Overview
overview
8Static
static
Document.zip
windows7-x64
1Document.zip
windows10-2004-x64
1file.iso
windows7-x64
3file.iso
windows10-2004-x64
3Document.lnk
windows7-x64
3Document.lnk
windows10-2004-x64
3file.bat
windows7-x64
8file.bat
windows10-2004-x64
8file.js
windows7-x64
8file.js
windows10-2004-x64
8uu.msi
windows7-x64
8uu.msi
windows10-2004-x64
8Analysis
-
max time kernel
601s -
max time network
586s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2022 18:04
Static task
static1
Behavioral task
behavioral1
Sample
Document.zip
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Document.zip
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
file.iso
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
file.iso
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
Document.lnk
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
Document.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
file.bat
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
file.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
file.js
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
file.js
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
uu.msi
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
uu.msi
Resource
win10v2004-20220812-en
General
-
Target
uu.msi
-
Size
5.9MB
-
MD5
5a35d1da14c8bddf7fecfaefbf76a1b4
-
SHA1
536bddcecfec95b7c987fb9e248ba7c7da9b8944
-
SHA256
9fad7afeb555c95ba4f55ac3238e88eb098c7f9f1ab1796c930c5de54634801e
-
SHA512
e322b04665d46028c8167ada14c1bae8bd53eed04146f93406d01d4a9bd3a7204ac6e14a4bcb6a2e40b5bcef15f04c18542df084f019f4682461050288da735e
-
SSDEEP
98304:GAC9AGDm8MytOY9woKC4BDBwWlKylZ/FxCeMxlGV9GZRik9VI5TMwGP2KEgT:w9mzytc/CKDllTllCeue6STzAT
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 1 4756 msiexec.exe 3 4756 msiexec.exe 5 4756 msiexec.exe 9 4756 msiexec.exe 11 4756 msiexec.exe -
Downloads MZ/PE file
-
Executes dropped EXE 14 IoCs
pid Process 2848 Installer.exe 3188 Syncro.Installer.exe 1340 Syncro.Service.Runner.exe 3840 Syncro.App.Runner.exe 788 tmpB614.tmp.SyncroLive.Installer-latest.exe 4576 tmpB614.tmp.SyncroLive.Installer-latest.tmp 3668 Syncro.Overmind.Service.exe 4040 7za.exe 1708 7za.exe 2332 7za.exe 444 SyncroLive.Service.Runner.exe 1028 SyncroLive.Service.Runner.exe 4956 SyncroLive.Agent.Runner.exe 4916 Syncro.Overmind.Service.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SyncroLive\ImagePath = "\"C:\\Program Files\\RepairTech\\LiveAgent\\SyncroLive.Service.Runner.exe\" -displayname \"SyncroLive\" -servicename \"SyncroLive\"" SyncroLive.Service.Runner.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SyncroOvermind\ImagePath = "\"C:\\ProgramData\\Syncro\\bin\\Syncro.Overmind.Service.exe\" -displayname \"SyncroRecovery\" -servicename \"SyncroOvermind\"" Syncro.Overmind.Service.exe -
Loads dropped DLL 1 IoCs
pid Process 4956 SyncroLive.Agent.Runner.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft Syncro.Overmind.Service.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_E6095CD2AECC9011BCD0D7B421356B17 Syncro.Overmind.Service.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_E6095CD2AECC9011BCD0D7B421356B17 Syncro.Overmind.Service.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D7833C286363AD25C70511661A83D581_52894DBA51C2BA5ACE3EE5577FB04C4C Syncro.Overmind.Service.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D7833C286363AD25C70511661A83D581_52894DBA51C2BA5ACE3EE5577FB04C4C Syncro.Overmind.Service.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache Syncro.Overmind.Service.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData Syncro.Overmind.Service.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E Syncro.Overmind.Service.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content Syncro.Overmind.Service.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E Syncro.Overmind.Service.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\SyncroLive.Service.Runner.exe.log SyncroLive.Service.Runner.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Syncro.Overmind.Service.exe.log Syncro.Overmind.Service.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\RepairTech\Syncro\app-1.0.168\Flurl.Http.dll Syncro.Installer.exe File created C:\Program Files\RepairTech\Syncro\app-1.0.168\MetroFramework.dll Syncro.Installer.exe File opened for modification C:\Program Files\RepairTech\Syncro\app-1.0.168\da-DK\Syncro.App.resources.dll Syncro.Installer.exe File created C:\Program Files\RepairTech\Syncro\app-1.0.168\ja-JP\Syncro.App.resources.dll Syncro.Installer.exe File created C:\Program Files\RepairTech\Syncro\app-1.0.168\Syncro.Contracts.dll.config Syncro.Installer.exe File created C:\Program Files\RepairTech\Syncro\app-1.0.168\Telerik.Windows.Controls.dll Syncro.Installer.exe File created C:\Program Files\RepairTech\Syncro\app-1.0.168\zh-Hant\System.Spatial.resources.dll Syncro.Installer.exe File opened for modification C:\Program Files\RepairTech\LiveAgent\app-0.0.62\deniszykov.WebSocketListener.dll 7za.exe File opened for modification C:\Program Files\RepairTech\LiveAgent\app-0.0.62\Destructurama.Attributed.dll 7za.exe File opened for modification C:\Program Files\RepairTech\LiveAgent\app-0.0.62\Serilog.Sinks.Console.dll 7za.exe File created C:\Program Files\RepairTech\Syncro\app-1.0.168\ja\Microsoft.Data.Services.Client.resources.dll Syncro.Installer.exe File opened for modification C:\Program Files\RepairTech\Syncro\app-1.0.168\ja\System.Spatial.resources.dll Syncro.Installer.exe File created C:\Program Files\RepairTech\LiveAgent\packages\is-6PTK9.tmp tmpB614.tmp.SyncroLive.Installer-latest.tmp File opened for modification C:\Program Files\RepairTech\LiveAgent\app-0.0.62\Flurl.dll 7za.exe File opened for modification C:\Program Files\RepairTech\LiveAgent\app-0.0.62\Microsoft.Data.OData.dll 7za.exe File opened for modification C:\Program Files\RepairTech\LiveAgent\app-0.0.62\Microsoft.Web.XmlTransform.dll 7za.exe File created C:\Program Files\RepairTech\Syncro\app-1.0.168\7za-x86.dll Syncro.Installer.exe File opened for modification C:\Program Files\RepairTech\Syncro\install.bat Syncro.Installer.exe File opened for modification C:\Program Files\RepairTech\Syncro\app-1.0.168\Flurl.dll Syncro.Installer.exe