Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 10:06
Static task
static1
Behavioral task
behavioral1
Sample
afbdaa974cdc9624fe94b5c0ca6ce01695570790a68cc9c86ea0619973f13d07.msi
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
afbdaa974cdc9624fe94b5c0ca6ce01695570790a68cc9c86ea0619973f13d07.msi
Resource
win10v2004-20241007-en
General
-
Target
afbdaa974cdc9624fe94b5c0ca6ce01695570790a68cc9c86ea0619973f13d07.msi
-
Size
2.9MB
-
MD5
d87cc5fb2d4047d442446cc6d2d01cf9
-
SHA1
8d2c76bb8248b1c8171c4cc198255d5613afe6fe
-
SHA256
afbdaa974cdc9624fe94b5c0ca6ce01695570790a68cc9c86ea0619973f13d07
-
SHA512
542e85c82bb770f8e4c6415597330d541be2a21c1e95f83c9e57db5df123255be831f4beab56f7211dd1b7c3823838ce3526fa16ae81f5d9bf4767ab46217333
-
SSDEEP
49152:NiSoOl+YyNuCClJkqr6zeM4I/157fW8KvSu784p0mKZ+nYxgrFUhmnb+t1cVDUqb:Nt7+YJCCvkP4Id59Kvv8KGZgYyyuqtUF
Malware Config
Signatures
-
SectopRAT payload 1 IoCs
resource yara_rule behavioral2/memory/1820-107-0x0000000000900000-0x00000000009C6000-memory.dmp family_sectoprat -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\N: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 59 pastebin.com 60 pastebin.com -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4300 set thread context of 5028 4300 ManyCam.exe 109 PID 5028 set thread context of 1820 5028 cmd.exe 120 -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\Installer\SourceHash{39F520E4-6237-4FBB-8F2E-71C60962EC87} msiexec.exe File opened for modification C:\Windows\Installer\MSIE000.tmp msiexec.exe File created C:\Windows\Installer\e57df27.msi msiexec.exe File created C:\Windows\Installer\e57df25.msi msiexec.exe File opened for modification C:\Windows\Installer\e57df25.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe -
Executes dropped EXE 2 IoCs
pid Process 3352 ManyCam.exe 4300 ManyCam.exe -
Loads dropped DLL 18 IoCs
pid Process 3352 ManyCam.exe 3352 ManyCam.exe 3352 ManyCam.exe 3352 ManyCam.exe 3352 ManyCam.exe 3352 ManyCam.exe 3352 ManyCam.exe 3352 ManyCam.exe 3352 ManyCam.exe 4300 ManyCam.exe 4300 ManyCam.exe 4300 ManyCam.exe 4300 ManyCam.exe 4300 ManyCam.exe 4300 ManyCam.exe 4300 ManyCam.exe 4300 ManyCam.exe 4300 ManyCam.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 2468 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ManyCam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ManyCam.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CentralProcessor\0\ ManyCam.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ManyCam.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CentralProcessor\0\ ManyCam.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ManyCam.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 964 msiexec.exe 964 msiexec.exe 3352 ManyCam.exe 4300 ManyCam.exe 4300 ManyCam.exe 4300 ManyCam.exe 5028 cmd.exe 5028 cmd.exe 5028 cmd.exe 5028 cmd.