MD5: fd3f4cc2d9d662abd1d7719d24ff260d
SHA256: 0702586d91a99365299c3074e4587b8998586f390e06da8cede160abc73796ee
2600
setupUSB.exe
C:\Windows\inf\mdmtron.PNF
pnf
MD5: 77719c5878a437be9de0b431f81bdea3
SHA256: 18cf7c7406652ed0f1320f1054d758c05b7159a98ea46c2c53a13c81fdfea15b
2600
setupUSB.exe
C:\Windows\inf\mdmti.PNF
pnf
MD5: d13c8aea22a4f8c0cee8b5aac32b1345
SHA256: b75240210b6f0b6beacb315f7197f5c1fd08eaaf88b46d7762e7249d6dc8b240
2600
setupUSB.exe
C:\Windows\inf\mdmtexas.PNF
pnf
MD5: a8fa726b8144dfdcfc4b0bce02e3676d
SHA256: f1d08f55f424dcbcdbbdf695e58b9a67c90a6abb4b0f276569d9a706956dfa01
2600
setupUSB.exe
C:\Windows\inf\mdmtdkj7.PNF
pnf
MD5: cf47bdf64c9f086b698ed90cdcfffed5
SHA256: 01b84c07658c110b6f163166cb1c5660729c411598739011e40153082091c533
2600
setupUSB.exe
C:\Windows\inf\mdmtdkj5.PNF
pnf
MD5: 1e3d08ad7541aa1caba30b9cc1528c63
SHA256: 864df8ead2118e76280ea2397eeca5508379accea724ca79fbde3b9cceac2aff
2600
setupUSB.exe
C:\Windows\inf\mdmtdkj6.PNF
pnf
MD5: 3c2624b0616e0431e6945c59e3c362cd
SHA256: fd89bd1204996b86068fb4d04b340de2a989dea2b6542076760a0ab02e837881
2600
setupUSB.exe
C:\Windows\inf\mdmtdkj4.PNF
pnf
MD5: 7dadf80dd270ac51ef433f2ab870a017
SHA256: c5662f10343e0527c1524c3686e7e9a92e3ec433ded5af936578ec179eef49e6
2600
setupUSB.exe
C:\Windows\inf\mdmtdkj3.PNF
pnf
MD5: 198d020ba5d8de3cdfd48dc208e34cfa
SHA256: 63fc3b92050b62c9c5ee388ae31fa33060347b281decfa1c1af6fc88cb82b86b
2600
setupUSB.exe
C:\Windows\inf\mdmtdk.PNF
pnf
MD5: 518413bbeb31ff4292802062996e33d9
SHA256: 1dae748fd8d465bf94deddfe21fd251f13a133be76bf4e7c118566afd8cc103d
2600
setupUSB.exe
C:\Windows\inf\mdmtdkj2.PNF
pnf
MD5: 35c90a10ee23cc87252daa48709387fc
SHA256: 1723e69dcf186a38fe855e50466417648f702fdaa41c7123fa4a48507541edfc
2600
setupUSB.exe
C:\Windows\inf\mdmsuprv.PNF
pnf
MD5: 4e3452e6c12572168949b8b822ab10d8
SHA256: bf5630c73b104551d0480841e7aef3631de95c557a2ca037e05985f30223dbfd
2600
setupUSB.exe
C:\Windows\inf\mdmsupra.PNF
pnf
MD5: c8548d999fda9a30dd11b9292c6b3409
SHA256: 3bc39312aaee7144d20c2cdfd16867990374f8f594a8b800dc40c7fea692f92c
2600
setupUSB.exe
C:\Windows\inf\mdmsupr3.PNF
pnf
MD5: 18d02bb576b57018aa8100e875d910f2
SHA256: ea3efe23c7207613a1d5411c4fba9c570ab9a6c9417be3a492844ae820eab119
2600
setupUSB.exe
C:\Windows\inf\mdmsonyu.PNF
pnf
MD5: 71f4314f81553ff3344005d15af62445
SHA256: 8854369cb5deeaa795ed3343cb40f682f92f196f22472f8c1a98b84f08aa26c9
2600
setupUSB.exe
C:\Windows\inf\mdmsun2.PNF
pnf
MD5: 972a9500d0db17dac648760e2d261e70
SHA256: 7b3fc0f30ecef0952319528564fbf8761c86cbf458b590d89a5b1967f5a16532
2600
setupUSB.exe
C:\Windows\inf\mdmsun1.PNF
pnf
MD5: 2876fd9e0a733257d2eae125b3af01e2
SHA256: 80b79979a005fd9b0c468ee041ea0cd04a15b99e17f45337c35cbbae1498b15f
2600
setupUSB.exe
C:\Windows\inf\mdmsii64.PNF
pnf
MD5: 7ed2119da7989b012a298fa364d8a54e
SHA256: d5fe0265d69e576d0f6637d18f443d5f08151c3a48249aaefd4e3b3d150c3318
2600
setupUSB.exe
C:\Windows\inf\mdmsmart.PNF
pnf
MD5: 34698160d371812aee4625086b59d442
SHA256: 51edda60c105ecb4c668a4c0cd1b078058b716ecae32f7841bee3e38d526c198
2600
setupUSB.exe
C:\Windows\inf\mdmsier.PNF
pnf
MD5: dfc7aebd04e2ea028a20d9b741b00946
SHA256: 37f4896fb9ec098357ede3a60df50a2d9a5e7f4f5fe935f9dd51cee5f7aa7433
