Analysis

  • max time kernel
    141s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2023, 16:50

General

  • Target

    DroidJoy_Setup_x64_2.1.0.exe

  • Size

    5.7MB

  • MD5

    a697a9e770a8df117bee81b94f75376f

  • SHA1

    4e40e9984fd8a38112a83ef9b7e2982970dd75bb

  • SHA256

    af7958e4d88f2a8efc868d059d56dd485f17e44b5c172b7d9d49a421d442db2e

  • SHA512

    82738024cec6c17d4a4030205af7639ed4e257bc5bc7584ede13b496d066ccc44885eb83ae90fef408e472070cd184896af64b917e93a4406373ae5fcce68543

  • SSDEEP

    98304:oYMAdmQb4pjqsmrhmdskCSy+wFtVR/sfcyt+iLuEjmADD0fYxSgIzkfCBiAY2nx:9MLQ458hmdskCSNwLWcxiUADvxnfEi+x

Malware Config

Signatures

  • Drops file in Drivers directory 4 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 24 IoCs
  • Drops file in Program Files directory 59 IoCs
  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 42 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DroidJoy_Setup_x64_2.1.0.exe
    "C:\Users\Admin\AppData\Local\Temp\DroidJoy_Setup_x64_2.1.0.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Users\Admin\AppData\Local\Temp\is-52AR4.tmp\DroidJoy_Setup_x64_2.1.0.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-52AR4.tmp\DroidJoy_Setup_x64_2.1.0.tmp" /SL5="$70208,5588180,401920,C:\Users\Admin\AppData\Local\Temp\DroidJoy_Setup_x64_2.1.0.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2236
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /C devcon.exe remove Root\ScpVBus
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2168
        • C:\Program Files\DroidJoy Server\devcon.exe
          devcon.exe remove Root\ScpVBus
          4⤵
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          PID:4160
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /C devcon.exe install ScpVBus.inf Root\ScpVBus
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2984
        • C:\Program Files\DroidJoy Server\devcon.exe
          devcon.exe install ScpVBus.inf Root\ScpVBus
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Checks SCSI registry key(s)
          • Modifies system certificate store
          • Suspicious use of AdjustPrivilegeToken
          PID:2764
      • C:\Program Files\DroidJoy Server\DroidJoyServer.exe
        "C:\Program Files\DroidJoy Server\DroidJoyServer.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system certificate store
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:1496
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3476
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{815d886a-ded3-114c-a7e6-7e86c3a00e69}\scpvbus.inf" "9" "4b5cfab93" "0000000000000150" "WinSta0\Default" "000000000000015C" "208" "c:\program files\droidjoy server"
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:3680
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{a0b5e5f7-3e9c-2748-9fec-e047dbcc1644} Global\{38913358-964a-904e-8565-146f715f65d7} C:\Windows\System32\DriverStore\Temp\{05e1c5d5-5c6b-8a47-abb6-ddc9cbb4bd60}\scpvbus.inf C:\Windows\System32\DriverStore\Temp\{05e1c5d5-5c6b-8a47-abb6-ddc9cbb4bd60}\ScpVBus.cat
        3⤵
          PID:4068
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "2" "211" "ROOT\SYSTEM\0001" "C:\Windows\INF\oem3.inf" "oem3.inf:c14ce88487555a35:ScpVBus_Device:9.11.9.337:root\scpvbus," "4b5cfab93" "0000000000000150"
        2⤵
        • Drops file in Drivers directory
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:5100
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "1" "0" "USB\VID_045E&PID_028E\0000001" "" "" "4c8dd300b" "0000000000000000"
        2⤵
        • Drops file in Drivers directory
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        PID:1376
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x34c 0x4b4
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3788
    • C:\Windows\system32\DsmUserTask.Exe
      DsmUserTask.Exe N{CD5234F2-19A2-11EE-84C0-EE28015B3527}
      1⤵
        PID:3488
      • C:\Windows\system32\DsmUserTask.Exe
        DsmUserTask.Exe C{CD5234F2-19A2-11EE-84C0-EE28015B3527}
        1⤵
          PID:4212

