Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
40s -
max time network
39s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-es -
resource tags
arch:x64arch:x86image:win10v2004-20240426-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
07/05/2024, 17:42
Static task
static1
Behavioral task
behavioral1
Sample
XPPenWin_3.4.13.231129.exe
Resource
win10v2004-20240426-es
General
-
Target
XPPenWin_3.4.13.231129.exe
-
Size
28.8MB
-
MD5
61f1a3fc174a0c4ac9b80c15c389b7fe
-
SHA1
1e0c613cf1c4d32dd418cc4e296c4dd66434c617
-
SHA256
8946105827c27151e3e17f88f7c65d9db99aef1ef7f3e710bda37d2c948d7f16
-
SHA512
8126a8dbfc85e47c659a588544877980d453ecc675e499f034df48565f93bde45bb6be251a039891e219c372b83b020d5b46ab042adcc54e0d33c61a305b99a2
-
SSDEEP
786432:BzYs7Y0vrsRqTYMZE9FVgc5DvznZA1JDi:BY+Y5cTJZqgc5DNA1U
Malware Config
Signatures
-
Drops file in Drivers directory 11 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\XPPenTablet.sys DrvInst.exe File opened for modification C:\Windows\System32\drivers\mouclass.sys DrvInst.exe File opened for modification C:\Windows\System32\drivers\hidkmdf.sys DrvInst.exe File opened for modification C:\Windows\System32\drivers\SET60AF.tmp DrvInst.exe File created C:\Windows\System32\drivers\SET60AF.tmp DrvInst.exe File created C:\Windows\System32\drivers\SET637D.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\hanvonugeemfilter.sys DrvInst.exe File opened for modification C:\Windows\System32\drivers\mouhid.sys DrvInst.exe File opened for modification C:\Windows\System32\drivers\SET60AE.tmp DrvInst.exe File created C:\Windows\System32\drivers\SET60AE.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\SET637D.tmp DrvInst.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\PenTablet = "C:\\Program Files\\Pentablet\\PenTablet.exe /mini" XPPenWin_3.4.13.231129.tmp -
Drops file in System32 directory 54 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\Temp\{5065846e-0b66-2448-a976-d4841f018bc5}\SET5ECA.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{5065846e-0b66-2448-a976-d4841f018bc5}\SET5EED.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\xppentablet.inf_amd64_0047901d9177278c\XPPenTablet.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\xppentablet.inf_amd64_0047901d9177278c\XPPenTablet.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{65aed12b-1f6f-db48-b75d-fc185db3eebc}\WdfCoInstaller01009.dll DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\xppentablet.inf_amd64_0047901d9177278c\xppentablet.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{65aed12b-1f6f-db48-b75d-fc185db3eebc}\SET61C9.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\hanvonugeemfilter.inf_amd64_5e728e9b55a6391e\hanvonugeemfilter.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\xppentablet.inf_amd64_0047901d9177278c\hidkmdf.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\hanvonugeemfilter.inf_amd64_5e728e9b55a6391e\hanvonugeemfilter.sys DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\hanvonugeemfilter.inf_amd64_5e728e9b55a6391e\hanvonugeemfilter.PNF dpinst.exe File created C:\Windows\System32\SET637E.tmp DrvInst.exe File opened for modification C:\Windows\system32\WinTab32.dll XPPenWin_3.4.13.231129.tmp File opened for modification C:\Windows\System32\DriverStore\Temp\{5065846e-0b66-2448-a976-d4841f018bc5}\SET5EED.tmp DrvInst.exe File created \??\c:\windows\system32\driverstore\filerepository\hanvonugeemfilter.inf_amd64_5e728e9b55a6391e\hanvonugeemfilter.PNF dpinst.exe File opened for modification C:\Windows\SysWOW64\WinTab32.dll XPPenWin_3.4.13.231129.tmp File opened for modification C:\Windows\System32\DriverStore\Temp\{5065846e-0b66-2448-a976-d4841f018bc5}\SET5ECA.tmp DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\SET637E.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{5065846e-0b66-2448-a976-d4841f018bc5}\SET5EEC.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{65aed12b-1f6f-db48-b75d-fc185db3eebc}\SET61C9.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{5065846e-0b66-2448-a976-d4841f018bc5}\SET5ECB.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{65aed12b-1f6f-db48-b75d-fc185db3eebc}\SET61B7.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{65aed12b-1f6f-db48-b75d-fc185db3eebc}\SET61CA.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{65aed12b-1f6f-db48-b75d-fc185db3eebc}\hanvonugeemfilter.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{5065846e-0b66-2448-a976-d4841f018bc5}\SET5EBA.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File created C:\Windows\SysWOW64\is-5602U.tmp XPPenWin_3.4.13.231129.tmp File created C:\Windows\System32\DriverStore\Temp\{5065846e-0b66-2448-a976-d4841f018bc5}\SET5ECB.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{5065846e-0b66-2448-a976-d4841f018bc5} DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\xppentablet.inf_amd64_0047901d9177278c\xppentablet.PNF devcon.exe File created C:\Windows\System32\DriverStore\Temp\{65aed12b-1f6f-db48-b75d-fc185db3eebc}\SET61B8.tmp DrvInst.exe File opened for modification C:\Windows\System32\WdfCoInstaller01009.dll DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{5065846e-0b66-2448-a976-d4841f018bc5}\SET5EBA.