Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    128s
  • max time network
    129s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09/08/2024, 16:28

Errors

Reason
Machine shutdown

General

  • Target

    Asahi_SanDiegoMarineCorpsAcademy.rbxl

  • Size

    16.2MB

  • MD5

    282ab49e26c5c4e78f89354d571f63d0

  • SHA1

    e2db78714ee3dc115169860b56bf4a662cda3352

  • SHA256

    3e055a5baed5ef961acf9e599bfcaf820272c222631ecfa03abc55cf088fea62

  • SHA512

    c6c49eb43e461c590f266085df019bfcf517082ba73b6285945e04b27fe2f274f7d57502f9a56063a4bb8b9f6a0d4f962ae151b1bbdf46742e82a6a92a784cac

  • SSDEEP

    393216:BLCTSj5zHhsE6D6gBgpPX7WS9QjnUSqE0:BLCTG5rGEKgI6Srq9

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SendNotifyMessage 11 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Asahi_SanDiegoMarineCorpsAcademy.rbxl
    1⤵
    • Modifies registry class
    PID:3764
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:32
  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5004
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5004.0.841955584\564099380" -parentBuildID 20221007134813 -prefsHandle 1700 -prefMapHandle 1692 -prefsLen 20747 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e38236bf-9b66-44c9-8e1e-d69f8760abb4} 5004 "\\.\pipe\gecko-crash-server-pipe.5004" 1780 280d32d6458 gpu
        3⤵
          PID:5052
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5004.1.1338724014\237410409" -parentBuildID 20221007134813 -prefsHandle 2108 -prefMapHandle 2104 -prefsLen 20828 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e746393f-e501-4796-a639-1c1da5a1636f} 5004 "\\.\pipe\gecko-crash-server-pipe.5004" 2136 280d2e30e58 socket
          3⤵
          • Checks processor information in registry
          PID:2044
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5004.2.886365136\352956081" -childID 1 -isForBrowser -prefsHandle 2808 -prefMapHandle 2856 -prefsLen 20931 -prefMapSize 233444 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ecfaacef-b0e8-4cd0-ae72-ff3b63843e21} 5004 "\\.\pipe\gecko-crash-server-pipe.5004" 3076 280d727fe58 tab
          3⤵
            PID:4940
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5004.3.1615843938\586636891" -childID 2 -isForBrowser -prefsHandle 3376 -prefMapHandle 3372 -prefsLen 26109 -prefMapSize 233444 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ef899de8-37a8-4906-8e46-f85c00176a61} 5004 "\\.\pipe\gecko-crash-server-pipe.5004" 3436 280c8169058 tab
            3⤵
              PID:1812
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5004.4.1090714264\1479471019" -childID 3 -isForBrowser -prefsHandle 2944 -prefMapHandle 2796 -prefsLen 26328 -prefMapSize 233444 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {857d222d-8db0-4ba4-91c6-071572e2011f} 5004 "\\.\pipe\gecko-crash-server-pipe.5004" 3220 280da370058 tab
              3⤵
                PID:620
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5004.5.802862454\1165346483" -childID 4 -isForBrowser -prefsHandle 4988 -prefMapHandle 5012 -prefsLen 26328 -prefMapSize 233444 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d0577ead-b49a-4f6e-8e4f-0574caa6e7ea} 5004 "\\.\pipe\gecko-crash-server-pipe.5004" 4288 280d8764b58 tab
                3⤵
                  PID:1276
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5004.6.1289010440\837515501" -childID 5 -isForBrowser -prefsHandle 5028 -prefMapHandle 5032 -prefsLen 26328 -prefMapSize 233444 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4841b919-e2de-4430-aff9-8009d363bf19} 5004 "\\.\pipe\gecko-crash-server-pipe.5004" 5020 280d8762158 tab
                  3⤵
                    PID:776
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5004.7.1839764849\1821067043" -childID 6 -isForBrowser -prefsHandle 5228 -prefMapHandle 5232 -prefsLen 26328 -prefMapSize 233444 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b31b4278-505b-49e4-a08c-997eccc3fe6a} 5004 "\\.\pipe\gecko-crash-server-pipe.5004" 5220 280da36f758 tab
                    3⤵
                      PID:504
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="5004.8.1968194100\839458928" -childID 7 -isForBrowser -prefsHandle 4800 -prefMapHandle 4816 -prefsLen 26328 -prefMapSize 233444 -jsInitHandle 1320 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2dffe1b1-1a6f-46e9-b4d0-a3d99db01a54} 5004 "\\.\pipe\gecko-crash-server-pipe.5004" 4788 280d79dc458 tab
                      3⤵
                        PID:4572
                  • C:\Windows\System32\xpsrchvw.exe
                    "C:\Windows\System32\xpsrchvw.exe" "C:\Users\Admin\Desktop\WatchCopy.easmx"
                    1⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:4120
                  • C:\Windows\System32\rundll32.exe
                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                    1⤵
                      PID:3928
                    • C:\Windows\system32\LogonUI.exe
                      "LogonUI.exe" /flags:0x0 /state0:0xa3af7055 /state1:0x41c64e6d
                      1⤵
                      • Modifies data under HKEY_USERS
                      • Suspicious use of SetWindowsHookEx
                      PID:3336

