Resubmissions

05-02-2025 14:45

250205-r4w5kssngm 8

28-01-2025 13:04

250128-qa9cdayrhw 8

Analysis

  • max time kernel
    140s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-02-2025 14:45

General

  • Target

    VirtualBox-7.1.6-167084-Win.exe

  • Size

    117.3MB

  • MD5

    8addd310d09249bc176c9c891aae41cb

  • SHA1

    81212ad29642b2b261df42d25ccd23fe715914d1

  • SHA256

    35c42c98b784974a965c358a9bda63b6cb4edde80db83f87daa2fee83e6cfad6

  • SHA512

    b6126211ade8b38215ea70692af8cff5e47cb922484a3f08e377edf01a4a1d9b865772f4703d6914d779faba95eb46f16266e6f05411efba4691bc6f411d1d77

  • SSDEEP

    3145728:Zqar23mGGWtNN/fdSqyI/LUs5DuFsdOKtVeBi4g:82GGOFfAqyI/7FdUAT

Malware Config

Signatures

  • Drops file in Drivers directory 18 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 50 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 39 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\VirtualBox-7.1.6-167084-Win.exe
    "C:\Users\Admin\AppData\Local\Temp\VirtualBox-7.1.6-167084-Win.exe"
    1⤵
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3656
    • C:\Program Files\Oracle\VirtualBox\VirtualBox.exe
      "C:\Program Files\Oracle\VirtualBox\VirtualBox.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of FindShellTrayWindow
      PID:4216
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:212
    • C:\Windows\System32\MsiExec.exe
      C:\Windows\System32\MsiExec.exe -Embedding 3D9748717931144C9283A13717535DBE C
      2⤵
      • Loads dropped DLL
      PID:2320
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:2824
      • C:\Windows\System32\MsiExec.exe
        C:\Windows\System32\MsiExec.exe -Embedding 710E160B0F83F79499E404581A0A6B36
        2⤵
        • Drops file in Drivers directory
        • Drops file in Windows directory
        • Loads dropped DLL
        • Checks SCSI registry key(s)
        PID:2796
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 037CB014590464520B7634D2BF1F99C7
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:4640
      • C:\Windows\System32\MsiExec.exe
        C:\Windows\System32\MsiExec.exe -Embedding 4B74D0715E69BCAD61EA62E721042CE1 E Global\MSI0000
        2⤵
        • Drops file in Drivers directory
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Loads dropped DLL
        • Checks SCSI registry key(s)
        PID:4668
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 1EB49AC7DBBB48208D936CC74DE20064 M Global\MSI0000
        2⤵
        • System Location Discovery: System Language Discovery
        PID:4168
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Checks SCSI registry key(s)
      PID:4956
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
      1⤵
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of WriteProcessMemory
      PID:5116
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "1" "C:\Program Files\Oracle\VirtualBox\drivers\network\netlwf\VBoxNetLwf.inf" "9" "431e52bcb" "0000000000000148" "WinSta0\Default" "0000000000000150" "208" "C:\Program Files\Oracle\VirtualBox\drivers\network\netlwf"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:4224
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "1" "C:\Program Files\Oracle\VirtualBox\drivers\network\netadp6\VBoxNetAdp6.inf" "9" "473b17b7b" "0000000000000174" "WinSta0\Default" "0000000000000150" "208" "C:\Program Files\Oracle\VirtualBox\drivers\network\netadp6"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:4220
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{61f03951-2cd3-8549-bf17-11179b7751c0}\VBoxSup.inf" "9" "4edacf3f3" "000000000000015C" "WinSta0\Default" "0000000000000140" "208" "C:\Program Files\Oracle\VirtualBox\drivers\vboxsup"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:4628
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "8" "14" "C:\Windows\System32\DriverStore\FileRepository\vboxsup.inf_amd64_51feefe6fa2584ec\vboxsup.inf" "0" "4edacf3f3" "0000000000000140" "WinSta0\Default"
        2⤵
        • Drops file in Drivers directory
        • Drops file in Windows directory
        PID:1080
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{03d37116-ef56-4d49-947b-73f4dd8412a3}\VBoxUSB.inf" "9" "4f05f54f7" "0000000000000170" "WinSta0\Default" "000000000000015C" "208" "C:\Program Files\Oracle\VirtualBox\drivers\USB\device"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:5056
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{efcbfb9c-e245-ab49-afaf-2a7bafd0bc2a}\VBoxUSBMon.inf" "9" "4e4e9030b" "000000000000015C" "WinSta0\Default" "000000000000016C" "208" "C:\Program Files\Oracle\VirtualBox\drivers\USB\filter"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:3892
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "8" "14" "C:\Windows\System32\DriverStore\FileRepository\vboxusbmon.inf_amd64_92b271dae027ffef\vboxusbmon.inf" "0" "4e4e9030b" "000000000000016C" "WinSta0\Default"
        2⤵
        • Drops file in Drivers directory
        • Drops file in Windows directory
        PID:4704
    • C:\Program Files\Oracle\VirtualBox\VBoxSVC.exe
      "C:\Program Files\Oracle\VirtualBox\VBoxSVC.exe" -Embedding
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4928
    • C:\Program Files\Oracle\VirtualBox\VBoxSDS.exe
      "C:\Program Files\Oracle\VirtualBox\VBoxSDS.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1692

