Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 18:47

General

  • Target

    letsview-setup.exe

  • Size

    2.4MB

  • MD5

    7578d269fef4ac377832c4122c78e0bb

  • SHA1

    8901f9b7df38bcb2e1bfae7baab64a0d1f6b37a8

  • SHA256

    9668ad0def75c0bfccfa01a0a8b4fe3aa24a4f386f0807871edb14b979ac51bf

  • SHA512

    f89ed6ee3e7250a4fed1915c85ea6a58e14e6e7910a5462637ee8b9c4f61c015c4bedc337e22bab15133d1c58e6747f1ca1654bae6f195ac4174881fc5e4afaa

  • SSDEEP

    49152:6+iLgXBxC4o+JMv2Dpjm0zV4LTGnZ/lD/lZyWVu8se:6+5rFDpjmEZF/

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 1 IoCs
  • Creates new service(s) 2 TTPs
  • Drops file in Drivers directory 1 IoCs
  • Manipulates Digital Signatures 1 TTPs 1 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Stops running service(s) 4 TTPs
  • Modifies file permissions 1 TTPs 3 IoCs
  • Downloads MZ/PE file
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies Windows Firewall 2 TTPs 3 IoCs
  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 26 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 26 IoCs
  • Executes dropped EXE 8 IoCs
  • Launches sc.exe 4 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Loads dropped DLL 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 22 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\letsview-setup.exe
    "C:\Users\Admin\AppData\Local\Temp\letsview-setup.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4588
    • C:\Users\Admin\AppData\Local\Temp\installer.exe
      "C:\Users\Admin\AppData\Local\Temp\installer.exe" /VERYSILENT /SUPPRESSMSGBOXES /FORCECLOSEAPPLICATIONS /DIR="C:\Program Files (x86)\LetsView\LetsView" /LANG=English
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4308
      • C:\Users\Admin\AppData\Local\Temp\is-FMIU2.tmp\installer.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-FMIU2.tmp\installer.tmp" /SL5="$70042,46659782,920064,C:\Users\Admin\AppData\Local\Temp\installer.exe" /VERYSILENT /SUPPRESSMSGBOXES /FORCECLOSEAPPLICATIONS /DIR="C:\Program Files (x86)\LetsView\LetsView" /LANG=English
        3⤵
        • Manipulates Digital Signatures
        • Drops file in Program Files directory
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:812
        • C:\Windows\SysWOW64\sc.exe
          "sc" stop LetsViewService
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:1196
        • C:\Windows\SysWOW64\sc.exe
          "sc" delete LetsViewService
          4⤵
          • Launches sc.exe
          • System Location Discovery: System Language Discovery
          PID:2740
        • C:\Windows\SysWOW64\msiexec.exe
          "msiexec.exe" /i "C:\Program Files (x86)\LetsView\LetsView\Bonjour64.msi" /quiet
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4432
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /C ""C:\Program Files (x86)\LetsView\LetsView\usbmmidd_v2\wxcastservice_start.bat""
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4492
          • C:\Windows\SysWOW64\sc.exe
            sc create LetsViewService binPath= "C:\Program Files (x86)\LetsView\LetsView\usbmmidd_v2\..\WXCastService.exe" start= auto
            5⤵
            • Launches sc.exe
            • System Location Discovery: System Language Discovery
            PID:1092
          • C:\Windows\SysWOW64\sc.exe
            sc start LetsViewService
            5⤵
            • Launches sc.exe
            • System Location Discovery: System Language Discovery
            PID:4644
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\system32\netsh.exe" advfirewall firewall delete rule name="LetsView" program="C:\Program Files (x86)\LetsView\LetsView\LetsView.exe"
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:624
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="LetsView" dir=in action=allow program="C:\Program Files (x86)\LetsView\LetsView\LetsView.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:2868
        • C:\Windows\SysWOW64\netsh.exe
          "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="LetsView" dir=out action=allow program="C:\Program Files (x86)\LetsView\LetsView\LetsView.exe" enable=yes
          4⤵
          • Modifies Windows Firewall
          • Event Triggered Execution: Netsh Helper DLL
          • System Location Discovery: System Language Discovery
          PID:2300
        • C:\Windows\SysWOW64\icacls.exe
          "icacls" "C:\ProgramData\LetsView\LetsView" /grant Users:(OI)(CI)(F) /t
          4⤵
          • Modifies file permissions
          • System Location Discovery: System Language Discovery
          PID:3288
        • C:\Windows\SysWOW64\icacls.exe
          "icacls" "C:\Program Files (x86)\LetsView\LetsView" /grant Users:(OI)(CI)(F) /t
          4⤵
          • Modifies file permissions
          • System Location Discovery: System Language Discovery
          PID:1644
        • C:\Windows\SysWOW64\icacls.exe
          "icacls" "C:\Users\Admin\Documents\LetsView\LetsView" /grant Users:(OI)(CI)(F) /t
          4⤵
          • Modifies file permissions
          • System Location Discovery: System Language Discovery
          PID:1528
        • C:\Users\Admin\AppData\Local\Temp\is-2P31Q.tmp\PinTaskbarTool.exe
          "C:\Users\Admin\AppData\Local\Temp\is-2P31Q.tmp\PinTaskbarTool.exe" /unpin "C:\Program Files (x86)\LetsView\LetsView\LetsView.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:1308
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3112
    • C:\Windows\System32\MsiExec.exe
      C:\Windows\System32\MsiExec.exe -Embedding 1EC6A77642BB87B497E4C3374C290CFD
      2⤵
      • Loads dropped DLL
      PID:3448
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding B9688E804032F7B271792FE2E8F029A5
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2700
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 321DD39A2FF4BD9865E4F0C5369420BE E Global\MSI0000
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3208
    • C:\Windows\System32\MsiExec.exe
      "C:\Windows\System32\MsiExec.exe" /Y "C:\Program Files\Bonjour\mdnsNSP.dll"
      2⤵
      • Loads dropped DLL
      PID:1988
    • C:\Windows\syswow64\MsiExec.exe
      "C:\Windows\syswow64\MsiExec.exe" /Y "C:\Program Files (x86)\Bonjour\mdnsNSP.dll"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:1968
  • C:\Program Files\Bonjour\mDNSResponder.exe
    "C:\Program Files\Bonjour\mDNSResponder.exe"
    1⤵
    • Modifies firewall policy service
    • Executes dropped EXE
    PID:2380
  • C:\Program Files (x86)\LetsView\LetsView\WXCastService.exe
    "C:\Program Files (x86)\LetsView\LetsView\usbmmidd_v2\..\WXCastService.exe"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4716
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\LetsView\LetsView\usbmmidd_v2\..\usbmmidd_v2\usbmmidd.bat"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:964
      • C:\Program Files (x86)\LetsView\LetsView\usbmmidd_v2\deviceinstaller64.exe
        deviceinstaller64.exe install usbmmidd.inf usbmmidd
        3⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:4520
  • C:\Program Files (x86)\LetsView\LetsView\LetsView.exe
    "C:\Program Files (x86)\LetsView\LetsView\LetsView.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Executes dropped EXE
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4644
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x300 0x308
    1⤵
      PID:4120
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
      1⤵
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of WriteProcessMemory
      PID:3064
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "1" "c:\program files (x86)\letsview\letsview\usbmmidd_v2\usbmmidd.inf" "9" "4f9666e1f" "000000000000014C" "WinSta0\Default" "000000000000015C" "208" "c:\program files (x86)\letsview\letsview\usbmmidd_v2"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:4380
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "2" "211" "ROOT\DISPLAY\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:d470a17d4e87d07b:MyDevice_Install:2.0.0.1:usbmmidd," "4f9666e1f" "000000000000014C"
        2⤵
        • Drops file in Drivers directory
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        PID:4828