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\datareporting\glean\db\data.safe.bin

                      Filesize

                      2KB

                      MD5

                      e6ae0737c109cf395479bd0c3d659ae0

                      SHA1

                      4232e44bd73858fcab03d0f7d15e36b93302b480

                      SHA256

                      013ed456ed11cfc3bc6bdc5db3d6c5da47830d3775b4405f40d2069668a0045d

                      SHA512

                      d7f931c054c415477001150d605ec30c3a6f1a44a6a4abecadf603583d93fc0d25312bf7dcf563c59f4bc34245375d43df2e7052ef3134dcc4b7529382abba4f

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\datareporting\glean\pending_pings\a2d99b75-802c-40a8-afa7-6e7189d820fc

                      Filesize

                      746B

                      MD5

                      a408809a76dbb06c5f37367a0f5aad95

                      SHA1

                      b2ca529c1feeaf8b31998819df40b679afbc39c1

                      SHA256

                      b4ec18a12b47e689e48cefcc7a726914ab56f3f5ac89ae4f76d33198988cd105

                      SHA512

                      7dab36290ad0232626567b0d78407e612d1cd6b09eb065ba5634c05b98799332d9f690c527463bc1bb6d502926cde06ea37a286b2a525ab5d1d2d3f8a6357598

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\datareporting\glean\pending_pings\cfae3974-810a-4270-a169-7afac69c5391

                      Filesize

                      11KB

                      MD5

                      bfb921e4e9bcd69d5587079caaeabd9d

                      SHA1

                      253dafc556232fc8de78138d41afbb45453ce568

                      SHA256

                      6eae7fe208e58783e86cf92c8c2d46f1bb6d791450a97e970cf0a92b5193715c

                      SHA512

                      73ed025df92b7eed22172beff4ca72ef749ae3f3dc2c6b57b9793b4e39f45725daa7e19d2875961073144da55b146e203573c88def4ff86ec69268c98364ea7e

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\prefs-1.js

                      Filesize

                      6KB

                      MD5

                      63fe845cadcc96c590eeffbf5847a94a

                      SHA1

                      f4648a1e67de090ceed99ee8b20f764114f1a91e

                      SHA256

                      6e4537a43b7906fc580da0f7d3be37e89e23335dc31120a50ffe3e7202a4f080

                      SHA512

                      56c023c7c6719914dcd4d7db73aef2b9c7a79ae5e24c5f70427998c3060470573914ef588f4ca2c6a96611c18ca16dfde96dcf2ed10d2a06995ddff6340fd1b3

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\prefs-1.js

                      Filesize

                      6KB

                      MD5

                      9ca49076246ca5faa9ab0fddc25040c5

                      SHA1

                      3b1795c13f9da7b45a584653660d49957e569019

                      SHA256

                      104e33d8d31b2498af6e9f579c40e4afc060118cb4f93758d1b2dcd1244b963a

                      SHA512

                      44f073492a0abfb298030fe453869b15e1b65231c4f7f383645ec2b8887d1be6cec1a4de6b938a78e50b69047b52ae9c1c02a54927bb32361f3c1115e3d094e2

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\sessionCheckpoints.json.tmp

                      Filesize

                      259B

                      MD5

                      700fe59d2eb10b8cd28525fcc46bc0cc

                      SHA1

                      339badf0e1eba5332bff317d7cf8a41d5860390d

                      SHA256

                      4f5d849bdf4a5eeeb5da8836589e064e31c8e94129d4e55b1c69a6f98fb9f9ea

                      SHA512

                      3fa1b3fd4277d5900140e013b1035cb4c72065afcc6b6a8595b43101cfe7d09e75554a877e4a01bb80b0d7a58cdcfe553c4a9ef308c5695c5e77cb0ea99bada4

