Analysis

  • max time kernel
    1558s
  • max time network
    1568s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2024, 17:25

General

  • Target

    riptweakcracked.7z

  • Size

    305.3MB

  • MD5

    8b02904f43a13ed8b700e3ea01e5cbda

  • SHA1

    d05fa65537930533e256aeea711f4055770cca1f

  • SHA256

    3adf1a24d2b6be6d1942dfd603dd4535de000fac2929f8eb8fc8ff6a5448ba07

  • SHA512

    b58ffe56e13d59354531a0625a7da6b9146ea5b6015de373278ada495f48762e443310307d6af6981e5e708104b2ccfb97e861678a2b4469dbaa0c48462751ad

  • SSDEEP

    6291456:3A8JrBaB7xIVPrGHzh1cy/UkQEfWCS4zHjabjVkM3z9PeoEbz45sDuz:w8iB7S9wnco8yHjaPVNVe14yDuz

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 3 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 12 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\riptweakcracked.7z"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Users\Admin\AppData\Local\Temp\7zO4282BAC6\RIP Tweaks Ultimate.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO4282BAC6\RIP Tweaks Ultimate.exe"
      2⤵
      • Executes dropped EXE
      PID:2280
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2868
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe"
      1⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      PID:2712
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
      1⤵
      • System Location Discovery: System Language Discovery
      PID:1104
    • C:\Windows\system32\msdt.exe
      "C:\Windows\system32\msdt.exe" -id AeroDiagnostic
      1⤵
      • Suspicious use of FindShellTrayWindow
      PID:916
    • C:\Windows\System32\sdiagnhost.exe
      C:\Windows\System32\sdiagnhost.exe -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\gd3ysmim.cmdline"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1044
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES605A.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC6059.tmp"
          3⤵
            PID:756
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rca48jjp.cmdline"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1816
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES60D6.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC60D5.tmp"
            3⤵
              PID:328
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qmebn3cs.cmdline"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2428
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6153.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC6152.tmp"
              3⤵
                PID:2820
            • C:\Windows\system32\WinSat.exe
              "C:\Windows\system32\WinSat.exe" features -xml features.xml
              2⤵
              • Adds Run key to start application
              • Enumerates connected drives
              • Drops file in Windows directory
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2976
            • C:\Windows\system32\WinSat.exe
              "C:\Windows\system32\WinSat.exe" features -xml features.xml
              2⤵
              • Adds Run key to start application
              • Enumerates connected drives
              • Drops file in Windows directory
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2072
          • C:\Windows\System32\sdiagnhost.exe
            C:\Windows\System32\sdiagnhost.exe -Embedding
            1⤵
            • Suspicious use of WriteProcessMemory
            PID:1800
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\nuxyi_es.cmdline"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2636
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7CFE.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC7CFD.tmp"
                3⤵
                  PID:2744
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\9p0xzkwc.cmdline"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:1640
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7D6B.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC7D6A.tmp"
                  3⤵
                    PID:2572
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\e27zwivd.cmdline"
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1436
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7DD8.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC7DD7.tmp"
                    3⤵
                      PID:1268
                  • C:\Windows\system32\WinSat.exe
                    "C:\Windows\system32\WinSat.exe" features -xml features.xml
                    2⤵
                    • Adds Run key to start application
                    • Enumerates connected drives
                    • Drops file in Windows directory
                    • Checks processor information in registry
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1928
                • C:\Windows\explorer.exe
                  "C:\Windows\explorer.exe"
                  1⤵
                    PID:1192

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\ElevatedDiagnostics\560187709\2024112717.000\AeroDiagnostic.0.debugreport.xml

                    Filesize

                    15KB

                    MD5

                    ccc3ada93d46cf09177910f6ca4efd35

                    SHA1

                    4e42e33d477cc8904f794d4ddeed20ab351842df

                    SHA256

                    6c686402c16e95ff46e26c39622faeb9f04fe0fc603009b334f14ae9ed420a62

                    SHA512

                    a5fc439b7c5fb689a972a3efd6050d300d2f52f4ca56eff994a542d70c8eb010709ceb979a07faf474327f72b2e8f156cdae48a5875cfd75596375941714c7f3

                  • C:\Users\Admin\AppData\Local\ElevatedDiagnostics\560187709\2024112717.000\AeroDiagnostic.1.debugreport.xml

                    Filesize

                    14KB

                    MD5

                    d1e55dff0e518c753bb1c86234b3940a

                    SHA1

                    98ef1cf045764063ff86cc5a92b24ce0c3570c2d

                    SHA256

                    85c8c7bd4de1be75796297ccfa0f4240500fac28be531dfb9894e49c37dff92d

                    SHA512

                    f56fce9ca7dbb990df8448144b14564add9a00a099b091a16830bb063ead6c671339b69764f00a43ca269c1a0b5842488bc7eb96acc0f6dc31017501d9d4c9ab

                  • C:\Users\Admin\AppData\Local\ElevatedDiagnostics\560187709\2024112717.000\ResultReport.xml

                    Filesize

                    10KB

                    MD5

                    e25f154c43c761165f7e0d076a16dd30

                    SHA1

                    1aa5c7ea4fbf459d739757eb9de2955b3c05e951

                    SHA256

                    4e6f3268eb75d927ad4a5b69dc71949ff6eb6298453989114129c094cf7df568

                    SHA512

                    15194dd353622f96f305d40458141e4b31b268d1e352c627eda9e7b1c993d50461fe2cbc53dc8dc59923df223562f2f0e953ab17ada235f2c61618f592049e6a