File created C:\Program Files\RepairTech\Syncro\app-1.0.168\ru\System.Spatial.resources.dll Syncro.Installer.exe File created C:\Program Files\RepairTech\Syncro\app-1.0.168\Syncro.Service.exe Syncro.Installer.exe File opened for modification C:\Program Files\RepairTech\LiveAgent\app-0.0.62\SyncroLive.Agent.Runner.exe 7za.exe File opened for modification C:\Program Files\RepairTech\Syncro\app-1.0.168\fr\Microsoft.Data.OData.resources.dll Syncro.Installer.exe File created C:\Program Files\RepairTech\Syncro\app-1.0.168\System.Security.Cryptography.Algorithms.dll Syncro.Installer.exe File opened for modification C:\Program Files\RepairTech\Syncro\app-1.0.168\zh-Hant\Microsoft.Data.Edm.resources.dll Syncro.Installer.exe File created C:\Program Files\RepairTech\LiveAgent\app-0.0.62\Destructurama.Attributed.dll 7za.exe File created C:\Program Files\RepairTech\LiveAgent\app-0.0.62\SyncroLive.WindowsInput.dll 7za.exe File created C:\Program Files\RepairTech\Syncro\app-1.0.168\ko\Microsoft.Data.OData.resources.dll Syncro.Installer.exe File opened for modification C:\Program Files\RepairTech\Syncro\app-1.0.168\Telerik.Windows.Data.dll Syncro.Installer.exe File created C:\Program Files\RepairTech\Syncro\app-1.0.168\es\System.Spatial.resources.dll Syncro.Installer.exe File opened for modification C:\Program Files\RepairTech\Syncro\app-1.0.168\FluentCommandLineParser.dll Syncro.Installer.exe File created C:\Program Files\RepairTech\Syncro\app-1.0.168\it\System.Spatial.resources.dll Syncro.Installer.exe File opened for modification C:\Program Files\RepairTech\Syncro\app-1.0.168\ja\Microsoft.Data.Edm.resources.dll Syncro.Installer.exe File opened for modification C:\Program Files\RepairTech\Syncro\app-1.0.168\Microsoft.Data.OData.dll Syncro.Installer.exe File opened for modification C:\Program Files\RepairTech\Syncro\app-1.0.168\Phoenix.dll Syncro.Installer.exe File created C:\Program Files\RepairTech\Syncro\app-1.0.168\RestSharp.dll Syncro.Installer.exe File opened for modification C:\Program Files\RepairTech\Syncro\app-1.0.168\Syncro.Tools.dll Syncro.Installer.exe File created C:\Program Files\RepairTech\Syncro\app-1.0.168\System.Runtime.dll Syncro.Installer.exe File created C:\Program Files\RepairTech\LiveAgent\app-0.0.62\Newtonsoft.Json.dll 7za.exe File opened for modification C:\Program Files\RepairTech\LiveAgent\app-0.0.62\RepairTech.Common.Tools.dll 7za.exe File created C:\Program Files\RepairTech\LiveAgent\app-0.0.62\Serilog.Sinks.Literate.dll 7za.exe File opened for modification C:\Program Files\RepairTech\LiveAgent\app-0.0.62\System.Runtime.dll 7za.exe File opened for modification C:\Program Files\RepairTech\Syncro\app-1.0.168\en\Syncro.App.resources.dll Syncro.Installer.exe File created C:\Program Files\RepairTech\Syncro\app-1.0.168\es\Microsoft.Data.OData.resources.dll Syncro.Installer.exe File opened for modification C:\Program Files\RepairTech\Syncro\app-1.0.168\zh-Hans\Microsoft.Data.OData.resources.dll Syncro.Installer.exe File opened for modification C:\Program Files\RepairTech\Syncro\app-1.0.168\zh-Hant\System.Spatial.resources.dll Syncro.Installer.exe File opened for modification C:\Program Files\RepairTech\LiveAgent\app-0.0.62\DeltaCompressionDotNet.dll 7za.exe File created C:\Program Files\RepairTech\LiveAgent\app-0.0.62\System.Numerics.Vectors.dll 7za.exe File opened for modification C:\Program Files\RepairTech\LiveAgent\app-0.0.62\SystemWrapper.dll 7za.exe File opened for modification C:\Program Files\RepairTech\LiveAgent\app-0.0.62\UrlCombineLib.dll 7za.exe File opened for modification C:\Program Files\RepairTech\Syncro\app-1.0.168\ja-JP\Syncro.App.resources.dll Syncro.Installer.exe File opened for modification C:\Program Files\RepairTech\Syncro\app-1.0.168\ko\Microsoft.Data.Services.Client.resources.dll Syncro.Installer.exe File created C:\Program Files\RepairTech\Syncro\app-1.0.168\RepairTech.Common.Tools.dll Syncro.Installer.exe File opened for modification C:\Program Files\RepairTech\Syncro\app-1.0.168\Serilog.Sinks.Literate.dll Syncro.Installer.exe File created C:\Program Files\RepairTech\Syncro\app-1.0.168\SystemInterface.dll Syncro.Installer.exe File created C:\Program Files\RepairTech\LiveAgent\app-0.0.62\FluentCommandLineParser.dll 7za.exe File created C:\Program Files\RepairTech\LiveAgent\app-0.0.62\Flurl.dll 7za.exe File opened for modification C:\Program Files\RepairTech\LiveAgent\app-0.0.62\System.Numerics.Vectors.dll 7za.exe File opened for modification C:\Program Files\RepairTech\Syncro\app-1.0.168\ko\Microsoft.Data.Edm.resources.dll Syncro.Installer.exe File created C:\Program Files\RepairTech\Syncro\app-1.0.168\Serilog.Sinks.Console.dll Syncro.Installer.exe File created C:\Program Files\RepairTech\Syncro\Syncro.Service.Runner.InstallState InstallUtil.exe File created C:\Program Files\RepairTech\LiveAgent\app-0.0.62\CSharpFunctionalExtensions.dll 7za.exe File opened for modification C:\Program Files\RepairTech\Syncro\app-1.0.168\7za-x64.dll Syncro.Installer.exe File created C:\Program Files\RepairTech\Syncro\app-1.0.168\de-DE\Syncro.App.resources.dll Syncro.Installer.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\Installer\{B7F56D3D-2AD3-4021-9D36-3B9E9C9FBE33}\DefaultIcon msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{B7F56D3D-2AD3-4021-9D36-3B9E9C9FBE33} msiexec.exe File created C:\Windows\Installer\e5991f7.msi msiexec.exe File created C:\Windows\Installer\{B7F56D3D-2AD3-4021-9D36-3B9E9C9FBE33}\DefaultIcon msiexec.exe File created C:\Windows\Installer\e5991f5.msi msiexec.exe File opened for modification C:\Windows\Installer\e5991f5.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI9A62.tmp msiexec.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4404 sc.exe 496 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ Installer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Syncro.Service.Runner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SyncroLive.Service.Runner.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SyncroLive.Service.Runner.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SyncroLive.Agent.Runner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates Syncro.Overmind.Service.