Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    71s
  • max time network
    74s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/06/2024, 11:52

General

  • Target

    https://www.avast.com/en-us/index

Malware Config

Signatures

  • Drops file in System32 directory 4 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.avast.com/en-us/index
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3616
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f8da46f8,0x7ff8f8da4708,0x7ff8f8da4718
      2⤵
        PID:4748
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,2773690911513364525,6436380430330050827,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:2
        2⤵
          PID:3272
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,2773690911513364525,6436380430330050827,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3648
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,2773690911513364525,6436380430330050827,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:8
          2⤵
            PID:3464
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2773690911513364525,6436380430330050827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:1
            2⤵
              PID:5048
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2773690911513364525,6436380430330050827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:1
              2⤵
                PID:4192
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,2773690911513364525,6436380430330050827,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 /prefetch:8
                2⤵
                  PID:3788
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,2773690911513364525,6436380430330050827,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4736 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:680
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2773690911513364525,6436380430330050827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:1
                  2⤵
                    PID:4184
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2773690911513364525,6436380430330050827,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:1
                    2⤵
                      PID:4536
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2773690911513364525,6436380430330050827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:1
                      2⤵
                        PID:5036
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2773690911513364525,6436380430330050827,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:1
                        2⤵
                          PID:2800
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2773690911513364525,6436380430330050827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2280 /prefetch:1
                          2⤵
                            PID:2316
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2773690911513364525,6436380430330050827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:1
                            2⤵
                              PID:3584
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2773690911513364525,6436380430330050827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4072 /prefetch:1
                              2⤵
                                PID:2460
                              • C:\Windows\system32\msdt.exe
                                -modal "262530" -skip TRUE -path "C:\Windows\diagnostics\system\networking" -af "C:\Users\Admin\AppData\Local\Temp\NDFC90D.tmp" -ep "NetworkDiagnosticsWeb"
                                2⤵
                                • Suspicious use of FindShellTrayWindow
                                PID:2880
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,2773690911513364525,6436380430330050827,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:1
                                2⤵
                                  PID:5256
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:4752
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:3104
                                  • C:\Windows\System32\sdiagnhost.exe
                                    C:\Windows\System32\sdiagnhost.exe -Embedding
                                    1⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5804
                                    • C:\Windows\system32\netsh.exe
                                      "C:\Windows\system32\netsh.exe" trace diagnose Scenario=NetworkSnapshot Mode=NetTroubleshooter
                                      2⤵
                                      • Event Triggered Execution: Netsh Helper DLL
                                      PID:5972
                                    • C:\Windows\system32\netsh.exe
                                      "C:\Windows\system32\netsh.exe" trace diagnose Scenario=NetworkSnapshot Mode=NetTroubleshooter
                                      2⤵
                                      • Event Triggered Execution: Netsh Helper DLL
                                      PID:3460
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k LocalServiceNoNetwork -p -s DPS
                                    1⤵
                                    • Drops file in System32 directory
                                    • Checks processor information in registry
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2280
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k LocalService -p -s WdiServiceHost
                                    1⤵
                                      PID:4880
                                      • C:\Windows\System32\rundll32.exe
                                        "C:\Windows\System32\rundll32.exe" "C:\Windows\System32\winethc.dll",ForceProxyDetectionOnNextRun
                                        2⤵
                                          PID:5360
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s WdiSystemHost
                                        1⤵
                                          PID:4496

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          56641592f6e69f5f5fb06f2319384490

                                          SHA1

                                          6a86be42e2c6d26b7830ad9f4e2627995fd91069

                                          SHA256

                                          02d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455

                                          SHA512

                                          c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                          Filesize

                                          152B

                                          MD5

                                          612a6c4247ef652299b376221c984213

                                          SHA1

                                          d306f3b16bde39708aa862aee372345feb559750

                                          SHA256

                                          9d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a

                                          SHA512

                                          34a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          5KB

                                          MD5

                                          52b8004c524386d4b0f029dbc0961fc2

                                          SHA1

                                          1bb9d483b47540886da90bf6eca1bf9aff7fda29

                                          SHA256

                                          554ac0b1b4683c6e95f3cfdeb902f3808d3c332ffca97dd8349eb4d831018546

                                          SHA512

                                          7ea79cbc7aa4e019641586e7940f22fbff339c61eb50553720e6e0539fd43ec042d7f7d87739f121e114157f64b020ef34d42d576e27feb7d0d9a846ed4be76b

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          48378ec831440ead5118e434c4c8d75f