                  • C:\Users\Admin\AppData\Local\ElevatedDiagnostics\560187709\2024112717.000\results.xml

                    Filesize

                    257B

                    MD5

                    4e05a8fc693136d440e79cc7a1fd4cf4

                    SHA1

                    246ccc386e9ed6b9e8655443c42f4844ccd47f64

                    SHA256

                    aa1a1eb53ca4349adcebef23f54e19f0864530709fba4698db87a2f5641d7692

                    SHA512

                    fc5c37a18e2c14cc19d9204a5256e0098f921fe6eef524740d93a870d6400cf9e17c4a173f14b655cdeaa4673a3ffd1f785366e881e9f13b03ef16d53789b1e8

                  • C:\Users\Admin\AppData\Local\Temp\9p0xzkwc.dll

                    Filesize

                    3KB

                    MD5

                    162a1e5e57c5684bd6013788cfb6677a

                    SHA1

                    1c69194e1cf978d9074eb8cc1640608beb7e84d2

                    SHA256

                    481f08cf3fa950a5f2c4fb442ea6f945eba212046b31229da8309f6eada1dfcc

                    SHA512

                    6140a9c629b1be7489de06c973c757935e8d6ed64ef5808eef2719ec034da80ba394a4ba929ebc13a266726d4f9e501c1a395416960afe2f46ea48f82ae4d90a

                  • C:\Users\Admin\AppData\Local\Temp\9p0xzkwc.pdb

                    Filesize

                    11KB

                    MD5

                    433c897306d4fc44a49bc6a79ab20796

                    SHA1

                    f5abfecb9e5aa0f26f755f3d6afa9da3ea863c3b

                    SHA256

                    b9ff4fdb62d30f093a619dc07ffedbdb0053c71857f23da9444e14a824de696b

                    SHA512

                    7ee20e95af390f188354c10d6bb37e93f65a5b5e6340d4838ab1dffcad640073979639cf7af2cb07dfda10833787b60f387265e62e825706c4d05afaf6fd376d

                  • C:\Users\Admin\AppData\Local\Temp\RES605A.tmp

                    Filesize

                    1KB

                    MD5

                    f01c3d3102509af691186b6725a33fdf

                    SHA1

                    9aa1520d8f0b8c7ead76feb08e39e6b10fa0fa2b

                    SHA256

                    05ce2864fcf39bcd94ae662cfc8f9fd021e9e234714880684c2879d6b45f80df

                    SHA512

                    d4e09c1107dc489d4eef304a76607d1dcbad52bacee144b4a9fdf272ae60c4ea596e56528ba5f2767b9fae08b26978791fe9852536448a8f3e598cd440b9554c

                  • C:\Users\Admin\AppData\Local\Temp\RES60D6.tmp

                    Filesize

                    1KB

                    MD5

                    1f037302065dd64dee9ab45b58dd2379

                    SHA1

                    405517a4ac5a409261bb5e0f1a736b65a93330b2

                    SHA256

                    05df5fa92c4c0b923e40a47dc8f10cdd5c5d51c116b284ca631d4cf67e42deb7

                    SHA512

                    cb19b3aa049324b632736631a9f3be48372efc316fde745964df381635d90c114b370c3d6480b73d97f7652e7d753cf506dfa63d752faafa883e96a2341dee49

                  • C:\Users\Admin\AppData\Local\Temp\RES6153.tmp

                    Filesize

                    1KB

                    MD5

                    a90135f9d5b579e778a851a564d7b5c4

                    SHA1

                    67bf194ee5499fd3bbe9759380d2db1f7b1e40f9

                    SHA256

                    44453bb82a2b1ffbbdfe45c0077c46731d000556b7a183ce9b153bca8d680749

                    SHA512

                    b3457adb00f018a1bfbb657457e3ec1b0f8238703a0ff1c9438ef55d322fe43cf4b94d628a6609bb0e71484aae2315d2693fa274087d5496e1ce3788e4705f7e

                  • C:\Users\Admin\AppData\Local\Temp\RES7CFE.tmp

                    Filesize

                    1KB

                    MD5

                    85a7f72c6ee8166e282162157077b00d

                    SHA1

                    b5beaba097412bf1e92d4d417bbf22424674fa33

                    SHA256

                    07efaa063ab8eb2fd00e9fe803e806df1dc160d303da0e8c61e5378363a5656c

                    SHA512

                    3db17654eab4f2fca260d4278695cb1ac516daf4c401dc60289006f7f3ea04c0acbae316d45dfa8b94e1eddb37b11a67c720440c5889cd257645520d476179eb

                  • C:\Users\Admin\AppData\Local\Temp\RES7D6B.tmp

                    Filesize

                    1KB

                    MD5

                    84dc4bb17f494241274d84811b0de5b3

                    SHA1

                    4d0ad1311d075ddcbfd35f4903e683af2c46cf4e

                    SHA256

                    547f779f78b5f514b72fe1aaac38115240ace4d59cd01fbf2785382ffa7a27e9

                    SHA512

                    16739048e846743c12eb55a3c6929fc85c47f84addf6ae81755c6a57e87d31ca9ee38d0e23bca4789b81ae48f2c57fb9a948fde6c80e745b6b99baec925b7452

