Analysis

  • max time kernel
    46s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    14/02/2023, 13:17

Errors

Reason
Machine shutdown

General

  • Target

    UGEEWin_3.2.0.210804.exe

  • Size

    23.5MB

  • MD5

    b4cacf19c6ffff4c6eb568336869372e

  • SHA1

    b938668629a78d373d850f7ffd555e5ebcb8c1d9

  • SHA256

    3102d27a70c41f2e2abf9ca9465608ea5887857abc5bf5cacb7528ae90825c63

  • SHA512

    436e6211ca9ab99a166f8ea20e657c77722c79873e28601e4385e692cb95ecd2fdc2f05e728e0f88d2f9e0d1881989a3c2e86e0fd3430270a69ab094150d9043

  • SSDEEP

    393216:eAvWn7A7CaB6VvWRO4YbAvrA7CaESq4Ie1fvydH5Ua7e3W3e5XNmy+zxuaA67UnQ:47sRh7Y0vrsRESBIe1ydZUa7e35cVA69

Malware Config

Signatures

  • Drops file in Drivers directory 6 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 12 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 32 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 32 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Kills process with taskkill 2 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\UGEEWin_3.2.0.210804.exe
    "C:\Users\Admin\AppData\Local\Temp\UGEEWin_3.2.0.210804.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1764
    • C:\Users\Admin\AppData\Local\Temp\is-5LLK7.tmp\UGEEWin_3.2.0.210804.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-5LLK7.tmp\UGEEWin_3.2.0.210804.tmp" /SL5="$80022,24076297,169472,C:\Users\Admin\AppData\Local\Temp\UGEEWin_3.2.0.210804.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1228
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-IR3P2.tmp\EndWintab.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:432
        • C:\Windows\system32\taskkill.exe
          taskkill /f /t /im PenTablet.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:664
        • C:\Windows\system32\taskkill.exe
          taskkill /f /t /im PentabletService.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1004
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c listdlls.exe -d wintab32.dll /accepteula
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1924
          • C:\Users\Admin\AppData\Local\Temp\is-IR3P2.tmp\Listdlls.exe
            listdlls.exe -d wintab32.dll /accepteula
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            • Suspicious use of WriteProcessMemory
            PID:1660
            • C:\Users\Admin\AppData\Local\Temp\is-IR3P2.tmp\Listdlls64.exe
              listdlls.exe -d wintab32.dll /accepteula
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1200
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Listdlls v3.2 - Listdlls "
          4⤵
            PID:1552
          • C:\Windows\system32\find.exe
            find "pid:"
            4⤵
              PID:1976
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Copyright (C) 1997-2016 Mark Russinovich "
              4⤵
                PID:1980
              • C:\Windows\system32\find.exe
                find "pid:"
                4⤵
                  PID:872
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Sysinternals "
                  4⤵
                    PID:300
                  • C:\Windows\system32\find.exe
                    find "pid:"
                    4⤵
                      PID:1940
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Error opening System(4): "
                      4⤵
                        PID:828
                      • C:\Windows\system32\find.exe
                        find "pid:"
                        4⤵
                          PID:1372
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Access is denied. "
                          4⤵
                            PID:1992
                          • C:\Windows\system32\find.exe
                            find "pid:"
                            4⤵
                              PID:1804
                          • C:\Windows\system32\cmd.exe
                            "C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-IR3P2.tmp\PSCC.bat""
                            3⤵
                              PID:468
                            • C:\Program Files\Pentablet\64\devcon.exe
                              "C:\Program Files\Pentablet\64\devcon.exe" install vmulti.inf pentablet\hid
                              3⤵
                              • Executes dropped EXE
                              • Drops file in System32 directory
                              • Drops file in Windows directory
                              • Suspicious use of AdjustPrivilegeToken
                              PID:932
                        • C:\Windows\system32\DrvInst.exe
                          DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{267796cf-d659-1414-58db-d537dd9c6278}\vmulti.inf" "9" "6b1fe2f8b" "0000000000000578" "WinSta0\Default" "00000000000003E8" "208" "c:\program files\pentablet\64"
                          1⤵
                          • Drops file in System32 directory
                          • Drops file in Windows directory
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1480
                        • C:\Windows\system32\DrvInst.exe
                          DrvInst.exe "2" "211" "ROOT\HIDCLASS\0000" "C:\Windows\INF\oem2.inf" "vmulti.inf:Vendor.NTAMD64.6.1:vmulti.Inst.Win7:6.1.7600.16385:pentablet\hid" "6b1fe2f8b" "0000000000000578" "00000000000005AC" "00000000000003AC"
                          1⤵
                          • Drops file in Drivers directory
                          • Drops file in System32 directory
                          • Drops file in Windows directory
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1592
                        • C:\Windows\system32\DrvInst.exe
                          DrvInst.exe "1" "200" "HID\hid&Col01\1&2d595ca7&0&0000" "" "" "6d30ceb77" "0000000000000000" "00000000000005B4" "00000000000005B8"
                          1⤵
                          • Drops file in System32 directory
                          • Drops file in Windows directory
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1172
                        • C:\Windows\system32\DrvInst.exe
                          DrvInst.exe "1" "200" "HID\hid&Col02\1&2d595ca7&0&0001" "" "" "6955ccbf7" "0000000000000000" "000000000000061C" "0000000000000620"
                          1⤵
                          • Drops file in Windows directory
                          • Modifies data under HKEY_USERS
                          PID:1588
                        • C:\Windows\system32\DrvInst.exe
                          DrvInst.exe "1" "200" "HID\hid&Col04\1&2d595ca7&0&0003" "" "" "619fc8cf3" "0000000000000000" "0000000000000600" "0000000000000604"
                          1⤵
                          • Drops file in Windows directory
                          • Modifies data under HKEY_USERS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:572
                        • C:\Windows\system32\DrvInst.exe
                          DrvInst.exe "1" "200" "HID\hid&Col03\1&2d595ca7&0&0002" "" "" "657acac73" "0000000000000000" "00000000000005E8" "00000000000005E4"
                          1⤵
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1448
                        • C:\Windows\system32\rundll32.exe
                          rundll32.exe C:\Windows\system32\newdev.dll,pDiDeviceInstallNotification \\.\pipe\PNP_Device_Install_Pipe_1.{6fbc7a38-99bd-4f15-9ae1-abafaa8ebed3} "(null)"
                          1⤵
                            PID:1972
                          • C:\Windows\system32\DrvInst.exe
                            DrvInst.exe "1" "200" "HID\hid&Col05\1&2d595ca7&0&0004" "" "" "6dc4c6d6f" "0000000000000000" "00000000000005F0" "00000000000005C4"
                            1⤵
                            • Drops file in Windows directory
                            • Modifies data under HKEY_USERS
                            PID:980
                          • C:\Windows\system32\LogonUI.exe
                            "LogonUI.exe" /flags:0x0
                            1⤵
                              PID:1828
                            • C:\Windows\system32\AUDIODG.EXE
                              C:\Windows\system32\AUDIODG.EXE 0x1ec
                              1⤵
                                PID:1684
                              • C:\Windows\system32\LogonUI.exe
                                "LogonUI.exe" /flags:0x1
                                1⤵
                                  PID:576

