Analysis

  • max time kernel
    1050s
  • max time network
    840s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26/03/2025, 17:35

General

  • Target

    hi.bat.js

  • Size

    2KB

  • MD5

    3cfc5d69b5d2ad5ef20203d7c58d87c2

  • SHA1

    8a470b8f20c5f0a1eea90f5e031ca6945fbf3830

  • SHA256

    e6252e20521d4489c6e022b29457ecf192e1f26533a6c95a7b5577ee8a2d0c94

  • SHA512

    2cf11dcd6704f5d4d8023c4a777a631d91c6b813d48f83579e971060d6978eb5ff870acabe2247a86449625340af4044eeef6d66f80076169bc3dcd8ce04f532

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Possible privilege escalation attempt 6 IoCs
  • Stops running service(s) 4 TTPs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 27 IoCs
  • Modifies file permissions 1 TTPs 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Start PowerShell.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 13 IoCs
  • Drops file in Windows directory 64 IoCs
  • Launches sc.exe 8 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Modifies registry class 45 IoCs
  • Opens file in notepad (likely ransom note) 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\hi.bat.js
    1⤵
      PID:1684
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:2984
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hi.bat"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:2028
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v CurrentBuild
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1848
          • C:\Windows\system32\reg.exe
            reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v CurrentBuild
            3⤵
              PID:2012
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command "Get-AppxPackage -AllUsers | Remove-AppxPackage"
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1988
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command "Get-AppxProvisionedPackage -Online | Remove-AppxProvisionedPackage -Online"
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1252
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command "Disable-WindowsOptionalFeature -Online -FeatureName WindowsMediaPlayer -NoRestart"
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2292
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command "Disable-WindowsOptionalFeature -Online -FeatureName InternetExplorerOptional -NoRestart"
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:328
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command "Disable-WindowsOptionalFeature -Online -FeatureName WindowsSubsystemForLinux -NoRestart"
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1944
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command "Disable-WindowsOptionalFeature -Online -FeatureName Printing-Foundation-InternetPrinting-Client -NoRestart"
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2696
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command "Disable-WindowsOptionalFeature -Online -FeatureName WorkFolders-Client -NoRestart"
            2⤵
            • Command and Scripting Interpreter: PowerShell
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2892
          • C:\Windows\system32\sc.exe
            sc stop DiagTrack
            2⤵
            • Launches sc.exe
            PID:1664
          • C:\Windows\system32\sc.exe
            sc config DiagTrack start= disabled
            2⤵
            • Launches sc.exe
            PID:1148
          • C:\Windows\system32\sc.exe
            sc stop dmwappushservice
            2⤵
            • Launches sc.exe
            PID:1092
          • C:\Windows\system32\sc.exe
            sc config dmwappushservice start= disabled
            2⤵
            • Launches sc.exe
            PID:924
          • C:\Windows\system32\sc.exe
            sc stop OneSyncSvc
            2⤵
            • Launches sc.exe
            PID:444
          • C:\Windows\system32\sc.exe
            sc config OneSyncSvc start= disabled
            2⤵
            • Launches sc.exe
            PID:1140
          • C:\Windows\system32\sc.exe
            sc stop CDPSvc
            2⤵
            • Launches sc.exe
            PID:2244
          • C:\Windows\system32\sc.exe
            sc config CDPSvc start= disabled
            2⤵
            • Launches sc.exe
            PID:3040
          • C:\Windows\system32\reg.exe
            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Windows Search" /v AllowCortana /t REG_DWORD /d 0 /f
            2⤵
              PID:772
            • C:\Windows\system32\reg.exe
              reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\AdvertisingInfo" /v Enabled /t REG_DWORD /d 0 /f
              2⤵
                PID:696
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command "Set-ItemProperty -Path 'HKCU:\Software\Microsoft\Windows\CurrentVersion\BackgroundAccessApplications' -Name GlobalUserDisabled -Value 1"
                2⤵
                • Command and Scripting Interpreter: PowerShell
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2080
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command "Set-Service -Name WSearch -StartupType Disabled"
                2⤵
                • Command and Scripting Interpreter: PowerShell
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3064
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command "Start-Process -Verb RunAs -Wait Cleanmgr /sagerun:1"
                2⤵
                • Command and Scripting Interpreter: PowerShell
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2200
                • C:\Windows\system32\cleanmgr.exe
                  "C:\Windows\system32\cleanmgr.exe" /sagerun:1
                  3⤵
                  • Loads dropped DLL
                  • Enumerates connected drives
