Resubmissions
19-07-2024 08:22
240719-j929savcmd 619-07-2024 08:14
240719-j5fj8a1clk 1019-07-2024 08:08
240719-j1lknstgpb 6Analysis
-
max time kernel
26s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
19-07-2024 08:22
Static task
static1
Behavioral task
behavioral1
Sample
gooleo.msi
Resource
win11-20240709-en
General
-
Target
gooleo.msi
-
Size
87.8MB
-
MD5
e651816dd9240300cf9bd9c565e3b869
-
SHA1
a4bc6e8f6516f3d549195887d7095b9496ae52f9
-
SHA256
2c12e2073d0b50369b0b10ebbdb8bf8357fbf7cdca3f97b0b84192339b846c25
-
SHA512
90646a020b0ea67c912f999690382a44f5649c5f3c2a4a7c060aced6a9a71533b92c04d948db8bafd717dd295ad19bb85a71d73ef86a62613e65053323b108b8
-
SSDEEP
1572864:MKSA0Q9ilL4UxQUoim6casSZrcBsCWpuFg9O/jAaWFFDp+chVF1luEbtYio0z8+U:MbVQ92TQUooc3Uw2F9HHluEbtpoOKd3
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Windows Defenderr\xf0Rrtcttm\WS_Log.dll MsiExec.exe File opened for modification C:\Program Files\Windows Defenderr\xf0Rrtcttm\WS_Log.dll MsiExec.exe File created C:\Program Files\Windows Defenderr\xf0Rrtcttm\FourierTransformLib8.dll MsiExec.exe File created C:\Program Files\Windows Defenderr\xf0Rrtcttm\ImageRestoreLib8.dll MsiExec.exe File created C:\Program Files\Windows Defenderr\xf0Rrtcttm\wavelet_3_8.dll MsiExec.exe -
Drops file in Windows directory 16 IoCs
description ioc Process File created C:\Windows\SystemTemp\~DFFD7F363A4D07FBB4.TMP msiexec.exe File created C:\Windows\Installer\e57d06f.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSID293.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\e57d06f.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{13A5BCD1-56BB-4290-90FC-9B59AC6F1C74} msiexec.exe File created C:\Windows\SystemTemp\~DF12DBC824DA44F011.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSID2C3.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID5F0.tmp msiexec.exe File created C:\Windows\Installer\{13A5BCD1-56BB-4290-90FC-9B59AC6F1C74}\PublicDocumentsFolderappR_1.exe msiexec.exe File opened for modification C:\Windows\Installer\{13A5BCD1-56BB-4290-90FC-9B59AC6F1C74}\PublicDocumentsFolderappR_1.exe msiexec.exe File opened for modification C:\Windows\Installer\MSID1C7.tmp msiexec.exe File created C:\Windows\SystemTemp\~DFF6425CA736A7B666.TMP msiexec.exe File created C:\Windows\SystemTemp\~DF0FE33FA827FB4F19.TMP msiexec.exe -
Loads dropped DLL 10 IoCs
pid Process 3304 MsiExec.exe 3304 MsiExec.exe 3304 MsiExec.exe 3304 MsiExec.exe 3304 MsiExec.exe 3304 MsiExec.exe 3304 MsiExec.exe 3952 MsiExec.exe 3952 MsiExec.exe 3952 MsiExec.exe -
Event Triggered Execution: Installer Packages 1 TTPs 1 IoCs
pid Process 748 msiexec.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 0000000004000000ea343b979040b2d60000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000c01200000000ffffffff000000002701010000080000ea343b970000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d01200000000000020ed3a000000ffffffff000000000700010000680900ea343b97000000000000d012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ff3a0000000000000005000000ffffffff000000000700010000f87f1dea343b97000000000000f0ff3a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000ea343b9700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe -