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Config.Msi\e58a92d.rbs

      Filesize

      722KB

      MD5

      cc2709fe2b77b312c31d3d053fa8d51a

      SHA1

      b5d24397f66cff0fec59e9c020f23660773d52cf

      SHA256

      7909fe5ae3157c822b543629743f8cd13cb5cf1cead47c1a756c590a5d0369e5

      SHA512

      6becbfaec9a3039876e80aa2715e1b6451e18e420e92c208e383ddccb4863f1e236069026c5b6195ce6cdae4b5dce38493a412a2d61d0e3bb3c4623a7cab0845

    • C:\PROGRA~1\Oracle\VIRTUA~1\drivers\network\netlwf\VBoxNetLwf.cat

      Filesize

      11KB

      MD5

      18fd2f2ce49c749c0c8d4ea321661715

      SHA1

      af7f728e0403c4ba63480bc8ddd55cb3c4ac5f1e

      SHA256

      96eb758ee44b13d5df932e176addfd42bfd1eb27aa7ddec5801fae07e9797a65

      SHA512

      14be128511b33fefda28d2d98fc522f6c85230369b14cf78046a566e8df73734a6971208226523da3eb6445c32db4a805b4819cc315655d0e8dc4b547842575e

    • C:\PROGRA~1\Oracle\VIRTUA~1\drivers\network\netlwf\VBoxNetLwf.sys

      Filesize

      250KB

      MD5

      10ed4a0f400f1db09e258c99939f15c7

      SHA1

      4ed115fb4bece2aaf9b0d724330811cd2c7878b2

      SHA256

      b7d5361a58530add79cdce5544f41190196ea7b16b32c889627e8b5a61be8483

      SHA512

      a573233ca92ff878f79261bf7ebc10def90c0995c46527a2f5f3791f5e48cf54158c07af1e0d969ba4d196f182126ca2e4c9ab5a1464e6974b279a6038102a6b

    • C:\PROGRA~1\Oracle\VIRTUA~1\drivers\vboxsup\VBoxSup.cat

      Filesize

      11KB

      MD5

      7d1841943d1f332eb32e49de47d62e03

      SHA1

      a4c445ac6247f7919ce9cebf2b543800970a5d81

      SHA256

      86d86beec055d6bfcaa0d4906a919cb21789e89375d7b50270f85b6b3b5f9a33

      SHA512

      c6574b411c255f97efa343d168ee45365ffab6e195087722398cd3693336f6ac44cfc7b51f1e6ed328c7091f9c7a311672613c158e8a3b28d6862c2002a7b681

