Resubmissions

08/08/2024, 19:51

240808-ykymmaydkn 1

08/08/2024, 19:48

240808-yjkz5sycqm 7

Analysis

  • max time kernel
    102s
  • max time network
    101s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08/08/2024, 19:48

General

  • Target

    https://skmedix.pl/es

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 3 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 4 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://skmedix.pl/es
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4644
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff93ed43cb8,0x7ff93ed43cc8,0x7ff93ed43cd8
      2⤵
        PID:5024
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1832,10609378290120066001,13423350109216524953,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:2
        2⤵
          PID:3248
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1832,10609378290120066001,13423350109216524953,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3728
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1832,10609378290120066001,13423350109216524953,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:8
          2⤵
            PID:644
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,10609378290120066001,13423350109216524953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
            2⤵
              PID:4800
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,10609378290120066001,13423350109216524953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
              2⤵
                PID:4920
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1832,10609378290120066001,13423350109216524953,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4820 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:2884
              • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1832,10609378290120066001,13423350109216524953,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:4948
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,10609378290120066001,13423350109216524953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:1
                2⤵
                  PID:5236
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,10609378290120066001,13423350109216524953,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:1
                  2⤵
                    PID:5244
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,10609378290120066001,13423350109216524953,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:1
                    2⤵
                      PID:5392
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1832,10609378290120066001,13423350109216524953,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:1
                      2⤵
                        PID:5400
                    • C:\Windows\System32\CompPkgSrv.exe
                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                      1⤵
                        PID:1644
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:2200
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
                          1⤵
                            PID:4792
                          • C:\Windows\System32\oobe\UserOOBEBroker.exe
                            C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
                            1⤵
                            • Drops file in Windows directory
                            PID:1428
                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
                            C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
                            1⤵
                            • System Location Discovery: System Language Discovery
                            PID:2692
                          • C:\Windows\system32\SystemSettingsAdminFlows.exe
                            "C:\Windows\system32\SystemSettingsAdminFlows.exe" FeaturedResetPC
                            1⤵
                            • Enumerates connected drives
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of SetWindowsHookEx
                            PID:3600
                          • C:\Windows\System32\vdsldr.exe
                            C:\Windows\System32\vdsldr.exe -Embedding
                            1⤵
                              PID:2856
                            • C:\Windows\System32\vds.exe
                              C:\Windows\System32\vds.exe
                              1⤵
                              • Checks SCSI registry key(s)
                              PID:4380
                            • C:\Windows\system32\SystemSettingsAdminFlows.exe
                              "C:\Windows\system32\SystemSettingsAdminFlows.exe" FeaturedResetPC
                              1⤵
                              • Loads dropped DLL
                              • Enumerates connected drives
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of SetWindowsHookEx
                              PID:5676
                            • C:\Windows\system32\SystemSettingsAdminFlows.exe
                              "C:\Windows\system32\SystemSettingsAdminFlows.exe" FeaturedResetPC
                              1⤵
                              • Enumerates connected drives
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of SetWindowsHookEx
                              PID:5784
                            • C:\Windows\system32\SystemSettingsAdminFlows.exe
                              "C:\Windows\system32\SystemSettingsAdminFlows.exe" FeaturedResetPC
                              1⤵
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of SetWindowsHookEx
                              PID:5912
                            • C:\Windows\System32\vdsldr.exe
                              C:\Windows\System32\vdsldr.exe -Embedding
                              1⤵
                                PID:4676
                              • C:\Windows\System32\vdsldr.exe
                                C:\Windows\System32\vdsldr.exe -Embedding
                                1⤵
                                  PID:904

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\$SysReset\Logs\ResetConfig.ini

                                  Filesize

                                  167B

                                  MD5

                                  e8b67f9f170a171d59b1020f686f09ce

                                  SHA1

                                  19428a2ab0e7f64ceaf7cdc723916a9f6ebf26bd

                                  SHA256

                                  e88065016cfd248d4d0f5199becb3d9233a4d96bcb60fa5a7c2724c2cc71ac1d

                                  SHA512

                                  8616c3065e84f11acd8cbe57e3dc06fab843787ccccec062ec873ba7e97eeb6008cb61b2e35a71bbbdd61be800ad96af6a0dbbbcca42992ed2a5ee0681e156a8

