Analysis

  • max time kernel
    185s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/04/2024, 04:18

General

  • Target

    VirtualBox-7.0.16-162802-Win.exe

  • Size

    106.1MB

  • MD5

    5f6a8d381b1b622f168359515c0a5428

  • SHA1

    53eca4549abfa5ea8daf19eaa182c0bbb0f2b35a

  • SHA256

    2fb44977d3329e55e8b61408ab4af5239ecd3d80c5990fb5cd6bd0c91a854d62

  • SHA512

    68691dcba2effdde006cc1f9d9cc973f11cb531afef11ea2d144d70a5c999822d68d24807584d4212f92b39996a9978c44aafb55df610b5194356cdaaa3e5e18

  • SSDEEP

    3145728:7MJjEDfPXdWDLpN9ZMuxAELVqMV9p6Ox7GX0Ik4Ebx:7wETfdWHHnxAI7yu7GX+4E1

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 12 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 44 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 41 IoCs
  • Registers COM server for autorun 1 TTPs 19 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirtualBox-7.0.16-162802-Win.exe
    "C:\Users\Admin\AppData\Local\Temp\VirtualBox-7.0.16-162802-Win.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:692
    • C:\Program Files\Oracle\VirtualBox\VirtualBox.exe
      "C:\Program Files\Oracle\VirtualBox\VirtualBox.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Registers COM server for autorun
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2168
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Registers COM server for autorun
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2788
    • C:\Windows\System32\MsiExec.exe
      C:\Windows\System32\MsiExec.exe -Embedding 720A97F7F10C400377E0EEF2C355636C C
      2⤵
      • Loads dropped DLL
      PID:3364
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:3452
      • C:\Windows\System32\MsiExec.exe
        C:\Windows\System32\MsiExec.exe -Embedding AE1B1F815D0ED860D376386FDE974F84
        2⤵
        • Loads dropped DLL
        PID:2144
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding C5B690888CD93659F1E8C37F9F17009C
        2⤵
        • Loads dropped DLL
        PID:4540
      • C:\Windows\System32\MsiExec.exe
        C:\Windows\System32\MsiExec.exe -Embedding B7F927B645B790C49112925353DECA97 E Global\MSI0000
        2⤵
        • Drops file in Drivers directory
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Loads dropped DLL
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:4276
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 9353AE7D39BC7D0C382148439A225803 M Global\MSI0000
        2⤵
          PID:208
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Checks SCSI registry key(s)
        PID:640
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
        1⤵
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Suspicious use of WriteProcessMemory
        PID:4020
        • C:\Windows\system32\DrvInst.exe
          DrvInst.exe "4" "1" "C:\Program Files\Oracle\VirtualBox\drivers\USB\device\VBoxUSB.inf" "9" "48f6bcb47" "000000000000013C" "WinSta0\Default" "0000000000000160" "208" "C:\Program Files\Oracle\VirtualBox\drivers\USB\device"
          2⤵
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Checks SCSI registry key(s)
          • Modifies data under HKEY_USERS
          PID:1608
        • C:\Windows\system32\DrvInst.exe
          DrvInst.exe "4" "1" "C:\Program Files\Oracle\VirtualBox\drivers\network\netadp6\VBoxNetAdp6.inf" "9" "473b17b7b" "0000000000000160" "WinSta0\Default" "0000000000000164" "208" "C:\Program Files\Oracle\VirtualBox\drivers\network\netadp6"
          2⤵
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Checks SCSI registry key(s)
          • Modifies data under HKEY_USERS
          PID:4520
        • C:\Windows\system32\DrvInst.exe
          DrvInst.exe "4" "1" "C:\Program Files\Oracle\VirtualBox\drivers\network\netlwf\VBoxNetLwf.inf" "9" "431e52bcb" "0000000000000164" "WinSta0\Default" "0000000000000154" "208" "C:\Program Files\Oracle\VirtualBox\drivers\network\netlwf"
          2⤵
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Checks SCSI registry key(s)
          • Modifies data under HKEY_USERS
          PID:5508
      • C:\Program Files\Oracle\VirtualBox\VBoxSVC.exe
        "C:\Program Files\Oracle\VirtualBox\VBoxSVC.exe" -Embedding
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:1980
      • C:\Program Files\Oracle\VirtualBox\VBoxSDS.exe
        "C:\Program Files\Oracle\VirtualBox\VBoxSDS.exe"
        1⤵
        • Drops file in System32 directory
        • Executes dropped EXE
        • Loads dropped DLL
        PID:5232