                                Network

                                      MITRE ATT&CK Enterprise v6

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Program Files\Pentablet\64\devcon.exe

                                        Filesize

                                        88KB

                                        MD5

                                        f44245761bcf718a534974b431b8ce5c

                                        SHA1

                                        ee9ddb20529b1dad55383d9209d4d5c35c152571

                                        SHA256

                                        0a15d33b2994e5eb25ab9747e1214b078348529a735d342f3fa5fdb64b6cd312

                                        SHA512

                                        0b58cc6353d9cdb39c83c0f97444d66072eea9fdf19b835116e58cff3d195da4cf05f25fe57da0962aafa35dc6bf0fe35350b87c39c8f2e440615b766652af87

                                      • C:\Program Files\Pentablet\64\vmulti.inf

                                        Filesize

                                        3KB

                                        MD5

                                        8caa6a96198b63517ce99095203dbe65

                                        SHA1

                                        666128119cf75897ff466a494d662bd3457a64c7

                                        SHA256

                                        72ec99a990a5d0c2c1fa7709606309bc7ba3ca850c8649bd86bc0cb639fb25b6

                                        SHA512

                                        2cfb684c88bff460b2fdbd6a09c0a1b859e97216114eb0472aa17a3ba7e27bd89a41a9a357efc662e5ef3809e33cf4470823421e18042cb607b6263526c9f949

