Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 04:02
Static task
static1
Behavioral task
behavioral1
Sample
3CXDesktopApp-18.12.416.msi
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3CXDesktopApp-18.12.416.msi
Resource
win10v2004-20240611-en
General
-
Target
3CXDesktopApp-18.12.416.msi
-
Size
97.8MB
-
MD5
0eeb1c0133eb4d571178b2d9d14ce3e9
-
SHA1
bfecb8ce89a312d2ef4afc64a63847ae11c6f69e
-
SHA256
59e1edf4d82fae4978e97512b0331b7eb21dd4b838b850ba46794d9c7a2c0983
-
SHA512
85923f35da3638c9aefa152a0a6b7e8f2b8ec6aa6791b4d4a758c8899d04be25fb480253a9fbf27d9c108c6635347af2705d97d962faea497a6649f8b63ec2fc
-
SSDEEP
3145728:Ujlq80AfkRGgGGo4yrtD1PQLzth2TBcMa8uGj2A:8lqmijypD1YPthSkS
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3CXDesktopApp = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\3CXDesktopApp\\3CXDesktopApp.exe\" autoLaunch" msiexec.exe -
Blocklisted process makes network request 5 IoCs
flow pid Process 2 4364 msiexec.exe 4 4364 msiexec.exe 9 4364 msiexec.exe 15 4364 msiexec.exe 18 4364 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation 3CXDesktopApp.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation 3CXDesktopApp.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation 3CXDesktopApp.exe -
Drops file in Windows directory 16 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI8D63.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7DE0.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI783D.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI7D31.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI84E5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI86FA.tmp msiexec.exe File created C:\Windows\Installer\e57768a.msi msiexec.exe File opened for modification C:\Windows\Installer\e577688.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI7D10.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7D70.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI7DA0.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{92CE9437-646B-4297-919D-BB30B377A477} msiexec.exe File created C:\Windows\Installer\e577688.msi msiexec.exe -
Executes dropped EXE 9 IoCs
pid Process 2172 3CXDesktopApp.exe 3660 3CXDesktopApp.exe 644 3CXDesktopApp.exe 1156 3CXDesktopApp.exe 4328 3CXDesktopApp.exe 1940 3CXDesktopApp.exe 1984 3CXDesktopApp.exe 4500 3CXDesktopApp.exe 1296 3CXDesktopApp.exe -
Loads dropped DLL 23 IoCs
pid Process 4764 MsiExec.exe 3644 MsiExec.exe 4764 MsiExec.exe 4764 MsiExec.exe 3644 MsiExec.exe 4764 MsiExec.exe 3644 MsiExec.exe 4764 MsiExec.exe 3660 3CXDesktopApp.exe 3660 3CXDesktopApp.exe 644 3CXDesktopApp.exe 1156 3CXDesktopApp.exe 3660 3CXDesktopApp.exe 1156 3CXDesktopApp.exe 1156 3CXDesktopApp.exe 1156 3CXDesktopApp.exe 1156 3CXDesktopApp.exe 4328 3CXDesktopApp.exe 1940 3CXDesktopApp.exe 1984 3CXDesktopApp.exe 4500 3CXDesktopApp.exe 1296 3CXDesktopApp.exe 1296 3CXDesktopApp.exe -
Registers COM server for autorun 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\CLSID\{520AA812-396B-40DE-8ED1-0EDC70630DBE}\LocalServer32 3CXDesktopApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\CLSID\{520AA812-396B-40DE-8ED1-0EDC70630DBE}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\3CXDesktopApp\\app\\3CXDesktopApp.exe" 3CXDesktopApp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 000000000400000048edd825328814480000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000c01200000000ffffffff00000000270101000008000048edd8250000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d01200000000000020ed3a000000ffffffff00000000070001000068090048edd825000000000000d012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ff3a0000000000000005000000ffffffff000000000700010000f87f1d48edd825000000000000f0ff3a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000000000000000000048edd82500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Modifies registry class 51 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\3CXDesktopApp.tel msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\3CXDesktopApp.callto\shell\open\command msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\3CXDesktopApp.tcx+app msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\3CXDesktopApp.tcx+app\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\3CXDesktopApp\\3CXDesktopApp.exe\" \"%1\"" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\tcx+nav\shell\open\command 3CXDesktopApp.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\tcx+nav\shell\open 3CXDesktopApp.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\3CXDesktopApp.callto\DefaultIcon msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\callto\shell\open msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\callto\ = "URL:callto Protocol" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\CLSID\{520AA812-396B-40DE-8ED1-0EDC70630DBE}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\3CXDesktopApp\\app\\3CXDesktopApp.exe" 3CXDesktopApp.