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Config.Msi\e579200.rbs

              Filesize

              2.6MB

              MD5

              8c543d5ac592522e738867461084d0cc

              SHA1

              ffb2912e16d4f0420d1292e92f28160e6f7335b7

              SHA256

              56ea04906a9bee8b9a75959655484079f47938ca1ae89f76d3dee46973e68fe1

              SHA512

              ceae08c38103500adc8e35dca12712981e282c9a8cc4770ade087970687c2bd0322d2b050bf833161876d65638fefdf34f29e28632e8955b2311693f852df32d

            • C:\PROGRA~1\Oracle\VIRTUA~1\drivers\USB\device\VBoxUSB.cat

              Filesize

              11KB

              MD5

              a248543a64474dc1b1e2b0dbb5bb240d

              SHA1

              f42e407e2bc109e03651443542a6f11aabd99ccc

              SHA256

              595dee8737f6bc3045e950b263c0ba6326e02cc039351b9e1f76f61565c0d907

              SHA512

              b3e539c6403fefaf530a4aa00ca85e033213ea962b7a3c2cbaad097448c3c10222411cdf8fb41b8deffbc8843ade17dc67ef192f2f9818447d77262577c371f1

            • C:\PROGRA~1\Oracle\VIRTUA~1\drivers\USB\device\VBoxUSB.sys

              Filesize

              184KB

              MD5

              f6348f8c0f8c9540c599593b2d30a89e

              SHA1

              0cdb705890ef3fd5d242df4b13dabf425eb1b0ff

              SHA256

              52d3b5294c16a7bfbde38b0fed8335b4fb7cb7853fb59c2c8cee3efb5933c521

              SHA512

              c6e386c9db148111ae07c14688ac0b8bd2efd0c1cfeb5cca297e5f1ea29cc723dcc4b1481154085400d5e78b3d91e360e0e53d88c8f1b4adacd34da4e5ca2c63

            • C:\PROGRA~1\Oracle\VIRTUA~1\drivers\network\netadp6\VBoxNetAdp6.cat

              Filesize

              11KB

              MD5

              cf0d4c8af5bd5912448ce28f45dddd48

              SHA1

              c6cddb49e2cc8230eb80aa737a08720a3e6aca74

              SHA256

              5c13e3007e07ece5bc09b288caa618b62b8fc9c3c1e55e696379ee808340c185

              SHA512

              554a193123d64addf53ea48606d63a6eb698992d530ddeeaa56781edf5946879af05085ec7b63fa5222180921812a43d92f9e10f44460fc0f375f73bd9263e5b

            • C:\PROGRA~1\Oracle\VIRTUA~1\drivers\network\netadp6\VBoxNetAdp6.sys

              Filesize

              248KB

              MD5

              a80d1f16ac8c34a64b3bd77bc4e4f872

              SHA1

              186cff26b3204d7f86c50528e74b8d23e1be5a43

              SHA256

              6845118d468d6137a2f41f3d6cf4b4122656a583659eb7e5917365079f640adc

              SHA512

              cd4af7be76cf78e060c5ca3e9fa5926aea1e5e02f03cdd64a0b783330fbb20aea02e9509b130d7d9139f0c5fb8e1480bbc5fe82e422db42db68ed78a2e1c2d20

            • C:\Program Files\Oracle\VirtualBox\VBoxProxyStub.dll

              Filesize

              887KB

              MD5

              983416bbd5e0546c0ed52eb86f18e1fb

              SHA1

              16b1c5139260ba846932943a4174c66059c3b3ca

              SHA256

              79b1e256915f89f0c3c103ae96097c3476091cd61ea912868572f995b587c951

              SHA512

              e69e82e66860dc022877e351af3b72c65f528f692a48d7f8f31a4f3d8a59fee5736ba01191dc46df958acdab44f6b8d7fee0ba77a07b38603918fd61deedc598

