Analysis

  • max time kernel
    74s
  • max time network
    79s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06/08/2024, 16:50

Errors

Reason
Machine shutdown

General

  • Target

    VirtualBox-7.0.20-163906-Win.exe

  • Size

    105.1MB

  • MD5

    b822835698e76fff193342effc92d286

  • SHA1

    e049adb24caf0153b94e801da9835d485c67e38c

  • SHA256

    fa3544162eee87b660999bd913f76ccb2e5a706928ef2c2e29811e4ac76fb166

  • SHA512

    0381b27478dc25d4b3707fb21a34be66ca42eb18d93ce8ec90be7325015f540a39ebfea58b7992a38cc2c861e6e86d89c67f5b3a84ddb65e339fcca0dc314bed

  • SSDEEP

    3145728:VuwDpzeIGwA7iKVCv8hxxgFYHey3WCfEOiP1e48TetH+H9:VuwDpz9A70Cno1XZBtHC9

Malware Config

Signatures

  • Drops file in Drivers directory 12 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 48 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 42 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirtualBox-7.0.20-163906-Win.exe
    "C:\Users\Admin\AppData\Local\Temp\VirtualBox-7.0.20-163906-Win.exe"
    1⤵
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Program Files\Oracle\VirtualBox\VirtualBox.exe
      "C:\Program Files\Oracle\VirtualBox\VirtualBox.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:4720
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3692
    • C:\Windows\System32\MsiExec.exe
      C:\Windows\System32\MsiExec.exe -Embedding E9640D458EEB02E43480E09B035D0F9F C
      2⤵
      • Loads dropped DLL
      PID:2712
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:1432
      • C:\Windows\System32\MsiExec.exe
        C:\Windows\System32\MsiExec.exe -Embedding 8F289E68D928678C33E051D61DCFF448
        2⤵
        • Loads dropped DLL
        PID:3424
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 2D420E80D8AE03CF95CAA9EC91813F77
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:884
      • C:\Windows\System32\MsiExec.exe
        C:\Windows\System32\MsiExec.exe -Embedding 55B915870E8B63D07F05FD75F2DEA7E6 E Global\MSI0000
        2⤵
        • Drops file in Drivers directory
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Loads dropped DLL
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:2056
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding A5C2ABCBD25F279CF396320C98F4BDA1 M Global\MSI0000
        2⤵
        • System Location Discovery: System Language Discovery
        PID:3448
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:3752
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
      1⤵
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of WriteProcessMemory
      PID:2168
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "1" "C:\Program Files\Oracle\VirtualBox\drivers\USB\device\VBoxUSB.inf" "9" "48f6bcb47" "0000000000000154" "WinSta0\Default" "0000000000000160" "208" "C:\Program Files\Oracle\VirtualBox\drivers\USB\device"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:3504
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "1" "C:\Program Files\Oracle\VirtualBox\drivers\network\netadp6\VBoxNetAdp6.inf" "9" "473b17b7b" "0000000000000160" "WinSta0\Default" "0000000000000168" "208" "C:\Program Files\Oracle\VirtualBox\drivers\network\netadp6"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:2760
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "1" "C:\Program Files\Oracle\VirtualBox\drivers\network\netlwf\VBoxNetLwf.inf" "9" "431e52bcb" "0000000000000168" "WinSta0\Default" "0000000000000080" "208" "C:\Program Files\Oracle\VirtualBox\drivers\network\netlwf"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:3792
    • C:\Program Files\Oracle\VirtualBox\VBoxSVC.exe
      "C:\Program Files\Oracle\VirtualBox\VBoxSVC.exe" -Embedding
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4188
    • C:\Program Files\Oracle\VirtualBox\VBoxSDS.exe
      "C:\Program Files\Oracle\VirtualBox\VBoxSDS.exe"
      1⤵
      • Drops file in System32 directory
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1656
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x4 /state0:0xa3a34855 /state1:0x41c64e6d
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:1156

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Config.Msi\e583e1e.rbs

            Filesize

            2.6MB

            MD5

            94689a0de1602fdee10db56cd1c142b0

            SHA1

            5f5fafa85f78f0f33103174ff70ef820dacfb39c

            SHA256

            1e56a0e123a7401a0f11625062cb9998d9c73db293df4f2818b6818aa6e727b6

            SHA512

            0e155515c1db3d821905123dc52cd54449fe0e3767e12d6f93d0f75ed45fceb4ae1ca8102d2df3afe61c2b8a61046914987d61c7a0cb8c506613b921749ddd81

