Analysis
-
max time kernel
1578s -
max time network
1583s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 22:32
Static task
static1
Behavioral task
behavioral1
Sample
Firework Stars.png
Resource
win10v2004-20240426-en
General
-
Target
Firework Stars.png
-
Size
39KB
-
MD5
474e7fac5724eb07163aefc19e1f1f79
-
SHA1
775c689df447faeba0d2293ce892c995465f8a02
-
SHA256
9bb9b429599af896e15e17f93bd828d8917cffaff40b6107b47dfb6972b59145
-
SHA512
a0ab811f0ab42ea50c13f0215b0d48704609383c0a3afc13a5590ef2e1997e6e529ddf8302062f3244a1b19b4105ed5820ce6fb229b2ade8a26e219fcbc255bd
-
SSDEEP
768:gLQAgCRfQIfvUoDNLhhPS5pNyxOHngjN8o1GYoQ9sLKUjgIcEb36IuXdxHOeVlJ:3AlfQIXbDNVhqAx8ngjN8EvrUjbwjf9
Malware Config
Signatures
-
Downloads MZ/PE file
-
Drops file in Drivers directory 12 IoCs
Processes:
MsiExec.exedescription ioc process File opened for modification C:\Windows\system32\DRIVERS\SET8183.tmp MsiExec.exe File created C:\Windows\system32\DRIVERS\SET8183.tmp MsiExec.exe File opened for modification C:\Windows\system32\DRIVERS\VBoxSup.sys MsiExec.exe File opened for modification C:\Windows\system32\DRIVERS\SET828C.tmp MsiExec.exe File opened for modification C:\Windows\system32\DRIVERS\SET9971.tmp MsiExec.exe File created C:\Windows\system32\DRIVERS\SET9971.tmp MsiExec.exe File created C:\Windows\system32\DRIVERS\SET828C.tmp MsiExec.exe File opened for modification C:\Windows\system32\DRIVERS\VBoxUSBMon.sys MsiExec.exe File opened for modification C:\Windows\system32\DRIVERS\SET94BD.tmp MsiExec.exe File created C:\Windows\system32\DRIVERS\SET94BD.tmp MsiExec.exe File opened for modification C:\Windows\system32\DRIVERS\VBoxNetAdp6.sys MsiExec.exe File opened for modification C:\Windows\system32\DRIVERS\VBoxNetLwf.sys MsiExec.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
MsiExec.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432NODE\MICROSOFT\ACTIVE SETUP\INSTALLED COMPONENTS\{A6EADE66-0000-0000-484E-7E8A45000000} MsiExec.exe -
Sets file execution options in registry 2 TTPs 4 IoCs
Processes:
msiexec.exedescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AcroRd32.exe msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RdrServicesUpdater.exe msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AcroRd32Info.exe msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RdrCEF.exe msiexec.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
SetupHost.ExeSetupHost.Exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation SetupHost.Exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation SetupHost.Exe -
Executes dropped EXE 13 IoCs
Processes:
MSIBECD.tmpFullTrustNotifier.exeUninst.exeUninst.exeVirtualBox-7.0.18-162988-Win.exeVirtualBox.exeVBoxSVC.exeVBoxSDS.exeMediaCreationTool_22H2.exeSetupHost.ExeDiagTrackRunner.exeMediaCreationTool_22H2 (1).exeSetupHost.Exepid process 2908 MSIBECD.tmp 1928 FullTrustNotifier.exe 4792 Uninst.exe 4664 Uninst.exe 2368 VirtualBox-7.0.18-162988-Win.exe 2880 VirtualBox.exe 3016 VBoxSVC.exe 5076 VBoxSDS.exe 6116 MediaCreationTool_22H2.exe 2324 SetupHost.Exe 216 DiagTrackRunner.exe 5368 MediaCreationTool_22H2 (1).exe 1492 SetupHost.Exe -
Loads dropped DLL 64 IoCs
Processes:
MsiExec.exeMsiExec.exeMsiExec.exeMsiExec.exeMsiExec.exeMsiExec.exeVirtualBox.exepid process 1484 MsiExec.exe 1484 MsiExec.exe 1484 MsiExec.exe 1484 MsiExec.exe 1484 MsiExec.exe 1484 MsiExec.exe 1484 MsiExec.exe 1484 MsiExec.exe 1484 MsiExec.exe 1484 MsiExec.exe 1484 MsiExec.exe 1484 MsiExec.exe 1484 MsiExec.exe 1380 MsiExec.exe 1380 MsiExec.exe 1380 MsiExec.exe 1380 MsiExec.exe 1380 MsiExec.exe 1380 MsiExec.exe 1380 MsiExec.exe 1484 MsiExec.exe 1380 MsiExec.exe 1380 MsiExec.exe 1380 MsiExec.exe 1380 MsiExec.exe 1380 MsiExec.exe 1380 MsiExec.exe 1380 MsiExec.exe 1380 MsiExec.exe 1380 MsiExec.exe 1380 MsiExec.exe 1380 MsiExec.exe 1380 MsiExec.exe 1380 MsiExec.exe 1380 MsiExec.exe 1484 MsiExec.exe 1484 MsiExec.exe 1484 MsiExec.exe 1484 MsiExec.exe 3232 MsiExec.exe 3232 MsiExec.exe 3232 MsiExec.exe 3232 MsiExec.exe 3232 MsiExec.exe 3232 MsiExec.exe 4348 MsiExec.exe 4348 MsiExec.exe 4348 MsiExec.exe 4348 MsiExec.exe 2228 MsiExec.exe 4348 MsiExec.exe 4348 MsiExec.exe 3572 MsiExec.exe 3572 MsiExec.exe 3572 MsiExec.exe 3572 MsiExec.exe 3572 MsiExec.exe 3572 MsiExec.exe 3572 MsiExec.exe 3572 MsiExec.exe 3572 MsiExec.exe 4348 MsiExec.exe 4348 MsiExec.exe 2880 VirtualBox.exe -
Registers COM server for autorun 1 TTPs 22 IoCs
Processes:
msiexec.exeVirtualBox.exeMsiExec.exeUninst.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0BB3B78C-1807-4249-5BA5-EA42D66AF0BF}\InprocServer32\ = "C:\\Program Files\\Oracle\\VirtualBox\\VBoxProxyStub.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B1A7A4F2-47B9-4A1E-82B2-07CCD5323C3F}\LocalServer32\ = "\"C:\\Program Files\\Oracle\\VirtualBox\\VBoxSVC.exe\"" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DD3FC71D-26C0-4FE1-BF6F-67F633265BBA}\InprocServer32\ThreadingModel = "Free" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3C02F46D-C9D2-4F11-A384-53F0CF917214}\InprocServer32\ = "C:\\Program Files\\Oracle\\VirtualBox\\VBoxC.dll" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0BB3B78C-1807-4249-5BA5-EA42D66AF0BF}\InprocServer32 VirtualBox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3C02F46D-C9D2-4F11-A384-53F0CF917214}\InprocServer32 VirtualBox.