    • C:\PROGRA~1\Oracle\VIRTUA~1\drivers\vboxsup\VBoxSup.sys

      Filesize

      1.0MB

      MD5

      9b7cdaa9dfa551282134f4e75074f702

      SHA1

      e05035fcfe2369000a0264ab1c7eac9c40ecbb5c

      SHA256

      decc9f7c751ded1aaddc3528dd545837a2a2994c415e983f30a6af1747ac3acf

      SHA512

      7da4fe862ce314548977672494391370045b80c6bd38f74f82e1f39a88143f93b36c1c06feeca4668a4e29ad60ff73e5f615fd61c6b514bdd902042ab7698af2

    • C:\Program Files\Oracle\VirtualBox\VBoxProxyStub.dll

      Filesize

      936KB

      MD5

      dea158fd47abc3d173f6d8de13971372

      SHA1

      d42cdc78678744d4b23c338fe81e327c1d4d4abf

      SHA256

      701332a337b452e64a56bd7e1a1d7c76eb8b7fb7f6f63f74413866b7e2113980

      SHA512

      11f96f77dee048cf7a487334607d517ed3cb7ea0314f4daf719e361d9c6d0bc09c827081cfb6bb6403ecc174e5e6f4201e47c6c4ff186028380e0ac8240ddefa

    • C:\Program Files\Oracle\VirtualBox\drivers\network\netlwf\VBoxNetLwf.inf

      Filesize

      4KB

      MD5

      7da30975a6c38e9a0fe9676950f70033

      SHA1

      d0134da02edaf78b60143d9d6a310ab97137b709

      SHA256

      aee3b03ca632f7985c71c56d747ed61d0a83e8250f72c4e3cecaca43d6262cdb

      SHA512

      2ab29cfa41572e3b94680a298248d8d459da50d7f136ec1885a092f8c6550a6fbc5c0e256bdf42285cd7d9234f015d2a577e90989e8eeaa8f4a2780d69c87f01

    • C:\Program Files\Oracle\VirtualBox\drivers\vboxsup\VBoxSup.inf

      Filesize

      2KB

      MD5

      59048a0500cb88084655b38de2a3097f

      SHA1

      014f0f333df2fac12045fb89ce1042f3352241c4

      SHA256

      c3c0f8172fee9aeeff7d4ac43af0b0b9357f2f119b53c70377f015168586c546

      SHA512

      cb596dc5048d09186b011ea4a314b7355c2191fff0cae929ebaa919294ed17041006ae575122d7191bfa3572c4da3f75e109d10cbc847e48121de0ef2761b9c0

    • C:\Program Files\Oracle\VirtualBox\x86\VBoxProxyStub-x86.dll

      Filesize

      684KB

      MD5

      a575376c0da3e58d68ddb30cf903af50

      SHA1

      5c82c307d82d57b51f365006b7935f952b0775b1

      SHA256

      ac2e8cda8c16350c20115774413245d2ef4fe2ee76aca73b2b3c47ad4add6116

      SHA512

      b16a1920b5c51df04e2adfeefbbdc523dfb99586a6e397c43f521fc7111b28416cb4b72052d00a7d2f6ea3f04ae6935f4536ba27a456dc714296940e2b557a2c

    • C:\Users\Admin\.VirtualBox\VirtualBox.xml

      Filesize

      1KB

      MD5

      d9d28bd2ef7192fb0efb99607d7a0807

      SHA1

      7fb6f32f1c0f227118613dd7779e1bf0a6e2ce4a

      SHA256

      dad710b076d96b3de34a58363a3241935bfe205b7240ce57f9d85bf2058e6dd5

      SHA512

      e058987d5fd8ea6cd3c3081c7ac45ce1e3719c4a38b46390133b19539fad35a0d8ad699023a3d934d18e3356cb6def62bd197b5a32ad496b620469c55d9efb13