2600
setupUSB.exe
C:\Windows\inf\mdmrock5.PNF
pnf
MD5: 67242180ccabf88b95e0ea3441596c24
SHA256: 2b1b5d79493b1818ed792fb6680ea3b30b82d06fd98436da5db1700752eae734
2600
setupUSB.exe
C:\Windows\inf\mdmrock4.PNF
pnf
MD5: 3da26ccae60a9d3886b7253c3e40496e
SHA256: 89644bb1b8379c5b092565f4aa0378f77c26ef08a17e2b521b3d6ab4fe5c96fd
2600
setupUSB.exe
C:\Windows\inf\mdmrock3.PNF
pnf
MD5: c075076ba68ffc02e082f503721aae75
SHA256: 6723369adba3de5ea518864c6f38dec1695649e8dca5124293b60e838a34b140
2600
setupUSB.exe
C:\Windows\inf\mdmracal.PNF
pnf
MD5: de44fd8dcce5e03fe0b9c605d00f4d41
SHA256: d9f2a3eaee384b4df41003d0993d9a80ab3d583d3ea3c0dc510dd70e3dd950bb
2600
setupUSB.exe
C:\Windows\inf\mdmrock.PNF
pnf
MD5: ce5b0f232bf448216559cfce38b325fc
SHA256: e9c0d122690f91594fa06e270f4ea1293d96e1fee344379480bb0d3dda8d1cd1
2600
setupUSB.exe
C:\Windows\inf\mdmpsion.PNF
pnf
MD5: b8d2e77219c2f20cc9c71caeaafbc992
SHA256: b781ac8f20d91862fc7f961162cab79f08de7ef2c03b3bfdcee51a87a2c72c7d
2600
setupUSB.exe
C:\Windows\inf\mdmpn1.PNF
pnf
MD5: 53de2207dd52d37e635a2a622460e058
SHA256: acd572d6cb645b38516086f0dad3f3430a5df56dc7fb0fb11e078ff26f6d2b2e
2600
setupUSB.exe
C:\Windows\inf\mdmpin.PNF
pnf
MD5: 0bb1b0f23c525529a8029e6a516e0c66
SHA256: 577484dc7099124e3ddd079859ed7e45d0cdb4e94de4ad4a58bc50d8d4975e2e
2600
setupUSB.exe
C:\Windows\inf\mdmpp.PNF
pnf
MD5: 3340b0168dbc36fb23ca22789625d263
SHA256: 87af9b291aba9c05ca4510d6e98dd02c3b6ed621ee385026e6c6cd0cd7203765
2600
setupUSB.exe
C:\Windows\inf\mdmpenr.PNF
pnf
MD5: 435a59a346137a4451dccaab3fb3f00f
SHA256: 55c9f0a5bdc47f35961ba5cb028d9401a4f1074dfaabb9ae248911da6b0a4696
2600
setupUSB.exe
C:\Windows\inf\mdmpace.PNF
pnf
MD5: 39f51c6427662df694d12d3c708c3b35
SHA256: ae18d828b0cd07ac317cb8fb3914b6223f958f8c0a72a5cc986ed7acf44517f9
2600
setupUSB.exe
C:\Windows\inf\mdmosi.PNF
pnf
MD5: add907026de3ad079fb4220ab2ee5ae2
SHA256: 0dde10d07aff7dd3d0cc5ada760544e31ae31df45c6de01d1c08d1ae759b52b5
2600
setupUSB.exe
C:\Windows\inf\mdmomrn3.PNF
pnf
MD5: 819c041f2da461a98884ce225d655d2e
SHA256: f1bd86a8a90a861a826ac4406bd99ceef70e9f19b17cdf6a47ab591e37caa119
2600
setupUSB.exe
C:\Windows\inf\mdmoptn.PNF
pnf
MD5: 547050753835bebc479d2e6f309a009f
SHA256: 2c1df028d3d6fc59de45565323aa2070d18a169c0624bc20d29b65506c86bf1e
2600
setupUSB.exe
C:\Windows\inf\mdmnttte.PNF
pnf
MD5: 2762ae5ca5eb917fb5702fadddacf3bc
SHA256: 30b25820d575df0421bec02132992023d0046455ff8d089aa60d97f67626db30
2600
setupUSB.exe
C:\Windows\inf\mdmolic.PNF
pnf
MD5: 1230bd804872ce5efba29a9247858e5b
SHA256: 9d519a26c3273c988f02eb1bdd475f015f395ff4b631f112f8c82efbdef5fa0f
2600
setupUSB.exe
C:\Windows\inf\mdmnttp2.PNF
pnf
MD5: a9c9f04b4abfd6864bb5c0cb09f3f186
SHA256: 52b6183217a21ed3abc2358af27c153587f92b6c2b678b00f099b8aee691f4dd
2600
setupUSB.exe
C:\Windows\inf\mdmnttme.PNF
pnf
MD5: 7284b4250f2b10d8e7c89cb2b9c85a7f
SHA256: f39153f2553ea229c7106135693e6363d0895d5aa133b3bbc92dff1eaf0e2385
2600
setupUSB.exe
C:\Windows\inf\mdmnttd6.PNF
pnf
MD5: 4c3dab113d24f851a24fc301452d9cd8
SHA256: 2e85095aed61c3d49c1700f70f74918fe2210f892545aa289e7190c3728313d8
2600
setupUSB.exe
C:\Windows\inf\mdmnttp.PNF