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-4204450073-1267028356-951339405-1000\{DE3DFC1E-0F51-410D-91B9-0AAC0E0C3F5F} 3CXDesktopApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\tcx+app\URL Protocol msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\tcx+app\DefaultIcon msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\callto msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\callto\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\3CXDesktopApp\\3CXDesktopApp.exe,1" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\3CXDesktopApp.tel\shell\open msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\tcx+app\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\3CXDesktopApp\\3CXDesktopApp.exe,1" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\tcx+nav 3CXDesktopApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\3CXDesktopApp.callto\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\3CXDesktopApp\\3CXDesktopApp.exe\" \"%1\"" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\tcx+nav\ = "URL:tcx+nav" 3CXDesktopApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\3CXDesktopApp.tel\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\3CXDesktopApp\\3CXDesktopApp.exe\" \"%1\"" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\tcx+app\ = "URL:tcx+app Protocol" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\tcx+app\shell\open\command msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\callto\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\3CXDesktopApp\\3CXDesktopApp.exe\" \"%1\"" msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\tcx+nav\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\3CXDesktopApp\\app\\3CXDesktopApp.exe\" \"%1\"" 3CXDesktopApp.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\3CXDesktopApp.callto\shell msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\3CXDesktopApp.tcx+app\shell msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\3CXDesktopApp.tel\DefaultIcon msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\tcx+app\shell msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\callto\shell msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\tcx+nav\URL Protocol 3CXDesktopApp.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\tcx+nav\shell 3CXDesktopApp.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\3CXDesktopApp.tel\shell msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\3CXDesktopApp.callto msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\3CXDesktopApp.callto\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\3CXDesktopApp\\3CXDesktopApp.exe,1" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\3CXDesktopApp.tcx+app\shell\open\command msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\3CXDesktopApp.tcx+app\shell\open msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\tcx+app\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Programs\\3CXDesktopApp\\3CXDesktopApp.exe\" \"%1\"" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\3CXDesktopApp.tel\shell\open\command msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\callto\URL Protocol msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\CLSID 3CXDesktopApp.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\CLSID\{520AA812-396B-40DE-8ED1-0EDC70630DBE} 3CXDesktopApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\3CXDesktopApp.tcx+app\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\3CXDesktopApp\\3CXDesktopApp.exe,1" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\callto\shell\open\command msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\3CXDesktopApp.tel\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Programs\\3CXDesktopApp\\3CXDesktopApp.exe,1" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\3CXDesktopApp.tcx+app\DefaultIcon msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\CLSID\{520AA812-396B-40DE-8ED1-0EDC70630DBE}\LocalServer32 3CXDesktopApp.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\tcx+app msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\tcx+app\shell\open msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\callto\DefaultIcon msiexec.exe Key created \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000_Classes\3CXDesktopApp.callto\shell\open msiexec.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4748 reg.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C 3CXDesktopApp.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 3CXDesktopApp.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 3CXDesktopApp.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4048 msiexec.exe 4048 msiexec.exe 1296 3CXDesktopApp.exe 1296 3CXDesktopApp.