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e57edce.rbs

      Filesize

      126KB

      MD5

      e4749a0e2030b1883431c824e2435bc9

      SHA1

      75e11cd65f20f3bdd85a3540baa1636f714d2af1

      SHA256

      aa2aa8e632c97ed4bb679c351555fb075362c919bbf6459b5fde10182816ace3

      SHA512

      f2bc475b52119ac16fa0e7becf1bc70a1b0760fd1e203114fcae3dbb9dfbc0de6e512c2e3e868c8a6d1a3c176d02f08ab3ab5847c21fc80b662755ed447d9601

    • C:\Program Files (x86)\Bonjour\mDNSResponder.exe

      Filesize

      381KB

      MD5

      5ea9c80f18cbc393ea7d9a2991ded4b5

      SHA1

      b8917c5ae45d1ba5ca534058f1386fac92f5da63

      SHA256

      7e5eb1ce44febe93686174058d51581fa00bdff0ebb84bd74bc08f6386019253

      SHA512

      7fd949b792a40630ca385dd2bc88db9673f9106975b9f55481e2382f67986dd75b03cdf0fbf59846b513a8def0c506ac6561f6ba658775286f11d761b575513a

    • C:\Program Files (x86)\Bonjour\mdnsNSP.dll

      Filesize

      119KB

      MD5

      f6d02735de16705c1ebe6429592cd355

      SHA1

      c6ee693de2c01cad34012471b70d87869969a0cb

      SHA256

      356c49c5e1328fb181c295a84292471c566e11099e46d7a34c017931863d86a4

      SHA512

      1e37adcdcb399f1d9f84599dcd4254b7da342f6d52f6af7faf51fe618c96fbb3754813e97cf7c5ec224dac58d341658d8422dcd8bb26549bbf4952251353cd13

    • C:\Program Files (x86)\LetsView\LetsView\Aliyun.Log.dll

      Filesize

      77KB

      MD5

      dcb7d24b7c24bdc474a4ddbce4404c97

      SHA1

      ddb03f0e22f632f28edbcd31208c35288d42d57e

      SHA256

      06d8f6f58ef29fd50fa89b5bf5e5a4f2a2c4cc39583d78fbb90e931914cb572f

      SHA512

      6e404ac3bd956e88df83ff067ea8188f3e1c1bc2319110073a108a5106495b1a4829dd3e0652a5bd3ee4d4c20ea86b589de2e46e29f139e3456a21bf7639d4a1

    • C:\Program Files (x86)\LetsView\LetsView\Aliyun.OSS.dll

      Filesize

      260KB

      MD5

      78d3b2b6af66a68ba89ab685799d44cd

      SHA1

      85f7065e53378a330e74ba3bdb9bf930ad5f2472

      SHA256

      c7161d879b9a93e17016e8f10290fac69a524690cace1761faf03879a42a1f79

      SHA512

      f48ff08135340bb94870104f3d7b91dcfd42e14fb6c7ac87a0b2de03a05cf92cba50734d8bed4d87d64df3dd3ab331996430977e34d7b001930107c0eb9f5d09

    • C:\Program Files (x86)\LetsView\LetsView\Bonjour.msi

      Filesize

      2.3MB

      MD5

      fe167cdd26d09bb444034c8276f7bff0

      SHA1

      9731063c44946b03c826d7fe4e9f9430ea05f23e

      SHA256

      7d7b2986d4fd35cc98af3607b1a5e2e004d6ab1116a4a9db37a66c17b63b6397

      SHA512

      ff1f3a2aab8c8d0c65b1f88b4caa1cb019062897d424e9cc53522d9fe5be2ca8498d675f7312e70e2f5e16e65dac33341fa88179cd8be563038fdf317c8a407b

    • C:\Program Files (x86)\LetsView\LetsView\Bonjour64.msi

      Filesize

      2.6MB

      MD5

      86e2b390629665fbc20e06dfbf01a48f

      SHA1

      d9f4697a6f4eceea24735822cb1df501268ca0b0

      SHA256

      46e31e284da64d6c2d366352b8a8abcf7db28d3e2a870d8fcf15c4a6fe0a6dd1

      SHA512

      05ecd3be5779f39db09329dda4dce0e3c49ac5d3950e92833031622b53542dadbe9e2948df35faeb4c41dbc8e01992935087c4a2975c797bd008ae177f7c3fea

    • C:\Program Files (x86)\LetsView\LetsView\Letsview.exe

      Filesize

      14.7MB

      MD5

      9a3d12e0ca0dc54b0a51c1386567b850

      SHA1

      a3fc4e9b83be02e1a2434c3a7a9b82c7eee52a11

      SHA256

      c1eff3cd24f86ca95955c72b7c31e26ad7c2ccface305ed23cbe71451ec767ff

      SHA512

      0a199987d0da15c7a3628a0c750fd34870d7add0772b2321cb375fdc632ab890d74c69de7a87bfc2a4bebf4ad23b156d0c4ee0fab0f0765b84da360c0403e91a