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files\DroidJoy Server\DroidJoyServer.exe

          Filesize

          1.1MB

          MD5

          4bcde3fd8d4eec23240daef902b3d6d9

          SHA1

          bcc163e262dc4345e74c785fa76cd36966aed536

          SHA256

          475d8e051c9a98accda3429307f76afdb169eba5fba8915322a9f5df184a0983

          SHA512

          ef5c00c28ef59f28ccd69cb48f49d573b1fa8acb2133ce447b2fccc258e0dc763f43a7a44bace744623579609a09b40f2e4457630e2373a4314fd125573dcf25

        • C:\Program Files\DroidJoy Server\DroidJoyServer.exe

          Filesize

          1.1MB

          MD5

          4bcde3fd8d4eec23240daef902b3d6d9

          SHA1

          bcc163e262dc4345e74c785fa76cd36966aed536

          SHA256

          475d8e051c9a98accda3429307f76afdb169eba5fba8915322a9f5df184a0983

          SHA512

          ef5c00c28ef59f28ccd69cb48f49d573b1fa8acb2133ce447b2fccc258e0dc763f43a7a44bace744623579609a09b40f2e4457630e2373a4314fd125573dcf25

        • C:\Program Files\DroidJoy Server\DroidJoyServer.exe

          Filesize

          1.1MB

          MD5

          4bcde3fd8d4eec23240daef902b3d6d9

          SHA1

          bcc163e262dc4345e74c785fa76cd36966aed536

          SHA256

          475d8e051c9a98accda3429307f76afdb169eba5fba8915322a9f5df184a0983

          SHA512

          ef5c00c28ef59f28ccd69cb48f49d573b1fa8acb2133ce447b2fccc258e0dc763f43a7a44bace744623579609a09b40f2e4457630e2373a4314fd125573dcf25

        • C:\Program Files\DroidJoy Server\DroidJoyServer.exe.config

          Filesize

          1KB

          MD5

          b708059b94ee4bbfd81151459a5e54f5

          SHA1

          94289230894b98f39f8f0fab16633c26c02502de

          SHA256

          b73bfbd62f900eef76ee36b0f078d4438affe3c3db193a8f37b112c9b58519f5

          SHA512

          486e67efa59d5d73fbaaa7835aa6e6972bfb083291dc179ac0a9eaefebd19b05c29d7a5e932f3e76ad3e46c6b528980504daae54cbd2799a8866ba5a268e78fe

        • C:\Program Files\DroidJoy Server\FontAwesome.WPF.dll

          Filesize

          204KB

          MD5

          2ace85429eee9e8320c82d878e5562b4

          SHA1

          77ed8b89210930d1de2495ba363519b696d0b6e2

          SHA256

          63d50dbe094bbce5d7bf8af08c0d919cfa5e057ca05ae7b27704a8477c8b348f

          SHA512

          7ce3467d1469acdb544f4f42864d94c5ae0ada252c5f096329e16d4b571fc1800bd572e52cfe902ee5d4b91d59a1a4182b07f40b7a4dfe54e338ca46684af989

        • C:\Program Files\DroidJoy Server\GalaSoft.MvvmLight.Extras.dll

          Filesize

          21KB

          MD5

          43312122af66a3e99cf2f9c597012c22

          SHA1

          634d4c39a874eddd4a733c4548c37ffb0d2f467b

          SHA256

          8e248e95e6dc65317af9caaf6a43091d5cb75fd1302bae0a49dea821fa21dc8e

          SHA512

          2a73b9df94f219a2b8ddf54a7d1b176bb79fbae346ac8b30e3df82cb8c604c681960fd8208d68d30ca66ce4de9f9963b789d3105402d899fd930a4831bee2ee3

        • C:\Program Files\DroidJoy Server\GalaSoft.MvvmLight.dll

          Filesize

          28KB

          MD5

          b349a5c9165cbb8663f82c31f9402d35

          SHA1

          e8b38649c05408da796e2dc21e699ca8352a059f

          SHA256

          60ffbd8a891acbe1adbe79d320806a32ae826575f5218a51379ffc83f03f62a7

          SHA512

          377c0c88f0febf3dbb4786ce823aa2cf2b85f55a654d9f3d10a44480a9f9b726a08bb2c03b190473f4f461824ecdcf0feb9af098d4840952a2accbc197e89e6e

