Analysis
-
max time kernel
355s -
max time network
359s -
platform
windows10-1703_x64 -
resource
win10-20220901-es -
resource tags
arch:x64arch:x86image:win10-20220901-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
05-02-2023 19:45
Static task
static1
Behavioral task
behavioral1
Sample
AnyDesk.exe
Resource
win10-20220901-es
General
-
Target
AnyDesk.exe
-
Size
3.8MB
-
MD5
e546506082b374a0869bdd97b313fe5d
-
SHA1
082dc6b336b41788391bad20b26f4b9a1ad724fc
-
SHA256
fc19f3275d02764cf249dc6fe8962e06b83a4f5769cc369bc4f77b90c567df18
-
SHA512
15a8d7c74193dffd77639b1356ccbe975d17de73d0d6d177b8ecf816d665f620adefcded37c141bac0b2d8564fbba61aca4d9b01885740f23fbcc190515cbd08
-
SSDEEP
98304:uSCb8xJlb0VgU/vZaZKa4opQILfbsLajDMWEeq7PbUs6En5:uH8HCOUZakpAbjbsLsMmqM
Malware Config
Extracted
C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\CREDITS.txt
[email protected])"
[email protected])"
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
<[email protected]>
"[email protected]"
<[email protected]>
http://www.kurims.kyoto-u.ac.jp/~ooura/fft.html
https://github.com/puppeteer/replay
http://www.apache.org/licenses/
http://www.apache.org/licenses/LICENSE-2.0
https://github.com/abseil/abseil-cpp
https://www.apache.org/licenses/
https://www.apache.org/licenses/LICENSE-2.0
https://raw.githubusercontent.com/GoogleChrome/accessibility-developer-tools/master/dist/js/axs_testing.js
https://github.com/acornjs/acorn
https://aomedia.googlesource.com/aom/
http://code.google.com/p/angleproject/
http://lcamtuf.coredump.cx/afl/
http://source.android.com
http://developer.android.com/tools/extras/support-library.html
https://developer.android.com/topic/libraries/architecture/index.html
https://android.googlesource.com/platform/frameworks/support
http://developer.android.com/sdk/index.html
https://android.googlesource.com/platform/frameworks/base
http://www.mojohaus.org/animal-sniffer/animal-sniffer-annotations/
https://github.com/google-ar/arcore-android-sdk
https://developers.google.com/ar/develop/java/enable-arcore#dependencies
https://github.com/intel/ARM_NEON_2_x86_SSE
https://github.com/dequelabs/axe-core/
http://mozilla.org/MPL/2.0/
http://software.blackmagicdesign.com/DeckLink/v10.7/Blackmagic_DeckLink_SDK_10.7.zip
http://www.chromium.org/blink
http://www.torchmobile.com/
https://boringssl.googlesource.com/boringssl
https://cla.developers.google.com/clas
http://www.openssl.org/)"
https://github.com/mit-plv/fiat-crypto/blob/master/AUTHORS
https://github.com/liblouis/liblouis
https://chromium.googlesource.com/breakpad/breakpad
http://www.opensource.apple.com/apsl/
https://github.com/google/brotli
http://www.daemonology.net/bsdiff/
http://lxr.mozilla.org/mozilla/source/toolkit/mozapps/update/src/updater/
https://github.com/rianhunter/zxcvbn-cpp
https://chromium.googlesource.com/cast_core/public
https://checkerframework.org
https://github.com/typetools/jdk
https://github.com/typetools/stubparser
https://github.com/typetools/annotation-tools
https://github.com/plume-lib/
http://code.google.com/p/google-axs-chrome/
https://github.com/google/cityhash
http://github.com/google/closure-compiler
http://caminobrowser.org/
http://www.mozilla.org/MPL/
https://github.com/codemirror/CodeMirror/
https://github.com/codemirror/CodeMirror.next/
https://github.com/google/compact_enc_det
https://github.com/google/cld3
https://developers.google.com/android/guides/setup
http://source.android.com/
http://source.android.com/compatibility
https://github.com/pytorch/cpuinfo
https://crashpad.chromium.org/
https://github.com/google/crc32c
https://github.com/google/crubit
https://github.com/d3/d3
https://github.com/google/dagger
http://www.opensource.apple.com/
http://www.apple.com/legal/guidelinesfor3rdparties.html
https://code.videolan.org/videolan/dav1d
https://dawn.googlesource.com/dawn
https://chromium.googlesource.com/devtools/devtools-frontend
https://github.com/y-256/libdivsufsort
https://github.com/chromium/dom-distiller
http://code.google.com/p/data-race-test/wiki/DynamicAnnotations
https://easylist.to/easylist/easylist.txt
https://github.com/easylist
https://easylist.to/)"
https://creativecommons.org/compatiblelicenses
https://creativecommons.org/
http://eigen.tuxfamily.org/
https://github.com/googlei18n/emoji-segmenter
https://github.com/googlefonts/emoji-metadata
https://errorprone.info/
https://source.android.com/
https://github.com/libexpat/libexpat
https://github.com/google/farmhash
http://www.netlib.org/fdlibm/
http://ffmpeg.org/
http://developer.intel.com/vtune/cbts/strmsimd/922down.htm
http://skal.planet-d.net/coding/dct.html
http://developer.intel.com/vtune/cbts/strmsimd/appnotes.htm
http://www.elecard.com/peter/idct.html
http://www.linuxvideo.org/mpeg2dec/
https://github.com/mit-plv/fiat-crypto
https://github.com/GPUOpen-Effects/FidelityFX-SPD
http://findbugs.sourceforge.net/
https://firebase.google.com
http://www.opensource.org/licenses/bsd-license.php
http://downloads.xiph.org/releases/flac/flac-1.3.1.tar.xz
https://github.com/google/flatbuffers
https://github.com/westes/flex
https://github.com/Maratyszcza/FP16
http://www.freetype.org/
https://www.freetype.org
https://fusejs.io
https://github.com/Maratyszcza/FXdiv
https://github.com/google/gemmlowp
http://android-gifview.googlecode.com/svn/!svn/bc/8/trunk/
https://github.com/chromium/content_analysis_sdk
https://github.com/google/closure-library
https://github.com/google/double-conversion
https://github.com/googlei18n/google-input-tools.git
https://github.com/google/google-toolbox-for-mac
https://pki.goog/roots.pem
https://github.com/google/glog
http://code.google.com/p/google-jstemplate/
https://github.com/grpc/grpc
https://github.com/grpc/grpc-java
https://github.com/google/gson
https://github.com/google/guava
https://github.com/googlevr/gvr-android-sdk
http://www.mozilla.org/MPL/2.0/
http://www.mozilla.org/MPL/2.0/FAQ.html
http://freetype.sourceforge.net/license.html
http://www.freetype.org
http://source.icu-project.org/repos/icu/icu/trunk/license.html
http://icu-project.org/userguide/icufaq.html
http://www.unicode.org/copyright.html
http://www.unicode.org/Public/
http://www.unicode.org/reports/
http://www.unicode.org/cldr/data/
http://jquery.com/
https://github.com/jquery/jquery/blob/master/MIT-LICENSE.txt
https://github.com/jquery/sizzle/blob/master/LICENSE
http://ctrio.sourceforge.net/
http://www.cisl.ucar.edu/css/software/fftpack5/ftpk.html
http://www.opensource.org/licenses/mit-license.php
http://harfbuzz.org
https://github.com/Microsoft/webauthn/
https://github.com/google/highway
http://hunspell.sourceforge.net/
https://android.googlesource.com/platform/external/hyphenation-patterns/
http://www.tex-tipografia.com/spanish_hyphen.html
https://opensource.org/licenses/BSD-3-Clause
https://github.com/LinuxA11y/IAccessible2
http://www.ijg.org
https://github.com/unicode-org/icu
https://www.unicode.org/copyright.html
http://opensource.org/licenses/bsd-license.php
https://sourceforge.net/project/?group_id=1519
http://chasen.aist-nara.ac.jp/chasen/distribution.html
http://casper.beckman.uiuc.edu/~c-tsai4
https://github.com/rober42539/lao-dictionary
https://github.com/rober42539/lao-dictionary/laodict.txt
https://github.com/rober42539/lao-dictionary/LICENSE.txt
https://github.com/GoogleChromeLabs/chromium-bidi/archive/f8d953fa7313c562f88471865a4fd18dc81f1715.zip
https://chromium.googlesource.com/deps/inspector_protocol/
http://www.jetbrains.org
https://github.com/googlei18n/libphonenumber/
