Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2023, 02:33
Static task
static1
Behavioral task
behavioral1
Sample
5842f7649cea42dea4dc29ebdd843bd6d57ac802e812fb38e87cbe5a8734c890.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
5842f7649cea42dea4dc29ebdd843bd6d57ac802e812fb38e87cbe5a8734c890.exe
Resource
win10v2004-20231020-en
General
-
Target
5842f7649cea42dea4dc29ebdd843bd6d57ac802e812fb38e87cbe5a8734c890.exe
-
Size
1.4MB
-
MD5
1683df3bd83b4564dfc964e287089512
-
SHA1
78499a557db2f42ff5a441fa3d7aa032f6548889
-
SHA256
5842f7649cea42dea4dc29ebdd843bd6d57ac802e812fb38e87cbe5a8734c890
-
SHA512
a2f219917950b5051a98c54fa4a230556d86f8b5da84dd29be3c6f38f5fc0913291854e33fc554d04bf9e8e9b3588933e3ca05c240b9942b444e68508134ca4e
-
SSDEEP
24576:DU28CafNdyd2hXAgq6cnPkRrR/pDmvvUEgHbY9luCq4rS3+ouGKpVO:Q2KThXLq6T/pUvDgHxDuFO
Malware Config
Signatures
-
Drops file in Drivers directory 8 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\VmtkmMouFiltr_0.sys DrvInst.exe File opened for modification C:\Windows\system32\drivers\mouhid.sys DrvInst.exe File opened for modification C:\Windows\system32\drivers\mouclass.sys DrvInst.exe File opened for modification C:\Windows\System32\drivers\SETA066.tmp DrvInst.exe File created C:\Windows\System32\drivers\SETA066.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\VmtkmHid_0.sys DrvInst.exe File opened for modification C:\Windows\system32\drivers\SETA529.tmp DrvInst.exe File created C:\Windows\system32\drivers\SETA529.tmp DrvInst.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation 5842f7649cea42dea4dc29ebdd843bd6d57ac802e812fb38e87cbe5a8734c890.exe -
Executes dropped EXE 2 IoCs
pid Process 1476 devcon.exe 1908 devcon.exe -
Loads dropped DLL 2 IoCs
pid Process 2176 5842f7649cea42dea4dc29ebdd843bd6d57ac802e812fb38e87cbe5a8734c890.exe 2176 5842f7649cea42dea4dc29ebdd843bd6d57ac802e812fb38e87cbe5a8734c890.exe -
resource yara_rule behavioral2/memory/2176-1-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-2-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-0-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-7-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-9-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-15-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-17-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-19-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-31-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-35-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/2176-52-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Drops file in System32 directory 32 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\Temp\{f59b0c5a-47a8-3a41-9423-97f1d7519935}\SET9B18.tmp DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{ea19050b-40c3-e049-b49e-5902228505dc}\VmtkmMouFiltr_0.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vmtkmhid_0.inf_amd64_aaf954d05a2c7d7f\vmtkmhid_0.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{ea19050b-40c3-e049-b49e-5902228505dc}\SETA26C.