Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 06:36
Static task
static1
Behavioral task
behavioral1
Sample
9657c7e89fc7dca791092e022d768bb327cd31aa0e1bf8b5f578e54aaa5931b2.msi
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9657c7e89fc7dca791092e022d768bb327cd31aa0e1bf8b5f578e54aaa5931b2.msi
Resource
win10v2004-20241007-en
General
-
Target
9657c7e89fc7dca791092e022d768bb327cd31aa0e1bf8b5f578e54aaa5931b2.msi
-
Size
72.5MB
-
MD5
0582fe0c2148ce8bd5147fb693fcd960
-
SHA1
02b41250310a884183e40a6c8deafd79767598de
-
SHA256
9657c7e89fc7dca791092e022d768bb327cd31aa0e1bf8b5f578e54aaa5931b2
-
SHA512
5e11202d0c9d3364999eed294b29e42eefcea390556243e8daeda5ef4c5bc6a7a76903c0fd454c2ac9818c9f27bbcabceaf7c56e42c86eab09964e65ad70579c
-
SSDEEP
1572864:CMBHZT3KoUdum8uI/b3BxxSWmEcGB6SxhZt3kDpXMKFzMR7KJDj7o:CMV5Ko0NIjBv2Sxzt0Dp8oz1Dj7
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0007000000023c94-79.dat purplefox_rootkit behavioral2/memory/4652-84-0x000001B2B8B80000-0x000001B2B8E5D000-memory.dmp purplefox_rootkit -
Purplefox family
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1364 set thread context of 4652 1364 down.exe 111 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\tsetup-x64.5.7.2\tsetup-x64.5.7.2\tsetup-x64.5.7.2\tsetup-x64.5.7.2.exe msiexec.exe File created C:\Program Files (x86)\tsetup-x64.5.7.2\tsetup-x64.5.7.2\tsetup-x64.5.7.2\SCREENCAP_1.1.1.5_zzpdf.exe msiexec.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File created C:\Windows\Installer\e580460.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI4CD.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI6F2.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{5F6987D3-5D9F-4F81-9749-FE8D8A18BD71} msiexec.exe File opened for modification C:\Windows\Installer\MSIAEB.tmp msiexec.exe File opened for modification C:\Windows\Installer\e580460.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI50D.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe -
Executes dropped EXE 4 IoCs
pid Process 1364 down.exe 1816 down.exe 4656 tsetup-x64.5.7.2.exe 3412 tsetup-x64.5.7.2.tmp -
Loads dropped DLL 19 IoCs
pid Process 4480 MsiExec.exe 4480 MsiExec.exe 4480 MsiExec.exe 4480 MsiExec.exe 4480 MsiExec.exe 4480 MsiExec.exe 2700 MsiExec.exe 2700 MsiExec.exe 3476 MsiExec.exe 3476 MsiExec.exe 1364 down.exe 1364 down.exe 1364 down.exe 1364 down.exe 1816 down.exe 1816 down.exe 1816 down.exe 1816 down.exe 4480 MsiExec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 3272 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsetup-x64.5.7.2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsetup-x64.5.7.2.tmp -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 0000000004000000a47b29fbd6f9c3720000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000c01200000000ffffffff000000002701010000080000a47b29fb0000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d01200000000000020ed3a000000ffffffff000000000700010000680900a47b29fb000000000000d012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ff3a0000000000000005000000ffffffff000000000700010000f87f1da47b29fb000000000000f0ff3a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000a47b29fb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2172 msiexec.exe 2172 msiexec.exe 3476 MsiExec.exe 3476 MsiExec.exe 3476 MsiExec.exe 3476 MsiExec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3272 msiexec.exe Token: SeIncreaseQuotaPrivilege 3272 msiexec.exe Token: SeSecurityPrivilege 2172 msiexec.exe Token: SeCreateTokenPrivilege 3272 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3272 msiexec.exe Token: SeLockMemoryPrivilege 3272 msiexec.exe Token: SeIncreaseQuotaPrivilege 3272 msiexec.exe Token: SeMachineAccountPrivilege 3272 msiexec.exe Token: SeTcbPrivilege 3272 msiexec.exe Token: SeSecurityPrivilege 3272 msiexec.exe Token: SeTakeOwnershipPrivilege 3272 msiexec.exe Token: SeLoadDriverPrivilege 3272 msiexec.exe Token: SeSystemProfilePrivilege 3272 msiexec.exe Token: SeSystemtimePrivilege 3272 msiexec.exe Token: SeProfSingleProcessPrivilege 3272 msiexec.exe Token: SeIncBasePriorityPrivilege 3272 msiexec.exe Token: SeCreatePagefilePrivilege 3272 msiexec.exe Token: SeCreatePermanentPrivilege 3272 msiexec.exe Token: SeBackupPrivilege 3272 msiexec.exe Token: SeRestorePrivilege 3272 msiexec.exe Token: SeShutdownPrivilege 3272 msiexec.exe Token: SeDebugPrivilege 3272 msiexec.exe Token: SeAuditPrivilege 3272 msiexec.exe Token: SeSystemEnvironmentPrivilege 3272 msiexec.exe Token: SeChangeNotifyPrivilege 3272 msiexec.exe Token: SeRemoteShutdownPrivilege 3272 msiexec.exe Token: SeUndockPrivilege 3272 msiexec.exe Token: SeSyncAgentPrivilege 3272 msiexec.exe Token: SeEnableDelegationPrivilege 3272 msiexec.exe Token: SeManageVolumePrivilege 3272 msiexec.exe Token: SeImpersonatePrivilege 3272 msiexec.exe Token: SeCreateGlobalPrivilege 3272 msiexec.exe Token: SeCreateTokenPrivilege 3272 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3272 msiexec.exe Token: SeLockMemoryPrivilege 3272 msiexec.exe Token: SeIncreaseQuotaPrivilege 3272 msiexec.exe Token: SeMachineAccountPrivilege 3272 msiexec.exe Token: SeTcbPrivilege 3272 msiexec.exe Token: SeSecurityPrivilege 3272 msiexec.exe Token: SeTakeOwnershipPrivilege 3272 msiexec.exe Token: SeLoadDriverPrivilege 3272 msiexec.exe Token: SeSystemProfilePrivilege 3272 msiexec.exe Token: SeSystemtimePrivilege 3272 msiexec.exe Token: SeProfSingleProcessPrivilege 3272 msiexec.exe Token: SeIncBasePriorityPrivilege 3272 msiexec.exe Token: SeCreatePagefilePrivilege 3272 msiexec.exe Token: SeCreatePermanentPrivilege 3272 msiexec.exe Token: SeBackupPrivilege 3272 msiexec.exe Token: SeRestorePrivilege 3272 msiexec.exe Token: SeShutdownPrivilege 3272 msiexec.exe Token: SeDebugPrivilege 3272 msiexec.exe Token: SeAuditPrivilege 3272 msiexec.exe Token: SeSystemEnvironmentPrivilege 3272 msiexec.exe Token: SeChangeNotifyPrivilege 3272 msiexec.exe Token: SeRemoteShutdownPrivilege 3272 msiexec.exe Token: SeUndockPrivilege 3272 msiexec.exe Token: SeSyncAgentPrivilege 3272 msiexec.exe Token: SeEnableDelegationPrivilege 3272 msiexec.exe Token: SeManageVolumePrivilege 3272 msiexec.exe Token: SeImpersonatePrivilege 3272 msiexec.exe Token: SeCreateGlobalPrivilege 3272 msiexec.exe Token: SeCreateTokenPrivilege 3272 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3272 msiexec.exe Token: SeLockMemoryPrivilege 3272 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3272 msiexec.exe 3272 msiexec.