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4364 msiexec.exe Token: SeIncreaseQuotaPrivilege 4364 msiexec.exe Token: SeSecurityPrivilege 4048 msiexec.exe Token: SeCreateTokenPrivilege 4364 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4364 msiexec.exe Token: SeLockMemoryPrivilege 4364 msiexec.exe Token: SeIncreaseQuotaPrivilege 4364 msiexec.exe Token: SeMachineAccountPrivilege 4364 msiexec.exe Token: SeTcbPrivilege 4364 msiexec.exe Token: SeSecurityPrivilege 4364 msiexec.exe Token: SeTakeOwnershipPrivilege 4364 msiexec.exe Token: SeLoadDriverPrivilege 4364 msiexec.exe Token: SeSystemProfilePrivilege 4364 msiexec.exe Token: SeSystemtimePrivilege 4364 msiexec.exe Token: SeProfSingleProcessPrivilege 4364 msiexec.exe Token: SeIncBasePriorityPrivilege 4364 msiexec.exe Token: SeCreatePagefilePrivilege 4364 msiexec.exe Token: SeCreatePermanentPrivilege 4364 msiexec.exe Token: SeBackupPrivilege 4364 msiexec.exe Token: SeRestorePrivilege 4364 msiexec.exe Token: SeShutdownPrivilege 4364 msiexec.exe Token: SeDebugPrivilege 4364 msiexec.exe Token: SeAuditPrivilege 4364 msiexec.exe Token: SeSystemEnvironmentPrivilege 4364 msiexec.exe Token: SeChangeNotifyPrivilege 4364 msiexec.exe Token: SeRemoteShutdownPrivilege 4364 msiexec.exe Token: SeUndockPrivilege 4364 msiexec.exe Token: SeSyncAgentPrivilege 4364 msiexec.exe Token: SeEnableDelegationPrivilege 4364 msiexec.exe Token: SeManageVolumePrivilege 4364 msiexec.exe Token: SeImpersonatePrivilege 4364 msiexec.exe Token: SeCreateGlobalPrivilege 4364 msiexec.exe Token: SeBackupPrivilege 2156 vssvc.exe Token: SeRestorePrivilege 2156 vssvc.exe Token: SeAuditPrivilege 2156 vssvc.exe Token: SeBackupPrivilege 4048 msiexec.exe Token: SeRestorePrivilege 4048 msiexec.exe Token: SeRestorePrivilege 4048 msiexec.exe Token: SeTakeOwnershipPrivilege 4048 msiexec.exe Token: SeRestorePrivilege 4048 msiexec.exe Token: SeTakeOwnershipPrivilege 4048 msiexec.exe Token: SeBackupPrivilege 1148 srtasks.exe Token: SeRestorePrivilege 1148 srtasks.exe Token: SeSecurityPrivilege 1148 srtasks.exe Token: SeTakeOwnershipPrivilege 1148 srtasks.exe Token: SeBackupPrivilege 1148 srtasks.exe Token: SeRestorePrivilege 1148 srtasks.exe Token: SeSecurityPrivilege 1148 srtasks.exe Token: SeTakeOwnershipPrivilege 1148 srtasks.exe Token: SeRestorePrivilege 4048 msiexec.exe Token: SeTakeOwnershipPrivilege 4048 msiexec.exe Token: SeRestorePrivilege 4048 msiexec.exe Token: SeTakeOwnershipPrivilege 4048 msiexec.exe Token: SeRestorePrivilege 4048 msiexec.exe Token: SeTakeOwnershipPrivilege 4048 msiexec.exe Token: SeRestorePrivilege 4048 msiexec.exe Token: SeTakeOwnershipPrivilege 4048 msiexec.exe Token: SeRestorePrivilege 4048 msiexec.exe Token: SeTakeOwnershipPrivilege 4048 msiexec.exe Token: SeRestorePrivilege 4048 msiexec.exe Token: SeTakeOwnershipPrivilege 4048 msiexec.exe Token: SeRestorePrivilege 4048 msiexec.exe Token: SeTakeOwnershipPrivilege 4048 msiexec.exe Token: SeRestorePrivilege 4048 msiexec.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 4364 msiexec.exe 4364 msiexec.exe 3660 3CXDesktopApp.exe 3660 3CXDesktopApp.exe 3660 3CXDesktopApp.exe 3660 3CXDesktopApp.exe 3660 3CXDesktopApp.exe 3660 3CXDesktopApp.exe 3660 3CXDesktopApp.exe 3660 3CXDesktopApp.exe 3660 3CXDesktopApp.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 3660 3CXDesktopApp.exe 3660 3CXDesktopApp.exe 3660 3CXDesktopApp.exe 3660 3CXDesktopApp.exe 3660 3CXDesktopApp.exe 3660 3CXDesktopApp.exe 3660 3CXDesktopApp.exe 3660 3CXDesktopApp.exe 3660 3CXDesktopApp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4048 wrote to memory of 1148 4048 msiexec.exe 89 PID 4048 wrote to memory of 1148 4048 msiexec.exe 89 PID 4048 wrote to memory of 4764 4048 msiexec.exe 91 PID 4048 wrote to memory of 4764 4048 msiexec.exe 91 PID 4048 wrote to memory of 4764 4048 msiexec.exe 91 PID 4048 wrote to memory of 3644 4048 msiexec.exe 92 PID 4048 wrote to memory of 3644 4048 msiexec.exe 92 PID 4764 wrote to memory of 2172 4764 MsiExec.exe 104 PID 4764 wrote to memory of 2172 4764 MsiExec.exe 104 PID 4764 wrote to memory of 2172 4764 MsiExec.exe 104 PID 2172 wrote to memory of 3660 2172 3CXDesktopApp.exe 95 PID 2172 wrote to memory of 3660 2172 3CXDesktopApp.exe 95 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 1156 3660 3CXDesktopApp.exe 96 PID 3660 wrote to memory of 644 3660 3CXDesktopApp.exe 97 PID 3660 wrote to memory of 644 3660 3CXDesktopApp.exe 97 PID 3660 wrote to memory of 4748 3660 3CXDesktopApp.exe 98 PID 3660 wrote to memory of 4748 3660 3CXDesktopApp.exe 98 PID 3660 wrote to memory of 4328 3660 3CXDesktopApp.exe 100 PID 3660 wrote to memory of 4328 3660 3CXDesktopApp.exe 100 PID 3660 wrote to memory of 4328 3660 3CXDesktopApp.exe 100 PID 3660 wrote to memory of 4328 3660 3CXDesktopApp.exe 100 PID 3660 wrote to memory of 4328 3660 3CXDesktopApp.exe 100 PID 3660 wrote to memory of 4328 3660 3CXDesktopApp.exe 100 PID 3660 wrote to memory of 4328 3660 3CXDesktopApp.exe 100 PID 3660 wrote to memory of 4328 3660 3CXDesktopApp.exe 100 PID 3660 wrote to memory of 4328 3660 3CXDesktopApp.exe 100 PID 3660 wrote to memory of 4328 3660 3CXDesktopApp.exe 100 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\3CXDesktopApp-18.12.416.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4364