https://github.com/formatjs/formatjs
https://chromium.googlesource.com/chromium/src/third_party/ipcz
http://developer.mozilla.org/en-US/docs/Accessibility/AT-APIs
https://github.com/google/j2objc/
http://code.google.com/p/atinject/
https://jinja.palletsprojects.com/
https://github.com/open-source-parsers/jsoncpp
http://www.khronos.org/registry
http://oss.sgi.com/projects/FreeB/
https://github.com/KhronosGroup/glslang
https://www.khronos.org/registry/
https://github.com/KhronosGroup/Vulkan-Tools
https://github.com/KhronosGroup/Vulkan-ValidationLayers
https://kotlinlang.org/
https://github.com/Kotlin/kotlinx.coroutines
http://ltp.sourceforge.net/coverage/lcov.php
https://github.com/google/leveldb.git
https://github.com/google/libaddressinput
https://github.com/AOMediaCodec/libavif
http://brltty.app
http://libcxx.llvm.org/
https://llvm.org/docs/DeveloperPolicy.html#legacy
http://llvm.org
http://libcxxabi.llvm.org/
http://libevent.org/
http://llvm.org/docs/LibFuzzer.html
https://chromium.googlesource.com/codecs/libgav1/
https://chromium.googlesource.com/chromiumos/platform2/libipp
https://chromium.googlesource.com/external/webrtc
https://github.com/libjpeg-turbo/libjpeg-turbo/
http://libpng.org/
https://github.com/google/libprotobuf-mutator
https://git.gnome.org/browse/libsecret/
https://github.com/cisco/libsrtp
http://www.freedesktop.org/wiki/Software/systemd/
https://chromium.googlesource.com/external/github.com/llvm/llvm-project/libunwind.git
http://libusb.org
https://github.com/cls/libutf
http://www.unicode.org/Public/zipped/9.0.0/UCD.zip
https://chromium.googlesource.com/webm/libvpx
https://gitlab.freedesktop.org/xorg/lib/libx11
https://gitlab.freedesktop.org/xorg/lib/libxcb-keysyms
http://xmlsoft.org
http://xmlsoft.org/XSLT
http://code.google.com/p/libyuv/
https://github.com/nih-at/libzip
http://www.logilab.org/
https://github.com/airbnb/lottie-web
https://github.com/airbnb/lottie-ios.git
http://www.7-zip.org/sdk.html
https://github.com/google/maldoca.git
https://github.com/markedjs/marked
https://github.com/chjj/
http://daringfireball.net/
https://github.com/material-components/material-components-android
https://github.com/material-components/material-components-ios
https://github.com/google/material-design-icons
https://github.com/material-foundation/material-font-disk-loader-ios
https://github.com/material-foundation/material-internationalization-ios
https://github.com/material-foundation/material-roboto-font-loader-ios
https://github.com/material-foundation/material-sprited-animation-view-ios
https://github.com/material-foundation/material-text-accessibility-ios
https://github.com/material-components/material-components-web-components
https://android.googlesource.com/platform/development/+/b356564/samples/Support4Demos/src/com/example/android/supportv4/media/MediaController.java
https://android.googlesource.com/platform/cts/+/master/tests/tests/provider/src/android/provider/cts/MediaStoreUtils.java
http://www.mesa3d.org/
https://chromium.googlesource.com/chromiumos/platform/minigbm
https://github.com/client9/stringencoders
http://modp.com/release/base64
https://github.com/material-motion/motion-animator-objc
https://github.com/material-motion/motion-interchange-objc
https://github.com/material-motion/motion-transitioning-objc
https://dxr.mozilla.org/mozilla-central/source/security/manager/
https://searchfox.org/mozilla-central/rev/0fec57c05d3996cc00c55a66f20dd5793a9bfb5d/security/manager/ssl/EnterpriseRoots.cpp
http://code.google.com/p/nativeclient
https://github.com/google/nearby
http://www.mozilla.org/projects/nspr/
https://www.nasm.us/
http://www.mozilla.org/projects/security/pki/nss/
http://sourceware.org/newlib/docs.html
http://sourceware.org/ml/newlib/
http://cristal.univ-lille.fr/~casiez/1euro/
https://chromium.googlesource.com/openscreen
http://www.openh264.org/
https://github.com/KhronosGroup/OpenXR-SDK
https://gitlab.xiph.org/xiph/opus
https://datatracker.ietf.org/ipr/1524/
https://datatracker.ietf.org/ipr/1914/
https://datatracker.ietf.org/ipr/1526/
https://github.com/khaledhosny/ots.git
http://www.azillionmonkeys.com/qed/hash.html
http://code.google.com/p/pdfium/
https://android.googlesource.com/platform/external/perfetto/
https://github.com/perfmark/perfmark
https://bitbucket.org/jpommier/pffft/
http://website-archive.mozilla.org/www.mozilla.org/mpl/MPL/NPL/1.1/
http://www.mozilla.org/NPL/
http://code.google.com/p/lao-dictionary/
http://lao-dictionary.googlecode.com/git/Lao-Dictionary.txt
http://lao-dictionary.googlecode.com/git/Lao-Dictionary-LICENSE.txt
http://www.dabeaz.com/ply/ply-3.11.tar.gz
https://polymer-library.polymer-project.org
https://github.com/google/pprof/tree/master/proto
https://github.com/google/private-join-and-compute
https://github.com/google/protobuf
https://github.com/protocolbuffers/protobuf/blob/master/java/lite.md
https://github.com/Maratyszcza/pthreadpool
https://android.googlesource.com/platform/external/puffin
https://github.com/dpranke/pyjson5
http://www.pylint.org/
https://github.com/GoogleChromeLabs/pywebsocket3/
https://quiche.googlesource.com/quiche
https://github.com/jrmuizel/qcms/tree/v4
https://github.com/google/re2
https://github.com/xiph/rnnoise
http://opensource.perlig.de/rjsmin/
https://github.com/google/securemessage
https://github.com/SeleniumHQ/selenium/tree/trunk
https://android.googlesource.com/platform/external/setupdesign/
https://github.com/google/shell-encryption
https://github.com/simplejson/simplejson
https://skia.org/
http://code.google.com/p/smhasher/
http://google.github.io/snappy/
https://creativecommons.org/licenses/by/3.0/
https://sites.google.com/site/gaviotachessengine/Home/endgame-tablebases-1
http://www.ploscompbiol.org/static/license
http://www.gutenberg.org/ebooks/53
http://devel.freebsoft.org/speechd
https://github.com/KhronosGroup/SPIRV-Headers.git
https://github.com/KhronosGroup/SPIRV-Tools.git
https://github.com/KhronosGroup/SPIRV-Cross
https://sqlite.org/
http://www.strongtalk.org/
http://www.suitable.com/tools/smslib.html
http://www.suitable.com
https://www.swift.org/download/
https://swiftshader.googlesource.com/SwiftShader
https://github.com/tensorflow/tensorflow
https://github.com/tensorflow/tflite-support
https://github.com/tensorflow/models
https://github.com/tensorflow/text.git
https://pagure.io/lohit
http://www.nongnu.org/freebangfont/downloads.html#mukti
https://dejavu-fonts.github.io/Download.html
http://scripts.sil.org/OFL
https://github.com/GoogleChromeLabs/text-fragments-polyfill
http://www.chromium.org
https://github.com/google/diff-match-patch/tree/master/javascript
https://github.com/google/distributed_point_functions
https://github.com/google/ruy
http://www.linux-usb.org/usb-ids.html
http://wix.codeplex.com/
https://github.com/google/ukey2
http://cldr.unicode.org/index/downloads
https://github.com/aawc/unrar.git
https://github.com/google/google-api-cpp-client/
https://chromium.googlesource.com/chromium/src/+/HEAD/third_party/liburlpattern
http://mxr.mozilla.org/comm-central/source/mozilla/netwerk/base/src/nsURLParsers.cpp
http://git.linuxtv.org/v4l-utils.git
http://code.google.com/p/v8
http://valgrind.org
https://github.com/KhronosGroup/Vulkan-Headers
https://chromium.googlesource.com/vulkan-deps/
https://github.com/KhronosGroup/Vulkan-Loader
https://github.com/GPUOpen-LibrariesAndSDKs/VulkanMemoryAllocator
https://github.com/wasdk/wasmparser
https://github.com/web-animations/web-animations-js