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

      Filesize

      471B

      MD5

      42cff42b997443cb256b1289a350b1b6

      SHA1

      651afb301d9acc6d9c7306060597e6a5c30625fc

      SHA256

      5a0156e23df8fc05add3ecbdc44fb33b70d86fd08dcafad7fbb37b2107bb629a

      SHA512

      6e50f0b49cabdc45f4b1609a0d388d0c5c544bd3e957951f23637a3059da8500d7e1afe8e8b76d9bacdc2cbb6f7516d2bdbffc09a7e6fbe3a16c4d8100214cdd

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_D2F6556190F7B1A25A117FFB5467EEBD

      Filesize

      727B

      MD5

      30d135e2903facc564d175c2b6e4044c

      SHA1

      5db057c161190338ffae691542cabe047fdd37e8

      SHA256

      4344543735255f395138e70373d859469b598f3c599c350249f9128dd81d812d

      SHA512

      df6337142a1187e0a049aa5866303783395d448aa6fa32fd3bddf07c23f01c343e361e81394ce36764b2e1e29b84e1a8b86068dd79a306180b77010c45176fd2

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

      Filesize

      727B

      MD5

      7ede1c2319349ee09eef9b918f848ee1

      SHA1

      907bc671d8865713c6c6758ab35d880bc195cd26

      SHA256

      0091300b2b650fad4fdf32c8681ca431aa280403bb7afec50e1e3b2232537c9e

      SHA512

      673710e89af144f22a6a69011341e48681cf2b46ec58fa7ceed13688f3dfa17e5c8ea9f8054cb99c054864ec980fa0acebdb480ce9abf4d1d7a8ec46dcfb5866

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

      Filesize

      400B

      MD5

      d0906df8c15342312691ee417cfbdafd

      SHA1

      84eecedd9674479e335f80604980014d45e6325b

      SHA256

      6b7f881b55f8034d301b82d9b47b211998d31fc3b831aaada454e136552305e9

      SHA512

      388e6d2a7d86fe3416a2939c127705121393d069c5dd23b90a9d5777241977990eead55f32cf2b6ad7af74cbb4e9a76c0a22cd7c14503cd69363a355da987495

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_D2F6556190F7B1A25A117FFB5467EEBD

      Filesize

      412B

      MD5

      5d4b5b9738ae47e78a090daa467758dc

      SHA1

      150a86e547266ae98c7beb900c73e2e37957f214

      SHA256

      81c038d69ab38d346abb017579bfaa081f411c778df879c1065e12db74605b8e

      SHA512

      f601160e14c76e517ce6a72b7d8c96933f686e62ac947b98b3e5d6283cef3dbdc17c74b62b2e00f378a2aa8b24fd3c034a90d0762681fd7d4ce296a47c0f788e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

      Filesize

      412B

      MD5

      a17a1ed79f3b1c77d9cf830a92fad6b9

      SHA1

      3c239843aec0aa442548f5a5bbacdc6454b9a68a

      SHA256

      11bed63a0a4108d4419f637a4cdc149cdf3eeb714e04701b65592066239564e5

      SHA512

      9f8a5bb024065ab6bb19751ec8996411636347ac9bf612423431b2d79cf25bc9bb675871b4f13e31eadb0d29432c4a47271daa22ffa6183f8cdf0e16b5eb0d31

    • C:\Users\Admin\AppData\Local\Temp\MSICD81.tmp

      Filesize

      476KB

      MD5

      39f6c48493b5225bae95cdb52c8bf69d

      SHA1

      f54e11158d71068dc61f2c3c2a9db471ecdfcadd

      SHA256

      55dcfb4404fd2a7ce72dabc23d856f7529f7ed4359e1af19eca2619c2bf840cd

      SHA512

      0c5a07e45ba250e253e5ec3fb87c191e9de46027ee1f8ff5fae4be0a4c0e8a7aac48f64d6fb12dfbdd1b77ee93b5c6740e36a5a90e6ff817dd5f18e3fe3bdd6b