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" Syncro.Service.Runner.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Syncro.Service.Runner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs Syncro.Overmind.Service.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs Syncro.Overmind.Service.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" InstallUtil.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople Syncro.Overmind.Service.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" SyncroLive.Service.Runner.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections Syncro.Installer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates Syncro.Overmind.Service.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@%SystemRoot%\system32\NgcRecovery.dll,-100 = "Windows Hello Recovery Key Encryption" Syncro.Service.Runner.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates Syncro.Overmind.Service.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" SyncroLive.Agent.Runner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust Syncro.Overmind.Service.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@%SystemRoot%\System32\ci.dll,-101 = "Enclave" Syncro.Service.Runner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft tmpB614.tmp.SyncroLive.Installer-latest.tmp Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs Syncro.Overmind.Service.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" InstallUtil.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1E\52C64B7E msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SyncroLive.Service.Runner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ InstallUtil.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ SyncroLive.Agent.Runner.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000 tmpB614.tmp.SyncroLive.Installer-latest.tmp Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs Syncro.Overmind.Service.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs Syncro.Overmind.Service.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000\RegFiles0000 = 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 tmpB614.tmp.SyncroLive.Installer-latest.tmp Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" SyncroLive.Service.Runner.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SyncroLive.Agent.Runner.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\RestartManager\Session0000 tmpB614.tmp.SyncroLive.Installer-latest.tmp Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs Syncro.Overmind.Service.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" Syncro.Overmind.Service.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" SyncroLive.Service.Runner.exe -
Modifies registry class 23 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\D3D65F7B3DA21204D963B3E9C9F9EB33 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D3D65F7B3DA21204D963B3E9C9F9EB33\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\7500CEBB70B554E4C93BAE54CF782BB3\D3D65F7B3DA21204D963B3E9C9F9EB33 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D3D65F7B3DA21204D963B3E9C9F9EB33\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D3D65F7B3DA21204D963B3E9C9F9EB33\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D3D65F7B3DA21204D963B3E9C9F9EB33\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\D3D65F7B3DA21204D963B3E9C9F9EB33\ProductFeature msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D3D65F7B3DA21204D963B3E9C9F9EB33\ProductIcon = "C:\\Windows\\Installer\\{B7F56D3D-2AD3-4021-9D36-3B9E9C9FBE33}\\DefaultIcon" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D3D65F7B3DA21204D963B3E9C9F9EB33\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D3D65F7B3DA21204D963B3E9C9F9EB33\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D3D65F7B3DA21204D963B3E9C9F9EB33\SourceList\Media\1 = ";" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D3D65F7B3DA21204D963B3E9C9F9EB33\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D3D65F7B3DA21204D963B3E9C9F9EB33\PackageCode = "778729A429A44874D8D4D102C27F49E9" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D3D65F7B3DA21204D963B3E9C9F9EB33\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D3D65F7B3DA21204D963B3E9C9F9EB33\Version = "16777216" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D3D65F7B3DA21204D963B3E9C9F9EB33\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D3D65F7B3DA21204D963B3E9C9F9EB33\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D3D65F7B3DA21204D963B3E9C9F9EB33\SourceList\PackageName = "uu.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D3D65F7B3DA21204D963B3E9C9F9EB33 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D3D65F7B3DA21204D963B3E9C9F9EB33\ProductName = "Syncro" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D3D65F7B3DA21204D963B3E9C9F9EB33\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\D3D65F7B3DA21204D963B3E9C9F9EB33\InstanceType = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\7500CEBB70B554E4C93BAE54CF782BB3 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4832 msiexec.exe 4832 msiexec.exe 3188 Syncro.Installer.exe 3188 Syncro.Installer.exe 1340 Syncro.Service.Runner.exe 1340 Syncro.Service.Runner.exe 3840 Syncro.App.Runner.exe 1340 Syncro.Service.Runner.exe 1340 Syncro.Service.Runner.exe 1340 Syncro.Service.Runner.exe 1340 Syncro.Service.Runner.exe 1340 Syncro.Service.Runner.exe 1340 Syncro.Service.Runner.exe 1340 Syncro.Service.Runner.exe 1340 Syncro.Service.Runner.exe 1340 Syncro.Service.Runner.exe 1340 Syncro.Service.Runner.exe 1340 Syncro.Service.Runner.exe 1340 Syncro.Service.Runner.exe 1340 Syncro.Service.Runner.exe 1340 Syncro.Service.Runner.exe 1340 Syncro.Service.Runner.exe 1340 Syncro.Service.Runner.exe 1340 Syncro.Service.Runner.exe 3840 Syncro.App.Runner.exe 1340 Syncro.Service.Runner.exe 1340 Syncro.Service.Runner.exe 4576 tmpB614.tmp.SyncroLive.Installer-latest.tmp 4576 tmpB614.tmp.SyncroLive.Installer-latest.tmp 1028 SyncroLive.Service.Runner.exe 1028 SyncroLive.Service.Runner.exe 1028 SyncroLive.Service.Runner.exe 1028 SyncroLive.Service.Runner.exe 1028 SyncroLive.Service.Runner.exe 1028 SyncroLive.Service.Runner.exe 1028 SyncroLive.Service.Runner.exe 1028 SyncroLive.Service.Runner.exe 1028 SyncroLive.Service.Runner.exe 4956 SyncroLive.Agent.Runner.exe 1028 SyncroLive.Service.Runner.exe 4916 Syncro.Overmind.Service.exe 4916 Syncro.Overmind.Service.exe 4916 Syncro.Overmind.Service.exe 4916 Syncro.Overmind.Service.exe 4916 Syncro.Overmind.Service.exe 1028 SyncroLive.Service.Runner.exe 1028 SyncroLive.Service.Runner.exe 1028 SyncroLive.Service.Runner.exe 1028 SyncroLive.Service.Runner.exe 1028 SyncroLive.Service.Runner.exe 1028 SyncroLive.Service.Runner.exe 1028 SyncroLive.Service.Runner.exe 1028 SyncroLive.Service.Runner.exe 1028 SyncroLive.Service.Runner.exe 1028 SyncroLive.Service.Runner.exe 1028 SyncroLive.Service.Runner.exe 1028 SyncroLive.Service.Runner.exe 1028 SyncroLive.Service.Runner.exe 4956 SyncroLive.Agent.Runner.exe 1028 SyncroLive.Service.Runner.exe 1028 SyncroLive.Service.Runner.exe 1028 SyncroLive.Service.Runner.exe 4956 SyncroLive.Agent.Runner.exe 4956 SyncroLive.Agent.Runner.