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4300 ManyCam.exe 5028 cmd.exe 5028 cmd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2468 msiexec.exe Token: SeIncreaseQuotaPrivilege 2468 msiexec.exe Token: SeSecurityPrivilege 964 msiexec.exe Token: SeCreateTokenPrivilege 2468 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2468 msiexec.exe Token: SeLockMemoryPrivilege 2468 msiexec.exe Token: SeIncreaseQuotaPrivilege 2468 msiexec.exe Token: SeMachineAccountPrivilege 2468 msiexec.exe Token: SeTcbPrivilege 2468 msiexec.exe Token: SeSecurityPrivilege 2468 msiexec.exe Token: SeTakeOwnershipPrivilege 2468 msiexec.exe Token: SeLoadDriverPrivilege 2468 msiexec.exe Token: SeSystemProfilePrivilege 2468 msiexec.exe Token: SeSystemtimePrivilege 2468 msiexec.exe Token: SeProfSingleProcessPrivilege 2468 msiexec.exe Token: SeIncBasePriorityPrivilege 2468 msiexec.exe Token: SeCreatePagefilePrivilege 2468 msiexec.exe Token: SeCreatePermanentPrivilege 2468 msiexec.exe Token: SeBackupPrivilege 2468 msiexec.exe Token: SeRestorePrivilege 2468 msiexec.exe Token: SeShutdownPrivilege 2468 msiexec.exe Token: SeDebugPrivilege 2468 msiexec.exe Token: SeAuditPrivilege 2468 msiexec.exe Token: SeSystemEnvironmentPrivilege 2468 msiexec.exe Token: SeChangeNotifyPrivilege 2468 msiexec.exe Token: SeRemoteShutdownPrivilege 2468 msiexec.exe Token: SeUndockPrivilege 2468 msiexec.exe Token: SeSyncAgentPrivilege 2468 msiexec.exe Token: SeEnableDelegationPrivilege 2468 msiexec.exe Token: SeManageVolumePrivilege 2468 msiexec.exe Token: SeImpersonatePrivilege 2468 msiexec.exe Token: SeCreateGlobalPrivilege 2468 msiexec.exe Token: SeBackupPrivilege 216 vssvc.exe Token: SeRestorePrivilege 216 vssvc.exe Token: SeAuditPrivilege 216 vssvc.exe Token: SeBackupPrivilege 964 msiexec.exe Token: SeRestorePrivilege 964 msiexec.exe Token: SeRestorePrivilege 964 msiexec.exe Token: SeTakeOwnershipPrivilege 964 msiexec.exe Token: SeRestorePrivilege 964 msiexec.exe Token: SeTakeOwnershipPrivilege 964 msiexec.exe Token: SeRestorePrivilege 964 msiexec.exe Token: SeTakeOwnershipPrivilege 964 msiexec.exe Token: SeRestorePrivilege 964 msiexec.exe Token: SeTakeOwnershipPrivilege 964 msiexec.exe Token: SeRestorePrivilege 964 msiexec.exe Token: SeTakeOwnershipPrivilege 964 msiexec.exe Token: SeRestorePrivilege 964 msiexec.exe Token: SeTakeOwnershipPrivilege 964 msiexec.exe Token: SeRestorePrivilege 964 msiexec.exe Token: SeTakeOwnershipPrivilege 964 msiexec.exe Token: SeRestorePrivilege 964 msiexec.exe Token: SeTakeOwnershipPrivilege 964 msiexec.exe Token: SeRestorePrivilege 964 msiexec.exe Token: SeTakeOwnershipPrivilege 964 msiexec.exe Token: SeRestorePrivilege 964 msiexec.exe Token: SeTakeOwnershipPrivilege 964 msiexec.exe Token: SeRestorePrivilege 964 msiexec.exe Token: SeTakeOwnershipPrivilege 964 msiexec.exe Token: SeRestorePrivilege 964 msiexec.exe Token: SeTakeOwnershipPrivilege 964 msiexec.exe Token: SeRestorePrivilege 964 msiexec.exe Token: SeTakeOwnershipPrivilege 964 msiexec.exe Token: SeRestorePrivilege 964 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2468 msiexec.exe 2468 msiexec.