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{f59b0c5a-47a8-3a41-9423-97f1d7519935}\SET9B18.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{f59b0c5a-47a8-3a41-9423-97f1d7519935}\SET9B29.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vmtkmhid_0.inf_amd64_aaf954d05a2c7d7f\VmtkmHid_0.sys DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{f59b0c5a-47a8-3a41-9423-97f1d7519935} DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\vmtkmhid_0.inf_amd64_aaf954d05a2c7d7f\vmtkmhid_0.PNF devcon.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vmtkmmoufiltr_0.inf_amd64_75b639d4ffc4e70a\vmtkmmoufiltr_0.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{ea19050b-40c3-e049-b49e-5902228505dc} DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{f59b0c5a-47a8-3a41-9423-97f1d7519935}\SET9B07.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{f59b0c5a-47a8-3a41-9423-97f1d7519935}\VmtkmHid_0.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{f59b0c5a-47a8-3a41-9423-97f1d7519935}\VmtkmHid_0.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{ea19050b-40c3-e049-b49e-5902228505dc}\SETA23B.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{ea19050b-40c3-e049-b49e-5902228505dc}\SETA26B.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\vmtkmmoufiltr_0.inf_amd64_75b639d4ffc4e70a\vmtkmmoufiltr_0.PNF devcon.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{f59b0c5a-47a8-3a41-9423-97f1d7519935}\vmtkmhid_0.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{ea19050b-40c3-e049-b49e-5902228505dc}\vmtkmmoufiltr_0.inf DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{ea19050b-40c3-e049-b49e-5902228505dc}\SETA26C.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vmtkmmoufiltr_0.inf_amd64_75b639d4ffc4e70a\VmtkmMouFiltr_0.sys DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{ea19050b-40c3-e049-b49e-5902228505dc}\SETA23B.tmp DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{f59b0c5a-47a8-3a41-9423-97f1d7519935}\SET9B07.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{f59b0c5a-47a8-3a41-9423-97f1d7519935}\SET9B29.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vmtkmhid_0.inf_amd64_aaf954d05a2c7d7f\VmtkmHid_0.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{ea19050b-40c3-e049-b49e-5902228505dc}\VmtkmHid_0.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{ea19050b-40c3-e049-b49e-5902228505dc}\SETA26B.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vmtkmmoufiltr_0.inf_amd64_75b639d4ffc4e70a\VmtkmHid_0.cat DrvInst.exe -
Drops file in Windows directory 11 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\inf\oem4.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File created C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log devcon.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\inf\oem4.