                  • C:\Users\Admin\AppData\Local\Temp\RES7DD8.tmp

                    Filesize

                    1KB

                    MD5

                    d9ad8529e54cb403715a05040a74fd0c

                    SHA1

                    813c3d5769d2a1f12069f6e87f1fb2e7ee15d1e9

                    SHA256

                    96940ad39baa87ad9d1abcb2f4673f404bde5acf15c1d302c5db4e6da3b90645

                    SHA512

                    bc768e3c2c35242ac34d4a2289385360bd72e9248d8f79017eccee500f95e607371f2450c820ccf5fa8ed80a5848b0c70f006d6af3a0b409bac08b4ba5fc1f01

                  • C:\Users\Admin\AppData\Local\Temp\e27zwivd.dll

                    Filesize

                    4KB

                    MD5

                    9fce555d6a1a81158bf65b1b54ab65f8

                    SHA1

                    f43c6a05a530fb2dc263817ac68cf8d6b9d0a3b9

                    SHA256

                    a01fa4014609f4bd74613397a120344a04bc21535445ea71505a28530eef6181

                    SHA512

                    26cec8e150991214e4144e04f18c222560df2df26dcc103683f67e05ea22785d0a714b9875d05aeb18dcb2fdf995ad98c320640891dc6782b68e2cb6f8d2ecdd

                  • C:\Users\Admin\AppData\Local\Temp\e27zwivd.pdb

                    Filesize

                    11KB

                    MD5

                    2da286d5d2a8d29de49c87df2dc9b51b

                    SHA1

                    295421642e41fac2434b78860819c053870d91a7

                    SHA256

                    e8a1652060d558c7432f4bfcd14f50477364a4427d3ce539bdb12463b8e62322

                    SHA512

                    b03d1015ce3865df6e35cb5bcfba79b03c193d69e59e09a6e6138a99f9064c3b1a45dedab7b5f0703cadf7b2b1d01785dc27eddf20ec1bad5c1e8bc98718d484

                  • C:\Users\Admin\AppData\Local\Temp\gd3ysmim.dll

                    Filesize

                    3KB

                    MD5

                    8a9bfeaf861170b72ac96a73493aeed8

                    SHA1

                    389d4894c198c63de0b88a739eb336b0c0bf6102

                    SHA256

                    97fe3bda8840349cfcd53af011a368005b2c835c07dd88a9ddbde4adabde9dc7

                    SHA512

                    e0fc3bacce2e39af5fb0dd874e549c4892855eed4502a9cb404be0f3d090355f87cd40a9bd9e62a60bfd795fd220d1318bbf809a35826780ffeb14e70d09f21c

                  • C:\Users\Admin\AppData\Local\Temp\gd3ysmim.pdb

                    Filesize

                    11KB

                    MD5

                    47750a2e88d0ded4ed9df1030d127334

                    SHA1

                    6a616fec42bf6950f6707b724b22f378e79578a2

                    SHA256

                    fe6d224d800efda56b760f2fccc5912d18c07a7f61e03c00bde1e2da81f85b56

                    SHA512

                    4e1393fbd069a6d7cf2bc57d274850c045bc71b936f48149b3a7564e7d72a6493c0b0a7646167508dbc6ae77e89068582c51d73d3ba340404409965d5e8f26a4

                  • C:\Users\Admin\AppData\Local\Temp\nuxyi_es.dll

                    Filesize

                    3KB

                    MD5

                    e4aeb24a4d38cab23477d98e20c69b69

                    SHA1

                    0af65736d456bf3a8773acae4e53cd449a59e7b4

                    SHA256

                    979ef3e58f59fcd938089679487109cfffc2ef30274e98a76829a433038ef759

                    SHA512

                    977d0a8dc78d21e442eb21d8877f6b1b91419b19f4e694494d5ba754df13ed6cf309daa10cb06037f9a1af69efe09d5bbb035df2de311cb6c1bee91abbb40d6d

                  • C:\Users\Admin\AppData\Local\Temp\nuxyi_es.pdb

                    Filesize

                    11KB

                    MD5

                    169dccd11a52a363051270396d9ebd05

                    SHA1

                    734cddc7dbedb95cbf50866ee3e9f9b3e2259dce

                    SHA256

                    986eb3ff1018ae6a4e8451c3f1bc1859135be26e84c622aec5d99c201eade8b3

                    SHA512

                    cbe6186ea699f86b37e2de82a560af1a223a363f212f4a5913e788e1fa8c96578755f49005d7bccbe14342df92849733f6b21405ce5ab0687edca696945d5a7f

                  • C:\Users\Admin\AppData\Local\Temp\qmebn3cs.dll

                    Filesize

                    4KB

                    MD5

                    84d3507b95a4149be9408353c14af4af

                    SHA1

                    040bc8b6def44db87981de8dc7f91a66fb5efb87

                    SHA256

                    4b37bcb06254aa5983e05f748b897c4a8239dd2b8df6269f345dd36f574c5e49

                    SHA512

                    10916008fafabf2874b21246f7a799b1f2b81ef2861c2f855b6d9e9393ff58e794028fd17e07f56f9dbef5ed9d570f6b3e095d901142e78457e46b585bf98efe