pnf
MD5: 0b6d77db57a279f7e917d4fd07284661
SHA256: 3d3930a170aa45e1cca019a6f9c44ede58dd70fe1b36c37685985024f4870562
2600
setupUSB.exe
C:\Windows\inf\mdmntt1.PNF
pnf
MD5: 0f155f5618cc991a741ccf53033ba03e
SHA256: 4cebf992cbba5fc94cfb917e5cc664db610e2016c1bd696f2057cec6d7fe3e7b
2600
setupUSB.exe
C:\Windows\inf\mdmnokia.PNF
pnf
MD5: e90ab082650c794285c3ada74f819f30
SHA256: c8ccd1fda5a9ff7c661377261fcfe795af69debc0750995669d06253e25259b0
2600
setupUSB.exe
C:\Windows\inf\mdmnttd2.PNF
pnf
MD5: f8a39a845ae693cf8e93c48bbbbb6a15
SHA256: 48e3c6311b2fd9f300818634945fd2b8e1f625ae7d5255d858888e8ee7b87ff2
2600
setupUSB.exe
C:\Windows\inf\mdmnova.PNF
pnf
MD5: c46374cde6cfa21a2ab790d985d059f4
SHA256: 8ba50d7a8188d7dfa567524f61cf6f5a9bebb80696329a08fe71855b5846cbf5
2600
setupUSB.exe
C:\Windows\inf\mdmnis5t.PNF
pnf
MD5: 31509f66f499c3e19c54f99f4043a277
SHA256: 0b60332648ec6309a43556505ebc370592fe24ccde3525c80e35afe07963c3a7
2600
setupUSB.exe
C:\Windows\inf\mdmnis2u.PNF
pnf
MD5: 344ec65a266a180e5208556b120b153e
SHA256: 1225df0768d83a405663514cd85cb8549bedb4152f74d67826110c2b196513f6
2600
setupUSB.exe
C:\Windows\inf\mdmnis3t.PNF
pnf
MD5: 547d55b119df93ae8064902db890f24a
SHA256: 7084a32cde4c3046cbead059fb79548b1c3f003c83ee0bd09a5a2915b3339610
2600
setupUSB.exe
C:\Windows\inf\mdmnis1u.PNF
pnf
MD5: e26e36d80d30b1aaba984e1b21b0134f
SHA256: 1ed644d8d27c4093b2e75a7f3a2ce266b190eaa4bc89245120c2ed54acdc0b70
2600
setupUSB.exe
C:\Windows\inf\mdmneuhs.PNF
pnf
MD5: dfdbde468a78172bdc74587723f49ada
SHA256: cf8db0f2a5991e94bb8fbacbd2c69f78e9839387962127c72eb165c11b058691
2600
setupUSB.exe
C:\Windows\inf\mdmmts.PNF
pnf
MD5: 21f99816f1917ec8627603e400860487
SHA256: abae61380d30805e9be392e02e784d19ab41e615779598a11c9f0f01bffafe9e
2600
setupUSB.exe
C:\Windows\inf\mdmmotsm.PNF
pnf
MD5: d61c9323500cfac7547045f6c3900a28
SHA256: 37788983ee2328e64d81abfa48b053faeee5f7e1e37a2976658121645568271a
2600
setupUSB.exe
C:\Windows\inf\mdmmoto1.PNF
pnf
MD5: 0b45523bdf0dff940f4772decc0f8de0
SHA256: c40ade57ab425f6c891ff83b3a3e0f6f70cf502a411279b96827a6b061818c5d
2600
setupUSB.exe
C:\Windows\inf\mdmmotou.PNF
pnf
MD5: 283571c92d6a33e30fdb7d96abcab095
SHA256: 31b0777cf675177572a7ef9c01daa5101e19d345e2c8b4aee3e431f9118af957
2600
setupUSB.exe
C:\Windows\inf\mdmminij.PNF
pnf
MD5: f4a277898a5eeff6ef8c1b313ca5d721
SHA256: 89a8d92358c4fc5f79b0301a12d6099cd84e738a632b4a8cdaec36cf982c83ea
2600
setupUSB.exe
C:\Windows\inf\mdmmod.PNF
pnf
MD5: 28a622eddeb02aa1ea9f631ca94c62f8
SHA256: 49117c5651c1bb313dcc31b0f8bed8eae161ab5066c517dc39a117cfb6f5f999
2600
setupUSB.exe
C:\Windows\inf\mdmmhzel.PNF
pnf
MD5: 253b41202c1e94d10e70375e3f144032
SHA256: f9f6383c0c21a7f554d0411675f4c79e8d9eb52db1c0e37fb94c5731f8e9f4d3
2600
setupUSB.exe
C:\Windows\inf\mdmmhrtz.PNF
pnf
MD5: 7139641db842cb799837187ee7779efa
SHA256: d21ee61d5342b77b39ee65920ec0a0591e26777d007fa21a0d08dcd896f91238
2600
setupUSB.exe
C:\Windows\inf\mdmmetri.PNF
pnf
MD5: 4e60f2662240d393a2e5acc8b542c67c
SHA256: 1036149e633cf16bb513b8346ab2a549118d3ced8343654e38c22475e7167605
2600
setupUSB.exe
C:\Windows\inf\mdmmct.PNF
pnf
MD5: cee499eca57e9a7e0dfcd3dc5e824741