          • C:\PROGRA~1\Oracle\VIRTUA~1\drivers\USB\device\VBoxUSB.cat

            Filesize

            11KB

            MD5

            709158bcc41950578c9a1e36b1ba8162

            SHA1

            34decc49a892356ca9c81a269f23588f5075f6c0

            SHA256

            875a40b2b5260ce866ab9a8b09c6286310d3a3725b0d94dc6ee473b8c7d435da

            SHA512

            6be3d2c2d20aa58c5192183c49a0f46e04e455d3b56fd7c4f4c3c66fd960fac54885c5284d7fe27aaa8cc95931ffb02e81f4995e6199aa5010c4263fbdf97d8f

          • C:\PROGRA~1\Oracle\VIRTUA~1\drivers\USB\device\VBoxUSB.sys

            Filesize

            184KB

            MD5

            477569c254917d2c3e92108aee4d84b9

            SHA1

            49a8714c3e8fddd31c3725e39272c21b892cd681

            SHA256

            3eaa6ca9447f36c9f6e759244ae0ab64ef070a906809863b1a3d02725dd1c23a

            SHA512

            cd973c0bbca122da1a117c948969849f53788910a3a113317fc9dc6c27d9e79992117a06bd7d01be6e5faf9ce83942326d72ff3ba205ad19a6f2afdc05c25d75

          • C:\PROGRA~1\Oracle\VIRTUA~1\drivers\network\netadp6\VBoxNetAdp6.cat

            Filesize

            11KB

            MD5

            ec7d0a49c44f4a60efb1a1c1dbda8636

            SHA1

            c93ca5789141bd7063ac9db0df4ce22e737f4648

            SHA256

            d1d1a377777a0b6cf6bed09b235b45e2bd5ea1d5c86efdf25843aae5ed4a1d84

            SHA512

            d92babbf0f3bc0fbc08acfa6de38b28124f7bb74d718b711eb160100f4636fae37d27c2d0ae69b8313e40795ae36c73c3f662ef65b7f4a7bb0ff9d70f8540171

          • C:\PROGRA~1\Oracle\VIRTUA~1\drivers\network\netadp6\VBoxNetAdp6.sys

            Filesize

            248KB

            MD5

            5a42fd4fe07b75cc841af29626e04e1d

            SHA1

            ca3505352788a21960c8213f91078c0b07e777c7

            SHA256

            416f1c2ce6467d0d596522b8d155e08aacf210f7c2f37d6c1c0694ae1cef4ae3

            SHA512

            d9d4a9102b36658dac78b3dbfcff4a1811ad6441c2cec422dae201716ca7630ed918d76417482c79d54d9bf3dcfcaba5e5d4b3a5d3b0c425da2f40b035d09f07

          • C:\Program Files\Oracle\VirtualBox\VBoxProxyStub.dll

            Filesize

            874KB

            MD5

            e0505a79d9d12c5cdc4762f770eae4a0

            SHA1

            ec0baa32126157ab668b169b9d771dd26fec7666

            SHA256

            999e5cd2bc8f180f9dd90c79727bdb760e69ee51f9413d7d66bf9d72fe1e95c9

            SHA512

            71d49183f5d18a17e07ba64a49aae1edb6370a691ea6a5082c7cd32f135d5ff1712f6b9c641af06db38755e4192ea4d48072073528620643673318592730ed58

          • C:\Program Files\Oracle\VirtualBox\drivers\USB\device\VBoxUSB.inf

            Filesize

            2KB

            MD5

            3155160d6548ce4433d1611ba4872451

            SHA1

            46b7099f85af93155de58e5b4e41e8d48937b68b

            SHA256

            054385912c2f74a171572e750862f2ec75ab93c59f92213b40d007ce9aecc6e6

            SHA512

            3b2d79b8910b939f605f5c8d7a6ece541b80347602b3dc9f066f943a67fe90ec56607d29f2fe3824ab57b5781554171e800ed8ba549e9d535e16831fd368703a

          • C:\Program Files\Oracle\VirtualBox\drivers\USB\filter\VBoxUSBMon.cat

            Filesize

            11KB

            MD5

            f5cfc4cae166b9e81c89192f5e1a4d94

            SHA1

            868224fb61115ff0b90f68d1722423187eb14cfe

            SHA256

            0feed3207fb9853dd77b60bf611f26a65e3a932720d93f64bdd70082f1be955f

            SHA512

            712add1230397fe658b11f8f95b74a257348704315e96cb070d3f7a4e8dbe70c8d37d8add7cc151c050efe27fdc081bc6714438638d3d147605a54cb4d60fbc7