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\sessionstore-backups\recovery.jsonlz4

                      Filesize

                      3KB

                      MD5

                      33dd0d1b8a1a761ac4bb1844a6082445

                      SHA1

                      bbec2a09f60638bc9d6aa40ab112533a92a360b6

                      SHA256

                      65d7c93afb631f3fa3367f873c47aabf3788a45b5e2c5576897ad65023de0d47

                      SHA512

                      af8c986bab179e5b00b5b75c63197111454c3e898e6732c114fff5bb2e6573faff0aab6a5edc2cbd05902b429d079413b31487ddba05a1ea477970216812613a

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\sessionstore-backups\recovery.jsonlz4

                      Filesize

                      4KB

                      MD5

                      ebcfbcadcbcc2f793e61442c1eda11de

                      SHA1

                      f3f7b427ee63fca97c36654fbec3aec469ccaaab

                      SHA256

                      2eedd66eb03a0e5338623069812a6a4585bb3008bdad69877ef61e657fd961e9

                      SHA512

                      f55408c475abd5b541a45fea9e6a66ad450f4495c1398e7d688622ba876db7cd8b899786918ee1fed7a3baca97ccc4a55f87e5e3e5d0b980f308b6929234ae5a

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\sessionstore.jsonlz4

                      Filesize

                      4KB

                      MD5

                      b56df03a694fe1798050bc7d8057748a

                      SHA1

                      90e377eac7fc196e5194fd0c0daf471676e6e7c4

                      SHA256

                      20cd2f25e93fbf53d89b7fdb273b1ad2f81d7174d394536a22bed67c7223c987

                      SHA512

                      76250c0abcec7e0d11961fadc8cd6cb38fa83f214c4fdf9716b06293d1881877e29cc2d4466b8c4ab8ebd3921d2dcfe76a109da710b8968f0f588a696225b434

                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\wtg1s5j6.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                      Filesize

                      184KB

                      MD5

                      0d0013d9708d9fef539adc917f5b87f6

                      SHA1

                      5e071e6b4d8abf007c8bb78ee948caf5bb0439e1

                      SHA256

                      f416d29cdbaa66b7d04483831d2a593a735316fafb643414a12df78da0ab054b

                      SHA512

                      851e9965a0fed9e0f5195ce655635cf13687d18678e4a9df807ab22cbc53c02cd2006fd65d93cd80b2a06d709e59122ea9933ba5cec551c6d51f5e9b4c175388

                    • C:\vcredist2010_x64.log-MSI_vc_red.msi.txt

                      Filesize

                      379KB

                      MD5

                      f6a9060d05cf1f0c8c12a0506ff0b0ad

                      SHA1

                      be705da562a38bced731bebbd75634d0223d1144

                      SHA256

                      cab9810213ef63fc8c87702c647c7d2d925e48a241560558b80ffc0e818af2fd

                      SHA512

                      fc6de14e37cfc5ad5b98a6524f8c8ffde0a0b7b08e1262965da5f195d5f9af1b9aec0da374851049c94bf4e47dc94574debfe8d4127e5d07cdea73cb5a4159fe

                    • C:\vcredist2010_x64.log.html

                      Filesize

                      86KB

                      MD5

                      f16b4a5f40bcc8974ece2f19ca1bb3da

                      SHA1

                      340b37365c1f42726f7330fa6b26a67d579f10ac

                      SHA256

                      d5695c8751cdf00b7bb5dc1ea718dd03902765f462f76ce25dc30004cf4b958e

                      SHA512

                      0869b37f4d9294d648ff0d1b4ada6e2eda9c7ee1925bdbdbd914d20e8233fe217b9513cff4a42bd4abcfcc6dd1aea73503b3ade1459e3373fee998a401cbe5fd

                    • C:\vcredist2010_x86.log-MSI_vc_red.msi.txt

                      Filesize

                      395KB

                      MD5

                      fe01bf0f4915989b05a0ec8202468dd6

                      SHA1

                      2200b920702b62c77e7b85fe7140e7783f12f61f

                      SHA256

                      c25c9c5f679c128d00d8f30fd980a8210ebf85a0ed793d4c0b27075afa937e91

                      SHA512

                      a85d49ee1346408ab0dc7bfd04661dfd10db800106197963e391dd79b9087e5aa2116b3754a79e5516e5c079b3241e768f320b9ed910e6b95aa76f112c9ad740

