Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
456s -
max time network
1190s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
14/05/2024, 19:13
Static task
static1
Behavioral task
behavioral1
Sample
ScreenConnect.ClientSetup.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
ScreenConnect.ClientSetup.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
ScreenConnect.ClientSetup.exe
Resource
win11-20240508-en
General
-
Target
ScreenConnect.ClientSetup.exe
-
Size
5.2MB
-
MD5
5100c35ddc2ca0709857fa1b93e2fd6d
-
SHA1
d71cbdb3e8729cc071f20b86f3cdc534da93a880
-
SHA256
585af37e89555cdf0398a491a67f0c501f97c1d9f1ca47569f134b2a4aa6f614
-
SHA512
a50e2211e83d920e08e2c5030e2ff35e90905a7039b513a0ddd26b8eb8b19de0da5ee0c71da159c78ca082b4758926726257b8d5ce6fc505e4e6ef79d59d3202
-
SSDEEP
98304:3ps6efPfBOPvLtabi4X0MV+dYdcGt7VIb4:ZfefPJws3V+a
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (160ef0a635c283d2)\ImagePath = "\"C:\\Program Files (x86)\\ScreenConnect Client (160ef0a635c283d2)\\ScreenConnect.ClientService.exe\" \"?e=Access&y=Guest&h=instance-olqdnn-relay.screenconnect.com&p=443&s=7ff949d7-72ba-42b9-92de-fe6f6e1cde4e&k=BgIAAACkAABSU0ExAAgAAAEAAQDxFdEYsmqXizFg065Z9Wpb4PGj7JGIJVMU9f5p8lZaqjRiwsJ11J6%2fnftEZ%2fPT6F6tRBn45PzzIZkFeFXT0WPmpxH%2f%2fZk3UydaKxGk3WsiaXaKTlVrZFf6o662vMEYDkUkJGo2MtLyhMrY%2f8Afuai5h2QSMlNWgiNTKn9YlsC%2bjZ3jVfOS4Q0knYijY8sRUXXor8%2bCKgu%2fZYTZG78BpEJOlXHd%2bFxCLb4cgcN%2fGirqlEI46kYddMlUZFn9GBFscFldti6DTNfiKtMiLhSqqPuBZ061NDA%2bN5tcKPmYQyYXH2HLbi1pDfkpGhLPKAFK2CiXeu%2bzhtb5lgs3Sljf5R65&v=AQAAANCMnd8BFdERjHoAwE%2fCl%2bsBAAAAtxUUWSeJCEWE3ouj8unooQAAAAACAAAAAAAQZgAAAAEAACAAAAA1mvSk8iklxGeww16K97dyGoS18DVxCi1VDN7j7IJ0BQAAAAAOgAAAAAIAACAAAACkepRt3Ns0So8x6vQ8JqAtk%2bLMHYFmyL5anu59MSLnU6AEAAB85ycbbupiYmLQ%2bIoqi5FDOuAdD05r8WwCeo%2ba1tzfZ4v%2bOcL54MPJVARbls2Z6uoTiKLkzs3MZ87%2fMBT7VYwWZHknHVcEIJ6%2fiU5DDYz2UREeMqgVGkb4ic%2b9J1Sn9RQYkOw6Si7cf6ZeuoIo0ARX99%2bQ0JWvIALgL0C3hotyJM8l42GNn8L8WQoy4KPA%2bD1fv9e9Qg5YAMGxmAVvBqnZIGbyX1gRVo6WSp7G0XHJH1zgptcDnMeud2rdJQrvb7byP6kT3tCRKDQztgWcIZG4NSgk0wyOJWO4iAdHJCMdUEoIF1vZ6nKMA5eioFD%2bAoAa8MsNz%2fI6lv5jul0upFn1ZiX9bL3atTRStS6oRCelhPDvUyRqclW5DmNiEsiCvb8K04%2bHy%2fG2MtVb1nrvzjjESZ0ZMPvxnO4SpcDzMxWr%2bPYh7ZV1fWfZBTouEcEzGQ5K8QM%2bcXpGGM9v7GSS2784Ei4RwJ%2bAzk3kmQbR%2f2An4wbv09fkfkspdgtpXXuQPW68P8VqhHuZIK0VDF4pSv%2baI7cS7KOB3n6ndlXvA4LcyquQdD2FM8FIEYRtOwop3tvPkqSTHP2CpemVvdwzz0AgnMDPC0PHRaWaNPKLWwfLKydG4fvv%2fR8ETdA2DM6YytIkveFEkhQjz1AnbnISoVPaYcHO7HyyBsmYWmyuLB6Shev%2b9e453M9MMduUo4owBqhHp7tXB2uQUKfiBwExjDpPUVBYOffihGfAgw3AL%2fre5rdsFXQw0Js0HWuAxJFXXZJmQ501r7DShQLAMFpX3IMLy0bWccxvU6vF6d%2fIt7bgPhOYsjYKYu8kEhWMzIUhMCXjOvBX%2bOrXsAuu%2fJebuwGdZPceP1pd9l5KtpzvY9Rj7R3gHl9B9ww1NgyNOj9CZVlLo9NJ1j4rq4flO5BHay%2bGG2T5toxBP13lVR%2fruXszPGulYU5%2b2KZue2xbJgXbzIKX6czyiwAl5pDTg1MAgq6nt36s628NU%2ft4Di9D8JLF3ktCBnmZt4stgQM8Ju1iIU%2bJAM2%2b5yt3GVz18gVybpP3FT1ubYSCK%2bwsaTlethnGP5pus6UxQXoCsxHN%2bMv2rsAuKUYRPGo9BhX%2baE7QtnWol0hEjX1bawoLwv7GHQl4TYIqU5TJV%2fp%2fetPixgsEeB1K1FHXdypTTMIgIOv6tdtUE94Mb9t%2b66X8rxA57WAuxBwNIKaeRXIL%2ftXS2n4gvj6NxnmPUANVPEvr04Np1dxc9nXVw7%2fq4Wo7fsYPWN5gZYlJ62fhQST6YS5c16edjF2N6b5%2f%2f%2bB2eN7bNQ4XnmG3LXM6vP4pgFfcYQ0wB6mvfZqmUunxzGcFQGz5duwpOYericRnrHOFiTel3Jk7gC7AB9DVR99FOFmy%2fAIkfnR4dzkOJktvI5ImQyga0PmDvODQYomkn%2bqA%2f%2bvGfQ5K%2fIVAbXlbno5mvdan4va6p56X0d9s9ACPVaP9lph9eO6iocpwkpWAJT7CNmElrkUVipaAwz8tDnuWIhFofeSSK%2fKaRXtzGo10fjEVTVJmlOlRXQai8CdytuWjDcD%2fTrx7zLUdGu0ZJSsk0Rn779gxq%2bh8EkAAAAChwLfI%2bEeNwj9rwebd0JCcKSycLFOwUb6AttSMXaH6sJxomu1oOtS6YjXkEHlqTAVJDEN4LdE%2fUD%2fTeg4LKKdT\"" ScreenConnect.ClientService.