    • C:\Windows\INF\oem0.PNF

      Filesize

      5KB

      MD5

      b3deed40ed6d08faf1e6e916132d8cbc

      SHA1

      ceafad5e5efe6e7bdd4774bf29c8d798c0a009fb

      SHA256

      82a3baa29f6642b25ee4861eb6b5c2cbe1a0d5662e36f9ce0258e39b356af7b5

      SHA512

      93866998fb85888eaf56a58bc2feb62594f8c97165d9eb76a722a3d1213e2c557f26be8a137aeb4b75222b20ed40108cdd9b5ffa64e6733530cab30d10c1c858

    • C:\Windows\INF\oem1.PNF

      Filesize

      5KB

      MD5

      8c3637053f8befb090559e6ba3a8ab04

      SHA1

      7add574ce73653163634b92fc4a19cf6e25a78e5

      SHA256

      860fd78a1208e2d025c3d50051c0b7c4434da0aa1071d565fa8339719f2ac1be

      SHA512

      c904985e30e479cb3aadaa307636eba283b8b03a3b9cef2aade50192a27d3d8a7b834f7b1ea7337435d2d5746fc21fd35b2580130d5b3c693bb00ab92de0ca72

    • C:\Windows\INF\oem2.PNF

      Filesize

      6KB

      MD5

      e1581f0ad1dea661f9646714dff4ff2c

      SHA1

      4b23e612b2dd1dc04728a2dcbf0d63d7cb619fa4

      SHA256

      b388cbc536ccf163016472d30ee7f00e578d098840afa485cdb92f73e2f02b51

      SHA512

      f1fac5722e224446fc31138aa39eba5eb6108a99f1e8c6a61e53b7327002f78e6bec169ab989337b00da291ae6ac7362c9602b6cb6617b8abd8581a747cbd4d7

    • C:\Windows\INF\oem3.PNF

      Filesize

      9KB

      MD5

      079676a4a5661b8e6e7d6b1fa12b9e9d

      SHA1

      25c17963385f87bed5ecb9cac89dd67014c85910

      SHA256

      1e6d1f3d7a5aec3b2a8cb66cdc5e5e7ffe8b8788d4988eac9cf3d91a0af8e434

      SHA512

      963ec1d216e50cca4dda708377acf5f751c15a8ada41759b3eabc7e0843713315bccf26a86741a0b9bc3015684f040810cec445098eba034d8b42de7ffea233f

    • C:\Windows\Installer\MSIAE60.tmp

      Filesize

      330KB

      MD5

      ac831c25bc16a05ee60aea5d79517434

      SHA1

      4946133e7fac34315a0ccaa30ca8ad383d5f0140

      SHA256

      947f8fd98efb1986df32a9c179eccf720376721798cc15d4cf9e31cdb8324869

      SHA512

      72f625386a7af35b58bdb70f35b8a29cd06c091f04e4cc2f9c7ec1c1ec194e4fb120b5528b55ed589c9daa890c1bdf8762dce1e17dd69a77ec7a002d2685ba5b

    • C:\Windows\System32\CatRoot2\dberr.txt

      Filesize

      37KB

      MD5

      93a210c5aa2818d891894e4187023e02

      SHA1

      a3d1e09b4ba3acc086e45973d452e27b48c8f852

      SHA256

      cc0c166e2bb90801af7a82b2f6833760ef4fcbb85dd5af22157319cd15cc1340

      SHA512

      aadf19614099bb1ecc27c186c4a8ade4169aca27ced524635bc7fc53dd653b040a0114ca32065de6b780d0e60ee9062a083af674aa0ce8160fd393471c631eb6

    • C:\Windows\System32\DriverStore\Temp\{04809618-39a2-e645-b459-28e091371ec3}\SETF315.tmp

      Filesize

      11KB

      MD5

      27eefd6a4c376a709a16793b3cf420da

      SHA1

      a3465d24e915ef51ad758df74de6787bd16d5ea3

      SHA256

      6323642efc5be5973787e2ecaf8ec6e5e09d72a3ecdc2799f9b6c06841862d8c

      SHA512

      52a296b56c8fdc9c214d139b47e2ec2ebb7339ee88ca65daa236e088b4dbf3cae392b6e0dc6ea93a23f1877654d335650e03054b39de3692b9b60c46abdfbaff