                                      • C:\Users\Admin\AppData\Local\Temp\is-5LLK7.tmp\UGEEWin_3.2.0.210804.tmp

                                        Filesize

                                        1.5MB

                                        MD5

                                        dca93f866f9a591f547ed8442841734a

                                        SHA1

                                        b8970ce7e09ff274fe331d7335e23087ebd71810

                                        SHA256

                                        a6d6e323f0fa2a630fe6fbf5d4e1d306cb8c2cb7a10e417ad105bdcef4cd6be1

                                        SHA512

                                        c14cea4f24d0620f65304b1b9019799e20850c3ea928ec6c119cb70171b1d3aeb71729347047e69b231f918f81b42939a6b91faddf3bbc7803278c9191b4718f

                                      • C:\Users\Admin\AppData\Local\Temp\is-5LLK7.tmp\UGEEWin_3.2.0.210804.tmp

                                        Filesize

                                        1.5MB

                                        MD5

                                        dca93f866f9a591f547ed8442841734a

                                        SHA1

                                        b8970ce7e09ff274fe331d7335e23087ebd71810

                                        SHA256

                                        a6d6e323f0fa2a630fe6fbf5d4e1d306cb8c2cb7a10e417ad105bdcef4cd6be1

                                        SHA512

                                        c14cea4f24d0620f65304b1b9019799e20850c3ea928ec6c119cb70171b1d3aeb71729347047e69b231f918f81b42939a6b91faddf3bbc7803278c9191b4718f

                                      • C:\Users\Admin\AppData\Local\Temp\is-IR3P2.tmp\EndWintab.bat

                                        Filesize

                                        482B

                                        MD5

                                        aa9693d32653eaa7181228624b2dfd57

                                        SHA1

                                        9c9833ca082b288040ff6880471603fa90a4b64d

                                        SHA256

                                        d9fa3ad5a5385b7b5bdd1c314e06983ba324421bc72e595f820daa32882543ca

                                        SHA512

                                        63ad5c283db43fe06aac71d12fcf688002aa9fc3e6457525f9c3ac42e542d8a4d43af0035768386d722994023d5920b1796a7d448c532b75a8c52ce650b5972d

                                      • C:\Users\Admin\AppData\Local\Temp\is-IR3P2.tmp\Listdlls.exe

                                        Filesize

                                        414KB

                                        MD5

                                        60a2331a2b28968585c7c7229d2424a8

                                        SHA1

                                        fbac538166d61b4f10db934bd4bc1b86c81e56fb

                                        SHA256

                                        b0f6800b2bb4c86e091120e9087c75f9b1b3e46b89cf65744d65cf5ab01fd385

                                        SHA512

                                        159542a30195f58a6957d70282bd2dff79708bd2228ebebf7db48e25d80e68ea17714b518a029d2e21acf564d37982b43850249c944e99ce1b38864ffa00b009

                                      • C:\Users\Admin\AppData\Local\Temp\is-IR3P2.tmp\Listdlls.exe

                                        Filesize

                                        414KB

                                        MD5

                                        60a2331a2b28968585c7c7229d2424a8

                                        SHA1

                                        fbac538166d61b4f10db934bd4bc1b86c81e56fb

                                        SHA256

                                        b0f6800b2bb4c86e091120e9087c75f9b1b3e46b89cf65744d65cf5ab01fd385

                                        SHA512

                                        159542a30195f58a6957d70282bd2dff79708bd2228ebebf7db48e25d80e68ea17714b518a029d2e21acf564d37982b43850249c944e99ce1b38864ffa00b009