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log devcon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID devcon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 devcon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom devcon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID devcon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom devcon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID devcon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 devcon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom devcon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs devcon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 devcon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs devcon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags devcon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom devcon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID devcon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Filters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID devcon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs devcon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs devcon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 devcon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags devcon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID devcon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 devcon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID devcon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service DrvInst.exe -
Modifies Control Panel 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\Mouse\MouseThreshold1 = "0" 5842f7649cea42dea4dc29ebdd843bd6d57ac802e812fb38e87cbe5a8734c890.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\Mouse\MouseThreshold2 = "0" 5842f7649cea42dea4dc29ebdd843bd6d57ac802e812fb38e87cbe5a8734c890.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\Mouse\MouseSpeed = "0" 5842f7649cea42dea4dc29ebdd843bd6d57ac802e812fb38e87cbe5a8734c890.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeAuditPrivilege 3924 svchost.exe Token: SeSecurityPrivilege 3924 svchost.exe Token: SeLoadDriverPrivilege 1476 devcon.exe Token: SeRestorePrivilege 1180 DrvInst.exe Token: SeBackupPrivilege 1180 DrvInst.exe Token: SeLoadDriverPrivilege 1180 DrvInst.exe Token: SeLoadDriverPrivilege 1180 DrvInst.exe Token: SeLoadDriverPrivilege 1180 DrvInst.exe Token: SeLoadDriverPrivilege 1908 devcon.exe Token: SeRestorePrivilege 2984 DrvInst.exe Token: SeBackupPrivilege 2984 DrvInst.exe Token: SeRestorePrivilege 2984 DrvInst.exe Token: SeBackupPrivilege 2984 DrvInst.exe Token: SeRestorePrivilege 2984 DrvInst.exe Token: SeBackupPrivilege 2984 DrvInst.exe Token: SeLoadDriverPrivilege 2984 DrvInst.exe Token: SeLoadDriverPrivilege 2984 DrvInst.exe Token: SeLoadDriverPrivilege 2984 DrvInst.exe Token: SeLoadDriverPrivilege 2984 DrvInst.exe Token: SeLoadDriverPrivilege 2984 DrvInst.exe Token: SeLoadDriverPrivilege 2984 DrvInst.exe Token: SeLoadDriverPrivilege 2984 DrvInst.exe Token: SeLoadDriverPrivilege 2984 DrvInst.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2176 5842f7649cea42dea4dc29ebdd843bd6d57ac802e812fb38e87cbe5a8734c890.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2176 5842f7649cea42dea4dc29ebdd843bd6d57ac802e812fb38e87cbe5a8734c890.exe 2176 5842f7649cea42dea4dc29ebdd843bd6d57ac802e812fb38e87cbe5a8734c890.exe 2176 5842f7649cea42dea4dc29ebdd843bd6d57ac802e812fb38e87cbe5a8734c890.