Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    45s
  • max time network
    51s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10/06/2023, 19:50

General

  • Target

    usb_network_gate.exe

  • Size

    5.6MB

  • MD5

    4f2da6f219f49011c4359ab11960e908

  • SHA1

    8fa54635c41daf63721504b7996a9c594ba7842a

  • SHA256

    899428ab80fd8631cfebe1866105c00e8f8941d48fab310d25e3d807df43dda2

  • SHA512

    5a196977254e26fdf5187a9cbeb0bb8b4f091df3157c2d93c60831c039b8d3cc38f47b3aad11373f791e57aa994f09dc5dbdf19a87024cd6e68d7c24311d65b3

  • SSDEEP

    98304:ULkzAUDjQSBP8nKkStjLpIRjQVxWaldytMSY0XvYWAH968gLw:lEUDjTBUKk0ZSpal0EgYWKgLw

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 13 IoCs
  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 37 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 45 IoCs
  • Drops file in Windows directory 13 IoCs
  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\usb_network_gate.exe
    "C:\Users\Admin\AppData\Local\Temp\usb_network_gate.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\is-3JEIG.tmp\usb_network_gate.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-3JEIG.tmp\usb_network_gate.tmp" /SL5="$7007A,5352830,121344,C:\Users\Admin\AppData\Local\Temp\usb_network_gate.exe"
      2⤵
      • Drops file in Program Files directory
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4648
      • C:\Users\Admin\AppData\Local\Temp\is-T3VNE.tmp\_isetup\_setup64.tmp
        helper 105 0x3D0
        3⤵
        • Executes dropped EXE
        PID:2740
      • C:\Program Files\Electronic Team\USB Network Gate\drv\NT6x64\setup_server_ung.exe
        "C:\Program Files\Electronic Team\USB Network Gate\drv\NT6x64\setup_server_ung.exe"
        3⤵
        • Drops file in Drivers directory
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:5020
      • C:\Program Files\Electronic Team\USB Network Gate\UsbService64.exe
        "C:\Program Files\Electronic Team\USB Network Gate\UsbService64.exe" install E232F16E-D109-45DB-A1D3-DD21BEB3B75F
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Modifies system certificate store
        PID:4244
      • C:\Program Files\Electronic Team\USB Network Gate\UsbService64.exe
        "C:\Program Files\Electronic Team\USB Network Gate\UsbService64.exe" migrate
        3⤵
        • Executes dropped EXE
        PID:4800
      • C:\Program Files\Electronic Team\USB Network Gate\UsbService64.exe
        "C:\Program Files\Electronic Team\USB Network Gate\UsbService64.exe" enable
        3⤵
        • Executes dropped EXE
        PID:4544
      • C:\Windows\system32\netsh.exe
        "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=u2ec_service dir=in action=allow program="C:\Program Files\Electronic Team\USB Network Gate\UsbService64.exe" enable=yes
        3⤵
        • Modifies Windows Firewall
        PID:4764
      • C:\Windows\system32\netsh.exe
        "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=u2ec_gui dir=in action=allow program="C:\Program Files\Electronic Team\USB Network Gate\UsbConfig.exe" enable=yes
        3⤵
        • Modifies Windows Firewall
        PID:4904
  • \??\c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k dcomlaunch -s DeviceInstall
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{da9dd65c-087b-c04a-980a-c4359f997bf6}\UsbStub.inf" "9" "4eb22a207" "000000000000016C" "WinSta0\Default" "0000000000000178" "208" "C:\Program Files\Electronic Team\USB Network Gate\drv\NT6x64"
      2⤵
      • Drops file in Drivers directory
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:8
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{057f2a9c-7bce-ab45-b458-eaa1edbce8a3}\vuh.inf" "9" "425e1bb63" "0000000000000138" "WinSta0\Default" "000000000000017C" "208" "c:\program files\electronic team\usb network gate\drv\nt6x64"
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:4964
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "2" "211" "ROOT\SYSTEM\0001" "C:\Windows\INF\oem4.inf" "vuh.inf:741f41b5ee77f2a1:VUHUB_Device:7.1.1549.0:vuhub," "425e1bb63" "0000000000000138"
      2⤵
      • Drops file in Drivers directory
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      PID:380
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "0" "UsbEStub\Devices\0000" "" "" "455b45ca3" "0000000000000000"
      2⤵
      • Drops file in Drivers directory
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1456
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "1" "0" "UsbEStub\Devices\0004" "" "" "4c5c6bf7f" "0000000000000000"
      2⤵
      • Drops file in Drivers directory
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2244
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc
    1⤵
    • Checks SCSI registry key(s)
    • Modifies data under HKEY_USERS
    PID:692
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x3a0
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:276
  • C:\Program Files\Electronic Team\USB Network Gate\UsbService64.exe
    "C:\Program Files\Electronic Team\USB Network Gate\UsbService64.exe"
    1⤵
    • Checks BIOS information in registry
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Executes dropped EXE
    • Loads dropped DLL
    • Checks processor information in registry
    • Modifies data under HKEY_USERS
    • Modifies system certificate store
    PID:4628