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding E86A400E9EB9A27C6495ED7908CD15A42⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Programs\3CXDesktopApp\3CXDesktopApp.exe"C:\Users\Admin\AppData\Local\Programs\3CXDesktopApp\3CXDesktopApp.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Programs\3CXDesktopApp\app\3CXDesktopApp.exe"C:\Users\Admin\AppData\Local\Programs\3CXDesktopApp\app\3CXDesktopApp.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Programs\3CXDesktopApp\app\3CXDesktopApp.exe"C:\Users\Admin\AppData\Local\Programs\3CXDesktopApp\app\3CXDesktopApp.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\3CXDesktopApp" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1612 --field-trial-handle=1740,i,18071824292075145032,232871855404077538,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1156
-
-
C:\Users\Admin\AppData\Local\Programs\3CXDesktopApp\app\3CXDesktopApp.exe"C:\Users\Admin\AppData\Local\Programs\3CXDesktopApp\app\3CXDesktopApp.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --ignore-certificate-errors=true --ignore-certificate-errors=true --user-data-dir="C:\Users\Admin\AppData\Roaming\3CXDesktopApp" --standard-schemes=voipc --enable-sandbox --secure-schemes=voipc --bypasscsp-schemes --cors-schemes=voipc --fetch-schemes=voipc --service-worker-schemes=voipc --streaming-schemes --mojo-platform-channel-handle=1912 --field-trial-handle=1740,i,18071824292075145032,232871855404077538,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:644
-
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe QUERY HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v 3CXDeskTopApp5⤵
- Modifies registry key
PID:4748
-
-
C:\Users\Admin\AppData\Local\Programs\3CXDesktopApp\app\3CXDesktopApp.exe"C:\Users\Admin\AppData\Local\Programs\3CXDesktopApp\app\3CXDesktopApp.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\3CXDesktopApp" --standard-schemes=voipc --enable-sandbox --secure-schemes=voipc --bypasscsp-schemes --cors-schemes=voipc --fetch-schemes=voipc --service-worker-schemes=voipc --streaming-schemes --app-user-model-id=9071E5B59CCA4D120EC8D975AF3F02AB --app-path="C:\Users\Admin\AppData\Local\Programs\3CXDesktopApp\app\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=3032 --field-trial-handle=1740,i,18071824292075145032,232871855404077538,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:4328
-
-
C:\Users\Admin\AppData\Local\Programs\3CXDesktopApp\app\3CXDesktopApp.exe"C:\Users\Admin\AppData\Local\Programs\3CXDesktopApp\app\3CXDesktopApp.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\3CXDesktopApp" --standard-schemes=voipc --enable-sandbox --secure-schemes=voipc --bypasscsp-schemes --cors-schemes=voipc --fetch-schemes=voipc --service-worker-schemes=voipc --streaming-schemes --app-user-model-id=9071E5B59CCA4D120EC8D975AF3F02AB --app-path="C:\Users\Admin\AppData\Local\Programs\3CXDesktopApp\app\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3512 --field-trial-handle=1740,i,18071824292075145032,232871855404077538,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:15⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:1940
-
-
C:\Users\Admin\AppData\Local\Programs\3CXDesktopApp\app\3CXDesktopApp.exe"C:\Users\Admin\AppData\Local\Programs\3CXDesktopApp\app\3CXDesktopApp.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --ignore-certificate-errors=true --ignore-certificate-errors=true --user-data-dir="C:\Users\Admin\AppData\Roaming\3CXDesktopApp" --standard-schemes=voipc --enable-sandbox --secure-schemes=voipc --bypasscsp-schemes --cors-schemes=voipc --fetch-schemes=voipc --service-worker-schemes=voipc --streaming-schemes --mojo-platform-channel-handle=3628 --field-trial-handle=1740,i,18071824292075145032,232871855404077538,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1984
-
-
C:\Users\Admin\AppData\Local\Programs\3CXDesktopApp\app\3CXDesktopApp.exe"C:\Users\Admin\AppData\Local\Programs\3CXDesktopApp\app\3CXDesktopApp.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --ignore-certificate-errors=true --ignore-certificate-errors=true --user-data-dir="C:\Users\Admin\AppData\Roaming\3CXDesktopApp" --standard-schemes=voipc --enable-sandbox --secure-schemes=voipc --bypasscsp-schemes --cors-schemes=voipc --fetch-schemes=voipc --service-worker-schemes=voipc --streaming-schemes --mojo-platform-channel-handle=3700 --field-trial-handle=1740,i,18071824292075145032,232871855404077538,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:85⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:4500