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{5065846e-0b66-2448-a976-d4841f018bc5}\WdfCoInstaller01009.dll DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{65aed12b-1f6f-db48-b75d-fc185db3eebc}\hanvonugeemfilter.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{5065846e-0b66-2448-a976-d4841f018bc5}\XPPenTablet.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{65aed12b-1f6f-db48-b75d-fc185db3eebc}\SET61B8.tmp DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{5065846e-0b66-2448-a976-d4841f018bc5}\hidkmdf.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{65aed12b-1f6f-db48-b75d-fc185db3eebc} DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\msmouse.inf_amd64_1793a485b491b199\msmouse.PNF dpinst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{5065846e-0b66-2448-a976-d4841f018bc5}\xppentablet.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\xppentablet.inf_amd64_0047901d9177278c\WdfCoInstaller01009.dll DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{65aed12b-1f6f-db48-b75d-fc185db3eebc}\SET61CA.tmp DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt dpinst.exe File created C:\Windows\system32\is-6HLV3.tmp XPPenWin_3.4.13.231129.tmp File opened for modification C:\Windows\System32\DriverStore\Temp\{5065846e-0b66-2448-a976-d4841f018bc5}\XPPenTablet.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{5065846e-0b66-2448-a976-d4841f018bc5}\SET5EEC.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{65aed12b-1f6f-db48-b75d-fc185db3eebc}\SET61B7.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\hanvonugeemfilter.inf_amd64_5e728e9b55a6391e\WdfCoInstaller01009.dll DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{65aed12b-1f6f-db48-b75d-fc185db3eebc}\hanvonugeemfilter.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\hanvonugeemfilter.inf_amd64_5e728e9b55a6391e\hanvonugeemfilter.cat DrvInst.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Pentablet\imageformats\qico.dll XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\64\is-E6L1E.tmp XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\config\is-EOCN1.tmp XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\imageformats\is-HCJM4.tmp XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\unins000.dat XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\ssleay32.dll XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\Qt5Core.dll XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\is-ACR9C.tmp XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\driver\64\WdfCoinstaller01009.dll XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\imageformats\qwbmp.dll XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\is-FGH4V.tmp XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\platforms\is-HHB67.tmp XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\64\WinTab32.dll XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\imageformats\qsvg.dll XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\platforms\qwindows.dll XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\64\is-M6UI9.tmp XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\Qt5Xml.dll XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\imageformats\qdds.dll XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\imageformats\is-MB3TA.tmp XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\FWUpdate.exe XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\imageformats\qwebp.dll XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\vcruntime140.dll XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\imageformats\qjpeg.dll XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\driver\64\is-OEFA6.tmp XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\is-PDCR3.tmp XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\imageformats\is-P5U91.tmp XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\libeay32.dll XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\Qt5Network.dll XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\is-0G7QJ.tmp XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\is-TV0CD.tmp XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\is-UQJRF.tmp XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\is-TH0H2.tmp XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\is-1BN5N.tmp XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\imageformats\is-2H23H.tmp XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\64\devcon.exe XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\Qt5Svg.dll XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\config\is-EVILT.tmp XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\is-45O0Q.tmp XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\64\DIFxAPI.dll XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\64\is-9GMTJ.tmp XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\config\is-MKA19.tmp XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\is-8VK39.tmp XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\bin\is-2VBDH.tmp XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\msvcp140.dll XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\64\is-VFEVP.tmp XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\Qt5Widgets.dll XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\imageformats\qgif.dll XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\64\is-U9H9K.tmp XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\is-UVNBP.tmp XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\imageformats\is-4L6N3.tmp XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\PentabletUIService.exe XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\imageformats\qtga.dll XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\Qt5Gui.dll XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\is-CKI5C.tmp XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\imageformats\is-M4Q6K.tmp XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\driver\64\dpinst.exe XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\imageformats\qtiff.dll XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\is-H2E5K.tmp XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\imageformats\is-LDCUP.tmp XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\64\is-VBJ4S.tmp XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\is-HC3C1.tmp XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\is-NJ125.tmp XPPenWin_3.4.13.231129.tmp File created C:\Program Files\Pentablet\imageformats\is-L5J0S.tmp XPPenWin_3.4.13.231129.tmp File opened for modification C:\Program Files\Pentablet\HuBleLib.dll XPPenWin_3.4.13.231129.tmp -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log dpinst.exe File created C:\Windows\inf\oem4.inf DrvInst.exe File created C:\Windows\INF\oem4.PNF dpinst.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\inf\oem4.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log devcon.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\DPINST.LOG dpinst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe -
Executes dropped EXE 6 IoCs
pid Process 3232 XPPenWin_3.4.13.231129.tmp 864 Listdlls.exe 2748 Listdlls64.exe 2792 devcon.exe 2556 dpinst.exe 2764 PenTablet.exe -
Loads dropped DLL 27 IoCs
pid Process 3232 XPPenWin_3.4.13.231129.tmp 3232 XPPenWin_3.4.13.231129.tmp 3232 XPPenWin_3.4.13.231129.tmp 3232 XPPenWin_3.4.13.231129.tmp 2764 PenTablet.exe 2764 PenTablet.exe 2764 PenTablet.exe 2764 PenTablet.exe 2764 PenTablet.exe 2764 PenTablet.exe 2764 PenTablet.exe 2764 PenTablet.exe 2764 PenTablet.exe 2764 PenTablet.exe 2764 PenTablet.exe 2764 PenTablet.exe 2764 PenTablet.exe 2764 PenTablet.exe 2764 PenTablet.exe 2764 PenTablet.exe 2764 PenTablet.exe 2764 PenTablet.exe 2764 PenTablet.exe 2764 PenTablet.exe 2764 PenTablet.exe 2764 PenTablet.exe 2764 PenTablet.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID devcon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID devcon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom devcon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 devcon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom devcon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs devcon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID dpinst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dpinst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 devcon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID dpinst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs dpinst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs devcon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 dpinst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dpinst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Filters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Filters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 devcon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom dpinst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs dpinst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID devcon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID devcon.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LowerFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dpinst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\UpperFilters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UpperFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 devcon.exe -
Kills process with taskkill 2 IoCs