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~1\ELECTR~1\USBNET~1\drv\NT6x64\USBOVE~1.CAT

    Filesize

    9KB

    MD5

    c8256436ce819a44b623c6a2d187ed4b

    SHA1

    03485e4f158bba63e10f323238656a8fd5f312e5

    SHA256

    ff42009f192bd6ec5e16a7cfd2366f39d3d337391d78aa5e41403375a957639c

    SHA512

    f6d01e074a2da87604d1106234c8db26070b261ac2ba6000990bbae0da1e123733ad04e072090c4f3cd439859cc8bbf0ed2ab426e242f9677a92746a63c9cba2

  • C:\PROGRA~1\ELECTR~1\USBNET~1\drv\NT6x64\eusbstub.sys

    Filesize

    41KB

    MD5

    874b6d8979802b45f765413c11668fea

    SHA1

    746b398773759bf97dfdd3437659df15b4b29fa2

    SHA256

    26e6d9fd4fda86ffc995f0f944101f890a86a6b23b546b8a069af6c230f82fe3

    SHA512

    64ff94f929b65489ae74627fcfe84311dc21c0fd2651fdb3e658db8651d4a8033a5f166e790b42d0e0550ad530a17a709f7c73e17fcd2c320e05476fd204b0fe

  • C:\Program Files\Electronic Team\USB Network Gate\UsbConfig.exe

    Filesize

    5.6MB

    MD5

    18c7ca5a13f2689b55a2d6b29754c945

    SHA1

    421775f04de52250eb26cbc12553a0b83959b179

    SHA256

    54e83a4a55d677828b80c7a272a12191238d1ae09b5a03ab6cddbc8a9809aae1

    SHA512

    5a7a87d5d494b228bcf2d8090c9bb783d63e3d1d15c72b17da41a5882bae825c5e992846225c1430e227ff038a58a964835ea6ab40eadde343087761f5fe83ff

  • C:\Program Files\Electronic Team\USB Network Gate\UsbService64.exe

    Filesize

    3.6MB

    MD5

    f48aa83ecea00c920e1ba03554373239

    SHA1

    ef177072d305125798764703d8563f05200fd46a

    SHA256

    923d4e4ef4e9b15520914cac064df4102889934a0f667a7983811bdc8318e27a

    SHA512

    6f9c346e9dee22fde39f0c798a57cba4f99eb4cc2d251a10cfed4a583a3791e65720c1f4c33400516a148881105a4142e409b0f4f54aaf51c241860fe6391982

  • C:\Program Files\Electronic Team\USB Network Gate\UsbService64.exe

    Filesize

    3.6MB

    MD5

    f48aa83ecea00c920e1ba03554373239

    SHA1

    ef177072d305125798764703d8563f05200fd46a

    SHA256

    923d4e4ef4e9b15520914cac064df4102889934a0f667a7983811bdc8318e27a

    SHA512

    6f9c346e9dee22fde39f0c798a57cba4f99eb4cc2d251a10cfed4a583a3791e65720c1f4c33400516a148881105a4142e409b0f4f54aaf51c241860fe6391982

  • C:\Program Files\Electronic Team\USB Network Gate\UsbService64.exe

    Filesize

    3.6MB

    MD5

    f48aa83ecea00c920e1ba03554373239

    SHA1

    ef177072d305125798764703d8563f05200fd46a

    SHA256

    923d4e4ef4e9b15520914cac064df4102889934a0f667a7983811bdc8318e27a

    SHA512

    6f9c346e9dee22fde39f0c798a57cba4f99eb4cc2d251a10cfed4a583a3791e65720c1f4c33400516a148881105a4142e409b0f4f54aaf51c241860fe6391982

