Analysis

  • max time kernel
    238s
  • max time network
    248s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 10:32

General

  • Target

    ElitechLogWin V6.4.3.exe

  • Size

    63.4MB

  • MD5

    7aaee69074d8c03aa0dfb0de0bb6f8ba

  • SHA1

    2dc32552c909dbbfa25a92cc3a8b2b372aac04f3

  • SHA256

    16f68d5abd8acafac5e51e9059a49d323db62feff6d74e317cc1b2e1da8edd39

  • SHA512

    38fa4b9c8ae99b3069e91ae05b87792b90762793fbfb2fc2c1cb46fd3851e35882a3bfd9be6b6cbdccf2b51380ed8feeab38a7d9c7b582f27a0e451618a94a84

  • SSDEEP

    1572864:IiFi6zmDibtGrS4JklnG+l+Mp/KwSoe1h+58F:ICwAtpIh/F

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 18 IoCs
  • Drops file in System32 directory 64 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 10 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ElitechLogWin V6.4.3.exe
    "C:\Users\Admin\AppData\Local\Temp\ElitechLogWin V6.4.3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1172
    • C:\Users\Admin\AppData\Local\Temp\is-SQR8S.tmp\ElitechLogWin V6.4.3.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-SQR8S.tmp\ElitechLogWin V6.4.3.tmp" /SL5="$B01CC,66039552,121344,C:\Users\Admin\AppData\Local\Temp\ElitechLogWin V6.4.3.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1760
      • C:\ElitechLogWin\Drivers\CH341\SETUP.exe
        "C:\ElitechLogWin\Drivers\CH341\SETUP.exe" /S
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4064
        • C:\ElitechLogWin\Drivers\CH341\DRVSETUP64\DRVSETUP64.EXE
          C:\ElitechLogWin\Drivers\CH341\DRVSETUP64\DRVSETUP64.EXE \s
          4⤵
          • Drops file in Drivers directory
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Executes dropped EXE
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          PID:3084
      • C:\ElitechLogWin\Drivers\CP210x\CP210xVCPInstaller_x64.exe
        "C:\ElitechLogWin\Drivers\CP210x\CP210xVCPInstaller_x64.exe" /S
        3⤵
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        PID:4960
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
    1⤵
    • Drops file in Windows directory
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3164
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{378f6a56-b302-0044-b09c-cb0c7da26e83}\CH341SER.INF" "9" "4a0278e77" "0000000000000138" "WinSta0\Default" "00000000000000E8" "208" "C:\ElitechLogWin\Drivers\CH341\WIN 1X"
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:4924
    • C:\Windows\system32\DrvInst.exe
      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{0a0b68ab-a60e-d64f-92a8-b34486d1132a}\slabvcp.inf" "9" "43ef4524b" "0000000000000164" "WinSta0\Default" "00000000000000B8" "208" "c:\elitechlogwin\drivers\cp210x"
      2⤵
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:1788
  • C:\ElitechLogWin\DL.exe
    "C:\ElitechLogWin\DL.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ELITEC~1\Drivers\CH341\WIN1X~1\CH341PT.DLL

    Filesize

    38KB

    MD5

    060e5a252884fd5fa69576b506a5e0c3

    SHA1

    8cb306d9fa8498a3fd4c3ca3ab1477882606c471

    SHA256

    b5fbfefc6e8ba8d4fe571bfb46f48dc160c0427508d758eb54b827c9cd1a1968

    SHA512

    137ff2bdf0adee5b3c781c8c32f12c724d0de3f40cf492e54f030cd30bb8635aab1cfc889e67e104c88456aade098e2556f30309a3fdddc431070187cf807d43

  • C:\ELITEC~1\Drivers\CH341\WIN1X~1\CH341P~3.DLL

    Filesize

    55KB

    MD5

    7c40c2737e1a567b4e1fc62952bc90ce

    SHA1

    18bddb57c4b2f818dbca82e6bfd0e7547d6836f5

    SHA256

    1687b96846734b1e44f4581f90c0144962189847e78ef9151f025fe39de1d53b

    SHA512

    e0c820f0f3ebeb4cd787dc68844a95e5bc187d6542c7da9fcf6636b065443eeeca4c1c541d549eac57500629b0d021596c555efda86ac586272f8316d7ea9fe4