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F0B4F6AD-5E09-4CB1-B763-EC390CBDE51D}\InprocServer32 MsiExec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{0BB3B78C-1807-4249-5BA5-EA42D66AF0BF}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DD3FC71D-26C0-4FE1-BF6F-67F633265BBA}\InprocServer32\ = "C:\\Program Files\\Oracle\\VirtualBox\\VBoxC.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{3C02F46D-C9D2-4F11-A384-53F0CF917214}\InprocServer32\ThreadingModel = "Free" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{74AB5FFE-8726-4435-AA7E-876D705BCBA5}\LocalServer32\ = "\"C:\\Program Files\\Oracle\\VirtualBox\\VBoxSDS.exe\"" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B1A7A4F2-47B9-4A1E-82B2-07CCD5323C3F}\LocalServer32 VirtualBox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DD3FC71D-26C0-4FE1-BF6F-67F633265BBA}\InprocServer32 VirtualBox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0BB3B78C-1807-4249-5BA5-EA42D66AF0BF}\InprocServer32\ThreadingModel = "Both" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{DD3FC71D-26C0-4FE1-BF6F-67F633265BBA}\InprocServer32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{74AB5FFE-8726-4435-AA7E-876D705BCBA5}\LocalServer32 msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 Uninst.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{B1A7A4F2-47B9-4A1E-82B2-07CCD5323C3F}\LocalServer32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{3C02F46D-C9D2-4F11-A384-53F0CF917214}\InprocServer32 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{74AB5FFE-8726-4435-AA7E-876D705BCBA5}\LocalServer32 VirtualBox.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{CA8A9780-280D-11CF-A24D-444553540000}\InprocServer32 MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0BB3B78C-1807-4249-5BA5-EA42D66AF0BF}\InprocServer32 msiexec.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini msiexec.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
VirtualBox-7.0.18-162988-Win.exemsiexec.exemstsc.exemsiexec.exedescription ioc process File opened (read-only) \??\A: VirtualBox-7.0.18-162988-Win.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\I: mstsc.exe File opened (read-only) \??\L: mstsc.exe File opened (read-only) \??\W: VirtualBox-7.0.18-162988-Win.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\O: VirtualBox-7.0.18-162988-Win.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\U: VirtualBox-7.0.18-162988-Win.exe File opened (read-only) \??\V: VirtualBox-7.0.18-162988-Win.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: VirtualBox-7.0.18-162988-Win.exe File opened (read-only) \??\W: mstsc.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\V: mstsc.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\O: mstsc.exe File opened (read-only) \??\U: mstsc.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: mstsc.exe File opened (read-only) \??\P: VirtualBox-7.0.18-162988-Win.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: mstsc.exe File opened (read-only) \??\G: mstsc.exe File opened (read-only) \??\Q: mstsc.exe File opened (read-only) \??\Y: mstsc.exe File opened (read-only) \??\I: VirtualBox-7.0.18-162988-Win.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: VirtualBox-7.0.18-162988-Win.exe File opened (read-only) \??\Y: VirtualBox-7.0.18-162988-Win.exe File opened (read-only) \??\R: mstsc.exe File opened (read-only) \??\E: VirtualBox-7.0.18-162988-Win.exe File opened (read-only) \??\H: VirtualBox-7.0.18-162988-Win.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: mstsc.exe File opened (read-only) \??\S: mstsc.exe File opened (read-only) \??\X: VirtualBox-7.0.18-162988-Win.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\G: VirtualBox-7.0.18-162988-Win.exe File opened (read-only) \??\S: VirtualBox-7.0.18-162988-Win.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\P: mstsc.exe File opened (read-only) \??\A: mstsc.exe File opened (read-only) \??\H: mstsc.exe File opened (read-only) \??\M: mstsc.exe File opened (read-only) \??\X: mstsc.exe File opened (read-only) \??\T: VirtualBox-7.0.18-162988-Win.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
Processes:
SetupHost.Exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer SetupHost.Exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName SetupHost.Exe -
Drops file in System32 directory 64 IoCs
Processes:
DrvInst.exeDrvInst.exeMsiExec.exeDrvInst.exeVBoxSDS.exeMsiExec.exedescription ioc process File created C:\Windows\System32\DriverStore\Temp\{26314ad6-3042-d547-8f14-ca5316fb3a46}\SET8338.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{ec246a16-50ae-2b49-aa26-cf14703f933b}\SET9396.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vboxnetadp6.inf_amd64_108aa80dcbfa6952\VBoxNetAdp6.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vboxnetadp6.inf_amd64_108aa80dcbfa6952\VBoxNetAdp6.inf DrvInst.exe File created C:\Windows\system32\DRVSTORE\VBoxSup_C1568B0197F11F03068219F1FC3418496EA5F1E1\VBoxSup.sys MsiExec.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt MsiExec.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d19ee819-ee72-9a4b-b006-da2730cdbe0b}\VBoxNetLwf.inf DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\c_netservice.inf_amd64_9ab9cf10857f7349\c_netservice.PNF MsiExec.exe File opened for modification C:\Windows\system32\DRVSTORE MsiExec.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vboxnetlwf.inf_amd64_c7737e90db5729fb\VBoxNetLwf.cat DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\ndiscap.inf_amd64_a009d240f9b4a192\ndiscap.