http://webkit.org/
https://chromium.googlesource.com/webm/libwebm
https://chromium.googlesource.com/webm/libwebp
http://www.webrtc.org
https://gitlab.freedesktop.org/wayland/weston
http://cgit.freedesktop.org/xorg/xserver/tree/COPYING
https://sourceforge.net/projects/wtl/files/WTL%2010/
https://github.com/google/woff2
https://github.com/google/wuffs-mirror-release-c
https://gitlab.freedesktop.org/xorg/proto/xproto/
http://freedesktop.org
https://gitlab.freedesktop.org/xdg/xdgmime
http://www.freedesktop.org/wiki/Software/xdg-user-dirs
https://github.com/google/xnnpack
https://github.com/Cyan4973/xxHash
http://tukaani.org/xz/
http://src.chromium.org/viewvc/chrome/trunk/deps/third_party/xz/COPYING
http://zlib.net/
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
msiexec.exeflow pid Process 156 3576 msiexec.exe 158 3576 msiexec.exe -
Executes dropped EXE 5 IoCs
Processes:
remote_assistance_host.exeremoting_native_messaging_host.exeremote_assistance_host.exeremoting_host.exeremoting_host.exepid Process 68 remote_assistance_host.exe 2544 remoting_native_messaging_host.exe 3380 remote_assistance_host.exe 4504 remoting_host.exe 3852 remoting_host.exe -
Loads dropped DLL 11 IoCs
Processes:
MsiExec.exeMsiExec.exeMsiExec.exeremote_assistance_host.exeremoting_native_messaging_host.exeremote_assistance_host.exeremoting_host.exeremoting_host.exepid Process 2888 MsiExec.exe 2088 MsiExec.exe 2088 MsiExec.exe 2088 MsiExec.exe 4700 MsiExec.exe 4700 MsiExec.exe 68 remote_assistance_host.exe 2544 remoting_native_messaging_host.exe 3380 remote_assistance_host.exe 4504 remoting_host.exe 3852 remoting_host.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc Process File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe -
Drops file in Program Files directory 19 IoCs
Processes:
msiexec.exeremoting_host.exeremoting_host.exedescription ioc Process File created C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\com.google.chrome.remote_desktop-firefox.json msiexec.exe File opened for modification C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\debug.log remoting_host.exe File created C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\remoting_native_messaging_host.exe msiexec.exe File created C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\com.google.chrome.remote_assistance.json msiexec.exe File created C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\com.google.chrome.remote_desktop.json msiexec.exe File created C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\icudtl.dat msiexec.exe File created C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\remote_open_url.exe msiexec.exe File created C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\remote_security_key.exe msiexec.exe File created C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\remote_webauthn.exe msiexec.exe File created C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\remoting_desktop.exe msiexec.exe File created C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\remoting_start_host.exe msiexec.exe File created C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\com.google.chrome.remote_webauthn.json msiexec.exe File created C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\remote_assistance_host.exe msiexec.exe File created C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\remote_assistance_host_uiaccess.exe msiexec.exe File created C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\remoting_core.dll msiexec.exe File created C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\remoting_host.exe msiexec.exe File created C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\com.google.chrome.remote_assistance-firefox.json msiexec.exe File created C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\CREDITS.txt msiexec.exe File opened for modification C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\debug.log remoting_host.exe -
Drops file in Windows directory 17 IoCs
Processes:
msiexec.exeMsiExec.exedescription ioc Process File opened for modification C:\Windows\Installer\MSIECED.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{6B14E7C9-210F-41DF-AE42-C42E5A8DDB87} msiexec.exe File opened for modification C:\Windows\Installer\MSID26A.tmp msiexec.exe File created C:\Windows\rescache\_merged\3623239459\11870838.pri MsiExec.exe File created C:\Windows\Installer\e59cf10.msi msiexec.exe File created C:\Windows\Installer\e59cf0e.msi msiexec.exe File opened for modification C:\Windows\Installer\MSID7EA.tmp msiexec.exe File created C:\Windows\Installer\wix{6B14E7C9-210F-41DF-AE42-C42E5A8DDB87}.SchedServiceConfig.rmi MsiExec.exe File opened for modification C:\Windows\Installer\MSID24A.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIDAC9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIE366.tmp msiexec.exe File created C:\Windows\Installer\{6B14E7C9-210F-41DF-AE42-C42E5A8DDB87}\chromoting.ico msiexec.exe File opened for modification C:\Windows\Installer\e59cf0e.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\{6B14E7C9-210F-41DF-AE42-C42E5A8DDB87}\chromoting.ico msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0016 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3b2ce006-5e61-4fde-bab8-9b8aac9b26df}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\300A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Mfg svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004E svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AnyDesk.exefirefox.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AnyDesk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AnyDesk.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Modifies data under HKEY_USERS 34 IoCs
Processes:
MsiExec.exemsiexec.exesvchost.exedescription ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CEnvironmentsApp_cw5n1h2txyewy%5Cresources.pri MsiExec.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CEnvironmentsApp_cw5n1h2txyewy%5Cresources.pri\1d2a058e0b92f6f\a01460c8\LanguageList = 5f0065006e002d00550053003b0065006e005f007300740061006e0064006100720064005f003100300030005f00550053005f004c00540052005f006400610072006b005f004400650073006b0074006f007000 MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@peerdistsh.dll,-10001 = "BranchCache Content Retrieval (HTTP-Out)" MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@netlogon.dll,-1003 = "Netlogon Service (NP-In)" MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CEnvironmentsApp_cw5n1h2txyewy%5Cresources.pri\1d2a058e0b92f6f\a01460c8 MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CEnvironmentsApp_cw5n1h2txyewy%5Cresources.pri\1d2a058e0b92f6f\a01460c8\@{EnvironmentsApp_10.0.15063.0_neutral__cw5n1h2txyewy?ms-resource://EnvironmentsApp/resource = "Windows Mixed Reality Environments" MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@peerdistsh.dll,-10005 = "BranchCache Hosted Cache Server(HTTP-Out)" MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@%SystemRoot%\system32\firewallapi.dll,-37303 = "mDNS (UDP-In)" MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@%systemroot%\system32\provsvc.dll,-200 = "HomeGroup In" MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache\C:%5CWindows%5CSystemApps%5CEnvironmentsApp_cw5n1h2txyewy%5Cresources.pri\1d2a058e0b92f6f MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@peerdistsh.dll,-10004 = "BranchCache Hosted Cache Server (HTTP-In)" MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@%systemroot%\system32\provsvc.dll,-205 = "HomeGroup In (PNRP)" MsiExec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MrtCache MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@peerdistsh.dll,-10000 = "BranchCache Content Retrieval (HTTP-In)" MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@%systemroot%\system32\dosvc.dll,-102 = "Delivery Optimization (TCP-In)" MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@%SystemRoot%\system32\firewallapi.dll,-37305 = "mDNS (UDP-Out)" MsiExec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\SysWOW64\FirewallControlPanel.dll,-12122 = "Windows Firewall" MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@peerdistsh.dll,-10002 = "BranchCache Peer Discovery (WSD-In)" MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@%systemroot%\system32\provsvc.dll,-207 = "HomeGroup Out (PNRP)" MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@%systemroot%\system32\provsvc.dll,-203 = "HomeGroup Out" MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@netlogon.dll,-1008 = "Netlogon Service Authz (RPC)" MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@peerdistsh.dll,-10006 = "BranchCache Hosted Cache Client (HTTP-Out)" MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@peerdistsh.dll,-10003 = "BranchCache Peer Discovery (WSD-Out)" MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@%systemroot%\system32\dosvc.dll,-103 = "Delivery Optimization (UDP-In)" MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@%windir%\system32\diagtrack.dll,-3001 = "Connected User Experiences and Telemetry" MsiExec.exe -
Modifies registry class 64 IoCs
Processes:
msiexec.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6a7699f0-ee43-43e7-aa30-a6738f9bd470} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6a7699f0-ee43-43e7-aa30-a6738f9bd470}\ = "IRdpDesktopSession PSFactory" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{b59b96da-83cb-40ee-9b91-c377400fc3e3}\InprocServer32\ = "C:\\Program Files (x86)\\Google\\Chrome Remote Desktop\\110.0.5481.7\\remoting_core.dll" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{b59b96da-83cb-40ee-9b91-c377400fc3e3} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{b59b96da-83cb-40ee-9b91-c377400fc3e3}\ = "IRdpDesktopSessionEventHandler" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{b59b96da-83cb-40ee-9b91-c377400fc3e3}\TypeLib\ = "{b6396c45-b0cc-456b-9f49-f12964ee6df4}" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Typelib\{b6396c45-b0cc-456b-9f49-f12964ee6df4}\1.0 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChromeRemoteDesktopUrlForwarder\Application\ApplicationCompany = "Google LLC" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9C7E41B6F012FD14EA244CE2A5D8BD78\Version = "1845499241" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9C7E41B6F012FD14EA244CE2A5D8BD78\SourceList\PackageName = "chromeremotedesktophost.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{b6396c45-b0cc-456b-9f49-f12964ee6df4} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{b59b96da-83cb-40ee-9b91-c377400fc3e3}\ProxyStubClsid32\ = "{b59b96da-83cb-40ee-9b91-c377400fc3e3}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9C7E41B6F012FD14EA244CE2A5D8BD78\PackageCode = "39158FC9201731D40AD14CBF200ECFC1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9C7E41B6F012FD14EA244CE2A5D8BD78\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9C7E41B6F012FD14EA244CE2A5D8BD78\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\Downloads\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{e051a481-6345-4ba1-bdb1-cf7929955268}\ProxyStubClsid32 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChromeRemoteDesktopUrlForwarder\DefaultIcon msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{b6396c45-b0cc-456b-9f49-f12964ee6df4}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Google\\Chrome Remote Desktop\\110.0.5481.7\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9C7E41B6F012FD14EA244CE2A5D8BD78\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChromeRemoteDesktopUrlForwarder\Application\ApplicationName = "@C:\\Program Files (x86)\\Google\\Chrome Remote Desktop\\110.0.5481.7\\remoting_core.dll,-119" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{e051a481-6345-4ba1-bdb1-cf7929955268}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27e8bb1f-93b0-517e-886d-f024d2544b2a}\TypeLib\ = "{b6396c45-b0cc-456b-9f49-f12964ee6df4}" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{b6396c45-b0cc-456b-9f49-f12964ee6df4}\1.0\0\win32 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Typelib\{b6396c45-b0cc-456b-9f49-f12964ee6df4}\1.0\HELPDIR msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9C7E41B6F012FD14EA244CE2A5D8BD78\SourceList\Net\1 = "C:\\Users\\Admin\\Downloads\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppId\{52e6fd1a-f16e-49c0-aacb-5436a915448b} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{6a7699f0-ee43-43e7-aa30-a6738f9bd470}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\9C7E41B6F012FD14EA244CE2A5D8BD78\chromoting_host msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9C7E41B6F012FD14EA244CE2A5D8BD78\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9C7E41B6F012FD14EA244CE2A5D8BD78\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChromeRemoteDesktopUrlForwarder\shell msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{b6396c45-b0cc-456b-9f49-f12964ee6df4}\1.0\FLAGS\ = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Typelib\{b6396c45-b0cc-456b-9f49-f12964ee6df4} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\9C7E41B6F012FD14EA244CE2A5D8BD78 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9C7E41B6F012FD14EA244CE2A5D8BD78 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9C7E41B6F012FD14EA244CE2A5D8BD78\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9C7E41B6F012FD14EA244CE2A5D8BD78\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{e051a481-6345-4ba1-bdb1-cf7929955268}\TypeLib\ = "{b6396c45-b0cc-456b-9f49-f12964ee6df4}" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27e8bb1f-93b0-517e-886d-f024d2544b2a} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{b59b96da-83cb-40ee-9b91-c377400fc3e3} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{655bd819-c08c-4b04-80c2-f160739ff6ef}\ProxyStubClsid32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{b6396c45-b0cc-456b-9f49-f12964ee6df4}\1.0\ = "Chromoting 1.0 Type Library" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9C7E41B6F012FD14EA244CE2A5D8BD78\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChromeRemoteDesktopUrlForwarder\shell\open\command\ = "\"C:\\Program Files (x86)\\Google\\Chrome Remote Desktop\\110.0.5481.7\\remote_open_url.exe\" %1" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChromeRemoteDesktopUrlForwarder\shell\open msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{b59b96da-83cb-40ee-9b91-c377400fc3e3}\ = "IRdpDesktopSessionEventHandler PSFactory" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Typelib\{b6396c45-b0cc-456b-9f49-f12964ee6df4}\1.0\0 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Typelib\{b6396c45-b0cc-456b-9f49-f12964ee6df4}\1.0\FLAGS msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9C7E41B6F012FD14EA244CE2A5D8BD78\ProductIcon = "C:\\Windows\\Installer\\{6B14E7C9-210F-41DF-AE42-C42E5A8DDB87}\\chromoting.ico" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9C7E41B6F012FD14EA244CE2A5D8BD78\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChromeRemoteDesktopUrlForwarder msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6a7699f0-ee43-43e7-aa30-a6738f9bd470}\ProxyStubClsid32\ = "{6a7699f0-ee43-43e7-aa30-a6738f9bd470}" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9C7E41B6F012FD14EA244CE2A5D8BD78\Language = "1033" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChromeRemoteDesktopUrlForwarder\Application\ApplicationIcon = "C:\\Program Files (x86)\\Google\\Chrome Remote Desktop\\110.0.5481.7\\remoting_core.dll,-112" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{52e6fd1a-f16e-49c0-aacb-5436a915448b}\AccessPermission = 010014807800000088000000140000003000000002001c000100000011001400040000000101000000000010002000000200480003000000000014000b000000010100000000000512000000000018000b00000001020000000000052000000020020000000014000b0000000101000000000005130000000102000000000005200000002002000001020000000000052000000020020000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{27e8bb1f-93b0-517e-886d-f024d2544b2a}\LocalServer32 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{655bd819-c08c-4b04-80c2-f160739ff6ef} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\767F12B2751E6AF469C35538C441336A\9C7E41B6F012FD14EA244CE2A5D8BD78 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChromeRemoteDesktopUrlForwarder\Application msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{655bd819-c08c-4b04-80c2-f160739ff6ef}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6a7699f0-ee43-43e7-aa30-a6738f9bd470} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Typelib\{b6396c45-b0cc-456b-9f49-f12964ee6df4}\1.0\0\win32 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\9C7E41B6F012FD14EA244CE2A5D8BD78\SourceList msiexec.exe -
NTFS ADS 1 IoCs
Processes:
firefox.exedescription ioc Process File created C:\Users\Admin\Downloads\chromeremotedesktophost.msi:Zone.Identifier firefox.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
remote_assistance_host.exepid Process 3380 remote_assistance_host.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
AnyDesk.exeAnyDesk.exeAnyDesk.exemsiexec.exepid Process 4964 AnyDesk.exe 4964 AnyDesk.exe 1580 AnyDesk.exe 1580 AnyDesk.exe 4960 AnyDesk.exe 4960 AnyDesk.exe 4180 msiexec.exe 4180 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
firefox.exemsiexec.exemsiexec.exedescription pid Process Token: SeDebugPrivilege 828 firefox.exe Token: SeDebugPrivilege 828 firefox.exe Token: SeDebugPrivilege 828 firefox.exe Token: SeDebugPrivilege 828 firefox.exe Token: SeDebugPrivilege 828 firefox.exe Token: SeShutdownPrivilege 3576 msiexec.exe Token: SeIncreaseQuotaPrivilege 3576 msiexec.exe Token: SeSecurityPrivilege 4180 msiexec.exe Token: SeCreateTokenPrivilege 3576 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3576 msiexec.exe Token: SeLockMemoryPrivilege 3576 msiexec.exe Token: SeIncreaseQuotaPrivilege 3576 msiexec.exe Token: SeMachineAccountPrivilege 3576 msiexec.exe Token: SeTcbPrivilege 3576 msiexec.exe Token: SeSecurityPrivilege 3576 msiexec.exe Token: SeTakeOwnershipPrivilege 3576 msiexec.exe Token: SeLoadDriverPrivilege 3576 msiexec.exe Token: SeSystemProfilePrivilege 3576 msiexec.exe Token: SeSystemtimePrivilege 3576 msiexec.exe Token: SeProfSingleProcessPrivilege 3576 msiexec.exe Token: SeIncBasePriorityPrivilege 3576 msiexec.exe Token: SeCreatePagefilePrivilege 3576 msiexec.exe Token: SeCreatePermanentPrivilege 3576 msiexec.exe Token: SeBackupPrivilege 3576 msiexec.exe Token: SeRestorePrivilege 3576 msiexec.exe Token: SeShutdownPrivilege 3576 msiexec.exe Token: SeDebugPrivilege 3576 msiexec.exe Token: SeAuditPrivilege 3576 msiexec.exe Token: SeSystemEnvironmentPrivilege 3576 msiexec.exe Token: SeChangeNotifyPrivilege 3576 msiexec.exe Token: SeRemoteShutdownPrivilege 3576 msiexec.exe Token: SeUndockPrivilege 3576 msiexec.exe Token: SeSyncAgentPrivilege 3576 msiexec.exe Token: SeEnableDelegationPrivilege 3576 msiexec.exe Token: SeManageVolumePrivilege 3576 msiexec.exe Token: SeImpersonatePrivilege 3576 msiexec.exe Token: SeCreateGlobalPrivilege 3576 msiexec.exe Token: SeCreateTokenPrivilege 3576 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3576 msiexec.exe Token: SeLockMemoryPrivilege 3576 msiexec.exe Token: SeIncreaseQuotaPrivilege 3576 msiexec.exe Token: SeMachineAccountPrivilege 3576 msiexec.exe Token: SeTcbPrivilege 3576 msiexec.exe Token: SeSecurityPrivilege 3576 msiexec.exe Token: SeTakeOwnershipPrivilege 3576 msiexec.exe Token: SeLoadDriverPrivilege 3576 msiexec.exe Token: SeSystemProfilePrivilege 3576 msiexec.exe Token: SeSystemtimePrivilege 3576 msiexec.exe Token: SeProfSingleProcessPrivilege 3576 msiexec.exe Token: SeIncBasePriorityPrivilege 3576 msiexec.exe Token: SeCreatePagefilePrivilege 3576 msiexec.exe Token: SeCreatePermanentPrivilege 3576 msiexec.exe Token: SeBackupPrivilege 3576 msiexec.exe Token: SeRestorePrivilege 3576 msiexec.exe Token: SeShutdownPrivilege 3576 msiexec.exe Token: SeDebugPrivilege 3576 msiexec.exe Token: SeAuditPrivilege 3576 msiexec.exe Token: SeSystemEnvironmentPrivilege 3576 msiexec.exe Token: SeChangeNotifyPrivilege 3576 msiexec.exe Token: SeRemoteShutdownPrivilege 3576 msiexec.exe Token: SeUndockPrivilege 3576 msiexec.exe Token: SeSyncAgentPrivilege 3576 msiexec.exe Token: SeEnableDelegationPrivilege 3576 msiexec.exe Token: SeManageVolumePrivilege 3576 msiexec.exe -
Suspicious use of FindShellTrayWindow 14 IoCs
Processes:
firefox.exeAnyDesk.exemsiexec.exeremote_assistance_host.exepid Process 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 4960 AnyDesk.exe 4960 AnyDesk.exe 4960 AnyDesk.exe 4960 AnyDesk.exe 4960 AnyDesk.exe 828 firefox.exe 828 firefox.exe 3576 msiexec.exe 3576 msiexec.exe 3380 remote_assistance_host.exe -
Suspicious use of SendNotifyMessage 10 IoCs
Processes:
firefox.exeAnyDesk.exepid Process 828 firefox.exe 828 firefox.exe 828 firefox.exe 4960 AnyDesk.exe 4960 AnyDesk.exe 4960 AnyDesk.exe 4960 AnyDesk.exe 4960 AnyDesk.exe 828 firefox.exe 828 firefox.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
Processes:
firefox.exepid Process 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe 828 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
firefox.exefirefox.exedescription pid Process procid_target PID 5016 wrote to memory of 828 5016 firefox.exe 68 PID 5016 wrote to memory of 828 5016 firefox.exe 68 PID 5016 wrote to memory of 828 5016 firefox.exe 68 PID 5016 wrote to memory of 828 5016 firefox.exe 68 PID 5016 wrote to memory of 828 5016 firefox.exe 68 PID 5016 wrote to memory of 828 5016 firefox.exe 68 PID 5016 wrote to memory of 828 5016 firefox.exe 68 PID 5016 wrote to memory of 828 5016 firefox.exe 68 PID 5016 wrote to memory of 828 5016 firefox.exe 68 PID 828 wrote to memory of 3528 828 firefox.exe 69 PID 828 wrote to memory of 3528 828 firefox.exe 69 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 4160 828 firefox.exe 72 PID 828 wrote to memory of 3784 828 firefox.exe 73 PID 828 wrote to memory of 3784 828 firefox.exe 73 PID 828 wrote to memory of 3784 828 firefox.exe 73 PID 828 wrote to memory of 3784 828 firefox.exe 73 PID 828 wrote to memory of 3784 828 firefox.exe 73 PID 828 wrote to memory of 3784 828 firefox.exe 73 PID 828 wrote to memory of 3784 828 firefox.exe 73 PID 828 wrote to memory of 3784 828 firefox.exe 73 PID 828 wrote to memory of 3784 828 firefox.exe 73 PID 828 wrote to memory of 3784 828 firefox.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe" --local-service2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4964