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 644 Process not Found 644 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4756 msiexec.exe Token: SeIncreaseQuotaPrivilege 4756 msiexec.exe Token: SeSecurityPrivilege 4832 msiexec.exe Token: SeCreateTokenPrivilege 4756 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4756 msiexec.exe Token: SeLockMemoryPrivilege 4756 msiexec.exe Token: SeIncreaseQuotaPrivilege 4756 msiexec.exe Token: SeMachineAccountPrivilege 4756 msiexec.exe Token: SeTcbPrivilege 4756 msiexec.exe Token: SeSecurityPrivilege 4756 msiexec.exe Token: SeTakeOwnershipPrivilege 4756 msiexec.exe Token: SeLoadDriverPrivilege 4756 msiexec.exe Token: SeSystemProfilePrivilege 4756 msiexec.exe Token: SeSystemtimePrivilege 4756 msiexec.exe Token: SeProfSingleProcessPrivilege 4756 msiexec.exe Token: SeIncBasePriorityPrivilege 4756 msiexec.exe Token: SeCreatePagefilePrivilege 4756 msiexec.exe Token: SeCreatePermanentPrivilege 4756 msiexec.exe Token: SeBackupPrivilege 4756 msiexec.exe Token: SeRestorePrivilege 4756 msiexec.exe Token: SeShutdownPrivilege 4756 msiexec.exe Token: SeDebugPrivilege 4756 msiexec.exe Token: SeAuditPrivilege 4756 msiexec.exe Token: SeSystemEnvironmentPrivilege 4756 msiexec.exe Token: SeChangeNotifyPrivilege 4756 msiexec.exe Token: SeRemoteShutdownPrivilege 4756 msiexec.exe Token: SeUndockPrivilege 4756 msiexec.exe Token: SeSyncAgentPrivilege 4756 msiexec.exe Token: SeEnableDelegationPrivilege 4756 msiexec.exe Token: SeManageVolumePrivilege 4756 msiexec.exe Token: SeImpersonatePrivilege 4756 msiexec.exe Token: SeCreateGlobalPrivilege 4756 msiexec.exe Token: SeBackupPrivilege 2312 vssvc.exe Token: SeRestorePrivilege 2312 vssvc.exe Token: SeAuditPrivilege 2312 vssvc.exe Token: SeBackupPrivilege 4832 msiexec.exe Token: SeRestorePrivilege 4832 msiexec.exe Token: SeRestorePrivilege 4832 msiexec.exe Token: SeTakeOwnershipPrivilege 4832 msiexec.exe Token: SeRestorePrivilege 4832 msiexec.exe Token: SeTakeOwnershipPrivilege 4832 msiexec.exe Token: SeBackupPrivilege 3536 srtasks.exe Token: SeRestorePrivilege 3536 srtasks.exe Token: SeSecurityPrivilege 3536 srtasks.exe Token: SeTakeOwnershipPrivilege 3536 srtasks.exe Token: SeDebugPrivilege 3188 Syncro.Installer.exe Token: SeBackupPrivilege 3536 srtasks.exe Token: SeRestorePrivilege 3536 srtasks.exe Token: SeSecurityPrivilege 3536 srtasks.exe Token: SeTakeOwnershipPrivilege 3536 srtasks.exe Token: SeRestorePrivilege 4832 msiexec.exe Token: SeTakeOwnershipPrivilege 4832 msiexec.exe Token: SeRestorePrivilege 4832 msiexec.exe Token: SeTakeOwnershipPrivilege 4832 msiexec.exe Token: SeRestorePrivilege 4832 msiexec.exe Token: SeTakeOwnershipPrivilege 4832 msiexec.exe Token: SeRestorePrivilege 4832 msiexec.exe Token: SeTakeOwnershipPrivilege 4832 msiexec.exe Token: SeRestorePrivilege 4832 msiexec.exe Token: SeTakeOwnershipPrivilege 4832 msiexec.exe Token: SeRestorePrivilege 4832 msiexec.exe Token: SeTakeOwnershipPrivilege 4832 msiexec.exe Token: SeRestorePrivilege 4832 msiexec.exe Token: SeTakeOwnershipPrivilege 4832 msiexec.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4756 msiexec.exe 4756 msiexec.exe 3840 Syncro.App.Runner.exe 4576 tmpB614.tmp.SyncroLive.Installer-latest.tmp -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 4832 wrote to memory of 3536 4832 msiexec.exe 94 PID 4832 wrote to memory of 3536 4832 msiexec.exe 94 PID 4832 wrote to memory of 2848 4832 msiexec.exe 96 PID 4832 wrote to memory of 2848 4832 msiexec.exe 96 PID 2848 wrote to memory of 3188 2848 Installer.exe 97 PID 2848 wrote to memory of 3188 2848 Installer.exe 97 PID 3188 wrote to memory of 732 3188 Syncro.Installer.exe 99 PID 3188 wrote to memory of 732 3188 Syncro.Installer.exe 99 PID 732 wrote to memory of 2300 732 cmd.exe 101 PID 732 wrote to memory of 2300 732 cmd.exe 101 PID 732 wrote to memory of 496 732 cmd.exe 102 PID 732 wrote to memory of 496 732 cmd.exe 102 PID 732 wrote to memory of 4404 732 cmd.exe 103 PID 732 wrote to memory of 4404 732 cmd.exe 103 PID 1340 wrote to memory of 3840 1340 Syncro.Service.Runner.exe 105 PID 1340 wrote to memory of 3840 1340 Syncro.Service.Runner.exe 105 PID 1340 wrote to memory of 788 1340 Syncro.Service.Runner.exe 108 PID 1340 wrote to memory of 788 1340 Syncro.Service.Runner.exe 108 PID 1340 wrote to memory of 788 1340 Syncro.Service.Runner.exe 108 PID 788 wrote to memory of 4576 788 tmpB614.tmp.SyncroLive.Installer-latest.exe 109 PID 788 wrote to memory of 4576 788 tmpB614.tmp.SyncroLive.Installer-latest.exe 109 PID 788 wrote to memory of 4576 788 tmpB614.tmp.SyncroLive.Installer-latest.exe 109 PID 1340 wrote to memory of 3668 1340 Syncro.Service.Runner.exe 110 PID 1340 wrote to memory of 3668 1340 Syncro.Service.Runner.exe 110 PID 1340 wrote to memory of 3668 1340 Syncro.Service.Runner.exe 110 PID 4576 wrote to memory of 4040 4576 tmpB614.tmp.SyncroLive.Installer-latest.tmp 112 PID 4576 wrote to memory of 4040 4576 tmpB614.tmp.SyncroLive.Installer-latest.tmp 112 PID 4576 wrote to memory of 4040 4576 tmpB614.tmp.SyncroLive.Installer-latest.tmp 112 PID 4576 wrote to memory of 1708 4576 tmpB614.tmp.SyncroLive.Installer-latest.tmp 114 PID 4576 wrote to memory of 1708 4576 tmpB614.tmp.SyncroLive.Installer-latest.tmp 114 PID 4576 wrote to memory of 1708 4576 tmpB614.tmp.SyncroLive.Installer-latest.tmp 114 PID 4576 wrote to memory of 2332 4576 tmpB614.tmp.SyncroLive.Installer-latest.tmp 116 PID 4576 wrote to memory of 2332 4576 tmpB614.tmp.SyncroLive.Installer-latest.tmp 116 PID 4576 wrote to memory of 2332 4576 tmpB614.tmp.SyncroLive.Installer-latest.tmp 116 PID 4576 wrote to memory of 444 4576 tmpB614.tmp.SyncroLive.Installer-latest.tmp 118 PID 4576 wrote to memory of 444 4576 tmpB614.tmp.SyncroLive.Installer-latest.tmp 118 PID 1028 wrote to memory of 4956 1028 SyncroLive.Service.Runner.exe 120 PID 1028 wrote to memory of 4956 1028 SyncroLive.Service.Runner.exe 120 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\SoftwareSASGeneration = "1" SyncroLive.Agent.Runner.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\uu.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4756