SHA256: 809c3fba33d41cd5d48824959293604b551495c902fe2c86197457f063b075ce
2600
setupUSB.exe
C:\Windows\inf\mdmmega.PNF
pnf
MD5: c6ba0b518aa900b0b30396ee8931cf26
SHA256: cef76a0581b8bae7678998f3f2118d2edd42d6e83e10717625ca5bc1825f7fb1
2600
setupUSB.exe
C:\Windows\inf\mdmmcom.PNF
pnf
MD5: 51f5038a72dd27616a6755a8a3f82c37
SHA256: 52cc3b8601d2bf96cbfb952be9e595338bc56b682cfa3efde284594e0c3b723f
2600
setupUSB.exe
C:\Windows\inf\mdmmcd.PNF
pnf
MD5: 9cd99ad7281c717f08e97199a3739ee6
SHA256: 52848ad4665d5d3ab363b82678783b82ffd3e30cef54445f2b13b9c9c4db30ee
2600
setupUSB.exe
C:\Windows\inf\mdmlucnt.PNF
pnf
MD5: 7d3981b1f8e4abd4d19b8aa2fc9f2016
SHA256: 1aa8e5c818a820026a266c48b337fb3bc56859f9f514bdb537ce0f22a1bb5357
2600
setupUSB.exe
C:\Windows\inf\mdmmc288.PNF
pnf
MD5: 9ffcb73f07dd742f26f232733f2efe8c
SHA256: 121980820d9a765b082c3b6e298a751fe68a6deb0b397632fa707f395054f3f5
2600
setupUSB.exe
C:\Windows\inf\mdmlasno.PNF
pnf
MD5: 43681d55d538020fa23b0ad8db6eb073
SHA256: 4d00ad3ce37566fd3177532290a69a85e3bbbf1164c9fc96394a9202c2afab23
2600
setupUSB.exe
C:\Windows\inf\mdmlasat.PNF
pnf
MD5: 2218408b72d7025a941aaa6ac60df3bc
SHA256: ce57ed2e27d1165b9f43f5179c3514142b36a77e5656a13eab7f616eaaa71888
2600
setupUSB.exe
C:\Windows\inf\mdmke.PNF
pnf
MD5: e0aea375b10e6ab33450e27d3466fcbb
SHA256: fd156b9adb66e00f840d89d541c70a40523363567cb03c8855b79a0cd19c20ae
2600
setupUSB.exe
C:\Windows\inf\mdmkortx.PNF
pnf
MD5: d06c12fd807fa5c14ba8f485af992439
SHA256: 9d8cee9cde2126945e1fded5e79a6bb8d961a62a81ae4deb243fffce58fc9abc
2600
setupUSB.exe
C:\Windows\inf\mdmjf56e.PNF
pnf
MD5: aeaadff7752c415f31ce113311705159
SHA256: ffaf22eadb3a9dd31f562f18d89be486120d00cfa684e01ac7773480b63f5d78
2600
setupUSB.exe
C:\Windows\inf\mdmisdn.PNF
pnf
MD5: 71c6b3db375206c217e407fcf8bb70d0
SHA256: 8f6bcb1b53f11447551b6eefe0ad729af5f96ca96e0535a3942aafa8cbc53424
2600
setupUSB.exe
C:\Windows\inf\mdmirmdm.PNF
pnf
MD5: 3ad8be0035a7b2fccd9bbc3f4bc59d50
SHA256: b7cf03230b9bcba67e891953dab6f8457fdf11e9f576b1bfce75c7c0ddb25fd2
2600
setupUSB.exe
C:\Windows\inf\mdminfot.PNF
pnf
MD5: ae0a942361cedf6a9d96a690c53afdb0
SHA256: 86d4cbfc613ee1796462b623e3e3330a762a02106487270f73bc9f708c53359d
2600
setupUSB.exe
C:\Windows\inf\mdmiodat.PNF
pnf
MD5: 5da90ab2de2c43007ddb26f39abd3b1a
SHA256: 947095cf142d2d11a6b307149d5e82f3518b1d9906e5f887ba12d01590c19092
2600
setupUSB.exe
C:\Windows\inf\mdmhayes.PNF
pnf
MD5: f72ae2aba8393af11c02201aee701099
SHA256: 3ae3a5f496e2c4cd04759c1f2aafdb0ca5bdd535d8bbf6bb0400e2d69c06d3ae
2600
setupUSB.exe
C:\Windows\inf\mdmhay2.PNF
pnf
MD5: c354b36dbff1f00dece03458c4a3fe79
SHA256: f2c283dd79e7547399c4d717d97ca400b217a05e8756dbbc9ff1152480fa91c1
2600
setupUSB.exe
C:\Windows\inf\mdmhandy.PNF
pnf
MD5: 243d4232340659884444040db60c8be2
SHA256: fd9e05947800110d10ecc3557d26a3f25fbe6385961f7ddcb02dadadef88034c
2600
setupUSB.exe
C:\Windows\inf\mdmgsm.PNF
pnf
MD5: 94d0e32f02676302ff34495897ee4572
SHA256: 70294bcb5fea4859a9b13feb1182b20a01d5a5953d41d18b4fba1892f496a4c0
2600
setupUSB.exe
C:\Windows\inf\mdmgl010.PNF
pnf
MD5: 709bf90f058a7469b78c21bd60cf95dd
SHA256: 785e6cdc9ce5482ade822e0124b80fc0cbebb0aff01223a9a73fb2ad41d115a5
2600
setupUSB.exe
C:\Windows\inf\mdmhaeu.PNF