    • C:\Windows\System32\DriverStore\Temp\{04809618-39a2-e645-b459-28e091371ec3}\SETF316.tmp

      Filesize

      2KB

      MD5

      b54fa51b12cfc7a9a54fe666b64b8ade

      SHA1

      e17673b6636138209d98953d1f6d56b701bc0ba5

      SHA256

      5b9f68c1a69270234873701f8ad50e60487ad5b3103f7bb1953d0363ffaf61f6

      SHA512

      f2347994eff841006fbad5dd603875444c13702392dc52f4fb05ee297faf3cf2c617bffa9245f99b28e50171825517af59b2b87014213abf3a80060e6714a40c

    • C:\Windows\System32\DriverStore\Temp\{04809618-39a2-e645-b459-28e091371ec3}\SETF327.tmp

      Filesize

      176KB

      MD5

      337251c0585346f48901de919f1758c1

      SHA1

      6acf0a827435716d2a464f21c57e51fbf68466f1

      SHA256

      5c750a8d786aad679c0e13934f07bd5cdbf5e5b7fb68a6d62a58967bcf2562e2

      SHA512

      ac565a4b8ef61b48c0ea7ac8f304a045fce6a925e5cacc3a03646ab41dbf910d58ae65e6c3df3b5d75df4d4efa7f1cc1bf03e48bc7bba5815a9e2690fd1ce2af

    • C:\Windows\System32\DriverStore\Temp\{122479e5-1da6-4440-95e0-15927bb05443}\SETF48C.tmp

      Filesize

      11KB

      MD5

      a707e21804161083d77a12b91d3059f9

      SHA1

      2bb2e03cf8b024133bb501b769ec128d24f49194

      SHA256

      2969d9aa44c08db04529ec043d9a8c9e47b68ece7aa51ab6cb78f1c514c9e843

      SHA512

      9233a827cadec4ec8b44b0b5ed3526f2f45391f07a15256d9f68f943378079311893257532fe6e1bdfeacc2014d8f110f33f1db199aad9bf4573ac0794587da3

    • C:\Windows\System32\DriverStore\Temp\{122479e5-1da6-4440-95e0-15927bb05443}\SETF48D.tmp

      Filesize

      2KB

      MD5

      7ad88778968e6768a71bf7dd65444c3c

      SHA1

      ec753a59e7c6482e8bb1e72e9c5b5424092c26d8

      SHA256

      db8c675f4a9837eadf86654d586f2afd2d44e31be12f5c5cec2754d424ebb6e0

      SHA512

      2339e015305d601077ea17e3bd9d2d2649d64de350436d99d5f1d2a3bda84bf7610fac278094c87b628e4f3c51fb516fdb8f09a274bd532734543cb0eea284b6

    • C:\Windows\System32\DriverStore\Temp\{122479e5-1da6-4440-95e0-15927bb05443}\SETF49E.tmp

      Filesize

      190KB

      MD5

      44a46b8f144a04e18d341b9ac239ff20

      SHA1

      9e911d62c66b8fedff0cf5a9a9684b2f87221f7d

      SHA256

      ebcaba012c908d5584579ba927d4e7dfb3be28d91d7c369a2473b393915e933d

      SHA512

      144d7c3b3f4c63f8f04f786ddc7d553b83808afef47a9628b5f67493950a42d020469c75d536c1214186daae34fdd437eb2a9f7a2214b0e434b6d8decd57c3dc

    • C:\Windows\System32\DriverStore\Temp\{5ec086a5-c875-2e41-8ab2-879d9d9040aa}\VBoxNetAdp6.cat