                  • Drops file in Windows directory
                  • Suspicious use of FindShellTrayWindow
                  PID:2320
                  • C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\dismhost.exe
                    C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\dismhost.exe {3A978F8C-970F-4D5D-983B-F133625B0B36}
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in Windows directory
                    PID:1004
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command "Remove-Item -Path C:\Windows\Temp\* -Recurse -Force"
                2⤵
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2280
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command "Remove-Item -Path C:\Users\*\AppData\Local\Temp\* -Recurse -Force"
                2⤵
                • Deletes itself
                • Drops file in System32 directory
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2304
            • C:\Windows\System32\NOTEPAD.EXE
              "C:\Windows\System32\NOTEPAD.EXE" /p C:\Users\Admin\AppData\Local\Temp\hi.bat
              1⤵
              • Opens file in notepad (likely ransom note)
              PID:328
            • C:\Windows\System32\NOTEPAD.EXE
              "C:\Windows\System32\NOTEPAD.EXE" /p C:\Users\Admin\AppData\Local\Temp\hi.bat
              1⤵
              • Opens file in notepad (likely ransom note)
              PID:2844
            • C:\Windows\System32\NOTEPAD.EXE
              "C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\hi.bat
              1⤵
              • Drops file in Windows directory
              • Modifies registry class
              • Opens file in notepad (likely ransom note)
              • Suspicious behavior: GetForegroundWindowSpam
              • Suspicious use of SetWindowsHookEx
              PID:2720
            • C:\Windows\system32\cmd.exe
              cmd /c ""C:\Users\Admin\Desktop\hi.bat" "
              1⤵
                PID:2896
                • C:\Windows\system32\tree.com
                  tree
                  2⤵
                    PID:888
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\Desktop\hi.bat"
                  1⤵
                    PID:1092
                    • C:\Windows\system32\tree.com
                      tree
                      2⤵
                        PID:444
                    • C:\Windows\System32\NOTEPAD.EXE
                      "C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Desktop\hi.bat
                      1⤵
                      • Opens file in notepad (likely ransom note)
                      PID:3052
                    • C:\Windows\system32\cmd.exe
                      cmd /c ""C:\Users\Admin\Desktop\hi.bat" "
                      1⤵
                        PID:1552
                        • C:\Windows\system32\tree.com
                          tree
                          2⤵
                            PID:1328
                        • C:\Windows\system32\cmd.exe
                          "C:\Windows\system32\cmd.exe"
                          1⤵
                          • Drops file in System32 directory
                          • Drops file in Windows directory
                          PID:1752
                          • C:\Windows\system32\takeown.exe
                            takeown C:\Windows /f /q
                            2⤵
                            • Possible privilege escalation attempt
                            • Modifies file permissions
                            PID:920
                          • C:\Windows\system32\takeown.exe
                            takeown /?
                            2⤵
                            • Possible privilege escalation attempt
                            • Modifies file permissions
                            PID:3064
                          • C:\Windows\system32\takeown.exe
                            takeown /f C:\windows /R /A
                            2⤵
                            • Possible privilege escalation attempt
                            • Modifies file permissions
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2364
                          • C:\Windows\system32\icacls.exe
                            icacls
                            2⤵
                            • Possible privilege escalation attempt
                            • Modifies file permissions
                            PID:2728
                          • C:\Windows\system32\icacls.exe
                            icacls C:\windows /grant everyone:F
                            2⤵
                            • Possible privilege escalation attempt
                            • Modifies file permissions
                            PID:2512
                          • C:\Windows\system32\icacls.exe
                            icacls c:\windows\* /grant everyone:F
                            2⤵
                            • Possible privilege escalation attempt
                            • Modifies file permissions
                            PID:2616

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\CbsProvider.dll

                          Filesize

                          744KB

                          MD5

                          efcb002abc3529d71b61e6fb6434566c

                          SHA1

                          a25aca0fc9a1139f44329b28dc13c526965d311f

                          SHA256

                          b641d944428f5b8ffb2fefd4da31c6a15ba84d01130f2712d7b1e71c518805bd

                          SHA512

                          10ee2b20f031ca5a131a9590599f13d3f0029352376705a2d7d2134fcd6535a3b54356d1b4d0b3fb53ac5ca4f034f9afb129a4f601159938680197ea39ea0687