  • C:\Program Files\Electronic Team\USB Network Gate\UsbService64.exe

    Filesize

    3.6MB

    MD5

    f48aa83ecea00c920e1ba03554373239

    SHA1

    ef177072d305125798764703d8563f05200fd46a

    SHA256

    923d4e4ef4e9b15520914cac064df4102889934a0f667a7983811bdc8318e27a

    SHA512

    6f9c346e9dee22fde39f0c798a57cba4f99eb4cc2d251a10cfed4a583a3791e65720c1f4c33400516a148881105a4142e409b0f4f54aaf51c241860fe6391982

  • C:\Program Files\Electronic Team\USB Network Gate\UsbService64.exe

    Filesize

    3.6MB

    MD5

    f48aa83ecea00c920e1ba03554373239

    SHA1

    ef177072d305125798764703d8563f05200fd46a

    SHA256

    923d4e4ef4e9b15520914cac064df4102889934a0f667a7983811bdc8318e27a

    SHA512

    6f9c346e9dee22fde39f0c798a57cba4f99eb4cc2d251a10cfed4a583a3791e65720c1f4c33400516a148881105a4142e409b0f4f54aaf51c241860fe6391982

  • C:\Program Files\Electronic Team\USB Network Gate\UsbService64.exe

    Filesize

    3.6MB

    MD5

    f48aa83ecea00c920e1ba03554373239

    SHA1

    ef177072d305125798764703d8563f05200fd46a

    SHA256

    923d4e4ef4e9b15520914cac064df4102889934a0f667a7983811bdc8318e27a

    SHA512

    6f9c346e9dee22fde39f0c798a57cba4f99eb4cc2d251a10cfed4a583a3791e65720c1f4c33400516a148881105a4142e409b0f4f54aaf51c241860fe6391982

  • C:\Program Files\Electronic Team\USB Network Gate\appstatico64.dll

    Filesize

    874KB

    MD5

    80951a7cda153b71980e4a47c95b3f79

    SHA1

    5b1ff54ec99432bd989749f674dec5780232446a

    SHA256

    62b298c4516266e911042af367d7f5207ad61bc1317e03049449cdfad10f24d8

    SHA512

    54d5ee2ca3a4a53c4750d73e1a0c5a691d69ad62aad14f438516bccd42a3b1893fe1d29302313561706c8b3b64a1fd73dbb686c7a44765d724e58a43302dcdc5

  • C:\Program Files\Electronic Team\USB Network Gate\drv\NT6x64\UsbStub.inf

    Filesize

    1KB

    MD5

    c8ad4ce198d0e7150e97ac3574b28b7a

    SHA1

    6125a164683230545b698202c85c6d30126729a2

    SHA256

    db159d6322c121ad4e398640b85ce51a7d502a66231c6569f6955a55252d49de

    SHA512

    6d5c3409d7e604e9204de2d2982447f0877e361ed944d6b836b195ce9d25440e8192886647e413683b9f7875c0fc595ce13464d8c013e70c54ca01706296a944

  • C:\Program Files\Electronic Team\USB Network Gate\drv\NT6x64\fusbhub.sys

    Filesize

    130KB

    MD5

    f723872b5737b538954376c278bf5cf2

    SHA1

    fb80b43a5d06925485b50df2f60b62ab24345762

    SHA256

    69d700a975483c9bd3d244d33311c169e9ea46cac5eb8fc231d1d69c486efc25

    SHA512

    000f7f9f1c8efe64561d373fa2701d02d56eac20feecea70da64dfc00010f2edfe068d23c426dc6d5b9aaaed05dcf87fb013c991a8966610be424be79a6e4090

  • C:\Program Files\Electronic Team\USB Network Gate\drv\NT6x64\setup_server_ung.exe

    Filesize

    312KB

    MD5

    ffe8f8eb99a1584bf6d73d2263a29ff4

    SHA1

    230c17ea6914382ba11b787c2700265e12b50d6f

    SHA256

    73076350c2d63471a117f8060bedb525559760a83c77bafcb4129ad3ae0e3ddd

    SHA512

    1a0b1830e9273e683f1ee64d2447496d059bee98269faaf4c1e8d1f1be6ec9116ba02328253584ef8c2b9530d84dca81aa1791d50a65e106fd85b014c5aa69b7

  • C:\Program Files\Electronic Team\USB Network Gate\drv\NT6x64\setup_server_ung.exe