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
- Suspicious use of AdjustPrivilegeToken
PID:3536
-
-
C:\Users\Admin\AppData\Local\Temp\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer.exe" --msi --key eEv1rOer1Ms5cK_PMCtd6A --customerid 01006130 --policyid 0 --folderid 027946442⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\Syncro.Installer.exe"C:\Users\Admin\AppData\Local\Temp\Syncro.Installer.exe" --msi --key eEv1rOer1Ms5cK_PMCtd6A --customerid 01006130 --policyid 0 --folderid 027946443⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c "C:\Program Files\RepairTech\Syncro\install.bat"4⤵
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\installutil.exe" /ShowCallStack /LogFile=C:\ProgramData/Syncro/logs/ServiceInstall.log "C:\Program Files\RepairTech\Syncro\Syncro.Service.Runner.exe"5⤵
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
PID:2300
-
-
C:\Windows\system32\sc.exesc failure Syncro reset= 60 actions= restart/5000/restart/10000/restart/600005⤵
- Launches sc.exe
PID:496
-
-
C:\Windows\system32\sc.exesc start Syncro5⤵
- Launches sc.exe
PID:4404
-
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
C:\Program Files\RepairTech\Syncro\Syncro.Service.Runner.exe"C:\Program Files\RepairTech\Syncro\Syncro.Service.Runner.exe"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Program Files\RepairTech\Syncro\Syncro.App.Runner.exe"C:\Program Files\RepairTech\Syncro\Syncro.App.Runner.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3840
-
-
C:\Windows\TEMP\tmpB614.tmp.SyncroLive.Installer-latest.exe"C:\Windows\TEMP\tmpB614.tmp.SyncroLive.Installer-latest.exe" /VERYSILENT2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\TEMP\is-L2L7I.tmp\tmpB614.tmp.SyncroLive.Installer-latest.tmp"C:\Windows\TEMP\is-L2L7I.tmp\tmpB614.tmp.SyncroLive.Installer-latest.tmp" /SL5="$4003A,13891222,57856,C:\Windows\TEMP\tmpB614.tmp.SyncroLive.Installer-latest.exe" /VERYSILENT3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\TEMP\is-3N2RC.tmp\7za.exe"C:\Windows\TEMP\is-3N2RC.tmp\7za.exe" e "C:\Program Files\RepairTech\LiveAgent\packages\SyncroLive-0.0.62-full.nupkg" -o"C:\Program Files\RepairTech\LiveAgent\app-0.0.62\" lib\net45\*.* -aoa4⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4040
-
-
C:\Windows\TEMP\is-3N2RC.tmp\7za.exe"C:\Windows\TEMP\is-3N2RC.tmp\7za.exe" e "C:\Program Files\RepairTech\LiveAgent\packages\SyncroLive-0.0.62-full.nupkg" -o"C:\Program Files\RepairTech\LiveAgent\app-0.0.62\x64" lib\net45\x64\*.* -aoa4⤵
- Executes dropped EXE
PID:1708
-
-
C:\Windows\TEMP\is-3N2RC.tmp\7za.exe"C:\Windows\TEMP\is-3N2RC.tmp\7za.exe" e "C:\Program Files\RepairTech\LiveAgent\packages\SyncroLive-0.0.62-full.nupkg" -o"C:\Program Files\RepairTech\LiveAgent\app-0.0.62\x86" lib\net45\x86\*.* -aoa4⤵
- Executes dropped EXE
PID:2332
-
-
C:\Program Files\RepairTech\LiveAgent\SyncroLive.Service.Runner.exe"C:\Program Files\RepairTech\LiveAgent\SyncroLive.Service.Runner.exe" install start4⤵
- Executes dropped EXE
- Sets service image path in registry
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:444
-
-
-
-
C:\ProgramData\Syncro\bin\Syncro.Overmind.Service.exe"C:\ProgramData\Syncro\bin\Syncro.Overmind.Service.exe" install2⤵
- Executes dropped EXE
- Sets service image path in registry
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:3668
-
-
C:\Program Files\RepairTech\LiveAgent\SyncroLive.Service.Runner.exe"C:\Program Files\RepairTech\LiveAgent\SyncroLive.Service.Runner.exe" -displayname "SyncroLive" -servicename "SyncroLive"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Program Files\RepairTech\LiveAgent\SyncroLive.Agent.Runner.exe"C:\Program Files\RepairTech\LiveAgent\SyncroLive.Agent.Runner.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:4956
-
-
C:\ProgramData\Syncro\bin\Syncro.Overmind.Service.exe"C:\ProgramData\Syncro\bin\Syncro.Overmind.Service.exe" -displayname "SyncroRecovery" -servicename "SyncroOvermind"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:3168
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD51aa2d8a5d3ecc3aa134528b7117244b3
SHA10b149d62a7883c6c903118c7b6886a981d1ff31c
SHA25660abbb3e61ba60715051790ad84703855455a24533e6e68b7fd0791b79d37b14
SHA512500938e0df236efc0242a81bfbef2c9f8a7ca52644fd1c05146c7a4333f8d525d57169ac38cce945d0cdc6759601e41e17db06f71fad8e5436fe94c0d050d958
-
Filesize
32KB
MD51aa2d8a5d3ecc3aa134528b7117244b3
SHA10b149d62a7883c6c903118c7b6886a981d1ff31c
SHA25660abbb3e61ba60715051790ad84703855455a24533e6e68b7fd0791b79d37b14
SHA512500938e0df236efc0242a81bfbef2c9f8a7ca52644fd1c05146c7a4333f8d525d57169ac38cce945d0cdc6759601e41e17db06f71fad8e5436fe94c0d050d958
-
Filesize
36KB
MD555d568af3444a7319dfdb2ddc0a6bc2f
SHA1e6fb8fc639c71c2ef922ed9f36b29cda45622292
SHA25610c8cd588d627f46df3a7385e07d36674c2f0374e6327c7f9595cb22d8635753
SHA5121cdb5edd9ed982e6eaa20042efaa4e57a5d6b6927c921d06accad2493bc7ac6d7444a2467b38b82a5a6cd3c7d8bf59e32ba0e858290327770007914818fac3a5
-
Filesize
36KB
MD555d568af3444a7319dfdb2ddc0a6bc2f
SHA1e6fb8fc639c71c2ef922ed9f36b29cda45622292
SHA25610c8cd588d627f46df3a7385e07d36674c2f0374e6327c7f9595cb22d8635753
SHA5121cdb5edd9ed982e6eaa20042efaa4e57a5d6b6927c921d06accad2493bc7ac6d7444a2467b38b82a5a6cd3c7d8bf59e32ba0e858290327770007914818fac3a5
-
Filesize
247KB
MD594bce38faf97857d39b9348f43664317
SHA18adf558ad484b47a94e199318a4fad70eab0f090
SHA2560bfa585a98172330547fec4bda0d747afea4b01bc691378dfbef2ae82d110dd4