                        • C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\CompatProvider.dll

                          Filesize

                          179KB

                          MD5

                          6a4bd682396f29fd7df5ab389509b950

                          SHA1

                          46f502bec487bd6112f333d1ada1ec98a416d35f

                          SHA256

                          328e5fbb6f3088fd759d855e656cd4c477b59f6a43a247954d1fd9050815e6cb

                          SHA512

                          35ced350482c94d22c85cd1b98890d01baed0da1c35a114d2cd6373d08969be764282f7a9d8ff0dd1dff3fae42e4ea20d3194c352364901b23ca2f375bd02751

                        • C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\DismCorePS.dll

                          Filesize

                          109KB

                          MD5

                          5488e381238ff19687fdd7ab2f44cfcc

                          SHA1

                          b90fa27ef6a7fc6d543ba33d5c934180e17297d3

                          SHA256

                          abaada27d682b0d7270827c0271ac04505800b11d04b764562e4baa2cbc306a0

                          SHA512

                          933e99749c68b3e9fe290fe4a1d8c90732ba13092d8cd9cac64f8e6583c8dcfbf25a4bea122966bc5d7d92e3a21210365a03b52274d25d704de52631e1fb0412

                        • C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\DismHost.exe

                          Filesize

                          94KB

                          MD5

                          9a821d8d62f4c60232b856e98cba7e4f

                          SHA1

                          4ec5dcbd43ad3b0178b26a57b8a2f41e33a48df5

                          SHA256

                          a5b3bf53bcd3c0296498383837e8f9eb7d610c535521315a96aa740cf769f525

                          SHA512

                          1b5273a52973dac77ad0ef7aa1dda929a782d762ab8489eb90dff1062dd4cc01e4f7f4157266a2abcf8941e91cf4aa5603de1dd8ee871524748e0989ebaa37d3

                        • C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\FolderProvider.dll

                          Filesize

                          52KB

                          MD5

                          c9d74156913061be6c51d8fc3acf8e93

                          SHA1

                          4a4c6473a478256e4c78b423e918191118e01093

                          SHA256

                          af0a38b4e95a50427b215eebc185bb621187e066b8b7373fb960eac0551bec37

                          SHA512

                          c12f75a6451881878a7a9ed5de61d157ea36f53aa41abf7660e1cc411b2ddd70ff048a307b1440cfdf1b269aeff77da8cc163ad19e9e3a294a5128f170f37047

                        • C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\LogProvider.dll

                          Filesize

                          104KB

                          MD5

                          62de64dc805fd98af3ada9d93209f6a9

                          SHA1

                          392ba504973d626aaf5c5b41b184670c58ec65a7

                          SHA256

                          83c0f61cc8fc01c789c07dd25f58862e0710088e6887716b1be9ee9f149adefc

                          SHA512

                          7db48f240df566be9a4b836807f97e8169d58edfa699de69be35b3977e442da3fea4f8b38d359d50f4d5afcf8547c8f66329e5ec855efbc5402ce88458d67e28

                        • C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\MsiProvider.dll

                          Filesize

                          211KB

                          MD5

                          45ff4fa5ca5432bfccded4433fe2a85b

                          SHA1

                          858c42499dd9d2198a6489dd310dc5cbff1e8d6e

                          SHA256

                          8a85869b2d61bad50d816daf08df080f8039dbeb1208009a73daa7be83d032bd

                          SHA512

                          abbe0f673d18cc9a922cfd677e5b88714a3049ad8937f836b5a8b9bddac5ddbad4dc143360efc018dcd3a3440aa3e516b1a97f7cd2fa9a55cb73739dedef1589

                        • C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\OSProvider.dll

                          Filesize

                          124KB

                          MD5

                          e7caed467f80b29f4e63ba493614dbb1

                          SHA1

                          65a159bcdb68c7514e4f5b65413678c673d2d0c9

                          SHA256

                          2c325e2647eb622983948cc26c509c832e1094639bb7af0fb712583947ad019c

                          SHA512

                          34952d8a619eb46d8b7ec6463e1e99f1c641ce61c471997dd959911ae21d64e688d9aa8a78405faa49a652675caf40d8e9e5a07de30257f26da4c65f04e2181e