                                      • C:\Users\Admin\AppData\Local\Temp\is-IR3P2.tmp\Listdlls64.exe

                                        Filesize

                                        215KB

                                        MD5

                                        8336396d50dcc9d5a5f66b078a8460dc

                                        SHA1

                                        42bf0bb282512e4c638b8f03617dd973ee09afd9

                                        SHA256

                                        29d23bc492e48a5ae68444302d3430e07d08e04278d53aa70d9367d9cf8bceb7

                                        SHA512

                                        08f34405f8d5ebf695391f9cb1deb6eb22b318b698ce9540d37eae45d36476a96d379e9f338c64d5f2f3e9674751bdb7f3661845530605b8fb1eb14ee91702e2

                                      • C:\Users\Admin\AppData\Local\Temp\is-IR3P2.tmp\PSCC.bat

                                        Filesize

                                        3KB

                                        MD5

                                        935934d8df9be23fd1a9ceebf0268c60

                                        SHA1

                                        9b1514fec943f47a3cc6f4e2086f3d4a756fab4d

                                        SHA256

                                        080a7566cd8bb25f32c3de59a62ad51801663695012ddb3376a2fe159078b24d

                                        SHA512

                                        b1bf2442b90b4118cfd09ff54862291bf8b3a29363ac83e08657badf5b506e56b0751288646bb440ca60906b75bcbd4e949fd8a5cd2e8337e95b6693f98ec019

                                      • C:\Users\Admin\AppData\Local\Temp\{267796cf-d659-1414-58db-d537dd9c6278}\pentablethid.cat

                                        Filesize

                                        9KB

                                        MD5

                                        cabe5b1bbfb4a6169d92746c52791399

                                        SHA1

                                        cda8c0d0c0b766b5012e12abe9aea9ee9bbfa7a2

                                        SHA256

                                        f6be58bc921ae4e82a2b85453dde6e8ea76c4a74356ef1647eb07ec16369d76a

                                        SHA512

                                        fc7a4625a78c71414fab851d88b6002fe5ff5276272b53a7d58cbc0e426f9ccaee74cd51e362791f0ada721d1713593e573d278b20cbb624d08d24c09ed17eae

                                      • C:\Users\Admin\AppData\Local\Temp\{267796cf-d659-1414-58db-d537dd9c6278}\vmulti.inf

                                        Filesize

                                        3KB

                                        MD5

                                        8caa6a96198b63517ce99095203dbe65

                                        SHA1

                                        666128119cf75897ff466a494d662bd3457a64c7

                                        SHA256

                                        72ec99a990a5d0c2c1fa7709606309bc7ba3ca850c8649bd86bc0cb639fb25b6

                                        SHA512

                                        2cfb684c88bff460b2fdbd6a09c0a1b859e97216114eb0472aa17a3ba7e27bd89a41a9a357efc662e5ef3809e33cf4470823421e18042cb607b6263526c9f949

                                      • C:\Users\Admin\AppData\Local\Temp\{26779~1\WdfCoInstaller01009.dll

                                        Filesize

                                        1.7MB

                                        MD5

                                        d2cc9c7825874f874597e740a6581b66

                                        SHA1

                                        4503b24a8fae7aa0e14ebb7b138e5df1732c90d0

                                        SHA256

                                        399c80fd3eea9fc4365c4596012ac5adfcb786a190dd177e13d3dc9d83b95140

                                        SHA512

                                        b14b4b58ff4d9d72eb52b3d381afd20c3a61b5e08e6bfbbb746a7fe41d9c45e7ecd5a003064609e93f4dc963a6a45691a7e95ad7319b8e79fe7d8b9d260671f7

                                      • C:\Users\Admin\AppData\Local\Temp\{26779~1\hidkmdf.sys

                                        Filesize

                                        7KB

                                        MD5

                                        f1928f41c82ee87c3512c519b285a115

                                        SHA1

                                        526d137427e83138f0b31a0d18986a0caddf76b1

                                        SHA256

                                        40bbe73324701268c3f52551c2531552fa43421ef7db799c08200c303ddc2235

                                        SHA512

                                        5d85b39d6e295e3baf1dd63d515c3e18a2d165483549ef1a7a8cdc78ed9cfed10e0e5acd8a8d60762bcffebb4c4c4ef5cf404a5f1f95a16a3f7523c85fdaa230