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2316 2176 5842f7649cea42dea4dc29ebdd843bd6d57ac802e812fb38e87cbe5a8734c890.exe 94 PID 2176 wrote to memory of 2316 2176 5842f7649cea42dea4dc29ebdd843bd6d57ac802e812fb38e87cbe5a8734c890.exe 94 PID 2176 wrote to memory of 2316 2176 5842f7649cea42dea4dc29ebdd843bd6d57ac802e812fb38e87cbe5a8734c890.exe 94 PID 2316 wrote to memory of 1476 2316 cmd.exe 98 PID 2316 wrote to memory of 1476 2316 cmd.exe 98 PID 3924 wrote to memory of 4436 3924 svchost.exe 100 PID 3924 wrote to memory of 4436 3924 svchost.exe 100 PID 3924 wrote to memory of 1180 3924 svchost.exe 101 PID 3924 wrote to memory of 1180 3924 svchost.exe 101 PID 2316 wrote to memory of 1908 2316 cmd.exe 104 PID 2316 wrote to memory of 1908 2316 cmd.exe 104 PID 3924 wrote to memory of 1360 3924 svchost.exe 105 PID 3924 wrote to memory of 1360 3924 svchost.exe 105 PID 3924 wrote to memory of 2984 3924 svchost.exe 107 PID 3924 wrote to memory of 2984 3924 svchost.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\5842f7649cea42dea4dc29ebdd843bd6d57ac802e812fb38e87cbe5a8734c890.exe"C:\Users\Admin\AppData\Local\Temp\5842f7649cea42dea4dc29ebdd843bd6d57ac802e812fb38e87cbe5a8734c890.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Modifies Control Panel
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FileDef20160419\x64\Driver_Setup.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\FileDef20160419\x64\devcon.exedevcon install VmtkmHid_0.inf "{8FBC4165-480D-4230-B1DF-7B86F3E5A3CC}\HID_DEVICE"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\Users\Admin\AppData\Local\Temp\FileDef20160419\x64\devcon.exedevcon update VmtkmMouFiltr_0.inf "HID\Vid_1bcf&Pid_05e3&Col02"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{9d615563-f4b0-a74e-9e0f-79d3d506c916}\vmtkmhid_0.inf" "9" "4f780c9bb" "000000000000013C" "WinSta0\Default" "0000000000000154" "208" "c:\users\admin\appdata\local\temp\filedef20160419\x64"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:4436
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\HIDCLASS\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:b2fe4818386da1dc:VHidMini.Inst:1.0.0.1:{8fbc4165-480d-4230-b1df-7b86f3e5a3cc}\hid_device," "4f780c9bb" "000000000000013C"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{f2727064-5c1c-dd43-aca7-4bce45feaa61}\vmtkmmoufiltr_0.inf" "9" "458dbf7d3" "0000000000000158" "WinSta0\Default" "0000000000000160" "208" "c:\users\admin\appdata\local\temp\filedef20160419\x64"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:1360
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "HID\VID_1BCF&PID_05E3&COL02\1&2D595CA7&0&0001" "C:\Windows\INF\oem4.inf" "oem4.inf:bcec1b19d8f58feb:HIDUAS_Inst:1.0.0.0:hid\vid_1bcf&pid_05e3&col02," "458dbf7d3" "0000000000000158"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s hidserv1⤵PID:2652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD5ffb0bbd1166100b72cc3823baa152b2f