-
-
C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe"C:\Users\Admin\AppData\Local\Temp\AnyDesk.exe" --local-control2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="828.0.2118226695\1476260611" -parentBuildID 20200403170909 -prefsHandle 1492 -prefMapHandle 1484 -prefsLen 1 -prefMapSize 219987 -appdir "C:\Program Files\Mozilla Firefox\browser" - 828 "\\.\pipe\gecko-crash-server-pipe.828" 1592 gpu3⤵PID:3528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="828.3.479679862\314885697" -childID 1 -isForBrowser -prefsHandle 2232 -prefMapHandle 2228 -prefsLen 156 -prefMapSize 219987 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 828 "\\.\pipe\gecko-crash-server-pipe.828" 2244 tab3⤵PID:4160
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="828.13.1839899362\752527461" -childID 2 -isForBrowser -prefsHandle 3264 -prefMapHandle 3260 -prefsLen 6938 -prefMapSize 219987 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 828 "\\.\pipe\gecko-crash-server-pipe.828" 3284 tab3⤵PID:3784
-
-
C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\remote_assistance_host.exe"C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\remote_assistance_host.exe" "C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\com.google.chrome.remote_assistance-firefox.json" [email protected]3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:68
-
-
C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\remoting_native_messaging_host.exe"C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\remoting_native_messaging_host.exe" "C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\com.google.chrome.remote_desktop-firefox.json" [email protected]3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2544
-
-
C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\remote_assistance_host.exe"C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\remote_assistance_host.exe" "C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\com.google.chrome.remote_assistance-firefox.json" [email protected]3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
PID:3380 -
C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\remoting_host.exe"C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\remoting_host.exe" --type=evaluate_capability --evaluate-type=d3d-support4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:4504
-
-
C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\remoting_host.exe"C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\remoting_host.exe" --type=evaluate_capability --evaluate-type=d3d-support4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:3852
-
-
-
-
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Downloads\chromeremotedesktophost.msi"1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3576
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4180 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B5528E9AACEC8A704B64B1A5E34D77A3 C2⤵
- Loads dropped DLL
PID:2888
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:4852
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 4DAB74EA218055229388C6581BE8FAFD2⤵
- Loads dropped DLL
PID:2088
-
-
C:\Windows\system32\cmd.execmd /c mklink /d CurrentVersion ".\110.0.5481.7\"2⤵PID:5000
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 08A2B42064278556750A3691C8B051B9 E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:4700
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2304
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1248
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:4792
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4201⤵PID:4224
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\com.google.chrome.remote_assistance-firefox.json
Filesize249B
MD52dc896251ebf6ff82728fa088d06b997
SHA1b7fe0b487e05173476a56982156720a16cbabe11
SHA2564ac1608cc2f932ddcb11e0a0d8bbf512376947f6ffc6490070fab4c33de3ee15
SHA5125d1efae136b722e34fe55fde14acfaab0a59b3d983d9156c7509e9b97032f4ccc72001c1bccd24a9011724246592c294296ca0f00f0c871d31726437b899afb5
-
C:\Program Files (x86)\Google\Chrome Remote Desktop\110.0.5481.7\com.google.chrome.remote_desktop-firefox.json
Filesize232B
MD589461153933170309aed35a77ad00091
SHA16c20298246e7dfff20877eddc7ab97b32f709b60
SHA256cd511ff312991532758def5d72093134be6396b090e63cca873cba581b6f377f
SHA512bf813bd84f679f2d49d2384fd98aec4fab7645b8366358b5b3ed2c62a09e45d86fa4767131888bf7618c9597d917bcf208aeff4e971074fc71caa3d9a09e0d64
-
Filesize
10.1MB
MD52c367970ac87a9275eeec5629bb6fc3d
SHA1399324d1aeee5e74747a6873501a1ee5aac005ee
SHA25617d57b17d12dc5cfbf06413d68a06f45ccf245f4abdf5429f30256977c4ed6de
SHA512f788a0d35f9e4bebe641ee67fff14968b62891f52d05bf638cd2c845df87f2e107c42a32bbe62f389f05e5673fe55cbdb85258571e698325400705cd7b16db01
-
Filesize
416KB
MD55d3a2461cefb238263794385ad305eef
SHA1dc695f1fb6fb9b8fa6df83b23c7bffcf0fc68d70
SHA25600ee94df743878eb1ebc661f1fac3e7b9a0c3622ddedfff02ee059bcb2dd76bc
SHA51207225dc00fe087bce525ec658132d27b96d02543c8c13556abc4b640ba9f50b00d879810e8cdc703d166a78018a7de30bce955fde2b497a586aa77e3bbcd6cbb
-
Filesize
416KB
MD55d3a2461cefb238263794385ad305eef
SHA1dc695f1fb6fb9b8fa6df83b23c7bffcf0fc68d70
SHA25600ee94df743878eb1ebc661f1fac3e7b9a0c3622ddedfff02ee059bcb2dd76bc
SHA51207225dc00fe087bce525ec658132d27b96d02543c8c13556abc4b640ba9f50b00d879810e8cdc703d166a78018a7de30bce955fde2b497a586aa77e3bbcd6cbb
-
Filesize
416KB
MD55d3a2461cefb238263794385ad305eef
SHA1dc695f1fb6fb9b8fa6df83b23c7bffcf0fc68d70
SHA25600ee94df743878eb1ebc661f1fac3e7b9a0c3622ddedfff02ee059bcb2dd76bc
SHA51207225dc00fe087bce525ec658132d27b96d02543c8c13556abc4b640ba9f50b00d879810e8cdc703d166a78018a7de30bce955fde2b497a586aa77e3bbcd6cbb
-
Filesize
26.5MB
MD5213b11c6f666e8835378bc2c600bd018
SHA142794b8296e1f0077e896046d9a459de72e3fd62
SHA256f4ff95b840733bd999abbeff8e352028b952d62e1eeaa7c1f708742e28979361
SHA51291cfd5b2b901256d261adb6b74efcea288c3222e5b3342b2322a99ec60b331c5c13d11aecfe4e20bf231bcbe382479b43a0f10bedeb689844339cc960a0f0640
-
Filesize
72KB
MD51fa070201d5d492d5fa0da92d0e067ea
SHA1b1610c98f333ab2bd539415e47032f7003d0553c
SHA25638db1d5e0a8428a0813fbf853cf110e51c2bc7c0ca744da78353bd43679bd432
SHA5125b7e005fa9cf8e1907ce633eebe7eea02b3e0ccb8f6d97e29727cde3d65d1814485dc369052055f69a5cc543931024c0612f0d17d24d128af7729ebea2050a46
-
Filesize
72KB
MD51fa070201d5d492d5fa0da92d0e067ea
SHA1b1610c98f333ab2bd539415e47032f7003d0553c
SHA25638db1d5e0a8428a0813fbf853cf110e51c2bc7c0ca744da78353bd43679bd432
SHA5125b7e005fa9cf8e1907ce633eebe7eea02b3e0ccb8f6d97e29727cde3d65d1814485dc369052055f69a5cc543931024c0612f0d17d24d128af7729ebea2050a46
-
Filesize
418KB
MD516d23cc88201979b8cdf71b2bdf144ec
SHA1df98de61532eec4124078c49dbccea70e0da0072
SHA25684f56dfe855c0501d43da2d9deeb08ed4e657e154d478ea8e6a0351ea6fae7a2
SHA512f3a17b3c40947a4b6913596bd83e0962a4b991a1b4cee0bbc138dbfe5301107c6457a3625bedd6b5b2ec945ddacb4a448d86cdeaf51282efc127bf3fbe0a2973
-
Filesize
418KB
MD516d23cc88201979b8cdf71b2bdf144ec
SHA1df98de61532eec4124078c49dbccea70e0da0072
SHA25684f56dfe855c0501d43da2d9deeb08ed4e657e154d478ea8e6a0351ea6fae7a2
SHA512f3a17b3c40947a4b6913596bd83e0962a4b991a1b4cee0bbc138dbfe5301107c6457a3625bedd6b5b2ec945ddacb4a448d86cdeaf51282efc127bf3fbe0a2973
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
Filesize471B
MD52eec864f7a4091183bd585de9d2db3af
SHA1746292f8e084ce68210fd389b5ba494f739e6187