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 964 wrote to memory of 4132 964 msiexec.exe 101 PID 964 wrote to memory of 4132 964 msiexec.exe 101 PID 964 wrote to memory of 3352 964 msiexec.exe 104 PID 964 wrote to memory of 3352 964 msiexec.exe 104 PID 964 wrote to memory of 3352 964 msiexec.exe 104 PID 3352 wrote to memory of 1052 3352 ManyCam.exe 106 PID 3352 wrote to memory of 1052 3352 ManyCam.exe 106 PID 3352 wrote to memory of 4300 3352 ManyCam.exe 107 PID 3352 wrote to memory of 4300 3352 ManyCam.exe 107 PID 3352 wrote to memory of 4300 3352 ManyCam.exe 107 PID 4300 wrote to memory of 4924 4300 ManyCam.exe 108 PID 4300 wrote to memory of 4924 4300 ManyCam.exe 108 PID 4300 wrote to memory of 5028 4300 ManyCam.exe 109 PID 4300 wrote to memory of 5028 4300 ManyCam.exe 109 PID 4300 wrote to memory of 5028 4300 ManyCam.exe 109 PID 4300 wrote to memory of 5028 4300 ManyCam.exe 109 PID 5028 wrote to memory of 1820 5028 cmd.exe 120 PID 5028 wrote to memory of 1820 5028 cmd.exe 120 PID 5028 wrote to memory of 1820 5028 cmd.exe 120 PID 5028 wrote to memory of 1820 5028 cmd.exe 120 PID 5028 wrote to memory of 1820 5028 cmd.exe 120 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\afbdaa974cdc9624fe94b5c0ca6ce01695570790a68cc9c86ea0619973f13d07.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2468
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:4132
-
-
C:\Users\Admin\AppData\Local\Ormolu\ManyCam.exe"C:\Users\Admin\AppData\Local\Ormolu\ManyCam.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\system32\pcaui.exe"C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {bce4b583-343f-44b8-8f95-9f76104077b9} -a "ManyCam" -v "ManyCam LLC" -s "To work properly, this app must be reinstalled after you upgrade Windows." -n 4 -f 0 -k 0 -e "C:\Users\Admin\AppData\Local\Ormolu\ManyCam.exe"3⤵PID:1052
-
-
C:\Users\Admin\AppData\Roaming\demoArchivebcz\ManyCam.exeC:\Users\Admin\AppData\Roaming\demoArchivebcz\ManyCam.exe3⤵
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\system32\pcaui.exe"C:\Windows\system32\pcaui.exe" -g {11111111-1111-1111-1111-111111111111} -x {bce4b583-343f-44b8-8f95-9f76104077b9} -a "ManyCam" -v "ManyCam LLC" -s "To work properly, this app must be reinstalled after you upgrade Windows." -n 4 -f 0 -k 0 -e "C:\Users\Admin\AppData\Roaming\demoArchivebcz\ManyCam.exe"4⤵PID:4924
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe5⤵
- System Location Discovery: System Language Discovery
PID:1820
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5dcfd88aedcdb26470495adb8face64d2
SHA1861b993386c40b1a1703725532d68300a273b87b
SHA2564907f108a0f9de6e4dce6b19cab1acd8e8a365511fc21468ddab7dd61b84cf12
SHA51240a42dbdf93db3af2b037a8a687880e37a0793c915085abd4aea008f714a1d055a648ea86601db0572d2636186fa11c87ce0108515d49157fcbf39981e3b1c22
-
Filesize
121KB
MD5b2d1f5e4a1f0e8d85f0a8aeb7b8148c7
SHA1871078213fcc0ce143f518bd69caa3156b385415
SHA256c28e0aec124902e948c554436c0ebbebba9fc91c906ce2cd887fada0c64e3386
SHA5121f6d97e02cd684cf4f4554b0e819196bd2811e19b964a680332268bcbb6dee0e17b2b35b6e66f0fe5622dffb0a734f39f8e49637a38e4fe7f10d3b5182b30260
-
Filesize
1.7MB
MD5ba699791249c311883baa8ce3432703b
SHA1f8734601f9397cb5ebb8872af03f5b0639c2eac6
SHA2567c4eb51a737a81c163f95b50ec54518b82fcf91389d0560e855f3e26cec07282
SHA5126a0386424c61fbf525625ebe53bb2193accd51c2be9a2527fd567d0a6e112b0d1a047d8f7266d706b726e9c41ea77496e1ede186a5e59f5311eeea829a302325
-
Filesize
664KB
MD52a8b33fee2f84490d52a3a7c75254971
SHA116ce2b1632a17949b92ce32a6211296fee431dca
SHA256faff6a0745e1720413a028f77583fff013c3f4682756dc717a0549f1be3fefc2
SHA5128daf104582547d6b3a6d8698836e279d88ad9a870e9fdd66c319ecada3757a3997f411976461ed30a5d24436baa7504355b49d4acec2f7cdfe10e1e392e0f7fb