-
-
C:\Users\Admin\AppData\Local\Programs\3CXDesktopApp\app\3CXDesktopApp.exe"C:\Users\Admin\AppData\Local\Programs\3CXDesktopApp\app\3CXDesktopApp.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\Admin\AppData\Roaming\3CXDesktopApp" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3064 --field-trial-handle=1740,i,18071824292075145032,232871855404077538,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1296
-
-
-
-
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding A9D909A3CEEEA331D0BA17E30A353FE32⤵
- Loads dropped DLL
PID:3644
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3f0 0x3441⤵PID:2172
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
161KB
MD571d63cff05bf602e1e4d5fbc5f1e4c54
SHA1565026dd55c725b7f07f2226ef218325596834ec
SHA256cf114b2526ca860059d4256cfea0b2842ce7983229b56c9ce60037e2edd6ba70
SHA51288f539b31ce570c4b8dcece511686fa373e2167a3a3addb96a51b0a7307598601303f755548b8ad28df94a9407f3dfbebd3e02d68df1a787eec622352babde86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_E6095CD2AECC9011BCD0D7B421356B17
Filesize2KB
MD5f32a13bcb036e787d9cef1ac50813bc3
SHA106f0fb06161b3aad6aca5655a5722a433768ca19
SHA256bc1149fb83dafe58d64c07cdf07dc02125efe3a8e8e980f3c484689faed9e9f7
SHA51254ce0b5b978a14581fcd2e3862733276310eb5bca37ecb907d12f5975830132b7e9d78140dfffe8fd3d9db3fca879590d684e1eb6f2f58ac6611bf209691dea3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD52e2231443cb7ae1eb6893fd2c348071d
SHA1f42c8ed36b7533765f49386ede30bfa16fd4b8c6
SHA2568771d0dd41d115c03c9db99a3afd8dde40764531109ed5d77a810c5fd1ffc5fe
SHA5122a5df718114dbcffd833ea8b8e0defdfae0d47a3898787e2dbc592025c738713e49c02fe18b360ad8481c401969d54a53761600895f92e2a1afb948d522098dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D7833C286363AD25C70511661A83D581_5453925CF1FC5AEA2F776AD35FF4432C
Filesize531B
MD537f30ee295d098772831ec963243a596
SHA186a9a54ba511b3cee3760cb7dbe4939d1284d24a
SHA256fa6d8489b1d9665a42b3f4986c2c8847a40e039b85b031bc30147bfe0de00922
SHA512cd96d79a39b75883f4dedb000adec51803a3a438d85f3d2bbe3e1be4fa20058f5e9d2baafa04a3d53581b7a741cdeb7d83c96cc0f62d12a25dcc6613d7e6daa3
-
Filesize
1KB
MD5285ec909c4ab0d2d57f5086b225799aa
SHA1d89e3bd43d5d909b47a18977aa9d5ce36cee184c
SHA25668b9c761219a5b1f0131784474665db61bbdb109e00f05ca9f74244ee5f5f52b
SHA5124cf305b95f94c7a9504c53c7f2dc8068e647a326d95976b7f4d80433b2284506fc5e3bb9a80a4e9a9889540bbf92908dd39ee4eb25f2566fe9ab37b4dc9a7c09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_E6095CD2AECC9011BCD0D7B421356B17
Filesize488B
MD591262b35b0d944efd471f22d935599d8
SHA136905b9bf3ec7830806e9dc8c088e882600d73d7
SHA2560190f004f89858dff863349125387986704082418be7e61508120182707c25d8
SHA5123b09560b49c9b72f091706b17125adc35e210655d47387b62e1f853c8c732f0410953ac6bcfabf2a2fd67ce543760d3952e4966ba63e1fe68c3061a94605418e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD57c22d144ab789ee2a4f57fecd7b07c2a
SHA1d350d7e541368d677ee85fe8d8396875579ddd98
SHA256df491e6a658dc8b523b2d5ab34259af9bc2e0654441eff5fd98fdb29e31dd382
SHA51286733439fce447ff06422043dbc10338223bacdc36d6d139a82496201e9b39b8414ebcf78c29829abb080954de993144cc85b393e7deac49b93b068fc03cb288
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D7833C286363AD25C70511661A83D581_5453925CF1FC5AEA2F776AD35FF4432C
Filesize484B
MD5a50efb0d19d03f2fbc4ae59e1f404773
SHA1d7f123c376448d693e12b44659f8a37cb9b9810d
SHA256f2bc13cd36bf2b2cbe20b3f20bb763c21f7a224a0d0219f7eb0f1a2ab4cf7d14
SHA5125efee7892973564261fc86cdf86ac8de59909c5d985c722d3bb566daafcf4631e82aa98e7b99af55c9712fd27d99361032f9db79dc47392df228c29cf87a1524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0968A1E3A40D2582E7FD463BAEB59CD
Filesize306B
MD5582716e4b6d763007fd13758334006e9
SHA1f05b639fe877856118b1ce3c8f2387d761ccc6d7
SHA25670061dc17c43674a79c86878bdfa397e970f91324e2f1cbec7b28dd53cf9d077
SHA5128ea78124ffd9382b1f264bbe5fe3c3a970d0dd3d2108e46fd4105e10eb39b72a8e3153a7eef4e0969b04060fb7e0a91a080500123aefd4e49dcf72dd331a5012
-
Filesize
149B
MD51656134c540e58465c3c6f3e37c30b08
SHA1215cf4de557f6e91965dab3930a6dd95aa686e96
SHA25649f650ad4db3cc591a782c71a7c6e92443981c26910b19b874fd95beedc5d865
SHA512b82a904064d6841dc63da81cc90a9441d7a6d6b0e82963cf04efd485b65e6f6256551877a2f41a80d508114182e75412246722636d90adf980dfed5b1fe1c53a
-
Filesize
541KB
MD5704db9184700481a56e5100fb56496ce
SHA1413d9cbfcbf8d1e8304eab0aa5484f5eec5185f5
SHA256a60a61bf844bc181d4540c9fac53203250a982e7c3ad6153869f01e19cc36203
SHA51265e979b1f1bf2e606668acc01dde6143e58a4185ef24e6ec9f9d9e6a19b2a18195f0a3b891c32474ef0ebd228aaaf0b0c674afff1e487dbf1824583f5a7232cb
-