                                      • C:\Users\Admin\AppData\Local\Temp\{26779~1\vmulti.sys

                                        Filesize

                                        10KB

                                        MD5

                                        4636facdc5d181a62d2ad34654f4a00d

                                        SHA1

                                        221e212e325d07895dacb419479138675031dce2

                                        SHA256

                                        394c002844f9f63a5999f66535ada392c932245c795c9ea9cf7c73f0e4dc43b0

                                        SHA512

                                        9f19751a9bbc69e96af8752784406f80c329caf45bfc3aac201c270117b5ded3c43193a5c8034135ca93514cc4cb947742c80972be50cff00100708d0126449e

                                      • C:\Windows\INF\oem2.inf

                                        Filesize

                                        3KB

                                        MD5

                                        8caa6a96198b63517ce99095203dbe65

                                        SHA1

                                        666128119cf75897ff466a494d662bd3457a64c7

                                        SHA256

                                        72ec99a990a5d0c2c1fa7709606309bc7ba3ca850c8649bd86bc0cb639fb25b6

                                        SHA512

                                        2cfb684c88bff460b2fdbd6a09c0a1b859e97216114eb0472aa17a3ba7e27bd89a41a9a357efc662e5ef3809e33cf4470823421e18042cb607b6263526c9f949

                                      • C:\Windows\System32\CatRoot2\dberr.txt

                                        Filesize

                                        194KB

                                        MD5

                                        f88c73ce77a94777fe7e49d7098aa984

                                        SHA1

                                        9ef028f982899501612314a9cac925676faeaed6

                                        SHA256

                                        a09a6a17edb49600dfc2bbd7fdc861e31243b4e673a19045248ab3ae3ca1d571

                                        SHA512

                                        b93cfe28a1b16028da2a0a289f5fff166d78b165e093766331d026638cd47ad8fd0e2b42ac3adb5f677c4ce11f3b29a2666ace7a497c2ddadaa89a4273565cd1

                                      • C:\Windows\System32\DRIVER~1\FILERE~1\VMULTI~1.INF\hidkmdf.sys

                                        Filesize

                                        7KB

                                        MD5

                                        f1928f41c82ee87c3512c519b285a115

                                        SHA1

                                        526d137427e83138f0b31a0d18986a0caddf76b1

                                        SHA256

                                        40bbe73324701268c3f52551c2531552fa43421ef7db799c08200c303ddc2235

                                        SHA512

                                        5d85b39d6e295e3baf1dd63d515c3e18a2d165483549ef1a7a8cdc78ed9cfed10e0e5acd8a8d60762bcffebb4c4c4ef5cf404a5f1f95a16a3f7523c85fdaa230

                                      • C:\Windows\System32\DRIVER~1\FILERE~1\VMULTI~1.INF\vmulti.sys

                                        Filesize

                                        10KB

                                        MD5

                                        4636facdc5d181a62d2ad34654f4a00d

                                        SHA1

                                        221e212e325d07895dacb419479138675031dce2

                                        SHA256

                                        394c002844f9f63a5999f66535ada392c932245c795c9ea9cf7c73f0e4dc43b0

                                        SHA512

                                        9f19751a9bbc69e96af8752784406f80c329caf45bfc3aac201c270117b5ded3c43193a5c8034135ca93514cc4cb947742c80972be50cff00100708d0126449e

                                      • C:\Windows\System32\DriverStore\FileRepository\vmulti.inf_amd64_neutral_7c4a709680e8796d\pentablethid.cat

                                        Filesize

                                        9KB

                                        MD5

                                        cabe5b1bbfb4a6169d92746c52791399

                                        SHA1

                                        cda8c0d0c0b766b5012e12abe9aea9ee9bbfa7a2

                                        SHA256

                                        f6be58bc921ae4e82a2b85453dde6e8ea76c4a74356ef1647eb07ec16369d76a

                                        SHA512

                                        fc7a4625a78c71414fab851d88b6002fe5ff5276272b53a7d58cbc0e426f9ccaee74cd51e362791f0ada721d1713593e573d278b20cbb624d08d24c09ed17eae

                                      • C:\Windows\System32\DriverStore\FileRepository\vmulti.inf_amd64_neutral_7c4a709680e8796d\vmulti.PNF

