Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 06:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://auto-downloads.com/173167d6803b17c99f5e26cec1075a169074116a66bf5211d31fa6292a3f8a5330cdfc2e2515b54111323d80172fc6164ff0ce3ed5ea423a
Resource
win10v2004-20241007-en
General
-
Target
https://auto-downloads.com/173167d6803b17c99f5e26cec1075a169074116a66bf5211d31fa6292a3f8a5330cdfc2e2515b54111323d80172fc6164ff0ce3ed5ea423a
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\7-Zip\Lang\tt.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\af.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\7-zip.dll msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\bg.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\sr-spc.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\fy.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\lij.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\nl.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ro.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\nn.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ta.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\lv.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\sa.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\sq.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ug.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\th.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\da.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\es.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\is.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ka.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ms.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\7z.dll msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\kab.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\mr.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\gu.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\sv.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\tr.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ku.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\an.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\eo.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\it.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\kk.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\pl.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\he.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\mng.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\sk.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\io.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\mng2.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\en.ttt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\lt.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\mk.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\nb.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\va.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\vi.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\az.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\hy.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\kaa.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ko.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\readme.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\uz-cyrl.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\si.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\hi.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\sl.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\zh-cn.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\License.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\cy.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\pa-in.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\sr-spl.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\7zFM.exe msiexec.exe File created C:\Program Files (x86)\7-Zip\7z.sfx msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\ca.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\el.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\Lang\et.txt msiexec.exe File created C:\Program Files (x86)\7-Zip\7z.exe msiexec.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI7133.tmp msiexec.exe File created C:\Windows\Installer\e58704d.msi msiexec.exe File created C:\Windows\Installer\e587049.msi msiexec.exe File opened for modification C:\Windows\Installer\e587049.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{23170F69-40C1-2701-2401-000001000000} msiexec.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133730155598226227" chrome.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe -
Modifies registry class 38 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\Downloads\\" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Folder\shellex\ContextMenuHandlers\7-Zip msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Drive\shellex\DragDropHandlers\7-Zip msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\96F071321C0410724210000010000000\LanguageFiles = "Complete" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\96F071321C0410724210000010000000\Complete msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\SourceList msiexec.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\96F071321C0410720000000040000000\96F071321C0410724210000010000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\PackageCode = "96F071321C0410724210000020000000" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\Version = "402718720" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\*\shellex\ContextMenuHandlers\7-Zip msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Directory\shellex\DragDropHandlers\7-Zip msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\96F071321C0410724210000010000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\96F071321C0410724210000010000000\Program = "Complete" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\SourceList\PackageName = "7z2401.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files (x86)\\7-Zip\\7-zip.dll" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\SourceList\Media\1 = ";" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\InstanceType = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\96F071321C0410720000000040000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\SourceList\Net\1 = "C:\\Users\\Admin\\Downloads\\" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Directory\shellex\ContextMenuHandlers\7-Zip msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\ProductName = "7-Zip 24.01" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\96F071321C0410724210000010000000\Assignment = "1" msiexec.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1336 chrome.exe 1336 chrome.exe 5008 msiexec.exe 5008 msiexec.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 1336 chrome.exe Token: SeCreatePagefilePrivilege 1336 chrome.exe Token: SeShutdownPrivilege 4532 msiexec.exe Token: SeIncreaseQuotaPrivilege 4532 msiexec.exe Token: SeSecurityPrivilege 5008 msiexec.exe Token: SeCreateTokenPrivilege 4532 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4532 msiexec.exe Token: SeLockMemoryPrivilege 4532 msiexec.exe Token: SeIncreaseQuotaPrivilege 4532 msiexec.exe Token: SeMachineAccountPrivilege 4532 msiexec.exe Token: SeTcbPrivilege 4532 msiexec.exe Token: SeSecurityPrivilege 4532 msiexec.exe Token: SeTakeOwnershipPrivilege 4532 msiexec.exe Token: SeLoadDriverPrivilege 4532 msiexec.exe -
Suspicious use of FindShellTrayWindow 55 IoCs
pid Process 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 4532 msiexec.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 4532 msiexec.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe 1336 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1336 wrote to memory of 4324 1336 chrome.exe 83 PID 1336 wrote to memory of 4324 1336 chrome.exe 83 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 5100 1336 chrome.exe 85 PID 1336 wrote to memory of 3748 1336 chrome.exe 86 PID 1336 wrote to memory of 3748 1336 chrome.exe 86 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 PID 1336 wrote to memory of 1764 1336 chrome.exe 87 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://auto-downloads.com/173167d6803b17c99f5e26cec1075a169074116a66bf5211d31fa6292a3f8a5330cdfc2e2515b54111323d80172fc6164ff0ce3ed5ea423a1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9a552cc40,0x7ff9a552cc4c,0x7ff9a552cc582⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1884,i,16042242205774443822,5677089460149685401,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1880 /prefetch:22⤵PID:5100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2132,i,16042242205774443822,5677089460149685401,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2168 /prefetch:32⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,16042242205774443822,5677089460149685401,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2396 /prefetch:82⤵PID:1764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,16042242205774443822,5677089460149685401,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:3864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,16042242205774443822,5677089460149685401,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4584,i,16042242205774443822,5677089460149685401,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4604 /prefetch:82⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3800,i,16042242205774443822,5677089460149685401,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4948,i,16042242205774443822,5677089460149685401,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4012,i,16042242205774443822,5677089460149685401,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5412 /prefetch:82⤵PID:1652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3216,i,16042242205774443822,5677089460149685401,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=724,i,16042242205774443822,5677089460149685401,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3228,i,16042242205774443822,5677089460149685401,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5144,i,16042242205774443822,5677089460149685401,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3360
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4356
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4084
-
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Downloads\7z2401.msi"1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4532
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:1224
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:3584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5028c35ea61b8e220b9433b8e76f3c07b
SHA147f64100e07adfd6978233a93860aaf7191ae996
SHA256014f77bb34ced2000449086de22213a5a344bd64f124e4f3717de541b0428d32