        • C:\Program Files\DroidJoy Server\GamepadSettings.xml

          Filesize

          6KB

          MD5

          af10ed580fdabe84ad13d9f2ac0a964c

          SHA1

          ebcfd2108988c8f5efd1076a3bc10ec1c6461a13

          SHA256

          475c23ba93540aa1f621e61a4bcd8781fe0ff730538701405520a91a653d30e5

          SHA512

          db2c68430bdb92602c5e7959e253092eba19e60086d52cebf303690dca8e07756d6a521fddfa2484b36f0945636aec8c29d08fefbc8503858813e905e571840c

        • C:\Program Files\DroidJoy Server\Hardcodet.Wpf.TaskbarNotification.dll

          Filesize

          44KB

          MD5

          6f8d41be2ab322e1f13f4d5dc2207e0c

          SHA1

          474ceae7deea206dc66d0a2324d0c32323124cb6

          SHA256

          5d91629e82f4f0eee5832f0a21cf46b4f29eca5bffad29268e8209e917af4d07

          SHA512

          29afa65cd4b943cff011ea3cab88db45a4a89aeed1b3c6e878a2816188cbd81eee723bc25737c43429a8f6414e1f090258f86f3f60a062b8ce7b3b1cdd695799

        • C:\Program Files\DroidJoy Server\InTheHand.Net.Personal.dll

          Filesize

          421KB

          MD5

          c2a77547f66f8aff1a0b436f4ec0846b

          SHA1

          7741ac9c5af73e4d135b9fae06031784e4ece495

          SHA256

          e06795b4337771504bfa6a3b5d7cb8307bba00c7baa2b061d4cd224207e0d3ba

          SHA512

          69ba135beffeeb159064f84c408ef10a89be4eb1eda97be23e95d7edbc9c1bdacdd98a0f7e9ad80a8495bd7f7c165e1e2b054e757d0bf9b5b67147827494e71b

        • C:\Program Files\DroidJoy Server\Microsoft.Practices.ServiceLocation.dll

          Filesize

          17KB

          MD5

          92a533be83b7fa43a1b18f009a7d450b

          SHA1

          e9ac62ebb0643bffb243d889c535a8abcd1ba52a

          SHA256

          34005d6a80434542780c6d192e6abd07bea49b2eeb7e43fbfdfe90c2889986e5

          SHA512

          b7ae35d9ab96c51b50998b46b8e73ba61bfc01812853c870872a18a3aa986db8a66d3b8e173e1d7dd58097c07b07afb64e5297b4b894b8fa1bf565773856a491

        • C:\Program Files\DroidJoy Server\NLog.dll

          Filesize

          590KB

          MD5

          f777533e9c54a5b5aeefd8353659fbfc

          SHA1

          2a0d9aff4a0b3a8e13ad0e3f3d659194e9d3bc72

          SHA256

          7164dae2b677907dd9f9ef37147bc2571d0a954a5c5a00f047c7f5c1c1b99de8

          SHA512

          85ce75b14b585bd8b37aedab6b0b3fe01c56b1de4ee0b507fe8fff7292c76ecfd8bd7519b6d6e98aa549f3394c628caf5b98ed78d4eccb4f1b5f0fc094fc4c4c

        • C:\Program Files\DroidJoy Server\ScpVBus.inf

          Filesize

          2KB

          MD5

          d37a243b454157f12044ace6bb4254b5

          SHA1

          1efb193e444107b52d28d79c041f5b51a694905e

          SHA256

          fe787cf8886bf543c3d95dad461667c166847e8b9f7597c54f6632a5267f3ced

          SHA512

          6131fab07731e5564e8567cbcdcac6f285040ac0c3ddb9ce7fe210c50bdd7179700d24b429492887d1f0f7552a67822eca71b39bddef1463370e5af7c4da7343