                  • C:\Users\Admin\AppData\Local\Temp\qmebn3cs.pdb

                    Filesize

                    11KB

                    MD5

                    8ae6bcd0bb8e41bdebc28c03989f0d0f

                    SHA1

                    f65500949f736e156debcc49250dde7e3c07d07b

                    SHA256

                    18276120dd3e0c28b78725b3b23ded9a534da4c352e10ebeac9c4cc9ff07db4b

                    SHA512

                    c693f50d2d434c75b247ae3d26f2983354e9bd6197ca6c6eea4302b2cff5781d4ffdff278607076f2ec01d056bbd869e0608d7441d8cc903aa699009e9e0ed7c

                  • C:\Users\Admin\AppData\Local\Temp\rca48jjp.dll

                    Filesize

                    3KB

                    MD5

                    47be8dfa0f01c64073ebf4e372db3115

                    SHA1

                    46bfc4a82024473f7fd5035f1b77a075a96748c8

                    SHA256

                    9f6a8cd05b5d14ae1be0aa14ad739ccf6d07d7b66759bf0de3a7c61967633ed4

                    SHA512

                    5b3414935e27d01d7754c5b7ca4fa56e02ea6b2c9d40e9e23b9e1fc5b5cc3485d70383dd94a5cf2870c11d50b4627f685c673bb075060c5455876133c16dd3b8

                  • C:\Users\Admin\AppData\Local\Temp\rca48jjp.pdb

                    Filesize

                    11KB

                    MD5

                    4cb4443eebafb0ee1d103c5e1ddcaebd

                    SHA1

                    80add94ec00bf8bffa5305409d46ee680d7ee2a4

                    SHA256

                    cfa0302d87086046f90ed3f01ce540de82e6c5633651b5f95711b71ff2772c96

                    SHA512

                    73cf7dd217c9ca36b2bc0777865b8f40fbba5bea93c0933fb61f15d7786543543893c8b5563772d34b340bbddb25e6f0424d91b2d4c02a0363d116397a276a84

                  • C:\Windows\Performance\WinSAT\winsat.log

                    Filesize

                    11KB

                    MD5

                    725e2bf192bde86ebcd7c99c3b48d260

                    SHA1

                    a4a6af38282a7fbbb4fc3e657b44a368cb3966cb

                    SHA256

                    a044f37dd4cda7380aafbc81dae979a468f774a75bbf18217f789b2d8a155801

                    SHA512

                    10fd96ae14b62f9d0f520a6823e3c982a2d8bfde544a26c113496e7987d7fcfdc7fea0d3629639784b65bd5e11abf584fadc42fa18ae7e489a81ce64fc02a493

                  • C:\Windows\Performance\WinSAT\winsat.log

                    Filesize

                    12KB

                    MD5

                    c1c52261d02abf20981412a5155bddc6

                    SHA1

                    0cd7d12479135fb97edec4c86d90dd2912a93308

                    SHA256

                    c917638525f57f3d440136e6c7c1b99f7b932203af5f8700c5e96f51460ccc73

                    SHA512

                    1e7950fbf6b12a2b8ed6594e85e34cb1cd1582400ca7f9bbadf10b8e58fc019c2e30834ee86e2e6e6b55fd4ed9d9a24341e660dc0f3237d6b1a176ac33910ad6

                  • C:\Windows\TEMP\SDIAG_026c91b5-57d8-4385-b42e-133bc44e4d7b\features.xml

                    Filesize

                    10KB

                    MD5

                    5dd951bc684128fc2df6ce9b8f40d9ef

                    SHA1

                    b33e793484eee026c38fd144e4199e987f95b158

                    SHA256

                    3f013f6d01855a41bc6050417ca3f9d35d0380776054002843aa046bde55e257

                    SHA512

                    1eba578428dc21c217a3faa9d40d48ab6af150210a098d030c98412c372cccfad0e3e2ce2e857e80bea70d0e6f867a174b36b0210fe598fa2a520101284cbc05

                  • C:\Windows\TEMP\SDIAG_c7820037-8a6f-4998-9ad9-bef81b297e6f\CL_Invocation.ps1

                    Filesize

                    1KB

                    MD5

                    1f9f25c944b02d50c94cdab70975f380

                    SHA1

                    2bec7ea4882acd45779323e7c46ab0511de5c9ee

                    SHA256

                    4bf07370b2368177a4350f037627c7c45b06428be36a34b04c3cbca74224fd77

                    SHA512

                    b6a1189bc579aa211af9144b0dbe0c880638d2b3e2f6d21c554cfc3335264cd1344e0802e42a6185cd01b0136ccc01527a0c1f6f031702b3e97d7ce90232de73

                  • C:\Windows\TEMP\SDIAG_c7820037-8a6f-4998-9ad9-bef81b297e6f\CL_RunDiagnosticScript.ps1

                    Filesize

                    422B

                    MD5

                    d664a4f6a5e3e46eb91c4abc2344445a

                    SHA1

                    711c0f260dea6d5ddc99590ffcc95c5774ba65f3

                    SHA256

                    dbb2ab2748b78c8417b426fcd0a61264bb634ed374488d5dff012faf8fb5acf1

                    SHA512

                    1fd6f6fe7fc8d4d01e1e2f2f6e3849f396e4806ac0bf75d6055eecb46c99ecd6ab60fc4ad7195cbc13ab927bfded11e57e219e0361a165c4bbc9072c4dbb913f

