Analysis

  • max time kernel
    240s
  • max time network
    243s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-07-2024 16:28

General

  • Target

    https://cdn.discordapp.com/attachments/1238808121997135882/1258091288566173818/tweaks.rar?ex=6686c851&is=668576d1&hm=0574d6b7eb121988452c2cbe304a6d9c89c91de690b21359223814fff0565a1c&

Malware Config

Signatures

  • Drops file in System32 directory 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies data under HKEY_USERS 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1238808121997135882/1258091288566173818/tweaks.rar?ex=6686c851&is=668576d1&hm=0574d6b7eb121988452c2cbe304a6d9c89c91de690b21359223814fff0565a1c&
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9924846f8,0x7ff992484708,0x7ff992484718
      2⤵
        PID:2912
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:2
        2⤵
          PID:2428
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1432
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:8
          2⤵
            PID:2664
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
            2⤵
              PID:2616
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
              2⤵
                PID:3240
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 /prefetch:8
                2⤵
                  PID:1368
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4832
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4848 /prefetch:1
                  2⤵
                    PID:3728
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:1
                    2⤵
                      PID:732
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4328 /prefetch:1
                      2⤵
                        PID:1836
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:1
                        2⤵
                          PID:4868
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:1
                          2⤵
                            PID:4540
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:1
                            2⤵
                              PID:4468
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:1
                              2⤵
                                PID:1412
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2216 /prefetch:1
                                2⤵
                                  PID:4540
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4276 /prefetch:2
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3100
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,17571922320017748150,8428791238410063426,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:1
                                  2⤵
                                    PID:4436
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:3756
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:3968
                                    • C:\Windows\System32\msdt.exe
                                      "C:\Windows\System32\msdt.exe" -skip TRUE -id NetworkDiagnosticsNetworkAdapter -ep NetworkDiagnosticsPNI
                                      1⤵
                                      • Suspicious use of FindShellTrayWindow
                                      PID:1680
                                    • C:\Windows\System32\sdiagnhost.exe
                                      C:\Windows\System32\sdiagnhost.exe -Embedding
                                      1⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5688
                                      • C:\Windows\system32\netsh.exe
                                        "C:\Windows\system32\netsh.exe" trace diagnose Scenario=NetworkSnapshot Mode=NetTroubleshooter AdapterGuid={5BE78E21-D44E-49DB-A7D4-C5C794B7F262}
                                        2⤵
                                        • Event Triggered Execution: Netsh Helper DLL
                                        PID:5920
                                      • C:\Windows\system32\netsh.exe
                                        "C:\Windows\system32\netsh.exe" trace diagnose Scenario=NetworkSnapshot Mode=NetTroubleshooter AdapterGuid={5BE78E21-D44E-49DB-A7D4-C5C794B7F262}
                                        2⤵
                                        • Event Triggered Execution: Netsh Helper DLL
                                        PID:3296
                                      • C:\Windows\system32\ipconfig.exe
                                        "C:\Windows\system32\ipconfig.exe" /all
                                        2⤵
                                        • Gathers network information
                                        PID:1552
                                      • C:\Windows\system32\ROUTE.EXE
                                        "C:\Windows\system32\ROUTE.EXE" print
                                        2⤵
                                          PID:3512
                                        • C:\Windows\system32\makecab.exe
                                          "C:\Windows\system32\makecab.exe" /f NetworkConfiguration.ddf
                                          2⤵
                                            PID:5148
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalServiceNoNetwork -p -s DPS
                                          1⤵
                                          • Drops file in System32 directory
                                          • Checks processor information in registry
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:6072
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalService -p -s WdiServiceHost
                                          1⤵
                                          • Drops file in System32 directory
                                          • Modifies data under HKEY_USERS
                                          PID:6100
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s WdiSystemHost
                                          1⤵
                                            PID:6128
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman
                                            1⤵
                                            • Drops file in Windows directory
                                            • Modifies data under HKEY_USERS
                                            PID:3024

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\ElevatedDiagnostics\1612347604\2024070316.000\NetworkDiagnostics.debugreport.xml