pid Process 4112 taskkill.exe 3936 taskkill.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2764 PenTablet.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2748 Listdlls64.exe 2748 Listdlls64.exe 2748 Listdlls64.exe 2748 Listdlls64.exe 2748 Listdlls64.exe 2748 Listdlls64.exe 2748 Listdlls64.exe 2748 Listdlls64.exe 2748 Listdlls64.exe 2748 Listdlls64.exe 2748 Listdlls64.exe 2748 Listdlls64.exe 2748 Listdlls64.exe 2748 Listdlls64.exe 3232 XPPenWin_3.4.13.231129.tmp 3232 XPPenWin_3.4.13.231129.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2764 PenTablet.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeDebugPrivilege 4112 taskkill.exe Token: SeDebugPrivilege 3936 taskkill.exe Token: SeDebugPrivilege 2748 Listdlls64.exe Token: SeAuditPrivilege 5108 svchost.exe Token: SeSecurityPrivilege 5108 svchost.exe Token: SeLoadDriverPrivilege 2792 devcon.exe Token: SeRestorePrivilege 1944 DrvInst.exe Token: SeBackupPrivilege 1944 DrvInst.exe Token: SeRestorePrivilege 1944 DrvInst.exe Token: SeBackupPrivilege 1944 DrvInst.exe Token: SeLoadDriverPrivilege 1944 DrvInst.exe Token: SeLoadDriverPrivilege 1944 DrvInst.exe Token: SeLoadDriverPrivilege 1944 DrvInst.exe Token: SeLoadDriverPrivilege 2556 dpinst.exe Token: SeRestorePrivilege 2984 DrvInst.exe Token: SeBackupPrivilege 2984 DrvInst.exe Token: SeRestorePrivilege 2984 DrvInst.exe Token: SeBackupPrivilege 2984 DrvInst.exe Token: SeRestorePrivilege 2984 DrvInst.exe Token: SeBackupPrivilege 2984 DrvInst.exe Token: SeRestorePrivilege 2984 DrvInst.exe Token: SeBackupPrivilege 2984 DrvInst.exe Token: SeLoadDriverPrivilege 2984 DrvInst.exe Token: SeLoadDriverPrivilege 2984 DrvInst.exe Token: SeLoadDriverPrivilege 2984 DrvInst.exe Token: SeLoadDriverPrivilege 2984 DrvInst.exe Token: SeLoadDriverPrivilege 2984 DrvInst.exe Token: SeLoadDriverPrivilege 2984 DrvInst.exe Token: SeLoadDriverPrivilege 2984 DrvInst.exe Token: SeLoadDriverPrivilege 2984 DrvInst.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3232 XPPenWin_3.4.13.231129.tmp 2764 PenTablet.exe 2764 PenTablet.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2764 PenTablet.exe 2764 PenTablet.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2764 PenTablet.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 788 wrote to memory of 3232 788 XPPenWin_3.4.13.231129.exe 82 PID 788 wrote to memory of 3232 788 XPPenWin_3.4.13.231129.exe 82 PID 788 wrote to memory of 3232 788 XPPenWin_3.4.13.231129.exe 82 PID 3232 wrote to memory of 1964 3232 XPPenWin_3.4.13.231129.tmp 87 PID 3232 wrote to memory of 1964 3232 XPPenWin_3.4.13.231129.tmp 87 PID 3232 wrote to memory of 4592 3232 XPPenWin_3.4.13.231129.tmp 88 PID 3232 wrote to memory of 4592 3232 XPPenWin_3.4.13.231129.tmp 88 PID 1964 wrote to memory of 4112 1964 cmd.exe 91 PID 1964 wrote to memory of 4112 1964 cmd.exe 91 PID 1964 wrote to memory of 3936 1964 cmd.exe 93 PID 1964 wrote to memory of 3936 1964 cmd.exe 93 PID 1964 wrote to memory of 3128 1964 cmd.exe 94 PID 1964 wrote to memory of 3128 1964 cmd.exe 94 PID 3128 wrote to memory of 864 3128 cmd.exe 95 PID 3128 wrote to memory of 864 3128 cmd.exe 95 PID 3128 wrote to memory of 864 3128 cmd.exe 95 PID 864 wrote to memory of 2748 864 Listdlls.exe 96 PID 864 wrote to memory of 2748 864 Listdlls.exe 96 PID 1964 wrote to memory of 4352 1964 cmd.exe 97 PID 1964 wrote to memory of 4352 1964 cmd.exe 97 PID 1964 wrote to memory of 2228 1964 cmd.exe 98 PID 1964 wrote to memory of 2228 1964 cmd.exe 98 PID 1964 wrote to memory of 564 1964 cmd.exe 99 PID 1964 wrote to memory of 564 1964 cmd.exe 99 PID 1964 wrote to memory of 2984 1964 cmd.exe 100 PID 1964 wrote to memory of 2984 1964 cmd.exe 100 PID 1964 wrote to memory of 3688 1964 cmd.exe 101 PID 1964 wrote to memory of 3688 1964 cmd.exe 101 PID 1964 wrote to memory of 1592 1964 cmd.exe 102 PID 1964 wrote to memory of 1592 1964 cmd.exe 102 PID 1964 wrote to memory of 2624 1964 cmd.exe 103 PID 1964 wrote to memory of 2624 1964 cmd.exe 103 PID 1964 wrote to memory of 640 1964 cmd.exe 104 PID 1964 wrote to memory of 640 1964 cmd.exe 104 PID 1964 wrote to memory of 4820 1964 cmd.exe 105 PID 1964 wrote to memory of 4820 1964 cmd.exe 105 PID 1964 wrote to memory of 3668 1964 cmd.exe 106 PID 1964 wrote to memory of 3668 1964 cmd.exe 106 PID 1964 wrote to memory of 2716 1964 cmd.exe 107 PID 1964 wrote to memory of 2716 1964 cmd.exe 107 PID 1964 wrote to memory of 5060 1964 cmd.exe 108 PID 1964 wrote to memory of 5060 1964 cmd.exe 108 PID 1964 wrote to memory of 224 1964 cmd.exe 109 PID 1964 wrote to memory of 224 1964 cmd.exe 109 PID 1964 wrote to memory of 2992 1964 cmd.exe 110 PID 1964 wrote to memory of 2992 1964 cmd.exe 110 PID 1964 wrote to memory of 2780 1964 cmd.exe 111 PID 1964 wrote to memory of 2780 1964 cmd.exe 111 PID 1964 wrote to memory of 4400 1964 cmd.exe 112 PID 1964 wrote to memory of 4400 1964 cmd.exe 112 PID 1964 wrote to memory of 5108 1964 cmd.exe 113 PID 1964 wrote to memory of 5108 1964 cmd.exe 113 PID 1964 wrote to memory of 648 1964 cmd.exe 114 PID 1964 wrote to memory of 648 1964 cmd.exe 114 PID 1964 wrote to memory of 2444 1964 cmd.exe 115 PID 1964 wrote to memory of 2444 1964 cmd.exe 115 PID 1964 wrote to memory of 1932 1964 cmd.exe 116 PID 1964 wrote to memory of 1932 1964 cmd.exe 116 PID 1964 wrote to memory of 8 1964 cmd.exe 117 PID 1964 wrote to memory of 8 1964 cmd.exe 117 PID 1964 wrote to memory of 4284 1964 cmd.exe 118 PID 1964 wrote to memory of 4284 1964 cmd.exe 118 PID 1964 wrote to memory of 3864 1964 cmd.exe 119 PID 1964 wrote to memory of 3864 1964 cmd.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\XPPenWin_3.4.13.231129.exe"C:\Users\Admin\AppData\Local\Temp\XPPenWin_3.4.13.231129.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Users\Admin\AppData\Local\Temp\is-L5FBC.tmp\XPPenWin_3.4.13.231129.tmp"C:\Users\Admin\AppData\Local\Temp\is-L5FBC.tmp\XPPenWin_3.4.13.231129.tmp" /SL5="$401D6,29570376,243200,C:\Users\Admin\AppData\Local\Temp\XPPenWin_3.4.13.231129.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-FL9H0.tmp\EndWintab.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\system32\taskkill.exetaskkill /f /t /im PenTablet.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