                  • C:\Windows\TEMP\SDIAG_c7820037-8a6f-4998-9ad9-bef81b297e6f\CL_Utility.ps1

                    Filesize

                    11KB

                    MD5

                    2131f25cc7983b6f5585e492a6b7652c

                    SHA1

                    ea1fb3f0c85e4a483063b0bf082bded59f609b72

                    SHA256

                    9c9ee4a5b247a3c9297eff7bbe90f891c9980d1ee21c1df99219413952cd67d2

                    SHA512

                    5677fcace32fa65b5f04af70bc92b559bdae808c7ec692423d29972df5ce4b551622dbfa6ffb27ba48029bf974fa1b72016fe98255ad32535e23f770e3486510

                  • C:\Windows\TEMP\SDIAG_c7820037-8a6f-4998-9ad9-bef81b297e6f\CL_WinSAT.ps1

                    Filesize

                    2KB

                    MD5

                    ce41df40c8670f62b0fac65adcb5f090

                    SHA1

                    f432c26089400cdc404b0d2a2b9bce3dc80ee2d0

                    SHA256

                    cf39e1674af3d00cf6eba42c00bcc78a4b0e67785439b5246320def3cc44c2a7

                    SHA512

                    a7babc8ca6adbf76525c0d3610d79458ddb01c4333d50620e48403534ccfd22b3de5782e55ea5fa739c715b0f9954de6aed87bc5ea3320e7ecc78da2838c0483

                  • C:\Windows\TEMP\SDIAG_c7820037-8a6f-4998-9ad9-bef81b297e6f\MF_AERODiagnostic.ps1

                    Filesize

                    1KB

                    MD5

                    475c94cf2eff13cad9d92ce93cd36005

                    SHA1

                    2ff6abc5886db352fbd18925704ac407bc557244

                    SHA256

                    f026ec61d8634f0fa3f841e4aed8b6ffa672d221932b1b4353fc42da9876dd60

                    SHA512

                    fafab6cd507ed68376ceac3047ce607627ce765aadd90100542bfc19572643c949a6539a3708f7bedb3e5ff9993a3e3fb8f73b822b04be7c631825138ad20137

                  • C:\Windows\TEMP\SDIAG_c7820037-8a6f-4998-9ad9-bef81b297e6f\TS_MirrorDriver.ps1

                    Filesize

                    2KB

                    MD5

                    d43a7a015c0c9a10eb72b1644ffc368e

                    SHA1

                    e2d839100391cd31028601b73742f25700780313

                    SHA256

                    0fa0616c0fbe8721304a3418e14223d9045a92af72f693d0774f42c1fc4fa4c3

                    SHA512

                    6643ab02b958767cc82d4aeff97f970b667542fe97182576877f8df0da76a00bbfa38469fe837dbf747a1a57b37c154845bb7954e8b54545d6dc779156c58c5a

                  • C:\Windows\TEMP\SDIAG_c7820037-8a6f-4998-9ad9-bef81b297e6f\TS_SKU.ps1

                    Filesize

                    1KB

                    MD5

                    92159f7644293d98f8e30785565eb16a

                    SHA1

                    3e720674536ff4ead961a52882b6a98166368d45

                    SHA256

                    1c8ced564dbc58afbce52c7b536bb1f02a4b2d22e5d1e60a0a222dff965c2291

                    SHA512

                    e330930e6bbcf7fb83daa0dc8c117f5717ee10fa5c2f716796d75b356632333471ba633f37a72201fdb06d98858f53f3f829fab39c9831ab780f6f9449096a77

                  • C:\Windows\TEMP\SDIAG_c7820037-8a6f-4998-9ad9-bef81b297e6f\TS_WDDMDriver.ps1

                    Filesize

                    682B

                    MD5

                    22bae87291471ca7694b3626a84a07ba

                    SHA1

                    a4e4656b8ccaa6de8bcbbd34df8d5bc83f89507f

                    SHA256

                    1032055a41f8eb29f66aef4add3e85a1d778df063cd8e84854793868065384fe

                    SHA512

                    a90192304aebca86a4f0296b91b3f4a6a84c36371da80eba8d2f06f968df9e4f52e278127610584c42fe71d42c1040c8aa81865885eca9622e427af8e4e3f267

                  • C:\Windows\TEMP\SDIAG_c7820037-8a6f-4998-9ad9-bef81b297e6f\TS_WinSat.ps1

                    Filesize

                    468B

                    MD5

                    f85550996a88ab2216574e1e16719f12

                    SHA1

                    eb3ed9fe49a978835fca890f2b02668e9fc37fba

                    SHA256

                    36ce931fe27959e8512dc97860fd77f512bd485ecb35094c6982ccc06201f17d

                    SHA512

                    a95e8fd22492fcd65bca3982cb6bc162e2bb2d6eaeadbfbaca38e1f49d82f300fae384fbe2b0996cb7c196f9fa6d828926e4b999f9f5010df8e5b4faffa2a68f

                  • C:\Windows\TEMP\SDIAG_c7820037-8a6f-4998-9ad9-bef81b297e6f\en-US\CL_LocalizationData.psd1