        • C:\Program Files\DroidJoy Server\devcon.exe

          Filesize

          80KB

          MD5

          7920632d06bda4f19f4815232796fd24

          SHA1

          0dbc86019e7b49eab75e70e3be07e6e78a41d3dd

          SHA256

          f4225d077a71787e8b98ed2e649aae8af1ae5c92e82414b59f71c9dd1784e729

          SHA512

          09eefce4be893c756b18a3044ee1b7a4207f9235e1be765e2f598e10ad962d18c6588bf3a44bb0d629f4c92f84b076da33292a2faa334a5380dee867a37fdf91

        • C:\Program Files\DroidJoy Server\devcon.exe

          Filesize

          80KB

          MD5

          7920632d06bda4f19f4815232796fd24

          SHA1

          0dbc86019e7b49eab75e70e3be07e6e78a41d3dd

          SHA256

          f4225d077a71787e8b98ed2e649aae8af1ae5c92e82414b59f71c9dd1784e729

          SHA512

          09eefce4be893c756b18a3044ee1b7a4207f9235e1be765e2f598e10ad962d18c6588bf3a44bb0d629f4c92f84b076da33292a2faa334a5380dee867a37fdf91

        • C:\Program Files\DroidJoy Server\vGenInterface.dll

          Filesize

          376KB

          MD5

          daba16b3eba5ecc4dea5c6321bbb8c5f

          SHA1

          11c51b70b2644a72b6449165b7364af828af9236

          SHA256

          e870455286ed0f065706102bff5bed15fb524b221566276d8a457e66f05eaf08

          SHA512

          f01fa3cfcf4ffbf970bc7d558a0796e88fe8e643a856d02b69999f56417b9ca6e87ee7041d3c9208542afb333dc6d60c636f483d677ae3902294876a4efa3ed5

        • C:\Program Files\DroidJoy Server\vGenInterface.dll

          Filesize

          376KB

          MD5

          daba16b3eba5ecc4dea5c6321bbb8c5f

          SHA1

          11c51b70b2644a72b6449165b7364af828af9236

          SHA256

          e870455286ed0f065706102bff5bed15fb524b221566276d8a457e66f05eaf08

          SHA512

          f01fa3cfcf4ffbf970bc7d558a0796e88fe8e643a856d02b69999f56417b9ca6e87ee7041d3c9208542afb333dc6d60c636f483d677ae3902294876a4efa3ed5

        • C:\Program Files\DroidJoy Server\vGenInterfaceWrap.dll

          Filesize

          16KB

          MD5

          d3538730c177827c5fbed546b44d14b9

          SHA1

          56c26e2c4470dc8014e47828fda3025b415d5a5b

          SHA256

          53e07115e6550cc0479e0a8075cc22602c97e064a4937262bafc73a194d034ef

          SHA512

          a10917afb7b97ced1be4f540909800e1432d997b33774a7d19d3deac9607d17901ea1c9bad41b09d4e94cbd7ffedfa7292b1f37d7112ef977c5507b0b43e623e

        • C:\Program Files\DroidJoy Server\vGenInterfaceWrap.dll

          Filesize

          16KB

          MD5

          d3538730c177827c5fbed546b44d14b9

          SHA1

          56c26e2c4470dc8014e47828fda3025b415d5a5b

          SHA256

          53e07115e6550cc0479e0a8075cc22602c97e064a4937262bafc73a194d034ef

          SHA512

          a10917afb7b97ced1be4f540909800e1432d997b33774a7d19d3deac9607d17901ea1c9bad41b09d4e94cbd7ffedfa7292b1f37d7112ef977c5507b0b43e623e

        • C:\Program Files\DroidJoy Server\vGenInterfaceWrap.dll

          Filesize

          16KB

          MD5

          d3538730c177827c5fbed546b44d14b9

          SHA1

          56c26e2c4470dc8014e47828fda3025b415d5a5b

          SHA256

          53e07115e6550cc0479e0a8075cc22602c97e064a4937262bafc73a194d034ef

          SHA512

          a10917afb7b97ced1be4f540909800e1432d997b33774a7d19d3deac9607d17901ea1c9bad41b09d4e94cbd7ffedfa7292b1f37d7112ef977c5507b0b43e623e