    Filesize

    312KB

    MD5

    ffe8f8eb99a1584bf6d73d2263a29ff4

    SHA1

    230c17ea6914382ba11b787c2700265e12b50d6f

    SHA256

    73076350c2d63471a117f8060bedb525559760a83c77bafcb4129ad3ae0e3ddd

    SHA512

    1a0b1830e9273e683f1ee64d2447496d059bee98269faaf4c1e8d1f1be6ec9116ba02328253584ef8c2b9530d84dca81aa1791d50a65e106fd85b014c5aa69b7

  • C:\Program Files\Electronic Team\USB Network Gate\drv\NT6x64\vuh.inf

    Filesize

    2KB

    MD5

    de25c0a813ea6f9f525e9335d6712cc7

    SHA1

    9e3a6a9cdab4dd4b396f8022e1c12b8533aa0a93

    SHA256

    78566f6dcda850de765fca0805978a19669f72e03fbba108995c6240f82e2e74

    SHA512

    ecd0d8cefc8238dc116e41be4504b575c620ed22abfdd1baf5370fbb5b743b30d561221c862c7ce0fddf5ad0c5f50095825915c2e53f49d614e9eefd09af4c00

  • C:\Program Files\Electronic Team\USB Network Gate\unins000.exe

    Filesize

    1.1MB

    MD5

    c46c06a8125c2278d0c56ca7d6c1eafb

    SHA1

    3f0013fc90d848ed843e5cae794bd6c2b57ca579

    SHA256

    75988fd80ab99f677db171d1db74292c4838838d3c6e535cd3831bbfd71711ea

    SHA512

    8f9c32227108a02abd911e7a875b13882954e50960abd280b43d5187f45e0c02cc8ef15d809f3d30d604fbe77a2b49719ba512e74b7b35aea4b3a8ecfd3e19cc

  • C:\Users\Admin\AppData\Local\Temp\is-3JEIG.tmp\usb_network_gate.tmp

    Filesize

    1.1MB

    MD5

    c46c06a8125c2278d0c56ca7d6c1eafb

    SHA1

    3f0013fc90d848ed843e5cae794bd6c2b57ca579

    SHA256

    75988fd80ab99f677db171d1db74292c4838838d3c6e535cd3831bbfd71711ea

    SHA512

    8f9c32227108a02abd911e7a875b13882954e50960abd280b43d5187f45e0c02cc8ef15d809f3d30d604fbe77a2b49719ba512e74b7b35aea4b3a8ecfd3e19cc

  • C:\Users\Admin\AppData\Local\Temp\is-3JEIG.tmp\usb_network_gate.tmp

    Filesize

    1.1MB

    MD5

    c46c06a8125c2278d0c56ca7d6c1eafb

    SHA1

    3f0013fc90d848ed843e5cae794bd6c2b57ca579

    SHA256

    75988fd80ab99f677db171d1db74292c4838838d3c6e535cd3831bbfd71711ea

    SHA512

    8f9c32227108a02abd911e7a875b13882954e50960abd280b43d5187f45e0c02cc8ef15d809f3d30d604fbe77a2b49719ba512e74b7b35aea4b3a8ecfd3e19cc

  • C:\Users\Admin\AppData\Local\Temp\is-T3VNE.tmp\_isetup\_setup64.tmp

    Filesize

    6KB

    MD5

    e4211d6d009757c078a9fac7ff4f03d4

    SHA1

    019cd56ba687d39d12d4b13991c9a42ea6ba03da

    SHA256

    388a796580234efc95f3b1c70ad4cb44bfddc7ba0f9203bf4902b9929b136f95

    SHA512

    17257f15d843e88bb78adcfb48184b8ce22109cc2c99e709432728a392afae7b808ed32289ba397207172de990a354f15c2459b6797317da8ea18b040c85787e

  • C:\Users\Admin\AppData\Local\Temp\{057F2~1\UsbOverTcp.cat

    Filesize

    9KB

    MD5

    c8256436ce819a44b623c6a2d187ed4b

    SHA1

    03485e4f158bba63e10f323238656a8fd5f312e5

    SHA256

    ff42009f192bd6ec5e16a7cfd2366f39d3d337391d78aa5e41403375a957639c

    SHA512

    f6d01e074a2da87604d1106234c8db26070b261ac2ba6000990bbae0da1e123733ad04e072090c4f3cd439859cc8bbf0ed2ab426e242f9677a92746a63c9cba2