                    Filesize

                    4KB

                    MD5

                    e3ade7d0dbef81572eaad37e3da7c001

                    SHA1

                    31eec9e74201b42698ab89419f20f6764f9651ee

                    SHA256

                    7037293ed8c531de399b1549ecb0824e432eed8fe292ff095fe262a7f7b90978

                    SHA512

                    3f050cac3d59ed01f8d6b1590ec321c747f30515166c5df9b70539b9eb236b135a0bf1ba138cc30c8b35ee566714fc0b80669b1343fecaa66b157a8445830643

                  • C:\Windows\TEMP\SDIAG_c7820037-8a6f-4998-9ad9-bef81b297e6f\features.xml

                    Filesize

                    10KB

                    MD5

                    b8a5f8a4b1c538a3d916f9566ca1b535

                    SHA1

                    c9b63e59f93c3a2277f4f765b4ee0493911853cd

                    SHA256

                    a3a6161f463f4de3fce63188295f6294d9001b1e69c155a793cf380cc19524f9

                    SHA512

                    cd462dfd3d0b9a62a7e92589dc32638b052f921a759fd3cebf224013c5fae83a12974c88642d7df6177973612e1c7896fa0e02a9f2d54b76d7100a458ded9147

                  • C:\Windows\TEMP\SDIAG_c7820037-8a6f-4998-9ad9-bef81b297e6f\features.xml

                    Filesize

                    10KB

                    MD5

                    282522b09e9090949e6cdca73e3d0676

                    SHA1

                    2c8e8d3f68c24c9752daaa2e1fec949277c020d6

                    SHA256

                    c389a3ac5485955b244ec1ceb8205e8e40c1118e5bb4dbcee2d7eb691d72a0ae

                    SHA512

                    24467e35c952800ff6c28a3b2d756a90fbd503f0c395007e7ce800b9f84fc9c9608c33871d901fae356a854756a9827eeacc72f3868242a26608d072d0fd6061

                  • C:\Windows\Temp\SDIAG_026c91b5-57d8-4385-b42e-133bc44e4d7b\DiagPackage.diagpkg

                    Filesize

                    17KB

                    MD5

                    c0fca3cb6514ec30611aa64b100823f9

                    SHA1

                    3d879b9d24dc5d5d32c58a08b2d408c41d3817c8

                    SHA256

                    0b89bc1428a7269c9c1c9c6a21197bfa6e3babc15cac6f5affe0058c153c5357

                    SHA512

                    4b0482574d8cd168cceda0fcbae38e1309ca2b74d434c70d56387b21358a5c683c3b3dbb20a4735e430a895d8362923dd18235cae2ac0eb1674b844e6f461fe1

                  • C:\Windows\Temp\SDIAG_026c91b5-57d8-4385-b42e-133bc44e4d7b\result\results.xsl

                    Filesize

                    47KB

                    MD5

                    310e1da2344ba6ca96666fb639840ea9

                    SHA1

                    e8694edf9ee68782aa1de05470b884cc1a0e1ded

                    SHA256

                    67401342192babc27e62d4c1e0940409cc3f2bd28f77399e71d245eae8d3f63c

                    SHA512

                    62ab361ffea1f0b6ff1cc76c74b8e20c2499d72f3eb0c010d47dba7e6d723f9948dba3397ea26241a1a995cffce2a68cd0aaa1bb8d917dd8f4c8f3729fa6d244

                  • C:\Windows\Temp\SDIAG_c7820037-8a6f-4998-9ad9-bef81b297e6f\DiagPackage.dll

                    Filesize

                    78KB

                    MD5

                    e7abb3254c2e312e8ab2573c958bb0d8

                    SHA1

                    814d8ef7005c47da2db4f4860943432ed095bf03

                    SHA256

                    1e2ea958babe187b96abd6f239e05c1b5f4b084b7fc5957d39a29a7a4dea0dba

                    SHA512

                    048616a53ec8da6a62c38dfdd2ff444b9b4db8b8b04d663ac8009ea744d336dd8ba1348ce33cd5dd903162d8a41066eba0cddf344da41e8761382ad9b94f9b1b

                  • C:\Windows\Temp\SDIAG_c7820037-8a6f-4998-9ad9-bef81b297e6f\en-US\DiagPackage.dll.mui

                    Filesize

                    12KB

                    MD5

                    b983391d75b096efd5c961eaebff965b

                    SHA1

                    5280d0994305687678aa93196e4e69213b268492

                    SHA256

                    6de6c7f84a02e5338786fa3dfe2873f978c9421cfacb7c76b1a0a25dbf204a92

                    SHA512

                    ff5fc225785fc79db299db8b6696bcc9bd4c54e406474f6168f851a290b9c50aa0b13d77f9d666dbe058066b2127c3bc0b6375a49e934cc50f1fed842defd2e1

                  • \??\c:\Users\Admin\AppData\Local\Temp\9p0xzkwc.cmdline

                    Filesize

                    309B

                    MD5

                    14cc2d39b7e6a01699c2a58c5715ca95

                    SHA1

                    452c05611d6860ffac62310e6b1e5b14f32da436

                    SHA256

                    1e25118533c1efe4a11e95abbc801b6d01b36b969720a4a0c62e22ba79d9b774

                    SHA512

                    8b11066d674b845e22f736ae490c018dd402f037632924926c80b5101043e9a09281c0755e3810ced34ee3f8d2b8c3a1e4123f741cb0ca4115cec0149972bb5a