            • C:\Program Files\Oracle\VirtualBox\VirtualBox.exe

              Filesize

              2.6MB

              MD5

              bf9d27544c8da7c6aa64bf06a117117b

              SHA1

              376a46ee1473dfb5aa528bfb1f48295d2961033b

              SHA256

              059f0273578c56fc5b51bbf645396b51ce4b6067489e18c7c9f7a983caa240eb

              SHA512

              3167a2ae3e460dbf829a3d53b8551d8a1e14aadbeded401447105c4745142cf9e7bc3c41b71f2c6a367c6bac36cc5ad2da3fcda29ede1d09a2cb7df11e5c5426

            • C:\Program Files\Oracle\VirtualBox\drivers\USB\device\VBoxUSB.inf

              Filesize

              2KB

              MD5

              a526fcb464e27b0c2291bb79a98e7853

              SHA1

              2efcdf4ae5fd16ec4cf286456449244576c35231

              SHA256

              0690bbee48fe92cc7dd00e55791212175432e12662c20a644147a3ca8f52c046

              SHA512

              bc78d8966936db843fd0e7fcaa6130711b6412eff47654154de3ab34e3346d29ae76d2e405c155364d953fcd229f04e32ded28b7e0ac72548ac14a62db5ee35f

            • C:\Program Files\Oracle\VirtualBox\drivers\USB\filter\VBoxUSBMon.cat

              Filesize

              11KB

              MD5

              c892340a557957489afa992ea31e4ba7

              SHA1

              9c89cb0c12e03c10c5e519920a9889b3df24fd0e

              SHA256

              18be9a5acd600d64e925fbe77ff38a4ace42014d965e9b09cf69b3c5371fca07

              SHA512

              7dfe49e973795154a2e725d5d008ed86c99a6b12b5fd8c15381ec92714b61832f70a67bf7058c08be5700e532898fe994cd34c50454b0518139bd2bdba35c69f

            • C:\Program Files\Oracle\VirtualBox\drivers\USB\filter\VBoxUSBMon.inf

              Filesize

              3KB

              MD5

              a0f1c7815280e4640aa0257f42eb438e

              SHA1

              a3f3f509c0de218f2f3e569bed1beeaad971300e

              SHA256

              08dd010f2ccb05d7f0766bfd404b775e7379214f4f74b829b85f4fd0b9d0d245

              SHA512

              073e3ac7edd414470b8f1d1d5b639e847e6c270604dedb0317d846e17aa2448ebf44835c338e7c3e47f0b145b2826b6e7cff03e17fca92d815e5f68a966e3065

            • C:\Program Files\Oracle\VirtualBox\drivers\USB\filter\VBoxUSBMon.sys

              Filesize

              199KB

              MD5

              99e5ef6c3e898218149e1030f70bcada

              SHA1

              b6af7fb81dd44e262da8fe2216e6f50b76cb457b

              SHA256

              b6e4bf1b1d8702630cee588c8e6be5f4aa618af147e3c48442acdb66f44bba4c

              SHA512

              dd8f142d73914e6e27991770cc54e2953464e22035cb98e9b7b0999114e45aab9befd3af1b396b6d7c6bcba0bd9fdb71a1e47864b4d2cba9580d1f00dce9ee87

            • C:\Program Files\Oracle\VirtualBox\drivers\network\netadp6\VBoxNetAdp6.inf

              Filesize

              3KB

              MD5

              9a3bf9a037804314e14a7e3723a68b9b

              SHA1

              725f20a3f9c372f6703e1659bfc58b6e094ed5d1

              SHA256

              77b41c3a8e09a9a24a13e76bf1dd172b07950b086542ef3450333e3ff0a03b1f

              SHA512

              814c3cdc26dd1a744ee635c28c1ac9e06e212a0d939ac84ffde59892f6abab6cf2a1276b7b63f8bcb1bf50ecab7d651526c0b580cd7814230057dfd4165f195d

            • C:\Program Files\Oracle\VirtualBox\drivers\vboxsup\VBoxSup.cat

              Filesize

              11KB

              MD5

              a419d475105429fa2397a8d13056221b

              SHA1

              9234adab429a567bd7bddf3e990472199aee9f61

              SHA256

              8916663dfc49ce70bf477c5f0313bd9c78e7a3ead5e0373b3f6488f35e048191

              SHA512

              819468d130fffe2e44451399c76646072a5483307ea330e9755415f184ddd8e94267cf6f3abb57cc967deb58f07da331e6ba9ced3c2adfca701b80e6e03dfe04