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (160ef0a635c283d2)\2ncni3si.newcfg ScreenConnect.ClientService.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log ScreenConnect.WindowsClient.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (160ef0a635c283d2)\2ncni3si.tmp ScreenConnect.ClientService.exe -
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\ScreenConnect.Core.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\ScreenConnect.WindowsClient.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\ScreenConnect.WindowsCredentialProvider.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\ScreenConnect.WindowsFileManager.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\Client.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\system.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\ScreenConnect.WindowsBackstageShell.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\ScreenConnect.WindowsClient.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\ScreenConnect.WindowsFileManager.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\Client.en-US.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\ScreenConnect.Windows.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\ScreenConnect.ClientService.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\Client.fr-FR.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\ScreenConnect.Client.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\ScreenConnect.ClientService.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\ScreenConnect.WindowsBackstageShell.exe.config msiexec.exe -
Drops file in Windows directory 17 IoCs
description ioc Process File opened for modification C:\Windows\Installer\e579191.msi msiexec.exe File created C:\Windows\Installer\SourceHash{3C73C0E4-A053-E1A6-81CF-3FC4E3335E67} msiexec.exe File opened for modification C:\Windows\Installer\MSI9424.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\SystemTemp\~DF9164E7EDF50CE6E6.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI92AB.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF44FF6C66DE2E67E7.TMP msiexec.exe File created C:\Windows\Installer\wix{3C73C0E4-A053-E1A6-81CF-3FC4E3335E67}.SchedServiceConfig.rmi MsiExec.exe File created C:\Windows\Installer\{3C73C0E4-A053-E1A6-81CF-3FC4E3335E67}\DefaultIcon msiexec.exe File created C:\Windows\SystemTemp\~DFABB83473870E2D28.TMP msiexec.exe File created C:\Windows\Installer\e579191.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\SystemTemp\~DF4EA3F1F144714370.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSI92DB.tmp msiexec.exe File created C:\Windows\Installer\e579193.msi msiexec.exe File opened for modification C:\Windows\Installer\{3C73C0E4-A053-E1A6-81CF-3FC4E3335E67}\DefaultIcon msiexec.exe -
Executes dropped EXE 3 IoCs
pid Process 4800 ScreenConnect.ClientService.exe 1012 ScreenConnect.WindowsClient.exe 2804 ScreenConnect.WindowsClient.exe -