                  • \??\c:\Users\Admin\AppData\Local\Temp\CSC6059.tmp

                    Filesize

                    652B

                    MD5

                    5ef63cdbffc613c66eb5f7afe8e15f3e

                    SHA1

                    598f5265107c87bbc10b30947e575a3201506bd6

                    SHA256

                    75f6f8e42b892d17ff169dfb847e4ca425c6c764d48fc2951d3a2034d06b7d0e

                    SHA512

                    cf7a1971ed8cb4619ba2c095c5846742ed217da01a5081c559ded7e7938faf1e7282bc013d8038c6a632892c4230ada412133cb5f78651eee9e2b33683095d8d

                  • \??\c:\Users\Admin\AppData\Local\Temp\CSC60D5.tmp

                    Filesize

                    652B

                    MD5

                    7ecd44ab7c673174292cabaf21fa96b8

                    SHA1

                    2e1cea9aca06f0bb6cab07acb202a563ddeffc28

                    SHA256

                    12d395a839a5b30e27ee9bf7d995d87b4122067c20a8656ff3a787d709be4c0e

                    SHA512

                    e3189e7369fee4c7a4eef244e9fcdd15f5a110eac6edbe33ca337f69212304a24d2ad6b5dcbd4074d4e1e3aa884fcd038261f33454c4489476e6ef783a762922

                  • \??\c:\Users\Admin\AppData\Local\Temp\CSC6152.tmp

                    Filesize

                    652B

                    MD5

                    2167e4cca3a889cbec6a5d89f9a62973

                    SHA1

                    fc26dc54c5a81bd597f4410d125058053fd4d38f

                    SHA256

                    18581d7bc3ef19e9f21c8ba899a3ef6ba6d8967f6024dd3d10dd3d8569954a77

                    SHA512

                    a69f6d31adedf5325405ff8c0146a6a00285c9051b64a785f6581ff9efa51b2da37b6b00f706ba48113fc25689200c4799593af9da828a1f0e541ed9b5276260

                  • \??\c:\Users\Admin\AppData\Local\Temp\CSC7CFD.tmp

                    Filesize

                    652B

                    MD5

                    55e7f5b716065b0f8aa22248049b0861

                    SHA1

                    a214c257d6b317bb63eed01ef83c4a8e2a584a41

                    SHA256

                    fd2cd4104308b1074df71c2a268c950a0792f928ddc3358c8afa2ea6c513c3a1

                    SHA512

                    924b88855bdbdf6cadf78877c28e7bde02c909d95035c137f3b769deaf678ec4174bf890a1688bfb7ec246a6276094aadfb73f48735aebf9866708f3f8c8aa6f

                  • \??\c:\Users\Admin\AppData\Local\Temp\CSC7D6A.tmp

                    Filesize

                    652B

                    MD5

                    24c7a899537621d252c2e3cd028bac3d

                    SHA1

                    d61c66bbe7735035a4f6ce9a287cf675e47edaea

                    SHA256

                    0b38e90103e240f3cbc4cd564b00519bdf887bbf986a8f7cb5518a0a27206618

                    SHA512

                    f700c04ac723747af87a37f82b5442456cef5a2282a9fbe36515ef2bf32b45b4fac25178f5a5cce0ee3949265775a6f3869bcef36b9bc84e937ced9eae2627ae

                  • \??\c:\Users\Admin\AppData\Local\Temp\CSC7DD7.tmp

                    Filesize

                    652B

                    MD5

                    cb8c2a25f75c6cf08768064acd6ec513

                    SHA1

                    f19c9174bf120aaa3adb21af796c2296e167bd44

                    SHA256

                    505e4b0a1d4b2127a1b379e81b315c1406b376a6ef978433392ae60adfab4248

                    SHA512

                    8a97a23b5c0c69b42b3423bdca082e4d00d9689885657da0d7656e1f195bfb175c56f9eeec99747ac59b4a7f61a095fb8de0621b3e9c46a5c97aedd03a95b32c

                  • \??\c:\Users\Admin\AppData\Local\Temp\e27zwivd.cmdline

                    Filesize

                    309B

                    MD5

                    3750fe33e768ab5ad6975ce5bc7df819

                    SHA1

                    a63ec94f88c7901c7f61c2cc9f9073674acd87a7

                    SHA256

                    ef10625a7cfc6c0177601e12dc2beace23ce3ed4d5812e46ed9f7ad5912aba81

                    SHA512

                    ece4e0b87d88bd88d63ed04c33a3ca703166a247aaddb18dfe07a5b4506a7a31bf1780d795c468fac4f6d985815f84eca1783bfe54d45ec4f79df1248f4f45bf

                  • \??\c:\Users\Admin\AppData\Local\Temp\gd3ysmim.0.cs

                    Filesize

                    446B

                    MD5

                    ec5c8c8f2004593e7919d93f25cf8715

                    SHA1

                    f8d1931138d4513354946a62ff835514c3322b8e

                    SHA256

                    bc27d56ccd20de336c1dde38d689b88bfd7f5b95309be5ed3800a4d8ecba63ee

                    SHA512

                    e0b908d385303f6e5f796f0610615f1a72c72be8228c0e9d0a996b3a99622184e7eabf1e7c37bcbccee56816ba58ba84390ad431c612da27dbef93828f5d6415