C:\Windows\system32\taskkill.exetaskkill /f /t /im PentabletService.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3936
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c listdlls.exe -d wintab32.dll /accepteula4⤵
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\is-FL9H0.tmp\Listdlls.exelistdlls.exe -d wintab32.dll /accepteula5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\is-FL9H0.tmp\Listdlls64.exelistdlls.exe -d wintab32.dll /accepteula6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Listdlls v3.2 - Listdlls "4⤵PID:4352
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:2228
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Copyright (C) 1997-2016 Mark Russinovich "4⤵PID:564
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:2984
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Sysinternals "4⤵PID:3688
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:1592
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Error opening System(4): "4⤵PID:2624
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:640
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Acceso denegado. "4⤵PID:4820
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:3668
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Error opening Registry(92): "4⤵PID:2716
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:5060
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Acceso denegado. "4⤵PID:224
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:2992
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Error opening smss.exe(356): "4⤵PID:2780
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:4400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Acceso denegado. "4⤵PID:5108
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:648
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Error opening csrss.exe(444): "4⤵PID:2444
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:1932
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Acceso denegado. "4⤵PID:8
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:4284
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Error opening wininit.exe(528): "4⤵PID:3864
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:520
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Acceso denegado. "4⤵PID:3808
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:2412
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Error opening csrss.exe(536): "4⤵PID:5080
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:4492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Acceso denegado. "4⤵PID:4136
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:544
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Error opening services.exe(668): "4⤵PID:784
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:2544
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Acceso denegado. "4⤵PID:3400
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:3768
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Error opening svchost.exe(2924): "4⤵PID:2820
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:1132
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Acceso denegado. "4⤵PID:716
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:1948
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Error opening sppsvc.exe(4752): "4⤵PID:2960
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:4572
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Acceso denegado. "4⤵PID:1992
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:3932
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Error opening upfc.exe(464): "4⤵PID:4788
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:2484
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Acceso denegado. "4⤵PID:1420
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:4992
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Error opening svchost.exe(2884): "4⤵PID:4076
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:4800
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Acceso denegado. "4⤵PID:2196
-
-
C:\Windows\system32\find.exefind "pid:"4⤵PID:932
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\is-FL9H0.tmp\PSCC.bat""3⤵PID:4592
-
-
C:\Program Files\Pentablet\64\devcon.exe"C:\Program Files\Pentablet\64\devcon.exe" install XPPenTablet.inf XPPen\PenTablet3⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Program Files\Pentablet\driver\64\dpinst.exe"C:\Program Files\Pentablet\driver\64\dpinst.exe" /sw /se /f /lm /sa3⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:5108 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{6154b4c3-0a4e-b441-8295-dadf2dcda11c}\xppentablet.inf" "9" "4c3013c77" "000000000000014C" "WinSta0\Default" "000000000000015C" "208" "c:\program files\pentablet\64"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:220