pnf
MD5: 9e05bb3d2f0e22255412a668b925e590
SHA256: d99133e68c28fd6412a98d53f3b998b5ed8a6054f978997756a11a1a02b6923f
2600
setupUSB.exe
C:\Windows\inf\mdmgl009.PNF
pnf
MD5: 655a3e0fc4edc8942053938993361b3c
SHA256: 3c47ec2407c0673a79f37dd64ccc36a3ab7b487a3adcad111cc9a67a3bfe8bdc
2600
setupUSB.exe
C:\Windows\inf\mdmgl008.PNF
pnf
MD5: d1d99eebde4986e6d85e7fed7b3678f6
SHA256: fc80de1304c96647e7925a2597bf4bc8051088576e5038b1283d3b8be9a770f0
2600
setupUSB.exe
C:\Windows\inf\mdmgl007.PNF
pnf
MD5: 1501df5a4f050bb7dd6bb43752e6366f
SHA256: 0ca7c7312df7b315592bfe907cf9199090f9329ab69ee8e8498ac7e614c3cec5
2600
setupUSB.exe
C:\Windows\inf\mdmgl006.PNF
pnf
MD5: 82298901362cb364320b06fadbc7f998
SHA256: cc03620e457c1a90d62370a1d40af64b3a8208637aa75a2b7308e84aebe5fd08
2600
setupUSB.exe
C:\Windows\inf\mdmgl005.PNF
pnf
MD5: f349a75f96dc0e83f7a2a0693726e38c
SHA256: 1c16e15fb7bf5a44a9f50f05ace3979028484b9de8bcf91543b58f55437c2b27
2600
setupUSB.exe
C:\Windows\inf\mdmgl004.PNF
pnf
MD5: ad5d5103edd915c2ca2d290e92c1ef7f
SHA256: 694c908e4eb71a3fb458b0a347a0c99492b77d899820009d63d0f5748ce270c2
2600
setupUSB.exe
C:\Windows\inf\mdmgl003.PNF
pnf
MD5: 4eb6f66afa4f63958f9a0a1b0fc94b39
SHA256: 5ffef7b6e05acb4727303f814895aa0b8cbf6d8bc3afa13db759fb00927a9401
2600
setupUSB.exe
C:\Windows\inf\mdmgl002.PNF
pnf
MD5: e4edeb22c65e59ccaad85497b39d5b79
SHA256: 15f75f3859a3117a9a054e550cdb57b1fa81b5f6361f33d42d7076108a411e43
2600
setupUSB.exe
C:\Windows\inf\mdmgl001.PNF
pnf
MD5: 7f5275866a01a399649088632037075d
SHA256: c9964dcda296a1224bea449d33a7dc492b7de425e8291a1d8addfcd8540930e1
2600
setupUSB.exe
C:\Windows\inf\mdmgen.PNF
pnf
MD5: 8ea54555975766772341fb86f8976cb3
SHA256: 815f2c2b0eab9d289bc791cc1a788bc9d51732bd6af3a72b9014076816a6599e
2600
setupUSB.exe
C:\Windows\inf\mdmgcs.PNF
pnf
MD5: 0b041b7f9c4b8156e372dcf95ec82747
SHA256: bace44ad95a7a93d9ef243c18cc769e3293a5c80816b23c3a39460174c080887
2600
setupUSB.exe
C:\Windows\inf\mdmgatew.PNF
pnf
MD5: 2c7ab0d438f5971196d5c8e855bd4da6
SHA256: ffadb048183cf6ae50c59a37d18e8366feae35f6db1953863977bf9479149249
2600
setupUSB.exe
C:\Windows\inf\mdmfj2.PNF
pnf
MD5: aebde51a16e0c0daec30e6778aff63c7
SHA256: 1d33ef1077053875a7bf3e2cf38c0be64def13926fbeb0ea0d4623e62578eec1
2600
setupUSB.exe
C:\Windows\inf\mdmetech.PNF
pnf
MD5: c6adca5039d7b9c063c427bea949d8f4
SHA256: e60993ce341891445a0891933214642bdbf3e48c8d079a27d69fb9599f3cb3de
2600
setupUSB.exe
C:\Windows\inf\mdmeric2.PNF
pnf
MD5: 620f8823592246aa7eca742abdedc265
SHA256: f801eb9fc30cf16026666da76ce629ec0cd4699f3cf7c571ddaebdb1f0ac317b
2600
setupUSB.exe
C:\Windows\inf\mdmeric.PNF
pnf
MD5: 4afd6f85a1216bc42141b11ecdb0f6ca
SHA256: 641a4e7008bf9d307e3d7eab4c113556cfddedb9a31db6405b12d2faef22772f
2600
setupUSB.exe
C:\Windows\inf\mdmelsa.PNF
pnf
MD5: c30d616dc607d4daba7d33b41b7889b7
SHA256: 644ac7e367b6cdf0d26f4feedb7aa10f7d24845c181379ae32b84a46bd85126a
2600
setupUSB.exe
C:\Windows\inf\mdmeiger.PNF
pnf
MD5: e9640049e1d4663c69255c1bac3b3cf4
SHA256: ae35bea13ea499951ce6a18d79c2c8c89be029916a90a361a8c102edefb3cf22
2600
setupUSB.exe
C:\Windows\inf\mdmdyna.PNF
pnf
MD5: 48aa24f6b8939ca17a7e8718df27112f