Modifies data under HKEY_USERS 7 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script\Settings MsiExec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows Script\Settings\JITDebug = "0" MsiExec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1564 msiexec.exe 1564 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 748 msiexec.exe Token: SeIncreaseQuotaPrivilege 748 msiexec.exe Token: SeSecurityPrivilege 1564 msiexec.exe Token: SeCreateTokenPrivilege 748 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 748 msiexec.exe Token: SeLockMemoryPrivilege 748 msiexec.exe Token: SeIncreaseQuotaPrivilege 748 msiexec.exe Token: SeMachineAccountPrivilege 748 msiexec.exe Token: SeTcbPrivilege 748 msiexec.exe Token: SeSecurityPrivilege 748 msiexec.exe Token: SeTakeOwnershipPrivilege 748 msiexec.exe Token: SeLoadDriverPrivilege 748 msiexec.exe Token: SeSystemProfilePrivilege 748 msiexec.exe Token: SeSystemtimePrivilege 748 msiexec.exe Token: SeProfSingleProcessPrivilege 748 msiexec.exe Token: SeIncBasePriorityPrivilege 748 msiexec.exe Token: SeCreatePagefilePrivilege 748 msiexec.exe Token: SeCreatePermanentPrivilege 748 msiexec.exe Token: SeBackupPrivilege 748 msiexec.exe Token: SeRestorePrivilege 748 msiexec.exe Token: SeShutdownPrivilege 748 msiexec.exe Token: SeDebugPrivilege 748 msiexec.exe Token: SeAuditPrivilege 748 msiexec.exe Token: SeSystemEnvironmentPrivilege 748 msiexec.exe Token: SeChangeNotifyPrivilege 748 msiexec.exe Token: SeRemoteShutdownPrivilege 748 msiexec.exe Token: SeUndockPrivilege 748 msiexec.exe Token: SeSyncAgentPrivilege 748 msiexec.exe Token: SeEnableDelegationPrivilege 748 msiexec.exe Token: SeManageVolumePrivilege 748 msiexec.exe Token: SeImpersonatePrivilege 748 msiexec.exe Token: SeCreateGlobalPrivilege 748 msiexec.exe Token: SeCreateTokenPrivilege 748 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 748 msiexec.exe Token: SeLockMemoryPrivilege 748 msiexec.exe Token: SeIncreaseQuotaPrivilege 748 msiexec.exe Token: SeMachineAccountPrivilege 748 msiexec.exe Token: SeTcbPrivilege 748 msiexec.exe Token: SeSecurityPrivilege 748 msiexec.exe Token: SeTakeOwnershipPrivilege 748 msiexec.exe Token: SeLoadDriverPrivilege 748 msiexec.exe Token: SeSystemProfilePrivilege 748 msiexec.exe Token: SeSystemtimePrivilege 748 msiexec.exe Token: SeProfSingleProcessPrivilege 748 msiexec.exe Token: SeIncBasePriorityPrivilege 748 msiexec.exe Token: SeCreatePagefilePrivilege 748 msiexec.exe Token: SeCreatePermanentPrivilege 748 msiexec.exe Token: SeBackupPrivilege 748 msiexec.exe Token: SeRestorePrivilege 748 msiexec.exe Token: SeShutdownPrivilege 748 msiexec.exe Token: SeDebugPrivilege 748 msiexec.exe Token: SeAuditPrivilege 748 msiexec.exe Token: SeSystemEnvironmentPrivilege 748 msiexec.exe Token: SeChangeNotifyPrivilege 748 msiexec.exe Token: SeRemoteShutdownPrivilege 748 msiexec.exe Token: SeUndockPrivilege 748 msiexec.exe Token: SeSyncAgentPrivilege 748 msiexec.exe Token: SeEnableDelegationPrivilege 748 msiexec.exe Token: SeManageVolumePrivilege 748 msiexec.exe Token: SeImpersonatePrivilege 748 msiexec.exe Token: SeCreateGlobalPrivilege 748 msiexec.exe Token: SeCreateTokenPrivilege 748 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 748 msiexec.exe Token: SeLockMemoryPrivilege 748 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 748 msiexec.exe 748 msiexec.