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "ROOT\HIDCLASS\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:b2fe48187df79a23:XPPenTablet.Inst.Win7:6.1.7600.16385:xppen\pentablet," "4c3013c77" "000000000000014C"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{8cf26207-9db7-fc4a-8a0a-cbdb869bfcd4}\hanvonugeemfilter.inf" "9" "4e3e7d867" "0000000000000174" "WinSta0\Default" "000000000000014C" "208" "c:\program files\pentablet\driver\64"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:3388
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "211" "HID\PENTABLET&COL01\1&2D595CA7&0&0000" "C:\Windows\INF\oem4.inf" "oem4.inf:ed86ca113d4f58de:hanvonugeemfilter:14.27.40.873:hid\pentablet&col01," "45f95b4db" "0000000000000164"2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Program Files\Pentablet\PenTablet.exe"C:\Program Files\Pentablet\PenTablet.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5a2ed483f0d9c9a3537464538a3cb7de5
SHA1bbc57de686531dd9f7a650832a41639bae2abc1f
SHA256df2ab5de04ed3fc3ec00931dadb447a011cb493b91d1ca2789bc2b70ce1e172b
SHA5128535848ee0e1ba2ce827c87f3852c0477f53463a61c6bd7e521c43d7505ef5dcb19e7ea99ffe358e0cea7f155c9e59ccafedc8aece2a3aa01046b400a3cbf477
-
Filesize
88KB
MD5f44245761bcf718a534974b431b8ce5c
SHA1ee9ddb20529b1dad55383d9209d4d5c35c152571
SHA2560a15d33b2994e5eb25ab9747e1214b078348529a735d342f3fa5fdb64b6cd312
SHA5120b58cc6353d9cdb39c83c0f97444d66072eea9fdf19b835116e58cff3d195da4cf05f25fe57da0962aafa35dc6bf0fe35350b87c39c8f2e440615b766652af87
-
Filesize
1.1MB
MD59ad3744bd50c4b0fcad3fa14c41c3222
SHA14a4fd743225f9266272f69e11dfe1cccd7a10a4d
SHA2561f83c5ca6e0df700c8480ab2eaba1452725d7a3f2f80169da21dc4297e3b6241
SHA512ca93988cd29a4b2186cec5623946d26e8640e37b39fe13165cc5bdb60ac83cb4bcbf501e0c04812ef36df34eb6fabad04cb1a3487f3897e6264eb00cab728bed
-
Filesize
4.6MB
MD590cf6c6da71197f649b23ca9e5e4b82e
SHA1c5156c6afcddddecded540d745ff1f60ad5a6f4b
SHA2568390373c6494541c26bcf675af7f7562fd470103ba9874292ad08117d7d5b07d
SHA512c83edd7cea7a4cb4af074c3aa4d223b7d7ddcb1be2db25c046b1521b1270df1127549863f03ddd5aae64087abffec5a95d15e380e5fb89515b0e8236b2159991
-
Filesize
4.7MB
MD560d7281f7e93353e695a9f97056c8f92
SHA14d51b52529c9f8ec9cd2544372bb3b0e6d05ddc4
SHA256c439af5ad0e2137bcff0d04358aefbbc97a06021d17e6f68010db77adcc8be6f
SHA512d259b6c00b3907e6ffa31d5ba16482c5fdb0a9e54c3bd871a2c26be3456cb2bf7a2ebd2f4cc9240920767ccf36a88acd9a9d42ef6aed4ddcc299a44b21eccd33
-
Filesize
908KB
MD5cfb21ebd31904c906973137b0b6d874f
SHA153df05bbb6a34f85e069717cbee962ba40c5dcd3
SHA256154a094904d19d65a6658b8cb4151c75838d9dfcb1a3dc15ec9b1bdeaa0d60c6
SHA512ee2a19a3cc9e7e1d72812fe8a707d8f3991fd2e803a090960eaedfae2c1f8d808200466d5de7fe8922b423cc034f6747b981509b75da7099b510991b9bd028f0
-
Filesize
4.3MB
MD5dcee54a4e49f6f76be095a979af3f5c5
SHA194e432ea51b35dc8631792ea248d30f53f63f9fc
SHA25663edc89171123e5d3057bdb3da405a460d510e3196fe33bf5cc4a920fa5b8402
SHA51267f8a56d0075dc71872f1202763b297ab85b5791e2a71c3b47e139b31b6eeecf99fbe9f6a6ac92d00d75297aecb7a2b0bb05ee0d410fa8181b5ecfc97a0b6281
-
Filesize
146KB
MD59111a9db7182f5c4cfd6a3e457433ab7
SHA10736e2633be72ece5cc0cb1cccd4421a1487e641
SHA256cd26597f149a36e9f6989ffcbd7c47a4aec1fa5fd599050b8000d96be5d93321
SHA5124dcb52846bc4aa5d7545cca09c973ee056cf28c459e84a74785ec5ecba4b1eb64f564e571f444e30b49e5dc0bd533400957e1e9ecccb3abe21fd7baaad945341
-
Filesize
272KB
MD5d9ec524f30c0c319aa17ee4edc84bc8d
SHA1c37dc8c4d1fcf41e0de96d5b6b6a01bd7d69a243
SHA256983f795203c51170031399813e31d127ecb7f7a7896e1f6340650d2d02dc1901
SHA51202781766d541a89c945af1fbf3a6abdba181d6888be4eab3b69311f79beff89eeac54aeac3ff07371f972a611ae7e96504a1cd47ff45e555e3ee1b8736254cf2
-
Filesize
81KB
MD5a2523ea6950e248cbdf18c9ea1a844f6
SHA1549c8c2a96605f90d79a872be73efb5d40965444
SHA2566823b98c3e922490a2f97f54862d32193900077e49f0360522b19e06e6da24b4
SHA5122141c041b6bdbee9ec10088b9d47df02bf72143eb3619e8652296d617efd77697f4dc8727d11998695768843b4e94a47b1aed2c6fb9f097ffc8a42ca7aaaf66a
-
Filesize
176KB
MD50ef9860097c00460c69b862b72b77377
SHA178f0d053855f9979a1990d677ba9428ac799611a
SHA2565e9d1c3241b18e741bcb430a6ffb64cdf133decaf4ba6049a4a0750727262df1
SHA512d634a7526cca0c7f251112d93b81de59cb8059506bb82842284659f929d405773a8358ece7ed94082a3ab7a961e990c70c976743374d28d9d70705121da6f562
-
Filesize
140KB
MD5dfb4e207ec20cb65d7e3330d50fe34ab
SHA1ac7585e389c289cfd7effe9f14e59724265663a9
SHA256c0bb227a8b85a92de964ec1cfdaedfad54dc9d56376b6d99927e8199c17e4475
SHA512396e9eb78eafa81c2c62e04179292f3b3b74c6b16623be70f62b23f3eb5b6400889f8c4f75206e8746c5efbe7ae18ad528a407fa92365696d75f4e6ff0c05c2d
-
Filesize
2KB
MD59fe4aa25a05e015b5d36005da3108241
SHA11837b19eef732b62d7284cf7c420140c2de50cdb
SHA2566000975ac5d7f6361adb98fb1781df7bf5bdfaaf6e42b3b28b68256f27b20ea5
SHA51264b62c2b99a89dfaf24e3a584280e3d5c18a847362c7b6328fb590c10859226b17307edda8e7f1a47b395bb49a809172736314f8699ea6c7c9afeb6b06024cb3
-
Filesize
1.0MB
MD5be3c79033fa8302002d9d3a6752f2263