      Filesize

      11KB

      MD5

      0a751919ada4675a3347d8f45a174b77

      SHA1

      5ab33ad59706d0456a6396bbecbf5cab9e13138d

      SHA256

      f42b04be8a339a383dd01b640f0fa274e31c18a1c531287d5d9182b0dc56870b

      SHA512

      aa3bb2b0a258e716ff975ae56e4dd0b14ca1bc1a0c8f56598d448ac2b78fe2b91d9ed4c109e04956860919f624c845d348a03f8ee223f6b8a776e3e33a69a2d2

    • C:\Windows\System32\DriverStore\Temp\{5ec086a5-c875-2e41-8ab2-879d9d9040aa}\VBoxNetAdp6.inf

      Filesize

      3KB

      MD5

      7bd5968035e290fc975a3655d2a30c08

      SHA1

      f07a370d4734c9b332b35d26b4d16d7ae1ec17b6

      SHA256

      c1af8774a2b6c246a31b8c3f5185fff67a856c4f96d55c21b4d0587b34e4611b

      SHA512

      2da219b9fc716499b2d8fa62084c5039d61660bf4ea26e48599eb4d10d95b4ba408e8415a092307b5731cc1de9201bb000848f68d7e79f6b03da453e223253ac

    • C:\Windows\System32\DriverStore\Temp\{5ec086a5-c875-2e41-8ab2-879d9d9040aa}\VBoxNetAdp6.sys

      Filesize

      240KB

      MD5

      bb13c7ae29af3d73e2e2326bd37ef752

      SHA1

      d2b5617fe2f2de0831d2ad0f6301e5cb88851261

      SHA256

      755120e64cec6673bf8ad2ed0cfb031dd71a31ab8fc063c1b26cc3a8b9198857

      SHA512

      6aa2a7c483dd205a6d0f667a5249f7eb23b45ee760de009400c208e73c21feda8d94ca428e4922303727e735a0f6026ddfd02bc419f2f280e68f2b55a93acf82

    • C:\Windows\System32\catroot2\dberr.txt

      Filesize

      37KB

      MD5

      cc2573a0eb0830b67913ac6bacc8df29

      SHA1

      1e6bb36341ee1f86a9bc12a92859c852318ca4c1

      SHA256

      1f7dec70d9234ca1d293d038dbcdcd6a6573c785ba356345b3f28a2115477381

      SHA512

      47aee3021e373dd8e9da3fb4bf939984d4a7c168f271e72221da99a9e7326bcf748d1557580e935ea4564622a3d99bed06d967f8139fd46d75bba6a5d557f5b5

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      Filesize

      24.1MB

      MD5

      becfd5ae86260422fcfabe1af9dc5d49

      SHA1

      1a9ce8421cc52d3a16bbefaba49dc033fbeba411

      SHA256

      000feb7cb2ceb9a9b6b43eb5ca521aa08e899eb36a1bf88e1c174ce204cd09a9

      SHA512

      628a9ca850297a648cd99ba983dae0b4fdff5daf306a0a49862508b700dcd77729869429248a16e269af453ab4524f6bcd9fd5abb82acb5e0bd415c11672265f

    • \??\Volume{34ce0f29-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{fbabe41d-9009-495c-8db3-6f1103e158e6}_OnDiskSnapshotProp

      Filesize

      6KB

      MD5

      088fefdc691fa179d38b9de657fa88dd

      SHA1

      dec384e235263c56e2586288c534a8f4c2802132

      SHA256

      3902598ae0e843d8e3f158341da0075c22d098ed1b68f8034d0161df9ad8a725

      SHA512

      466487a3cb2318d1fc89f075937bb845e24e5a9a014ec1b98eb89ae0ce03f315d4003bfce047a181e5039c327b8f7b15f8ffae9940cdc781bfa91614611d3bae

    • memory/4216-657-0x00007FF7EC360000-0x00007FF7EC61A000-memory.dmp

      Filesize

      2.7MB

    • memory/4216-659-0x00007FFEA8FA0000-0x00007FFEA9561000-memory.dmp

      Filesize

      5.8MB

    • memory/4216-658-0x00007FFEAA3F0000-0x00007FFEABF3A000-memory.dmp

      Filesize

      27.3MB