C:\Users\Admin\AppData\Local\Programs\3CXDesktopApp\app-18.12.416\3CXDesktopApp.VisualElementsManifest.xml
Filesize230B
MD55a64effd99cee7ae227bc47eee578855
SHA1292c0c8c15217fa376cd5aa099a149084e8c984e
SHA256abfcb8ac6cce1dfc5eee1d870d794e2cd352d1f5aaa226918b7d3d3024d96507
SHA512e37ca2566222dcec8ea48105a5ee6f5fa85fa9a027bd6cba13993e62afbff4a1028a3f70834af3878d0adfdbb7c4cad82cd5c1816018fb884623800ef08f1092
-
Filesize
1KB
MD54d42118d35941e0f664dddbd83f633c5
SHA12b21ec5f20fe961d15f2b58efb1368e66d202e5c
SHA2565154e165bd6c2cc0cfbcd8916498c7abab0497923bafcd5cb07673fe8480087d
SHA5123ffbba2e4cd689f362378f6b0f6060571f57e228d3755bdd308283be6cbbef8c2e84beb5fcf73e0c3c81cd944d01ee3fcf141733c4d8b3b0162e543e0b9f3e63
-
Filesize
5.1MB
MD5f0882b4f2a11c1f0c524388c3307aad7
SHA1c8952b4076167de1374d0c1f62b1fde8fe69f4ae
SHA2561b8b8e268755376e95aaddd0a6881f6f4a4b96787af1b2db158e51958410da5f
SHA5121e5cd07637e213d3f77f8a6204b5bb9a6e16c343790dda4ed677b081e8600de912165bb3436dacf56ea2e5145e888f5964deda4ee4b7dd3516ae2cab42e2fa0f
-
Filesize
125KB
MD50cf9de69dcfd8227665e08c644b9499c
SHA1a27941acce0101627304e06533ba24f13e650e43
SHA256d2c299095dbbd3a3cb2b4639e5b3bd389c691397ffd1a681e586f2cfe0e2ab88
SHA512bb5d340009cef2bcb604ef38fdd7171fed0423c2dc6a01e590f8d15c4f6bc860606547550218db41fba554609e8395c9e3c3508dfa2d8b202e5059e7646bdcef
-
Filesize
174KB
MD5d88936315a5bd83c1550e5b8093eb1e6
SHA16445d97ceb89635f6459bc2fb237324d66e6a4ee
SHA256f49abd81e93a05c1e53c1201a5d3a12f2724f52b6971806c8306b512bf66aa25
SHA51275142f03df6187fb75f887e4c8b9d5162902ba6aac86351186c85e5f0a2d3825ca312a36cf9f4bd656cdfc23a20cd38d4580ca1b41560d23ebaa0d41e4cf1dd2
-
Filesize
4.9MB
MD582187ad3f0c6c225e2fba0c867280cc9
SHA120d554a80d759c50d6537dd7097fed84dd258b3e
SHA25611be1803e2e307b647a8a7e02d128335c448ff741bf06bf52b332e0bbf423b03
SHA5122bcc78f520c04a11b3b4fce6e7d91a383a06943bcc638e7711494502cb45e0d7424231eb82f964477a49425d9f710e639689573a7b973036eb20906c5606aa41
-
Filesize
2.7MB
MD574bc2d0b6680faa1a5a76b27e5479cbc
SHA1bf939c9c261d27ee7bb92325cc588624fca75429
SHA2567986bbaee8940da11ce089383521ab420c443ab7b15ed42aed91fd31ce833896
SHA512871773857da2f4e30bdc66f8261ec5b50d0f8207a3bad3276cd68f08e3a18edf41d41614ca644ddccd7bd8e7f36fb215ab7739eb3696f2d3cfc41bed20d610bc
-
Filesize
9.9MB
MD5c6ae43f9d596f3dd0d86fb3e62a5b5de
SHA1198b3b4abc0f128398d25c66455c531a7af34a6d
SHA25600f755664926fda5fda14b87af41097f6ea4b20154f90be65d73717580db26ee
SHA5123c43e2dcdf037726a94319a147a8bc41a4c0fd66e6b18b3c7c95449912bf875382dde5ec0525dcad6a52e8820b0859caf8fa73cb287283334ec8d06eb3227ec4
-
Filesize
460KB
MD55de7e395632af0d31d8165ee5e5267dd
SHA1740ae64850e72e5ab3d49e3bbc785399a30a933e
SHA25644febbc02e69d492d39e2cd5d025bbf0d81b1889b37725bd700cc0c21e5ba22a
SHA512788c3fa6d58b8d3ae258628805ed79d612d9e15e92dca39c27cb621a2a9aa42669a20c11b5c9a912a2d8cd68b0a7a53f7689e729067c6d87a8063e5b8b2c265d
-
Filesize
6.8MB
MD5f96fc251bae55a5fc0f1ddaed8706015
SHA1532c2b51f5e3256777ae3b9f40c8067b20eee0a2
SHA2567897eb2441975523e3e78dbeabf2d9deba66534c69b6cefbf87ea638ee641ea6
SHA512cf2f9f126204596e37bbe5517500a738ad06f306cb49e7a36bc050e38a61191a767e5d3fecd570410f08d67b64e77019101b2970867e8f0d41b35a6526d3d280
-
Filesize
125KB
MD546f982ccd1b8a98de5f4f9f1e8f19fe5
SHA113165653f2336037d4fb42a05a90251d2a4bc5cf
SHA2569e0aeb9d58fecc27d43e39c8c433c444b2ce773cc5d510fc676e0ebbcab4bddf
SHA5122c40e344194df1ca2d2e88dba0cb6c7ef308dd9c83e10bbc45286b5e3bc1d98a424a60ec28b2700606916105968984809321505765078d7caddbb1c4d3f519de
-
Filesize
202KB
MD515b05881e1927eda0e41b86698ce12da
SHA1d629f23b8a11700b410d25f3dc439c8c353b0953
SHA2564c0129e1023e6e6cb5b71fadd59026d326fec3393463530c2f30fff8aacaaedd
SHA5126f921563d6887d0b712966bf3f8dea044d1115dd0a5d46eeee5595966dd88e49d5dfbec74ee1de19a330bc9f1a11ef3c7c93d6c5e69f1ee7d1d86085b7a2bd7f
-
Filesize
207KB
MD51b55e90455877384795185791bc692c2
SHA13d7c04fc31c26b3ab34bd2d8f4dcfbf4d242bc46
SHA256ac44c459f86c577f1f510c0b78a8317127522f0d2f80734b6c9ab338d637d4df
SHA512bc3dc023c9af551279a4d22583aedf79e63ada46c79ea54b7da18c12b9acd726e4f534e26789d2583036c382bf6a8862335ca72fc8b510ed065bf895b8d7c3b0
-
Filesize
226KB
MD5470dde3136a8da5752fcde269d4b6b43
SHA185196012cc0df090650244f7b55e51728c68806b
SHA256cd6701f8b682b6d677ae2010abfb4bfd19555bb42847e2ffddc54e203d50b373
SHA512b39397c8a3a081e61dd52ebbc0a4cc2ac33f9427c1ea9215995cd8915d705f30d2d3290742155890a61fc3819b6076c1ae41d278171517622ad35fc6f430702a
-
Filesize
291KB
MD5be160a93d35402ed4f4404f2b1d05d95
SHA152db7af673b6e5318e6663751938dbbce4f6280e
SHA256a40148129ff88aff0ea269ef3ca4fb369e772257655d27dfa29f078270486287
SHA512c2d2c4a2e24fdeeb22dadfa63ee8338efe8a5f08e17c3eb0e9a946098c57ba675c8ca5c73c04424e8307d9be60f9263553e8268f4815c73d081205fe8a92c8f3
-
Filesize
140KB
MD58fc109e240399b85168725bf46d0e512
SHA1c42c1fc06b2c0e90d393a8ae9cebcdd0030642e5
SHA256799ac8c1fa9cdd6a0c2e95057c3fc6b54112fe2aebbb1a159d9dac9d1583ca62
