Analysis
-
max time kernel
85s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 02:38
Static task
static1
Behavioral task
behavioral1
Sample
693ff5db0a085db5094bb96cd4c0ce1d1d3fdc2fbf6b92c32836f3e61a089e7a.msi
Resource
win7-20231129-en
General
-
Target
693ff5db0a085db5094bb96cd4c0ce1d1d3fdc2fbf6b92c32836f3e61a089e7a.msi
-
Size
5.8MB
-
MD5
9c02a9298b97fcfc5a75fbedf08002bd
-
SHA1
2d3bc2856c015914f2856331a0315298f3c34b0c
-
SHA256
693ff5db0a085db5094bb96cd4c0ce1d1d3fdc2fbf6b92c32836f3e61a089e7a
-
SHA512
fafe5dddb610068cb1044c803a6d681d1739904d8e0c4b2b0fc05bcd55cf9344f69e77c8627ae73713f759117d81a78855ff937ee8650b47ab18d37cb9ca34bc
-
SSDEEP
49152:ppUP3UhtSTK+0THkWsN8SDYdvH5eoQDWhbHHhZgWEF94FJy5jvrgFdbBUleY82cp:pp6nFDkEWoyvy5jvcdbBUkYC+XCFmpC
Malware Config
Signatures
-
Detect DarkGate stealer 2 IoCs
resource yara_rule behavioral2/memory/3048-105-0x0000000005D10000-0x000000000606C000-memory.dmp family_darkgate_v6 behavioral2/memory/3048-106-0x0000000005D10000-0x000000000606C000-memory.dmp family_darkgate_v6 -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 1256 ICACLS.EXE 1008 ICACLS.EXE -
Blocklisted process makes network request 3 IoCs
flow pid Process 4 1616 msiexec.exe 6 1616 msiexec.exe 8 1616 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe -
Drops file in Windows directory 9 IoCs
description ioc Process File opened for modification C:\Windows\Installer\e57effd.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\SourceHash{8F7994CB-D53E-4E42-B335-CF29C4D0CA5C} msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIF194.tmp msiexec.exe File opened for modification C:\Windows\LOGS\DPX\setupact.log EXPAND.EXE File opened for modification C:\Windows\LOGS\DPX\setuperr.log EXPAND.EXE File created C:\Windows\Installer\e57effd.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe -
Executes dropped EXE 2 IoCs
pid Process 4556 iTunesHelper.exe 3048 Autoit3.exe -
Loads dropped DLL 2 IoCs
pid Process 3652 MsiExec.exe 4556 iTunesHelper.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 00000000040000006c2b12180e4adb550000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000c01200000000ffffffff0000000027010100000800006c2b12180000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d01200000000000020ed3a000000ffffffff0000000007000100006809006c2b1218000000000000d012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ff3a0000000000000005000000ffffffff000000000700010000f87f1d6c2b1218000000000000f0ff3a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000006c2b121800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Autoit3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Autoit3.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4168 msiexec.exe 4168 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 49 IoCs
description pid Process Token: SeShutdownPrivilege 1616 msiexec.exe Token: SeIncreaseQuotaPrivilege 1616 msiexec.exe Token: SeSecurityPrivilege 4168 msiexec.exe Token: SeCreateTokenPrivilege 1616 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1616 msiexec.exe Token: SeLockMemoryPrivilege 1616 msiexec.exe Token: SeIncreaseQuotaPrivilege 1616 msiexec.exe Token: SeMachineAccountPrivilege 1616 msiexec.exe Token: SeTcbPrivilege 1616 msiexec.exe Token: SeSecurityPrivilege 1616 msiexec.exe Token: SeTakeOwnershipPrivilege 