                        • C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\SmiProvider.dll

                          Filesize

                          265KB

                          MD5

                          fe447d1cd38cecac2331fa932078d9a0

                          SHA1

                          ebd99d5eb3403f547821ce51c193afc86ecf4bcf

                          SHA256

                          05fe0897be3f79773c06b7ba4c152eec810fd895bf566d837829ec04c4f4338d

                          SHA512

                          801e47c6c62a2d17ed7dd430a489507faf6074471f191f66862fd732924ad9a4bd1efe603354ed06d16c4d5c31a044126c4cc2dbbd8ffece2ed7632358ee7779

                        • C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\dismprov.dll

                          Filesize

                          182KB

                          MD5

                          8ca117cb9338c0351236939717cb7084

                          SHA1

                          baa145810d50fdb204c8482fda5cacaaf58cdad0

                          SHA256

                          f351c3597c98ea9fe5271024fc2ccf895cc6a247fb3b02c1cdb68891dac29e54

                          SHA512

                          35b4be68666d22f82d949ad9f0ce986779355e7d2d8fd99c0e2102cd364aba4a95b5805269261a9205c1130bdd1f5101d16146d9334c27796c7f41f2c3166c35

                        • C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\en-US\CbsProvider.dll.mui

                          Filesize

                          32KB

                          MD5

                          724ee7133b1822f7ff80891d773fde51

                          SHA1

                          d10dff002b02c78e624bf83ae8a6f25d73761827

                          SHA256

                          d13f068f42074b3104987bfed49fbf3a054be6093908ed5dea8901887dddb367

                          SHA512

                          1dfd236537d6592a19b07b5e1624310c67adff9e776e6d2566b9e7db732588988f9ae7352df6c3b53c058807d8ed55fafc2004a2d6dc2f3f6c9e16445699f17b

                        • C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\en-US\CompatProvider.dll.mui

                          Filesize

                          12KB

                          MD5

                          9085b83968e705a3be5cd7588545a955

                          SHA1

                          f0a477b353ca3e20fa65dd86cb260777ff27e1dd

                          SHA256

                          fe0719cf624e08b5d6695ee3887358141d11316489c4ea97d2f61a4d2b9060cd

                          SHA512

                          b7f12f7ac1e6942f24f4bf35444f623cc93f8a047ebc754b9599d5df16cab4d3745729d11b4a3abfdc06a671e55ac52cac937badd808825906f52885f16f2c1c

                        • C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\en-US\DismCore.dll.mui

                          Filesize

                          6KB

                          MD5

                          f18044dec5b59c82c7f71ecffe2e89ab

                          SHA1

                          731d44676a8f5b3b7ad1d402dfdbb7f08bdc40c6

                          SHA256

                          a650578a4630e1a49280dc273d1d0bbdca81664a2199e5ab44ec7c5c54c0a35e

                          SHA512

                          53c23acddab099508b1e01dcc0d5dc9d4da67bc1765087f4a46b9ac842de065a55bac4c6682da07f5a1d29a3d0c1d92a4310e6b0f838740d919f8285911fa714

                        • C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\en-US\DmiProvider.dll.mui

                          Filesize

                          15KB

                          MD5

                          ee8c06cd11b34a37579d118ac5d6fa1d

                          SHA1

                          c62f7fb0c6f42321b33ea675c0dfd304b2eb4a15

                          SHA256

                          6991fb4bfd6800385a32ac759dd21016421cb13dca81f04ddcaf6bf12a928ccc

                          SHA512

                          091cfa7d9b80e92df13ba829372dfb211214f4221e52fbf3f558ebb7f18736ad9ad867ea0d0ddf8938def1b4db64a12d0df37c2eaf41727b997f4905dd41fed1

                        • C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\en-US\FolderProvider.dll.mui

                          Filesize

                          2KB

                          MD5

                          cab37f952682118bac4a3f824c80b6ac

                          SHA1

                          6e35b4289927e26e3c50c16cbf87eb3ac6f3b793

                          SHA256

                          14bec7c4bb6cf1ee9049ef8820ec88bf78f2af75615f7a3fb265ef4b45c30e4d

                          SHA512

                          de9089adaa85f37201526b8619f697be98a7d05353b21b6d835f4d56803732380316359ba8b3c8ca7c14a9bf7cf31a7eff3c866a8f303ef737eb63573e01aa19