SHA2564d9949a2f65ba2e5b6ad6cdebd9d795a133b1477c56230561549213d0d8e3a1f
SHA512dc3e943526fea2d609cbfe37d33f7572b3968783a0330acb25996d719fb0e2a69b86d5dc26e1870f26301d764f0de7d3e4430b362822885806efd873ea26278c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_466BAFE78D4077069B6C3828315C7C8D
Filesize727B
MD5f49252f5798cca57242de79c97a58a8d
SHA120a5a380c35b4a64c623d85682af95fb813b849b
SHA256e50213aec2b6520f6dbd77b9ad238ca5a4ae65478f9ebe7c37178c18ce72ccea
SHA512e4dae6e651d5f12d571d06dcbcca71a01e36e342da78a768e5c253242a36f2de8cc25adee3ae130856679a778669ce9530500570a60574090ec8772a0443151b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
Filesize727B
MD58efcecf8c36c3d648eeb916fc7b9e79a
SHA1b922a9922bd0b74945270d0b84b4408a865fca79
SHA256a4435cdfa4375f58743517502fbac6810cb8079a270f71e466cdda520f11018b
SHA5128f59fda85d68bafccec466aa3ddf06f4a4d2ec4a8a6a2bab82f84c5b7f35907117ef462a6ad29691da1606a047b9890f881ae2cebea30ee4f0a2fa45e3777276
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
Filesize430B
MD5c76ae1078e553544205efc5129177346
SHA1faee81ba88f0f99b5d795cf4f2334b086769073b
SHA256192b1fc9938d9e29ecdc9627308606c05b02d004357bece39b432e1548def26a
SHA512a26194e396da241f94cb558d4c7340943a773a02f9bd681cdcb0ca78eac54c7e0cf10c53fa63b4fa92fd3ace9e50abff10b7707a0e8fdeacd2aa75e240870caf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_466BAFE78D4077069B6C3828315C7C8D
Filesize434B
MD50b4dd730ce0b8bfae8e1682e8a5b75a3
SHA1b351f3edecfbe87862973b2983f51114dd700e34
SHA256a7b1783d04b90cf7871c8d9812fd107a87ede7d839cb7b1a7a7bd136a92a27e9
SHA512c998410d8e283717cf0f053f95512f3583c150ab5ff4db2ad7bc74714b7cd000e3146217808c58fc54e664706c42fd14204cbd6ff9679a853b6f3b3464e816d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
Filesize412B
MD5c29634e5b8c5598a6f4807970dfbf6ac
SHA19003efb681223101d32393527864ba96e57d4a94
SHA256be9373a388f4eb88e992bd1873ec22d572bd355d6e9b5f3d24686719da3b28aa
SHA512508a496e9f4e2a85f688bbeffe26a128d42b9154e74a60ea423f84f449b8a1cae9adc08462d23cadaba104b6fae92ff1601eba805e386341b6f2c4c457144c6d
-
Filesize
168KB
MD5a0962dd193b82c1946dc67e140ddf895
SHA17f36c38d80b7c32e750e22907ac7e1f0df76e966
SHA256b9e73e5ab78d033e0328fc74a9e4ebbd1af614bc4a7c894beb8c59d24ee3ede9
SHA512118b0bd2941d48479446ed16ab23861073d23f9cc815f5f1d380f9977f18c34a71f61496c78b77b9a70f8b0a6cd08fe1edc1adb376dad5762ad0dd2068c64751
-
Filesize
7KB
MD57d28a116a97e7f4b5969497ecb5f5f69
SHA1166407802fe2c18cb33d2990df08ef0a83200466
SHA25679607a3803bcca64b018a524eb70149ea6da17c8698f59f884a337d05bae4903
SHA512a072a8361d7bec853249d96d36454d882c0fa30e6da4afc89b9dbc16f1acb013092adf0acc666c1fd69d94d81644889b59378c6456347fb02524e92187f981cc
-
Filesize
7KB
MD57d28a116a97e7f4b5969497ecb5f5f69
SHA1166407802fe2c18cb33d2990df08ef0a83200466
SHA25679607a3803bcca64b018a524eb70149ea6da17c8698f59f884a337d05bae4903
SHA512a072a8361d7bec853249d96d36454d882c0fa30e6da4afc89b9dbc16f1acb013092adf0acc666c1fd69d94d81644889b59378c6456347fb02524e92187f981cc
-
Filesize
2KB
MD5e340362c0fadaa1834fd119a60b33cac
SHA15e91fbb636dcb69001bf8432397d2d0c9ffa0628
SHA25682646e1b4bc5b72f5532383b2c3c1be2847ab82b8418239c27af2baa0b6f7c5d
SHA512f40766f44e4904346395b85cc27d8d72aa8f8e38028a23a57712524d9b3573c1d8d342ea03152b84054d794529757796354b02014a621c4faf48f6a3c3824443
-
Filesize
2KB
MD55be3cade962ee31ff531b399a425e8ce
SHA169c63560d7587b0cb1db1efff191ed26c86bb844
SHA25689a6cadc18dcda06f7bb2b1bc5b911d4616fc5fd9260b6e39ed7e1d2cf4cfea0
SHA512b7570a847f54891df89c44c1531cfd7ac889084e15f5c57d3c8ad31c487026ca44682b3a622ea3f0d259e8e8746eb187b80635e898bced17fc4876d79af60f4e
-
Filesize
312B
MD50c04ad1083dc5c7c45e3ee2cd344ae38
SHA1f1cf190f8ca93000e56d49732e9e827e2554c46f
SHA2566452273c017db7cbe0ffc5b109bbf3f8d3282fb91bfa3c5eabc4fb8f1fc98cb0
SHA5126c414b39bbc1f1f08446c6c6da6f6e1ceb9303bbf183ae279c872d91641ea8d67ec5e5c4e0824da3837eca73ec29fe70e92b72c09458c8ce50fa6f08791d1492
-
Filesize
424B
MD5a7c9cf5b1d7d356b29e0af567a270b23
SHA13104cee174c2d6bda04a9b29e5843b2e540db037
SHA2563b298fc91ade237e02fb6cf309416146d563d35c001692ac178a0720abf984bf
SHA5128c7a9b725cff16def930be9f514841b6dcca1b3f758f44c6bcaa0bdbf02f5d2d77fcd420e344661ac29cae44d281617674dcc88c3a354cf793dd506441982e42
-
Filesize
680B
MD55b1afc03f46545565a1c54a82815550f
SHA1f2b4233e4086f612f3002fc4da09570a4d1aa78e
SHA256c01fb3757f81fb88ab18b81ee63372b6065689d7ab7dd9b713bfb32a24c30e7e
SHA512514aa07e42258d98f8b08fdb54cbfa1f8470ea391c855725c1989f454ee2bd579b30add11e74c1afd25cebd50d881a17de659a950b63de8abc6c1f93c16fd92b
-
Filesize
801B
MD5e345def8ce2aaa7fde455042ced25445
SHA1d0a85a16c7c76dd47f41bf858020f4a7c65aa170
SHA256ed14acc6d804de98064753cfc50565104ac71007c61b4be78dadf1cd7e2138fe
SHA512d2151b1b91853f0ba274d66fe7466d134453039fcadd88cb891545bd0df2739c929cad64c5fe31268e98e722e2730731e5f9572cb8e2d127c31e99d19a8c27dc
-
Filesize
848B
MD52956b1d20f32eab51879e643b6ee209c
SHA1e66cada8aaf2a11052580dbbb7904e53813a1e8f
SHA2561861fe338939a01de392972c998f89d330029cc6fdf5df98c39f47a874eec79d
SHA5124b5afcff20f15ea2871640adfcee2d316c93f48437809b58e66bd10ab50a9c58036589a4971dd6205a2ec3746c06dd142f1f9b954d12532708dfb25dd752f49e
-
Filesize
1KB
MD530e9b8bcd78015a6bbee5a09eb36d11d
SHA1ec0db651c49dcc901fb0cc17493dc7733f68d45b
SHA2565e06513e8250cb62c38bfd52d873681023d04f6618dc0a32a4e3d83bcfd4850c
SHA5124690f05e37891a1c161584f87bfc12c86908f9cb9715857fbaedb1be3901282c7799144e02692924a63a15df38c58259eaca3aa0e9049b7777a3f64b44af362e
-
Filesize
1KB
MD53c1bfc94b031ea1904692c80d3dbd133
SHA1d74c79e6b695b3caacbbc5280e96b7fcf74f2223
SHA25615e10f4bf28165bb1ca15587168617b7fba138a5a09a5304daf9565f54ce8de5
SHA512b75fb99363caff2164487744d08542a70b22bc45ee14d21cd77b9082677ef04560ac2f7d2967712af50bcc487a1f90b66a01b5553161488e69558e582e581092
-
Filesize
1KB
MD53c1bfc94b031ea1904692c80d3dbd133
SHA1d74c79e6b695b3caacbbc5280e96b7fcf74f2223
SHA25615e10f4bf28165bb1ca15587168617b7fba138a5a09a5304daf9565f54ce8de5
SHA512b75fb99363caff2164487744d08542a70b22bc45ee14d21cd77b9082677ef04560ac2f7d2967712af50bcc487a1f90b66a01b5553161488e69558e582e581092
-
Filesize
1KB
MD53c1bfc94b031ea1904692c80d3dbd133
SHA1d74c79e6b695b3caacbbc5280e96b7fcf74f2223
SHA25615e10f4bf28165bb1ca15587168617b7fba138a5a09a5304daf9565f54ce8de5
SHA512b75fb99363caff2164487744d08542a70b22bc45ee14d21cd77b9082677ef04560ac2f7d2967712af50bcc487a1f90b66a01b5553161488e69558e582e581092
-
Filesize
1KB
MD539bf378b294759cd074cf31bf31ab0ac
SHA13e0f3e199e2fccf20c73170790e1e28a24ba6c46
SHA256b7ef65981d1f42717f22c52d12231f07c2375d0bf9ce8b287af9fc8a6b93121d
SHA512ee56502779420fc0a185d5096f62e2ec68f4e59e02099d79c295439c84c4991af8515745c1d2ac38cf609c46bc1dc1090be48aa62ed76c3cd61ad74e3b4e3693
-
Filesize
6KB
MD5e7ee67b868930d17b33a386ca2119e88
SHA1152beae852aa05f66bdaf748481cea0bc9e09028
SHA256b67d5c3f2ad73efb8f3143311cc0bcb25e88da8800db9d88ae40b6c88bd7e78a
SHA512cde1175315554ac4232a20d96df042791a0b356d6aedf48b4dfbfe71e5124865889ad36ea1487b589c43c2e462224fde356d95d91f2ff24110638c8fbe7c6dd9
-
Filesize
6KB
MD5e7ee67b868930d17b33a386ca2119e88
SHA1152beae852aa05f66bdaf748481cea0bc9e09028
SHA256b67d5c3f2ad73efb8f3143311cc0bcb25e88da8800db9d88ae40b6c88bd7e78a
SHA512cde1175315554ac4232a20d96df042791a0b356d6aedf48b4dfbfe71e5124865889ad36ea1487b589c43c2e462224fde356d95d91f2ff24110638c8fbe7c6dd9
-
Filesize
6KB
MD5e7ee67b868930d17b33a386ca2119e88
SHA1152beae852aa05f66bdaf748481cea0bc9e09028
SHA256b67d5c3f2ad73efb8f3143311cc0bcb25e88da8800db9d88ae40b6c88bd7e78a
SHA512cde1175315554ac4232a20d96df042791a0b356d6aedf48b4dfbfe71e5124865889ad36ea1487b589c43c2e462224fde356d95d91f2ff24110638c8fbe7c6dd9