          • C:\Program Files\Oracle\VirtualBox\drivers\USB\filter\VBoxUSBMon.inf

            Filesize

            3KB

            MD5

            b0a35c2ca1180c2e4963e5be1235d93d

            SHA1

            862d17275c5e82430f37813c107f852af954bbdf

            SHA256

            ba5c69eee5390746fe9cd29a26197853d74d46b4248162c39be8f5212a9bf17d

            SHA512

            a8a842c3c9c10fb2c4d55589b64dd48d60a6bf5f41fd7092a2965d8f3ab7c3b8dc32822217df3f761ea77981395fa847a67bb9944ce9c718b747340db805c6bd

          • C:\Program Files\Oracle\VirtualBox\drivers\USB\filter\VBoxUSBMon.sys

            Filesize

            199KB

            MD5

            d0a8b437866db80fd1661174886f56dd

            SHA1

            2166c3f54262cae094073a2bc3b0c86f349ca51b

            SHA256

            05c99ae7cf556e8e35f22c51f5e52233baf236a6dccbdb15c5611da0e20b805f

            SHA512

            fa3d23e39bc607ca96af92ab4e382233e2194aeec2de95af8196bb72c5304327b590c230da211521a26405ac0e1042c190f344fd34bc0878bd39ad02b255f72d

          • C:\Program Files\Oracle\VirtualBox\drivers\network\netadp6\VBoxNetAdp6.inf

            Filesize

            3KB

            MD5

            6b3fa213490c6f16d205e88f1291d996

            SHA1

            ec49d2336dccab27b42a53a96f7d2618e4c0101f

            SHA256

            bfdeea0ff03a48b192de9b9c4dbf59deeddf09b13399d3a860249b06c85615b3

            SHA512

            e8a9f55aedc46636f39ba892d275b73a959d507ded6890cb29f83479e8785c852812aec44e5f7bb4db6a9e7a70a346233d5690c2350f342250df6f716d4fc254

          • C:\Program Files\Oracle\VirtualBox\drivers\vboxsup\VBoxSup.cat

            Filesize

            11KB

            MD5

            814ba3a3470df3bc9ea4db4425962dc6

            SHA1

            555bf96062bad5f61973af420575fecdf748f53d

            SHA256

            d617ca9c42fed44b6c6b3db16ace04b2545afaa2ad9cc3e4be2761da94327e12

            SHA512

            8ca5201a5c4645d67fbf1a6b1f8de8cb64ccb5282afdb35155f4c2bc9ec8daea2862e77b552f732800edf5538410d4611a98a6b323994c459cda77a4575eb7e7

          • C:\Program Files\Oracle\VirtualBox\drivers\vboxsup\VBoxSup.inf

            Filesize

            3KB

            MD5

            cdff988430eb1bc5b00282cf72940e73

            SHA1

            65ea17e6e88cc4feb17031836b501fbb0f1b1d4e

            SHA256

            4cd64a11a7bdf1f18cc684f3ee6c8eeae8474074bd7fbebd7fe543656bb05b41

            SHA512

            8e01d8ad58f679ead7b35b5128f49f32535afa52a6844e4a53b714f4df538eb372a6345489e2994921557846460ea990407a811976439f69062f176b5f11a11a

          • C:\Program Files\Oracle\VirtualBox\drivers\vboxsup\VBoxSup.sys

            Filesize

            1.0MB

            MD5

            146ccf9c24cd243b27919caeace73f74

            SHA1

            7df3bc16502a2dd2420f5d81e1d8acbe05c8fc7a

            SHA256

            95bf86954288bc187f0b034675a75a9e06ff5dc500c4a317c387c3cf22b5a628

            SHA512

            8e21fcef6456d27acc7811e624791ac8724d8b3345772578910848ce67c6f13855d5c5af3f057eb0f8c5c20aee4923f25ced5fcc1c309d127ff2a0b6a10a5700

          • C:\Program Files\Oracle\VirtualBox\x86\VBoxProxyStub-x86.dll

            Filesize

            654KB

            MD5

            c5723bd0a399fdd5a72b47a5a5d98479

            SHA1

            b7d8ad38444130dbe7058a0d63dd36ad25636894

            SHA256

            0af7da511c562b1b037fdc9ff11a660efdb7684dbbf9155b067e08b1b6f5c52e

            SHA512

            938a110bb2814f1c1cc93c8ee3ada74df88256986fb0a00cad9fdbf5beacff7587ba21c2926d5da072a3169da7ab14f16765cd5a89b4a56033a27d7c9e4ae63b