                                • C:\$SysReset\Logs\Timestamp.xml

                                  Filesize

                                  38B

                                  MD5

                                  7e54c68b36d9dfefee17e76a72ca559c

                                  SHA1

                                  c5a3c7636d668ed217a58eccfcfa9c1ee6187f42

                                  SHA256

                                  be39d7c9d81efccefc3ecd931d3f2dd4fe8d2180d2c9cc0c2002a2b5d885ec22

                                  SHA512

                                  3f33529656f684bacf142d97ee4e720523a0f9953da95422496fccaa120d1b3947e7b30eb3bbaa19e2a6dee6fd4731095d823484a7f15ee6152f352d66b9f4dd

                                • C:\$SysReset\Logs\Timestamp.xml

                                  Filesize

                                  42B

                                  MD5

                                  f32a743992c259f0576c04d971f747e2

                                  SHA1

                                  baeb87365380fe35fe3b3f564badfef92fa9a5e4

                                  SHA256

                                  f322f8b3857f13f4bd81fdc202a698091351628b28fc3322d333b940c4f4291c

                                  SHA512

                                  ab7d92069a92d9a9f7fbf77c850d0874c877a970a0005a1dc7edb87d5cea7589818f8599e9ebaefbf44b24a5e43c967316182bf6ea62ab0042608318c904d65c

                                • C:\$SysReset\Logs\Timestamp.xml

                                  Filesize

                                  39B

                                  MD5

                                  d2834305b71034d4a848cf04aa299870

                                  SHA1

                                  31411794ce976fe10f17044605ffd920e51e295d

                                  SHA256

                                  62580c4e4eb7dddac48ca34bc85335811b1586db300b1e5258614ed58ee5a433

                                  SHA512

                                  f6537579d495a986576c7582f85c0c40f1f4467e94eca885234059126f746bdcda3d7d431f859b5ad19ac9e9e3309fc56411673b71ad279167f24d8ea1a90ef1

                                • C:\$SysReset\Logs\Timestamp.xml

                                  Filesize

                                  41B

                                  MD5

                                  07b724f1903f9edca1683d4922acf171

                                  SHA1

                                  2e787578f488fcfd8e38a1e409593b5ffe3c367f

                                  SHA256

                                  0ff0d3dff6ce5312e3887ab8e17b2c8edf01ef50e68bb397f86adbc0ee066d11

                                  SHA512

                                  ca921b9ae3b9f4967d9f77361460187504adf65e9c63c6487d4a5ef2be3656463296f5a5957395dba1bd22720f3bd92d7620b8cd60a5adccce1f263bc46c642f

                                • C:\$SysReset\Logs\Timestamp.xml

                                  Filesize

                                  42B

                                  MD5

                                  3569c7db9065bcf06e8cdc8d23677907

                                  SHA1

                                  6b6fcb83748325afe0c8db3f761f8f3f95ac68fd

                                  SHA256

                                  0fe414bc8c1ae9ad34ebef5644444217477d6cb6821d4a844fdf01fdbc78c3f8

                                  SHA512

                                  d8c8d8994d3a17ca51da0c6f537a692e3bb80d5dbe355d385cd4eeb1b0798544350ac15cfbc11cfa43f5aa57117584a62df12afaf0e62a216a8b23fa4581283f

                                • C:\$SysReset\Logs\setupact.log

                                  Filesize

                                  391B

                                  MD5

                                  d5d53cc4751786808d8385e1f1a3977e

                                  SHA1

                                  ce18659959cbf026126936907329deea1a8d7d2f

                                  SHA256

                                  66f7ddcf25cbb6a012bb174b6b0c56f326fb636628257147a6818857701b711e

                                  SHA512

                                  73eb4bca67559fb80e26c3e00c8a99b2e0c2aa23d836bb9f01801623d24f79543378be0dde2c02e578eb101bd982ce9e82df20e0da11955aebfbc33595828530