SHA512e7ca307423aa8527b379a88f2bcf2cabe34b58d04b2f979ad4ae11867fa6a08984ca5212706f749fcfab5338e0cceefa1dd35bfa8e9921fa40ec8cd0c8caab8d
-
Filesize
125KB
MD5841e154928ed4f18c7750a39780d118b
SHA1f383e8aae69a942ffd0915122f67b0f963d6c119
SHA256dacbb5f45d70b290bbed42249c06d26cf65440e63f2ac1c8db125e808a693bbf
SHA51222e68af198233d374e609809666bc8d77f1afc741c1436fcdd321ccd7bae8a52663e7284350211cdc640cd29af550084b52343b79e8584464733200ad74bfdfd
-
Filesize
15KB
MD57eabdc9525bd1814899de66fef6be715
SHA104cf3922eb9d39adf9e3acfe7cb5246c5f718c86
SHA256ac6ef04b83ca3ec163e6998ef4904434bffc0405a793ae5dbb2e800e3984dabb
SHA512a0b95e6f5212ea7c2cfa52e372143973f72254aeb67fe6032b1db58b840f93ec9da87e565bb696417bb5bd7b6dd9a3a35af461cf51b0651fb2419ead79ccadd0
-
Filesize
51KB
MD5de2b96fbe5b4104094389d69afb3ee4e
SHA1d264d7519a6f4b6a6df6f39a382e352d4a48acdf
SHA2560118168035446602ef5ca6f5426f8d54975f58613c3898e0b6689d92a35c589f
SHA512c73a93fcbffdcbfa1b1c5928ab4304eb172710cd4ea3795796edc6e08145078199a4b0208464438d08fc569212fc11778b1d2c86ed7e6ee7e3b86f5321f33b03
-
Filesize
103KB
MD567c42a9cd1262c422f8ea562805f0294
SHA123d99f695530cb18bf9009668bb414338c953f60
SHA25662d4336b23c78955d9e51573935102beadd58bdb19530bb6d650cf39f4d8bc30
SHA512881cf4f3fb64dd2d1f42146abec7bfddf95a80a131774d7a6196b54197161866bfc09e1b6f16074f96454aecec3a03540b706e2c43df828a7c954e57e282ccca
-
Filesize
35KB
MD588d6cef2bd73709f7f35d6cdb63c6b52
SHA19ec6e0b10922101af0135d40f2a5fcbb798002a4
SHA25617714b55721d04c35ebb4898afd9e267e3cb04b25beb8bda9a460c52587955f5
SHA512c187f53222988c23f45946cfce5e18d32c5ac3af22e65097aafcef0f3ddbc83f3c0acb02a90cf16c5241a0dda5162674ee7bd2627e1da38c13fff22bdf8febf8
-
Filesize
22KB
MD565a6be1f8674bf2489d8e858ee8d7e65
SHA146a5a710f2fceb5c4daa7150a4b2517478fff0ae
SHA25672a5ad582c5e1f754256a5de51ad01602ba23b295172de0efd27137affc44454
SHA512333d1756b30b802c1ba3a690381238da8d356944ffc4fa1f49d9f97374d476de1989e66613fe97ddf8c6db76c567cd6f4f58651452baafd899d4c4e5c24c922c
-
Filesize
343KB
MD5d9fc57f451780a9afee72d870b460d4d
SHA16554fd655df6efd3f5de4559b915ceeb11a8ef41
SHA256fd45b9b900e163ab1aa6e703408ea281be3292089d4b45b646e826df02e3c88e
SHA5121c8b9f67400a43596e289b3c44c27f55da87a88578a336f5933a81f808074bb5c79cd40e9cb706f81eb4d433ff4af1c4f5d02af2a79ed8860d6a1d42eaa338d3
-
Filesize
20KB
MD55220eefd7753e11b99d73faf39fbb486
SHA17d8264be4fcb17f81acb8b1add980cd96a6fd856
SHA256ed5bc605f7f9fcc382183abef06c354dad946abb42a07631712077b2157d6bc9
SHA51281e483bd76240543704194c0eb0c8a9e7dc46aa535653e7d5590e00c002b2980237ada793c05c0eedd5d1a92de90055867b21be665ff94fac038e280939c66c1
-
Filesize
229KB
MD53b64aebb9d2a910b6839b56c84653a9b
SHA10fdd9adc8048547cf3328295db2ac291f5c6b81b
SHA256fcc18b30e67afe2e5e037ec4e2bcbcf1153e0c257dc26dc48084676a87be2486
SHA512463a3fb2957bdbbf6effa43562e331a24aa49d1c5dbd0509773f5d3ba2830d93a684876c5eea0b744a2fec7d7b70e12c1d1533c671ccf590f53aaaf9252d23f0
-
Filesize
659KB
MD54df6c8781e70c3a4912b5be796e6d337
SHA1cbc510520fcd85dbc1c82b02e82040702aca9b79
SHA2563598cccad5b535fea6f93662107a4183bfd6167bf1d0f80260436093edc2e3af
SHA512964d9813e4d11e1e603e0a9627885c52034b088d0b0dfa5ac0043c27df204e621a2a654445f440ae318e15b1c5fea5c469da9e6a7350a787fef9edf6f0418e5c
-
Filesize
501KB
MD560c7dc7ba7d0ae42e2228e5c49bbe162
SHA1806b0955e67c1243c29b3216dc913c003c3e9321
SHA256705d9545b33072323ddaf7d26d90c5e18b15754dfcddc04a58afab51368c5559
SHA5128b25a9b584c9feec1fd04d22300ace5fe74a594bb4edbc5205142b7267d0941e51f419260fdd8a51f7f8cffe4a473cc66afef4dfc296a021840db444c9a4d36b
-
Filesize
19KB
MD5a7c8097f71478a1c6ddd30cd8113ad46
SHA1ef9a449f64b75b5419b51361a416e70c81d9f7d6
SHA256374c1350475a34aa369bd80061910476cd22d587a55038853fc976197440162b
SHA512c2497e90e0cc990b3dff8e0b3e6bbf158d53c862edae3103c054278d2e38499915a575fc7378e869b52ad22f3c6e34450e14071b05eb1202de4930cd76dea2f0
-
Filesize
272KB
MD5796f43a73a63c3e097763f66aa3b8ff7
SHA1d22210904bfef6092776a47fe6b98c12b6dbe153
SHA256b8e79e671256b865d8db3ea2cd58b3159bf7b708f3459828278cab928ac5d510
SHA51226be758076b3b8cce45cbe59d4b03650b144f819c421051de8e22351ce883dceee2f5aed2658d9657a769f34d7e6fcda769d4d6d857bffdce2032466d0585062
-
Filesize
52KB
MD58141f0af4cd425514411660a4d5bd8f5
SHA1c8d6824e2cf33f68bca5ef371a5901162200bc40
SHA256343bf1060d5e2f62692178a4daa51b3a6a53e386d2cad2cc0f452050a282b31c
SHA512c8cea2cf48361792a99cbf8edac0c15e2de88a1e123aa9fe34020f1fe54f22d190277f286b1d90f18831a4f48e281eef417727d52adf55a8a3274a3ea455fb5a
-
Filesize
167KB
MD5b4aaa21288c1d923150c8d88b6ece126
SHA16d99e70ab9511aee701ff7068b5792f4194377bf
SHA256b539f648dab37f211acb38dfcf4c79b488fa3beb5a7edf6740f894d2d1807449
SHA5120de9227f5d134fc6b7029fb8202beade5e30be1f236e785eaae534cb0e944a98d9adfa2dd1917138994cfcfa2047a45c935f2b4f96944ed3dc017762ab9e08ca
-
Filesize
36KB
MD57931fd2a2e06c7a654c9edfe388a8033
SHA12fb6de045f81bd56fce6a367dd992efc73ba4405
SHA256cd722eda12d89b33cc00fa7e967eb6837b8335fada88368a6896d357f4362c15
SHA51233ff92fa6dbb93b97c739ece89433c7ed34106e91cd76eb2431d0e840338af3dd456c3116b8362de33906eb348ad7eded630e28a98c94536ee8c1f3baf8f6b80
-
Filesize
8KB
MD5fdb7ad01c66a0c96174300167fadd249
SHA138b9971de844165f164e37e2d234d16f6022636c
SHA2562d7dec266c5436f58ab620db4e3b5c83e550e7f76caff26eae8186b14b52cdd6
SHA51213df8a0ec363dc3a8f80114c64869db6f1233ae250df1bf48260cf62588065200d5a920f7d16d41faac4ddd4b9edd4d3383d1bbdb1849d120a145175d3a74d4a
-
Filesize
31KB
MD5c48bf7030e583e273e94e2d32b752a83
SHA151666bcec96f529b1a28b72db54cc7fcdf68441d
SHA256ded3b57b64eca479f2a659a244e4c403ebfb83a9a9b30ced893c145e77affd29
SHA512475e61bbb4484f468548dd7590d1d0bcc19912b322eacf2960b32c2c3ff1084231ddf8e689735e385a1f43e9912f79a028eae136c7dc8e130f2d3dd1eaf1f004
-
Filesize
25KB
MD56509ca95a38ac29c03379113172cacb7
SHA1f94b8d751fefcd29d28875e291fd570e103d12d7
SHA25685ad8530adc1dec3b97f2074c720b81528ba5ea6c7274e1a98a906304bccd12f
SHA512d8bd0b8998725e2fa361bcb446f48b6105bd603707bf914bb978c63b5c40958bcd2a3fef1f666541793f1d06377f3f2967d1241e445bee6919eb8f84f5a5d7f5
-
Filesize
5KB
MD5a0ebef9e8cce247cc12310a03b38aa7e
SHA122848b43d3b7f99cea7b339e86fcb4c08d7e6e51
SHA2565e2e204439217c960237a894548680b39d5972fabfa3009538f43530eac23a3e
SHA51253dc332b0329899883e019a4adbead244c65324fc4654c6c4d8080b3f2cc1953f2d0c61ac3507d00ac85c9cb98d711e127df335e334a3e2b2e70e59e3239d758
-
Filesize
115KB