1616 msiexec.exe Token: SeLoadDriverPrivilege 1616 msiexec.exe Token: SeSystemProfilePrivilege 1616 msiexec.exe Token: SeSystemtimePrivilege 1616 msiexec.exe Token: SeProfSingleProcessPrivilege 1616 msiexec.exe Token: SeIncBasePriorityPrivilege 1616 msiexec.exe Token: SeCreatePagefilePrivilege 1616 msiexec.exe Token: SeCreatePermanentPrivilege 1616 msiexec.exe Token: SeBackupPrivilege 1616 msiexec.exe Token: SeRestorePrivilege 1616 msiexec.exe Token: SeShutdownPrivilege 1616 msiexec.exe Token: SeDebugPrivilege 1616 msiexec.exe Token: SeAuditPrivilege 1616 msiexec.exe Token: SeSystemEnvironmentPrivilege 1616 msiexec.exe Token: SeChangeNotifyPrivilege 1616 msiexec.exe Token: SeRemoteShutdownPrivilege 1616 msiexec.exe Token: SeUndockPrivilege 1616 msiexec.exe Token: SeSyncAgentPrivilege 1616 msiexec.exe Token: SeEnableDelegationPrivilege 1616 msiexec.exe Token: SeManageVolumePrivilege 1616 msiexec.exe Token: SeImpersonatePrivilege 1616 msiexec.exe Token: SeCreateGlobalPrivilege 1616 msiexec.exe Token: SeBackupPrivilege 3992 vssvc.exe Token: SeRestorePrivilege 3992 vssvc.exe Token: SeAuditPrivilege 3992 vssvc.exe Token: SeBackupPrivilege 4168 msiexec.exe Token: SeRestorePrivilege 4168 msiexec.exe Token: SeRestorePrivilege 4168 msiexec.exe Token: SeTakeOwnershipPrivilege 4168 msiexec.exe Token: SeRestorePrivilege 4168 msiexec.exe Token: SeTakeOwnershipPrivilege 4168 msiexec.exe Token: SeBackupPrivilege 4420 srtasks.exe Token: SeRestorePrivilege 4420 srtasks.exe Token: SeSecurityPrivilege 4420 srtasks.exe Token: SeTakeOwnershipPrivilege 4420 srtasks.exe Token: SeBackupPrivilege 4420 srtasks.exe Token: SeRestorePrivilege 4420 srtasks.exe Token: SeSecurityPrivilege 4420 srtasks.exe Token: SeTakeOwnershipPrivilege 4420 srtasks.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1616 msiexec.exe 1616 msiexec.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4168 wrote to memory of 4420 4168 msiexec.exe 96 PID 4168 wrote to memory of 4420 4168 msiexec.exe 96 PID 4168 wrote to memory of 3652 4168 msiexec.exe 98 PID 4168 wrote to memory of 3652 4168 msiexec.exe 98 PID 4168 wrote to memory of 3652 4168 msiexec.exe 98 PID 3652 wrote to memory of 1008 3652 MsiExec.exe 99 PID 3652 wrote to memory of 1008 3652 MsiExec.exe 99 PID 3652 wrote to memory of 1008 3652 MsiExec.exe 99 PID 3652 wrote to memory of 1508 3652 MsiExec.exe 101 PID 3652 wrote to memory of 1508 3652 MsiExec.exe 101 PID 3652 wrote to memory of 1508 3652 MsiExec.exe 101 PID 3652 wrote to memory of 4556 3652 MsiExec.exe 103 PID 3652 wrote to memory of 4556 3652 MsiExec.exe 103 PID 4556 wrote to memory of 3048 4556 iTunesHelper.exe 104 PID 4556 wrote to memory of 3048 4556 iTunesHelper.exe 104 PID 4556 wrote to memory of 3048 4556 iTunesHelper.exe 104 PID 3652 wrote to memory of 2396 3652 MsiExec.exe 108 PID 3652 wrote to memory of 2396 3652 MsiExec.exe 108 PID 3652 wrote to memory of 2396 3652 MsiExec.exe 108 PID 3652 wrote to memory of 1256 3652 MsiExec.exe 110 PID 3652 wrote to memory of 1256 3652 MsiExec.exe 110 PID 3652 wrote to memory of 1256 3652 MsiExec.exe 110 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\693ff5db0a085db5094bb96cd4c0ce1d1d3fdc2fbf6b92c32836f3e61a089e7a.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1616
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