  • C:\Users\Admin\AppData\Local\Temp\{057F2~1\vuhub.sys

    Filesize

    159KB

    MD5

    9a8afb19060e40ec547753451897b60e

    SHA1

    8895f1c7037771b60f08331ec2575ea249131b08

    SHA256

    33f78c7a432d68501fe0844632c4d86d5316385fc3682b5bfbce52ac43b94407

    SHA512

    303f83adaee2ae3cc72c269f073ec34e90e7cd12bc0226a1736e563a86e0c78df5831e5cf1092947aba4fc0a8ac4d6989aac43d33b1b5d6bbb272895a8a05cd5

  • C:\Users\Admin\AppData\Local\Temp\{057f2a9c-7bce-ab45-b458-eaa1edbce8a3}\vuh.inf

    Filesize

    2KB

    MD5

    de25c0a813ea6f9f525e9335d6712cc7

    SHA1

    9e3a6a9cdab4dd4b396f8022e1c12b8533aa0a93

    SHA256

    78566f6dcda850de765fca0805978a19669f72e03fbba108995c6240f82e2e74

    SHA512

    ecd0d8cefc8238dc116e41be4504b575c620ed22abfdd1baf5370fbb5b743b30d561221c862c7ce0fddf5ad0c5f50095825915c2e53f49d614e9eefd09af4c00

  • C:\Users\Admin\AppData\Local\Temp\{057f2a9c-7bce-ab45-b458-eaa1edbce8a3}\vuh.inf

    Filesize

    2KB

    MD5

    de25c0a813ea6f9f525e9335d6712cc7

    SHA1

    9e3a6a9cdab4dd4b396f8022e1c12b8533aa0a93

    SHA256

    78566f6dcda850de765fca0805978a19669f72e03fbba108995c6240f82e2e74

    SHA512

    ecd0d8cefc8238dc116e41be4504b575c620ed22abfdd1baf5370fbb5b743b30d561221c862c7ce0fddf5ad0c5f50095825915c2e53f49d614e9eefd09af4c00

  • C:\Users\Admin\AppData\Local\Temp\{057f2a9c-7bce-ab45-b458-eaa1edbce8a3}\vuhub.sys

    Filesize

    159KB

    MD5

    9a8afb19060e40ec547753451897b60e

    SHA1

    8895f1c7037771b60f08331ec2575ea249131b08

    SHA256

    33f78c7a432d68501fe0844632c4d86d5316385fc3682b5bfbce52ac43b94407

    SHA512

    303f83adaee2ae3cc72c269f073ec34e90e7cd12bc0226a1736e563a86e0c78df5831e5cf1092947aba4fc0a8ac4d6989aac43d33b1b5d6bbb272895a8a05cd5

  • C:\Users\Admin\AppData\Local\Temp\{DA9DD~1\UsbOverTcp.cat

    Filesize

    9KB

    MD5

    c8256436ce819a44b623c6a2d187ed4b

    SHA1

    03485e4f158bba63e10f323238656a8fd5f312e5

    SHA256

    ff42009f192bd6ec5e16a7cfd2366f39d3d337391d78aa5e41403375a957639c

    SHA512

    f6d01e074a2da87604d1106234c8db26070b261ac2ba6000990bbae0da1e123733ad04e072090c4f3cd439859cc8bbf0ed2ab426e242f9677a92746a63c9cba2

  • C:\Users\Admin\AppData\Local\Temp\{DA9DD~1\eusbstub.sys

    Filesize

    41KB

    MD5

    874b6d8979802b45f765413c11668fea

    SHA1

    746b398773759bf97dfdd3437659df15b4b29fa2

    SHA256

    26e6d9fd4fda86ffc995f0f944101f890a86a6b23b546b8a069af6c230f82fe3

    SHA512

    64ff94f929b65489ae74627fcfe84311dc21c0fd2651fdb3e658db8651d4a8033a5f166e790b42d0e0550ad530a17a709f7c73e17fcd2c320e05476fd204b0fe

  • C:\Users\Admin\AppData\Local\Temp\{da9dd65c-087b-c04a-980a-c4359f997bf6}\UsbOverTcp.cat

    Filesize

    9KB

    MD5

    c8256436ce819a44b623c6a2d187ed4b

    SHA1

    03485e4f158bba63e10f323238656a8fd5f312e5

    SHA256

    ff42009f192bd6ec5e16a7cfd2366f39d3d337391d78aa5e41403375a957639c

    SHA512

    f6d01e074a2da87604d1106234c8db26070b261ac2ba6000990bbae0da1e123733ad04e072090c4f3cd439859cc8bbf0ed2ab426e242f9677a92746a63c9cba2