          • C:\Users\Admin\.VirtualBox\VirtualBox.xml

            Filesize

            1KB

            MD5

            d9d28bd2ef7192fb0efb99607d7a0807

            SHA1

            7fb6f32f1c0f227118613dd7779e1bf0a6e2ce4a

            SHA256

            dad710b076d96b3de34a58363a3241935bfe205b7240ce57f9d85bf2058e6dd5

            SHA512

            e058987d5fd8ea6cd3c3081c7ac45ce1e3719c4a38b46390133b19539fad35a0d8ad699023a3d934d18e3356cb6def62bd197b5a32ad496b620469c55d9efb13

          • C:\Users\Admin\AppData\Local\Temp\MSIA19F.tmp

            Filesize

            324KB

            MD5

            0653ce43996240dde250d557ef940bed

            SHA1

            da125564fadda9bea308bd7325d4664ee14c69a8

            SHA256

            d2fd21376c4595e60299e37cb55dceb92b531685f1a4545c6bb73681dbcad193

            SHA512

            27ab2bd553fa390315d360e593ca95e90f8de13d0d60326549fd5e63479143b33a0a7a49c4111e2041cfb05d5f2e9b516eaa7261acae3884094e3842a8309a6c

          • C:\Windows\Installer\MSI41DA.tmp

            Filesize

            234KB

            MD5

            8edc1557e9fc7f25f89ad384d01bcec4

            SHA1

            98e64d7f92b8254fe3f258e3238b9e0f033b5a9c

            SHA256

            78860e15e474cc2af7ad6e499a8971b6b8197afb8e49a1b9eaaa392e4378f3a5

            SHA512

            d26c9dce3c3d17583ffb5dbcd3989f93b096a7f64a37a2701a474c1bf4b8c8b1e922c352d33f24e411f1c793e1b4af11a3aec1de489087d481b1b636df2050cd

          • C:\Windows\Installer\MSI4558.tmp

            Filesize

            149KB

            MD5

            418322f7be2b68e88a93a048ac75a757

            SHA1

            09739792ff1c30f73dacafbe503630615922b561

            SHA256

            ea5d4b4c7e7be1ce24a614ae1e31a58bcae6f1694dd8bfb735cf47d35a08d59b

            SHA512

            253f62f5ce75df3e9ac3c62e2f06f30c7c6de6280fbfc830cdd15bf29cb8ee9ed878212f6df5d0ac6a5c9be0e6259f900eccee472a890f15dd3ff1f84958aeef

          • C:\Windows\Installer\MSI4F8C.tmp

            Filesize

            690KB

            MD5

            8deb7d2f91c7392925718b3ba0aade22

            SHA1

            fc8e9b10c83e16eb0af1b6f10128f5c37b389682

            SHA256

            cb42fac1aebb6e1ac4907a38035b218b5f992d1bcd4dece11b1664a588e876e4

            SHA512

            37f2c132b632c8e5a336bdc773d953c7f39872b1bae2ba34fbaf7794a477fd0dcb9ff60a3ddb447fe76abd98e557bd5ee544876584adea152b0841b3e313054c

          • C:\Windows\System32\CatRoot2\dberr.txt

            Filesize

            2KB

            MD5

            78fa691ac31fa27e6d7fad3495c4cfe5

            SHA1

            3f9dc23c82f930d608704eacb9cf3759f082ba92

            SHA256

            bec752bb78944836716e277c82bbdff0d746b6ea96faa588968649224851e4e7

            SHA512

            430199863de26d94b0380ce533313bba60fc8d1122e622c47b2f77cf95ad462fd8e31c1f668fdf7bcf79de34d64e538d759e5b0bd3bfe473c07530a065593223

          • C:\Windows\System32\CatRoot2\dberr.txt

            Filesize

            2KB

            MD5

            2fac6ae7525c56fd0d3af65fe772cac5

            SHA1

            cf0a78e2ab092093c3171bb3a25092f0e9d9ba11

            SHA256

            5a81b70e11f47087633633181eb70d73c76693b5a5ea9b14cf89aff2e6d338f1

            SHA512

            9c10f811f587ee3d2f8197eefcf5612d755f75bac838d031df01e9eb80a33d6db11392bf3f2c75ca2870cf4c4b0742fbd57203c08163f89109c2d255999f1208