SHA51284a51f291d75b2d60849edbc1958a50cfe2ac288ce716bf4827038b47bd855a65d04ebcef6f92d78e31a27daa63f07772149798740652078e27ec68930ec07dc
-
Filesize
143KB
MD5df23addc3559428776232b1769bf505e
SHA104c45a59b1c7dce4cfabbac1982a0c701f93eed0
SHA256c06ac5459d735f7ac7ed352d9f100c17749fa2a277af69c25e7afe0b6954d3c0
SHA512fceca397dfc8a3a696a1ba302214ab4c9be910e0d94c5f8824b712ec08ff9491c994f0e6cfa9e8f5516d98c2c539fa141571640b490c8dd28b3a334b0449bdd8
-
Filesize
130KB
MD5875c8eaa5f2a5da2d36783024bff40c7
SHA1d0cba9cfbb669bbb8117eee8eccf654d37c3d099
SHA2566ee55e456d12246a4ea677c30be952adfb3ab57aca428516e35056e41e7828b5
SHA5126e17692f6064df4089096aa2726eb609422b077e0feb01baaa53c2938d3526256c28fb79ef112164727202cdd902aae288e35cf894c5ef25fecd7a6efa51a7e5
-
Filesize
139KB
MD55e7ea3ab0717b7fc84ef76915c3bfb21
SHA1549cb0f459f47fc93b2e8c7eb423fd318c4a9982
SHA2566272ed3d0487149874c9400b6f377fec3c5f0a7675be19f8610a8a1acb751403
SHA512976fb09b4a82665fbf439fa55b67e59aeaa993344df3f0d1926a82fb64d295bbe6fd77bb65e9f2267d98408e01166dd0c55c8ec7263ed74b3855f65dffc026ed
-
Filesize
249KB
MD57dca85c1719f09ec9b823d3dd33f855e
SHA14812cb8d5d5081fcc79dbde686964d364bc1627e
SHA25682b3fbbdc73f76eaea8595f8587651e12a5f5f73f27badbc7283af9b7072818c
SHA5128cb43c80654120c59da83efb5b939f762df4d55f4e33a407d1be08e885f3a19527ed0078ab512077604eb73c9c744c86ec1a3373b95d7598bf3835ad9f929d67
-
Filesize
115KB
MD5db946e28e8cd67fc45a317a2d22943d3
SHA10e096f66915f75d06f2ec20eae20f78ad6b235e7
SHA2567eb6af7620593bdd33cf4a6238e03afbf179097173cbfffdada5b3e25b8f0bbe
SHA512b893650000f463c1f3807f1feae3e51664e42ec10c1a5af7c08970163d5188f1f9ffcc5e82fe2209c78d8b4fc2feba050abec4c44d1eb122cd42fcc14a8b1c3f
-
Filesize
115KB
MD5f982582f05ea5adf95d9258aa99c2aa5
SHA12f3168b09d812c6b9b6defc54390b7a833009abf
SHA2564221cf9bae4ebea0edc1b0872c24ec708492d4fe13f051d1f806a77fe84ca94d
SHA51275636f4d6aa1bcf0a573a061a55077106fbde059e293d095557cddfe73522aa5f55fe55a48158bf2cfc74e9edb74cae776369a8ac9123dc6f1f6afa805d0cc78
-
Filesize
139KB
MD5d25865c02378b768ef5072eccd8b3bf0
SHA1548dbe6e90ece914d4b79c88b26285efc97ed70c
SHA256e49a13bee7544583d88301349821d21af779ec2ebfca39ee6a129897b20dbbd0
SHA512817a5ed547ef5cca026b1140870754ce25064fca0a9936b4ac58d3b1e654bb49b3ffa8186750b01640ac7d308bf7de2eadc0f34b7df3879c112e517d2faabc94
-
Filesize
140KB
MD5b1c6b6b7a04c5fb7747c962e3886b560
SHA170553b72b9c382c0b25fa10fe2c967efbcfcb125
SHA256e4db8f397cd85fc5575670b3cacfc0c69e4bf07ef54a210e7ae852d2916f1736
SHA5127fcd9ae80791de19df8644424ffdf1feb299f18a38a5d5bc546e8fd3d20d3ced6f565981c3c03026bc5400fe0806dfa3af3064e7a70e18061f5d5fe6d6bde8d5
-
Filesize
126KB
MD5339133a26a28ae136171145ba38d9075
SHA160c40c6c52effb96a3eb85d30fadc4e0a65518a6
SHA256f2f66a74b2606565365319511d3c40b6accdde43a0af976f8b6ac12e2d92ec9f
SHA512d7dd2a1c51a7144f1fe25336460d62622c2503aa64658063edcb95f50d97d65d538ce4e8ae986af25f6f7882f6f6578bfb367c201e22da2abdd149c0bb4194c1
-
Filesize
199KB
MD5a67bfd62dcf0ab4edd5df98a5bb26a72
SHA15def04429a9d7b3a2d6cac61829f803a8aa9ef3b
SHA256890ca9da16efc1efcc97ee406f9efa6a8d288f19a2192f89204bdc467e2868d3
SHA5123419c6bed5fc96e82f9b1f688609b2d2190003b527d95699e071576c25730934fbed3437fdde870fc836bdc5e690362cae1e612b7ff779c22b853baf3cfcaabf
-
Filesize
129KB
MD5aceed6757e21991632b063a7fe99c63c
SHA1491b4aa5eaeb93e662f720c721736e892b9117e5
SHA256370164e61142d8609d176ec0cc650540c526156009070563f456bcdb104e9c0f
SHA512664c369e74930a61a8c9ccee37321c6610ffdeba8e4e8a5d4f9444d530097b0f4556e7b369dfd55323fe7df70b517c84ae9d62a89c1984a8cf56bae92d3e0455
-
Filesize
144KB
MD5cb9fb6bc0e1ec2cb3a0c1f9c2dfbc856
SHA1c3b5900a38354ea00b63622bb9044ffb4788723b
SHA256945c0160938c3bcecda6659a411b33cd55dfac18814bed88575bfd100c53d42e
SHA5126ed77d0fbbb1186ccb7493708f55f8a2c3005a1f1da759c16289713a853bcad4a2cc4846874d67f722f461b1950a763508a91a7970bc0eb5da686206aaa8489b
-
Filesize
149KB
MD5bc286000070c9a918a8e674f19a74e12
SHA141221bb668e41c13fbf5f110e7f2c6d900cdffd1
SHA256d641d9d73262ca65a613ee0395204435d6830316dd551f8992407ae77ead4b64
SHA512553dc84ffd09dd969802fc339ab20f6af3c36442c1ea23e4199519f2c5fb50be79874ae455ce5ff44511a3adcedae7f3030d13e0ecf2b456233d5f4ff186a5dd
-
Filesize
282KB
MD5af5cc703c77e1a4b27233deb73c6ace8
SHA1ea92dce379ec9405fd84274566d363ce302d7f1d
SHA256cd761009ecbd4736b24383f020da05d2e6b9396c67a7ec1f4ac1966943cf9eab
SHA512dd379cbab7a6fdce05b0ff34d339c2f3320f83f76d8e1fb7ebf20edcfebe541ae454490eeb83d8edc069aaf3db52d6b7de6d701672a13e75dfe59840e8f2c5df
-
Filesize
174KB
MD5b2f893d17e118cd03055b55b0923206b
SHA199b6358438a3eaffae38dcf6a215d8c5f9bfdc26
SHA256f6d1e2a269783f27b85c2db2ce9286f581ec2e16586ecac476ab5735cd8ae12f
SHA51234fa1c4bce2f9e2c5c7b494a829f5b492b40e8f4f0bc586f564755de703b5765d81795c67e19a27d2f21d297ce3b7e5058a126118afe6911cc429fc58d67f13e
-
Filesize
292KB
MD59697c9ecfa893db09d046e4feb8f1260
SHA1db08fecfc31d278b3f74c85f98c34dc78b75f4fd
SHA256de4b369e012831a5ced3ae02e34fd34374348b016274c99911a294de3f9bee5b