Loads dropped DLL 20 IoCs
pid Process 1620 MsiExec.exe 4844 rundll32.exe 4844 rundll32.exe 4844 rundll32.exe 4844 rundll32.exe 4844 rundll32.exe 4844 rundll32.exe 4844 rundll32.exe 1416 MsiExec.exe 2932 MsiExec.exe 4800 ScreenConnect.ClientService.exe 4800 ScreenConnect.ClientService.exe 4800 ScreenConnect.ClientService.exe 4800 ScreenConnect.ClientService.exe 4800 ScreenConnect.ClientService.exe 4800 ScreenConnect.ClientService.exe 4800 ScreenConnect.ClientService.exe 4800 ScreenConnect.ClientService.exe 4800 ScreenConnect.ClientService.exe 4800 ScreenConnect.ClientService.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-9EBF-9508928601A7}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-9EBF-9508928601A7}\InprocServer32\ = "C:\\Program Files (x86)\\ScreenConnect Client (160ef0a635c283d2)\\ScreenConnect.WindowsCredentialProvider.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-9EBF-9508928601A7}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ScreenConnect.WindowsClient.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ScreenConnect.WindowsClient.exe -
Modifies data under HKEY_USERS 13 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ScreenConnect.ClientService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2b msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ScreenConnect.ClientService.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ScreenConnect.WindowsClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ScreenConnect.ClientService.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\2A\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ScreenConnect.WindowsClient.exe -
Modifies registry class 37 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4E0C37C3350A6A1E18FCF34C3E33E576\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-9EBF-9508928601A7}\ = "ScreenConnect Client (160ef0a635c283d2) Credential Provider" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4E0C37C3350A6A1E18FCF34C3E33E576\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4E0C37C3350A6A1E18FCF34C3E33E576\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\ScreenConnect\\160ef0a635c283d2\\" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-160ef0a635c283d2\shell\open\command msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-160ef0a635c283d2\shell\open\command\ = "\"C:\\Program Files (x86)\\ScreenConnect Client (160ef0a635c283d2)\\ScreenConnect.WindowsClient.exe\" \"%1\"" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\4E0C37C3350A6A1E18FCF34C3E33E576\Full msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4E0C37C3350A6A1E18FCF34C3E33E576\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-160ef0a635c283d2\shell msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-9EBF-9508928601A7} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-9EBF-9508928601A7}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-9EBF-9508928601A7}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4E0C37C3350A6A1E18FCF34C3E33E576\ProductIcon = "C:\\Windows\\Installer\\{3C73C0E4-A053-E1A6-81CF-3FC4E3335E67}\\DefaultIcon" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\C4E4A3D1E16A534161E00F6A532C382D msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-160ef0a635c283d2\UseOriginalUrlEncoding = "1" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-160ef0a635c283d2 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\C4E4A3D1E16A534161E00F6A532C382D\4E0C37C3350A6A1E18FCF34C3E33E576 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4E0C37C3350A6A1E18FCF34C3E33E576\ProductName = "ScreenConnect Client (160ef0a635c283d2)" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4E0C37C3350A6A1E18FCF34C3E33E576\Version = "386465802" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4E0C37C3350A6A1E18FCF34C3E33E576\InstanceType = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4E0C37C3350A6A1E18FCF34C3E33E576\SourceList\Media msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4E0C37C3350A6A1E18FCF34C3E33E576\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-160ef0a635c283d2\shell\open\command msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4E0C37C3350A6A1E18FCF34C3E33E576 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4E0C37C3350A6A1E18FCF34C3E33E576\PackageCode = "4E0C37C3350A6A1E18FCF34C3E33E576" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4E0C37C3350A6A1E18FCF34C3E33E576\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4E0C37C3350A6A1E18FCF34C3E33E576\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4E0C37C3350A6A1E18FCF34C3E33E576\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ScreenConnect\\160ef0a635c283d2\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4E0C37C3350A6A1E18FCF34C3E33E576\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-160ef0a635c283d2\shell\open msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\4E0C37C3350A6A1E18FCF34C3E33E576 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4E0C37C3350A6A1E18FCF34C3E33E576\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-160ef0a635c283d2 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-160ef0a635c283d2\URL Protocol msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4E0C37C3350A6A1E18FCF34C3E33E576\SourceList\PackageName = "setup.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-9EBF-9508928601A7}\InprocServer32\ = "C:\\Program Files (x86)\\ScreenConnect Client (160ef0a635c283d2)\\ScreenConnect.WindowsCredentialProvider.dll" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\4E0C37C3350A6A1E18FCF34C3E33E576\Language = "1033" msiexec.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 1012 ScreenConnect.WindowsClient.exe 2804 ScreenConnect.WindowsClient.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4000 msiexec.exe 4000 msiexec.exe 4800 ScreenConnect.ClientService.exe 4800 ScreenConnect.ClientService.exe 4800 ScreenConnect.ClientService.exe 4800 ScreenConnect.ClientService.exe 4800 ScreenConnect.ClientService.exe 4800 ScreenConnect.ClientService.