                                            Filesize

                                            205KB

                                            MD5

                                            631d0280af65fdac636262e79ae572a6

                                            SHA1

                                            99ec45dc183fddf4b62946ff3d8d4801b23ee26c

                                            SHA256

                                            da985fc2e4dae5b2f004e585431d98d3e98780e66364960a6b49f3f4a362fd69

                                            SHA512

                                            9f9a17fedddb6d713f6576e4f1363535fb077feefaa5cce058d88bb10f39b88c12e61b82f4a755bb0027e13a7fb0596518138c682bf35bb611afe837dabed94d

                                          • C:\Users\Admin\AppData\Local\ElevatedDiagnostics\1612347604\2024070316.000\results.xsl

                                            Filesize

                                            47KB

                                            MD5

                                            310e1da2344ba6ca96666fb639840ea9

                                            SHA1

                                            e8694edf9ee68782aa1de05470b884cc1a0e1ded

                                            SHA256

                                            67401342192babc27e62d4c1e0940409cc3f2bd28f77399e71d245eae8d3f63c

                                            SHA512

                                            62ab361ffea1f0b6ff1cc76c74b8e20c2499d72f3eb0c010d47dba7e6d723f9948dba3397ea26241a1a995cffce2a68cd0aaa1bb8d917dd8f4c8f3729fa6d244

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            56641592f6e69f5f5fb06f2319384490

                                            SHA1

                                            6a86be42e2c6d26b7830ad9f4e2627995fd91069

                                            SHA256

                                            02d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455

                                            SHA512

                                            c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            612a6c4247ef652299b376221c984213

                                            SHA1

                                            d306f3b16bde39708aa862aee372345feb559750

                                            SHA256

                                            9d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a

                                            SHA512

                                            34a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\7487113c-7f66-4f6d-8988-07e02db36c4f.tmp

                                            Filesize

                                            5KB

                                            MD5

                                            6e2f4551edd918666c68c427df1fb8fd

                                            SHA1

                                            a5a771b8bdb0b7ef49c23250ad99020a22e41f5f

                                            SHA256

                                            491711d3d0fc8b80eafa6409e609aebfde2966d73e2ac9131e6766d1f2ce78ca

                                            SHA512

                                            6cb15c15b27c197c95b5247169a26c6a38e7212df51135ea5d281d0bca00c38c63d10b86b0d90d440aa497d0d7961468facefb7f82a5532328ec5e0286921d1f

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            6KB

                                            MD5

                                            4d2c63212199230c0f91878525ab146e

                                            SHA1

                                            d1fe54d02bfb17995922258064c6e24a958b0a2c

                                            SHA256

                                            63c9f0afc2a14a25d6902b8ece16bfbc44fcf5092a520e56aed06f6f2429ab08

                                            SHA512

                                            66a9929aed23e21689994692aa956305361a88ae76e37240b4f7b0eac613b92c6016df18ea210c5d5a93de565d6d6a0809d4b8344d5dbba2a5684e4c6f194ac8

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                            Filesize

                                            16B

                                            MD5

                                            6752a1d65b201c13b62ea44016eb221f

                                            SHA1

                                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                            SHA256

                                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                            SHA512

                                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            9KB

                                            MD5

                                            63887f535ad056c5b421886efd00fd37

                                            SHA1

                                            108e19376b8930116eee21831545e4f994c5e900

                                            SHA256

                                            c5bb57a80aba9700e634c38df074ccab50a5526b0b0064abde97e44bd6b53fdd

                                            SHA512

                                            44a0c0feb75aa796c640265db72d7a761eecf98341fed583cd7e78fe164738dde70ef234d17845ced58fbc9bd9addc60fafb16d70765e01a6c3a99306e14f393

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            8KB

                                            MD5

                                            dedd0b189feaba192a64691040a65893

                                            SHA1

                                            ce67ab146ab59fbb9bfb976f121d221b3e83f6ac

                                            SHA256

                                            8b19a0f770213cc89f7c5f27d911d69d73b7697eb2c5b48b86cb85d9f6b37d3a

                                            SHA512

                                            8726d405cc6bbeefd1b5234ab5121106647a190366cff7de84d4156b0ef3351f5dede7bdeb272e5dca8286d20a949fde098667449ae67ec3f9ab6511943d2f28