SHA512ec9b87003853640c5f3c477f389dbd16bf1d75269c3fbd8620db43942ba7e323a3198fbbb16d27c10bbae40fd047cfdad170659b9ef26488928a24ee535885d7
-
Filesize
137KB
MD5209efaa890532ddbb1673852e42ded7e
SHA18e9a3e643183d4cbdfad9fd2a116e749b5313a95
SHA2563d01f9d2c51efa0c0d8d720dd832493b1b87d2429970396c42cee2199e7bef40
SHA5125410b31ab46ccfd29b750f39d3796a533ec0c0a7b7b31b70977f59f348dd4190edc00c86db8d5b73df2117f27fd283de2057493c081cef69d04ad9894eb5c05b
-
Filesize
149KB
MD57317adfcba87621963e9cb2f44600e2f
SHA10398d795f9a3cde03ae85e8cd2c4723e7ef5f7e4
SHA2566edcdaf17483c4b7b74d9c728c3f38d9e4704bfbdb618b578c7ccb6bbe6e824f
SHA512e8ec0df2ddf67799194e8d3f722b5643553fb05026bd5f8d933d1cc18df6a641eb1b810e22114b44513b57a005d326b91a1fcf1c470a636cd42c5bc5fa0f254f
-
Filesize
124KB
MD5f6d153fa3087dab3fcef255b5afe8538
SHA199f123a133d3ce1a70349a7d1948a8d57981e1c4
SHA256fa38d911dec71800d33802441412f20133e960bb316c79161bdc7f78ea1af3d7
SHA512c092339a2a64dd10a45b516ba19013ad096c4c43d51df33e4c779c9ede6d71bcb59c18d5ba568f4876c0b5454ccdf05a1e632be0f97db5b4eaadf263e7d1967b
-
Filesize
138KB
MD523d70fc1cc74275719c4f882400150e1
SHA1e8235d0bd4dbfbd708deb80139f0acb1cc0fbdef
SHA25675b37965b88933ba32119ebdd13cb98c54300b1e1e312080947eed6a94fc70b0
SHA512ca9a6fc273d5b0b656e902fb87f8792de604a3b6ce598dc577d08541ce9f35256849b1503f15edbe5d1e1d5785cffc38ed12650d1d026aa23b5ce6f9c3ac4cb4
-
Filesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
296B
MD58b9572c829e247a4235fe6d038897920
SHA1de8d9a973eeeff27eb21c531a8dc85ff0023253b
SHA2568da896befaa9dfce043c17a5a059c278b0a14e45d670cb7fbab2f441f8de6cdd
SHA5126652c8b12a461b4c551cc581ddd072638a58f9d6e942875fc7bf33122c44427b34ebafd9a77cf156fe6a17e0636257fd8d521d729227bee997a79d809c7fa62d
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2KB
MD509c9457dc284771d16679e040db326a6
SHA16c0039ecadc994dc649e60ef12400cf9f742ec5f
SHA25649c863c189396b1953f446f226ca85c87b06a13c3d26d7e2ad39ef37aac04b12
SHA5124b5a8cd5d7d110bce4589c1f2b1ec2c55b3d54eddb7b2e1cf37c03d91b28c0ba611914cf8dcd0f9aaa86183e54f9925fe62efe88b69ca287a18f65e01a78e6b9
-
Filesize
4KB
MD51dfea8b27f941e3e4af89ecdc9a3d095
SHA163dac4c9496db10a264dc4b15d77e59c25597d56
SHA2562ca927c7e02c9c6edff22136b2ee72c7de0a044374afa48f2dc19e6e6845546a
SHA5121c7d1c84b6a8f566c3beedb2c7e7504bc3d1eae11a330920ca264eff64bdab88eb2e6e14fd6a1389099e43095abef48c4619978b6964bf6c9f5d1758741a5c95
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
1KB
MD55b37e5a286b80f778ffb407f12cd73f0
SHA19495ec1c802b22a27962d7cdc4055459a8d43a34
SHA25605ecf53d6081e45569035f2ccfd008f357c1d431ef8b6e9d1da60ba7dc61dbd7
SHA5127e6fddb9f5ca56a2944a4c614b2314971cf2e50444d0d7ebd40a0d90af1f6fc74a1d5062bada7d18061c581f2b6e948df937b6026b831c69a55c8f2129d794eb
-
Filesize
1KB
MD526d17e61905b5ccaf382fd700a566a6c
SHA1293f230c28fe45dc9a88175a1b0128fd7ca27308
SHA25643ebcfd03aa0fdca2092c82f3d6812a0c015a2a636b0875e799fac43e50e406f
SHA51238bf2831268b6bc816214bb8ba7a14a08039ee205da5f247801748dbeca6ea09061cbf993fe70ebfd07c6921f68f57973fca9c3201c91be4b29fc9b4372dc880
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\3CX Ltd\3CX Desktop App.lnk~RFe5785d9.TMP
Filesize1KB
MD5289c3f18e6f268ca473a9b98b5e353de
SHA10c4f22eb89690b728e0239e91dbc06e2d259ed2d
SHA256f03d5fd495c549ee0b9a9d9862b7b5db747d7a9686f5815d0b539fedda233307
SHA512ce83eb6fe6b4c006725087837ee0d8af1ec2aa7ed2e9d4532aef3f7aabb995130a927c45598dabf6a499ae7253a63b0818976579059902ef66eaa3b65968e864
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
154KB
MD5b2e2c24ebce4f188cf28b9e1470227f5
SHA19de61721326d8e88636f9633aa37fcb885a4babe
SHA256233f5e43325615710ca1aa580250530e06339def861811073912e8a16b058c69
SHA512343ea590c7f6b682b3b3e27fd4ab10ffeded788c08000c6dd1e796203f07bf9f8c65d64e9d4b17ce0da8eb17aaf1bd09c002359a89a7e5ab09cf2cb2960e7354
-
Filesize
127KB
MD593394d2866590fb66759f5f0263453f2
SHA12f0903d4b21a0231add1b4cd02e25c7c4974da84
SHA2565c29b8255ace0cd94c066c528c8ad04f0f45eba12fcf94da7b9ca1b64ad4288b
SHA512f2033997b7622bd7cd6f30fca676ab02ecf6c732bd44e43358e4857b2cf5b227a5aa6bbbf2828c69dd902cbcc6ff983306787a46104ca000187f0cba3743c622
-
Filesize
23.7MB
MD534cbe2e72e1366418129ae40b6c002e5
SHA13c0a68f70937ebd27568d01e5d18cf82d8399c60
SHA2569154fb9e5b3fbc39bd547708c93d853c22aec0f024a096ea9dfd235ed5986871
SHA512dcd3175126c2af4cb1a148a3da96e07248d95ab788ac5e68fbeef9392482cd1951d4ec671a02d67a9e59623a591473f10aed7b21e54e130edf83363054736196
-
\??\Volume{25d8ed48-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{e28eea0d-4ff6-4300-88be-64ae1e87e7a3}_OnDiskSnapshotProp
Filesize6KB
MD507d3b1a476e22d513aad12d823f04026
SHA120b940757ff378a060cd9f52e048203e39e6b5da
SHA256f1b8087d2a22acc02636bf1fa19bd5fef30d35deb002d23c3f9a8e6942ce9557
SHA512b29a1f59605d4c11be9556a337498eacfb315eb28e5c44bedece2e36f48f1736e22cbb100b7bf5f7935711fb4e45f281533f520d0108ddb52cbcec7cad4f1c15