SHA256: 5c188316e4b978ce0f0d8cc2246298e79e0dca2dc755078485b64c858cf6ec90
2600
setupUSB.exe
C:\Windows\inf\mdmdsi.PNF
pnf
MD5: ffcb843b4ae98d547f2ef5ab3953cb53
SHA256: d47947ab8ee0a8b1b2e06137488c4245bfc0a999cf5fd12c9e66623ed05b7caa
2600
setupUSB.exe
C:\Windows\inf\mdmdp2.PNF
pnf
MD5: 2b88d88688b048a56be4827ff156f417
SHA256: f69861913ed9506ec55e1bf1b5d38fe5be67d035cdb0f6a7da20d45d94a0104f
2600
setupUSB.exe
C:\Windows\inf\mdmdf56f.PNF
pnf
MD5: d5e47dd79a0e04714e042b631ce3ede7
SHA256: a8203b0edfdbc9a7d82a7005cac7ca8782f764ae2003d195386dac7fe2842272
2600
setupUSB.exe
C:\Windows\inf\mdmdgitn.PNF
pnf
MD5: 1d437e18998cc28de7ab759e0630a941
SHA256: aac938c151d1f9ac36c4a4f527b467f5b1805e860ebde6621a230ebcd4e931ad
2600
setupUSB.exe
C:\Windows\inf\mdmdcm6.PNF
pnf
MD5: 26df4f480a0649b3f4e7588ebe88656c
SHA256: bb312efaadc082a42e34c4595bfec041954cd40a21d4852fb3b487cae14e58dd
2600
setupUSB.exe
C:\Windows\inf\mdmdcm5.PNF
pnf
MD5: f58cdc8c691ab7bf0527d582cb92a1ae
SHA256: 4f79711ffa1c3eab5a1e05d5e3addc44400ae6b7cbd4448b0221f572718bf1b4
2600
setupUSB.exe
C:\Windows\inf\mdmcxpv3.PNF
pnf
MD5: 7caaa27945cea7008fb0622c78c91037
SHA256: d3af5607408d4c592be12c523aa8b7bfc7e45d50190a1763e0ba67bd32c38727
2600
setupUSB.exe
C:\Windows\inf\mdmcxhv3.PNF
pnf
MD5: cb11a4ce423e30b0b9e8f85ce60f942c
SHA256: d24292e26300e1764bdc56ec9e9a952e1085a703413be6a4f11ee19e14fd1ff1
2600
setupUSB.exe
C:\Windows\inf\mdmcxav3.PNF
pnf
MD5: 646f7a062c2cd4ac9aff8407f8658f91
SHA256: 49455d7bfc4cf34efe25a6dc2b0b578df8b9ceadc264bb0f0cf2ac5497603b74
2600
setupUSB.exe
C:\Windows\inf\mdmcrtix.PNF
pnf
MD5: 523b3a73062679a58543c3c82c1d0d2a
SHA256: 7e4687c198196dc0dfec99867862195653c5dc7632b9909e19ae2bd64398f377
2600
setupUSB.exe
C:\Windows\inf\mdmcpv.PNF
pnf
MD5: 3c613bdd9a41e3d46bd388e72aa59d72
SHA256: c1d9504245979c34e1df9d6413c4d462cb38f6e7f0264ad6647422967eacbfcb
2600
setupUSB.exe
C:\Windows\inf\mdmcpq2.PNF
pnf
MD5: 932d847b20137056aa3f9abebce9509a
SHA256: 8f12736366be1ff147cd2cb900b32dde96fd0401b70838f70f9eab3590e18bcb
2600
setupUSB.exe
C:\Windows\inf\mdmcpq.PNF
pnf
MD5: 09a38f43e1cc504280ffd039bb75adfe
SHA256: 98b49de93e0a2ba4adc56f37223df2b7252f766e7708bff6f1676a65dee4e8a0
2600
setupUSB.exe
C:\Windows\inf\mdmcomp.PNF
pnf
MD5: 5d9e4af27f1c05d2e98d2720399818d4
SHA256: 30c26576e13374195103e6f16c4c6d246ce9a9f91130c1f20647d6a32a79a09c
2600
setupUSB.exe
C:\Windows\inf\mdmcommu.PNF
pnf
MD5: 7b763b4f1603c2e8fbbb849a62e0869b
SHA256: 97ec462574cddd15c3a38a3f98e38bd1ab5aa3bde5b34e3622c1e5828ed580c5
2600
setupUSB.exe
C:\Windows\inf\mdmcodex.PNF
pnf
MD5: 080048a0b65c7729f7843d56955b8457
SHA256: 0ad1cfd3971a074076071fc932abef6e8bd2904a17603042fb5d73ff36d1c72b
2600
setupUSB.exe
C:\Windows\inf\mdmcom1.PNF
pnf
MD5: 5df6d38673d34535435b4cd08633ebe3
SHA256: 0657f32cbcfc6049de56899aabb2d9ea3b967416b0a7228e7756b2486de1d799
2600
setupUSB.exe
C:\Windows\inf\mdmcm28.PNF
pnf
MD5: b3d1d2080a9baf38231d59e35bf089db
SHA256: 331e2d38780167926ad63871eb3f46427e64ab6778c02ebebc53b99cdc6d9a99
2600
setupUSB.exe
C:\Windows\inf\mdmc26a.PNF
pnf
MD5: 6ba4f533af22bd87ff7554e34a9f1564
SHA256: 7bc18bac11143494e1736eadb180b835493fb926b838bab5711f05b1f17652d6
2600
setupUSB.exe
C:\Windows\inf\mdmcdp.PNF