SHA1a01147731f2e500282eca5ece149bcc5423b59d6
SHA256181bf85d3b5900ff8abed34bc415afc37fc322d9d7702e14d144f96a908f5cab
SHA51277097f220cc6d22112b314d3e42b6eedb9ccd72beb655b34656326c2c63fb9209977ddac20e9c53c4ec7ccc8ea6910f400f050f4b0cb98c9f42f89617965aaea
-
Filesize
429KB
MD5d25c3ff7a4cbbffc7c9fff4f659051ce
SHA102fe8d84d7f74c2721ff47d72a6916028c8f2e8a
SHA2569c1dc36d319382e1501cdeaae36bad5b820ea84393ef6149e377d2fb2fc361a5
SHA512945fe55b43326c95f1eee643d46a53b69a463a88bd149f90e9e193d71b84f4875455d37fd4f06c1307bb2cdbe99c1f6e18cb33c0b8679cd11fea820d7e728065
-
Filesize
1KB
MD57ea47ed54747036e41a62026de56a1f8
SHA153ae143706dbdd7f93052cead30d88b6fcd67055
SHA25645158a0042b2fcd325633a896256be8e94c35b852e8c671197709ab13fbd05e4
SHA5123ac7bf0a96ff09a5085d763daab88e3ed274202e4baa1c15e27c925d7d5a0d0e02ed0f858eff1bc1ce0450fa79fefa96e1b8912d3d6920c2d32343fe247b666b
-
Filesize
482B
MD5aa9693d32653eaa7181228624b2dfd57
SHA19c9833ca082b288040ff6880471603fa90a4b64d
SHA256d9fa3ad5a5385b7b5bdd1c314e06983ba324421bc72e595f820daa32882543ca
SHA51263ad5c283db43fe06aac71d12fcf688002aa9fc3e6457525f9c3ac42e542d8a4d43af0035768386d722994023d5920b1796a7d448c532b75a8c52ce650b5972d
-
Filesize
414KB
MD560a2331a2b28968585c7c7229d2424a8
SHA1fbac538166d61b4f10db934bd4bc1b86c81e56fb
SHA256b0f6800b2bb4c86e091120e9087c75f9b1b3e46b89cf65744d65cf5ab01fd385
SHA512159542a30195f58a6957d70282bd2dff79708bd2228ebebf7db48e25d80e68ea17714b518a029d2e21acf564d37982b43850249c944e99ce1b38864ffa00b009
-
Filesize
215KB
MD58336396d50dcc9d5a5f66b078a8460dc
SHA142bf0bb282512e4c638b8f03617dd973ee09afd9
SHA25629d23bc492e48a5ae68444302d3430e07d08e04278d53aa70d9367d9cf8bceb7
SHA51208f34405f8d5ebf695391f9cb1deb6eb22b318b698ce9540d37eae45d36476a96d379e9f338c64d5f2f3e9674751bdb7f3661845530605b8fb1eb14ee91702e2
-
Filesize
5KB
MD59f58c6d0c2df352780fc4960e5a4be68
SHA101849dbb5c2481634da0591bd3b5afced38fd741
SHA25625c48326d60c85f597ffff9b3a372dc2f1abf6d2b0e2c6f1e56a661d56783fe5
SHA512439eced46752714fe85ca5b9b933204a2fe3bfb4582c1d2945f36524b967efae7949e7ac124285fff65173d379b4d16df148422093c6da23f6fb3b90fd24fa3b
-
Filesize
20KB
MD520e203c37ee4bcf269482351ba932161
SHA1e5d38f4b243802ed3666874508836ce1cdef7b48
SHA256603153d8a66c6856a754bb193e6913b2b17b204ad95bef7b377254d58e0badbd
SHA51284e13d72fc08cf7f310f36b3496445efe84c93e4e3ef41cf7bab63d3dd26edb0f8a7da6a475b304a4e68a8fd7d852fe85b55d023fef34f6cc20bd8b63392ad3b
-
Filesize
100KB
MD510796dd63de1d7fe06822f172d0ed018
SHA16a9030bcf1498a64451da741ef35410f126ba49e
SHA25607194a18039307426562a91524a1cd87a6bda93e7f2479d73e648d6217dbac25
SHA512a2f13f5bdb11fd3fc334d3149aec232fa0737aef0daddecbc2fcc6353ffe3e2a5a4d35a77bba777c1ee5cf7642afc38a09614f4e8f5dfed0e819de4862844334
-
Filesize
35KB
MD50177746573eed407f8dca8a9e441aa49
SHA16b462adf78059d26cbc56b3311e3b97fcb8d05f7
SHA256a4b61626a1626fdabec794e4f323484aa0644baa1c905a5dcf785dc34564f008
SHA512d4ac96da2d72e121d1d63d64e78bcea155d62af828324b81889a3cd3928ceeb12f7a22e87e264e34498d100b57cdd3735d2ab2316e1a3bf7fa099ddb75c5071a
-
Filesize
1KB
MD5534089c776bc92e993af7e368aae385c
SHA1e4f22f7f2d42426fccc374095f527df253e8f223
SHA25610e841f828b1f7f431b2ddb365a7f3bbf2eeeab31ea1055cded0a4313b7599f8
SHA5125d87bde5bd52b5d0f3323f67568820edd2ffdef607bf8996ee7656e03bd8be8ade6243e13cfd0a9e6c729089166bb6966dba132552160e374844e26d948329d6
-
Filesize
3KB
MD5174b07ef2ae13cd5a5ab5c98614b103d
SHA15f306f5f76dc716d0ddb0cbdfe16d3095b414f3e
SHA256b28e0f0c69ebfce0aa58855f4025bfbfb5d5b9db28d3827540aee6b15fe35ec5
SHA512d77dc378c0842935a84cd7bbb87f6e7f1d6ef72611406391039026efbdff560690a6f1462c1119c0622e0c7024131229ffbea7385bccb3bf5c18f9d709d4a2c0
-
Filesize
2KB
MD5d1e3352e50f72bad50fd132916ced4d1
SHA141003a5584567af79e026a1151de6b3bfbc6846a
SHA256e41b99177ec33b2f792e0e62e7c16d697bfb2c48e11355145bfc861f17c7285c
SHA5127d1a90c24e24443f6b68ba5e1cdd1eedc788d421d98dcded50857add8c12ef4d512b2a3e28c41f870807c0133d5eeb9f75a5ff04b4d6c98282ef1b0d07960a2a
-
Filesize
63KB
MD51c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
Filesize
3KB
MD513bc4cf9f38031e6411f8b99abc3a97b
SHA109e83215fa4bd8d454ad7ad0e1ac26fe9aa2a7d2
SHA2561dec34489e9c0ff777aacd3903bbccafca5ff2d90217de33d4461765c98e322b
SHA512962c1cf40f2c7ce57b7df432b3bd431c69a79b575395c6c6868c7fdb9dc3d78c8050c17e55dd84dd2c41ee0d3e830e4d4446e5c672260617484b812ae41f5695
-
Filesize
580B
MD5c7fcf667cc9ab8db58bc5414abea6c43
SHA1c360b4368e448323b2fc08c8e9e6ff7dbaa67a1c
SHA2569e2d7b0221c314d4e6a57a95c18a36a812dbfe69699135195425c76f585e0cf2
SHA51279bbf5c3c432e7007c3d4a339f5650dc0b24793ce94e6ad637ef3fa4e1b865c05e0fcba49274c19b5cd5d62a0ef5ecac839f5cd38c27202463f21e0faeac972a
-
Filesize
1KB
MD5078b75c0a8fa8985e3f53ae93f47e1ad
SHA143c1764265a799159086d8b65bacc89bc8c09db0
SHA256c3c8d47b23ed1f1c83f127fdddb0d5eceed49b0093519a8d380a584f2d56766b
SHA5120335de5fd69067976816f0aa1e56c66659cd9e0af7bcbd1bc68fb24ca556bb0a68cb8480b1e98675dade0cdd6099ed3bfb70325a98e672420a976c58e618e436
-
Filesize
2KB
MD58f2e387abeb395e9c522fc6335cc5260
SHA1fd8ca1e505fb7f19ba82ef37991d8736b2250e12
SHA256a4acc8052a83451c134f3aac53c2e127e688cb0a79e40103ce5d30df6c3b5b32
SHA512d8e6e8dfc761d6b40fbab1c38519167da14cacf2ba6f98460c1fa528768648b3094532a12302b2522b4f1512c659278241074647dd2e1292d9a2d52185d09a99