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netbrdg.inf_amd64_8a737d38f201aeb1\netbrdg.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netrass.inf_amd64_7f701cb29b5389d3\netrass.PNF MsiExec.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vboxusb.inf_amd64_c50c384d0cbfb450\VBoxUSB.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vboxusb.inf_amd64_c50c384d0cbfb450\VBoxUSB.inf DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vboxnetlwf.inf_amd64_c7737e90db5729fb\VBoxNetLwf.inf DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\wfpcapture.inf_amd64_54cf91ab0e4c9ac2\wfpcapture.PNF MsiExec.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{26314ad6-3042-d547-8f14-ca5316fb3a46}\SET8338.tmp DrvInst.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\VirtualBox\VBoxSDS.log VBoxSDS.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d19ee819-ee72-9a4b-b006-da2730cdbe0b}\SET981A.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d19ee819-ee72-9a4b-b006-da2730cdbe0b} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{ec246a16-50ae-2b49-aa26-cf14703f933b}\VBoxNetAdp6.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{26314ad6-3042-d547-8f14-ca5316fb3a46}\SET8339.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{26314ad6-3042-d547-8f14-ca5316fb3a46}\SET8339.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{26314ad6-3042-d547-8f14-ca5316fb3a46} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d19ee819-ee72-9a4b-b006-da2730cdbe0b}\VBoxNetLwf.sys DrvInst.exe File opened for modification C:\Windows\system32\DRVSTORE\VBoxSup_C1568B0197F11F03068219F1FC3418496EA5F1E1\VBoxSup.inf MsiExec.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{26314ad6-3042-d547-8f14-ca5316fb3a46}\VBoxUSB.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{26314ad6-3042-d547-8f14-ca5316fb3a46}\SET833A.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\netnwifi.inf_amd64_a2bfd066656fe297\netnwifi.PNF MsiExec.exe File created C:\Windows\system32\DRVSTORE\VBoxSup_C1568B0197F11F03068219F1FC3418496EA5F1E1\VBoxSup.inf MsiExec.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{ec246a16-50ae-2b49-aa26-cf14703f933b}\VBoxNetAdp6.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{ec246a16-50ae-2b49-aa26-cf14703f933b} DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{d19ee819-ee72-9a4b-b006-da2730cdbe0b}\SET9819.tmp DrvInst.exe File created C:\Windows\system32\DRVSTORE\VBoxSup_C1568B0197F11F03068219F1FC3418496EA5F1E1\VBoxSup.cat MsiExec.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vboxusb.inf_amd64_c50c384d0cbfb450\VBoxUSB.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vboxnetadp6.inf_amd64_108aa80dcbfa6952\VBoxNetAdp6.cat DrvInst.exe File created C:\Windows\SysWOW64\Elevation.tmp MsiExec.exe File created C:\Windows\System32\DriverStore\Temp\{ec246a16-50ae-2b49-aa26-cf14703f933b}\SET9384.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d19ee819-ee72-9a4b-b006-da2730cdbe0b}\VBoxNetLwf.cat DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{ec246a16-50ae-2b49-aa26-cf14703f933b}\VBoxNetAdp6.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{ec246a16-50ae-2b49-aa26-cf14703f933b}\SET9395.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{d19ee819-ee72-9a4b-b006-da2730cdbe0b}\SET9808.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\vboxnetlwf.inf_amd64_c7737e90db5729fb\VBoxNetLwf.sys DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\netserv.inf_amd64_73adce5afe861093\netserv.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\vboxnetlwf.inf_amd64_c7737e90db5729fb\vboxnetlwf.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\Temp\{26314ad6-3042-d547-8f14-ca5316fb3a46}\SET833A.tmp DrvInst.exe File created C:\Windows\system32\DRVSTORE\VBoxUSBMon_76C300885A3BEF8EB122594DD2B3D02A309D39C3\VBoxUSBMon.sys MsiExec.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{ec246a16-50ae-2b49-aa26-cf14703f933b}\SET9384.tmp DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File created C:\Windows\system32\DRVSTORE\VBoxUSBMon_76C300885A3BEF8EB122594DD2B3D02A309D39C3\VBoxUSBMon.cat MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netnb.inf_amd64_0dc913ad00b14824\netnb.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\FileRepository\netpacer.inf_amd64_7d294c7fa012d315\netpacer.PNF MsiExec.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{26314ad6-3042-d547-8f14-ca5316fb3a46}\VBoxUSB.inf DrvInst.exe File created C:\Windows\System32\DriverStore\FileRepository\vboxusb.inf_amd64_c50c384d0cbfb450\VBoxUSB.PNF MsiExec.exe File created C:\Windows\System32\DriverStore\Temp\{ec246a16-50ae-2b49-aa26-cf14703f933b}\SET9395.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d19ee819-ee72-9a4b-b006-da2730cdbe0b}\SET9819.tmp DrvInst.exe File created C:\Windows\system32\DRVSTORE\VBoxUSBMon_76C300885A3BEF8EB122594DD2B3D02A309D39C3\VBoxUSBMon.inf MsiExec.exe File created C:\Windows\System32\DriverStore\Temp\{ec246a16-50ae-2b49-aa26-cf14703f933b}\SET9396.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d19ee819-ee72-9a4b-b006-da2730cdbe0b}\SET9808.tmp DrvInst.exe -
Drops file in Program Files directory 64 IoCs
Processes:
MsiExec.exemsiexec.exemsiexec.exedescription ioc process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Appstore\Download_on_the_App_Store_Badge_fr_135x40.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_listview.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\rhp\convertpdf-rna-tool-view.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\css\main.css MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\dd_arrow_small2x.png MsiExec.exe File created C:\Program Files\Oracle\VirtualBox\sdk\install\vboxapisetup.py msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\adc_logo.png MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_nextarrow_default.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\pl-pl\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\plugins\rhp\combinepdf-selector.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\tool-search-2x.png MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\[email protected] MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\sk-sk\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\it-it\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\en-gb\ui-strings.js MsiExec.exe File created C:\Program Files\Oracle\VirtualBox\VBoxSharedClipboard.dll msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\themes\dark\icons.png MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ca-es\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\icudt40.dll msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\css\main-selector.css MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\share_icons2x.png MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\RHP_icons_2x.png MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\nl-nl\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_newfolder_18.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\uk-ua\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\line.cur MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\dark\illustrations.png MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\icons_ie8.gif MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AXSLE.dll msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\back-arrow-focus.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\zh-tw\ui-strings.js MsiExec.exe File created C:\Program Files\Oracle\VirtualBox\UnattendedTemplates\ol_ks.cfg msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\createpdf.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\plugin.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\da-dk\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Appstore\Download_on_the_App_Store_Badge_nl_135x40.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_fillandsign_18.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\en-gb\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Combine_R_RHP.aapp msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\QRCode.pmp msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\am_get.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\it-it\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\dd_arrow_small2x.png MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\A12_Spinner_int_2x.gif MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\pt-br\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\sk-sk\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\uk-ua\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\home-view\plugin.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\fi-fi\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\themes\dark\vscroll-thumb.png MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ko-kr\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ko-kr\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ja-jp\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_listview_selected.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\fr-fr\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\es-es\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\pt-br\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\da-dk\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\fi-fi\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\ja-jp\ui-strings.js MsiExec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\ccme_asym.dll msiexec.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_sendforsignature_18.svg MsiExec.exe -
Drops file in Windows directory 64 IoCs
Processes:
msiexec.exeDrvInst.exeMediaCreationTool_22H2 (1).exeDrvInst.exemsiexec.exeMediaCreationTool_22H2.exedescription ioc process File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\drvSOFT.x3d msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\home.aapp msiexec.exe File opened for modification C:\Windows\Installer\8759.msp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Panther\NewOs\Panther\windlp.state-old.xml MediaCreationTool_22H2 (1).exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\AdobeCollabSync.exe msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\CP1253.TXT msiexec.exe File opened for modification C:\Windows\Installer\MSICBA6.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\AXSLE.dll msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\icucnv40.dll msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\zdingbat.txt msiexec.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\SC_Reader.ico msiexec.exe File opened for modification C:\Windows\Installer\MSIBECD.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIBFF9.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\weblink.api msiexec.exe File opened for modification C:\Windows\Installer\MSIEE51.tmp msiexec.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\Installer\MSIB49E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB4ED.