  • C:\ELITEC~1\Drivers\CH341\WIN1X~1\CH341S64.SYS

    Filesize

    72KB

    MD5

    bb4221657d3170f409f058690fd8da0b

    SHA1

    fcfecf503bab0801c7bfdd417a6ab4e0758d8177

    SHA256

    fa525d2f23bcd50f4da42b6c38a0d87e93feaff672a44083473ce19ec633b483

    SHA512

    771d5591f87a62e2d0e2e126f863a4e537ce7e4d7b347e6b29b21446923aebe7f15c41e5fa253600a3cbd50a3ffc44d21ab91d7d2f16f37b4e8258b5287de527

  • C:\ELITEC~1\Drivers\CH341\WIN1X~1\CH341S98.SYS

    Filesize

    47KB

    MD5

    37f0cacf04978f4f3166ed1510a98db7

    SHA1

    b62b0bba39abfe493d462bd409f2d31b4a2a4a39

    SHA256

    05ea22e94c933a16b283467bdd7af2c9f978e9c386bca5fec8ebe7255ea6b7fb

    SHA512

    41d5df8a26856c02f6333d364819f32e7eb9529de71fe1adee8a1fdfb44e1632c66403cd2adf00b50a51a7c149a9d4b6e36794eb789f4e41033062b10c7ce655

  • C:\ELITEC~1\Drivers\CH341\WIN1X~1\CH341SER.CAT

    Filesize

    15KB

    MD5

    09d2102bacd78c7c0a53f63e1ce3db07

    SHA1

    2f66b041a4fca2adfdf89f88a1de156cd330b67f

    SHA256

    20d39af89440a1c85016fb064ca49a40d92c874546cb4a0551023dcb64b85d51

    SHA512

    b0dd37814fb96378a8bf07b34a57d6501da54fd2e6a52d19f86ae88c6014c9f8c18491bfa6140ed552d50b0df54328b92e465fbc76738b48616c379df6bdcb74

  • C:\ELITEC~1\Drivers\CH341\WIN1X~1\CH341SER.SYS

    Filesize

    52KB

    MD5

    738ff3b21a5c8035ed431dde499b0edf

    SHA1

    fb0bb5d0da30b75966089c252c1638b52a9d2bd3

    SHA256

    26af8c3a4e2b648c0f0d096e5e052a454a2df2f5403500b8dfb8fd6a4979b4f6

    SHA512

    bee9064f6745639024fc456ebcb4aac9b87eecc05792b71b5c438a2b6e814e5cb3164c58e42b8bb42a64773c359370518b0c1982ad91b7d0272e8b0699fa03fe

  • C:\ELITEC~1\Drivers\CH341\WIN1X~1\CH341SER.VXD

    Filesize

    19KB

    MD5

    be7438420f1da854917f58cad557476d

    SHA1

    caf1095963459ab66326cdc7ecab29514938748f

    SHA256

    2a946f316edd7e1185deeafdc2de52b2d2843198be098a724233c12f9ccd0dae

    SHA512

    e35442704374a3b5e79bad491f819ac82ce3054ed50ae1eef0fc3acbb6d3016bdbcdd63902236e247cb4b8279ff8fec377afa2753ebdbca911d6d388d23a63db

  • C:\ElitechLogWin\DL.exe

    Filesize

    2.1MB

    MD5

    472f57535c755793a8364d7e652994ac

    SHA1

    e46d94c3bd5ee53016c4675f949e1cfce4055c9c

    SHA256

    0c020c5d631cf29de06564d006b5ac8ddca39e5ad42cbf2a10ccf891e7dbfb6b

    SHA512

    d63bfb37fdeeb6c01395ec5c74d8a4063a433e37ffae97ac22fd3dc676652e81cf508dfc2c7f89801a9f8c39ab824a94a2a2e7acb3ed2c44e2c4a36cf2c8335b