    • C:\Program Files (x86)\LetsView\LetsView\WXCastService.exe

      Filesize

      401KB

      MD5

      77b438638ec6d2b9a3e31751f851406e

      SHA1

      559d06eeb32927fb069ba63e5fa0cc42df681137

      SHA256

      d569d50aef8876a5c0346b8985186e5aa5cb94a20aed2539e93e8dc48ab2b447

      SHA512

      fe61a7a2644fbfad53eba29d64db6b96475f78b3f39e2ab3ebf244147829e6549c74b14ec1dc3e72ac85e76e5f02cdfa9e4f0b5f720f63928314e5e21c99b048

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-console-l1-1-0.dll

      Filesize

      11KB

      MD5

      e4dfc2bfe7b21233be21f6d1724f6d4b

      SHA1

      98aaa4e02e5e9bdec7d76a173b4b84c84f95f461

      SHA256

      9abb11919240f1a7a0c7ff1564da0f369bbbcad24e07b27a304c845c1eacc4de

      SHA512

      d0540a08277a3d00802bfc70941c481fbd974246d7ef6b036625a4e8c964fd5d30b88c83e0908362c1da974de497ca621e6dea9f2e26809cbadf6dcf58bc4c49

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-datetime-l1-1-0.dll

      Filesize

      10KB

      MD5

      7fec155413dacdcdf317125d0028864c

      SHA1

      e3ec6be344dbaa41950ed4c7bbef0fa935f3e6d9

      SHA256

      e67e489a49d060e62d84e9da69a6d75aae16bcdcf4f3a1a93c5736d38b442fbf

      SHA512

      f9bea766ef60674b7a31737c62a9978fe5a8b12ccb7bf056ac8be6327fac37a8c73905104b47c9ea37b741aa0b3c449ab362de098d73a875ec740fd0c319c6f1

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-debug-l1-1-0.dll

      Filesize

      10KB

      MD5

      35e0a11f1bdbff0c994f769fc5befa14

      SHA1

      feb103ae82a609e2a65d7022dc5993e491c94045

      SHA256

      740fe94f94043b42710641abf81693f4794d57d4de9ab552498f796046550b13

      SHA512

      8516ba178833c2511725b973c08834fa90693a9b06b0934eec8467ee3091ea9aebe2687d71cc2615ca96a75021e4e1803a9ff52c9b635f079976f852a99bbd4d

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-errorhandling-l1-1-0.dll

      Filesize

      11KB

      MD5

      fe523cf564489a7cdd4baaa99845e74f

      SHA1

      7c6e6d3456d9aba8395ece29733d75ee60a09207

      SHA256

      74a6fa40cc3351ab22a387a94d62c4012913f6303fd4f997304c01dc691ba0fc

      SHA512

      071d52d90f48b49188acba7a943baf3230c8caa8d820d675ee51b858865a57d7717450cc8e105236c188fc49a8ca4e1908dde5340309d1735f59bd809dd419dc

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-file-l1-1-0.dll

      Filesize

      14KB

      MD5

      dd5b0d3aea79781f532712413d0a4b47

      SHA1

      a1fa0eec8b3cc7965c36523c0caf4dc8d3919c25

      SHA256

      36424777d41a90d57c2f129405bc0859d629402fd3c35a12e9118021c8ee7a8d

      SHA512

      d1fd3ff61e8ba882e266c0396587086eecf01ba7b75d2590943a38a74031936c729d99da236eda3e7dbac4f2cc48823a6567b06d9fda19d12672f30663298a70

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-file-l1-2-0.dll

      Filesize

      11KB

      MD5

      5d02c661b442d9c5de21a77538374339

      SHA1

      7207e6d5e14ae872597cba62ce642dfb0f9839d2

      SHA256

      9b92a8f46cbd51a70cadc0e72cf1d422a972806ff6f6459d07b7583d03c386a4

      SHA512

      b1580d083757c344bb32bd6b99c9ae16aaad5f19040ee771a9d0d7dc9a917c956689a9b182dabce0e6a384390f3053e81cf013e6b690db1ffcab7e7036024391

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-file-l2-1-0.dll

      Filesize

      10KB

      MD5

      29ca2b6232e41863673be6540425039e

      SHA1

      c3c39e0bc21b49845d17a618c414a5ba48d6ad95

      SHA256

      af12dd95ea783bdb13873e6a175380fa7280bcde7c8d552970e14954ad43d09d

      SHA512

      749e063c59372abc47fa8e136456a5fe733a9468f4ed7f2db81085113f35ea93187ccd1d7bbf7dcad9d43a03d6da553460ad60d4a0c1ed4bc492507e6bdb9381

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-handle-l1-1-0.dll

      Filesize

      10KB

      MD5

      37dd1e5b624d12b45fd748a43f2c0874

      SHA1

      681b1b4c64069ce42dde6a3d0149b02337c14f6d

      SHA256

      be82b32df8e454d4f3fbe35f8d8393ba2ec37f1d4bd6369a163d0bfa63697e1c

      SHA512

      c7d3b0b51ff47685eede1bb1091a930e0b752b2feb3e102b231a2fe41acc2d82d62e59a254ae298c6e38e68340eeb9e9101d4e95e65a600e4c50acf988d6f1e3

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-heap-l1-1-0.dll

      Filesize

      11KB

      MD5

      68b97e0084ea10785d16259ae1d7dcd6

      SHA1

      9f703ba656effd841a9cda729ac80f1cae8ec76a

      SHA256

      128ab7811295eeafa4e47514962d6c3f7d9a36372fd12b03c09255ee4b4e3a8c

      SHA512

      d0b5004c740f5ca4cd42596d022430cb44522f5b0891707e4f6c782e3e0b1a0b9b14967c69c2b794524ca508acca9956b217e7b936bf93edfe9340891426c365

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-interlocked-l1-1-0.dll

      Filesize

      11KB

      MD5

      d58c835314572b4eef8e822623ce1c9f

      SHA1

      b5918f3e6165553f78643012f2be1e2aa49bd07b

      SHA256

      066d586820b27ea020f84ec7818c276f45686b15e8e5623e48559c6815b9dc66

      SHA512

      f04cf8aced4d43d74dcc15e38a794e9709318548a0fc79b4b4cdacf63e8fa039cd8702293a7617f704fd3a71b707f9c4e43ce8b4c8f051834d65b1f472b1ff2f