                                • C:\$SysReset\Logs\setupact.log

                                  Filesize

                                  1KB

                                  MD5

                                  1de0afa9062b171fdc37a08a40754a9f

                                  SHA1

                                  ce7f3c6b46b8ed5c8cba1c4306b291788b31db41

                                  SHA256

                                  58015dcfcf9116c349a71e17bef234ba0755f33c9f25e4f3e6f49e83e4d800c7

                                  SHA512

                                  b140dc7532452cd158d19082703ad5021d1535fa0385fa2d8a9f97faddb1b8546baa185e885c2892311464386283da808f7a640e4e82cc8590bfbd83544a3534

                                • C:\$SysReset\Logs\setuperr.log

                                  Filesize

                                  556B

                                  MD5

                                  5adf12988f64937de34c53d36879167d

                                  SHA1

                                  a91beee5853837742acf8d484e16eb0aae22e4a6

                                  SHA256

                                  e3addc1a1135400c94ca815b8cd6d67a22f2bb70b5a7517e378a0cf16cbb2083

                                  SHA512

                                  9be76a634dfce4339fb2eff2c3d1f9f9e3eb86cbe159a61dc1248385c2591b89a0b028aa83a385cfa47efd54403ff1346d7adb58e7b760d725c6ec64393c246e

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  4c3889d3f0d2246f800c495aec7c3f7c

                                  SHA1

                                  dd38e6bf74617bfcf9d6cceff2f746a094114220

                                  SHA256

                                  0a4781bca132edf11500537cbf95ff840c2b6fd33cd94809ca9929f00044bea4

                                  SHA512

                                  2d6cb23e2977c0890f69751a96daeb71e0f12089625f32b34b032615435408f21047b90c19de09f83ef99957681440fdc0c985e079bb196371881b5fdca68a37

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                  Filesize

                                  152B

                                  MD5

                                  c4a10f6df4922438ca68ada540730100

                                  SHA1

                                  4c7bfbe3e2358a28bf5b024c4be485fa6773629e

                                  SHA256

                                  f286c908fea67163f02532503b5555a939f894c6f2e683d80679b7e5726a7c02

                                  SHA512

                                  b4d407341989e0bbbe0cdd64f7757bea17f0141a89104301dd7ffe45e7511d3ea27c53306381a29c24df68bdb9677eb8c07d4d88874d86aba41bb6f0ce7a942c

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  912B

                                  MD5

                                  ce3cb6ecc694450f7ed33b491e0bf7cf

                                  SHA1

                                  92975400480dbf7f993b7ca1d5807c27651ac965

                                  SHA256

                                  b92bd45c7b9a3cf9d70fb1a77c24ab53311615c730d0775fd537963cc9623008

                                  SHA512

                                  d4d8447cf717e6f5ee10ac6e0ef6f7c3ce792a0d0f413247be0e1aac4b6e0390afff955f9367c66e0b02a32ff12f0d609df6208f7430a731b7549ad58b8a52bd

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                  Filesize

                                  2KB

                                  MD5

                                  74aa09d54725a3068e01cd77ee933475

                                  SHA1

                                  6a52217348657cb681df5faa7d0c29ae7dcdf852

                                  SHA256

                                  bcfb620b05dd3994294aef3b6c3c4985dcd09085cdad98dafe141e811d64f770

                                  SHA512

                                  7eaa869fb4ece407e0df7cb98fac728ad465306d9e4b00fb64547b49a527d03f6fb4b9015ba0128f3dd14f6b25b4f2b712aebb3ce8758116e8ef068fcc4a1ad3

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  5KB

                                  MD5

                                  0739d67c15de83554255eea66cbede03

                                  SHA1

                                  5cadf1e0fbcbd6197ca6ccae969b466b2a314b49

                                  SHA256

                                  5fbbc4d2059873a2ef86cd11c0fbbe1935a6093aa41b385c8476865cb366b18c

                                  SHA512

                                  fc386054adee46d760b438c2831369e35d64b6e768564ce680e0ba97a5f9cc921572bbbd8e86447a8d35c646158f4cb816b175b186a3390e42a970ef0dd18bc7