  • C:\ElitechLogWin\Drivers\CH341\DRVSETUP64\DRVSETUP64.exe

    Filesize

    50KB

    MD5

    39f706639a8e235bfdfe9735e178e6a0

    SHA1

    31ef237fa08e53753cb0934bdd36537f78cd1ee6

    SHA256

    707620e8c5c0e31f83a705b9dab5c30bd3f1dfd8f6e5698d6efd643ea5dafff8

    SHA512

    6a54cd71e04b42cbf8d30e6353188df7e301d1b479a2a3a3ba710ed2a870a2a2bf590904a0a1dff86162ad205a77f433f7c5600fe415f5e6af6c1efacb0495af

  • C:\ElitechLogWin\Drivers\CH341\SETUP.EXE

    Filesize

    88KB

    MD5

    3a5073fc9d6e4a7102a97e8a971ae6de

    SHA1

    1d0bc75a657aa4222687ed95309bfe9b69dbacf8

    SHA256

    2f6c540841884be0f61c9a63a83d4ce68f2648e0edd46af78b0f49f88c45f7f2

    SHA512

    45bce2080e6838adcbd94d66fe9916e265458e68504cb388299720e315a1f0146bd2dd7140a21298da8d2a686dabb2a5fc23e4f2c1c2fe7e5a0f103ae4328c41

  • C:\ElitechLogWin\Drivers\CH341\WIN 1X\CH341SER.INF

    Filesize

    9KB

    MD5

    56009741ad41557f3e809f1775bdf812

    SHA1

    466088ec3bc3a2ab757cbfcdc6e28992acf12a4d

    SHA256

    8ef3f56e2188549b0e10fe7f7e8aff2eba27435a0fc8b906671ffe926dd67340

    SHA512

    8abc61664b614f98042c357920516f8c7ca45448a64b45f12184f9cdac50dc1a020a50ab9f4ddffe03026b7f9ac84b9172fd56ff13dd62d5964402e675dae3d7

  • C:\ElitechLogWin\Drivers\CP210x\CP210xVCPInstaller_x64.exe

    Filesize

    1.0MB

    MD5

    be3c79033fa8302002d9d3a6752f2263

    SHA1

    a01147731f2e500282eca5ece149bcc5423b59d6

    SHA256

    181bf85d3b5900ff8abed34bc415afc37fc322d9d7702e14d144f96a908f5cab

    SHA512

    77097f220cc6d22112b314d3e42b6eedb9ccd72beb655b34656326c2c63fb9209977ddac20e9c53c4ec7ccc8ea6910f400f050f4b0cb98c9f42f89617965aaea

  • C:\ElitechLogWin\Drivers\CP210x\SLAB_License_Agreement_VCP_Windows.txt

    Filesize

    8KB

    MD5

    6278966b61720342cfff6aaafc433928

    SHA1

    a35f767628e87829ad380200995737d5b09aad32

    SHA256

    53039c416fac39940e6082e99c979c8f5639c5461adcf9d2a7e41a809cf32c8f

    SHA512

    704448c2c6f3ed22727a37e4fda583427f11ed4f6545dc22c2fcc7713c96f47a5fd69922209297fa6db0ac7ad7fa1819c88b862a79a4ff6c5892ac5b57941e18

  • C:\ElitechLogWin\Drivers\CP210x\dpinst.xml

    Filesize

    11KB

    MD5

    869039ea5bd8ac4d25ffe350e9dc617f

    SHA1

    81e319ac3df62b8e145f80800e13e04d2b9558ee

    SHA256

    baf20fde8e8283f6f21098aeed53d1d8b86c13a99e1816b594f8ce9d6fc83092

    SHA512

    6e12eafe54bef288d500220642fb5b0774cdd88da841dce9db674137f0ae8f1bf00589f031a4c235ba0f24b8a3ca04b051ad17a905d4e4b5093bb5eb909c2dd7

  • C:\ElitechLogWin\Log\NLog.config

    Filesize

    1KB

    MD5

    8885b88ef038eadcbbdde078d9267295

    SHA1

    509b836fbdbb17fb1882f29a4dee65a5c1dbade2

    SHA256

    ab9c24b0eb54f92713b8f2ae28e1e66abab4c52c661b386d128c1378e3b82193

    SHA512

    c73b2998c753f3953dba6dcdae13df25784b3cbd47b08372ce1c27aa93019de10f0189e05a6e75114df7a805c18dc3bd52370bc3657ce6222e0d848ffdaeea95