                    • C:\vcredist2010_x86.log.html

                      Filesize

                      81KB

                      MD5

                      a7076d1383936ebb9ee05ff446ce60d4

                      SHA1

                      fb31945e86b2c4bc3c036429bb13c943c29ec2e7

                      SHA256

                      1d6b9ee7b395ca7becf744e478c6429b9f20d996ed89c0ff16c6ff0877c0d322

                      SHA512

                      31a42072e2382b8854c2ebbce63659203ff94ee7aba3df9831f5549bcb7523e65c5ed9e5ed49aec8e2837821e6d5b888f01b0f21d8e5a3223314c44d5102bb0e

                    • C:\vcredist2012_x64_0_vcRuntimeMinimum_x64.log

                      Filesize

                      167KB

                      MD5

                      c4f61c6c6b3a1e3a7c49e60879dfd7db

                      SHA1

                      c2ad0ff8ba65e0687a44fc3bdfdd8acb7b706aff

                      SHA256

                      cddb55cbd4e020265289d22de8178ca2c6e255b6de3245a69462860d638574db

                      SHA512

                      0ffbd3a9606671368c6e299f51427d7aa1aca832c077481991d9cf128f2fd7912a683edbba594e842703d8c1e1d8b713c63957062ab0960623326272da63a451

                    • C:\vcredist2012_x64_1_vcRuntimeAdditional_x64.log

                      Filesize

                      194KB

                      MD5

                      726c7eb21f1ab8c673155b0dd2dbf430

                      SHA1

                      05cccc3cd6e6dad0c39047f133cb74897ccfced2

                      SHA256

                      a1537d8eb5380375836c3da7c3c3cb1b258c64bf45d2eed4b60be7b9902ecd7f

                      SHA512

                      063f9eeb7b0da6ffb92fd85ee52791c241bb87ff9fcc3a8e518c2f2ef9fed2b11a28ce9121fbbc510a6aa7f4f9c0764ae45be40e59da5f90ebfe0c038240ba8c

                    • C:\vcredist2012_x86_0_vcRuntimeMinimum_x86.log

                      Filesize

                      170KB

                      MD5

                      2146832e7586e02d844e9c73363e6f26

                      SHA1

                      60ad831c9a2c57a5f9983594a5951f0d634bb0ad

                      SHA256

                      bb1dd0691f230be09d42caafbb0a26682a2b32cd484ee1f5f5b02afbbccf779c

                      SHA512

                      b6a2de026b0a5fbb011f158d6190bc4ed598a26b79f01ea0e449aff3de05aff369a9c403387572368f1cc768b7e5b02177cff903f2996d0de49a008e27c4969b

                    • C:\vcredist2012_x86_1_vcRuntimeAdditional_x86.log

                      Filesize

                      208KB

                      MD5

                      9c3de548d8241bbe9de108c3abde9e41

                      SHA1

                      9f5fced8af54b51dfa63fda3cc5890348dcd3e18

                      SHA256

                      ee6345de48b6828a76d15ce8e8bcfd3e9038dd10ebff9b2d09207abb05b2f876

                      SHA512

                      df4b42217ffe71e3e486609022c17ee16bd7bc1e26eb7fa3fde95aa1a78920fe0cbfd8751791836d7805b47cb6d675869c77d9e5e7eb5223d4e5e31d428a8740

                    • C:\vcredist2013_x64_000_vcRuntimeMinimum_x64.log

                      Filesize

                      169KB

                      MD5

                      571b18afce29f72f7495a865793ec59f

                      SHA1

                      12edc0ac72e0924b9971ddc0dbf3bf8c0f7cefe5

                      SHA256

                      e501d664c46545dcd8b8182fa902ad5b2ad24dbbaea757d73b7bbdeafe899dbc

                      SHA512

                      28b1365f7181f886c6ba6099ca1c2297189c143c9adc5fe0bee3afa16f0dcc191cf8fc54cfdc4b59a79f1fd908208b30ad9d1d753f0df7ed0924914e3c271dcf