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI9372.tmp msiexec.exe File created C:\Windows\Panther\NewOs\Panther\Eula.rtf MediaCreationTool_22H2 (1).exe File opened for modification C:\Windows\Installer\MSIB9A4.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\MCIMPP.mpp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\dummy.dic msiexec.exe File created C:\Windows\Installer\e6b707b.msi msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\acrobroker.exe msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\DisplayLanguageNames.en_US.t msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\AiodLite.dll msiexec.exe File opened for modification C:\Windows\Installer\MSIEA7A.tmp msiexec.exe File opened for modification C:\Windows\Logs\MoSetup\BlueBox.log MediaCreationTool_22H2.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\AdobeLinguistic.dll msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\ahclient.dll msiexec.exe File opened for modification C:\Windows\Installer\MSI763F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIEABC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIEE40.tmp msiexec.exe File opened for modification C:\Windows\Installer\{7431991E-0534-4E1E-89C8-2AF6968C017C}\IconVirtualBox msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\AXE8SharedExpat.dll msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\reflow.api_NON_OPT msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\EPDF_RHP.aapp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\PDDom.api_NON_OPT msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\sqlite.dll msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\displaylanguagenames.en_gb_e msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\Edit_R_Full.aapp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\adobepdf.xdc msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\Flash.mpp msiexec.exe File opened for modification C:\Windows\Installer\MSID54B.tmp msiexec.exe File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\SecStoreFile.ico msiexec.exe File opened for modification C:\Windows\Installer\MSIB657.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\collectsignatures.aapp msiexec.exe File opened for modification C:\Windows\Installer\MSI72FC.tmp msiexec.exe File created C:\Windows\Panther\NewOs\Panther\diagerr.xml MediaCreationTool_22H2 (1).exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\adoberfp.dll msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\ViewerPS.dll msiexec.exe File opened for modification C:\Windows\Installer\MSIEA9B.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIB51D.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\displaylanguagenames.en_us_p msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\adobearmhelper.exe.BDCA7721_F290_4124_BBED_7A15FE7694EB msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\Annots.api msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\DataMatrix.pmp msiexec.exe File opened for modification C:\Windows\Installer\MSIEACC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI97E9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC01A.tmp msiexec.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67CA7DA73301B744CAF070E41400\15.7.20033\acrord32res.dll msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
MsiExec.exeDrvInst.exeDrvInst.exesvchost.exemstsc.exeDrvInst.exevssvc.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\UpperFilters MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 MsiExec.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A MsiExec.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom MsiExec.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key security queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters mstsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\LowerFilters MsiExec.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\UpperFilters MsiExec.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 MsiExec.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Filters MsiExec.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service MsiExec.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Service MsiExec.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID MsiExec.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Service MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Filters MsiExec.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\UpperFilters MsiExec.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000\Device Parameters mstsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000\Device Parameters mstsc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ MsiExec.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\LowerFilters MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A MsiExec.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID MsiExec.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 0000000004000000d9d47eb9a1a06eb40000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000c01200000000ffffffff000000002701010000080000d9d47eb90000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d01200000000000020ed3a000000ffffffff000000000700010000680900d9d47eb9000000000000d012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ff3a0000000000000005000000ffffffff000000000700010000f87f1dd9d47eb9000000000000f0ff3a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff000000000000000000000000d9d47eb900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 MsiExec.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Filters MsiExec.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