- Suspicious use of AdjustPrivilegeToken
PID:4420
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 587EA8C1BB4D109484E83831C42FED582⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\ICACLS.EXE"C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-1ec00e58-b78d-4a20-bb94-6863082dbc2c\." /SETINTEGRITYLEVEL (CI)(OI)HIGH3⤵
- Modifies file permissions
PID:1008
-
-
C:\Windows\SysWOW64\EXPAND.EXE"C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files3⤵
- Drops file in Windows directory
PID:1508
-
-
C:\Users\Admin\AppData\Local\Temp\MW-1ec00e58-b78d-4a20-bb94-6863082dbc2c\files\iTunesHelper.exe"C:\Users\Admin\AppData\Local\Temp\MW-1ec00e58-b78d-4a20-bb94-6863082dbc2c\files\iTunesHelper.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4556 -
\??\c:\temp\Autoit3.exe"c:\temp\Autoit3.exe" c:\temp\script.a3x4⤵
- Executes dropped EXE
- Checks processor information in registry
PID:3048
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c rd /s /q "C:\Users\Admin\AppData\Local\Temp\MW-1ec00e58-b78d-4a20-bb94-6863082dbc2c\files"3⤵PID:2396
-
-
C:\Windows\SysWOW64\ICACLS.EXE"C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-1ec00e58-b78d-4a20-bb94-6863082dbc2c\." /SETINTEGRITYLEVEL (CI)(OI)LOW3⤵
- Modifies file permissions
PID:1256
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:3992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\357F04AD41BCF5FE18FCB69F60C6680F_A55A1F98A2E2349B736808E9897028A5
Filesize1KB
MD5d8122b7238b377214a0a699eb8d9a2ea
SHA125284d30ae60e1f98c87b1e079f12546710c95e2
SHA256595ee0bb73832a27c34b4e0c67dd3395fc54ec7e4f982f14e8557711940543a8
SHA5123faf35e0154045d78ae97ec4aff589e8182143c99625ee5ca26071c188afa19809c428c9df3cdca03ca0c2a59d41ff8fc500116184923a622a2bed92657cf1d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E
Filesize1KB
MD5cacbd2c04f02598b6a3cc2f663186c89
SHA1a6b73ab848745a233b5d10897a78f6ad44cb48c1
SHA256625ae74d2775d7a8c29876ad17760e72674e8e94576b8ba2a34cf9c14cac0b6d
SHA512ccefec6f936f918487ad3a721c4d962172ac1f428b2d42a657c7523b05247937aff5953caba5f4e6c6b2a0db4fc077c637ddbb4d1b347492d2c8a5d298d2ca6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\357F04AD41BCF5FE18FCB69F60C6680F_A55A1F98A2E2349B736808E9897028A5
Filesize540B
MD529c41ccc4745af5db025ca955b453a68
SHA10fb9354f2eba97dfd50d262f6c03a785387741cd
SHA25636923feef7226e88b22977ed4e8e86f375b87a6f49ead6ad2313e7f81417f1b5
SHA512b55fb3c803fd60553471b21aeb966f4697b539d58b546bb490e24f02679dae42a44f90a4bbc85e9dda1c8bbd50517eba35b471f1d39c30f08d2c72841a2e3f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9CB4373A4252DE8D2212929836304EC5_1AB74AA2E3A56E1B8AD8D3FEC287554E
Filesize536B
MD53c2d505f5fcddbe0fa936504fa73e66a
SHA102d3d0bf65fb76eabae2c08b3483d59117cd7470
SHA256c4354de41213f7f3aa80ddf78d34cd9baa7e90870e3e6f432c56f45d8af0f911
SHA512f7201f3921e5b9b6034760ab5fafc5650b6c831c1c95f8d8932ce128b370339ee99315444b27b9d77373ca2c9199c3786423a6742820edf7f56048eed058ea01
-
Filesize
5.6MB
MD5a6f0fa38c1ef89290ee787f7577993ad
SHA11b03510e8c5a1a3c976086327ebab3c8acc19550
SHA256599ab65935afd40c3bc7f1734cbb8f3c8c7b4b16333b994472f34585ebebe882
SHA5129040548c6937e93168e57c1b3d18c20d21702d9632096191bab84929f18de0bce4cc31bb0f178b9d34f9259e6176bc4a8d5b86fe21ceec0b5a24ea2809acc68c
-
Filesize
256KB
MD55f50d4cf5edb3e993db5380cc2bb0217