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-libraryloader-l1-1-0.dll

      Filesize

      11KB

      MD5

      a3e431794be520354c2ba1c5ec647b77

      SHA1

      39ddee262dede53278cd83282a8fcf5ba6d66f23

      SHA256

      5b256300259cd38e71b3525e854e1f46bc32c64e24af59f853b4827637f2eba5

      SHA512

      48183c14130ac97d2575d67ddb8cacf60b3c9103198dc93acd1acb960ca3bb900e429e7e91cf93bcaca31a63255edae3e3929a384691d4ccc89ea84e8860b616

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-localization-l1-2-0.dll

      Filesize

      13KB

      MD5

      a02a03fa2d7c75f3b79f1b1c049a36a1

      SHA1

      7c2222a6c4c434bdcec82732da805cb659fe8095

      SHA256

      76911bd316f4f94bca7806cd2a5e91125999818c37306789a26b171b44db557a

      SHA512

      01ac8e03680e60644eb7d3a2cc881e0de28d05d23e21062779a6b2dc50d87219634791cb3b1b61688bf2a16e6d52fc1e2ad4fe6e17ff7a4bbaed7b721aee6f3e

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-memory-l1-1-0.dll

      Filesize

      11KB

      MD5

      10d46b6447fb718a68228a82ecd0b0aa

      SHA1

      30e0e9f041b92b336ec571810dfa56772cea9234

      SHA256

      fd43c4981b93adc51daedc428be273c6ff7616592468366a91846ed21d0a7d74

      SHA512

      81d81782f39fe5bed592c8a394e657e97196ec3b0faca0e49397c10c36f1494e6d949650af65a746bd68979a9986e6d9adb6722e0ca30bdd6529935506b261ca

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-namedpipe-l1-1-0.dll

      Filesize

      10KB

      MD5

      c07cd1da2048e760e75903c4e7017ba9

      SHA1

      bb7538444d80759d467f9ce956628ee693013a0a

      SHA256

      95c5530eaabe668617d67d4711ea31cbafaa0adc467568412abd6ad23893542f

      SHA512

      2df1c48e8aeb0b736dc1579c39412a49ae532f12d4d5277b708bf77f7fbbb194bf818e3c6e35ee11621e9dc0c741de043cf85f71761dad670af0707467105c35

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-processenvironment-l1-1-0.dll

      Filesize

      12KB

      MD5

      02071ec8e5bc7a712807fb7fe270dfb4

      SHA1

      30404d2952d57bed3fa2d8b229e43bad1abcca05

      SHA256

      edabf4effd1c61b2c2b0dd6827b913e3491fc9287f7c29880ad850b884d7d223

      SHA512

      618e810c06933fb08b7424ac438ef382a9a38b815bcdac24a8bad910d8f27afe79f598f024c2cbe755390a4075a17dcbc1ac881c800113c2dce97932a3571359

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-processthreads-l1-1-0.dll

      Filesize

      13KB

      MD5

      d7cbcb3ec0293e9b4a3e68d5b89ee5a2

      SHA1

      a7e07bf065240cbc8010d65f00019ba48371ea57

      SHA256

      cd0670ad3702452a225735f2a43e40ed7141a45d26b01c7ce53a76ff3bda71ab

      SHA512

      da0ea99da959e1801cc3ee22ace0e56c60e0439f85765ff6a4639e2869642d00b24fc621fc8a777691d746e4cdc3942813818b9cfb273562c3133433bcccb5f4

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-processthreads-l1-1-1.dll

      Filesize

      11KB

      MD5

      dde67fcb6f45c79f7c5d3f68f4e0a374

      SHA1

      2579d5d126a4fb60f4f8c4b30615ee337d5b4a71

      SHA256

      b956696972c9ed819fb0ca3d138ee23f1f335f3766468bed7fd189e782e254ae

      SHA512

      3668eb6c266edbc54767dfbe6c457cf75685f3d5144a0c4731f72365f6a7eb7db0e948e6c04621e0fd2e0734ad92c8996a38d64154bfd266ebd2676498444d48

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-profile-l1-1-0.dll

      Filesize

      10KB

      MD5

      74aadb264f17674f0feacdb6bcdb884f

      SHA1

      def09bad16d25e52b8381d9ec0aaee46c8f128a4

      SHA256

      fa7abf71a5641287853ba0931f71ce8f9c8bc794397676d363ce55e8c5a9c236

      SHA512

      7eb44141ea96fedb44f364cfcdf05bb950f3fc135de2bdba6088a4e5c2c64c5e8b380edb50aaff5095c616b7bf19a97e7444da32206ce4148b93be022667b003

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-rtlsupport-l1-1-0.dll

      Filesize

      10KB

      MD5

      6de3b8d0e577d0bea5a9c834fe40fd5b

      SHA1

      b3d03035c7b6d4de2f1db74e6879434c2727cefa

      SHA256

      c5a5b195ee0becc39bb6395e8f28874942ac3974ecb716cf72d9d77d58386aca

      SHA512

      69762553ca99f650fe26399eaa8de234f12e20fe5d936212cac2f1c7951194fe4c908b908e02f49edee60e04a4918d89de1ca8d5a87266f6b7a1a0c2aa853dc4

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-string-l1-1-0.dll

      Filesize

      10KB

      MD5

      1c75ae2b1d5b0dd873debaa00c1aa829

      SHA1

      e3b1e666a79995618ede41d985346e20185b6d8d

      SHA256

      6b22bccd328b420f7c8b3f2d57126346ace6ecec58dc4f5aca328af4f021fb55

      SHA512

      a558b70aadaad8c1e2d052fcfd373679eca19438d516df2128bd6a58fbcd7f1194877ec72c554a927aa12cafb62c38a35a43b7d7239c9125f022869301dd4428

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-synch-l1-1-0.dll

      Filesize

      12KB

      MD5

      4626a91ab6a26196292730b527af61f6

      SHA1

      05c5af1b8785eadc85b9533621d735f0293076e7

      SHA256

      731a3d95efa88d260767454fda4bba1667262922eb5f9354605a880c8488aa9e

      SHA512

      7a9cfc7d7c08aa84bf507743097b06ac927726f11ad1806959587d1ae3e6e8a4db38449176f82150e7af93b266d6be4c3ff0f9d3af7265c3263a0dffc66df554