SetupHost.Exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SetupHost.Exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SetupHost.Exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Processes:
explorer.exemsiexec.exeMsiExec.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{15B3FB63-66F4-4EFC-B717-BB283B85E79B} msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{9C6A861C-B233-4994-AFB1-C158EE4FC578} msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\ActiveX Compatibility\{BD57A9B2-4E7D-4892-9107-9F4106472DA4} msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{8E1F80F4-953F-41E7-8460-E64AE5BE4ED3} msiexec.exe Set value (int) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{B723F941-52A2-4392-B500-60F3889659B4} MsiExec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{76E2369A-75BA-41F9-8B9E-16059E5CF9A6} msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{7AC06A6F-4C88-4707-8DEC-61017CB50E1E} msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{B7278BD0-7970-47D6-8954-99B2343EED88} msiexec.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
DrvInst.exeDrvInst.exeMsiExec.exeDrvInst.exemsiexec.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2b msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\2A\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe -
Modifies registry class 64 IoCs
Processes:
msiexec.exeVirtualBox.exeexplorer.exemsiexec.exeSetupHost.Exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1D89E2B3-C6EA-45B6-9D43-DC6F70CC9F02}\TypeLib\ = "{D7569351-1750-46F0-936E-BD127D5BC264}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{6B2F98F8-9641-4397-854A-040439D0114B} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{86A98347-7619-41AA-AECE-B21AC5C1A7E6}\ProxyStubClsid32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{181DFB55-394D-44D3-9EDB-AF2C4472C40A}\NumMethods\ = "15" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{BC68370C-8A02-45F3-A07D-A67AA72756AA}\ProxyStubClsid32\ = "{0BB3B78C-1807-4249-5BA5-EA42D66AF0BF}" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A6DCF6E8-416B-4181-8C4A-45EC95177AEF}\TypeLib VirtualBox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C4B1B5F4-8CDF-4923-9EF6-B92476A84109}\ProxyStubClsid32\ = "{0BB3B78C-1807-4249-5BA5-EA42D66AF0BF}" msiexec.exe Set value (data) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff explorer.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9B4CD3E9-4981-101B-9CA8-9240CE2738AE} msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{03C2AEA5-BEFA-4C84-A187-C9245AC784F6}\ProxyStubClsid msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{08E25756-08A2-41AF-A05F-D7C661ABAEBE}\NumMethods\ = "30" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{97C78FCD-D4FC-485F-8613-5AF88BFCFCDC}\ = "IVBoxSVCAvailabilityChangedEvent" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C523F39F-9C83-11D3-9094-00104BD0D535}\ProgID msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{78861431-D545-44AA-8013-181B8C288554}\ProxyStubClsid32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{A06253A7-DCD2-44E3-8689-9C9C4B6B6234} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B31C4052-7BDC-11E9-8BC2-8FFDB8B19219}\ProxyStubClsid32\ = "{0BB3B78C-1807-4249-5BA5-EA42D66AF0BF}" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F01F1066-F231-11EA-8EEE-33BB2AFB0B6E}\TypeLib VirtualBox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A54D9CCA-F23F-11EA-9755-EFD0F1F792D9}\ProxyStubClsid32 VirtualBox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{2a88033d-82db-4ac2-97b5-e786c839420e} VirtualBox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{48C7F4C0-C9D6-4742-957C-A6FD52E8C4AE}\TypeLib\Version = "1.3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4A773393-7A8C-4D57-B228-9ADE4049A81F}\TypeLib\ = "{D7569351-1750-46F0-936E-BD127D5BC264}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{DD3E2654-A161-41F1-B583-4892F4A9D5D5}\ProxyStubClsid32\ = "{0BB3B78C-1807-4249-5BA5-EA42D66AF0BF}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{B66349B5-3534-4239-B2DE-8E1535D94C0B}\NumMethods msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{CADEF0A2-A1A9-4AC2-8E80-C049AF69DAC8}\TypeLib msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{81314D14-FD1C-411A-95C5-E9BB1414E632}\TypeLib msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{024F00CE-6E0B-492A-A8D0-968472A94DC7}\TypeLib msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\progId_VirtualBox.Shell.ova\DefaultIcon\ = "\"C:\\Program Files\\Oracle\\VirtualBox\\VBoxRes.dll\",-302" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D7B98D2B-30E8-447E-99CB-E31BECAE6AE4}\TypeLib VirtualBox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{7191CF38-3E8A-11E9-825C-AB7B2CABCE23}\NumMethods\ = "37" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B7FDA727-7A08-46EE-8DD8-F8D7308B519C}\TypeLib\ = "{D7569351-1750-46F0-936E-BD127D5BC264}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{9E106366-4521-44CC-DF95-186E4D057C83}\TypeLib msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AcroExch.XFDFDoc\shell\Read\command msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\VirtualBox.VirtualBoxClient.1 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{327E3C00-EE61-462F-AED3-0DFF6CBF9904}\ProxyStubClsid32 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{48C7F4C0-C9D6-4742-957C-A6FD52E8C4AE}\ProxyStubClsid32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4F4ADCF6-3E87-11E9-8AF2-576E84223953}\ = "IBooleanFormValue" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C40C2B86-73A5-46CC-8227-93FE57D006A6}\TypeLib\Version = "1.3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vmdk\Content Type = "application/x-virtualbox-vmdk" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{28935887-782B-4C94-8410-CE557B9CFE44}\NumMethods VirtualBox.