  • C:\Users\Admin\AppData\Local\Temp\{da9dd65c-087b-c04a-980a-c4359f997bf6}\UsbStub.inf

    Filesize

    1KB

    MD5

    c8ad4ce198d0e7150e97ac3574b28b7a

    SHA1

    6125a164683230545b698202c85c6d30126729a2

    SHA256

    db159d6322c121ad4e398640b85ce51a7d502a66231c6569f6955a55252d49de

    SHA512

    6d5c3409d7e604e9204de2d2982447f0877e361ed944d6b836b195ce9d25440e8192886647e413683b9f7875c0fc595ce13464d8c013e70c54ca01706296a944

  • C:\Users\Admin\AppData\Local\Temp\{da9dd65c-087b-c04a-980a-c4359f997bf6}\UsbStub.inf

    Filesize

    1KB

    MD5

    c8ad4ce198d0e7150e97ac3574b28b7a

    SHA1

    6125a164683230545b698202c85c6d30126729a2

    SHA256

    db159d6322c121ad4e398640b85ce51a7d502a66231c6569f6955a55252d49de

    SHA512

    6d5c3409d7e604e9204de2d2982447f0877e361ed944d6b836b195ce9d25440e8192886647e413683b9f7875c0fc595ce13464d8c013e70c54ca01706296a944

  • C:\Users\Admin\AppData\Local\Temp\{da9dd65c-087b-c04a-980a-c4359f997bf6}\eusbstub.sys

    Filesize

    41KB

    MD5

    874b6d8979802b45f765413c11668fea

    SHA1

    746b398773759bf97dfdd3437659df15b4b29fa2

    SHA256

    26e6d9fd4fda86ffc995f0f944101f890a86a6b23b546b8a069af6c230f82fe3

    SHA512

    64ff94f929b65489ae74627fcfe84311dc21c0fd2651fdb3e658db8651d4a8033a5f166e790b42d0e0550ad530a17a709f7c73e17fcd2c320e05476fd204b0fe

  • C:\Windows\INF\oem3.PNF

    Filesize

    7KB

    MD5

    685bdb752aed15cb9c896141b10a925b

    SHA1

    07da6a8b5a76b71897aee8dac9408da1ff57228a

    SHA256

    a5bc30768177bac1e6229db8d5a7cf0051a88cc64dfb37cf982a38574a1f88a5

    SHA512

    40d832f729d71c5521e29af33864ed460e0439e23a57c2a809d66669c2e724fe336332b49d7e6c6b1388f6d23971f1958c5c393b4771008ee870a805e78ebac0

  • C:\Windows\INF\oem3.inf

    Filesize

    1KB

    MD5

    c8ad4ce198d0e7150e97ac3574b28b7a

    SHA1

    6125a164683230545b698202c85c6d30126729a2

    SHA256

    db159d6322c121ad4e398640b85ce51a7d502a66231c6569f6955a55252d49de

    SHA512

    6d5c3409d7e604e9204de2d2982447f0877e361ed944d6b836b195ce9d25440e8192886647e413683b9f7875c0fc595ce13464d8c013e70c54ca01706296a944

  • C:\Windows\INF\oem4.PNF

    Filesize

    6KB

    MD5

    d83b4c83a4d51ab2960047fec5d3bca8

    SHA1

    c8502747b92a07881fad7a269a7b9c3064a76e3b

    SHA256

    3e5331dd7455436aced4f89dd480f2ecd21295c8d7fe2af9aa4f950349f67b34

    SHA512

    d9eb1241f2555c36c6f8233447623343c5c9701826592de77c277c530bfe07ac427479a5e4b0d953ebfddd33b2bbca4b0153e42bd12effb1645c39dcec88ee29

  • C:\Windows\INF\oem4.inf

    Filesize

    2KB

    MD5

    de25c0a813ea6f9f525e9335d6712cc7

    SHA1

    9e3a6a9cdab4dd4b396f8022e1c12b8533aa0a93

    SHA256

    78566f6dcda850de765fca0805978a19669f72e03fbba108995c6240f82e2e74

    SHA512

    ecd0d8cefc8238dc116e41be4504b575c620ed22abfdd1baf5370fbb5b743b30d561221c862c7ce0fddf5ad0c5f50095825915c2e53f49d614e9eefd09af4c00