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-synch-l1-2-0.dll

      Filesize

      11KB

      MD5

      d954fdca8589f4f164baf711a32516c5

      SHA1

      2a679c903ea3b54ae84c93284e8b36aecbc5c31d

      SHA256

      72354bf1172c17d96093ce92802e83fcdad61ffb20e6ee374e437a6e9673bf0a

      SHA512

      fd48df01d2514ef5ab8982470506f108e0ab278a55e2d16878d00459823b1adad9001bd13323c31803e0a5cf6bb159d7246bb48b42b352752bab90a45bfbab53

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-sysinfo-l1-1-0.dll

      Filesize

      11KB

      MD5

      2cd3c450d52025f817b38b1a52d086a8

      SHA1

      8dc978a036c084567c84ac75e97587195c7ba1fe

      SHA256

      4e1480f61f589d98fc16e45d33ebd0418206b2e1db0d6f2c5d5b841728f7d5e9

      SHA512

      c0fa2e52d61662ab0f6de725a075002a5278232db24709367c0824f0236e3b59ac004811b53553b72e8027cf80cc3b366383baad8c061df44ba2b5ab3559b512

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-timezone-l1-1-0.dll

      Filesize

      11KB

      MD5

      40172df88efd0e3a9db6f621ead9dc2e

      SHA1

      c0cfc18bd14e0867fadb498c4ab8cc781985865d

      SHA256

      661af60756f0937cf7b5d4cd27a0584ff36e46c16b99b036819168045638419a

      SHA512

      84d85e7aedf7f7165309e9e7b6f0274fcb11b028c5c97e3fa9ff765907b1424498c0e51333f53fa07fca27cd7aa916c99ae6795bb72af75729e8468006b9572a

    • C:\Program Files (x86)\LetsView\LetsView\api-ms-win-core-util-l1-1-0.dll

      Filesize

      10KB

      MD5

      c5a081a6ad3b1845e5406244b8d28f70

      SHA1

      8abf308e5d6532c604f4865c1cf837760b6ac9b8

      SHA256

      19be2ed62d89e8c663b4a7b02275d5c3870fb43310048aca51d813f9edd980be

      SHA512

      75ef97cf9a75f9bf191b9ec99c9afc547848c3e530bb21dee47dbde6c0d7095e9ea3099a0e67e00e36ed69a01acef305c733d7edb980fb41fff4ce1e22197564

    • C:\Program Files (x86)\LetsView\LetsView\data\obs-plugins\obs-qsv11\locale\is-GE0ID.tmp

      Filesize

      18B

      MD5

      0ebd4c9db48f04f789e6254a92af4b97

      SHA1

      45f98976d001a97e4b18489cb73cca2aadcb1cf3

      SHA256

      54550f5495ca78de8ab1b4d32ddec042077823cb5654808e9f9f003857125450

      SHA512

      9b3ca441b80f23ff89094175bca2a2647d76e38277830420e933935a631a82ee010743410b632078750f4272cdc6b3362a56649ce9694a2c712367e0ab7f0e21

    • C:\Program Files (x86)\LetsView\LetsView\fmt.dll

      Filesize

      121KB

      MD5

      340accfd5f5f85c6d8890d5214fe7425

      SHA1

      e40d37790bdcd5a765594b7556d2d86731a79cd0

      SHA256

      509259c5d7f6c919e785c71b753653068b3251283ab20974e900982ca0001253

      SHA512

      845b4cd7bf1f663ceaf82180ab942ec8af6a50ba334c39b598849c838888d0fa09effa2451a7d4a48df54a1033517e8e9f536e2e91193cf2d060e57c64d4ba80

    • C:\Program Files (x86)\LetsView\LetsView\msvcp140.dll

      Filesize

      438KB

      MD5

      1fb93933fd087215a3c7b0800e6bb703

      SHA1

      a78232c352ed06cedd7ca5cd5cb60e61ef8d86fb

      SHA256

      2db7fd3c9c3c4b67f2d50a5a50e8c69154dc859780dd487c28a4e6ed1af90d01

      SHA512

      79cd448e44b5607863b3cd0f9c8e1310f7e340559495589c428a24a4ac49beb06502d787824097bb959a1c9cb80672630dac19a405468a0b64db5ebd6493590e

    • C:\Program Files (x86)\LetsView\LetsView\usbmmidd_v2\wxcastservice_start.bat

      Filesize

      177B

      MD5

      6f71a8d4bf5abae13d55930d10120ca4

      SHA1

      df37d7764b6263e784d4f54aade9d936511245b5

      SHA256

      e199b95399e60fd9a604b82fe6cc0b4f330eb51281d0784daac58971b933a560

      SHA512

      6d1fdcb8cc974024374de4dc9e17a84da2f304e44b420661ca75883150ed13f3a85ecd18080089ab9ade0d07ad37d245c5705370b87918c4c7cd0445f06a52e4

    • C:\Program Files (x86)\LetsView\LetsView\vcruntime140.dll

      Filesize

      78KB

      MD5

      1b171f9a428c44acf85f89989007c328

      SHA1

      6f25a874d6cbf8158cb7c491dcedaa81ceaebbae

      SHA256

      9d02e952396bdff3abfe5654e07b7a713c84268a225e11ed9a3bf338ed1e424c

      SHA512

      99a06770eea07f36abc4ae0cecb2ae13c3acb362b38b731c3baed045bf76ea6b61efe4089cd2efac27701e9443388322365bdb039cd388987b24d4a43c973bd1

    • C:\Program Files\Bonjour\mDNSResponder.exe

      Filesize

      451KB

      MD5

      b5c2f92ee1106dfe7bb1cce4d35b6037

      SHA1

      31070ef84c5355b082873ffc19ff60659637995f

      SHA256

      e399c390687589194d8aad385055f0cfa7d52ad9e837d8ff95008b8eb2b34e50

      SHA512

      7f82752b271ee35bad31a8571ae33b8cc83ef48f41937297dfc446f6f9b12da3d8b8336a527f6bbc5bc3c6627deadbd38a5f109b16c7d1386a3db36742c5a9c7