        • C:\Users\Admin\AppData\Local\Temp\is-52AR4.tmp\DroidJoy_Setup_x64_2.1.0.tmp

          Filesize

          1.0MB

          MD5

          062054a501f35e28de02dce408074414

          SHA1

          8dade414cb096b7162de5c2e8e826d24b2037fb3

          SHA256

          53bf279912e85dac5b45c120ba8ab78d36e606c1efbf610c8aba0b5a1ee3c587

          SHA512

          8a1d6153a762bed5aeecb750a6ddf34bd873e7a4881c7ef82b3f1b9daa6be32f707de5afaa935a9cb8923c16752cf63c7e1b2e69c5bd24345ddb3c3aacf8b135

        • C:\Users\Admin\AppData\Local\Temp\is-52AR4.tmp\DroidJoy_Setup_x64_2.1.0.tmp

          Filesize

          1.0MB

          MD5

          062054a501f35e28de02dce408074414

          SHA1

          8dade414cb096b7162de5c2e8e826d24b2037fb3

          SHA256

          53bf279912e85dac5b45c120ba8ab78d36e606c1efbf610c8aba0b5a1ee3c587

          SHA512

          8a1d6153a762bed5aeecb750a6ddf34bd873e7a4881c7ef82b3f1b9daa6be32f707de5afaa935a9cb8923c16752cf63c7e1b2e69c5bd24345ddb3c3aacf8b135

        • C:\Users\Admin\AppData\Local\Temp\is-S0NOV.tmp\isxdl.dll

          Filesize

          121KB

          MD5

          48ad1a1c893ce7bf456277a0a085ed01

          SHA1

          803997ef17eedf50969115c529a2bf8de585dc91

          SHA256

          b0cc4697b2fd1b4163fddca2050fc62a9e7d221864f1bd11e739144c90b685b3

          SHA512

          7c9e7fe9f00c62cccb5921cb55ba0dd96a0077ad52962473c1e79cda1fd9aa101129637043955703121443e1f8b6b2860cd4dfdb71052b20a322e05deed101a4

        • C:\Users\Admin\AppData\Local\Temp\{815D8~1\ScpVBus.cat

          Filesize

          8KB

          MD5

          a9441e633384d4d00c9d6dfcf2a1ea1d

          SHA1

          7d738542aa8a00e2574ac976db7ed4d597269824

          SHA256

          1a9ae39960651cef16e7da048289ecb41830da35ce47fc00936c335cf2e86d4f

          SHA512

          8befcd340f1b24cccc85f26763287ad8f61f65e67549c3d84d131a773114439b81635a5f274689be3891c2e2e7e1356967de098a7d88361e7afde17187042c55

        • C:\Users\Admin\AppData\Local\Temp\{815D8~1\ScpVBus.sys

          Filesize

          43KB

          MD5

          dbf3d66a7eb9fcc3b9b744798d8836c9

          SHA1

          1da7f9fe60f175ffd5c5633e9010a87806153ab4

          SHA256

          b1b85035d7e5195a812f057542666c387aff5a324ba7a3a719b028c895a69833

          SHA512

          a16a64bbc420b539021d9d0871a3e07c4d6aa519b22d38dc11e61d8613fb86894e68ded00ab2ce4a889b8ee06724191815ee81ed3b2fcfb2b227fbec00451f3e

        • C:\Users\Admin\AppData\Local\Temp\{815D8~1\WdfCoInstaller01009.dll

          Filesize

          1.6MB

          MD5

          4da5da193e0e4f86f6f8fd43ef25329a

          SHA1

          68a44d37ff535a2c454f2440e1429833a1c6d810

          SHA256

          18487b4ff94edccc98ed59d9fca662d4a1331c5f1e14df8db3093256dd9f1c3e

          SHA512

          b3d73ed5e45d6f2908b2f3086390dd28c1631e298756cee9bdf26b185f0b77d1b8c03ad55e0495dba982c5bed4a03337b130c76f7112f3e19821127d2cf36853