  • C:\ElitechLogWin\MarkControl.dll

    Filesize

    19KB

    MD5

    4e77d269a9af0d326ac0326df0fd92ca

    SHA1

    f9c7c23a3f3b4ed68db367d023db2a4a2a64a883

    SHA256

    ae20edd43d3e62bdd780816e21d696ab917076b7618b57d9f4ff515e66bc8229

    SHA512

    8130733d8fe303a207852e2d6b9c220cc2db7e3b62bc148bd0346dce4a7d19e414a8193ed284095bd3360909bcc5cbc297ba1041f5832cb66be008074d7cce4a

  • C:\ElitechLogWin\NGettext.dll

    Filesize

    40KB

    MD5

    d92437b05b2d2b745e2abbcfe125d726

    SHA1

    6d3242418d0e7cbdebecd1a47eb59558bff66bb4

    SHA256

    404aa253460521ef376156826cf0549549806e43ac168918fe1232d00e500601

    SHA512

    8941bd78ed6a3bb7a6c52c5a2a970c39992e1fe77b97c45560f68a946dd7fc4cbf17c6fac1adcb8f1801ee6af55a3577b6866f89c933d0a093c25f9c9b8ceb2e

  • C:\ElitechLogWin\NLog.dll

    Filesize

    590KB

    MD5

    f777533e9c54a5b5aeefd8353659fbfc

    SHA1

    2a0d9aff4a0b3a8e13ad0e3f3d659194e9d3bc72

    SHA256

    7164dae2b677907dd9f9ef37147bc2571d0a954a5c5a00f047c7f5c1c1b99de8

    SHA512

    85ce75b14b585bd8b37aedab6b0b3fe01c56b1de4ee0b507fe8fff7292c76ecfd8bd7519b6d6e98aa549f3394c628caf5b98ed78d4eccb4f1b5f0fc094fc4c4c

  • C:\ElitechLogWin\Newtonsoft.Json.dll

    Filesize

    513KB

    MD5

    07e04fd870cee6f9994921b5af243b7f

    SHA1

    0ea4611eeee3736963cb718132099624bfebf460

    SHA256

    52cc6ddf77990fbaaae4db593f655610652133ceeadb32262c122d8c9eea1bad

    SHA512

    4639a7f77f7a9cafa38c632332dd5085355623f3d84475374241a64bd110569f504086b479b519e90ddbd471d4a5034239418ebc03277424212e0e6698e64418

  • C:\ElitechLogWin\System.Data.SQLite.dll

    Filesize

    337KB

    MD5

    03311a06b7516b5a998f5966bd45088a

    SHA1

    dd560c6b59d8abfa88dcc6eb438e1e58e3d90bbc

    SHA256

    05d68a3cd4d52c268880b0c6bc32acea60fb674e9b72b1cad5c0d08600c3d021

    SHA512

    b4167f57f463396b0b24c44e77274ff077b673dec5179e65ba3f432ab180a511dd3a58e659eaedb48356d23bacf326b7e69ddbcadc4c371880f93a975a2613c7

  • C:\ElitechLogWin\System.Data.SQLite.dll.config

    Filesize

    671B

    MD5

    384dd2c6f11ffbebc4a8fd0f7d255c9e

    SHA1

    38e352300655ddd8eeccf45c1dafd5b8616f6cd2

    SHA256

    8a4a9908d893122d427354aa6e5973cae4165d175db3e3c48f7f37730c04d997

    SHA512

    1e71ad56475708be6cb24fb652853f4a815999928aa249e3dbdc50d124169ce19aec6d54935f9f1853a2cf7d4e65854a05582c3c870a1a03c7c68f81bbdc2d46

  • C:\ElitechLogWin\is-1MCUO.tmp

    Filesize

    1.5MB

    MD5

    ce98d3d6dc6eb93719c8c9de1ace584d

    SHA1

    b9762cca9217449bf41b5246c9a4b78d6fa5269e

    SHA256

    27a582847f943f83e1317af367ee22ac4e0ee063369ae889ad5753f8ed3c7ab0

    SHA512

    4a74c30831bb5e0be2d24043cbf3dc425869e2b6a0eddfa84ab98559f3e5e6e1a2a9bc2fc381935d6525cf459f169ad88eb5190990933717735ac9b64c5254fe