                                          SHA1

                                          ed3e85820a3f1b1cdef1182fa5fefb79bdca272f

                                          SHA256

                                          17b5539d9c425a47fa41c446799976d0eac2ef3f5b2366c248b717d4c1cc1d11

                                          SHA512

                                          7d66e17aea190b78501919f920d4053678cc5fe217311a1b9b40300268ea05f6ce53fa441394a05ae373c0d34673571237386637bf7114b1e73b8143b88bcc2d

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                          Filesize

                                          6KB

                                          MD5

                                          522a18ea7e474153c839e6778f8af4be

                                          SHA1

                                          a510f25bc66719a6cee7e85544fa9b821bff3a3f

                                          SHA256

                                          1f69a9f7a91f08c50c4213cfaa9481fb59d1d2fe931d35a6952109f014b4ee24

                                          SHA512

                                          919110086e6910600c07b903c54a0556d99df5b14334a029c2f120520ecb2fb2d945f9110492c5676f9732d8702d226e518adb7429ca8535fc16d8b7212a7720

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          46295cac801e5d4857d09837238a6394

                                          SHA1

                                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                          SHA256

                                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                          SHA512

                                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                          Filesize

                                          16B

                                          MD5

                                          206702161f94c5cd39fadd03f4014d98

                                          SHA1

                                          bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                          SHA256

                                          1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                          SHA512

                                          0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          8KB

                                          MD5

                                          aa4d98408c601454d8c9ab60c198b828

                                          SHA1

                                          2815d4c5f230d15e5ed63461579873793890bcbc

                                          SHA256

                                          6ba3d38753371f38ce61a492a7f1649afdd76e5f2e5b07e54d9bc97e20e7fedf

                                          SHA512

                                          93c2693d83949d32a4cf29aed0f498bb9644290e9bfd4b6a57bd64d974f100832a862a317a43b35a13be26a99b8083f536137ecdcbbffe42d3d3f59df1cebe8b

                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                          Filesize

                                          8KB

                                          MD5

                                          23bb75b70c1265c37a831a15719f75e4

                                          SHA1

                                          ab450a2116630a554c06fb9e8a77ec4b3b42e4cd

                                          SHA256

                                          8a903cb1da60437a134c6410e863d5e1d5ec6bc53f2f4390a4d581f710bdebb4

                                          SHA512

                                          8b6c103a5bf80beb3fb84ec17340558c1245178d23f97dbc424d6ca8ae65169890b3f7d0dc3ab2ef0f6a1ee3a636ffab63cee976e062fd0b56123be93190455d

                                        • C:\Users\Admin\AppData\Local\Temp\NDFC90D.tmp

                                          Filesize

                                          3KB

                                          MD5

                                          e239b947fe9ba8ef41b9f94bf0115f48

                                          SHA1

                                          60f5f3fca932ed1df7408b51706a2c5e1afded61

                                          SHA256

                                          613b89660d5bef2588f69a214dd441d661d384989564bdeadc5aa17f6c400342

                                          SHA512

                                          4e7faf5982937fb7d93948fb07c8068b3add352fc5ea0a0b71a8f918723e968d01728e551e1c15c978cd0fb347467531c89a2c6b0ace8d1a63992c02e855c07d

                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_up0bsvl4.qgg.ps1

                                          Filesize

                                          60B

                                          MD5

                                          d17fe0a3f47be24a6453e9ef58c94641

                                          SHA1

                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                          SHA256

                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                          SHA512

                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                        • C:\Windows\TEMP\SDIAG_8f5605d1-4da4-486b-a494-97164458ddd5\NetworkDiagnosticsTroubleshoot.ps1

                                          Filesize

                                          25KB

                                          MD5

                                          d0cfc204ca3968b891f7ce0dccfb2eda

                                          SHA1

                                          56dad1716554d8dc573d0ea391f808e7857b2206

                                          SHA256

                                          e3940266b4368c04333db89804246cb89bf2073626f22b8de72bea27c522282a

                                          SHA512

                                          4d2225b599ad8af8ba8516f12cfddca5ec0ce69c5c80b133a6a323e9aaf5e0312efbcfa54d2e4462a5095f9a7c42b9d5b39f3204e0be72c3b1992cf33b22087c