        • C:\Users\Admin\AppData\Local\Temp\{815d886a-ded3-114c-a7e6-7e86c3a00e69}\SET17B9.tmp

          Filesize

          1.6MB

          MD5

          4da5da193e0e4f86f6f8fd43ef25329a

          SHA1

          68a44d37ff535a2c454f2440e1429833a1c6d810

          SHA256

          18487b4ff94edccc98ed59d9fca662d4a1331c5f1e14df8db3093256dd9f1c3e

          SHA512

          b3d73ed5e45d6f2908b2f3086390dd28c1631e298756cee9bdf26b185f0b77d1b8c03ad55e0495dba982c5bed4a03337b130c76f7112f3e19821127d2cf36853

        • C:\Users\Admin\AppData\Local\Temp\{815d886a-ded3-114c-a7e6-7e86c3a00e69}\ScpVBus.cat

          Filesize

          8KB

          MD5

          a9441e633384d4d00c9d6dfcf2a1ea1d

          SHA1

          7d738542aa8a00e2574ac976db7ed4d597269824

          SHA256

          1a9ae39960651cef16e7da048289ecb41830da35ce47fc00936c335cf2e86d4f

          SHA512

          8befcd340f1b24cccc85f26763287ad8f61f65e67549c3d84d131a773114439b81635a5f274689be3891c2e2e7e1356967de098a7d88361e7afde17187042c55

        • C:\Users\Admin\AppData\Local\Temp\{815d886a-ded3-114c-a7e6-7e86c3a00e69}\ScpVBus.sys

          Filesize

          43KB

          MD5

          dbf3d66a7eb9fcc3b9b744798d8836c9

          SHA1

          1da7f9fe60f175ffd5c5633e9010a87806153ab4

          SHA256

          b1b85035d7e5195a812f057542666c387aff5a324ba7a3a719b028c895a69833

          SHA512

          a16a64bbc420b539021d9d0871a3e07c4d6aa519b22d38dc11e61d8613fb86894e68ded00ab2ce4a889b8ee06724191815ee81ed3b2fcfb2b227fbec00451f3e

        • C:\Users\Admin\AppData\Local\Temp\{815d886a-ded3-114c-a7e6-7e86c3a00e69}\scpvbus.inf

          Filesize

          2KB

          MD5

          d37a243b454157f12044ace6bb4254b5

          SHA1

          1efb193e444107b52d28d79c041f5b51a694905e

          SHA256

          fe787cf8886bf543c3d95dad461667c166847e8b9f7597c54f6632a5267f3ced

          SHA512

          6131fab07731e5564e8567cbcdcac6f285040ac0c3ddb9ce7fe210c50bdd7179700d24b429492887d1f0f7552a67822eca71b39bddef1463370e5af7c4da7343

        • C:\Users\Admin\AppData\Local\Temp\{815d886a-ded3-114c-a7e6-7e86c3a00e69}\scpvbus.inf

          Filesize

          2KB

          MD5

          d37a243b454157f12044ace6bb4254b5

          SHA1

          1efb193e444107b52d28d79c041f5b51a694905e

          SHA256

          fe787cf8886bf543c3d95dad461667c166847e8b9f7597c54f6632a5267f3ced

          SHA512

          6131fab07731e5564e8567cbcdcac6f285040ac0c3ddb9ce7fe210c50bdd7179700d24b429492887d1f0f7552a67822eca71b39bddef1463370e5af7c4da7343

        • C:\Windows\INF\oem3.inf

          Filesize

          2KB

          MD5

          d37a243b454157f12044ace6bb4254b5

          SHA1

          1efb193e444107b52d28d79c041f5b51a694905e

          SHA256

          fe787cf8886bf543c3d95dad461667c166847e8b9f7597c54f6632a5267f3ced

          SHA512

          6131fab07731e5564e8567cbcdcac6f285040ac0c3ddb9ce7fe210c50bdd7179700d24b429492887d1f0f7552a67822eca71b39bddef1463370e5af7c4da7343