  • C:\ElitechLogWin\itextsharp.dll

    Filesize

    3.9MB

    MD5

    ca60cb8f0577e6e98134162d12bcc6b0

    SHA1

    40002fab71a25f1494a47c3206b4eb8c2e11f56d

    SHA256

    8f2c180b833ab7e36fbf69efd1e8bdf7afde2771c4d387da2d095229b4f29bd3

    SHA512

    8d9816e2d789e7fdcc4050658ca40d36af23ea55497f4e32ef549e407b39dfee96ca98cd0d0c423621c5007c55fdbde1d3f76e6f2b29a5dd3021dbd93fc5efc8

  • C:\ElitechLogWin\locales\en.mo

    Filesize

    41KB

    MD5

    9ec3e23e410e67f730fff898e867bf84

    SHA1

    76c3746ddc2312ce889451998825cacd6bbcce28

    SHA256

    4460eaae84604e1411d6fb88b3966ac9df557d9ab1c448f8e21ecb92f578f721

    SHA512

    f276a7cbd054b44655a49f4703ef25533da3bae90346af5c39595107892205b9ab1106b3287510e25429417db0642de455da7a7ab1416ba417ce6680d7ae7d4a

  • C:\ElitechLogWin\locales\is-K6H14.tmp

    Filesize

    44KB

    MD5

    0dcf23f826cafbf64865711740e17d88

    SHA1

    5aab06a9cb804f73f1c8e79d5df696f04e976ce3

    SHA256

    28b2574a120ec6090b980a07062e3ef7aca59b5cd1bf9100a03ee2ba3b1d060d

    SHA512

    33933c3dd96bbbcb9c235a0228d06f2fdeb9d4a5901cfe5ab18270a321eb2ea8c10901336e0652c3e39daf22bfb9723cec8d692ace5d70e8fe6f6e828fe8e8d3

  • C:\ElitechLogWin\x86\SQLite.Interop.dll

    Filesize

    1.1MB

    MD5

    5e99e9d7b9629bc21074718c1f974215

    SHA1

    4466e57c7b7ebf8450022888376bddce8f694b54

    SHA256

    8de21caa05e042e9b88bccd4cbcaf4805c457616f5989a4a75aa3f8e10a6b2fe

    SHA512

    7e93bea5ff1029c854f5928b6cd0d6a94a2688f17838217ed02b12cef20839b915b4c28ee3ec10a2b42a3b4913b9eea4ab3c1e278d36499c9936803aeedf0aa1

  • C:\Users\Admin\AppData\Local\Temp\is-SQR8S.tmp\ElitechLogWin V6.4.3.tmp

    Filesize

    1.1MB

    MD5

    90fc739c83cd19766acb562c66a7d0e2

    SHA1

    451f385a53d5fed15e7649e7891e05f231ef549a

    SHA256

    821bd11693bf4b4b2b9f3c196036e1f4902abd95fb26873ea6c43e123b8c9431

    SHA512

    4cb11ad48b7585ef1b70fac9e3c25610b2f64a16358cd51e32adcb0b17a6ab1c934aeb10adaa8e9ddf69b2e2f1d18fe2e87b49b39f89b05ea13aa3205e41296c

  • C:\Users\Admin\AppData\Local\Temp\{378f6a56-b302-0044-b09c-cb0c7da26e83}\CH341PORTSA64.DLL

    Filesize

    62KB

    MD5

    296618273185a983bd5b9e469af2d972

    SHA1

    95989164be63dfd95c829788400bc32cb84ad65a

    SHA256

    4dd21860b264a5c4b4040f19f6ee41b886704ef44da88bcadc5ec7060ebf9126

    SHA512

    bf6bca479bb5018d417ccaab20d881defbb154addb9ce073623fd4e9048f380a73db50967d871677023a74d2ffded3c0b2686f7972c55e25297a987fb1820380