                                          • C:\Users\Admin\AppData\Local\Microsoft\NetTraces\NdfSession-07032024-1636.etl

                                            Filesize

                                            192KB

                                            MD5

                                            7e36421d06311553b73fd0a5a409f6d1

                                            SHA1

                                            de560d1b30098ff48752d0c6f7662ff266a92d23

                                            SHA256

                                            359220805d27a8a7720c579e798fe1c312d4c45e5bf137d7c1fce1b2859504fa

                                            SHA512

                                            221cf431ee3429e677d9a3e197fd48c8a37174151ae7cb4a463ac85d19dbf5f45ab98fef8466a9b31489d9e94dafd90903cf5392b0d32390aaf693193f1a1b93

                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_j22d3chc.fvo.ps1

                                            Filesize

                                            60B

                                            MD5

                                            d17fe0a3f47be24a6453e9ef58c94641

                                            SHA1

                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                            SHA256

                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                            SHA512

                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                          • C:\Users\Admin\AppData\Local\Temp\tmpE3CA.tmp\NetworkConfiguration.cab

                                            Filesize

                                            1KB

                                            MD5

                                            f8c6e6e6d8b773c1bd7c9c5162356b3e

                                            SHA1

                                            6c961728da2e65c6932227ffaf6c060cad67a58e

                                            SHA256

                                            60bf2a3bedda1d92183457ccae6bc50fda2f15ca7cfd2de667f5d6a7c004f846

                                            SHA512

                                            b0b0254616d3cde5e2a32fc390c5b6c55a29a8a3c6001b42e29e789a277f5795eaf54ce3094e4f3483a2d07c4681688d32d8247469ddb3261ac661650f9961e2

                                          • C:\Users\Admin\AppData\Local\Temp\tmpE3CA.tmp\NetworkConfiguration.ddf

                                            Filesize

                                            231B

                                            MD5

                                            00848049d4218c485d9e9d7a54aa3b5f

                                            SHA1

                                            d1d5f388221417985c365e8acaec127b971c40d0

                                            SHA256

                                            ffeafbb8e7163fd7ec9abc029076796c73cd7b4eddaeeda9ba394c547419769e

                                            SHA512

                                            3a4874a5289682e2b32108740feea586cb9ccdad9ca08bf30f67c9742370c081ad943ea714f08dbf722f9f98f3b0bb307619a8ba47f96b24301c68b0fd1086d9

                                          • C:\Users\Admin\AppData\Local\Temp\tmpE3CA.tmp\ipconfig.all.txt

                                            Filesize

                                            1KB

                                            MD5

                                            13406d27d5537fb2d93c856d3dd998b0

                                            SHA1

                                            06a339d699be6a2531e207c804f6705a1841b07f

                                            SHA256

                                            1d56eaded0b7fcdd2890d9ff8a984b04f6b02306e2384d3f8672dfc4be423a20

                                            SHA512

                                            ae3f8fca6c3117a8c996c00d576ebb9b2a2bbb2ef0383dbb18667d3b2b49fe8e8ab835752c785efb0ab3e6c3423bf4747d90405bc972b7805944f46c5eb65cb8

                                          • C:\Users\Admin\AppData\Local\Temp\tmpE3CA.tmp\route.print.txt

                                            Filesize

                                            4KB

                                            MD5

                                            d257fd8808d1f9b5b7e72c406532a2ce

                                            SHA1

                                            c31ae241ca0564ccceb0f5125311e140c025fcc1

                                            SHA256

                                            cd2be7137bbb0afc727bc4716a500ac9058ac82c638bf6a7f8aeb20fbc4b18a8

                                            SHA512

                                            cc6618d4d31b8ad01fdec87fb1fb31f64ae2361bfd77dfe85a928f4f5fd8c08de7be033d784031eecfa7a333ee8f50b0afd3f9e0a1ebf843110c5e41bc7ec50a