                                        Filesize

                                        10KB

                                        MD5

                                        1babf1e55c3901e8c17e51bd79da45b2

                                        SHA1

                                        e1ac7e2fea6fc8e468c39b7dec054f94c49732a6

                                        SHA256

                                        0e841467ce71b5de94e6b9aacc51998548080b83cf6fb6337f96a010ccdd0dd3

                                        SHA512

                                        d52fcc1f97a618d62d2003b39a414f1e8e7dd0f24d6c5c27e6d70da8fe380680d1ec79aaf4dd6eb004ff3847eba91e154c46430b41d16cbcb896112165892791

                                      • C:\Windows\System32\DriverStore\INFCACHE.1

                                        Filesize

                                        1.4MB

                                        MD5

                                        babec703d64c71ae4e946428e4a8fcf3

                                        SHA1

                                        06902bbaab758c3790c1a2bd645b27f71f22d4db

                                        SHA256

                                        8b4bd3bb2d6b5631fdcaa6d21825b68c1ffb615272d1a429571ec935127b3a46

                                        SHA512

                                        28b49d857dac9ace7830bdb82c75c8175b7b413d2d2eefe9ea6edb899ce48ea929802908e0e9992990be66920f239b6f12569ef5e387da7fcc015ef37c1b4800

                                      • C:\Windows\setupact.log

                                        Filesize

                                        21KB

                                        MD5

                                        2b3135949a84c8a6630b9d9943a4117a

                                        SHA1

                                        8241f3ab0e91f387e259ae8f63c0ec00405a127e

                                        SHA256

                                        ee4a3b516262b28eb66e8e60bf2d049da0642649cd53ccd05e68deef149c2dcf

                                        SHA512

                                        652e1ceabc6c095de3d736e11153f26a8ba3f677f32ae90b1f313b062768c719e39a866fc77c1596542b65d936f361cef66859c4bce64d17a89089605f329f7d

                                      • \??\c:\PROGRA~1\PENTAB~1\64\WDFCOI~1.DLL

                                        Filesize

                                        1.7MB

                                        MD5

                                        d2cc9c7825874f874597e740a6581b66

                                        SHA1

                                        4503b24a8fae7aa0e14ebb7b138e5df1732c90d0

                                        SHA256

                                        399c80fd3eea9fc4365c4596012ac5adfcb786a190dd177e13d3dc9d83b95140

                                        SHA512

                                        b14b4b58ff4d9d72eb52b3d381afd20c3a61b5e08e6bfbbb746a7fe41d9c45e7ecd5a003064609e93f4dc963a6a45691a7e95ad7319b8e79fe7d8b9d260671f7

                                      • \??\c:\PROGRA~1\PENTAB~1\64\hidkmdf.sys

                                        Filesize

                                        7KB

                                        MD5

                                        f1928f41c82ee87c3512c519b285a115

                                        SHA1

                                        526d137427e83138f0b31a0d18986a0caddf76b1

                                        SHA256

                                        40bbe73324701268c3f52551c2531552fa43421ef7db799c08200c303ddc2235

                                        SHA512

                                        5d85b39d6e295e3baf1dd63d515c3e18a2d165483549ef1a7a8cdc78ed9cfed10e0e5acd8a8d60762bcffebb4c4c4ef5cf404a5f1f95a16a3f7523c85fdaa230

                                      • \??\c:\PROGRA~1\PENTAB~1\64\vmulti.sys

                                        Filesize

                                        10KB

                                        MD5

                                        4636facdc5d181a62d2ad34654f4a00d

                                        SHA1

                                        221e212e325d07895dacb419479138675031dce2

                                        SHA256

                                        394c002844f9f63a5999f66535ada392c932245c795c9ea9cf7c73f0e4dc43b0

                                        SHA512

                                        9f19751a9bbc69e96af8752784406f80c329caf45bfc3aac201c270117b5ded3c43193a5c8034135ca93514cc4cb947742c80972be50cff00100708d0126449e