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                  Filesize

                                  7KB

                                  MD5

                                  4ce32d5ce1064fd5a9e1783ccf5b153e

                                  SHA1

                                  93a3e09e1a1d60239f0668fa6a82f02945b82181

                                  SHA256

                                  c1f8e78edbae64f2377a7ef275fc366d153112361ce76e61471eab21b5887e23

                                  SHA512

                                  d3d80bbd06b59008d49b5373c983543cb7819a6e830b1f6423be249e9326538e83f348e7a41daff35298d29f496e835cb39d42fc1743904b1d1d802a69853586

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  206702161f94c5cd39fadd03f4014d98

                                  SHA1

                                  bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                  SHA256

                                  1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                  SHA512

                                  0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                  Filesize

                                  16B

                                  MD5

                                  46295cac801e5d4857d09837238a6394

                                  SHA1

                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                  SHA256

                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                  SHA512

                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                  Filesize

                                  11KB

                                  MD5

                                  4ebdd89a95696067b89473709f231379

                                  SHA1

                                  069842067305beccdd46d98661341801f88ae76f

                                  SHA256

                                  141123a89d96a7969e0d829e7c01cae728c9c7b96ea11744077fdf33a130d686

                                  SHA512

                                  fb8c7fd37f69197093a5f325c1aeb0f85554ba8c444c08067119570fc85e5e21b3a29ad75a11bb54f16e5d26be5ba982b92989e58111ea481f393d0432b37e51

                                • C:\Users\Admin\AppData\Local\Temp\{0657ABA6-4F1B-40FA-BE6C-FD17696E1547}\ssshim.dll

                                  Filesize

                                  148KB

                                  MD5

                                  3de653713e705e001c3f0be1efc51ed3

                                  SHA1

                                  63565592c266226d36604933e51725e90010da25

                                  SHA256

                                  c78ebef77e03135b3cea0705d4c259d782ed80746faea4e9f4a851e494fa94f9

                                  SHA512

                                  7db1063fa2a7c0bcf394d7a20984ab1b501cb24fae5e801addace77424ba773c948a87d8c3fb38f06366b1478f70ba0278c48f219d224ff6e904ff2ee161fb4e

                                • \??\Volume{85315c9a-0000-0000-0000-d01200000000}\$SysReset\Logs\SessionID.xml

                                  Filesize

                                  106B

                                  MD5

                                  40ea30585f86e8c594663be05efab924

                                  SHA1

                                  f79e080837f26ffd4d59c634c9cfc9dd2d4fb05c

                                  SHA256

                                  467b21b791e7b70f9adda7661042e73f0d591a1e8cdf92ea401ca0650aaea688

                                  SHA512

                                  fe5fb67b94510fc1e83660700775492a030b6dfd5914f665d6a998d899a51ff0ad334ead1b0c49789be2a0902d45c6d4f3db602dff21642924fb90fb83e23bb5

                                • \??\Volume{85315c9a-0000-0000-0000-d01200000000}\$SysReset\Logs\SessionID.xml

                                  Filesize

                                  106B

                                  MD5

                                  4119ebd62ed8addda2982b819834a0dc

                                  SHA1

                                  66edc6e52c3f54a5bd186337139873645f827ab3

                                  SHA256

                                  e3d67c8b553793d4a80a7c0d338b7d4e045944b7110cdb819c033c75f783eab9

                                  SHA512

                                  f0ce4fa936c4534e80a0afc747e10f77172701c0bd2f52c2ba8393a1b00d8fe613574c2582a5e59740a204b35c2025c93968739ca206d87c6364b63676128625

                                • \??\Volume{85315c9a-0000-0000-0000-d01200000000}\$SysReset\Logs\SessionID.xml

                                  Filesize

                                  106B

                                  MD5

                                  f3e7834ad38ef667dbc2dc7351de4c05

                                  SHA1

                                  84c91c557e081ec4cee157fe532d24563432e166

                                  SHA256

                                  ae63447a09b6822cd0fdda61b1bdd61fae689c18bf782a563365295556f8a16c

                                  SHA512

                                  6cfd8cb0520dc3d2ef1e495361a4d9da3b1cc1f324b494541cf1e67f835a9fc8e09cdf31c7a2019d54c907df2d99a53ce87117b01589acf610e31b9276dce30b