  • C:\Windows\System32\CatRoot2\dberr.txt

    Filesize

    181KB

    MD5

    fa14602aab94507aeba39a4d9f4cdb50

    SHA1

    f0fd33d0b5bc9c8db34274dbe1b75bf790507648

    SHA256

    6df2b7375bc90999fae28ac0a85036f63ce1aa57721abbda3f4aeaf131d9338a

    SHA512

    bf9607427db5b230e39076764a607a23a74220ccea40a2afe5c3148d5319cb146fa11d9e3453e1a70e27cae00d3ddf5aae523cc8e80e182ac4c890b739942230

  • C:\Windows\System32\DRIVER~1\FILERE~1\USBSTU~1.INF\eusbstub.sys

    Filesize

    41KB

    MD5

    874b6d8979802b45f765413c11668fea

    SHA1

    746b398773759bf97dfdd3437659df15b4b29fa2

    SHA256

    26e6d9fd4fda86ffc995f0f944101f890a86a6b23b546b8a069af6c230f82fe3

    SHA512

    64ff94f929b65489ae74627fcfe84311dc21c0fd2651fdb3e658db8651d4a8033a5f166e790b42d0e0550ad530a17a709f7c73e17fcd2c320e05476fd204b0fe

  • C:\Windows\System32\DRIVER~1\FILERE~1\VUH~1.INF\vuhub.sys

    Filesize

    159KB

    MD5

    9a8afb19060e40ec547753451897b60e

    SHA1

    8895f1c7037771b60f08331ec2575ea249131b08

    SHA256

    33f78c7a432d68501fe0844632c4d86d5316385fc3682b5bfbce52ac43b94407

    SHA512

    303f83adaee2ae3cc72c269f073ec34e90e7cd12bc0226a1736e563a86e0c78df5831e5cf1092947aba4fc0a8ac4d6989aac43d33b1b5d6bbb272895a8a05cd5

  • C:\Windows\System32\DriverStore\FileRepository\usbstub.inf_amd64_82db46f9cc12edde\UsbOverTcp.cat

    Filesize

    9KB

    MD5

    c8256436ce819a44b623c6a2d187ed4b

    SHA1

    03485e4f158bba63e10f323238656a8fd5f312e5

    SHA256

    ff42009f192bd6ec5e16a7cfd2366f39d3d337391d78aa5e41403375a957639c

    SHA512

    f6d01e074a2da87604d1106234c8db26070b261ac2ba6000990bbae0da1e123733ad04e072090c4f3cd439859cc8bbf0ed2ab426e242f9677a92746a63c9cba2

  • C:\Windows\System32\DriverStore\FileRepository\usbstub.inf_amd64_82db46f9cc12edde\usbstub.PNF

    Filesize

    7KB

    MD5

    67759d1773e374d47aea2ed8eeec6a0b

    SHA1

    4e00d930757817008ac14154c5964e4f0d3e7110

    SHA256

    26a8187716800ae1a398914410640152a9279daf0fa5b383d9259cb4c9c7603f

    SHA512

    38e594e164de65a184a6882b6051e868f99dec81f33c3e15a68264666d2c1c3d2e1a2bd9eb38ccd8475d0901fa13c5b325ed3da4f5e8984529bff2c2d4b598dc

  • C:\Windows\System32\DriverStore\FileRepository\usbstub.inf_amd64_82db46f9cc12edde\usbstub.inf

    Filesize

    1KB

    MD5

    c8ad4ce198d0e7150e97ac3574b28b7a

    SHA1

    6125a164683230545b698202c85c6d30126729a2

    SHA256

    db159d6322c121ad4e398640b85ce51a7d502a66231c6569f6955a55252d49de

    SHA512

    6d5c3409d7e604e9204de2d2982447f0877e361ed944d6b836b195ce9d25440e8192886647e413683b9f7875c0fc595ce13464d8c013e70c54ca01706296a944

  • C:\Windows\System32\DriverStore\FileRepository\vuh.inf_amd64_0061267cbdc02808\UsbOverTcp.cat

    Filesize

    9KB

    MD5

    c8256436ce819a44b623c6a2d187ed4b

    SHA1

    03485e4f158bba63e10f323238656a8fd5f312e5

    SHA256

    ff42009f192bd6ec5e16a7cfd2366f39d3d337391d78aa5e41403375a957639c

    SHA512

    f6d01e074a2da87604d1106234c8db26070b261ac2ba6000990bbae0da1e123733ad04e072090c4f3cd439859cc8bbf0ed2ab426e242f9677a92746a63c9cba2

  • C:\Windows\System32\DriverStore\FileRepository\vuh.inf_amd64_0061267cbdc02808\vuh.inf