SHA1dab9d0aee5ab7f2995feeacdbc6bf7710a372f0f
SHA256f107b57123cb427fce8d635f19e63483819d48876adf9ddc05174af80cce4229
SHA512dabe236a5df5f7d62dc8df9d8c8faf6ef27db96c43caf61d13aba5e9e9f82a5f9aa5e1fa92d239580da7e62356991c6e76f9884c66380f0e53cac68a89658fec
-
Filesize
3KB
MD5ac2a7db4b61118498e6d74e302335c2b
SHA185da16e595b994cd6e3cdcedc2ae2e5068a5640e
SHA25620ba09ccf6d435af296bbe9e84212538094ea064128052d737f6884265de05d0
SHA51225b0ab141032643e7c871066d909b4e331991d55ec602c6b4166ffbab3aa43a1535aae92159ac16d7fb81c5885c3f26518b5b4c2224dd26ac8534f349b2898e0
-
Filesize
87KB
MD541ba1bbdd9284e49701ee94a3f446c33
SHA16d5bd532a0f9a3bf7005edeb53b4aba2d30a0c99
SHA256c65d9acba88d2c56422ec4aba235b0ae25bb3261bf400cd30efe11de0c4330e4
SHA512dc55452698966b77c157a81eb458984b17e3e3a0d3ff885479f7c823b847eb739a07782f140ced12eac75fdddd7416f923c885a9d8e8b0a10010fc07bef3da45
-
Filesize
87KB
MD541ba1bbdd9284e49701ee94a3f446c33
SHA16d5bd532a0f9a3bf7005edeb53b4aba2d30a0c99
SHA256c65d9acba88d2c56422ec4aba235b0ae25bb3261bf400cd30efe11de0c4330e4
SHA512dc55452698966b77c157a81eb458984b17e3e3a0d3ff885479f7c823b847eb739a07782f140ced12eac75fdddd7416f923c885a9d8e8b0a10010fc07bef3da45
-
Filesize
87KB
MD541ba1bbdd9284e49701ee94a3f446c33
SHA16d5bd532a0f9a3bf7005edeb53b4aba2d30a0c99
SHA256c65d9acba88d2c56422ec4aba235b0ae25bb3261bf400cd30efe11de0c4330e4
SHA512dc55452698966b77c157a81eb458984b17e3e3a0d3ff885479f7c823b847eb739a07782f140ced12eac75fdddd7416f923c885a9d8e8b0a10010fc07bef3da45
-
Filesize
316KB
MD50bc49d08a8c68225851da36cbf08a240
SHA1c508d74586eabe55b9d57288b075451836ea37a3
SHA256e4a94ef90f832cf05b84eb5a8970478b9c5d4a3aa1fa2c60f783887d6c6576a2
SHA5123baad58d47c37b0fa69a0294f2a2e6729e4e00fbf716ab7a8a9a82f2cdf58f59daf4093d4e53555d73f4031ab93517e5adf3fd4c175b2cefed0f77919445ab98
-
Filesize
316KB
MD50bc49d08a8c68225851da36cbf08a240
SHA1c508d74586eabe55b9d57288b075451836ea37a3
SHA256e4a94ef90f832cf05b84eb5a8970478b9c5d4a3aa1fa2c60f783887d6c6576a2
SHA5123baad58d47c37b0fa69a0294f2a2e6729e4e00fbf716ab7a8a9a82f2cdf58f59daf4093d4e53555d73f4031ab93517e5adf3fd4c175b2cefed0f77919445ab98
-
Filesize
316KB
MD50bc49d08a8c68225851da36cbf08a240
SHA1c508d74586eabe55b9d57288b075451836ea37a3
SHA256e4a94ef90f832cf05b84eb5a8970478b9c5d4a3aa1fa2c60f783887d6c6576a2
SHA5123baad58d47c37b0fa69a0294f2a2e6729e4e00fbf716ab7a8a9a82f2cdf58f59daf4093d4e53555d73f4031ab93517e5adf3fd4c175b2cefed0f77919445ab98
-
Filesize
8KB
MD569d398d45035ea070ad1d950947b8258
SHA1f389482e8f547f08f6637005cb0312ab1c94a9cb
SHA256f966ccfc34fca47aa0f8de37ea7eba2d89c7db14db408a20ad9cdbc28ddda097
SHA5126186f36982795d116da883769458c74e63a0719a78026f2343e2ba0ff27367d028f72a880e07ca894e8f67aed4f758a41a386bab358cbf18eff51326119d80be
-
Filesize
11KB
MD515be41abe19a4c66d9e94ff5afee1822
SHA1e47dca6ade9843a5ee6d6f100d12bcc06bee5f06
SHA256da484327e2601a56f90d2ad2a040150171548fe8aeac8332c8f27c9ac6054fbb
SHA512dcec2d963cee7c26190686c93cd28b4fa17d4c54ca0cf1e231603dc445a17685f43d4fab5e0d1e6b1e6b2bc8aac5617542068064d9639f150e6e77e2e2709c41
-
Filesize
3KB
MD5ac2a7db4b61118498e6d74e302335c2b