MD5fbfbf8c2de7f389105d728037bfcc11f
SHA191dd7e807ffcfdc9cb67f5a75d85dcf537475583
SHA256e7c7528f8a920988862b8c22d0ae4c40df6824332780c1cec41d84fe633b6bed
SHA512264667b13ff54e8ae24663f6ea11225794946c5db34d440bd68cc90c940c92d1da7faf39dfa551d13a19f5e21c82130662ffab2a2e2ebfb004576d880e9fb369
-
Filesize
45KB
MD51975e684c48457d72f37696bb1b880e6
SHA1eb254b470df9172aa07f13e7280bced746d95e22
SHA2567a6f255cf59d6594c8f5bc466956f09305a3a10c8d683e485c7e1f14371701c4
SHA512edb06da485e4dc562c7833ef887172be5ddb4d36a041463dc662ccafaa8fad816306091f774a7463f1538ad1c62ee9433bd12673d943bd885bf2cb38fc633a08
-
Filesize
235KB
MD5f337f9b5615590307732f1e94b8ebcb4
SHA130110300fb63a72827aaf1b594f21632594f4c82
SHA25646a139b49a419e2217bc09700121a08e6e169f654b076866590a9360957a3b34
SHA51260e057f432488aebb77e584b5deb9535913d1fbd320cd63cd0746d6c7765f1866e3678150c9393e9ce55ab2a7840e0271a5556cc91c7bc0eaf7072283c2d8549
-
Filesize
432KB
MD5fa11417c9172c86dd8d5c08370e132db
SHA1028e7c09caf1e25673f5774a2d98f58e5b890bc3
SHA256a79e60e88045051f5290bdd5ab76dae83f78828b850bd11f769ac25e3cb4d9c2
SHA512ebdda723dd1101cb67a12e402aef9a4a5e1f5918171c3040b3f891092037f039f88ed8a7df42a18dab1e5c269642edd75292b9098b5b7b2fe5512aa789a27481
-
Filesize
3KB
MD529a3fb17a36c73f4c578b948950572f0
SHA17fbd63662d4ca33028cc23828849461b6422609a
SHA2566d3ce7aa37dd56dbfca1770777d414e9683dce6e402f031fc2f7cbb98fdd82c6
SHA51263ac42a22ebba9ba5bbbe20113ce97889f27d1869ab6334e0871c5a7184354548d0225efb344a7dee8cd545ab13b052e13f207f9b4c2ef7e5eaec33bb90acce6
-
Filesize
106KB
MD51863a5697f2fcac4d590587e97bf36d9
SHA1b90ef5cf2edb66d1cee0cd5a9be38ac832c69158
SHA256807f68a74686038c9b91b55393053ac130b6cce3469c63a598111639c1a9cea9
SHA5127af4847c1db7760d1644eb311a5932bae3da60fc1ba1a701afc3725a5d899026424210e4c497b801be7307684f130351d8fc87b923d4237628d85d02f9f1d363
-
Filesize
10KB
MD5adbb784da491cb2b3e690bb5612e6854
SHA1240873851b5ff2f612509f80fa94073ca0576357
SHA2562b939583c11aab90e350cdb533caa719bd57254aff58e7d87fadf0de29fec049
SHA51250e78fa65c3142239b993e12dd92e368d31a5fbeb87d3601f98da9683c96bcf243c2bc5b7706059f84c9e56c09e0177af8b86d7abb9a661f04bce44de2084d00
-
Filesize
1007KB
MD5b58599b0f8dedd76ab622d5eea9497cd
SHA1436ce0e8022935a61eccb94679e9c19dca781362
SHA25631c096d1075cbe54ae0274c7828904bee807be2bd8fffcb6257d91e681fa764a
SHA51258b350ec82cb6f4cb778a860d9d235f561810b917a782dedf8c3b65c930d99bcc6e0d6e04a7108c6d61c598b6cb310daee7f77691e946afc6afa26fdf6ac17a5
-
Filesize
4KB
MD58d8995a5b322b505d622af6cd2bfdffa
SHA156f353b5df27ff2dc98f9fef29bdab086a8a0fda
SHA2565af11c9ce145d76e865f091da12d3cc70f84e069e790dc54eb2c93b92b84fa8c
SHA512a8d0e6a67ec700e37b19fde7768bc3d2b8db6d90b96b7e276fad8fb3d851508f718ce0370b06c26cdeb87711b24798925150ec56ed20b48c46a51fe3c8801834
-
Filesize
83KB
MD5cff50121d9807e654c1074143a015335
SHA1d1ebb1a9d67e9fe3ed1d78bd6102658dea2df641
SHA2561d3dd902c2449e5470225175c6793241418ec01c5eb802cecab0b31694ce1253
SHA5128c99f97bfdc9f71232a4a729991c6736a3246f553dd18c96c459e389dc5240218ab0fa43a96e11b2ffa5f3cdab7d5e884ebc479d2b17485ef66e17657fdb960c
-
Filesize
25KB
MD5e1e9d7d46e5cd9525c5927dc98d9ecc7
SHA12242627282f9e07e37b274ea36fac2d3cd9c9110
SHA2564f81ffd0dc7204db75afc35ea4291769b07c440592f28894260eea76626a23c6
SHA512da7ab8c0100e7d074f0e680b28d241940733860dfbdc5b8c78428b76e807f27e44d1c5ec95ee80c0b5098e8c5d5da4d48bce86800164f9734a05035220c3ff11
-
Filesize
87KB
MD56c19cad7d00cee4e4aae931b79c0cbd2
SHA1b8e275ee742584b017fe48918d35edfbba97c1b8
SHA256e9ecc8b5c887b3eb58523d108aa7a74340c5b5270aa3182d5dd1fc363afdbc02
SHA512c1892e5b45a4c48a342fe869c43e2348c6d21dd14771ee0c4a59ff1eca6b9b77b2742e54106d956e9f7c7c9ea13f9d41b6a2ef1b4f9a036a96e76b9373c58363
-
Filesize
174KB
MD5e5dd264a7dc69d6f9bb85919984955a3
SHA14d83ac11160295835f3c8266e9d96f49446e0023
SHA256122dabfe8a6b37cbbb6b062ca99fc567128037178764b9b0965706938ded6d05
SHA512640316365ed262bc4725b9c103bfa9754dce44e74b9a18dbd7fe9f413cd8904a7ad9282796eb2b1253f3039c789bb513746f517c37d4ba0057e8cdc375939d20
-
Filesize
5KB
MD5d25bca8e62ef1de7af0d1e382528c71b
SHA19232becb3a55cf81ce8775b6cf2e2d89fbafe5f8
SHA256c0960a5c185f852da9feba9f075da744be50ba64da69f48b5166ff9c556838d6
SHA512617ae67fb8d9e60bd0517186f18f26a2d4bf2ee14f45c1887fb060f7d5d1fcdcbe2d49b1994593ab3a580dd98c85f2f5dee43d33c8d16e42f3e4237013cba33d
-
Filesize
869B
MD5b8131bcfde5af2f88c7ebe90bbbab965
SHA1a82ff00ad442d1af4356fcf8729abb3164077be1
SHA256f22f770c78a63b75d079a2b919938613edf10a1360a05b64e42aeb676e868efb
SHA5125b1d052dd5e96082d64bd61531b3cd3f48861929e62de2bf7022d9d39e0d02bb08655832538f7fbce241b07755c51d7b1a96ad6ebc46204e24742e011a9ada28
-
Filesize
39KB
MD5f61cac27413de146d3e70c5d6c4a9e2c
SHA116415b8df306ef3ec0a9ff25ec0db435fecf737f
SHA256d551be97aa15cbb9122a59f33e03a7128e090cbdd94df71ac53fa3e0b357343b
SHA512550a45b080e6f6d2b815a14039f6e032f52c77e39f6e8e02749989dca5d4c5d44f68ff68c017fca4212e07edb7d4affd4c40cda9548248e32397fc47a316b669
-
Filesize
639B
MD5e3eb8d69316f0551bda4908c44d8684e
SHA1dc8d0350c67f2a9b4a2adec253863273c26aa760
SHA2568952ea8c7a55898f87d131886cad0ceb966ad4475c701ea6590d906bfc6dc0af
SHA512b276ab4113ff39c715b840d84916c49319d03b8458dea0bc9c1f23f87a331dac1975e5c596c088cbdf44c50e5a9bc54ddfdbb5fe9363f7496ce242dab3f37865
-
Filesize
14KB
MD5940cfaf4c3be79e182f60375900fc2b3
SHA14c476f0b6eeb7a99912b1a5b2a7ee43c96d40baa
SHA25697dda1267bb780b5c073d57367fc3590548fab97b9d90ee86d5a55dffd5847e9
SHA512774e2f1bd38a1145ad7758964276a74c3f8c7deb6932c5203a4c19050d3f4cf38ee71d6ac645c4a55ba3559ea031623267ea5ccd9fbf26a758234203d1590b90
-
Filesize
758KB
MD5454bbb242ae4afbb0cc09425b3644b62
SHA1df2cb4cc0d2abe86abe08ad9751dad63c6cd30eb
SHA25678eac23016bf631a1e63aee99391f7e34e43a5759ff9278567af6370d13eb924
SHA512cb92853f41f8bed4f51ecfd33cf6ec4284cdd87bcc76a90c75ebc510e8430ad157cb93673a0466909a8a38e4b22fd1049070d3d5392002839c15a1649a17b9bc
-
Filesize
758KB
MD5454bbb242ae4afbb0cc09425b3644b62
SHA1df2cb4cc0d2abe86abe08ad9751dad63c6cd30eb
SHA25678eac23016bf631a1e63aee99391f7e34e43a5759ff9278567af6370d13eb924
SHA512cb92853f41f8bed4f51ecfd33cf6ec4284cdd87bcc76a90c75ebc510e8430ad157cb93673a0466909a8a38e4b22fd1049070d3d5392002839c15a1649a17b9bc
-
Filesize
6KB
MD563b712456dfdbd392a31de950784ef26
SHA158c192224404a9648d45d57b68c37a2507cdf816
SHA2562d9d45b5a1dfd21eb1f66d5ab9e9c4a1ed9475bf3ca76905dcf7c696cac2cf48