-
Filesize
6KB
MD5e7ee67b868930d17b33a386ca2119e88
SHA1152beae852aa05f66bdaf748481cea0bc9e09028
SHA256b67d5c3f2ad73efb8f3143311cc0bcb25e88da8800db9d88ae40b6c88bd7e78a
SHA512cde1175315554ac4232a20d96df042791a0b356d6aedf48b4dfbfe71e5124865889ad36ea1487b589c43c2e462224fde356d95d91f2ff24110638c8fbe7c6dd9
-
Filesize
6KB
MD5e7ee67b868930d17b33a386ca2119e88
SHA1152beae852aa05f66bdaf748481cea0bc9e09028
SHA256b67d5c3f2ad73efb8f3143311cc0bcb25e88da8800db9d88ae40b6c88bd7e78a
SHA512cde1175315554ac4232a20d96df042791a0b356d6aedf48b4dfbfe71e5124865889ad36ea1487b589c43c2e462224fde356d95d91f2ff24110638c8fbe7c6dd9
-
Filesize
6KB
MD5e7ee67b868930d17b33a386ca2119e88
SHA1152beae852aa05f66bdaf748481cea0bc9e09028
SHA256b67d5c3f2ad73efb8f3143311cc0bcb25e88da8800db9d88ae40b6c88bd7e78a
SHA512cde1175315554ac4232a20d96df042791a0b356d6aedf48b4dfbfe71e5124865889ad36ea1487b589c43c2e462224fde356d95d91f2ff24110638c8fbe7c6dd9
-
Filesize
6KB
MD58e37cc963c1d74465c29b5435adb6175
SHA1a1576fe451b21c9833e12891ed5930f0c36f54d4
SHA256f1df8b4eb4bd51e3bb01c351abf0fceb32c65556885a574b4aee369bc76b3992
SHA5121e36a129dd02b525a8fb55ced9bd91a36f02b33c07e7145bcccd13e9d165c1efa1f276b603ebbc3c26c653ed8ce11a68e5981bc51049a69c496cdf621670b0f3
-
Filesize
6KB
MD581aefc6bf3f6c1241a53b060b86aa6f4
SHA12c585cfed5130cd1f54b8810568a6f65748f21a4
SHA256007ccb8109ddb0146887c487fc97baca9fb3b016a95c4174fc87c1d9b1e3168c
SHA5126e715c6060d2d5a1d9c0ae38378039500876f52ac5a148a6267aca1d19e43f4c8de7fd319976b51cc1f0db4b1602cfc3f2b905aede3475456241ce173520d1a3
-
Filesize
6KB
MD5e05a0ceaf8c31e46af966e6b3c118d2c
SHA12e177516fa8cbd410a4604c1b2ab4931420b1fd6
SHA2563d190da11f5bc7966e7a8b7bb116dffc3442b307dd55e8ac822088093de5cb8c
SHA5126366ba340799bf6859b6bda73433f34363c66ece6a55f8b53c7c47ef30fdeb7b890c321a9e8f3fc29f723077128cb1315dce2d50e21ebed2ccf53c2c1c02aaf9
-
Filesize
19.9MB
MD591589ea2826ee9df4d689e4ffad677ec
SHA11e9b0fcf91a9eaa288b6d92788098dfbb0e6fd96
SHA2562d1b86066bc55b7067e3ff232b99f91036f65b1569af108254843fb383dd26b4
SHA51205a2ebb3ad81a1b1e06b24dc08de180f82acaada2054ecc6e910119ed944b3e1298a5b80fa22faa48943e6f8dc5850ea97509062df7d607f4d915fa80ce30e53
-
Filesize
88KB
MD585fcf7b457b7194bbeb46db22fae05c3
SHA15eca64d0d4ab4599852a475a7dd25beb88ae1c27
SHA256e24376a9346c2d486ce7426ca3ddc73cd020bb7216f8e5a0b9b2cb23caddcf31
SHA51212d46c2d63d221adb288a89b2fe0b423d4ae7579c24c36d651a6ce9488bfdc669a1e8378309c28f7019c7cfc43fa87e99b4829cace97715c0b94ac9e2a758339
-
Filesize
88KB
MD585fcf7b457b7194bbeb46db22fae05c3
SHA15eca64d0d4ab4599852a475a7dd25beb88ae1c27
SHA256e24376a9346c2d486ce7426ca3ddc73cd020bb7216f8e5a0b9b2cb23caddcf31
SHA51212d46c2d63d221adb288a89b2fe0b423d4ae7579c24c36d651a6ce9488bfdc669a1e8378309c28f7019c7cfc43fa87e99b4829cace97715c0b94ac9e2a758339
-
Filesize
168KB
MD5a0962dd193b82c1946dc67e140ddf895
SHA17f36c38d80b7c32e750e22907ac7e1f0df76e966
SHA256b9e73e5ab78d033e0328fc74a9e4ebbd1af614bc4a7c894beb8c59d24ee3ede9
SHA512118b0bd2941d48479446ed16ab23861073d23f9cc815f5f1d380f9977f18c34a71f61496c78b77b9a70f8b0a6cd08fe1edc1adb376dad5762ad0dd2068c64751
-
Filesize
88KB
MD585fcf7b457b7194bbeb46db22fae05c3
SHA15eca64d0d4ab4599852a475a7dd25beb88ae1c27
SHA256e24376a9346c2d486ce7426ca3ddc73cd020bb7216f8e5a0b9b2cb23caddcf31
SHA51212d46c2d63d221adb288a89b2fe0b423d4ae7579c24c36d651a6ce9488bfdc669a1e8378309c28f7019c7cfc43fa87e99b4829cace97715c0b94ac9e2a758339
-
Filesize
168KB
MD5a0962dd193b82c1946dc67e140ddf895
SHA17f36c38d80b7c32e750e22907ac7e1f0df76e966
SHA256b9e73e5ab78d033e0328fc74a9e4ebbd1af614bc4a7c894beb8c59d24ee3ede9
SHA512118b0bd2941d48479446ed16ab23861073d23f9cc815f5f1d380f9977f18c34a71f61496c78b77b9a70f8b0a6cd08fe1edc1adb376dad5762ad0dd2068c64751
-
Filesize
25.0MB
MD5319dc40e69fa522891a8df08e192b951
SHA16ebdb9222bbf852a8eb8a70d0cd058b9348002ca
SHA25600a62d6aaa5b075f3daab8b5fb3ea392a6f4fca91ffa3f688db0ccad7c98c1cd
SHA512637dfde7592731f316582d13cbb237bafa307a1fffd52e5f5b939441e37e7d6fef4de9c7220d2ec7700a12ce0d66a3ef9cec929050f4b1fbab959265bd22e83f
-
\??\Volume{b79df8d1-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{dcf51922-ed3d-468c-9481-d1d9c797d3a7}_OnDiskSnapshotProp
Filesize5KB
MD5ae8e6db4844deb0eda7e6e5c1837797d
SHA164d2d025224dd77af3327121ec516864bf381c57
SHA256d22ad45c0315d9901231902a0b164c54ac9469be1c56250d5e4c5d513a92763b
SHA51237a2a41448e9f33eb25f3b10469cbe68d5eae3a52245b93d09d54fad7eeac60ecc7a8b4b612004e6bfb48aaa1629137ecf6e5358e611426aad71dfa3a58b0a61
-
Filesize
26.5MB
MD5213b11c6f666e8835378bc2c600bd018
SHA142794b8296e1f0077e896046d9a459de72e3fd62
SHA256f4ff95b840733bd999abbeff8e352028b952d62e1eeaa7c1f708742e28979361
SHA51291cfd5b2b901256d261adb6b74efcea288c3222e5b3342b2322a99ec60b331c5c13d11aecfe4e20bf231bcbe382479b43a0f10bedeb689844339cc960a0f0640
-
Filesize
26.5MB
MD5213b11c6f666e8835378bc2c600bd018
SHA142794b8296e1f0077e896046d9a459de72e3fd62
SHA256f4ff95b840733bd999abbeff8e352028b952d62e1eeaa7c1f708742e28979361
SHA51291cfd5b2b901256d261adb6b74efcea288c3222e5b3342b2322a99ec60b331c5c13d11aecfe4e20bf231bcbe382479b43a0f10bedeb689844339cc960a0f0640
-
Filesize
26.5MB
MD5213b11c6f666e8835378bc2c600bd018
SHA142794b8296e1f0077e896046d9a459de72e3fd62
SHA256f4ff95b840733bd999abbeff8e352028b952d62e1eeaa7c1f708742e28979361
SHA51291cfd5b2b901256d261adb6b74efcea288c3222e5b3342b2322a99ec60b331c5c13d11aecfe4e20bf231bcbe382479b43a0f10bedeb689844339cc960a0f0640
-
Filesize
26.5MB
MD5213b11c6f666e8835378bc2c600bd018
SHA142794b8296e1f0077e896046d9a459de72e3fd62
SHA256f4ff95b840733bd999abbeff8e352028b952d62e1eeaa7c1f708742e28979361
SHA51291cfd5b2b901256d261adb6b74efcea288c3222e5b3342b2322a99ec60b331c5c13d11aecfe4e20bf231bcbe382479b43a0f10bedeb689844339cc960a0f0640
-
Filesize
168KB
MD5a0962dd193b82c1946dc67e140ddf895
SHA17f36c38d80b7c32e750e22907ac7e1f0df76e966
SHA256b9e73e5ab78d033e0328fc74a9e4ebbd1af614bc4a7c894beb8c59d24ee3ede9
SHA512118b0bd2941d48479446ed16ab23861073d23f9cc815f5f1d380f9977f18c34a71f61496c78b77b9a70f8b0a6cd08fe1edc1adb376dad5762ad0dd2068c64751
-
Filesize
88KB
MD585fcf7b457b7194bbeb46db22fae05c3
SHA15eca64d0d4ab4599852a475a7dd25beb88ae1c27
SHA256e24376a9346c2d486ce7426ca3ddc73cd020bb7216f8e5a0b9b2cb23caddcf31
SHA51212d46c2d63d221adb288a89b2fe0b423d4ae7579c24c36d651a6ce9488bfdc669a1e8378309c28f7019c7cfc43fa87e99b4829cace97715c0b94ac9e2a758339
-
Filesize
88KB
MD585fcf7b457b7194bbeb46db22fae05c3
SHA15eca64d0d4ab4599852a475a7dd25beb88ae1c27
SHA256e24376a9346c2d486ce7426ca3ddc73cd020bb7216f8e5a0b9b2cb23caddcf31
SHA51212d46c2d63d221adb288a89b2fe0b423d4ae7579c24c36d651a6ce9488bfdc669a1e8378309c28f7019c7cfc43fa87e99b4829cace97715c0b94ac9e2a758339
-
Filesize
168KB
MD5a0962dd193b82c1946dc67e140ddf895
SHA17f36c38d80b7c32e750e22907ac7e1f0df76e966
SHA256b9e73e5ab78d033e0328fc74a9e4ebbd1af614bc4a7c894beb8c59d24ee3ede9
SHA512118b0bd2941d48479446ed16ab23861073d23f9cc815f5f1d380f9977f18c34a71f61496c78b77b9a70f8b0a6cd08fe1edc1adb376dad5762ad0dd2068c64751
-
Filesize
88KB
MD585fcf7b457b7194bbeb46db22fae05c3
SHA15eca64d0d4ab4599852a475a7dd25beb88ae1c27
SHA256e24376a9346c2d486ce7426ca3ddc73cd020bb7216f8e5a0b9b2cb23caddcf31
SHA51212d46c2d63d221adb288a89b2fe0b423d4ae7579c24c36d651a6ce9488bfdc669a1e8378309c28f7019c7cfc43fa87e99b4829cace97715c0b94ac9e2a758339
-
Filesize
168KB
MD5a0962dd193b82c1946dc67e140ddf895
SHA17f36c38d80b7c32e750e22907ac7e1f0df76e966
SHA256b9e73e5ab78d033e0328fc74a9e4ebbd1af614bc4a7c894beb8c59d24ee3ede9
SHA512118b0bd2941d48479446ed16ab23861073d23f9cc815f5f1d380f9977f18c34a71f61496c78b77b9a70f8b0a6cd08fe1edc1adb376dad5762ad0dd2068c64751