                  • \??\c:\Users\Admin\AppData\Local\Temp\gd3ysmim.cmdline

                    Filesize

                    309B

                    MD5

                    6364f16420ffa865b968208130fa97cb

                    SHA1

                    712ed808b36d22ba64f3ee1b3252993a065b2301

                    SHA256

                    b44435dbcaf50763e20307dce6987725758b5ee8e9aceae4f00c2bd75b8544cb

                    SHA512

                    430d560aa541ed3e4140ebe31f6a868975f97c262d2d9af3b6f02c45ceacaf6852dafd37b1197cc6442a8f449720d2edc3ba84c488f11f43859f12189a244ce7

                  • \??\c:\Users\Admin\AppData\Local\Temp\nuxyi_es.cmdline

                    Filesize

                    309B

                    MD5

                    2f5bcb7bb7128ce77857f2bafb630e33

                    SHA1

                    345395e59dfdea858948c0dceb08134bec450e6e

                    SHA256

                    7660210375e9976906d73ac508f9b0a6db12beb2441358a9a83a47c4060f67f8

                    SHA512

                    cf10559742791563e4c25401e9133608f926cf301f8f5e147dc6d020ff3c62ca0efc51387522729535dee7af56d649437497f21542cf4e0c786c81ecda89f156

                  • \??\c:\Users\Admin\AppData\Local\Temp\qmebn3cs.0.cs

                    Filesize

                    1KB

                    MD5

                    9d2c1586220e16ca5d56de7586f2aa53

                    SHA1

                    c102d3c308bb76c9f99609d7d3537bbdc0899193

                    SHA256

                    d844a93d63bef89f5010f23588f3bee643a6374447e47138f5c58bc8176a85b7

                    SHA512

                    55b4e126d6030e5cf9f9439ae71f137637b9a36e4fe12e46454224540c573878e42a35337b30cd2e7b7caa1978b547019c670a43edf6ef023970375c598326ff

                  • \??\c:\Users\Admin\AppData\Local\Temp\qmebn3cs.cmdline

                    Filesize

                    309B

                    MD5

                    79838e9c6126a2eccce9b104e412b615

                    SHA1

                    77f4bea8291839b5cd0bc2843ebfc82b0dbf289f

                    SHA256

                    198c415292dcb9168468f57313d43e61b4e132d2d7046c6f4da960bfec02c53d

                    SHA512

                    f8b97acc1d18c220265e9e1618a201d3b90fe096b56362cff1e4b6bde352666d875886e67b886e4435e010a6c366645737753d165313f363d9e1cbb23bc01b75

                  • \??\c:\Users\Admin\AppData\Local\Temp\rca48jjp.0.cs

                    Filesize

                    733B

                    MD5

                    477147031e00fd60b8dddfabe19d47e1

                    SHA1

                    4403a296c04386fec66873b2055e531ebfe77755

                    SHA256

                    872766571c4cdc2cbb6dffeca6f288b76229eff30d3baa2e069999d07b2354ff

                    SHA512

                    0522d3d7eb453e3d9d75e8b166d84b67f35255efd08646287350305b1a87fb3f05d1d13a7e9be67c532f1a0e00847d9ec2b5ce88076d45be8bcad7d7a21431e9

                  • \??\c:\Users\Admin\AppData\Local\Temp\rca48jjp.cmdline

                    Filesize

                    309B

                    MD5

                    ee9e663f99529361430aaede00fa90ed

                    SHA1

                    ea9624b8a8f5933bc8811855616c21b71aa3ba9d

                    SHA256

                    22a515dbba2027c51a5ea466b106bf7930eca87a88c2aee2059527a1d28507bc

                    SHA512

                    6bc23d7c009125b3563d817dd3098303d97b61acd33a0b8414edbd27f2e76cf9f1fa6d3a6a6bbe22ec64afc3bad13a001d502cbab9017f16a26a3f239e7b4e70

                  • memory/1800-404-0x000000001B190000-0x000000001B198000-memory.dmp

                    Filesize

                    32KB

                  • memory/1800-421-0x000000001B3E0000-0x000000001B3E8000-memory.dmp

                    Filesize

                    32KB

                  • memory/1800-438-0x000000001B400000-0x000000001B408000-memory.dmp

                    Filesize

                    32KB

                  • memory/1928-446-0x0000000000340000-0x000000000034A000-memory.dmp

                    Filesize

                    40KB

                  • memory/1928-447-0x0000000000340000-0x000000000034A000-memory.dmp

                    Filesize

                    40KB

                  • memory/2072-214-0x0000000000340000-0x000000000034A000-memory.dmp

                    Filesize

                    40KB

                  • memory/2676-167-0x0000000002140000-0x0000000002148000-memory.dmp

                    Filesize

                    32KB

                  • memory/2676-184-0x0000000002150000-0x0000000002158000-memory.dmp

                    Filesize

                    32KB

                  • memory/2676-201-0x00000000021E0000-0x00000000021E8000-memory.dmp

                    Filesize

                    32KB

                  • memory/2976-209-0x0000000000340000-0x000000000034A000-memory.dmp

                    Filesize

                    40KB

                  • memory/2976-208-0x0000000000340000-0x000000000034A000-memory.dmp

                    Filesize

                    40KB