    • C:\Program Files\Bonjour\mdnsNSP.dll

      Filesize

      130KB

      MD5

      eaaa2b83c4764fdcfbee4a4d6546de92

      SHA1

      961a7e7735ee8f07ca54fa7cbfb23399748f8174

      SHA256

      043779b2c684699c89d6e8363d65baa9f31dff17d250059b56a8e3ae48c89b5b

      SHA512

      bc569de847db42bc2b1bc0a6ee0a792269b1d7dccffc8a5f0f6130495cabb8accb5ee312a0c749ccc13c395e4969a1a5738132ebb41cfebfaaf41126ac9737d3

    • C:\Program Files\Java\jre-1.8\lib\ext\dns_sd.jar

      Filesize

      17KB

      MD5

      ce9a2f5a7fcfff341d6d901ad919a2ab

      SHA1

      341f9d9a0b3fd8cfbefe0169b148dcc55688ee93

      SHA256

      cc36a44467f41cf2dc91c126e368e357b28a0d57101472d2dfd1c06a4091cdf7

      SHA512

      1f53e652b042ee27fe05b11ccda2ed9ae9a8f44b948b8658aa7a2d7ad2f5bd94ea16f3d9a92e65a8c65b7480517f1d05a066a4fb8d961b927d0d305399ca4e8f

    • C:\Users\Admin\AppData\Local\Temp\Setup Log 2024-11-20 #001.txt

      Filesize

      446KB

      MD5

      68e740877a8b371f4d4c258076bf052e

      SHA1

      af8eae7f271a281e68d532877a1bae8591ea7ece

      SHA256

      0ee12d84df01ccd2636e8198397143f56840cf6376973829fbb7fb5eef79efc6

      SHA512

      48f6c9e28a306cbf09462294815019f293afde2e0b5101a267637a71e4f295471ac61c79571d8b02d65ac50f21618ba232ca888b4561dca09c5bb17bf10fb963

    • C:\Users\Admin\AppData\Local\Temp\installer.exe

      Filesize

      45.4MB

      MD5

      df9ca22ae7a8c24d359ebe38f64c0981

      SHA1

      b7b7e10fe537b3a63ad2a4d4c79b1564d0abccf1

      SHA256

      3e273bae3be79827fc6d8bda508c16f5b55bc7e000ce82fd217a05953fa100d7

      SHA512

      c1d5a1c020031fe3a8e0c135ce33b75b6b5fcee49d6594ff3bd6e5df856e9d47a13f40e3bb45f176645970418cbbcc6e771a86bb0067308cfb2b6f884ad84c99

    • C:\Users\Admin\AppData\Local\Temp\is-2P31Q.tmp\isxdl.dll

      Filesize

      130KB

      MD5

      f7b445a6cb2064d7b459451e86ca6b0e

      SHA1

      b05b74a1988c10df8c73eb9ca1a41af2a49647b7

      SHA256

      bd03543c37feb48432e166fe3898abc2a7fe854b1113ee4d5d284633b4605377

      SHA512

      9cf6d791132660d5246f55d25018ad0cf2791de9f6032531b9aca9a6c84396b8aeca7a9c0410f835637659f396817d8ba40f45d3b80c7907cccbe275a345a465

    • C:\Users\Admin\AppData\Local\Temp\is-FMIU2.tmp\installer.tmp

      Filesize

      2.6MB

      MD5

      88eba8cda15027aab1700db1f80570f8

      SHA1

      99499e2b3a4e66a1e289610725828b1292a4dc05

      SHA256

      f6b079d36aadf4dcea30ac84752a528cd70185bc85d52b9e94813b8717fb713d

      SHA512

      4038d50b67cabf8669ef493415120d1ea726c569314444fecb266913ee3eb36b7c150ec2290fdcbae1d5cc87d31697b1f497555f9f08fec93fbf2a00ca52eea3

    • C:\Users\Admin\AppData\Roaming\LetsView\LetsView\config.ini

      Filesize

      163B

      MD5

      bde7a905d055b8ecb6df1bbf474f4f76

      SHA1

      91e5dff81215b1edd18e3cf22b49d0da12403f67

      SHA256

      39886420010d9b59b67a037b74f6d6a4a886adb1046cc6711439a6748f14a57e

      SHA512

      9a7a211d094ea5553794e7808bf846b75d55b275e594ffa3acc4b0eeda3da4f3fdab44a9f1bf2f338175dffd1820b13fd6d517e8e4a6ffb4d9f35426e2113241

    • C:\Users\Admin\AppData\Roaming\LetsView\LetsView\config.ini

      Filesize

      219B

      MD5

      7484c0b61ed75cf4a87297b289b02f25

      SHA1

      8f7dd66d83c6aa0f3f764bf76f98b4ad5343c779

      SHA256

      da28c74dceba9683f4b151e5190edb779f0c1e9836f77a87fe7d9591c0febcb1

      SHA512

      2f1b00119d8c8044f3bb95e5bec6536496700e45ce6718ef38ff74dadd64cb3c1796aa34a8cf4ad1b8dbb901de449b39b707c80ced11fab6aac9ec1087e45882

    • C:\Users\Admin\AppData\Roaming\LetsView\LetsView\log\Apowersoft.CommUtilities.Native.log

      Filesize

      671B

      MD5

      d99a938c848a7a58aa78378f7e166606

      SHA1

      6ccb2bdd476aba9d67b2429a432bac4eb7247775

      SHA256

      453717c8d5655fc6033460b8417228927955e5bb6ced267f05ebcb4c7dce63f6

      SHA512

      4ddd32800082c58652a9709c9aa19f3e5572baa4ad61ecd11bfa95a19ef6313c3ac3e4592d0f3cb8e693a7fefccb66d8ddf512fc48374cec185457bd1a6d0616

    • C:\Users\Admin\AppData\Roaming\LetsView\LetsView\log\Apowersoft.CommUtilities.Native.log

      Filesize

      5KB

      MD5

      1b16c1f4ecedb712f6be387f43346ee9

      SHA1

      135589b13f48568c9b77890347fdef9a4945dfbd

      SHA256

      aaae1fb2fe4409173be23268758dec78a264d3dba8b433a8593fe14194af3f02

      SHA512

      9ca18137904ed5dbd32a575d6910263dc5ec6e940ddc0cb2c6315d17b03985a09a2ab8ed7ec24562aab57476d3e45d6eede7bc7d1c26286d628bd2937bec4eca