-
Filesize
1KB
MD5913fa36eeb162a71a7e67b67ee961cb6
SHA11cb8236a13f50dff258952e9247abbd25d338a27
SHA256de87b27d9791ddcb9e17c0fee10b5e0183c056e9d9f5688f26d067869a91dfe3
SHA5121656fd8b653baa1e85063f12f01b31d4ce37bb6dcb44b677957f8e747eb266a3687fa229ad0c244a30032474da5451dc8494f2739df5825f75a820c71638e265
-
Filesize
1KB
MD5783830fae37797be4cc7da458f4743ef
SHA1299d5e6c6dd37d1896093a08ce8848000e45262c
SHA256faea15d0bd60f1f03aaed420b0ddeee81d63aa5106d1f21f735a949673137772
SHA512d0e3dcaa63ab7ea8e7696f36ec21aa339a95197db7f777b4310e3c21f0703b64d22c0864139c68a3707043d252577b3aca9453bdf69967923d34d8da227ba245
-
Filesize
1.6MB
MD568776ba968510663851ac80597e0e7a1
SHA18d7f075507dcf7009b4b5fbddf26961698a66bf0
SHA25660b1768fe5b088637619a1856e85bb4ce82cd7b7d25c3446c7d0fd92842e9076
SHA5127c391541ad9dc0e8f329ee90ff51f1e9d3216171ec71aa0304460f6f071b8fcbdf67062bff09987e453c5518226c1f150930d01b360ad7a60f5ed22aa0acb6ae
-
Filesize
1.6MB
MD54da5da193e0e4f86f6f8fd43ef25329a
SHA168a44d37ff535a2c454f2440e1429833a1c6d810
SHA25618487b4ff94edccc98ed59d9fca662d4a1331c5f1e14df8db3093256dd9f1c3e
SHA512b3d73ed5e45d6f2908b2f3086390dd28c1631e298756cee9bdf26b185f0b77d1b8c03ad55e0495dba982c5bed4a03337b130c76f7112f3e19821127d2cf36853
-
Filesize
10KB
MD5f161bf4c1ac6b26ee946c9a3bf916ffe
SHA11263f2a5975864d703afb7f15d0d2e47499dde2c
SHA256b77c9daf31df08ff29c03b26071c282f21860a69406f6f809fbf0e7793f394fa
SHA51285b3b617b524f20c8bff678f689232bf517faa5aa53a6611c7b07c9ca87c5f3029d82ae141c2cc00444ea1a7cd89b2fcb76cddffb97d5bb5f00946314f48cd44
-
Filesize
9KB
MD5065e4ba1ef63b6d6d073ce77821e0e06
SHA156d0b1f479a1e9a00d49a2283150456424acfc14
SHA2565b4c234d27f71931ea1ca91355ca9834a6c0cd95c1e935bfdce03b418fbee2ea
SHA5127dbc3a1f7d7623eb9e884d90c749a21f325341efa71320332c079770c5876458e6a83969dbe5ace9510a54eae495c4f0ca8d6ba1d40968d514a1996fa644a3ff
-
C:\Users\Admin\AppData\Roaming\Adobe\Adobe Photoshop 2020\Adobe Photoshop 2020 Settings\PSUserConfig.txt
Filesize40B
MD5f964a6935fd7d756d0748478ce379a48
SHA1f1fc5974d11b865a618877320bf550a02c6ba395
SHA256d9554821d24574b452300af92bc6ef720fa76d8b0b632423c44d8741697e60c9
SHA5122c05647c46623b7810db735ab807cc34490a3b3421c13620dabbb49cabbe0d817ac1d9e635b01e9e780d96dce8c9cfca745c08d07a21f7a667b7c9392f71635e
-
C:\Users\Admin\AppData\Roaming\Adobe\Adobe Photoshop 2022\Adobe Photoshop 2022 Settings\PSUserConfig.txt
Filesize20B
MD5e6c449d0fc7f55bb10968af88cbc7698
SHA1a24d8af137487ee7a981da80e0238a99d81d681b
SHA25639d07398585b012560a9d88c43388ae9c972c309167aa621d7714c3775559968
SHA5124e1897f596c7abada75843dcf27c59a9fc499529b1bba9d63f8734b5309bedcad58f2f196aaaba281a7d31fa2e87cba0f17bc80d0229a7d47d845b9e989974de
-
Filesize
22KB
MD53850aff62a8fe5565503ef6059a60e0b
SHA14bf2b9bc8a5f3adec33819bfceebf9648caba034
SHA256826d8aa70bbb0ad3e3179b7007f15406aaea5bad86f32e8569e48a7d53a0d4d0
SHA512322eac6e686659251ddce8a140a82bf6c268ad92e050f39ab6237b7eb85fba83ad920d5b09504348224664d2044083b59866edc0bc7dae7402e9694c2ea2e62d
-
Filesize
22KB
MD51956338489936b1b522d25f6c1d13154
SHA14ec0b84a3cc853f74bda97d05578c763588f481e
SHA25629f2fcf59d2c9f24bed4001516203221d1667aec45044bf6b00cfdb044effc19
SHA5123cd77721dae0e4d21ae92c48da88bb5c67b19c12b888985ab4d4f68ddcbfba498b87e60a88a6f5b88ccd2a777b1220fe64c12523967dd743a20bf404f321e779
-
Filesize
143KB
MD58e20fea7d14df7bb6254d5c4a149b0d9
SHA173f44e7c4e09d510da13c53e7b98d9dcb42cfa12
SHA256e1dd90ba8fd6885f41e427168bd3c4c52c41246993aa707429ded2763ac2c782
SHA5126876ae0efeeb2fa34a95d8e19da291cb812ba24aa11cd4345dbc825711671b267e4b1feaa5854fe4b83e1258e454fb076e9d7560bf651d26a0172847a72630e6
-
Filesize
1.7MB
MD5d2cc9c7825874f874597e740a6581b66
SHA14503b24a8fae7aa0e14ebb7b138e5df1732c90d0
SHA256399c80fd3eea9fc4365c4596012ac5adfcb786a190dd177e13d3dc9d83b95140
SHA512b14b4b58ff4d9d72eb52b3d381afd20c3a61b5e08e6bfbbb746a7fe41d9c45e7ecd5a003064609e93f4dc963a6a45691a7e95ad7319b8e79fe7d8b9d260671f7
-
Filesize
10KB
MD51636eb21da0a645ed8753ac17a4abdd2
SHA17abadaa5a94cb9ce03becc1f5217f33b6b8be786
SHA25691808a385ff816dc06fe14a0465fdf1669e61f530c11525b3783071b7fd0a85d
SHA512c75dc0a466f17f8716f32b22938b6bb43d33ba50715f959504c783c9c1edff7622e97942311e20d19f270b23dc9c1e4111c34e68e454451d45bee1638c6697c4
-
Filesize
7KB
MD5f1928f41c82ee87c3512c519b285a115
SHA1526d137427e83138f0b31a0d18986a0caddf76b1
SHA25640bbe73324701268c3f52551c2531552fa43421ef7db799c08200c303ddc2235
SHA5125d85b39d6e295e3baf1dd63d515c3e18a2d165483549ef1a7a8cdc78ed9cfed10e0e5acd8a8d60762bcffebb4c4c4ef5cf404a5f1f95a16a3f7523c85fdaa230
-
Filesize
11KB
MD544b7925009566ff6541bd00f155fbbea
SHA1f20c7672ce6bdec1fbf341e6322e9c6acd81df90
SHA256b833ea98aaa46b359b1e8ab9ecdcedccc921b93d48dfd36521b68017d0445921
SHA51205ec165b870162288f64133b78edde9fec7af91637c283c7cbbf1a6d5a8f99ebb5ffa1e4b4a78d6f00f1ed444d4023d4e208cffcad6a4e4a1e83394a099390f3
-
Filesize
6KB
MD5559d201d203e1b86c1df3b28fd53345e
SHA1a891f1b4db8b3128fafc67344e37b4abfcca2a07
SHA2560ed01aafce6532ba3cd19d025bfda37f6e8a06a5ef612c423f9dfa853580900b
SHA5125e2f0cf375665a12ee284ed27ca43b21edfd7c18c162dcd2acbd0a59022c2da31553ab0836817fa7790f102599b2e2c36142c6fa67ae2ab2ecf7ed2d20b767fe