                                          • C:\Users\Admin\AppData\Local\Temp\tmpE3CA.tmp\setup.inf

                                            Filesize

                                            978B

                                            MD5

                                            ca80170c999177c5121984fc2f027f98

                                            SHA1

                                            46cff2c8335b7188bf696f80c70873aec25ae466

                                            SHA256

                                            ffb6010dd5c5c86a83da84da006a8751623f7f1695d8edd51d5ada04fb1de45a

                                            SHA512

                                            c46ebb3dc3fe930ce12381a91ffa7b70c45626428dca6eecd15bf6a5ec44d2712d3fc35f270f27bcbeb652dc5182d2f37ce5254f202b3baf646f8188f06f42e6

                                          • C:\Users\Admin\AppData\Local\Temp\tmpE3CA.tmp\setup.rpt

                                            Filesize

                                            283B

                                            MD5

                                            bfadb988f201edd670f2071a82020b55

                                            SHA1

                                            d44365889da4243d0ee5d3ee76240103a2fd9f6f

                                            SHA256

                                            d8b6a6f6369e3e861be62289b77abcb8b11466b389596e6c67a78aae9dd0f64b

                                            SHA512

                                            7a3b20dbc167403ced384f526a4c26fe42e38b0e0adeab4190df78f3dd2b44003a7ce1e4d6cb765f45c09f63bf56730b316c8f42da42f375ce03c06d550ce19b

                                          • C:\Windows\TEMP\SDIAG_4a5e73c2-b503-4c32-b357-a71300aa64d9\NetworkDiagnosticsResolve.ps1

                                            Filesize

                                            11KB

                                            MD5

                                            d213491a2d74b38a9535d616b9161217

                                            SHA1

                                            bde94742d1e769638e2de84dfb099f797adcc217

                                            SHA256

                                            4662c3c94e0340a243c2a39ca8a88fd9f65c74fb197644a11d4ffcae6b191211

                                            SHA512

                                            5fd8b91b27935711495934e5d7ca14f9dd72bc40a38072595879ef334a47f99e0608087ddc62668c6f783938d9f22a3688c5cdef3a9ad6c3575f3cfa5a3b0104

                                          • C:\Windows\TEMP\SDIAG_4a5e73c2-b503-4c32-b357-a71300aa64d9\NetworkDiagnosticsTroubleshoot.ps1

                                            Filesize

                                            25KB

                                            MD5

                                            d0cfc204ca3968b891f7ce0dccfb2eda

                                            SHA1

                                            56dad1716554d8dc573d0ea391f808e7857b2206

                                            SHA256

                                            e3940266b4368c04333db89804246cb89bf2073626f22b8de72bea27c522282a

                                            SHA512

                                            4d2225b599ad8af8ba8516f12cfddca5ec0ce69c5c80b133a6a323e9aaf5e0312efbcfa54d2e4462a5095f9a7c42b9d5b39f3204e0be72c3b1992cf33b22087c

                                          • C:\Windows\TEMP\SDIAG_4a5e73c2-b503-4c32-b357-a71300aa64d9\NetworkDiagnosticsVerify.ps1

                                            Filesize

                                            10KB

                                            MD5

                                            9b222d8ec4b20860f10ebf303035b984

                                            SHA1

                                            b30eea35c2516afcab2c49ef6531af94efaf7e1a

                                            SHA256

                                            a32e13da40ac4b9e1dac7dd28bc1d25e2f2136b61ff93be943018b20796f15bc

                                            SHA512

                                            8331337ccb6e3137b01aeec03e6921fd3b9e56c44fa1b17545ae5c7bfcdd39fcd8a90192884b3a82f56659009e24b63ce7f500e8766fd01e8d4e60a52de0fe67

                                          • C:\Windows\TEMP\SDIAG_4a5e73c2-b503-4c32-b357-a71300aa64d9\StartDPSService.ps1

                                            Filesize

                                            567B

                                            MD5

                                            a660422059d953c6d681b53a6977100e

                                            SHA1

                                            0c95dd05514d062354c0eecc9ae8d437123305bb

                                            SHA256

                                            d19677234127c38a52aec23686775a8eb3f4e3a406f4a11804d97602d6c31813

                                            SHA512

                                            26f8cf9ac95ff649ecc2ed349bc6c7c3a04b188594d5c3289af8f2768ab59672bc95ffefcc83ed3ffa44edd0afeb16a4c2490e633a89fce7965843674d94b523