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1912 ScreenConnect.ClientSetup.exe Token: SeShutdownPrivilege 1072 msiexec.exe Token: SeIncreaseQuotaPrivilege 1072 msiexec.exe Token: SeSecurityPrivilege 4000 msiexec.exe Token: SeCreateTokenPrivilege 1072 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1072 msiexec.exe Token: SeLockMemoryPrivilege 1072 msiexec.exe Token: SeIncreaseQuotaPrivilege 1072 msiexec.exe Token: SeMachineAccountPrivilege 1072 msiexec.exe Token: SeTcbPrivilege 1072 msiexec.exe Token: SeSecurityPrivilege 1072 msiexec.exe Token: SeTakeOwnershipPrivilege 1072 msiexec.exe Token: SeLoadDriverPrivilege 1072 msiexec.exe Token: SeSystemProfilePrivilege 1072 msiexec.exe Token: SeSystemtimePrivilege 1072 msiexec.exe Token: SeProfSingleProcessPrivilege 1072 msiexec.exe Token: SeIncBasePriorityPrivilege 1072 msiexec.exe Token: SeCreatePagefilePrivilege 1072 msiexec.exe Token: SeCreatePermanentPrivilege 1072 msiexec.exe Token: SeBackupPrivilege 1072 msiexec.exe Token: SeRestorePrivilege 1072 msiexec.exe Token: SeShutdownPrivilege 1072 msiexec.exe Token: SeDebugPrivilege 1072 msiexec.exe Token: SeAuditPrivilege 1072 msiexec.exe Token: SeSystemEnvironmentPrivilege 1072 msiexec.exe Token: SeChangeNotifyPrivilege 1072 msiexec.exe Token: SeRemoteShutdownPrivilege 1072 msiexec.exe Token: SeUndockPrivilege 1072 msiexec.exe Token: SeSyncAgentPrivilege 1072 msiexec.exe Token: SeEnableDelegationPrivilege 1072 msiexec.exe Token: SeManageVolumePrivilege 1072 msiexec.exe Token: SeImpersonatePrivilege 1072 msiexec.exe Token: SeCreateGlobalPrivilege 1072 msiexec.exe Token: SeCreateTokenPrivilege 1072 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1072 msiexec.exe Token: SeLockMemoryPrivilege 1072 msiexec.exe Token: SeIncreaseQuotaPrivilege 1072 msiexec.exe Token: SeMachineAccountPrivilege 1072 msiexec.exe Token: SeTcbPrivilege 1072 msiexec.exe Token: SeSecurityPrivilege 1072 msiexec.exe Token: SeTakeOwnershipPrivilege 1072 msiexec.exe Token: SeLoadDriverPrivilege 1072 msiexec.exe Token: SeSystemProfilePrivilege 1072 msiexec.exe Token: SeSystemtimePrivilege 1072 msiexec.exe Token: SeProfSingleProcessPrivilege 1072 msiexec.exe Token: SeIncBasePriorityPrivilege 1072 msiexec.exe Token: SeCreatePagefilePrivilege 1072 msiexec.exe Token: SeCreatePermanentPrivilege 1072 msiexec.exe Token: SeBackupPrivilege 1072 msiexec.exe Token: SeRestorePrivilege 1072 msiexec.exe Token: SeShutdownPrivilege 1072 msiexec.exe Token: SeDebugPrivilege 1072 msiexec.exe Token: SeAuditPrivilege 1072 msiexec.exe Token: SeSystemEnvironmentPrivilege 1072 msiexec.exe Token: SeChangeNotifyPrivilege 1072 msiexec.exe Token: SeRemoteShutdownPrivilege 1072 msiexec.exe Token: SeUndockPrivilege 1072 msiexec.exe Token: SeSyncAgentPrivilege 1072 msiexec.exe Token: SeEnableDelegationPrivilege 1072 msiexec.exe Token: SeManageVolumePrivilege 1072 msiexec.exe Token: SeImpersonatePrivilege 1072 msiexec.exe Token: SeCreateGlobalPrivilege 1072 msiexec.exe Token: SeCreateTokenPrivilege 1072 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1072 msiexec.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 1072 msiexec.exe 1072 msiexec.exe 1012 ScreenConnect.WindowsClient.exe 1012 ScreenConnect.WindowsClient.exe 1012 ScreenConnect.WindowsClient.exe 1012 ScreenConnect.WindowsClient.exe 1012 ScreenConnect.WindowsClient.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 1012 ScreenConnect.WindowsClient.exe 1012 ScreenConnect.WindowsClient.exe 1012 ScreenConnect.WindowsClient.exe 1012 ScreenConnect.WindowsClient.exe 1012 ScreenConnect.WindowsClient.