SHA5121bbec980e61d2e11a11248a98b4210eeb682e7d8deba9df523ba973c668b877ef236b2b168b58b35bbdbb714afd2cad1360bf8a5393550b6598e484aa31b928e
-
Filesize
144B
MD54d806aefde06fc4ecf004e97e00e7ce5
SHA1653dfe38115f3cc93d7500535237cbc753487b91
SHA256af6bb9f992c5af7d8f16f3c31ac56f714134a44b298f5a402a1438db3a24a08b
SHA5122711ac72146c35e981043afb3fea98fe4e1f8fc8a8540b731d3511ca009e8ce749df7e989b7cab38fc3f55f0482f6e5d6c4fb6b5b804b1f5da2d28349ea450fc
-
Filesize
3KB
MD584e5a0c813d173ff2cf28e2d1ee8a87b
SHA1c0c6ae51b9682eea5b3e86b96e5c25ea222c6c69
SHA25673d8b3da283550c0e2a31f8359a3c3c35ab1487f879b35123299c2a68a44856f
SHA512eb2db79e5d29d18b9f4212c525866cb02e161efc7045b25e26c4aab1d00428825a5a3722beb017d838fe4daf49e6dda6c0018c7b09de2f8c063330ba471c92b0
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
521B
MD5c22175a92d49e11344ce0f20ad46b43a
SHA105e9d5930d51b9a5a557780e70b15c068695e4d2
SHA256b19a362b42b1fafac04f608ff6849deccbdc98b38d612d9da11317c1cfb249d8
SHA51261f434befb7ddaafbfa1c5b528f5f67948a14091c60644afda03cdc49be58808ad83058c288ddc6f0dc3362ce4b349070aad33e197ff8d997111c66048dcfd92
-
Filesize
8KB
MD53244cb0fa8696732b485f323cae01698
SHA1ff69390bdba344d5917c8ec013a43954a1768f96
SHA25638e0adf820647ef5a9e5e9b41dcb14936c4c7801c1d507e794b40da4813e00eb
SHA512a67eae33c5cdc45957a33371c391bc7614fcbbb179ec981580bffbfa9e1391c1e109102119fe5b8070e74526572b7d41530522151a65bb3c5b9bd90081c39cca
-
Filesize
9KB
MD59ffb7eb3f0caacc244b68e96daf6d2ff
SHA16c9ea29d388ffce62cd290d0d20f45ce1ee93512
SHA256fb049706c100f50fe6d7bf52f6befefe7472cde4042f0c559962403d9413230b
SHA51202d3ed9679ee9d58c59132382a5b0122883a975b5221ee6b830830c06fa06906ccfef2d32aaddb60593c63eed67c8706ef094a361c447d272890c12fdc51d221
-
Filesize
8KB
MD57e1239f95fe6fdb02559822432e79329
SHA1a38edf2a83b0a44a0e8e267b17dfa76eec669120
SHA256bf890f52b487e717721b68e7ac44abc8aba6de1a9690c6183eff8e77481b5728
SHA512959eec625c2070217a32c2c09d6782ad4eb7f1d0875d50ef91066eb3eebec0677af2083cb587456aa43b87bb24e0263e9e1238a02b02e2bc9a11d44276a76a98
-
Filesize
9KB
MD530902003b4874910bbbc32035647ba53
SHA12f060ac35b6d795dfe020744e9f966c62324ee8f
SHA2565612785bf544fb11993a685c4fc6c00a08d74f38021c68bd1b9c8d478f497d54
SHA5123568f04efb148d3997bd9e88a5aedf9d2b7f4f00cf4909926c3046c7df19c38863750e43062e408acc038c415c115503f400df4c12e48d22473c4f696887afd6
-
Filesize
9KB
MD53b26f335631fbf53573bc031b03b8221
SHA1cb7aa004bde2a311ea7c1600b0d4f0ab97c1e6b4
SHA256f2eb9837ea8a614758d688d8c7b197dac991b2fbe0e2f456adba8f239c3be635
SHA512ad0461e34fc4a073615d4fe12f123b2a56bd52d167b7523095eb7913c4ed81937a46636e250348a4a73f9064590e76dfd6845641d4c5c439409b30d275655bc3
-
Filesize
9KB
MD544fcab4ccbce49d17a8fad0a1feac0d5
SHA1531953e17ad105a081c1ed4019252d857181004f
SHA25624c65253801ecb83fcddad62b5b2d11d86688364c57a34ab0767bebee8c20878
SHA512d039bfa5d7a5947305f107331f705f97159f69d00221b37e69e0a0dd46f08b76150462a1489443395267f680a88828296e51f9b1cba9237b844644e32ce8798a
-
Filesize
9KB
MD59a21648c6cb3f25994428df492cf443f
SHA1a0cc6362d02b6c1073a6df9171b5e4b3d336d4b0
SHA2562741587ffb8101667d2496c363d0002abb3dc0ed6236a61ee9cd4d16b2107db1
SHA512f13fa51831afa70f70acaed0f78470cbc14c705b5c941efe1f9cb62c5b1f73cadadc8877013c19615a5151bce5fd170e98c2260b60687043672359ad75aaf84b
-
Filesize
116KB
MD5d2448e5bc684b4a3e91da1f7ba2cbe86
SHA1a3ff07b89fb5cbbbdeedd02f28bdf0c52e563485
SHA256f42c69a490e8276449d2fdc3f7cac4411c03967009955dffe1bb5d581e26fcaf
SHA5126e880860b0b647196e68b4075ab883fed3b9068ab6354e506317f6f8bb48ec51b300323e292eaa95ae22a67260362abe9deed6ae188dccb4770fd3617bfcb3d5
-
Filesize
116KB
MD54a61809efe0c90cb38f16d77429c7a62
SHA14ff5c02d8402fdde279fedd69cfbadff558ed549
SHA2563aa89f0155977d2dd7e7dba0ca6c92ab3d4db6aeebb8844298749f707295b0fd
SHA512b0820b70522977476b63371e3efb1885e6ef43e42e1c32c021215925a2ae0f2a655012f0a1316dbf53ed64fde2bfc90130eff4e52a8286fbfb25adad3edb7b7c
-
Filesize
116KB
MD527844def2355444088cdde904b84a2cd
SHA19aa941bf1e6b2810531f668b8730a6c2b194524a
SHA2563f24ed988d94c236d27ed1066f738c292a5adc39103b3b2d31932a39c399aee5
SHA512af0bc0a6164513404907724dcbcc3e2b5f7c1efa3a84992e445576383cf0f2ca67252f3d0ff0cb345836a11262d1d27b6a68b8dd8e0fae903584ad80062244e0
-
Filesize
116KB
MD5c3834cce94a1620a86eaae67f64c9fdc
SHA17c4bc5f81e318e61aec3a018ef71da7dfecd730d
SHA25650f7bc3af9d8cb62e1e2bd3f32ab605c0340ede9c60511eb300f571047654794
SHA5123a1a892dce334a615ac1976b048524063009126e2589078d0e9fc4bd6a78c313ec1df863e39b29065b16db30c2cdad9ed0e76a52ae5654324492d15482beddc6
-
Filesize
1.4MB
MD5a141303fe3fd74208c1c8a1121a7f67d
SHA1b55c286e80a9e128fbf615da63169162c08aef94
SHA2561c3c3560906974161f25f5f81de4620787b55ca76002ac3c4fc846d57a06df99
SHA5122323c292bfa7ea712d39a4d33cdd19563dd073fee6c684d02e7e931abe72af92f85e5bf8bff7c647e4fcdc522b148e9b8d1dd43a9d37c73c0ae86d5efb1885c8
-
Filesize
24.1MB
MD52e4e0173e8db86d1dc30079caef0724e
SHA195ee73f2f8b4568ac7cabb6fb14396261c0d0d6d
SHA256ee81792b2832da23420514eb890f35838c8f461979ddb3447df42d44af18cfa9
SHA512de81c835204c061540db036e83a903057d97edf863f169d4601884a419a312705ae77483c2d8c0a2a636c1be3af56276eb9e217f3167f8ff07e12ef76a6190b3
-
\??\Volume{625ed6c4-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{c6cec9d9-76f9-4a14-b42e-04f161f0c92c}_OnDiskSnapshotProp
Filesize6KB
MD5bea8095e47611a87e35a7aa3fd222a61
SHA1d5e8a61a3aaadd9cb901b2eea64c55d5187c1bdc
SHA25680f5a643b43dcad1ba51490dbe2da34f9f6f40d3ee94c5b645f0fa325ab36de8
SHA512681d6bdfe2a1ac845b0a2d8448e0e05feb7b2f4efa2c47c9e46011948cab62356087ffb742989633d59180a69e1fffc12be72dfaa752e2fbd6eeacbc764e4d02