SHA185da16e595b994cd6e3cdcedc2ae2e5068a5640e
SHA25620ba09ccf6d435af296bbe9e84212538094ea064128052d737f6884265de05d0
SHA51225b0ab141032643e7c871066d909b4e331991d55ec602c6b4166ffbab3aa43a1535aae92159ac16d7fb81c5885c3f26518b5b4c2224dd26ac8534f349b2898e0
-
Filesize
3KB
MD5ac2a7db4b61118498e6d74e302335c2b
SHA185da16e595b994cd6e3cdcedc2ae2e5068a5640e
SHA25620ba09ccf6d435af296bbe9e84212538094ea064128052d737f6884265de05d0
SHA51225b0ab141032643e7c871066d909b4e331991d55ec602c6b4166ffbab3aa43a1535aae92159ac16d7fb81c5885c3f26518b5b4c2224dd26ac8534f349b2898e0
-
Filesize
8KB
MD569d398d45035ea070ad1d950947b8258
SHA1f389482e8f547f08f6637005cb0312ab1c94a9cb
SHA256f966ccfc34fca47aa0f8de37ea7eba2d89c7db14db408a20ad9cdbc28ddda097
SHA5126186f36982795d116da883769458c74e63a0719a78026f2343e2ba0ff27367d028f72a880e07ca894e8f67aed4f758a41a386bab358cbf18eff51326119d80be
-
Filesize
7KB
MD53eb7619b8440e9a003c4a5a9b8acde33
SHA15c1d6bbe9ac62e8ce9bb5432b711fdc2e4e3b94f
SHA256784287759ef05e815b2c486f7bc6af5077d1c9c86c4ef921e8b2039634f667a0
SHA512eaa73dd2e6a65dff50b6a1ae1b3c3155e68849c5339c89d543e58b4ac34dbd4173e00d6deaf12b47bfe491cd001f0f3b04634364a4fb0acc73070da10ae7a0f5
-
Filesize
2KB
MD5c96843464c7474150b481cb5f0075c22
SHA19fb1a53cbe5c6e9adcb3fd061fc9f292a648a1e5
SHA256006850d8035f5e776c34ceaf90d292b8ff83e9457e5b32e118e6d5b4a755ca40
SHA512303bd7f8e9c04f755eb3e0bce867a16be10dbfccc25e98e4e12fa9d51241bb67e27dcac8c0ec0eebc1a20c043cd3e78e0766b879b3ffb69e00bdfe31f07dc0d4
-
Filesize
2KB
MD5c96843464c7474150b481cb5f0075c22
SHA19fb1a53cbe5c6e9adcb3fd061fc9f292a648a1e5
SHA256006850d8035f5e776c34ceaf90d292b8ff83e9457e5b32e118e6d5b4a755ca40
SHA512303bd7f8e9c04f755eb3e0bce867a16be10dbfccc25e98e4e12fa9d51241bb67e27dcac8c0ec0eebc1a20c043cd3e78e0766b879b3ffb69e00bdfe31f07dc0d4
-
Filesize
3KB
MD5ac2a7db4b61118498e6d74e302335c2b
SHA185da16e595b994cd6e3cdcedc2ae2e5068a5640e
SHA25620ba09ccf6d435af296bbe9e84212538094ea064128052d737f6884265de05d0
SHA51225b0ab141032643e7c871066d909b4e331991d55ec602c6b4166ffbab3aa43a1535aae92159ac16d7fb81c5885c3f26518b5b4c2224dd26ac8534f349b2898e0
-
Filesize
2KB
MD5c96843464c7474150b481cb5f0075c22
SHA19fb1a53cbe5c6e9adcb3fd061fc9f292a648a1e5
SHA256006850d8035f5e776c34ceaf90d292b8ff83e9457e5b32e118e6d5b4a755ca40
SHA512303bd7f8e9c04f755eb3e0bce867a16be10dbfccc25e98e4e12fa9d51241bb67e27dcac8c0ec0eebc1a20c043cd3e78e0766b879b3ffb69e00bdfe31f07dc0d4
-
Filesize
148KB
MD5ad949d73d20e4f9ec61d1af7f76b203a
SHA135a697f15a4b96411ffd72186b4a10512b0be54d
SHA2562bb30a8428469306131c73a97b3f739c4a47cd9137edcc7bd46a210e3e407348
SHA5124a7f481575c54d2deb5562dd4b46e7e1a194d7d467665e1a71a6af06b9ab460acf0e19b8234861ba9bd611c2715edc022355a30b372383402e76bd1c1e0b7946
-
Filesize
11KB
MD515be41abe19a4c66d9e94ff5afee1822
SHA1e47dca6ade9843a5ee6d6f100d12bcc06bee5f06
SHA256da484327e2601a56f90d2ad2a040150171548fe8aeac8332c8f27c9ac6054fbb
SHA512dcec2d963cee7c26190686c93cd28b4fa17d4c54ca0cf1e231603dc445a17685f43d4fab5e0d1e6b1e6b2bc8aac5617542068064d9639f150e6e77e2e2709c41
-
Filesize
7KB
MD53eb7619b8440e9a003c4a5a9b8acde33
SHA15c1d6bbe9ac62e8ce9bb5432b711fdc2e4e3b94f