            • C:\Program Files\Oracle\VirtualBox\drivers\vboxsup\VBoxSup.inf

              Filesize

              3KB

              MD5

              15013374fbfd1bed15e3c9d43bfd373e

              SHA1

              ca3fe426dfd1153ce7fd39cebf4cb888e69c0654

              SHA256

              8f89a77d192f72eaed366563ea24aa44fd1cee1837dbc3f70578b27813262642

              SHA512

              73fdf34760a09cebfec3ef03f9735f2d2fbce54f8f01435030f0cc7afbcd80d8a87a5c5c5952100792fc342b0f4d21a79240b48a940687d5cea227b818ea90e7

            • C:\Program Files\Oracle\VirtualBox\drivers\vboxsup\VBoxSup.sys

              Filesize

              1.0MB

              MD5

              fe44426a75420dccc159da547133456b

              SHA1

              99cdc1f9195115e3b6d4b3657790b086b568da1c

              SHA256

              c1ddd573e00c379da2c5c8e955d9a7853d3f4ac3e4584f5abefebe1f7ca2a853

              SHA512

              aa85deeab743e4d8eaba58db98fae2a7440c8ad99b2e4d4c4260b42a0925945537977c98bc52c2e8bcf5c366a8ebd02420c049b0f0980383ff58aaba249a5aab

            • C:\Program Files\Oracle\VirtualBox\x86\VBoxProxyStub-x86.dll

              Filesize

              666KB

              MD5

              25a2471239513d8694374ebbf43b823b

              SHA1

              54e1ebf4762b3322d84631ff01aa48b06e69e357

              SHA256

              433862bef2d31d946f4f195a8aced29e1096e45e56de863b4bd92419836a8781

              SHA512

              525c7fa20bb225ecf5c8518c5ca6610786e5dd3e76f0905910132279518b496ff3be526a407953f36ace9af61c9d862698a5f35678df7d6a1db19d8f2e686281

            • C:\Users\Admin\.VirtualBox\VirtualBox.xml

              Filesize

              1KB

              MD5

              d9d28bd2ef7192fb0efb99607d7a0807

              SHA1

              7fb6f32f1c0f227118613dd7779e1bf0a6e2ce4a

              SHA256

              dad710b076d96b3de34a58363a3241935bfe205b7240ce57f9d85bf2058e6dd5

              SHA512

              e058987d5fd8ea6cd3c3081c7ac45ce1e3719c4a38b46390133b19539fad35a0d8ad699023a3d934d18e3356cb6def62bd197b5a32ad496b620469c55d9efb13

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5

              Filesize

              471B

              MD5

              c4ae2e5546d1d1cddf5c458027c2bf36

              SHA1

              16c54904e4be4bff93f6bde2b223a5bb257150fe

              SHA256

              fcb396c990b74afc267c8121612cb3ec4875a2ae200ee405696f3c7cc9139d28

              SHA512

              ddb0411cf538fa15cb33fa50096de4c14fe8b76bf25d9938a916d5ea3ea012cc7cd90a6dd432a72aabc2c1cc4c60ab17a441e37c33471b1b473f6b81cbbc6dad

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\66AE3BFDF94A732B262342AD2154B86E_683B8EA584E734D2258F215F97D5554B

              Filesize

              471B

              MD5

              92aa820b5ab81237fa52c2c8db134b13

              SHA1

              af8ee6f4b3d6ea4e1c3b0ea08ac2c27d484bb788

              SHA256

              c679676046e21b5e8ee9847cf95d892dbeb68dd398d5364d6c35bb97eb3c9568

              SHA512

              6368e59393c8fb72989d4f7a82faaecee6829d1e16b8c08bf53795011806b1e0058d8f886dac1a3e229c3e28ccfae0035c65ce661d34b213571926b8a6f61c79