                                • \??\Volume{85315c9a-0000-0000-0000-d01200000000}\$SysReset\Logs\Timestamp.xml

                                  Filesize

                                  42B

                                  MD5

                                  bd8e2cd1c8323cf7553bb74f1a6ccb1d

                                  SHA1

                                  f2df1fd76ac9eccf151d3f2c8b7b1b27c06fe0a8

                                  SHA256

                                  e5a8446ee1a151a5a3759b6a50bad144104bcec6de61a52ceb7cc1d78fdcfec3

                                  SHA512

                                  f105932bb6f6ea7b3aed057723d1288f4ad4b1e58746720d45560c8329d697e1472d00f024adc4767a28011b8ed9f31b9514d6264168825ad62035b607215b1f

                                • \??\Volume{85315c9a-0000-0000-0000-d01200000000}\$SysReset\Logs\Timestamp.xml

                                  Filesize

                                  39B

                                  MD5

                                  1c9b0edcbab127a479d9c7dcfb92ce80

                                  SHA1

                                  73257f673fdc90c4c81251ad57a5ac4640d213f0

                                  SHA256

                                  8419261968eebcf25e05165e198ac9cd55fbf8c50044bf7a40e0a6f12688df92

                                  SHA512

                                  aac0bfb478264dee146b9455ce8ea9ee6580da984fb1d4d476e2abacc85b294eba07042e02f8bccf198b0f578d21364b87fca2c8c8f56f58dfef975bcf409edb

                                • \??\Volume{85315c9a-0000-0000-0000-d01200000000}\$SysReset\Logs\Timestamp.xml

                                  Filesize

                                  39B

                                  MD5

                                  9430a74dd0588033460b398e41a3ec84

                                  SHA1

                                  a5f67cc04cf9aaaed9b2a17ea60fdb57dbba3677

                                  SHA256

                                  0ba5c864199379bbf62f13735c5adfb6a9fa4c3e292b0d739f9d01404ab5f296

                                  SHA512

                                  7dc65da0e079a18a9f242ff6990e2ba1c4039218836e47861c2c126c442f7fd20673e4503a1fcee3816dfe6807c45578a9ad9595ddc8897faa633b1b6c62aa3c

                                • \??\Volume{85315c9a-0000-0000-0000-d01200000000}\$SysReset\Logs\setupact.log

                                  Filesize

                                  22KB

                                  MD5

                                  37a9c84b2632479ca5a76d086fcf1049

                                  SHA1

                                  2160999da99bca576c9236ddde47c0f531cb399e

                                  SHA256

                                  7e7bf438ef2ddcee29a369dcb213aa755462bd8ef47bd3ad115965d9ebd99a35

                                  SHA512

                                  47b9debf72ad40c1440c3a6f01e37d5c8aa3382d573d20e79c702874697f1c550965baac15a053dfa5c5b88b2959a600b7769a97106780e81ece44969f1be28d

                                • \??\Volume{85315c9a-0000-0000-0000-d01200000000}\$SysReset\Logs\setuperr.log

                                  Filesize

                                  984B

                                  MD5

                                  10388dd7bc88dd6c42ead65b342483d5

                                  SHA1

                                  a967226d3e5cbe2a54ef212c578a8a11e0f31ee2

                                  SHA256

                                  4701d2ba4002b9d0cd9b3e5e1f5e23aa69f6e866828c4593e388d41ec5e51a97

                                  SHA512

                                  d3e096a9e015a2a53a95fa61c1b7eb24feec48b12ebb3cf93060e695dcabbc0bb72a55abf3ece984ab975189613d25a467ad43c852f23b391c0a7f376a392247

                                • \??\Volume{85315c9a-0000-0000-0000-d01200000000}\$SysReset\Scratch\csrss.exe

                                  Filesize

                                  36KB

                                  MD5

                                  01cde2d68d2b5b8c5f8eb4e9829d28fc

                                  SHA1

                                  c0fd59fe9ea60d0d28b0cc6cff1baf2abf809979

                                  SHA256

                                  2e4f398084f26185b89e9d0cd89f1f0faf603a2f1c44ddca3adef321a15af621

                                  SHA512

                                  3eeef8bec1efddc8da2f1a7396a25a2ef304f8cdc0fbbe1adb80abc3223387e283816713a968e532b30e68564570e58362823a34212f897f746c449fb1680a64