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1912 wrote to memory of 1072 1912 ScreenConnect.ClientSetup.exe 77 PID 1912 wrote to memory of 1072 1912 ScreenConnect.ClientSetup.exe 77 PID 1912 wrote to memory of 1072 1912 ScreenConnect.ClientSetup.exe 77 PID 4000 wrote to memory of 1620 4000 msiexec.exe 81 PID 4000 wrote to memory of 1620 4000 msiexec.exe 81 PID 4000 wrote to memory of 1620 4000 msiexec.exe 81 PID 1620 wrote to memory of 4844 1620 MsiExec.exe 82 PID 1620 wrote to memory of 4844 1620 MsiExec.exe 82 PID 1620 wrote to memory of 4844 1620 MsiExec.exe 82 PID 4000 wrote to memory of 3008 4000 msiexec.exe 86 PID 4000 wrote to memory of 3008 4000 msiexec.exe 86 PID 4000 wrote to memory of 1416 4000 msiexec.exe 88 PID 4000 wrote to memory of 1416 4000 msiexec.exe 88 PID 4000 wrote to memory of 1416 4000 msiexec.exe 88 PID 4000 wrote to memory of 2932 4000 msiexec.exe 89 PID 4000 wrote to memory of 2932 4000 msiexec.exe 89 PID 4000 wrote to memory of 2932 4000 msiexec.exe 89 PID 4800 wrote to memory of 1012 4800 ScreenConnect.ClientService.exe 91 PID 4800 wrote to memory of 1012 4800 ScreenConnect.ClientService.exe 91 PID 4800 wrote to memory of 2804 4800 ScreenConnect.ClientService.exe 92 PID 4800 wrote to memory of 2804 4800 ScreenConnect.ClientService.exe 92 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ScreenConnect.ClientSetup.exe"C:\Users\Admin\AppData\Local\Temp\ScreenConnect.ClientSetup.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\160ef0a635c283d2\setup.msi"2⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1072
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Registers COM server for autorun
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 5FDF134A8A2CD2F565E8563E46C6D4C6 C2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI7417.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240612437 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments3⤵
- Loads dropped DLL
PID:4844
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:3008
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 15F9BD650E0FD6DA6CF6905B689097E32⤵
- Loads dropped DLL
PID:1416
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 271E6C7A139EED8D2E7272419472E8D2 E Global\MSI00002⤵
- Drops file in Windows directory
- Loads dropped DLL
PID:2932
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:2800
-
C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\ScreenConnect.ClientService.exe"C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=instance-olqdnn-relay.screenconnect.com&p=443&s=7ff949d7-72ba-42b9-92de-fe6f6e1cde4e&k=BgIAAACkAABSU0ExAAgAAAEAAQDxFdEYsmqXizFg065Z9Wpb4PGj7JGIJVMU9f5p8lZaqjRiwsJ11J6%2fnftEZ%2fPT6F6tRBn45PzzIZkFeFXT0WPmpxH%2f%2fZk3UydaKxGk3WsiaXaKTlVrZFf6o662vMEYDkUkJGo2MtLyhMrY%2f8Afuai5h2QSMlNWgiNTKn9YlsC%2bjZ3jVfOS4Q0knYijY8sRUXXor8%2bCKgu%2fZYTZG78BpEJOlXHd%2bFxCLb4cgcN%2fGirqlEI46kYddMlUZFn9GBFscFldti6DTNfiKtMiLhSqqPuBZ061NDA%2bN5tcKPmYQyYXH2HLbi1pDfkpGhLPKAFK2CiXeu%2bzhtb5lgs3Sljf5R65"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\ScreenConnect.WindowsClient.exe" "RunRole" "34d51120-d9bf-4a17-b28c-f75832aa8364" "User"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1012
-
-