pnf
MD5: b1047e436acacebd8da48dbff6ad6b8f
SHA256: 86153ed1c0c66c1b4917b0d60a80451462d256a6edd8cd85f746524483ac5391
2600
setupUSB.exe
C:\Windows\inf\mdmbw561.PNF
pnf
MD5: ed2cb2d1c94d057d4ac684b5a8fd2e8e
SHA256: 4589f2a89e34bd497e4627cfd18c8c64cedf8e291dfdfc1a81b640835b45216c
2600
setupUSB.exe
C:\Windows\inf\mdmbtmdm.PNF
pnf
MD5: 6efe621121cbcebd32a34570e28b66c4
SHA256: cfe0cb93d2b53d10c9b16b84d0503c888f6a90b57147c8749a9055e992c57d18
2600
setupUSB.exe
C:\Windows\inf\mdmbug3.PNF
pnf
MD5: 80d691169f73b1c535913e552fe65f53
SHA256: d321485c24e397e915437b009f16c0266e1b21b48d76be55cd0321b9c47042b7
2600
setupUSB.exe
C:\Windows\inf\mdmbr00a.PNF
pnf
MD5: 5696ae74c0f5738a3b09d53e984a893d
SHA256: 0941a8c48f6c0fe69ba714bc1d9dab9619526506958ef12633728003ec0a8de6
2600
setupUSB.exe
C:\Windows\inf\mdmbsb.PNF
pnf
MD5: e06d937ce0ac03aef7a88b50c52d8c05
SHA256: eab464861dc1f997ce599e21726d509c6a800f8ce00f7521a3b667367d1e1ae9
2600
setupUSB.exe
C:\Windows\inf\mdmbr008.PNF
pnf
MD5: 5313308bee3199313617e89dd96fec01
SHA256: 3d4e103bdb81a802e8c9ae206dbc372e436a2f8a5bec04c13769ed2b948265e4
2600
setupUSB.exe
C:\Windows\inf\mdmbr007.PNF
pnf
MD5: ad2ca3e7d934e733e009d3767a927075
SHA256: 2d653a05337cad3df86071b0bea603b7e6d6c989018a77abee6a99ad12a0deca
2600
setupUSB.exe
C:\Windows\inf\mdmbr006.PNF
pnf
MD5: c4fe4686bbc19b86b089d13a74ac1a9e
SHA256: d83b6c8d9f555e9aac937aa684d4e82e116946b18e9f5d0d5a4d1daa996c3538
2600
setupUSB.exe
C:\Windows\inf\mdmbr005.PNF
pnf
MD5: 4c85e87f6683783d8acdbd6a1ba2ad40
SHA256: 971255cabece86865824bf7a8099d61934b5b8f7a5e696f9058e025a1bdfab0e
2600
setupUSB.exe
C:\Windows\inf\mdmbr002.PNF
pnf
MD5: 9dfb6537aad107dba04aad5d2de580bf
SHA256: 69700e147ba6177cc47785e792ae56d9a03daf91692455303b8f9b803c705839
2600
setupUSB.exe
C:\Windows\inf\mdmbr004.PNF
pnf
MD5: 2654a7aa5d5aefd05fffd03ac581b27c
SHA256: 9fb7a7b5143f18985fdaf85f9fcaa23c7cfc0d182f53a2b5beb98ead0937e13b
2600
setupUSB.exe
C:\Windows\inf\mdmboca.PNF
pnf
MD5: 1be06df3c592274561527556c35c1877
SHA256: 9a06872b1b0d207da6f8f13d1a6ec68b7c4215cd61fd110bff98937c3354cc1e
2600
setupUSB.exe
C:\Windows\inf\mdmaus.PNF
pnf
MD5: a8992d47a8a40dd2489049add6c6d088
SHA256: 81cdc9fb529f87c75740f298413365ccabaa579550698238b57e804ad30be427
2600
setupUSB.exe
C:\Windows\inf\mdmati.PNF
pnf
MD5: 5f92521db6451cedd5ac3d0f97719087
SHA256: 6a1d23080f0d041dd430c4ba6dc3e7583f2cfc4c5659cdb06479c60d82779003
2600
setupUSB.exe
C:\Windows\inf\mdmatm2k.PNF
pnf
MD5: dd6662b25db079656d8e09750dcd035f
SHA256: fd61a3f87732199211832399c68842091da580d990af6ebafd62ae0ba0765572
2600
setupUSB.exe
C:\Windows\inf\mdmarn.PNF
pnf
MD5: d12fc25a466fc3b575e8051df063b532
SHA256: 9bd4bcdc914ed172bab297fae9756f7936a2709e287436979f93007723bb20ce
2600
setupUSB.exe
C:\Windows\inf\mdmarch.PNF
pnf
MD5: 2b02214ddc022536f2339fff6f35ce76
SHA256: d592939b12590060b7321912b5cfd4f51a7b53a144eddf597666138ef6800da9
2600
setupUSB.exe
C:\Windows\inf\mdmaiwat.PNF
pnf
MD5: 8819dc966b7b237bb167d6a83c780c06
SHA256: d374392e9f4da8fe381f43d2a426e6a073c821b8daba91d787bb8229001fca77
2600
setupUSB.exe
C:\Windows\inf\mdmar1.PNF
pnf
MD5: 632a7dca821b7f4e6ae536217272fe74