  • C:\Users\Public\Documents\EDataLog\data.db3

    Filesize

    19KB

    MD5

    7ae1034c7c7e11afbd7f2e61a0acf043

    SHA1

    3bbb17fe83d6e8a6d7bf9ecfabc0452099e73022

    SHA256

    367fcfb6bd0d084c88a3d5f4a7e2a34492fb097c744d1da16e5d2d6b749f6d1f

    SHA512

    7a1ab7e8ada6524d9b63d58a07354a1631e9c9ba420de7cc3347ab8965ec7156e086dd70e83b857f811d030baed7f7fc0b3c80b2c18b4583ca560048715304e5

  • C:\Windows\System32\CH341PORTS.DLL

    Filesize

    50KB

    MD5

    15a6692948dad7bd3ac9ecf1c37d12d6

    SHA1

    cc81fd61a95b88e88926444a659d99b4a63b26d0

    SHA256

    4276870423fd58f605800bb97a1e41f82dbfadd8cac8279aed475972195c7073

    SHA512

    99a7670c11b29434e59dc022b95daec12d12220287a019fcf393cae95a785b996d37d9cd865bc781fd7d0898f95343a16856f99de7e2a87a5d1c0a7cafbcc2ad

  • C:\Windows\System32\CatRoot2\dberr.txt

    Filesize

    19KB

    MD5

    11200bf22b9066ca6dbfc23627f31160

    SHA1

    199211f3bf8e8ec953b5077f7e24212cfdc33c2e

    SHA256

    b004eb64091e53b70b17711c44e90693e843cb49077ceda3d1eef73f5c5b1115

    SHA512

    f4cb68775e6e25c704fb5e6b9b0eeaa1eaf04c6471db7740d5db2967b79a64c58f683094275a15e41a13a8a7270e8e1c9bfeaef8e338ea5433782a2b34880b76

  • C:\Windows\System32\CatRoot2\dberr.txt

    Filesize

    19KB

    MD5

    bd90adfb2cfc5706c888b8e9acafcb66

    SHA1

    131a77f19ed38f2110852f68c06052d89391fef7

    SHA256

    99712c0c9ae52c330266e9b78c424ce5377846eaab3bed6981a39378c89f0519

    SHA512

    1ad7b59dc97e4379f4f49b59f45fb854db80d86963e1db96ac8bc789f0e1ee11d48fe31d9d0dafd42b7558fd0a45aa810f1fdd57ed16e48c58211bf0f8621837

  • \??\c:\ELITEC~1\drivers\cp210x\slabvcp.cat

    Filesize

    11KB

    MD5

    befe6327722742cd1424b739bc8f5cfa

    SHA1

    c3f899399bf59e9890c654670b15e364628db4a9

    SHA256

    c135f73366aac8fe95fe3285d05a3efa76c0054df677bac3e308e7dc82a58bc0

    SHA512

    0e0158ff5c583714babd8ea0fcda4ab203a4ef747f57ae6bad2a4c5c866b8f183d592495b9281e85ccff589520942607bb7f412d641a25f3cd252f4df63067b7

  • \??\c:\ELITEC~1\drivers\cp210x\x64\WdfCoinstaller01009.dll

    Filesize

    1.6MB

    MD5

    4da5da193e0e4f86f6f8fd43ef25329a

    SHA1

    68a44d37ff535a2c454f2440e1429833a1c6d810

    SHA256

    18487b4ff94edccc98ed59d9fca662d4a1331c5f1e14df8db3093256dd9f1c3e

    SHA512

    b3d73ed5e45d6f2908b2f3086390dd28c1631e298756cee9bdf26b185f0b77d1b8c03ad55e0495dba982c5bed4a03337b130c76f7112f3e19821127d2cf36853

  • \??\c:\ELITEC~1\drivers\cp210x\x64\silabenm.sys

    Filesize

    23KB

    MD5

    8c61b219882c9c9eca09bedb82b0ddb1

    SHA1

    52a5af0aca9124c2ab39029761a7662adc8c5861

    SHA256

    711681040d9cd93d603f55ab8d62371f5d51917c14818f27859e23e2d60eb18f

    SHA512

    67ccdb25b31dcb5fa4fc900898b7078f3932fa74c7159f93e592e6dd3054526ed37328c8a8466f0987901d4d432ab9735439affdad5ffc4e9e4cf97253a54e54