    • C:\Users\Admin\AppData\Roaming\wxobs-studio\basic\profiles\Untitled\basic.ini

      Filesize

      27B

      MD5

      d785072bd43717886593f737817fff15

      SHA1

      8c7ef0936b7f5a5cec10e9b5e1278400e276e6f7

      SHA256

      7989006d0b1b17f5e4f4e20960713600d80612c3799963454e463f689a3cf613

      SHA512

      8bcd4ed11b248d2934bb7fed91cd8645b77f89ac75f357277a9de04e1121ef4217e982783d61c32b1e8e04d2c14eb82fab78926dc46861db511a8741a62c0c20

    • C:\Users\Admin\AppData\Roaming\wxobs-studio\basic\profiles\Untitled\basic.ini

      Filesize

      59B

      MD5

      ca6c5ed863b84359de0f7d0e4a05901e

      SHA1

      9870338c383a8d0d94e06b0cdd84af4beb6bb974

      SHA256

      7fa8fe85d7505d7565ed9dceaa85ca7ca0d478cac1528597348fa990f312ae0c

      SHA512

      4b0cbfef4db08a6a8a53d2d407093c2c93df82ada823275e185aca4cdd8fad6b4f6122c44af09569cfacfc6d79599246b90cf5718e27afa4ed27a51d60ea029d

    • C:\Users\Admin\AppData\Roaming\wxobs-studio\basic\profiles\Untitled\basic.ini

      Filesize

      86B

      MD5

      574329e5c00e0f8389faa4b2e0064b7e

      SHA1

      68751df643d5fceefe80ccf8ea59005c1f689539

      SHA256

      e01782e0ad6fe923a9edd4565817f2d1695653145014a59ccdd895e0c3a98b21

      SHA512

      03bc61017296342f451ebfa7fda96be5a5eabc6f54ed8fecd1d6d1c44f397184c1d1322650b3e3dd8ab061d532bbb76e45142171c87ee89fbdd6a12cad32e10f

    • C:\Users\Admin\AppData\Roaming\wxobs-studio\global.ini

      Filesize

      53B

      MD5

      e291913097c6b7f55541437948f2f8bb

      SHA1

      d03f060dcb8d2698caee878b8810c365471aea43

      SHA256

      6fd2f2dddbbb1dda9a32370a2a97b306c2e546159a62de1f211ceabc2f3e14a0

      SHA512

      a7c1e6267078772a9aaac683b4ae3312bbda8ef44dc123a477066a5cbfbad66173026218274baee774105cb3ffb29a9f7ec015b5132f27dbf05e35e03ba571a4

    • C:\Windows\Installer\MSIEF71.tmp

      Filesize

      76KB

      MD5

      950087e828e1b7426f703678e446c799

      SHA1

      c9f28be9b9f810132ec8d78c161e5a232491e60e

      SHA256

      8a41eaa0d699f48661c2560aeffe4b0432cf755f1b15e31ac9aff667d498b3ee

      SHA512

      9ab24bf84a4534e219df132a0b43874c1d6410ef802c69e65c5aaf3d0c46085470690851ef23303f9a48076e8ae552d816903e02c43c1af83e6fc3457d2acb93

    • C:\Windows\Installer\MSIF11B.tmp

      Filesize

      75KB

      MD5

      6f8e3e4f72620bddc633f0175f47161e

      SHA1

      53ed75a208cc84f1a065e9e4ece356371cac0341

      SHA256

      2adf199f6baf245f0b07d31a3a1401d4262c3e6c98b8f10df923ceb2c937291e

      SHA512

      80187277e78f59b7ea71ed3caa55452e730d93b8c296d5820d470776a428cbb7e7fead87240e811436f85e4d89df2b9f31d6d16658d21abf59395cab7074a869

    • C:\Windows\System32\DriverStore\Temp\{4dcf373c-988e-b640-bfe6-5cdd4eb685db}\SET3EAC.tmp

      Filesize

      5KB

      MD5

      0a09dab1c9a7f2e685cd7f8b5bd43ec0

      SHA1

      14b5fae8397fbda873dcc9ffd5cc189f14490c28

      SHA256

      a8750ca15a86742f3012886c9932bb974158cd2d9779cf891c730d976a47726a

      SHA512

      f6cc96686f06f1871ae95ddbe9e553bbff506765965e4c846ee02328c6566730a9f4df493c36ab2104565d41dbd7ea67d054984163e45bc414a8f1efba293368

    • C:\Windows\System32\DriverStore\Temp\{4dcf373c-988e-b640-bfe6-5cdd4eb685db}\usbmmIdd.cat

      Filesize

      11KB

      MD5

      e5f60b2f3a491983eac00dc7dc7c408b

      SHA1

      2566bf2ddc9e58f5262a2b11dda0c451d5ec9468

      SHA256

      470149c4cf9970ba59070aa7c9409c9f63a15727de99bab53e7e51f55310779f

      SHA512

      55b31a4da61b837891be7977bdf7b96457e5b54c5216e867bb1aca4580a84145f885896b13fcb72e937d3f424fec1105b4f9c0a9706dfabbec95fb53c7a302f5

    • C:\Windows\System32\DriverStore\Temp\{4dcf373c-988e-b640-bfe6-5cdd4eb685db}\x64\usbmmIdd.dll

      Filesize

      69KB

      MD5

      ee848c427145609d998725a38e7ad9af

      SHA1

      6b97d9ab1c3978cdc2d6735c227adca8f0aabddb

      SHA256

      dc135d675127113915a7e5aa9fe57c84edad6be41d0890b265ef124ab26ea9e3

      SHA512

      5bd0eca69d16a6fe32856978047967e44f0d49c59cd611b02e9d24ca59c0d862ad5f8a4d50c6bed816fa11e2f4fee6fabbe3d6d735224084f47161693eee8007