                        • C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\en-US\IntlProvider.dll.mui

                          Filesize

                          26KB

                          MD5

                          0bffb5e4345198dbf18aa0bc8f0d6da1

                          SHA1

                          e2789081b7cf150b63bad62bac03b252283e9fe5

                          SHA256

                          b7bcc0e99719f24c30e12269e33a8bf09978c55593900d51d5f8588e51730739

                          SHA512

                          590e8016075871846efff8b539e4779a1a628de318c161292c7231ca964a310e0722e44816041786c8620bff5c29ff34c5f35733ee4eac74f3abfae6d3af854a

                        • C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\en-US\LogProvider.dll.mui

                          Filesize

                          5KB

                          MD5

                          f909216cf932aeb4f2f9f02e8c56a815

                          SHA1

                          c5cafe5f8dad60d3a1d7c75aa2cf575e35a634f2

                          SHA256

                          f5c89ba078697cdb705383684af49e07cdd094db962f0649cad23008ae9d6ce2

                          SHA512

                          5dca19d54f738486085f11b5a2522073894a97d67e67be0eadbe9dc8944e632ae39b24499d7ff16e88d18166031697a238ead877f12cbb7447acca49c32a184a

                        • C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\en-US\MsiProvider.dll.mui

                          Filesize

                          15KB

                          MD5

                          17fac8ab2dfbaba2b049ec43204c1c2f

                          SHA1

                          d484ea7c6f749debf92b132765d2fd56f228db73

                          SHA256

                          f4d277aaa8d0bed0afcd1b703ee4c28c86313075e291b6addbdfd6202eb3777e

                          SHA512

                          ff7969adbc53fd2f5dccd3842b46a2517904d524020e69bb21271cd8ddc0cfddfd3f791741589b17b740d5d013cf14ed28b5af50d37d960c955adfd6b99e50cc

                        • C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\en-US\OSProvider.dll.mui

                          Filesize

                          2KB

                          MD5

                          f0588e200554aed003667c04819cce32

                          SHA1

                          dacbdc53bd297cd818ea954f5a47de6e84212108

                          SHA256

                          40fe7b6631d11b5519f051ff0a0ade1cb0de524fb4904114067e71b729c38eba

                          SHA512

                          99d9372a452a1b908f55d204a2b85addaa11fe49bb0b9c0d36a131c1cad254e9fb8a3b952572111d68a78fdbf41782dbe78d8cb20165676aada496113e4899eb

                        • C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\en-US\SmiProvider.dll.mui

                          Filesize

                          2KB

                          MD5

                          f842303ef440381939fc34df425f8392

                          SHA1

                          92debf4ae2d86a123002a104d0e9ad4981ab6d59

                          SHA256

                          b06daf95235bd8b87af3dd06cc0566d7b893fbeaa1d5b39b66566b567c24c51f

                          SHA512

                          d72ccd42da7506cbfbe5db1af03f6d95f8a9c43e11e9f7f24abadd5e98907ad1f976c626a53ed96ad4b5aa24534f019a1ac7ec8ace9a785035dabc72ffc6e18b

                        • C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\en-US\dismprov.dll.mui

                          Filesize

                          2KB

                          MD5

                          9bc5d6eb3e2d31bbdbffe127a1b3cdbf

                          SHA1

                          b253025c442aefe338b4c7ebea2f7d808abc9618

                          SHA256

                          55e9ae098def76e7388d7d069746dbd136ae243357ece23b77f2365f0b2ff76f

                          SHA512

                          f9968554737d181d4b7d0366f40f0c9a2039b59796986964413fa08f031f5529411b2741eb8ea3d8c312112b2038e6a58d891d090a42672c3d1c782b859f2e08

                        • C:\Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\wdscore.dll

                          Filesize

                          265KB

                          MD5

                          7b38d7916a7cd058c16a0a6ca5077901

                          SHA1

                          f79d955a6eac2f0368c79f7ba8061e9c58ba99b2

                          SHA256

                          3f6dd990e2da5d3bd6d65a72cbfb0fe79eb30b118a8ad71b6c9bb5581a622dce

                          SHA512

                          2d22fe535f464f635d42e5b016741b9caf173da372e4563a565fa1e294581f44330c61e08edfe4c08a341ebd708e2ad08614161c0ee54e8dea99452b87d1e710

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                          Filesize