        • C:\Windows\System32\DriverStore\FileRepository\SCPVBU~1.INF\ScpVBus.sys

          Filesize

          43KB

          MD5

          dbf3d66a7eb9fcc3b9b744798d8836c9

          SHA1

          1da7f9fe60f175ffd5c5633e9010a87806153ab4

          SHA256

          b1b85035d7e5195a812f057542666c387aff5a324ba7a3a719b028c895a69833

          SHA512

          a16a64bbc420b539021d9d0871a3e07c4d6aa519b22d38dc11e61d8613fb86894e68ded00ab2ce4a889b8ee06724191815ee81ed3b2fcfb2b227fbec00451f3e

        • C:\Windows\System32\DriverStore\FileRepository\SCPVBU~1.INF\WdfCoInstaller01009.dll

          Filesize

          1.6MB

          MD5

          4da5da193e0e4f86f6f8fd43ef25329a

          SHA1

          68a44d37ff535a2c454f2440e1429833a1c6d810

          SHA256

          18487b4ff94edccc98ed59d9fca662d4a1331c5f1e14df8db3093256dd9f1c3e

          SHA512

          b3d73ed5e45d6f2908b2f3086390dd28c1631e298756cee9bdf26b185f0b77d1b8c03ad55e0495dba982c5bed4a03337b130c76f7112f3e19821127d2cf36853

        • C:\Windows\System32\DriverStore\Temp\{05e1c5d5-5c6b-8a47-abb6-ddc9cbb4bd60}\ScpVBus.cat

          Filesize

          8KB

          MD5

          a9441e633384d4d00c9d6dfcf2a1ea1d

          SHA1

          7d738542aa8a00e2574ac976db7ed4d597269824

          SHA256

          1a9ae39960651cef16e7da048289ecb41830da35ce47fc00936c335cf2e86d4f

          SHA512

          8befcd340f1b24cccc85f26763287ad8f61f65e67549c3d84d131a773114439b81635a5f274689be3891c2e2e7e1356967de098a7d88361e7afde17187042c55

        • C:\Windows\System32\DriverStore\Temp\{05e1c5d5-5c6b-8a47-abb6-ddc9cbb4bd60}\scpvbus.inf

          Filesize

          2KB

          MD5

          d37a243b454157f12044ace6bb4254b5

          SHA1

          1efb193e444107b52d28d79c041f5b51a694905e

          SHA256

          fe787cf8886bf543c3d95dad461667c166847e8b9f7597c54f6632a5267f3ced

          SHA512

          6131fab07731e5564e8567cbcdcac6f285040ac0c3ddb9ce7fe210c50bdd7179700d24b429492887d1f0f7552a67822eca71b39bddef1463370e5af7c4da7343

        • \??\c:\PROGRA~1\DROIDJ~1\ScpVBus.sys

          Filesize

          43KB

          MD5

          dbf3d66a7eb9fcc3b9b744798d8836c9

          SHA1

          1da7f9fe60f175ffd5c5633e9010a87806153ab4

          SHA256

          b1b85035d7e5195a812f057542666c387aff5a324ba7a3a719b028c895a69833

          SHA512

          a16a64bbc420b539021d9d0871a3e07c4d6aa519b22d38dc11e61d8613fb86894e68ded00ab2ce4a889b8ee06724191815ee81ed3b2fcfb2b227fbec00451f3e

        • \??\c:\PROGRA~1\DROIDJ~1\WDFCOI~1.DLL

          Filesize

          1.6MB

          MD5

          4da5da193e0e4f86f6f8fd43ef25329a

          SHA1

          68a44d37ff535a2c454f2440e1429833a1c6d810

          SHA256

          18487b4ff94edccc98ed59d9fca662d4a1331c5f1e14df8db3093256dd9f1c3e

          SHA512

          b3d73ed5e45d6f2908b2f3086390dd28c1631e298756cee9bdf26b185f0b77d1b8c03ad55e0495dba982c5bed4a03337b130c76f7112f3e19821127d2cf36853