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2172 wrote to memory of 4480 2172 msiexec.exe 85 PID 2172 wrote to memory of 4480 2172 msiexec.exe 85 PID 2172 wrote to memory of 4480 2172 msiexec.exe 85 PID 2172 wrote to memory of 3816 2172 msiexec.exe 103 PID 2172 wrote to memory of 3816 2172 msiexec.exe 103 PID 2172 wrote to memory of 2700 2172 msiexec.exe 105 PID 2172 wrote to memory of 2700 2172 msiexec.exe 105 PID 2172 wrote to memory of 2700 2172 msiexec.exe 105 PID 2172 wrote to memory of 3476 2172 msiexec.exe 106 PID 2172 wrote to memory of 3476 2172 msiexec.exe 106 PID 3476 wrote to memory of 1364 3476 MsiExec.exe 108 PID 3476 wrote to memory of 1364 3476 MsiExec.exe 108 PID 1364 wrote to memory of 1816 1364 down.exe 110 PID 1364 wrote to memory of 1816 1364 down.exe 110 PID 1364 wrote to memory of 4652 1364 down.exe 111 PID 1364 wrote to memory of 4652 1364 down.exe 111 PID 1364 wrote to memory of 4652 1364 down.exe 111 PID 4656 wrote to memory of 3412 4656 tsetup-x64.5.7.2.exe 114 PID 4656 wrote to memory of 3412 4656 tsetup-x64.5.7.2.exe 114 PID 4656 wrote to memory of 3412 4656 tsetup-x64.5.7.2.exe 114 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\9657c7e89fc7dca791092e022d768bb327cd31aa0e1bf8b5f578e54aaa5931b2.msi1⤵
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3272
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 962A8F3668521607BBFD803BA31147F3 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4480
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:3816
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 37F1702DAF9417ED474F3EF3B605F4CC2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2700
-
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding ED96FC9B7251623FFEA2ABCC996F50032⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\5502DA52-0C82-4836-AFC8-0000B4427FF2\down.exeC:\Users\Admin\5502DA52-0C82-4836-AFC8-0000B4427FF2\\down.exe3⤵
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\5502DA52-0C82-4836-AFC8-0000B4427FF2\down.exeC:\Users\Admin\5502DA52-0C82-4836-AFC8-0000B4427FF2\down.exe /aut4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1816
-
-
C:\Windows\system32\colorcpl.execolorcpl.exe4⤵PID:4652
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:5084
-
C:\Program Files (x86)\tsetup-x64.5.7.2\tsetup-x64.5.7.2\tsetup-x64.5.7.2\tsetup-x64.5.7.2.exe"C:\Program Files (x86)\tsetup-x64.5.7.2\tsetup-x64.5.7.2\tsetup-x64.5.7.2\tsetup-x64.5.7.2.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\is-EUAP1.tmp\tsetup-x64.5.7.2.tmp"C:\Users\Admin\AppData\Local\Temp\is-EUAP1.tmp\tsetup-x64.5.7.2.tmp" /SL5="$1002BC,45215887,814592,C:\Program Files (x86)\tsetup-x64.5.7.2\tsetup-x64.5.7.2\tsetup-x64.5.7.2\tsetup-x64.5.7.2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD558ba6813fcd2238d2240bb177a6bcc3e
SHA1d5762651df469caca3aa1b672824d8afee8b3bf2
SHA2569bc60743b43ee38338861e37a6df0cc3f8395ba74053005ba4822a036371fe6e
SHA5120b326a8a4d0193a7ffc86eac90ee871f5c03d89cd3a815c1c761d56bd465f593fb28d24930d474f334f65970604d3bdbfa9d2766892511b472668e0ae3b0b7b7
-
Filesize
44.0MB
MD5b74ac113cdbdd62f48cb78c5980861fb
SHA1ecd94979f9b7184b8a7c48bfa07dc84e05f03169
SHA2567a33e0508780f503568a0d6c06280de946d85d66173f18c307236b09df81ba6a
SHA5120194d62a41ac4eff452c597c2e22eb27886abeb681479c00c10f3338d4a8696871715a0963987e8e7496671e572df6c70d722ecacad4a528a1eed11acc90ee5d
-
Filesize
613KB
MD5c1b066f9e3e2f3a6785161a8c7e0346a
SHA18b3b943e79c40bc81fdac1e038a276d034bbe812
SHA25699e3e25cda404283fbd96b25b7683a8d213e7954674adefa2279123a8d0701fd
SHA51236f9e6c86afbd80375295238b67e4f472eb86fcb84a590d8dba928d4e7a502d4f903971827fdc331353e5b3d06616664450759432fdc8d304a56e7dacb84b728
-
Filesize
116KB
MD5e9b690fbe5c4b96871214379659dd928