                          7KB

                          MD5

                          c3c2ba41cb5b87f1430c105fa8b34b6a

                          SHA1

                          5b6670127ed532ffd79066557ba3d75685385976

                          SHA256

                          7b06021eb390390ee224fc10fb6cd876b20c0833b2ef65d71ff9f22e0d4811ee

                          SHA512

                          4056fa2ca7a23656bc85f3925aa8e56b78dbe72b4474c16b72d61a54b9724d8a57807fd913ef6764431e8b4233cce777353cdc0cd73a807c4d17efe2614ab796

                        • C:\Windows\Logs\DISM\dism.log

                          Filesize

                          151KB

                          MD5

                          17b2651858e5353207b5499b7449fbb2

                          SHA1

                          624181f3b8475635ee72288cca034e6857e93f1c

                          SHA256

                          978277a709a945287685d2334ac75a0909b2cbb7296d8fe31f5d75d0aaf16306

                          SHA512

                          9bdf4194c9b3e4a10b5997fb022895db33d36d6a05526d6fa61d77f4c8b634d48cbd7a2a0d4a8ef17b3711048b242c1a3ac72e1b87abf7f25b71b77b39d44fd6

                        • C:\Windows\Logs\DISM\dism.log

                          Filesize

                          160KB

                          MD5

                          a41e227b137d8df1930cacda15ae803d

                          SHA1

                          7815e5ae1ffce42fa65091d503a0f0457973774b

                          SHA256

                          fa2be820a50be83444d2ab8a7ea0f383f309aee86a659b0149fae517d21f5255

                          SHA512

                          bcba6c7fd9e9c555f7ea527e27e886533243262716183257b566525e693bb9b5644cbe3f8e05e366bc989298f41e3b1302f05377c603f1eb05150f0eca5e557f

                        • \Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\DismCore.dll

                          Filesize

                          283KB

                          MD5

                          f2b0771a7cd27f20689e0ab787b7eb7c

                          SHA1

                          eb56e313cd23cb77524ef0db1309aebb0b36f7ef

                          SHA256

                          7c675710ae52d5e8344465f1179ec4e03c882d5e5b16fc0ba9564b1ea121638f

                          SHA512

                          5ebd4685e5b949d37c52bb1f2fe92accfa48dd4ef585c898f3982eb52f618064fc95c2f98532ca3e7007d0ef71c1fe91887ce3dc0a563f09bc2c5f59f3a3082a

                        • \Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\DmiProvider.dll

                          Filesize

                          425KB

                          MD5

                          fc2db5842190c6e78a40cd7da483b27c

                          SHA1

                          e94ee17cd06fb55d04bef2bdfcf5736f336e0fa0

                          SHA256

                          e6c93305d886bff678bd83b715bb5c5cbb376b90b973d9dd6844fac808de5c82

                          SHA512

                          d5d32b894a485447d55499a2f1e02a8b33fb74081f225b8e2872995491a37353cf8022f46feeb3ca363b2e172ab89e29ab9a453692d1a964ca08d40230574bf6

                        • \Users\Admin\AppData\Local\Temp\B0410A96-D6B2-4B7F-AAEB-AC7B5327A7B8\IntlProvider.dll

                          Filesize

                          306KB

                          MD5

                          bbb9e4fa2561f6a6e5ccf25da069ac1b

                          SHA1

                          2d353ec70c7a13ac5749d2205ac732213505082a

                          SHA256

                          b92cf901027901d7066e9ee7ac8f3b48a99cfb3a3ddd8d759cb77295148943c1

                          SHA512

                          01f4e6d51a0acb394693191b78cefa28759903036636a1d64f90c60dc59c948c78dd38df6fb2be149245622eadf8b2627c6767bf2aa2e0e56e6b52f0b91cc79e

                        • memory/1252-12-0x0000000002250000-0x0000000002258000-memory.dmp

                          Filesize

                          32KB

                        • memory/1252-11-0x000000001B600000-0x000000001B8E2000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/1988-5-0x00000000020C0000-0x00000000020C8000-memory.dmp

                          Filesize

                          32KB

                        • memory/1988-4-0x000000001B790000-0x000000001BA72000-memory.dmp

                          Filesize

                          2.9MB

                        • memory/2720-220-0x00000000052E0000-0x00000000052F0000-memory.dmp

                          Filesize

                          64KB