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1564 wrote to memory of 3304 1564 msiexec.exe 81 PID 1564 wrote to memory of 3304 1564 msiexec.exe 81 PID 1564 wrote to memory of 3304 1564 msiexec.exe 81 PID 1564 wrote to memory of 1876 1564 msiexec.exe 85 PID 1564 wrote to memory of 1876 1564 msiexec.exe 85 PID 1564 wrote to memory of 3952 1564 msiexec.exe 87 PID 1564 wrote to memory of 3952 1564 msiexec.exe 87 PID 1564 wrote to memory of 3952 1564 msiexec.exe 87 PID 1564 wrote to memory of 2224 1564 msiexec.exe 88 PID 1564 wrote to memory of 2224 1564 msiexec.exe 88 PID 1564 wrote to memory of 2224 1564 msiexec.exe 88 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\gooleo.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:748
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 5665F6FA200741D41379AB26673B36EC C2⤵
- Loads dropped DLL
PID:3304
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:1876
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1804CFEB310EE53BA9E9F6CB6042233B2⤵
- Loads dropped DLL
PID:3952
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B680AD1AC955FD50E6D980D696362AB6 E Global\MSI00002⤵
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:2224
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:4516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD53d354e45af7dcf7b455660e01acc0c05
SHA1e1aacd78ed6278d1257c3927b5569244c933c205
SHA2563371ffba84f5019c58f651628652a010bd16b27047f5d7896b1f435798054dff
SHA512bfb4d8ac3858a6a1141f7d274a7589e5aabb0fecf3d1262e492bdf48443a924299f516b9c7d0bff639a8c0734abe76cb1ab7c198b962f23e30c660afef4baa13
-
Filesize
2KB
MD59745e893f7167a12c47ac261bf84e8e3
SHA1a265021a5c08c37e6992906d5684b57c45eb402d
SHA25606a8ea0dd8ba0c695466c634d667a022f2412b6bd894d2e394767eba9f962775
SHA51247ba226c9babe527dfe447b52539cfdeb04dfdcb7279b6cc4dbe326f6e0a7d9291296d569db8247c1b5bd23461018c5aa589faaba503c9591e7364de88938123
-
Filesize
84KB
MD597a2b445c8eac7f3b1edd94d67d2e768
SHA16c1ec795b0abf5fc8b9e4189f87a425624a28dc5
SHA256452b3537cc4fc77acd5821ecdd33ae372e460a7b571f708fd91a6258d69c0149
SHA5123d1eb3d8b1c56ae5b8d5c82380af4544457bc40c9fc6d6fbbdafc8b4f3d53fda2cbddad5aa983a207a708c596da2f00c1c7305093d3b575f6405d8dd064600a5
-
Filesize
92KB
MD514f6c81cc6c2c225ca6b44ccb3343d70
SHA1263108bc9f60251e094a7d4d216637d6c1f97f79
SHA256f272d65dd3b608bb6a3d16f96a6cc5de00cd8f653c76ee422a6d452e55c67d9c
SHA5127cacbdafb90cbcbb24365b50734de55432dfae8565d89a126453012a1688b4499ca0979b7ba27e89a116610c168a22219109253d4809195c7c6772cc892e6235
-
Filesize
92KB
MD5e61e00f904f561ec9e6574ddec3bb65a
SHA16458b901d065848b44988bff89b8e7933a43d7fc
SHA25625bff93e68ed9086a8effd7c79e01fca7d3ab228b158acd57ebf583d0054e364
SHA51206ee9b0b36de98cceafa938cab3f6523be42a869d4e28ffbb1dcbdcee363eeedbf320923653cc90450d0fb8d14cbaf74768acbe78c7177747f2a637103d043ac
-
Filesize
978KB
MD58e945aaf7128bb3db83e51f3c2356637
SHA1bcc64335efc63cb46e14cc330e105520391e2b00
SHA2564fcf6394b14e24d830b04209a0ede1dcc911d199740a55d12c8ab8aeabb84073
SHA512150636eea0cab3e738f5e94ae910d189622fa3221aca1cecc05bf0f5a80f2fab055adeafd99eab7a2a1d3911ff2784cf521a2681e5ddf7737f4363b915b8c2a8
-
Filesize
36KB
MD5f0284892937a97caa61afcd3b6ddb6d4
SHA1f3c308e7e4aaa96919882994cdd21cc9f939cabd
SHA2562514913f8a6f4671a058304651289b0babe47d81c044212b3140ed1c1b643b09
SHA512058845e0a9a5892a69f24f3a77086e3f9546493ad40a0e5359aed05cf8882a9f3d7aee0449648d5cb76e51530af3e46af59a9b196cc92318334116c92dde4171
-
Filesize
14B
MD50d59c87827537cdd7727d1f0e4d6cce4
SHA16067300c20740cf2899d519382f36c453d9b7fca