                                      • \??\c:\program files\pentablet\64\pentablethid.cat

                                        Filesize

                                        9KB

                                        MD5

                                        cabe5b1bbfb4a6169d92746c52791399

                                        SHA1

                                        cda8c0d0c0b766b5012e12abe9aea9ee9bbfa7a2

                                        SHA256

                                        f6be58bc921ae4e82a2b85453dde6e8ea76c4a74356ef1647eb07ec16369d76a

                                        SHA512

                                        fc7a4625a78c71414fab851d88b6002fe5ff5276272b53a7d58cbc0e426f9ccaee74cd51e362791f0ada721d1713593e573d278b20cbb624d08d24c09ed17eae

                                      • \Program Files\Pentablet\64\devcon.exe

                                        Filesize

                                        88KB

                                        MD5

                                        f44245761bcf718a534974b431b8ce5c

                                        SHA1

                                        ee9ddb20529b1dad55383d9209d4d5c35c152571

                                        SHA256

                                        0a15d33b2994e5eb25ab9747e1214b078348529a735d342f3fa5fdb64b6cd312

                                        SHA512

                                        0b58cc6353d9cdb39c83c0f97444d66072eea9fdf19b835116e58cff3d195da4cf05f25fe57da0962aafa35dc6bf0fe35350b87c39c8f2e440615b766652af87

                                      • \Program Files\Pentablet\64\devcon.exe

                                        Filesize

                                        88KB

                                        MD5

                                        f44245761bcf718a534974b431b8ce5c

                                        SHA1

                                        ee9ddb20529b1dad55383d9209d4d5c35c152571

                                        SHA256

                                        0a15d33b2994e5eb25ab9747e1214b078348529a735d342f3fa5fdb64b6cd312

                                        SHA512

                                        0b58cc6353d9cdb39c83c0f97444d66072eea9fdf19b835116e58cff3d195da4cf05f25fe57da0962aafa35dc6bf0fe35350b87c39c8f2e440615b766652af87

                                      • \Program Files\Pentablet\64\devcon.exe

                                        Filesize

                                        88KB

                                        MD5

                                        f44245761bcf718a534974b431b8ce5c

                                        SHA1

                                        ee9ddb20529b1dad55383d9209d4d5c35c152571

                                        SHA256

                                        0a15d33b2994e5eb25ab9747e1214b078348529a735d342f3fa5fdb64b6cd312

                                        SHA512

                                        0b58cc6353d9cdb39c83c0f97444d66072eea9fdf19b835116e58cff3d195da4cf05f25fe57da0962aafa35dc6bf0fe35350b87c39c8f2e440615b766652af87

                                      • \Program Files\Pentablet\PenTablet.exe

                                        Filesize

                                        839KB

                                        MD5

                                        3a1aab2358d1d470e4c6eba9896e0609

                                        SHA1

                                        fed44d4015fe09ebf21108281d6b2da891dc23ea

                                        SHA256

                                        51838beb325a501b08e84c3bb423b88296921fe2cf04166126695d169c7d72d9

                                        SHA512

                                        17467b3eb0fcb08b0a1647c72c706e583b83a9de46e01d03853d6b5baaa9469ff328324eadb78cd6f328c3da7c3a0514a624fb8b546838e7c383cf43de5051b1

                                      • \Program Files\Pentablet\PenTablet.exe

                                        Filesize

                                        839KB

                                        MD5

                                        3a1aab2358d1d470e4c6eba9896e0609

                                        SHA1

                                        fed44d4015fe09ebf21108281d6b2da891dc23ea

                                        SHA256

                                        51838beb325a501b08e84c3bb423b88296921fe2cf04166126695d169c7d72d9

                                        SHA512

                                        17467b3eb0fcb08b0a1647c72c706e583b83a9de46e01d03853d6b5baaa9469ff328324eadb78cd6f328c3da7c3a0514a624fb8b546838e7c383cf43de5051b1

                                      • \Program Files\Pentablet\unins000.exe

                                        Filesize

                                        1.5MB

                                        MD5

                                        f9c63c065b076ef5336bed33b9fd8ba5

                                        SHA1

                                        814921a3863aab52cac771c6a2d8e78be596ab30

                                        SHA256

                                        dc179a67ea34394f0bdec643d8142b190c959ecf50585a488b903ef3741d017c

                                        SHA512

                                        5d06a85ac77e0487f44a1a2851212c5e4b7726b49beaea3457862a2e3831e2adfb79bc6cef3ffc7f3708ef684642cbe331f0336924f72e65002af48e09e0793f