-
Filesize
908KB
MD5286284d4ae1c67d0d5666b1417dcd575
SHA18b8a32577051823b003c78c86054874491e9ecfa
SHA25637d9a8057d58b043ad037e9905797c215cd0832d48a29731c1687b23447ce298
SHA5122efc47a8e104baa13e19bee3b3b3364da09cea80601bc87492de348f1c8d61008002540ba8f0df99b2d20e333d09ea8e097a87c97e91910d7d592d11a953917a
-
Filesize
487KB
MD5c36f6e088c6457a43adb7edcd17803f3
SHA1b25b9fb4c10b8421c8762c7e7b3747113d5702de
SHA2568e1243454a29998cc7dc89caecfadc0d29e00e5776a8b5777633238b8cd66f72
SHA51287cad4c3059bd7de02338922cf14e515af5cad663d473b19dd66a4c8befc8bce61c9c2b5a14671bc71951fdff345e4ca7a799250d622e2c9236ec03d74d4fe4e
-
Filesize
478KB
MD5aa1594596fa19609555e317d9b64be6a
SHA1924b08d85b537be52142965c3ad33c01b457ea83
SHA2565139413ea54dee9ec4f13b193d88ccae9adb8f0d8c1e2ba1aee460d8a0d5bb79
SHA512759209846039d1efb2f6ddf3501f1f868989e81752bb7d617afd9fd4238c52162167b1a1732ec81bdfce469856c78439cc7c8d173b1f48de499dfee725b192dc
-
Filesize
51KB
MD5b590c33dd2a4c8ddedda46028181a405
SHA1b0949a3396d84b8e4dca5d5026eb3b6c0679f7e3
SHA256862aadcb096647394a5f6f5e646bf57b52567180505b6026e59539f6ded1eaa8
SHA512e72b33ca405b551532a855a74f99aab1850756cbaefb9421d6e480e719b6ceead1d728dbc786d76d91532f0bbdcc241039dac35479bf90f7d2d665c6ab9f8da7
-
Filesize
388KB
MD5a354c42fcb37a50ecad8dde250f6119e
SHA10eb4ad5e90d28a4a8553d82cec53072279af1961
SHA25689db6973f4ec5859792bcd8a50cd10db6b847613f2cea5adef740eec141673b2
SHA512981c82f6334961c54c80009b14a0c2cd48067baf6d502560d508be86f5185374a422609c7fdc9a2cde9b98a7061efab7fd9b1f4f421436a9112833122bc35059
-
Filesize
1.2MB
MD52139118b4760969b3a7df8d1abf9c26f
SHA1a076ee81fac8df2508e72c918ff2ad45d8bf8281
SHA256f2158d2632256e1e8d6cd855937ff9b3d8ac738d993fb0be976880a8692d76eb
SHA5125104382aa96d6c5d3c3b2a43ef465b1d690ef59ca4660fc026943b7c44cafb0bc569031a66ef9c10cbd119eb361b3b84fb7c190ba28c2588c34cd9c6472c0833
-
Filesize
1.4MB
MD5a53e94150bbc8b7682ae105e9a105acf
SHA11bd6677bdbf42abbf45c9d1577dcad0d439e46fb
SHA2568f6b8a1608553019377bdd9aadfd78a24b1c2ad3f58c91a245dc167a53101994
SHA5129e1d87f9025c8d248dfb6a775376c902f08059c4fc766ca85f8b5464f331d7e76d9446592b5b702ee7b5525a0bca4297adfba490df3a8df184bfeb9a75181559
-
Filesize
2.9MB
MD5d87cc5fb2d4047d442446cc6d2d01cf9
SHA18d2c76bb8248b1c8171c4cc198255d5613afe6fe
SHA256afbdaa974cdc9624fe94b5c0ca6ce01695570790a68cc9c86ea0619973f13d07
SHA512542e85c82bb770f8e4c6415597330d541be2a21c1e95f83c9e57db5df123255be831f4beab56f7211dd1b7c3823838ce3526fa16ae81f5d9bf4767ab46217333
-
Filesize
24.1MB
MD5dd59d92c830382d9ad5abe93b0d436ce
SHA1e627727bcd284551d05a5dc9b4c6d40411609148
SHA2566f79622e4a42013bf22eb4f7051d1b941b4bc7cf97f10b48d8f91de572160e8d
SHA512c55d02dfa2e5e656121f602332e89259387dd1db725e3bc62a111545296fc06319849b08d020f3290903d71f1793e6a7b38aa86be06f74862489df2e16579e57
-
\??\Volume{fb297ba4-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{536465ed-e7e2-4aec-b437-48bf927b1b38}_OnDiskSnapshotProp
Filesize6KB
MD502bd0cab3a11df77c58e6960ea3eac9f
SHA13c5c789c9dfa0eb6f427f920ae1d5f895bdf3a8e
SHA256de89c22256b8a64762b066b817de5ae4699025ef8f867ac9317e2f271a192283
SHA5125d7e3dd798042f01483700b99d55a3bff21e2e0617b44234ff480c937a71f03a027965f859901fda4f23d347193bb0a1bed9c2b0cc8e5e0b96b66bfbd22b69f0