C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\ScreenConnect.WindowsClient.exe" "RunRole" "0a3f6eba-0bec-4928-9ae4-19d4bdf0631d" "System"2⤵
- Drops file in System32 directory
- Executes dropped EXE
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: AddClipboardFormatListener
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD50c4b9ecefa07216429ee13b8b0b7ff23
SHA1ea0c788e1b597059ecf9a3de0e78f40780882bb1
SHA25652accfaee58066b0833b63850c42882672c32e8d910a478a5819341038bbfa13
SHA5127069dc87b634dad722b8b71e13c547251b4d85c4925479ab14abf403e3d49d107311275203e18713141cd0ce723c8775c657f4efcc1f415d3eb69f7cf068d6da
-
Filesize
47KB
MD53e83a3aa62c5ff54ed98e27b3fbecf90
SHA196d8927c870a74a478864240b3ace94ad543dfb8
SHA2562d88b97d28be01abca4544c6381a4370c1a1ce05142c176742f13b44889ddf90
SHA512ea9d05a4aa1ee5cccc61c4f5e8994efba9efff0549b69577bef1f2a22cce908739124eff1e0db5cfdd69e077ad2d7cdb1307de92d79673c9309ee621cb139956
-
Filesize
45KB
MD5cbcd812e3b342bb634c6917f0943965b
SHA1f918d7f6f0bfcbe641ac5a02db873eda75231ea9
SHA256182e6523208dfab4e9fa14a233d404cecd3c8a3dcf5bc246ed40c349d468ddc3
SHA51222442a73bd44028c4fb4ec63856b916bb47b0c195223c15830e44358160211663a61c544cf9e857a4a62bead4865f7e5e00e8d413df961246a392646df6070e0
-
Filesize
26KB
MD55cd580b22da0c33ec6730b10a6c74932
SHA10b6bded7936178d80841b289769c6ff0c8eead2d
SHA256de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c
SHA512c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787
-
Filesize
188KB
MD56bc9611d5b6cee698149a18d986547a8
SHA1f36ab74e4e502fdaf81e101836b94c91d80cb8ea
SHA25617377a52eeae11e8ee01eb629d6a60c10015ad2bb8bc9768e5c8e4b6500a15ed
SHA5123f23670d0ba150de19a805db6beb6eed8538bbad6fbe3cc21d17d738a43cf411c679a23cea11549e69be0321e672f740791d40e92498aef9d1f8650743ee85ea
-
Filesize
60KB
MD522af3a23bd30484514cdacf67c5b3810
SHA1e92a4eaee9d896964de541ce2f01c2404b638258
SHA2567c5442121dba2a30ab9579ec08e111ded372cf9cf90fb3256f273980b975afa9
SHA51295e40b27e90fce7ca85e76afbbc16eb62b4bb977664702b987de2eb2294e6fe9e6df5610ec7b2362c2c68493313f30fbbcbd3446dbe8ae2fa47b89407f5d5936
-
Filesize
93KB
MD5dc615e9d8ec81cbf2e2452516373e5a0
SHA1ec83d37a4f45caeb07b1605324d0315f959452e9
SHA256e9ab064ed381c29a3930f75ca3e05605c6ee07f30a69c043f576a5461de3bafc
SHA51282fe00447fb9785264dfb8032399adf6d33d91d71058212d252742c9e5fd54f5a52f6baf4fb05e95f9a4055057c60a33a7c1c642f18a6a4e045b49be88fa5d9f
-
Filesize
1.6MB
MD529454a0cb83f28c24805e9a70e53444a
SHA1334202965b07ab69f08b16fed0ee6c7274463556
SHA256998cc3f9af5bd41ccf0f9be86192bbe20cdec08a6ff73c1199e1364195a83e14
SHA51262790920974a2f1b018d466ae3e3b5100006a3c8013f43bdb04af7074cfe5d992caaeb610de2b1b72ff0e4acf8762db1513a4a0cf331f9a340ae0ce53c3be895
-
Filesize
573KB
MD55dec65c4047de914c78816b8663e3602
SHA18807695ee8345e37efec43cbc0874277ed9b0a66
SHA25671602f6b0b27c8b7d8ad624248e6126970939effde785ec913ace19052e9960e
SHA51227b5dcb5b0aeadf246b91a173d06e5e8d6cf2cd19d86ca358e0a85b84cd9d8f2b26372ef34c3d427f57803d90f2e97cf59692c80c268a71865f08fc0e7ce42d1
-
C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\ScreenConnect.WindowsClient.exe.config
Filesize266B
MD5728175e20ffbceb46760bb5e1112f38b
SHA12421add1f3c9c5ed9c80b339881d08ab10b340e3
SHA25687c640d3184c17d3b446a72d5f13d643a774b4ecc7afbedfd4e8da7795ea8077