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5

              Filesize

              404B

              MD5

              e8cd6a835951cdd4aa0ffee31fbac60e

              SHA1

              458a117263709a1e1cfeecd28f3fca144dda79ae

              SHA256

              f204dfc853db380debec641541382e2c8763c5f2f4fdfb52b19dc78d412613d1

              SHA512

              2e67e9202ed895706c56a48fe8975f25404886db8c6b432bc161cb26c0005da90dbe418c152f772b8de32d6f9b83dfc888d8de865bbab6876eb14a19df575aeb

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\66AE3BFDF94A732B262342AD2154B86E_683B8EA584E734D2258F215F97D5554B

              Filesize

              404B

              MD5

              3957c3535b91a476e5d8e1797a2a686c

              SHA1

              41b37c4a893026f2bbc27312b7eb21c0fd1d1636

              SHA256

              2f7ba08ab6e4bff8552ee26b1815dce1e9739fc6b90accefcd8fddd00cf15d61

              SHA512

              e484231a6e228e3bd24694a65e41eae44bc85737f24843eb170a1edcaea462c050bbc7ce4b4be1b58792a78434331cf5e165dc1e4ddecc4123f490bd3273ba88

            • C:\Users\Admin\AppData\Local\Temp\MSI3EBE.tmp

              Filesize

              334KB

              MD5

              af3265e9034acb6495c2ef2c3a815969

              SHA1

              7cd1730e9b7a6f16999ac46287c7254279acdb50

              SHA256

              3b26c0951c46edf00257d10a6f86d82e35189db24ca774e06b8a6b4c58a753c2

              SHA512

              e7584cd50badc102fd8ac2120a98e6da2818366c69b94a1a62d13a9d89bba107f37d89656cfcadd37f4c18780e9279bcbeb112b348f230046518718a287c3465

            • C:\Users\Admin\AppData\Local\Temp\f8v3ixqzqejlc7opqgxokfts\8s6zmf5j094hycqbuyxija1j.msi

              Filesize

              105.5MB

              MD5

              c1dc7a40ed171beacfa07daa8b832ede

              SHA1

              77ac388f822a2b119e25aeca41c7ae81e25f5e66

              SHA256

              4799e281a8c8fb5ffdcac791d9bd1bacee280a7111620861044cb5bf12e4e0d5

              SHA512

              37485a847539c556b173fe96a8e9f1485edc846be26cd0649059a5c296c9df2a7374a39dc0befc2e4793c2fad745f5713aac2c81886230858c71f264b8a6f4e0

            • C:\Windows\Installer\MSI95EB.tmp

              Filesize

              234KB

              MD5

              8edc1557e9fc7f25f89ad384d01bcec4

              SHA1

              98e64d7f92b8254fe3f258e3238b9e0f033b5a9c

              SHA256

              78860e15e474cc2af7ad6e499a8971b6b8197afb8e49a1b9eaaa392e4378f3a5

              SHA512

              d26c9dce3c3d17583ffb5dbcd3989f93b096a7f64a37a2701a474c1bf4b8c8b1e922c352d33f24e411f1c793e1b4af11a3aec1de489087d481b1b636df2050cd

            • C:\Windows\Installer\MSI989D.tmp

              Filesize

              149KB

              MD5

              418322f7be2b68e88a93a048ac75a757

              SHA1

              09739792ff1c30f73dacafbe503630615922b561

              SHA256

              ea5d4b4c7e7be1ce24a614ae1e31a58bcae6f1694dd8bfb735cf47d35a08d59b

              SHA512

              253f62f5ce75df3e9ac3c62e2f06f30c7c6de6280fbfc830cdd15bf29cb8ee9ed878212f6df5d0ac6a5c9be0e6259f900eccee472a890f15dd3ff1f84958aeef

            • C:\Windows\Installer\MSIA245.tmp

              Filesize

              690KB

              MD5

              8deb7d2f91c7392925718b3ba0aade22

              SHA1

              fc8e9b10c83e16eb0af1b6f10128f5c37b389682

              SHA256

              cb42fac1aebb6e1ac4907a38035b218b5f992d1bcd4dece11b1664a588e876e4

              SHA512

              37f2c132b632c8e5a336bdc773d953c7f39872b1bae2ba34fbaf7794a477fd0dcb9ff60a3ddb447fe76abd98e557bd5ee544876584adea152b0841b3e313054c