SHA512a8a443c1dc6994d6f956754701db5c7507051681689bf659c5d31a7da07261147551412bbe146e8e48b85bb43b871591cc787912ae23929794ac4cd65b344fa0
-
Filesize
1KB
MD50263e342c03b1de7f3e826f234089077
SHA135446f534ef198d6d28d7b1fc65fb20f04ee94f4
SHA256a3635a19f99836a1213dcbf11944fea655a351d456f3e5114d7c28a4bd4c2f27
SHA5127a7abcff7ed0aa2837adfc268d70f13e894a0b46108439f7e2b2e6c135994d6b5b0996612272237d46c0c3ded566fa1094694c3afc721cdf9ae40450d2ca9d61
-
Filesize
1KB
MD55be5998b9b6bdae1128e45955f106f79
SHA12383b5d93f47be54fe89f6184cb764bb756156f2
SHA256f10d0f36784db77a8b3c39ca688d36678fdc332cc74636f463d8d4a2fe267a09
SHA5120fd4853fbee83fcde004c904653396b510ca840ac2b2c276497c247d718b1679ca50a7d5a84e54e74e6bfec01882a99ca3c83b9a1b00f0cf085c3025b6e665c1
-
Filesize
997B
MD521bd777f0c5cdafc1704e95aada4ce3d
SHA1541f8865a643616be93ca89844259ec44dba73b9
SHA256a1743a4e47656a80e50bfd3e6df44ab207830b121064b43d4f55568347415246
SHA5126c1b7b95099280233b883e75dd6b224d318d2ebd4e760058a328771f833dc3c5d4dd348b5e7e4fb7845f1cb9c44325f0f65474eb770e619a8ad025a1d993bf59
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_E6095CD2AECC9011BCD0D7B421356B17
Filesize2KB
MD567bf17af0d82abb981966a27b2af95cc
SHA1023ec55468a49253e7c945c9acbd87f757fe72e3
SHA25665146c52225a28f5187407a4bac6e01c28088204ce16172608ea50c3743e6e1d
SHA5120650881dabbcb21a0c6007ac748ab9f456aab2f10a11cdb21b83d13de7b5ca374eb33c2e6e4f213f83542d4edb6c37bdc9dbe4ab498a920f2f8c30a6d569f233
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize1KB
MD50698dbc93ba7b6bef73ba316695f8317
SHA1a444078ff1eb7c88f52cb4e324365926b491ed47
SHA256263292040d77903899257c1d21201dc64d6f8d6b5a1d945cd5b28d0124d7906c
SHA512ebacaa7009aebb88199cd70fd0bb3afe69ed300318cb633edd1c0404e42aef829617f589bcbad6cb7ab4bd0a8ae87f7df1435c786184ecc5de61c8fc6950a900
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D7833C286363AD25C70511661A83D581_52894DBA51C2BA5ACE3EE5577FB04C4C
Filesize510B
MD570d35e9b1604fa420674e4fbba8ff9df
SHA125b78f58f2271d3a4876829d1f099105e968747a
SHA256ef40d5a8c1e166b09860db7c4f4917bc8b368c56efb875f0934c082a06af3b8c
SHA51247a56593b20d33671414bc70166b0c5b2d4542950a55b7204067543c845511ff9b545528e045413fc5287f27c48055ea182a262e30989ca93039c66ca2fbd40d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_E6095CD2AECC9011BCD0D7B421356B17
Filesize488B
MD5839a09d1b232eadefba8bc5a0e3cb8c5
SHA1999d83d9d05d8a467c3df26128ec6c22e88865dc
SHA256a196171ff5abdb8f77210e379bcc541f381b1a2f526f1f7ca21ed7fffece7872
SHA512a635e0bb1ce2972d1ac581fa247f403643c5c8ccb387d5501ed8864edae6ee031b2001f52150995795e48ab2db7209c2f264e702e6c3cbf249c8fff413d279d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
Filesize482B
MD5c1314c86907c60682514c77848db7d90
SHA11e71d7d7757b3116a99eb93cbc309e0bf580982e
SHA25657569fbd0860280bf00f9b0469b0b65fd50d8980805595f5cc0e5cb1c585db5e
SHA51285f1a492f352e31fcdd1c85aa1866b91603097f31e16474890c1c6dee495dda0708269f68777f7d1de4574e0d6c5cf83322096264c092721c7fbdb5220650a8b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D7833C286363AD25C70511661A83D581_52894DBA51C2BA5ACE3EE5577FB04C4C
Filesize480B
MD5c452ff925ca3e9ac97e12672637bebd3
SHA16cd8f0d80efb2cc4b0278592cf6cad3a29dabf73
SHA256cab1918cb2db69d294c8a08357a28efef377747f3d59d066d28437f7d05895c7
SHA512e25652018613b8521d036d6a36ad1359f5817eb5b3e55017fb51cef3ce73ec65474a4baeb806219b974caa349d3b55de422e9e1faeccfb3dec2cf3b05ef66356
-
Filesize
7.1MB
MD55fdc21287fa2a976bb5a661e6a2a4d85
SHA13bb03dca0de6961b0be9403979a3847d8ba4466d
SHA25609ac0ed20fdc3cb6b6ff969d18d94f28031d6992fb49f739d0db61d2486cbc54
SHA512f86827404b703f915ad055604cf8d8d533ed3fe7e9856c77809cf7aa13967844c1dc0716bfc27386f5ac1fa2c0d3c70f25bc1791f3957325893322088fcdd9bc
-
Filesize
7.1MB
MD55fdc21287fa2a976bb5a661e6a2a4d85
SHA13bb03dca0de6961b0be9403979a3847d8ba4466d
SHA25609ac0ed20fdc3cb6b6ff969d18d94f28031d6992fb49f739d0db61d2486cbc54
SHA512f86827404b703f915ad055604cf8d8d533ed3fe7e9856c77809cf7aa13967844c1dc0716bfc27386f5ac1fa2c0d3c70f25bc1791f3957325893322088fcdd9bc
-
Filesize
7.0MB
MD57bb45f8522187b26bbef2d9957bbe5fa
SHA14f4bbc74fe99a4f8f288a28cdfbc86441d182f0f
SHA2566547e5d392ed49b02c9afff77cd9c7d36f29193e7c2b511b7e2f31e5650a853c
SHA5121b535e99ea81007eb47cfcb51bbd6c054a4dd312624ef9047d3293e5fa3c0a3a646f737268275a9bb6af1028d1e2607164daffd484a0bb2c01b47305d5517be1
-
Filesize
7.0MB
MD57bb45f8522187b26bbef2d9957bbe5fa
SHA14f4bbc74fe99a4f8f288a28cdfbc86441d182f0f
SHA2566547e5d392ed49b02c9afff77cd9c7d36f29193e7c2b511b7e2f31e5650a853c
SHA5121b535e99ea81007eb47cfcb51bbd6c054a4dd312624ef9047d3293e5fa3c0a3a646f737268275a9bb6af1028d1e2607164daffd484a0bb2c01b47305d5517be1
-
Filesize
13.5MB
MD56ee357d6ff97bd054f2f8d6c1e72f0e7
SHA1d01ceb73738cf0e2c86463f86292c38e4873c524
SHA256ad3ebf1789063615ef35ae5583d9641765670fed1ac57659e2d1010f54109f24
SHA5122b458237b74143e732fbc4740b0437d058966845c2fc4f9f64a4932a98cd6f44e63aedad3ad17aca3f6fc01ccc0b400747b406c38c4595cd22d883cb8aca28f0
-
Filesize
706KB
MD54d77c41ecb0fe9113fd7d81e136bb3f1
SHA1312f0bceabeaa2ad59b79f9656ca94b7f4453258
SHA256c6fcb8184a3ec70654690413e735ee7c18251da9f3bc708ff2f54d186b6acdb4
SHA51279dd09f4870a1822c4606dadce47712d8bb1c2ea2bd9d4d743f8b78fb8c1f93227603eba00068a53227186ae6a1a000ca8a21097e69b13e656d0cc401612af30
-
Filesize
13.5MB
MD56ee357d6ff97bd054f2f8d6c1e72f0e7
SHA1d01ceb73738cf0e2c86463f86292c38e4873c524
SHA256ad3ebf1789063615ef35ae5583d9641765670fed1ac57659e2d1010f54109f24
SHA5122b458237b74143e732fbc4740b0437d058966845c2fc4f9f64a4932a98cd6f44e63aedad3ad17aca3f6fc01ccc0b400747b406c38c4595cd22d883cb8aca28f0
-
Filesize
23.0MB
MD55eeba9bfe8819e6bc508f23c823c3f94
SHA14b46bfe1e0e2e280d80f1f63409dec0c7ed90bd2
SHA256667c47c4327d0344cda9fb68e4cb82f3913877b80b0ebe85d303dea71cb05b87
SHA512bd44e61aa3a6677b23517eca8feca1d88c0fcce3c45b0de0e97a2e34f2a7de5f05ab3c28d71b384efe5ad6cf89430f0a4a49d8ff5b0f4e8ced35c520151e5f1c
-
\??\Volume{5d2b4a7c-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{b238a01a-36cf-43b9-a5c3-a3ec602247ec}_OnDiskSnapshotProp
Filesize5KB
MD5c1ce1939a61128afb53c8e4ea9d6404e
SHA157452427c1c07af3006f5631b3abb81f2458dd97
SHA2562a763a3abae20b653833a2ad0a8b5b9b7b6cfb22b173a85e3442c1b91479aca4
SHA5125e5fe8937babfbfacff82566a09836bb7cad637d484df43b67bd8a3f2744756b64ce57adae975d2619c804321f22cf58a9a60ef4ee907c2fba1940147dad812d