SHA256784287759ef05e815b2c486f7bc6af5077d1c9c86c4ef921e8b2039634f667a0
SHA512eaa73dd2e6a65dff50b6a1ae1b3c3155e68849c5339c89d543e58b4ac34dbd4173e00d6deaf12b47bfe491cd001f0f3b04634364a4fb0acc73070da10ae7a0f5
-
Filesize
3KB
MD5ac2a7db4b61118498e6d74e302335c2b
SHA185da16e595b994cd6e3cdcedc2ae2e5068a5640e
SHA25620ba09ccf6d435af296bbe9e84212538094ea064128052d737f6884265de05d0
SHA51225b0ab141032643e7c871066d909b4e331991d55ec602c6b4166ffbab3aa43a1535aae92159ac16d7fb81c5885c3f26518b5b4c2224dd26ac8534f349b2898e0
-
C:\Windows\System32\DriverStore\FileRepository\vmtkmmoufiltr_0.inf_amd64_75b639d4ffc4e70a\vmtkmmoufiltr_0.inf
Filesize2KB
MD5c96843464c7474150b481cb5f0075c22
SHA19fb1a53cbe5c6e9adcb3fd061fc9f292a648a1e5
SHA256006850d8035f5e776c34ceaf90d292b8ff83e9457e5b32e118e6d5b4a755ca40
SHA512303bd7f8e9c04f755eb3e0bce867a16be10dbfccc25e98e4e12fa9d51241bb67e27dcac8c0ec0eebc1a20c043cd3e78e0766b879b3ffb69e00bdfe31f07dc0d4
-
Filesize
7KB
MD53eb7619b8440e9a003c4a5a9b8acde33
SHA15c1d6bbe9ac62e8ce9bb5432b711fdc2e4e3b94f
SHA256784287759ef05e815b2c486f7bc6af5077d1c9c86c4ef921e8b2039634f667a0
SHA512eaa73dd2e6a65dff50b6a1ae1b3c3155e68849c5339c89d543e58b4ac34dbd4173e00d6deaf12b47bfe491cd001f0f3b04634364a4fb0acc73070da10ae7a0f5
-
Filesize
8KB
MD569d398d45035ea070ad1d950947b8258
SHA1f389482e8f547f08f6637005cb0312ab1c94a9cb
SHA256f966ccfc34fca47aa0f8de37ea7eba2d89c7db14db408a20ad9cdbc28ddda097
SHA5126186f36982795d116da883769458c74e63a0719a78026f2343e2ba0ff27367d028f72a880e07ca894e8f67aed4f758a41a386bab358cbf18eff51326119d80be
-
Filesize
11KB
MD515be41abe19a4c66d9e94ff5afee1822
SHA1e47dca6ade9843a5ee6d6f100d12bcc06bee5f06
SHA256da484327e2601a56f90d2ad2a040150171548fe8aeac8332c8f27c9ac6054fbb
SHA512dcec2d963cee7c26190686c93cd28b4fa17d4c54ca0cf1e231603dc445a17685f43d4fab5e0d1e6b1e6b2bc8aac5617542068064d9639f150e6e77e2e2709c41
-
Filesize
11KB
MD515be41abe19a4c66d9e94ff5afee1822
SHA1e47dca6ade9843a5ee6d6f100d12bcc06bee5f06
SHA256da484327e2601a56f90d2ad2a040150171548fe8aeac8332c8f27c9ac6054fbb
SHA512dcec2d963cee7c26190686c93cd28b4fa17d4c54ca0cf1e231603dc445a17685f43d4fab5e0d1e6b1e6b2bc8aac5617542068064d9639f150e6e77e2e2709c41
-
Filesize
7KB
MD53eb7619b8440e9a003c4a5a9b8acde33
SHA15c1d6bbe9ac62e8ce9bb5432b711fdc2e4e3b94f
SHA256784287759ef05e815b2c486f7bc6af5077d1c9c86c4ef921e8b2039634f667a0
SHA512eaa73dd2e6a65dff50b6a1ae1b3c3155e68849c5339c89d543e58b4ac34dbd4173e00d6deaf12b47bfe491cd001f0f3b04634364a4fb0acc73070da10ae7a0f5
-
Filesize
8KB
MD569d398d45035ea070ad1d950947b8258
SHA1f389482e8f547f08f6637005cb0312ab1c94a9cb
SHA256f966ccfc34fca47aa0f8de37ea7eba2d89c7db14db408a20ad9cdbc28ddda097
SHA5126186f36982795d116da883769458c74e63a0719a78026f2343e2ba0ff27367d028f72a880e07ca894e8f67aed4f758a41a386bab358cbf18eff51326119d80be
-
Filesize
2KB
MD5c96843464c7474150b481cb5f0075c22
SHA19fb1a53cbe5c6e9adcb3fd061fc9f292a648a1e5
SHA256006850d8035f5e776c34ceaf90d292b8ff83e9457e5b32e118e6d5b4a755ca40
SHA512303bd7f8e9c04f755eb3e0bce867a16be10dbfccc25e98e4e12fa9d51241bb67e27dcac8c0ec0eebc1a20c043cd3e78e0766b879b3ffb69e00bdfe31f07dc0d4