            • C:\Windows\System32\CatRoot2\dberr.txt

              Filesize

              22KB

              MD5

              b0648b7b50ebda4ae3b03fd66dc8708b

              SHA1

              eb7c32e79d37ec21598bcb50fecd48f0da938b80

              SHA256

              3e0de853ff2ddf8b8fc0ee3a1a8b5cbd703896eca329c4d7ba1834f248189237

              SHA512

              84b8843c7f1523732162a91e5bf27fb1e7189d4f248710271b3a5944bb69d79938e2317dc7184b69f668a559b30a7c24c1166f92ca047e13436376a82893e399

            • C:\Windows\System32\CatRoot2\dberr.txt

              Filesize

              22KB

              MD5

              7a1965158e6f0ab55fbe3dcec841354a

              SHA1

              fa7c38b8b5fcdf5636cca61dca1e4ccaf49bb83e

              SHA256

              29d5cc3c1dc66d197eac178c72a04ea054a1f5a0cb57b80729c914b8056b953e

              SHA512

              39902f6a18fe6c03bf10af54309dc728da5626e6b5123eb94b0cf28a8fde7f966e03b3d0c95f367a471accbfa54849c74bbcf91accac424d2b7b5746c1763a9b

            • C:\Windows\System32\DriverStore\Temp\{94e9cdbf-df92-7b42-9c06-84035ebd08cb}\VBoxNetLwf.cat

              Filesize

              11KB

              MD5

              035dee8dc971f4453bf8ebfad0fe2b84

              SHA1

              81fa4e47a76405894e3001e9cef4fcc6ad137e52

              SHA256

              862190e8017dfbd8540379ee61acc0b5d6829e664ab4dca9928622e4df2692bc

              SHA512

              f92d31623396af51772c8aa0eb14826eab3cb0a6fd8c6f223e0e48431c84f3c94674c34edacbc2b11de59792ef057aace17851f41a1fa4af3a01bb3efb1740a1

            • C:\Windows\System32\DriverStore\Temp\{94e9cdbf-df92-7b42-9c06-84035ebd08cb}\VBoxNetLwf.inf

              Filesize

              4KB

              MD5

              d8583ce91e8f12941a07fed65aea7503

              SHA1

              fb5a8142941b102c41f5577094e7a210d585be02

              SHA256

              7f390c13fc10ff293b641527d34833334080839e05704236f9d3dd1070fbd38d

              SHA512

              843812c9d9824c0bfae536a5e7f6abde9b4b676117a18440cb685c40529a4f8b52bb6c312a33362e0816a29ca883d57fa312166d444a384bc79205c13c72aa7c

            • C:\Windows\System32\DriverStore\Temp\{94e9cdbf-df92-7b42-9c06-84035ebd08cb}\VBoxNetLwf.sys

              Filesize

              259KB

              MD5

              7c7c82cd0ca2a085642a2bd7fd5b96e0

              SHA1

              4acd6bc241b92fb56999a4c23438217e77c5863d

              SHA256

              382ba434508383e9d8f9a341292278fee5042393a898c2cd73c861d645fafe79

              SHA512

              7d31e57635e002255d74cb8dfe15b90d00b43b82e8a3acb99a5c332667a1d876addfafde64230015e88c66f88e6372304f32675038c9ac92e237c61e8f680c56

            • C:\Windows\System32\catroot2\dberr.txt

              Filesize

              22KB

              MD5

              f215c6b41cb83d620e025f0660da5250

              SHA1

              1fc0e38e42d53fadc814a0955b8339abcedefc2f

              SHA256

              684d2dfdbecfc1f5fa2fa0570a93c69e7957773013950d8f5aeb62c8c2167abc

              SHA512

              74e34a963d0b7647ecb118b699a6a2a1748221d0ee3f84e27b1782139ac2d85524363c3dd8e150025f9c1f0718c03446e3e87eebb52ab78aacc6aac28fb81f9b