                                        • C:\Windows\TEMP\SDIAG_8f5605d1-4da4-486b-a494-97164458ddd5\StartDPSService.ps1

                                          Filesize

                                          567B

                                          MD5

                                          a660422059d953c6d681b53a6977100e

                                          SHA1

                                          0c95dd05514d062354c0eecc9ae8d437123305bb

                                          SHA256

                                          d19677234127c38a52aec23686775a8eb3f4e3a406f4a11804d97602d6c31813

                                          SHA512

                                          26f8cf9ac95ff649ecc2ed349bc6c7c3a04b188594d5c3289af8f2768ab59672bc95ffefcc83ed3ffa44edd0afeb16a4c2490e633a89fce7965843674d94b523

                                        • C:\Windows\TEMP\SDIAG_8f5605d1-4da4-486b-a494-97164458ddd5\UtilityFunctions.ps1

                                          Filesize

                                          53KB

                                          MD5

                                          c912faa190464ce7dec867464c35a8dc

                                          SHA1

                                          d1c6482dad37720db6bdc594c4757914d1b1dd70

                                          SHA256

                                          3891846307aa9e83bca66b13198455af72af45bf721a2fbd41840d47e2a91201

                                          SHA512

                                          5c34352d36459fd8fcda5b459a2e48601a033af31d802a90ed82c443a5a346b9480880d30c64db7ad0e4a8c35b98c98f69eceedad72f2a70d9c6cca74dce826a

                                        • C:\Windows\TEMP\SDIAG_8f5605d1-4da4-486b-a494-97164458ddd5\UtilitySetConstants.ps1

                                          Filesize

                                          2KB

                                          MD5

                                          0c75ae5e75c3e181d13768909c8240ba

                                          SHA1

                                          288403fc4bedaacebccf4f74d3073f082ef70eb9

                                          SHA256

                                          de5c231c645d3ae1e13694284997721509f5de64ee5c96c966cdfda9e294db3f

                                          SHA512

                                          8fc944515f41a837c61a6c4e5181ca273607a89e48fbf86cf8eb8db837aed095aa04fc3043029c3b5cb3710d59abfd86f086ac198200f634bfb1a5dd0823406b

                                        • C:\Windows\TEMP\SDIAG_8f5605d1-4da4-486b-a494-97164458ddd5\en-US\LocalizationData.psd1

                                          Filesize

                                          5KB

                                          MD5

                                          380768979618b7097b0476179ec494ed

                                          SHA1

                                          af2a03a17c546e4eeb896b230e4f2a52720545ab

                                          SHA256

                                          0637af30fc3b3544b1f516f6196a8f821ffbfa5d36d65a8798aeeadbf2e8a7c2

                                          SHA512

                                          b9ef59e9bfdbd49052a4e754ead8cd54b77e79cc428e7aee2b80055ff5f0b038584af519bd2d66258cf3c01f8cc71384f6959ee32111eac4399c47e1c2352302

                                        • C:\Windows\Temp\SDIAG_8f5605d1-4da4-486b-a494-97164458ddd5\DiagPackage.dll

                                          Filesize

                                          478KB

                                          MD5

                                          580dc3658fa3fe42c41c99c52a9ce6b0

                                          SHA1

                                          3c4be12c6e3679a6c2267f88363bbd0e6e00cac5

                                          SHA256

                                          5b7aa413e4a64679c550c77e6599a1c940ee947cbdf77d310e142a07a237aad2

                                          SHA512

                                          68c52cd7b762b8f5d2f546092ed9c4316924fa04bd3ab748ab99541a8b4e7d9aec70acf5c9594d1457ad3a2f207d0c189ec58421d4352ddbc7eae453324d13f2

                                        • C:\Windows\Temp\SDIAG_8f5605d1-4da4-486b-a494-97164458ddd5\en-US\DiagPackage.dll.mui

                                          Filesize

                                          17KB

                                          MD5

                                          44c4385447d4fa46b407fc47c8a467d0

                                          SHA1

                                          41e4e0e83b74943f5c41648f263b832419c05256

                                          SHA256

                                          8be175e8fbdae0dade54830fece6c6980d1345dbeb4a06c07f7efdb1152743f4

                                          SHA512

                                          191cd534e85323a4cd9649a1fc372312ed4a600f6252dffc4435793650f9dd40d0c0e615ba5eb9aa437a58af334146aac7c0ba08e0a1bf24ec4837a40f966005

                                        • memory/2280-473-0x0000021DF3F60000-0x0000021DF3F70000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/2280-477-0x0000021DF3FA0000-0x0000021DF3FB0000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/2280-481-0x0000021DF4500000-0x0000021DF4501000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/5804-449-0x000001C8FFDF0000-0x000001C8FFE12000-memory.dmp

                                          Filesize

                                          136KB