    Filesize

    2KB

    MD5

    de25c0a813ea6f9f525e9335d6712cc7

    SHA1

    9e3a6a9cdab4dd4b396f8022e1c12b8533aa0a93

    SHA256

    78566f6dcda850de765fca0805978a19669f72e03fbba108995c6240f82e2e74

    SHA512

    ecd0d8cefc8238dc116e41be4504b575c620ed22abfdd1baf5370fbb5b743b30d561221c862c7ce0fddf5ad0c5f50095825915c2e53f49d614e9eefd09af4c00

  • C:\Windows\system32\DRIVERS\eusbstub.sys

    Filesize

    41KB

    MD5

    874b6d8979802b45f765413c11668fea

    SHA1

    746b398773759bf97dfdd3437659df15b4b29fa2

    SHA256

    26e6d9fd4fda86ffc995f0f944101f890a86a6b23b546b8a069af6c230f82fe3

    SHA512

    64ff94f929b65489ae74627fcfe84311dc21c0fd2651fdb3e658db8651d4a8033a5f166e790b42d0e0550ad530a17a709f7c73e17fcd2c320e05476fd204b0fe

  • \??\c:\PROGRA~1\ELECTR~1\USBNET~1\drv\nt6x64\vuhub.sys

    Filesize

    159KB

    MD5

    9a8afb19060e40ec547753451897b60e

    SHA1

    8895f1c7037771b60f08331ec2575ea249131b08

    SHA256

    33f78c7a432d68501fe0844632c4d86d5316385fc3682b5bfbce52ac43b94407

    SHA512

    303f83adaee2ae3cc72c269f073ec34e90e7cd12bc0226a1736e563a86e0c78df5831e5cf1092947aba4fc0a8ac4d6989aac43d33b1b5d6bbb272895a8a05cd5

  • \Program Files\Electronic Team\USB Network Gate\appstatico64.dll

    Filesize

    874KB

    MD5

    80951a7cda153b71980e4a47c95b3f79

    SHA1

    5b1ff54ec99432bd989749f674dec5780232446a

    SHA256

    62b298c4516266e911042af367d7f5207ad61bc1317e03049449cdfad10f24d8

    SHA512

    54d5ee2ca3a4a53c4750d73e1a0c5a691d69ad62aad14f438516bccd42a3b1893fe1d29302313561706c8b3b64a1fd73dbb686c7a44765d724e58a43302dcdc5

  • \Program Files\Electronic Team\USB Network Gate\appstatico64.dll

    Filesize

    874KB

    MD5

    80951a7cda153b71980e4a47c95b3f79

    SHA1

    5b1ff54ec99432bd989749f674dec5780232446a

    SHA256

    62b298c4516266e911042af367d7f5207ad61bc1317e03049449cdfad10f24d8

    SHA512

    54d5ee2ca3a4a53c4750d73e1a0c5a691d69ad62aad14f438516bccd42a3b1893fe1d29302313561706c8b3b64a1fd73dbb686c7a44765d724e58a43302dcdc5

  • \Users\Admin\AppData\Local\Temp\is-T3VNE.tmp\reset.dll

    Filesize

    75KB

    MD5

    1fb1431779318f095681607eaccc1c04

    SHA1

    ce91517ab44d02a97fbc933894065de8d5a4ac4a

    SHA256

    ef4465a8765b207bab591cb1bd2bb0402ce60a1f99c5391b1beb65936bc6869c

    SHA512

    05ed6ebb2ddcb71bdff7a9321f62df91e2fb63af18ec78390b2a1299f34a7cd8c7a86b728f88bf8662c41b3719f2e009dd20dff837cb65898e373067054aa44c

  • memory/2896-121-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2896-132-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2896-416-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4648-213-0x0000000000400000-0x000000000052D000-memory.dmp

    Filesize

    1.2MB

  • memory/4648-392-0x0000000000400000-0x000000000052D000-memory.dmp

    Filesize

    1.2MB

  • memory/4648-134-0x00000000006F0000-0x00000000006F1000-memory.dmp

    Filesize

    4KB

  • memory/4648-133-0x0000000000400000-0x000000000052D000-memory.dmp

    Filesize

    1.2MB

  • memory/4648-126-0x00000000006F0000-0x00000000006F1000-memory.dmp

    Filesize

    4KB

  • memory/4648-415-0x0000000000400000-0x000000000052D000-memory.dmp

    Filesize

    1.2MB