SHA512fb9b57f4e6c04537e8fdb7cc367743c51bf2a0ad4c3c70dddab4ea0cf9ff42d5aeb9d591125e7331374f8201cebf8d0293ad934c667c1394dc63ce96933124e7
-
C:\Program Files (x86)\ScreenConnect Client (160ef0a635c283d2)\ScreenConnect.WindowsCredentialProvider.dll
Filesize746KB
MD5f01a59c5cf7ec437097d414d7c6d59c4
SHA19ea1c3fbf3b5adbe5a23578dea3b511d44e6a2dd
SHA25662b405f32a43da0c8e8ed14a58ec7b9b4422b154bfd4aed4f9be5de0bc6eb5e8
SHA512587748ad4dd18677a3b7943eab1c0f8e77fe50a45e17266ba9a0e1363eda0ff1eabcf11884a5d608e23baf86af8f011db745ad06bcdecdfd01c20430745fe4bb
-
Filesize
968B
MD5008d3eb50e95dfb757f40b0025fa16e5
SHA1f6de0f81795b596e7eac5fbace62c6d7dac17d2a
SHA256ae1757ccd652540a1d879b6bdb8ec45ba48f3e8b27770b6113fd4bd4ddc775ef
SHA512e23d01669967aba5666bad3db5119141bc507654c618930cdf6ef78e8a3e7677da34f6c17b06d1cac529b3090ef268c4be406fcb6d04b3556e23a7b22bba1f7c
-
Filesize
1017KB
MD58d94c9f4c07b76b4e32daffcc51109da
SHA162e31a89c488d6745abb72a3071f688fd6180d33
SHA2562b35c0e4088b2a7728fa7bc6a5bfdefed7665598de6d49641fdf5d1f1271a4d7
SHA5120092cbbd95777e6931864d61931efdf3a349f79c575030cad9a1771432f52e1bdc25d5640e2923d202c42c2ce242d00187486334a946e97319d48211233eb0ac
-
Filesize
172KB
MD55ef88919012e4a3d8a1e2955dc8c8d81
SHA1c0cfb830b8f1d990e3836e0bcc786e7972c9ed62
SHA2563e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d
SHA5124544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684
-
Filesize
519KB
MD5b319407e807be1a49e366f7f8ea7ee2a
SHA1b12197a877fb7e33b1cb5ba11b0da5ca706581ba
SHA256761b7e50baa229e8afcd9a50990d7f776ddb5ed1ea5fbb131c802e57cf918742
SHA512dc497643790dc608dece9c8fe7264efedd13724bd24c9bf28a60d848b405fddefb8337a60f3f32bb91518910e02c7a2aaf29fc32f86a464dfcafa365526bdb7f
-
Filesize
21KB
MD5b0585159161d50e330b7f8eda50a2770
SHA18636fab3ce6c21a42d3e5fbd495c2ddad4279162
SHA256ca9e51d51f24e16428d1b0e9a0829a44da2678bfc7ba00f0b46a57dcd6d734b8
SHA512e9ae99bdce64ca4282fa4580d3b081f7d0874c756aef77fb58e10db148e2f670ba48667ce62033c6f514ff825dc54c1bdbae2c7f8d5f9355486402cf75e1d5ad
-
Filesize
9.1MB
MD59b8540f756f5a981640973e47e53f8b6
SHA1118a1bc14cfe957fae0e40583392eeb59e321ab1
SHA256a27b6784ba35d71e8772a429c3b241a43cbcab783ed9a28eaafd56fefd9f8d28
SHA51223524b0aa30cb1259ca20ea467bedbc9ae522077e8d9452c4d5bba1150a33468cc10122ba9912684a1b256c76e18fc60ca45597fb6d5640d449afe98af33652d
-
Filesize
202KB
MD5ba84dd4e0c1408828ccc1de09f585eda
SHA1e8e10065d479f8f591b9885ea8487bc673301298
SHA2563cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852
SHA5127a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290
-
Filesize
12.8MB
MD5a8a7376266d89f7868eb836aa384bac8
SHA1f54fca46cddbfe6f51a3cf50e5fc804200f0fcee
SHA2564fe925213021cbff169df75bd624d10f3e99aff0f44adcc250ce3d4c0b705be2
SHA5122dd9a0e73ba5593ed1cdda493908459358253ec9602ae81003b357c12305dc717038b950b12ccb9073de58bc60d9c258e4aa095c460ae68626d2e4d22f2df279
-
\??\Volume{453a990c-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{9fd0ae2b-1cc9-4b1f-907d-63d04b86cad2}_OnDiskSnapshotProp
Filesize6KB
MD5d7b5205cd651218504ae554482ee556c
SHA15493f387bab2b02f643b4cab77e12c9be63dc57d
SHA256c027cdf8519011a745e82a3e05e556b4e6ff5bc7f2092cc69fef2bc4f306e2cf
SHA5122b575f751b3de36123fb3c81bbe2c47d2dec68364b97f354f173a9851dcbd96099734e90d1ff460e462d4d4c91d73ca50b7963219ceb0d8ab81c7ef2b0b960e0