SHA1c199a4beac341abc218257080b741ada0fadecaf
SHA256a06c9ea4f815dac75d2c99684d433fbfc782010fae887837a03f085a29a217e8
SHA51200cf9b22af6ebbc20d1b9c22fc4261394b7d98ccad4823abc5ca6fdac537b43a00db5b3829c304a85738be5107927c0761c8276d6cb7f80e90f0a2c991dbcd8c
-
Filesize
1.3MB
MD551698f9d781f9ba83b9d1896f047b666
SHA15e28f766d10af39ec28f46f20a8d047474135923
SHA256300776a76cf4faaa2ef0d0928adf0bb9621ae486e316f81af8d71719d9f413cb
SHA512cee9cb3c89b0a7defdc5cc61acc479f94a3e29556c9fec5ede12997cee8b67e780af443fae1f81399274e0602ac9102521e6389422ec9ede49e23647a256e952
-
Filesize
1.2MB
MD5524b5640571507a6440ad71d9ba74742
SHA1ac4e6c573b079abdd824b87d61f2c39d81c43afb
SHA256e0a6674160fb7d16d76a75c8cc17e867c28cd0767d696a814c1d1b70740392f4
SHA5124e21c02fb6323821c76c9bfab550f30864e594b96040be9139e87cfc53e38f3a8ffbea98e06757db22492d8a68f5d7f6c8aec74d41e449c3dab73add3184b251
-
Filesize
48KB
MD5eb49c1d33b41eb49dfed58aafa9b9a8f
SHA161786eb9f3f996d85a5f5eea4c555093dd0daab6
SHA2566d3a6cde6fc4d3c79aabf785c04d2736a3e2fd9b0366c9b741f054a13ecd939e
SHA512d15905a3d7203b00181609f47ce6e4b9591a629f2bf26ff33bf964f320371e06d535912fda13987610b76a85c65c659adac62f6b3176dbca91a01374178cd5c6
-
Filesize
2.5MB
MD516feaeba569c71a83a099bcdbc3da361
SHA1907314e8b8a9b8a61e7eea9af1c466a0e60abb97
SHA256ddf4875f5190ee8f64bf0851675df3ce6c5fb4580422187d704823f762fd733a
SHA512318259c5b317972f1a17cf4717d3d332fd380cecb393312a04f4829b18b90362ec097b13fd3901788440d800dc7f26d30777ed5f418572aa2d39534478cd00c4
-
Filesize
557KB
MD5db7612f0fd6408d664185cfc81bef0cb
SHA119a6334ec00365b4f4e57d387ed885b32aa7c9aa
SHA256e9e426b679b3efb233f03c696e997e2da3402f16a321e954b54454317fceb240
SHA51225e129cb22aaabc68c42ecf10bb650ac4d0609b12c08703c780572bac7ecf4559fcc49cd595c56ea48cf55260a984cfa333c08307ffb7c62268b03fbecc724b9
-
Filesize
3.0MB
MD50801bad9497c7c91e30748f8483dbd01
SHA1fc9c3e236f5735479e9ca2f561fff08e66a406d4
SHA256ed0952742269da0b4419f176d4eac44a4aebd1fb26e91bc628cda7b40d752c21
SHA51259c1828e99b59a7d71961280e785e1fe3c804b02467372cf4a2b8804b58075f8eb135dcf79d0a2e112befca14fb91615f39ac9113ff78f539cb1af6dd86e0ae2
-
Filesize
25KB
MD581902d13c01fd8a187f3a7f2b72d5dd0
SHA10ac01518c5588eb2788730c78f0c581f79cf2ed4
SHA256eef31e9195cfacde7b4e7eb7384c8178d8811063b375fd4a28ae897cc180c6a6
SHA51204d6e2e937328477803084e0ef9da2c3636cdc9d34af74e2d1871d7190be21cbb2771ae835175e104e24eccba52add1ba6f58407bfd522ef82b81d76e977f24c
-
Filesize
2.5MB
MD530bcd4bbebd8869e3c9d45ab6ccc569b
SHA161d6f3c40bf0e79c9014fcd56b9fa15f815ff0b2
SHA256603842b9178b255b621e0b0983d6223c94594732544396c3db695c9e26628ed2
SHA512660213e9178b4856e7c985e8f4e73f20d7de5bd5480ae0c587ffb8cc6172e1ea7e325b8844816f91a235e5ad83cd501d6bc9b0d76d1e9f8352d0b8856d126765
-
Filesize
24.1MB
MD59d45f1121124599ad19ffa7a84a796e8
SHA18b68b169bfd3e47bc9c8856fa87a36e837d39c01
SHA2560abb45981637f35e07a355c7e9fd934a0c844a7e0d47b5cdf98104577ef86f5f
SHA512f7d5fd6847b0309626d0903b343d39ffe8c1657e4db4f4daa183d521497a31f1297763469b54c42f098f45e7b5403fdc69b2bcd9d40f8f5f7ab74c4e3785bafc
-
\??\Volume{fb297ba4-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{d9d011a1-688f-4da1-98a2-8c1339452680}_OnDiskSnapshotProp
Filesize6KB
MD5d91c7c4beb18ce42d2b7728d02dfb83f
SHA134d1a41166856603cff81a4cf9fc0806515cdcb2
SHA256736a79a00cd22991a771f6f1138e24ac44295d1df5ed0f85954542015592c1e6
SHA51297323668d57720be9ebfc7fbac719c7482f79cac1077c0072a4a40caaee19a4bf9f5efde15f61545caafece3b24077fb6a764e52d73911053f92c497e28d45d3