SHA1cc28659f7fd91016d7bec9e73b32732234772cb7
SHA2562b634a02f8b39a1b27f93b5c7bb924213a60443635ae5c47d44f2a4ef0d42691
SHA512053bcddcc7496b07896dddebbba5416e3a84233053e0239fd6cbd6eb23b5d69e54eb478f37650c4a514e3d411afa872621f4f27adb9bd418022b86dfa251d51f
-
Filesize
960KB
MD51d6f182897b9482b9181e69ee8a8ca9a
SHA183622bfb2fd1fda2313af69c8feeaf38b0f7537a
SHA2562953ac88947cbe34909b728088cf84a52129060d16780d38efe24f163e418093
SHA5128381cb200cfacd5af95bec93a1b54e2de6c0c7b4a0531e2ae4f775b152efef6acd325e2c26b1eead96804df33cd1e71b1d4daa1306285b0be1ee998885ee9341
-
Filesize
358KB
MD5ed6a1c72a75dee15a6fa75873cd64975
SHA167a15ca72e3156f8be6c46391e184087e47f4a0d
SHA2560d8878cca08903777888b3681f90e4a07c7aef7d9600a67dfa985844d4bf5eda
SHA512256c2ebfeb42c2d3340d8bb423ef0ae48d5fb9fe5ca09c363595f51a03007482b67a777e4cae7a8194f69bc3a3fbcdb9abb5c9f92097925272431bb9d50f5c03
-
Filesize
1.6MB
MD50f64a8b96eee3823ec3a1bfe253e82be
SHA1e47acbb2fb97d05ce5222ba2737a5b0c0f039a0c
SHA25617158c1a804bbf073d7f0f64a9c974312b3967a43bdc029219ab62545b94e724
SHA5124d08d96bfe4ed497ca01d6f76acf1f5138d775b56556923b24e1e86cbd26fd54b6f517c8d3211b80332f90fe46cb77e347280636dc984ded2da8842aff9a5f43
-
Filesize
1KB
MD5638265d420a19b2024d0cb549b262bdd
SHA1b92ed85be12004150b6b70be2fd8542aa395146e
SHA256e70b2f5f9dd9a89c8ae5c9aa4fee1fc124020214e2581f11a99f666cf4b41a18
SHA512a8e72caf0472bae21ef4d1ca81315f0e86c0a248bf8998981bda6747c7957de4c7c571cee4808c99718312bd4bfe1c8053735cddb09bf24fc8927f6b61f1bc29
-
Filesize
1KB
MD524f2dd8f72fe05b6144c066aee7ffd78
SHA1d4795b66496beb183eb12e42cb720a59c3feae6e
SHA256dfb8aa369a4c784b4e994d443351a9cf2126d3911781afedceba7dd9da2f8c1c
SHA5122f3bb08eef3563e68f0015a2017de2b6a74049c7848dd6e4cc89155615132ac2d307f4f2cddb52a50801f01956b4868c2688503c559bdedf07fcac724e9ecefe
-
Filesize
208KB
MD5d82b3fb861129c5d71f0cd2874f97216
SHA1f3fe341d79224126e950d2691d574d147102b18d
SHA256107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c
SHA512244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
16.4MB
MD5f3cf91d49cd454f5abe2e5c1f565b32d
SHA1b32e91bce654a32c5c1cfea9e309ba9349573b14
SHA256cfb5ab18e54ae8b273cb53fd4e98a67d94d6cdb252b594fabac36ac66a0b90dd
SHA512c5a5bc4c31726fec972c89e47233675fddeeb5150b4efa403bcf4f7106c0ac5cac101fe15eabe74b00ef87a7ae6475e7dd718e0dd886c71cd4e27e5858644079
-
\??\Volume{18122b6c-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{bb23b548-8b0e-4260-9019-08d46f7d8cbf}_OnDiskSnapshotProp
Filesize6KB
MD589b51a8f2d218ea7cdd5e04f1c8fab3c
SHA133a1f5edb63449e4f31c37c17af60b192509b5dc
SHA256b16ace4844ab35f866759b81dff40744a1ae20536f513a3e0cc94046bd878a6e
SHA512044366ade893b339826416cdd9ff42381254953830a3d62605fac1add81c704c4fba41bd1bd4a118b240fd00e8a8f9f760d0c0874b60a7e74ea715c0739b36d1
-
Filesize
473KB
MD533ca8bc4ac593027fd3e83ba44be54fc
SHA107e2e129a5b0a694d38ac29bc21f74eda100519f
SHA2562296f929340976c680d199ce8e47bd7136d9f4c1f7abc9df79843e094f894236
SHA51205f6f03e69a7d31686f422e422d61161bde45173a6453fdf0392a7a084c9bd69c7c0ed11eb7a37281481eea14497e95c51dfaded21e2ff943fee3f371592db61
-
Filesize
76B
MD5e0cb113b19ce53ef7b72edbb0a4937dc
SHA12499a76ad9ec4a44571bfd8083e09b23373f9f69
SHA25603bed76f17b8574d05e84b81f81c09a33b1ae1555c2caf4783e059b689879ab6
SHA5120b046a6d16d22c0faa3eb729d9b74bfbc87f3cc847fd5ddfa89e573893d215841bae320f0697090b9a30778a07210929ac9c440fca884e920b369698d90a17ca