SHA256: 9966c778e9a338a30e4ef1047dc824772efa33c670e7c0d155db58c46e48a498
2600
setupUSB.exe
C:\Windows\inf\mdmaiwa5.PNF
pnf
MD5: bdb69b9b4afa70a3be25bcdfa1acb045
SHA256: 7fb0f142582ad1e47d89be39fa439574863c75e45ed6b9e57a00b988a83f6c00
2600
setupUSB.exe
C:\Windows\inf\mdmaiwa4.PNF
pnf
MD5: e94b3944872a2091f45ed61bed8a80bf
SHA256: 6ff29c6466d4f57ef9e1aeafc2ff83d6800e81a5b5b6b1a931ad29e493b08da2
2600
setupUSB.exe
C:\Windows\inf\mdmaiwa.PNF
pnf
MD5: de7125a7ef502ce92e2bc5629c7885f0
SHA256: f13454ff24ceeb8476273bf2f76a2696cd34d2f1e8d9d7f27f92d7a815b59606
2600
setupUSB.exe
C:\Windows\inf\mdmaiwa3.PNF
pnf
MD5: 6dc227332fd4257fbef5e2b53f96f72b
SHA256: 5d45eae2aa965d9019b25b70a59b6eb121d637779ba4eecb09fa67fc1c77352f
2600
setupUSB.exe
C:\Windows\inf\mdmairte.PNF
pnf
MD5: 8b6c241666608adf9e20fc730c815c5b
SHA256: 6dea8dd8226cb0fa51b9e5194518c0726f7501dfae14f36e6daf515aacd1dea1
2600
setupUSB.exe
C:\Windows\inf\mdmagrs.PNF
pnf
MD5: fa3cd961c04be15961e5538ee514a574
SHA256: 8b8ac0d89e4922c61fff1f23af0ace8a8d7c873faa73a103ee95ea0bee557708
2600
setupUSB.exe
C:\Windows\inf\mdmadc.PNF
pnf
MD5: 926cafd7dff53de2de9a7539a6a658ea
SHA256: 5b31e955edca0b881261dc5297dca35a5395f21387919ed37a103f964b6b3773
2600
setupUSB.exe
C:\Windows\inf\mdmagrm.PNF
pnf
MD5: 7a5e9a645291e99e4f319967b667207b
SHA256: cab9693530d564d79cd7f9e94e5a1ff15939b12f98d8540ecb813ce872b67f35
2600
setupUSB.exe
C:\Windows\inf\mdm5674a.PNF
pnf
MD5: d78360001affd18816cf110e7527649d
SHA256: ed78768c676ed49d80969eded65f2804855a0a28987eca229c65e793c1fb4ec4
2600
setupUSB.exe
C:\Windows\inf\mdm3com.PNF
pnf
MD5: b0d17380d746b6c001ea0dc95a5c6ce8
SHA256: 48ad9a7897a3c19a2d1aaac109fe9346bab7da0e6acef59db84d89ee69f333e9
2600
setupUSB.exe
C:\Windows\inf\mcx2.PNF
pnf
MD5: a5bbdc2db78b5471f56c1845a414acb9
SHA256: 50d25d0c5ffd8227ba22c3473b78cc22a824fa5ab9d84b02679f133a9cac170a
2600
setupUSB.exe
C:\Windows\inf\mchgr.PNF
pnf
MD5: 4cc51a3458a7e0088da68e219ea5a681
SHA256: 8cd0a4635755bd0869002136f868764b489560a983936f3ea81d353fc2273a99
2600
setupUSB.exe
C:\Windows\inf\lsi_scsi.PNF
pnf
MD5: 8fdf34456e2181a6edf8594ac5f42fc5
SHA256: 8030e11768a3c13689b5c319a207341d144ec7d1f6090e8da07f7fefb4b7e1c4
2600
setupUSB.exe
C:\Windows\inf\lsi_sas.PNF
pnf
MD5: 930d5a32127e663e0d95cbf95b67c9a3
SHA256: a48881b3b99abfd4232a6bf3c09e1cb6254d934ea756fa7258fa1e9cbe014b38
2600
setupUSB.exe
C:\Windows\inf\lsi_sas2.PNF
pnf
MD5: f48a559e6c905438cf7675c0c165f581
SHA256: 3bbbf1f0eb2729e6ceaeab868f2075dbde89246bddc73d51d521d5ffa56e67b3
2600
setupUSB.exe
C:\Windows\inf\lsi_fc.PNF
pnf
MD5: ec4573c7bac31a862e520f47e2496767
SHA256: 75ab1df44bf793fcae192ad4d37dad724de2982362f4a6f75be3a994a294ede2
2600
setupUSB.exe
C:\Windows\inf\kscaptur.PNF
pnf
MD5: 02f353bec0aed86d99bd4f1458cd4fe5
SHA256: 4d757421621ef3ec4931d947c136900e7d8b8e2de92b92690212b52508b6b68b
2600
setupUSB.exe
C:\Windows\inf\iscsi.PNF
pnf
MD5: 1a112d270df5d829bd29806d1d869af9
SHA256: a5c64bd29e74210e41f9b467c64436874324452fc77066cce1f772e07c43dbb3
2600
setupUSB.exe
C:\Windows\inf\ipmidrv.PNF
pnf
MD5: b36d7a1b7c807c2dbc94f51bd841b8c3
SHA256: 58c0aa9fa65e5dee4bf41b8f30366b1f756cc8139ece974be78f851c443d99b6
2600
setupUSB.exe
C:\Windows\inf\iirsp2.PNF