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{0FE2DA40-5637-472A-9736-72019EABD7DE} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{4680B2DE-8690-11E9-B83D-5719E53CF1DE}\NumMethods msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{4FDEBBF0-BE30-49C0-B315-E9749E1BDED1}\TypeLib\ = "{D7569351-1750-46F0-936E-BD127D5BC264}" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{83795A4C-FCE1-11EA-8A17-636028AE0BE2}\TypeLib\Version = "1.3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{86A98347-7619-41AA-AECE-B21AC5C1A7E6}\ProxyStubClsid32\ = "{0BB3B78C-1807-4249-5BA5-EA42D66AF0BF}" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B14290AD-CD54-400C-B858-797BCB82570E}\NumMethods VirtualBox.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EE5A151A-AD2A-4CEE-AD65-228B59F5B4AD} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{4DA2DEC7-71B2-4817-9A64-4ED12C17388E}\ = "ICPUChangedEvent" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{E062A915-3CF5-4C0A-BC90-9B8D4CC94D89}\NumMethods msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{C0447716-FF5A-4795-B57A-ECD5FFFA18A4}\ProxyStubClsid32\ = "{0BB3B78C-1807-4249-5BA5-EA42D66AF0BF}" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{300763af-5d6b-46e6-aa96-273eac15538a} VirtualBox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DAAF9016-1F04-4191-AA2F-1FAC9646AE4C}\TypeLib\Version = "1.3" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CA8A9780-280D-11CF-A24D-444553540000}\TypeLib msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{BD57A9B2-4E7D-4892-9107-9F4106472DA4} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{25360A74-55E5-4F14-AC2A-F5CF8E62E4AF}\TypeLib\Version = "1.3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6620DB85-44E0-CA69-E9E0-D4907CECCBE5}\TypeLib\Version = "1.3" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{B1A7A4F2-47B9-4A1E-82B2-07CCD5323C3F}\TypeLib msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{01ADB2D6-AEDF-461C-BE2C-99E91BDAD8A1} msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Downloads" SetupHost.Exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\AcroExch.XFDFDoc\shell\Read msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{3890B2C8-604D-11E9-92D3-53CB473DB9FB} msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{AF398A9A-6B76-4805-8FAB-00A9DCF4732B}\NumMethods msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{C4B1B5F4-8CDF-4923-9EF6-B92476A84109}\NumMethods msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D23A9CA3-42DA-C94B-8AEC-21968E08355D}\ProxyStubClsid32\ = "{0BB3B78C-1807-4249-5BA5-EA42D66AF0BF}" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{5094F67A-8084-11E9-B185-DBE296E54799} msiexec.exe -
NTFS ADS 1 IoCs
Processes:
SetupHost.Exedescription ioc process File created C:\ProgramData\Microsoft\Diagnosis\ETLLogs\DlTel-Merge.etl:$ETLUNIQUECVDATA SetupHost.Exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
explorer.exeVirtualBox.exepid process 3400 explorer.exe 2880 VirtualBox.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
MsiExec.exeMsiExec.exechrome.exechrome.exemsiexec.exeSetupHost.Exepid process 1484 MsiExec.exe 1484 MsiExec.exe 1380 MsiExec.exe 1380 MsiExec.exe 1380 MsiExec.exe 1380 MsiExec.exe 2208 chrome.exe 2208 chrome.exe 4544 chrome.exe 4544 chrome.exe 4020 msiexec.exe 4020 msiexec.exe 2324 SetupHost.Exe 2324 SetupHost.Exe 2324 SetupHost.Exe 2324 SetupHost.Exe 2324 SetupHost.Exe 2324 SetupHost.Exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
explorer.exeVirtualBox.exepid process 3400 explorer.exe 2880 VirtualBox.exe -
Suspicious behavior: LoadsDriver 4 IoCs
Processes:
pid process 656 656 656 656 -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
chrome.exepid process 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exeexplorer.exemsiexec.exevssvc.exeMsiExec.exedescription pid process Token: SeTcbPrivilege 2692 svchost.exe Token: SeRestorePrivilege 2692 svchost.exe Token: SeShutdownPrivilege 3400 explorer.exe Token: SeIncreaseQuotaPrivilege 3400 explorer.exe Token: SeSecurityPrivilege 2604 msiexec.exe Token: SeCreateTokenPrivilege 3400 explorer.exe Token: SeAssignPrimaryTokenPrivilege 3400 explorer.exe Token: SeLockMemoryPrivilege 3400 explorer.exe Token: SeIncreaseQuotaPrivilege 3400 explorer.exe Token: SeMachineAccountPrivilege 3400 explorer.exe Token: SeTcbPrivilege 3400 explorer.exe Token: SeSecurityPrivilege 3400 explorer.exe Token: SeTakeOwnershipPrivilege 3400 explorer.exe Token: SeLoadDriverPrivilege 3400 explorer.exe Token: SeSystemProfilePrivilege 3400 explorer.exe Token: SeSystemtimePrivilege 3400 explorer.exe Token: SeProfSingleProcessPrivilege 3400 explorer.exe Token: SeIncBasePriorityPrivilege 3400 