                    • C:\vcredist2013_x64_001_vcRuntimeAdditional_x64.log

                      Filesize

                      190KB

                      MD5

                      852455b795c8fccc3982f5f50697bec2

                      SHA1

                      6e3bf2d624660e5982158d281c9d0d2503c1eeb5

                      SHA256

                      103300e9b370b4e6efbbdc86e102f6b1c4cf0674ccd5a47b1acb29d584e6c12b

                      SHA512

                      c54c9c106d98304c4f7475952776d6e54c1828c9141940276906c4fcab49a0e8b7a56cd240f5e63b6793e6678e0d715f617b4ca5dcdefa59560768fb08a63cdb

                    • C:\vcredist2013_x86_000_vcRuntimeMinimum_x86.log

                      Filesize

                      169KB

                      MD5

                      5dab99d548d20c94871e85606c6e8aca

                      SHA1

                      472f1b09921d5e0596d88a8dceec246a1dc067a3

                      SHA256

                      a5710d5dd5804d9aa0012f8317bec7803e4ecf2fe7dd111f05d65f1d170f0e64

                      SHA512

                      160261b7ee07ff35f2d4090b6146fd489975087224e413e7d84aa1fbbd50372b2647b16c849501b0ef5df01a81425d508b0123d38a34aca7398c3ab2772aaeaf

                    • C:\vcredist2013_x86_001_vcRuntimeAdditional_x86.log

                      Filesize

                      198KB

                      MD5

                      761e1a3225ae0904e4f81f0636345af4

                      SHA1

                      1d89a2cd0bbb681fde97c6c48d948dcf502ae01e

                      SHA256

                      bcb558b00f09d5c7fc5f236b3c65407a67893bf08e6017841c514ad55967d59c

                      SHA512

                      2dae9882c47070455cd91073625a73b0080b35a647c618b576c96bc6570089f2000cac9c7d1ec8f3c27dabc7a1afaab255a9e039701481ce2aee3d5b65ec4856

                    • C:\vcredist2022_x64_000_vcRuntimeMinimum_x64.log

                      Filesize

                      122KB

                      MD5

                      b392bd74c25d9d08a28d05eed590bd9d

                      SHA1

                      2973c73ef9c67e638066f31dd83f8466673ee574

                      SHA256

                      85ae96304021e570e09d49d9a48b8689c4c5150f01a463a74a6550430c6ec1fe

                      SHA512

                      fb45bb49cf265a5a7a5b07e026a62701fe5bb4cac394c9bab50c6002661e52306842546c6743fcb14a8e5915223a54671bc4995706a9059634c9d1cc5b29f5c6

                    • C:\vcredist2022_x64_001_vcRuntimeAdditional_x64.log

                      Filesize

                      129KB

                      MD5

                      a1a9c38034418a0f640cb7973462bfba

                      SHA1

                      3f413a838ab38af76e39bc3a8469932bbb84c0c8

                      SHA256

                      3881f382428385862ec86b1b6b2b91277c59400de7b438ac4a79b7e2c01f26bc

                      SHA512

                      06384b3801df01b80cc10736705ba097cf1c8aa09166b6d339b0c793616a560a01dbf5ebe24e6833160e50a295e40e36b63de91ebc8ce018a4b3fdbd98c9c000

                    • C:\vcredist2022_x86_000_vcRuntimeMinimum_x86.log

                      Filesize

                      123KB

                      MD5

                      77137cfb7777986a8a97bc5e8d98a214

                      SHA1

                      629e1c7a51965124134f122ccdaa67d3c8e489c7

                      SHA256

                      93563a7c7c1f732d8f698bc7caf070b404f047664c1e6d2ce45d1ba1afea2c1e

                      SHA512

                      d0942c455b0f4cd6effb3b4e6fc506ae4b545f452b6c2a3e64343f22a86a23b65059d1505c4827eb26111440e89f404b8dd0d2ba76f5329d4e97084214c55260

                    • C:\vcredist2022_x86_001_vcRuntimeAdditional_x86.log

                      Filesize

                      135KB

                      MD5

                      8d748b916f7edd3dd6b6aef91d3c6f6e

                      SHA1

                      3ec655c3c929ccbf97054b8ae69d5b5b0aab9500

                      SHA256

                      07d074df78ddb8a1ce37176dda33320c433c9b5c87b8a7a44ee4ce79fe2aa336

                      SHA512

                      8f6cf15334d440a1f2c9e891f3e322ec69bd6e3e200cfd14660c6e5b9ca985330e2422edb4c4626be2a1eb4b4029d9cde6b2852b91c659e83b935fca6cdd8990