                                      • \Users\Admin\AppData\Local\Temp\is-5LLK7.tmp\UGEEWin_3.2.0.210804.tmp

                                        Filesize

                                        1.5MB

                                        MD5

                                        dca93f866f9a591f547ed8442841734a

                                        SHA1

                                        b8970ce7e09ff274fe331d7335e23087ebd71810

                                        SHA256

                                        a6d6e323f0fa2a630fe6fbf5d4e1d306cb8c2cb7a10e417ad105bdcef4cd6be1

                                        SHA512

                                        c14cea4f24d0620f65304b1b9019799e20850c3ea928ec6c119cb70171b1d3aeb71729347047e69b231f918f81b42939a6b91faddf3bbc7803278c9191b4718f

                                      • \Users\Admin\AppData\Local\Temp\is-IR3P2.tmp\Listdlls64.exe

                                        Filesize

                                        215KB

                                        MD5

                                        8336396d50dcc9d5a5f66b078a8460dc

                                        SHA1

                                        42bf0bb282512e4c638b8f03617dd973ee09afd9

                                        SHA256

                                        29d23bc492e48a5ae68444302d3430e07d08e04278d53aa70d9367d9cf8bceb7

                                        SHA512

                                        08f34405f8d5ebf695391f9cb1deb6eb22b318b698ce9540d37eae45d36476a96d379e9f338c64d5f2f3e9674751bdb7f3661845530605b8fb1eb14ee91702e2

                                      • \Users\Admin\AppData\Local\Temp\is-IR3P2.tmp\_isetup\_shfoldr.dll

                                        Filesize

                                        22KB

                                        MD5

                                        92dc6ef532fbb4a5c3201469a5b5eb63

                                        SHA1

                                        3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                        SHA256

                                        9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                        SHA512

                                        9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                      • \Users\Admin\AppData\Local\Temp\is-IR3P2.tmp\_isetup\_shfoldr.dll

                                        Filesize

                                        22KB

                                        MD5

                                        92dc6ef532fbb4a5c3201469a5b5eb63

                                        SHA1

                                        3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                        SHA256

                                        9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                        SHA512

                                        9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                      • \Users\Admin\AppData\Local\Temp\is-IR3P2.tmp\botva2.dll

                                        Filesize

                                        35KB

                                        MD5

                                        0177746573eed407f8dca8a9e441aa49

                                        SHA1

                                        6b462adf78059d26cbc56b3311e3b97fcb8d05f7

                                        SHA256

                                        a4b61626a1626fdabec794e4f323484aa0644baa1c905a5dcf785dc34564f008

                                        SHA512

                                        d4ac96da2d72e121d1d63d64e78bcea155d62af828324b81889a3cd3928ceeb12f7a22e87e264e34498d100b57cdd3735d2ab2316e1a3bf7fa099ddb75c5071a

                                      • \Users\Admin\AppData\Local\Temp\is-IR3P2.tmp\innocallback.dll

                                        Filesize

                                        63KB

                                        MD5

                                        1c55ae5ef9980e3b1028447da6105c75

                                        SHA1

                                        f85218e10e6aa23b2f5a3ed512895b437e41b45c

                                        SHA256

                                        6afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f

                                        SHA512

                                        1ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b

                                      • memory/1200-83-0x000007FEFB9A1000-0x000007FEFB9A3000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/1228-64-0x0000000002140000-0x000000000214E000-memory.dmp

                                        Filesize

                                        56KB

                                      • memory/1228-66-0x0000000002150000-0x0000000002165000-memory.dmp

                                        Filesize

                                        84KB

                                      • memory/1228-94-0x0000000074211000-0x0000000074213000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/1764-54-0x0000000075E81000-0x0000000075E83000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/1764-67-0x0000000000400000-0x0000000000434000-memory.dmp

                                        Filesize

                                        208KB

                                      • memory/1764-122-0x0000000000400000-0x0000000000434000-memory.dmp

                                        Filesize

                                        208KB

                                      • memory/1764-55-0x0000000000400000-0x0000000000434000-memory.dmp

                                        Filesize

                                        208KB