  • \??\c:\ELITEC~1\drivers\cp210x\x64\silabser.sys

    Filesize

    77KB

    MD5

    2641655fad6c1ea0f3677978e2bf28c1

    SHA1

    09627d2aaf886e132136ad10c19282f809e06ca1

    SHA256

    e703ce74d09e901bf531589e181dcf95b9c63e09fe1b99e38dea9ee47ee458ba

    SHA512

    c024e241d8e9768d28b854d61dd41a8c61094c106c616742d81a7dfc4ba7c3ff27a2433456da952d193d34449a2e11374fac92ad008ce8c35b67a74ddc1192bb

  • \??\c:\elitechlogwin\drivers\cp210x\slabvcp.inf

    Filesize

    4KB

    MD5

    33ae925db013d95dd5ea91a9597a8020

    SHA1

    b97004a400e30dcf940971efa7a0c13c6b0a4b66

    SHA256

    9ae433c70b360cf6e1a4219bdc00014aed4257bcb64bf08cb85331e33ee63d85

    SHA512

    cdc40e9d91abb9ac9c897af70bb3b769f746b126ee3bc9a2b6981e0ad0a9ed7b362db4b8ae3efb8248e10bc913b708b8275f93f9ba90cd12543c761a16461296

  • memory/1172-1140-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1172-2-0x0000000000401000-0x0000000000412000-memory.dmp

    Filesize

    68KB

  • memory/1172-8-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1172-0-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1760-9-0x0000000000400000-0x000000000052D000-memory.dmp

    Filesize

    1.2MB

  • memory/1760-714-0x0000000000400000-0x000000000052D000-memory.dmp

    Filesize

    1.2MB

  • memory/1760-6-0x0000000000400000-0x000000000052D000-memory.dmp

    Filesize

    1.2MB

  • memory/1760-1139-0x0000000000400000-0x000000000052D000-memory.dmp

    Filesize

    1.2MB

  • memory/4776-1149-0x00000000080A0000-0x000000000813A000-memory.dmp

    Filesize

    616KB

  • memory/4776-1144-0x00000000057E0000-0x0000000005D84000-memory.dmp

    Filesize

    5.6MB

  • memory/4776-1157-0x00000000084D0000-0x0000000008556000-memory.dmp

    Filesize

    536KB

  • memory/4776-1165-0x0000000008FA0000-0x00000000095B8000-memory.dmp

    Filesize

    6.1MB

  • memory/4776-1166-0x0000000008A80000-0x0000000008AA2000-memory.dmp

    Filesize

    136KB

  • memory/4776-1167-0x0000000008AB0000-0x0000000008B2D000-memory.dmp

    Filesize

    500KB

  • memory/4776-1145-0x00000000052D0000-0x0000000005362000-memory.dmp

    Filesize

    584KB

  • memory/4776-1162-0x00000000085C0000-0x0000000008914000-memory.dmp

    Filesize

    3.3MB

  • memory/4776-1161-0x0000000008560000-0x00000000085BA000-memory.dmp

    Filesize

    360KB

  • memory/4776-1163-0x0000000008920000-0x000000000896C000-memory.dmp

    Filesize

    304KB

  • memory/4776-1175-0x000000000A660000-0x000000000AA44000-memory.dmp

    Filesize

    3.9MB

  • memory/4776-1176-0x0000000008CC0000-0x0000000008CFC000-memory.dmp

    Filesize

    240KB

  • memory/4776-1177-0x0000000008C90000-0x0000000008CB1000-memory.dmp

    Filesize

    132KB

  • memory/4776-1153-0x0000000008090000-0x00000000080A0000-memory.dmp

    Filesize

    64KB

  • memory/4776-1179-0x000000000A270000-0x000000000A3F6000-memory.dmp

    Filesize

    1.5MB

  • memory/4776-1143-0x00000000006A0000-0x00000000008BC000-memory.dmp

    Filesize

    2.1MB

  • memory/4776-1182-0x0000000008EF0000-0x0000000008EFC000-memory.dmp

    Filesize

    48KB

  • memory/4776-1183-0x0000000008F50000-0x0000000008F5A000-memory.dmp

    Filesize

    40KB