SHA256270a9ca2cc8d07c58e43466e95a8aedc7bde468b7b5c0c37845cad5f0d2ab6d2
SHA512324aca54d36574f1a3d7ade872bc5d4bca8b6ae78817cefcf6fe74af51e90f67a808757eb3c84d65c2a8c8e0322cad8b30c83f29e0011c374fd114122ae92d7a
-
Filesize
56B
MD56f10d76e583b39191028ab57f8edbed9
SHA1fbaa6e99f3a88d1e4cd606ca45debed661135c1d
SHA256847f6e3577892365fadc94648eabdde48b9660590ba109e8387a9cb984aee476
SHA51217a2f133b321fb9ac992e03da4ada3b3e5f1e507c7656d287ea00efddc50885c9ea9f337dd6b8cd52015060b4f0f4fc7832a7a3603ed5a3b498d8da47916743c
-
Filesize
200KB
MD5078c21b8c91b86999427aa349cf5decf
SHA1b939376eaebcf6994890db24ddcb2380c1925188
SHA256ed2c6bc3e77a404b8cf61176844ad19c1fdcae19881206631e3f0831a4bd919a
SHA512a006a36fdcaf4c2403238475163553ba2fe7783fea200f28df46ea980a3907d2b24c854153b45b730195a133fcb28f60c157f33c865ea286ad8c354981cf5885
-
Filesize
497KB
MD5c8cf4eb512fadb813f69c3184e4bf44d
SHA1492576912c7c0a224881ea45035a4a9270cd44f2
SHA256678b89a2ca82b0b7803e36601bd6216c7687c4102de7071676390f2c252cb1fb
SHA512006665dcf7cd8ad83f8b5c06c2ec9367ee8caa01c3c1cb9502bd540ac9940d103b84f6620ef8b5aa8e78fbe268994c0d8da5fa7ba550e1c8bd038fd1e43d39dc
-
Filesize
21KB
MD5da08e194f9a7045dbb19f6e5d5d7f609
SHA17884062382bf1e7911f7e74198ca9fecec159c61
SHA2569bd52ec7e7750500de33df995fcc7e68ed1da70d125579cf76ae8f787577ef75
SHA51246720cd0677064b00a9e253953b8b6cd5141a99d0090ff0d7c4a24b830ca621878bcdfec3c56880f940662bd78f408782231bdd3cb370e06dadfee71e3e2b2b0
-
Filesize
13KB
MD537aa892a6f35bcbe9b01f0a424f5d4f6
SHA1e5d60e43a8e0a4b7371bd736e21b1a59546774af
SHA2566feeb95115d7d8a51403996fee1ad219a52151662d3a01a2d17cfb77dbd51f3b
SHA512a5d5ac494cba18bb5b2582310416dc2e146732ba4f2eddab6611393d61ac0ae839bacae0da1e85f0965575e6d6284b1180e2e3adb924f1e19d2d7586d2abbd83
-
Filesize
588KB
MD5a9941233b9415b479d3b4f3732161eab
SHA1cb2d99af52b3b1c712943b13e45d85c80c732e57
SHA256ce34cc14e8d26119e1bf28a3a8368da6e10d13851004e2675976c5ad58b122e2
SHA512cfd6c425587e5e7c57b6f4655e2a48c871313e2bacf63cc0955ccae1a384610644f26aa76bee0a2a327cd77c2ae7def8ea9cb0c7c7c87fab1c8196bac82037f7
-
Filesize
1.3MB
MD584ba3c0d3d383c2676810494a7b5d4d4
SHA151dc4edee8e6d061dddf557861655079bb568308
SHA2561dce1e3cef651f20cad4f096997407db5b5837b60a52b0abb8ad4c087b6a02e0
SHA5126246e29c25c45258a2f244cb31991202d1b57e9309521296787b90d1662b3e9dd14d27cdd5557fbab39b66e18bbb63c9bf346091d0bf2dcfc798745ce030d079
-
Filesize
2KB
MD52fb0e2243f744a8f61e0999da4e4b18a
SHA1da2f1b24a8b06eb747b75cecc5e852bfb0e62579
SHA256f0cfe53234426f576986a74a06801cc3bf4bac63aaf56ecbc6cbd01b0876321f
SHA512875f14d767ac34087265ed6433229febad1f7dc2b739329ad2f447deec22ab726b71235e6cd941988376017e56bc7e5f22a4ef829300beb17ba4e3744ca910e3
-
Filesize
12.8MB
MD5eef06e0bac518bd09f8c8140d0876ddd
SHA1dc7a19331d09c19d000cfeb2833da15377a9fc9c
SHA256d6b2cfe9887d7f50c58e350c98078b08696a2b0d85ed1cad3b0fcb19c0a7b67a
SHA512e9f73ebada4c159207b98fe7fd71c25270922de58b83063eb04e665f1072feb6edafb5268f44fcf78fdb9e141fc5ec5cdb76216fd87b12274c151f8af20501f4
-
\??\Volume{973b34ea-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{225e2e62-f616-453f-898a-e2ff908072e1}_OnDiskSnapshotProp
Filesize6KB
MD522edb30de947e9aad302ab44688679b2
SHA1d26195eba8644fe048d3cb2717723bce6f2ec181
SHA256cfba95fe6dff97d16abbeb1c5890179316c1f94956fa924f2fb71fcffd6feb06
SHA5127f8c1cf1b99aa02e5b07a9d0652dd06d888685446f907cdfc3690e24d86fc0bf3da8bc3ae37897a17e9911052f2418151fafd9beb99d5dd7b37ae4c1346e1aa6