        • \??\c:\program files\droidjoy server\ScpVBus.cat

          Filesize

          8KB

          MD5

          a9441e633384d4d00c9d6dfcf2a1ea1d

          SHA1

          7d738542aa8a00e2574ac976db7ed4d597269824

          SHA256

          1a9ae39960651cef16e7da048289ecb41830da35ce47fc00936c335cf2e86d4f

          SHA512

          8befcd340f1b24cccc85f26763287ad8f61f65e67549c3d84d131a773114439b81635a5f274689be3891c2e2e7e1356967de098a7d88361e7afde17187042c55

        • memory/1496-358-0x000000001E8A0000-0x000000001E910000-memory.dmp

          Filesize

          448KB

        • memory/1496-354-0x000000001DF90000-0x000000001DF98000-memory.dmp

          Filesize

          32KB

        • memory/1496-369-0x000000001CA60000-0x000000001CA70000-memory.dmp

          Filesize

          64KB

        • memory/1496-343-0x000000001DF60000-0x000000001DF72000-memory.dmp

          Filesize

          72KB

        • memory/1496-368-0x000000001CA60000-0x000000001CA70000-memory.dmp

          Filesize

          64KB

        • memory/1496-345-0x000000001DC30000-0x000000001DC3E000-memory.dmp

          Filesize

          56KB

        • memory/1496-367-0x000000001CA60000-0x000000001CA70000-memory.dmp

          Filesize

          64KB

        • memory/1496-366-0x00007FFC550F0000-0x00007FFC55BB1000-memory.dmp

          Filesize

          10.8MB

        • memory/1496-347-0x000000001DC40000-0x000000001DC4A000-memory.dmp

          Filesize

          40KB

        • memory/1496-364-0x0000000021160000-0x0000000021198000-memory.dmp

          Filesize

          224KB

        • memory/1496-349-0x000000001DF80000-0x000000001DF8C000-memory.dmp

          Filesize

          48KB

        • memory/1496-365-0x0000000021130000-0x000000002113E000-memory.dmp

          Filesize

          56KB

        • memory/1496-363-0x000000001CA60000-0x000000001CA70000-memory.dmp

          Filesize

          64KB

        • memory/1496-361-0x0000000020D00000-0x0000000020D08000-memory.dmp

          Filesize

          32KB

        • memory/1496-326-0x000000001CA60000-0x000000001CA70000-memory.dmp

          Filesize

          64KB

        • memory/1496-333-0x000000001D6F0000-0x000000001D78A000-memory.dmp

          Filesize

          616KB

        • memory/1496-325-0x00007FFC550F0000-0x00007FFC55BB1000-memory.dmp

          Filesize

          10.8MB

        • memory/1496-362-0x000000001CA60000-0x000000001CA70000-memory.dmp

          Filesize

          64KB

        • memory/1496-324-0x0000000000D20000-0x0000000000E3E000-memory.dmp

          Filesize

          1.1MB

        • memory/1496-360-0x000000001EA10000-0x000000001EA4A000-memory.dmp

          Filesize

          232KB

        • memory/2188-133-0x0000000000400000-0x0000000000468000-memory.dmp

          Filesize

          416KB

        • memory/2188-149-0x0000000000400000-0x0000000000468000-memory.dmp

          Filesize

          416KB

        • memory/2188-331-0x0000000000400000-0x0000000000468000-memory.dmp

          Filesize

          416KB

        • memory/2236-291-0x0000000000400000-0x0000000000511000-memory.dmp

          Filesize

          1.1MB

        • memory/2236-318-0x0000000000400000-0x0000000000511000-memory.dmp

          Filesize

          1.1MB

        • memory/2236-139-0x00000000006C0000-0x00000000006C1000-memory.dmp

          Filesize

          4KB

        • memory/2236-330-0x0000000000400000-0x0000000000511000-memory.dmp

          Filesize

          1.1MB

        • memory/2236-150-0x0000000000400000-0x0000000000511000-memory.dmp

          Filesize

          1.1MB

        • memory/2236-151-0x00000000006C0000-0x00000000006C1000-memory.dmp

          Filesize

          4KB

        • memory/2236-153-0x0000000000400000-0x0000000000511000-memory.dmp

          Filesize

          1.1MB

        • memory/2236-155-0x0000000000400000-0x0000000000511000-memory.dmp

          Filesize

          1.1MB