          • C:\Windows\System32\CatRoot2\dberr.txt

            Filesize

            2KB

            MD5

            07bce4edff618d823fac9259397113b5

            SHA1

            75356efc5f8700674ca7fe82c8151116d302f0f8

            SHA256

            8be2378fcdfa7c414ef56b4d91f3c6252dd4461be04b56de21fcee218983394e

            SHA512

            29b60412fe160244493903a33fa7b2b75d3747949d27d484d2ce9520e2af8848205a1cdb0fe4f53bd162ba980bf7c547489ce16429351df8b5e32280e1e9d82d

          • C:\Windows\System32\DriverStore\Temp\{364d0bf6-b4da-ff45-8a08-e0c07353033c}\VBoxNetLwf.cat

            Filesize

            11KB

            MD5

            8efe8e5827cd8c5c9b07be9df8b6eb91

            SHA1

            0f682438473d6e87b7661e8cfb1a1b2980806f05

            SHA256

            aa7d8309c69f26d33ec92e4c2b68ffc7baf2a9d4009267346abe591027f4bec5

            SHA512

            6e4741ea43e9e6e2ba526d7883867d63e06705bb37cb889b9670d43485a3a92b28a15a795e9af01d8799ff28390f795a401ba621de819a0f40d215cfb4e44f40

          • C:\Windows\System32\DriverStore\Temp\{364d0bf6-b4da-ff45-8a08-e0c07353033c}\VBoxNetLwf.inf

            Filesize

            4KB

            MD5

            58aa41a4df0b4d9e77a576d1306bef77

            SHA1

            ecf3d90629d021e18399728848dd7ccedc54f1e9

            SHA256

            2d479ead5715faa9b1de5e873a377373add4f151942c9881fc1da607f773f723

            SHA512

            7624e3d7947c39a872f10d4493780181a24111f9bfe5395fdb3f9cfe13e62c5b46d0d4c24198f392f07cd74e0012b0b19fcf78d787d9192d4f10a5e325c274b8

          • C:\Windows\System32\DriverStore\Temp\{364d0bf6-b4da-ff45-8a08-e0c07353033c}\VBoxNetLwf.sys

            Filesize

            259KB

            MD5

            db91352985fdf76c4d8d7bf22d75d323

            SHA1

            600cc772fca941ec03e83823d2401b7085afc6ac

            SHA256

            9f9c839e8883ae1f5104a26262374dfa5ecc24590bb57275f0493ad9b226f45f

            SHA512

            9a0cd545d3018e9d350194e2debcb7ed159b60fc6ca033e607dd1eaacd2e7ee3c4776f4fb7f27af0d1118c8fb8a29a82df16a860abf4105d1f61d8efa8ffb933

          • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

            Filesize

            12.8MB

            MD5

            052fbfbb8645be53f35385c0917fb4b9

            SHA1

            ae40346491b80bd43869224ca2aab430b599002a

            SHA256

            af8faada2847fccbd3f2cbe35ba8403abeda7948e5061e8f06e365c74a948391

            SHA512

            86add77c5adf3534501b78b605c594058411fe5f12de001aa8dcaf3c0f6b3884f91871f7a011a2960c1ad4c8ed777aac5343a7e0f02e2533f575df8e629865ac

          • \??\Volume{e2de8665-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{28895059-64ab-462a-8c36-1913c367caac}_OnDiskSnapshotProp

            Filesize

            6KB

            MD5

            682f4eab11e7bdee7fd13a1e7cd0de20

            SHA1

            6d2a39744b5f49d0137d8f69d1cc736848c90911

            SHA256

            3887841710c8919c6dee3fcdd88c4f5eac537505479ca54167e169e7fb83cdc1

            SHA512

            d51e675616d941aa4d1f44acd0cc7b42a57b5113abfb61c772a8bbea80d0451785dac8c5ce1af7dd6d76fb7b27b886d0b69ce0a96d1b3f7d859c53c0413062a1

          • memory/4720-531-0x00007FF71B620000-0x00007FF71B8A4000-memory.dmp

            Filesize

            2.5MB

          • memory/4720-533-0x00007FFAFEA40000-0x00007FFAFEF81000-memory.dmp

            Filesize

            5.3MB

          • memory/4720-532-0x00007FFAFCE60000-0x00007FFAFEA3E000-memory.dmp

            Filesize

            27.9MB