                                          • C:\Windows\TEMP\SDIAG_4a5e73c2-b503-4c32-b357-a71300aa64d9\UtilityFunctions.ps1

                                            Filesize

                                            53KB

                                            MD5

                                            c912faa190464ce7dec867464c35a8dc

                                            SHA1

                                            d1c6482dad37720db6bdc594c4757914d1b1dd70

                                            SHA256

                                            3891846307aa9e83bca66b13198455af72af45bf721a2fbd41840d47e2a91201

                                            SHA512

                                            5c34352d36459fd8fcda5b459a2e48601a033af31d802a90ed82c443a5a346b9480880d30c64db7ad0e4a8c35b98c98f69eceedad72f2a70d9c6cca74dce826a

                                          • C:\Windows\TEMP\SDIAG_4a5e73c2-b503-4c32-b357-a71300aa64d9\UtilitySetConstants.ps1

                                            Filesize

                                            2KB

                                            MD5

                                            0c75ae5e75c3e181d13768909c8240ba

                                            SHA1

                                            288403fc4bedaacebccf4f74d3073f082ef70eb9

                                            SHA256

                                            de5c231c645d3ae1e13694284997721509f5de64ee5c96c966cdfda9e294db3f

                                            SHA512

                                            8fc944515f41a837c61a6c4e5181ca273607a89e48fbf86cf8eb8db837aed095aa04fc3043029c3b5cb3710d59abfd86f086ac198200f634bfb1a5dd0823406b

                                          • C:\Windows\TEMP\SDIAG_4a5e73c2-b503-4c32-b357-a71300aa64d9\en-US\LocalizationData.psd1

                                            Filesize

                                            5KB

                                            MD5

                                            380768979618b7097b0476179ec494ed

                                            SHA1

                                            af2a03a17c546e4eeb896b230e4f2a52720545ab

                                            SHA256

                                            0637af30fc3b3544b1f516f6196a8f821ffbfa5d36d65a8798aeeadbf2e8a7c2

                                            SHA512

                                            b9ef59e9bfdbd49052a4e754ead8cd54b77e79cc428e7aee2b80055ff5f0b038584af519bd2d66258cf3c01f8cc71384f6959ee32111eac4399c47e1c2352302

                                          • C:\Windows\Temp\SDIAG_4a5e73c2-b503-4c32-b357-a71300aa64d9\DiagPackage.dll

                                            Filesize

                                            478KB

                                            MD5

                                            580dc3658fa3fe42c41c99c52a9ce6b0

                                            SHA1

                                            3c4be12c6e3679a6c2267f88363bbd0e6e00cac5

                                            SHA256

                                            5b7aa413e4a64679c550c77e6599a1c940ee947cbdf77d310e142a07a237aad2

                                            SHA512

                                            68c52cd7b762b8f5d2f546092ed9c4316924fa04bd3ab748ab99541a8b4e7d9aec70acf5c9594d1457ad3a2f207d0c189ec58421d4352ddbc7eae453324d13f2

                                          • C:\Windows\Temp\SDIAG_4a5e73c2-b503-4c32-b357-a71300aa64d9\en-US\DiagPackage.dll.mui

                                            Filesize

                                            17KB

                                            MD5

                                            44c4385447d4fa46b407fc47c8a467d0

                                            SHA1

                                            41e4e0e83b74943f5c41648f263b832419c05256

                                            SHA256

                                            8be175e8fbdae0dade54830fece6c6980d1345dbeb4a06c07f7efdb1152743f4

                                            SHA512

                                            191cd534e85323a4cd9649a1fc372312ed4a600f6252dffc4435793650f9dd40d0c0e615ba5eb9aa437a58af334146aac7c0ba08e0a1bf24ec4837a40f966005

                                          • memory/5688-497-0x00000229F9B00000-0x00000229F9B22000-memory.dmp

                                            Filesize

                                            136KB

                                          • memory/6072-520-0x0000027F8D470000-0x0000027F8D471000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/6072-513-0x0000027F87580000-0x0000027F87590000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/6072-516-0x0000027F875B0000-0x0000027F875C0000-memory.dmp

                                            Filesize

                                            64KB