            • memory/2168-548-0x00007FFFD6C60000-0x00007FFFD883E000-memory.dmp

              Filesize

              27.9MB

            • memory/2168-584-0x000002765CF50000-0x000002765CF60000-memory.dmp

              Filesize

              64KB

            • memory/2168-549-0x0000027657C80000-0x0000027657C90000-memory.dmp

              Filesize

              64KB

            • memory/2168-546-0x00007FF7141A0000-0x00007FF714424000-memory.dmp

              Filesize

              2.5MB

            • memory/2168-570-0x0000027657C80000-0x0000027657C90000-memory.dmp

              Filesize

              64KB

            • memory/2168-571-0x000002765CE50000-0x000002765CE60000-memory.dmp

              Filesize

              64KB

            • memory/2168-572-0x000002765CE60000-0x000002765CE70000-memory.dmp

              Filesize

              64KB

            • memory/2168-573-0x000002765CE70000-0x000002765CE80000-memory.dmp

              Filesize

              64KB

            • memory/2168-574-0x000002765CE80000-0x000002765CE90000-memory.dmp

              Filesize

              64KB

            • memory/2168-575-0x000002765CE90000-0x000002765CEA0000-memory.dmp

              Filesize

              64KB

            • memory/2168-576-0x000002765CEA0000-0x000002765CEB0000-memory.dmp

              Filesize

              64KB

            • memory/2168-577-0x000002765CEB0000-0x000002765CEC0000-memory.dmp

              Filesize

              64KB

            • memory/2168-578-0x000002765CED0000-0x000002765CEE0000-memory.dmp

              Filesize

              64KB

            • memory/2168-579-0x000002765CF00000-0x000002765CF10000-memory.dmp

              Filesize

              64KB

            • memory/2168-580-0x000002765CF10000-0x000002765CF20000-memory.dmp

              Filesize

              64KB

            • memory/2168-581-0x000002765CF20000-0x000002765CF30000-memory.dmp

              Filesize

              64KB

            • memory/2168-582-0x000002765CF30000-0x000002765CF40000-memory.dmp

              Filesize

              64KB

            • memory/2168-583-0x000002765CF40000-0x000002765CF50000-memory.dmp

              Filesize

              64KB

            • memory/2168-585-0x000002765CF60000-0x000002765CF70000-memory.dmp

              Filesize

              64KB

            • memory/2168-547-0x00007FFFD3080000-0x00007FFFD35C1000-memory.dmp

              Filesize

              5.3MB

            • memory/2168-586-0x000002765CF70000-0x000002765CF80000-memory.dmp

              Filesize

              64KB

            • memory/2168-590-0x000002765CFB0000-0x000002765CFC0000-memory.dmp

              Filesize

              64KB

            • memory/2168-589-0x000002765CFA0000-0x000002765CFB0000-memory.dmp

              Filesize

              64KB

            • memory/2168-595-0x000002765D000000-0x000002765D010000-memory.dmp

              Filesize

              64KB

            • memory/2168-594-0x000002765CFF0000-0x000002765D000000-memory.dmp

              Filesize

              64KB

            • memory/2168-593-0x000002765CFE0000-0x000002765CFF0000-memory.dmp

              Filesize

              64KB

            • memory/2168-592-0x000002765CFD0000-0x000002765CFE0000-memory.dmp

              Filesize

              64KB

            • memory/2168-591-0x000002765CFC0000-0x000002765CFD0000-memory.dmp

              Filesize

              64KB

            • memory/2168-588-0x000002765CF90000-0x000002765CFA0000-memory.dmp

              Filesize

              64KB

            • memory/2168-587-0x000002765CF80000-0x000002765CF90000-memory.dmp

              Filesize

              64KB

            • memory/2168-597-0x000002765CF90000-0x000002765CFA0000-memory.dmp

              Filesize

              64KB

            • memory/2168-598-0x000002765CFA0000-0x000002765CFB0000-memory.dmp

              Filesize

              64KB

            • memory/2168-599-0x000002765CFB0000-0x000002765CFC0000-memory.dmp

              Filesize

              64KB

            • memory/2168-600-0x000002765CFC0000-0x000002765CFD0000-memory.dmp

              Filesize

              64KB

            • memory/2168-601-0x000002765CFD0000-0x000002765CFE0000-memory.dmp

              Filesize

              64KB

            • memory/2168-602-0x000002765CFE0000-0x000002765CFF0000-memory.dmp

              Filesize

              64KB

            • memory/2168-603-0x000002765CFF0000-0x000002765D000000-memory.dmp

              Filesize

              64KB

            • memory/2168-604-0x000002765D000000-0x000002765D010000-memory.dmp

              Filesize

              64KB