    • memory/812-2724-0x0000000000400000-0x00000000006A9000-memory.dmp

      Filesize

      2.7MB

    • memory/812-31-0x0000000000400000-0x00000000006A9000-memory.dmp

      Filesize

      2.7MB

    • memory/812-2637-0x0000000000400000-0x00000000006A9000-memory.dmp

      Filesize

      2.7MB

    • memory/1308-2714-0x00000000053B0000-0x00000000053CE000-memory.dmp

      Filesize

      120KB

    • memory/1308-2713-0x0000000004CB0000-0x0000000004D26000-memory.dmp

      Filesize

      472KB

    • memory/1308-2712-0x00000000002F0000-0x00000000002F8000-memory.dmp

      Filesize

      32KB

    • memory/4308-2725-0x0000000000400000-0x00000000004EE000-memory.dmp

      Filesize

      952KB

    • memory/4308-2726-0x0000000000400000-0x00000000004EE000-memory.dmp

      Filesize

      952KB

    • memory/4308-2540-0x0000000000400000-0x00000000004EE000-memory.dmp

      Filesize

      952KB

    • memory/4308-26-0x0000000000401000-0x00000000004A9000-memory.dmp

      Filesize

      672KB

    • memory/4308-24-0x0000000000400000-0x00000000004EE000-memory.dmp

      Filesize

      952KB

    • memory/4644-2744-0x00000000060A0000-0x00000000060B4000-memory.dmp

      Filesize

      80KB

    • memory/4644-2745-0x00000000066F0000-0x000000000678C000-memory.dmp

      Filesize

      624KB

    • memory/4644-2746-0x0000000006AD0000-0x0000000006B56000-memory.dmp

      Filesize

      536KB

    • memory/4644-2747-0x00000000066A0000-0x00000000066C2000-memory.dmp

      Filesize

      136KB

    • memory/4644-2748-0x0000000006690000-0x000000000669E000-memory.dmp

      Filesize

      56KB

    • memory/4644-2749-0x00000000066D0000-0x00000000066DA000-memory.dmp

      Filesize

      40KB

    • memory/4644-2750-0x00000000066E0000-0x00000000066E8000-memory.dmp

      Filesize

      32KB

    • memory/4644-2751-0x0000000007630000-0x0000000007696000-memory.dmp

      Filesize

      408KB

    • memory/4644-2752-0x00000000078E0000-0x0000000007C34000-memory.dmp

      Filesize

      3.3MB

    • memory/4644-2753-0x0000000008020000-0x0000000008028000-memory.dmp

      Filesize

      32KB

    • memory/4644-2754-0x0000000008040000-0x0000000008048000-memory.dmp

      Filesize

      32KB

    • memory/4644-2755-0x0000000008410000-0x00000000084A2000-memory.dmp

      Filesize

      584KB

    • memory/4644-2756-0x0000000008700000-0x000000000871C000-memory.dmp

      Filesize

      112KB

    • memory/4644-2757-0x00000000086F0000-0x0000000008700000-memory.dmp

      Filesize

      64KB

    • memory/4644-2743-0x0000000007080000-0x0000000007624000-memory.dmp

      Filesize

      5.6MB

    • memory/4644-2764-0x0000000009510000-0x0000000009A3C000-memory.dmp

      Filesize

      5.2MB

    • memory/4644-2774-0x00000000091D0000-0x00000000091F6000-memory.dmp

      Filesize

      152KB

    • memory/4644-2775-0x0000000009240000-0x0000000009274000-memory.dmp

      Filesize

      208KB

    • memory/4644-2776-0x0000000009280000-0x00000000092BE000-memory.dmp

      Filesize

      248KB

    • memory/4644-2777-0x0000000009200000-0x0000000009218000-memory.dmp

      Filesize

      96KB

    • memory/4644-2778-0x00000000093D0000-0x00000000094DC000-memory.dmp

      Filesize

      1.0MB

    • memory/4644-2780-0x0000000009230000-0x000000000923E000-memory.dmp

      Filesize

      56KB

    • memory/4644-2779-0x00000000092C0000-0x00000000092DC000-memory.dmp

      Filesize

      112KB

    • memory/4644-2781-0x0000000009360000-0x0000000009370000-memory.dmp

      Filesize

      64KB

    • memory/4644-2782-0x000000000BD10000-0x000000000BD32000-memory.dmp

      Filesize

      136KB

    • memory/4644-2783-0x000000000BD40000-0x000000000BD5A000-memory.dmp

      Filesize

      104KB

    • memory/4644-2784-0x000000000BDE0000-0x000000000BE34000-memory.dmp

      Filesize

      336KB

    • memory/4644-2785-0x000000000BE90000-0x000000000BE9A000-memory.dmp

      Filesize

      40KB

    • memory/4644-2794-0x000000000C020000-0x000000000C03C000-memory.dmp

      Filesize

      112KB

    • memory/4644-2796-0x000000000C040000-0x000000000C048000-memory.dmp

      Filesize

      32KB

    • memory/4644-2798-0x000000000C090000-0x000000000C0A2000-memory.dmp

      Filesize

      72KB

    • memory/4644-2797-0x000000000C000000-0x000000000C008000-memory.dmp

      Filesize

      32KB

    • memory/4644-2799-0x000000000C230000-0x000000000C253000-memory.dmp

      Filesize

      140KB

    • memory/4644-2800-0x000000000CF20000-0x000000000CF28000-memory.dmp

      Filesize

      32KB

    • memory/4644-2801-0x000000000F070000-0x000000000F078000-memory.dmp

      Filesize

      32KB

    • memory/4644-2802-0x000000000F5A0000-0x000000000F5D8000-memory.dmp

      Filesize

      224KB

    • memory/4644-2803-0x000000000F570000-0x000000000F57E000-memory.dmp

      Filesize

      56KB

    • memory/4644-2741-0x0000000006010000-0x0000000006056000-memory.dmp

      Filesize

      280KB

    • memory/4644-2742-0x0000000006890000-0x0000000006ACA000-memory.dmp

      Filesize

      2.2MB

    • memory/4644-2740-0x0000000006120000-0x000000000664E000-memory.dmp

      Filesize

      5.2MB

    • memory/4644-2739-0x00000000003A0000-0x000000000125C000-memory.dmp

      Filesize

      14.7MB

    • memory/4644-2892-0x000000000A270000-0x000000000A28E000-memory.dmp

      Filesize

      120KB

    • memory/4644-2893-0x000000000A310000-0x000000000A382000-memory.dmp

      Filesize

      456KB

    • memory/4644-2894-0x000000000FB60000-0x000000000FB68000-memory.dmp

      Filesize

      32KB

    • memory/4644-2895-0x0000000013AB0000-0x0000000013AB8000-memory.dmp

      Filesize

      32KB

    • memory/4644-2897-0x000000000C230000-0x000000000C253000-memory.dmp

      Filesize

      140KB

    • memory/4644-2896-0x0000000065FF0000-0x000000006749D000-memory.dmp

      Filesize

      20.7MB