explorer.exe Token: SeCreatePagefilePrivilege 3400 explorer.exe Token: SeCreatePermanentPrivilege 3400 explorer.exe Token: SeBackupPrivilege 3400 explorer.exe Token: SeRestorePrivilege 3400 explorer.exe Token: SeShutdownPrivilege 3400 explorer.exe Token: SeDebugPrivilege 3400 explorer.exe Token: SeAuditPrivilege 3400 explorer.exe Token: SeSystemEnvironmentPrivilege 3400 explorer.exe Token: SeChangeNotifyPrivilege 3400 explorer.exe Token: SeRemoteShutdownPrivilege 3400 explorer.exe Token: SeUndockPrivilege 3400 explorer.exe Token: SeSyncAgentPrivilege 3400 explorer.exe Token: SeEnableDelegationPrivilege 3400 explorer.exe Token: SeManageVolumePrivilege 3400 explorer.exe Token: SeImpersonatePrivilege 3400 explorer.exe Token: SeCreateGlobalPrivilege 3400 explorer.exe Token: SeBackupPrivilege 1328 vssvc.exe Token: SeRestorePrivilege 1328 vssvc.exe Token: SeAuditPrivilege 1328 vssvc.exe Token: SeBackupPrivilege 2604 msiexec.exe Token: SeRestorePrivilege 2604 msiexec.exe Token: SeRestorePrivilege 2604 msiexec.exe Token: SeTakeOwnershipPrivilege 2604 msiexec.exe Token: SeRestorePrivilege 2604 msiexec.exe Token: SeTakeOwnershipPrivilege 2604 msiexec.exe Token: SeRestorePrivilege 2604 msiexec.exe Token: SeTakeOwnershipPrivilege 2604 msiexec.exe Token: SeRestorePrivilege 2604 msiexec.exe Token: SeTakeOwnershipPrivilege 2604 msiexec.exe Token: SeRestorePrivilege 2604 msiexec.exe Token: SeTakeOwnershipPrivilege 2604 msiexec.exe Token: SeRestorePrivilege 2604 msiexec.exe Token: SeTakeOwnershipPrivilege 2604 msiexec.exe Token: SeRestorePrivilege 2604 msiexec.exe Token: SeTakeOwnershipPrivilege 2604 msiexec.exe Token: SeDebugPrivilege 1484 MsiExec.exe Token: SeRestorePrivilege 2604 msiexec.exe Token: SeTakeOwnershipPrivilege 2604 msiexec.exe Token: SeRestorePrivilege 2604 msiexec.exe Token: SeTakeOwnershipPrivilege 2604 msiexec.exe Token: SeRestorePrivilege 2604 msiexec.exe Token: SeTakeOwnershipPrivilege 2604 msiexec.exe Token: SeRestorePrivilege 2604 msiexec.exe Token: SeTakeOwnershipPrivilege 2604 msiexec.exe Token: SeRestorePrivilege 2604 msiexec.exe Token: SeTakeOwnershipPrivilege 2604 msiexec.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
explorer.exeUninst.exechrome.exeVirtualBox-7.0.18-162988-Win.exepid process 3400 explorer.exe 3400 explorer.exe 3400 explorer.exe 4664 Uninst.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2368 VirtualBox-7.0.18-162988-Win.exe 2368 VirtualBox-7.0.18-162988-Win.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe 2208 chrome.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
Uninstall.exeUninst.exeUninstall.exeUninst.exeSystemSettingsAdminFlows.exePickerHost.exeVirtualBox.exeMediaCreationTool_22H2.exeSetupHost.ExeMediaCreationTool_22H2 (1).exeSetupHost.Exepid process 3148 Uninstall.exe 4792 Uninst.exe 2440 Uninstall.exe 4664 Uninst.exe 2860 SystemSettingsAdminFlows.exe 3848 PickerHost.exe 2880 VirtualBox.exe 6116 MediaCreationTool_22H2.exe 2324 SetupHost.Exe 2324 SetupHost.Exe 5368 MediaCreationTool_22H2 (1).exe 1492 SetupHost.Exe 1492 SetupHost.Exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
svchost.exemsiexec.exeUninstall.exeUninstall.exechrome.exedescription pid process target process PID 2692 wrote to memory of 1068 2692 svchost.exe dashost.exe PID 2692 wrote to memory of 1068 2692 svchost.exe dashost.exe PID 2604 wrote to memory of 1352 2604 msiexec.exe srtasks.exe PID 2604 wrote to memory of 1352 2604 msiexec.exe srtasks.exe PID 2604 wrote to memory of 1484 2604 msiexec.exe MsiExec.exe PID 2604 wrote to memory of 1484 2604 msiexec.exe MsiExec.exe PID 2604 wrote to memory of 1484 2604 msiexec.exe MsiExec.exe PID 2604 wrote to memory of 1380 2604 msiexec.exe MsiExec.exe PID 2604 wrote to memory of 1380 2604 msiexec.exe MsiExec.exe PID 2604 wrote to memory of 1380 2604 msiexec.exe MsiExec.exe PID 2604 wrote to memory of 2908 2604 msiexec.exe MSIBECD.tmp PID 2604 wrote to memory of 2908 2604 msiexec.exe MSIBECD.tmp PID 2604 wrote to memory of 2908 2604 msiexec.exe MSIBECD.tmp PID 2604 wrote to memory of 1928 2604 msiexec.exe FullTrustNotifier.exe PID 2604 wrote to memory of 1928 2604 msiexec.exe FullTrustNotifier.exe PID 2604 wrote to memory of 1928 2604 msiexec.exe FullTrustNotifier.exe PID 3148 wrote to memory of 4792 3148 Uninstall.exe Uninst.exe PID 3148 wrote to memory of 4792 3148 Uninstall.exe Uninst.exe PID 3148 wrote to memory of 4792 3148 Uninstall.exe Uninst.exe PID 2440 wrote to memory of 4664 2440 Uninstall.exe Uninst.exe PID 2440 wrote to memory of 4664 2440 Uninstall.exe Uninst.exe PID 2440 wrote to memory of 4664 2440 Uninstall.exe Uninst.exe PID 2208 wrote to memory of 376 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 376 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2552 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2144 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 2144 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 4980 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 4980 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 4980 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 4980 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 4980 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 4980 2208 chrome.exe chrome.exe PID 2208 wrote to memory of 4980 2208 chrome.exe chrome.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
DiagTrackRunner.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection DiagTrackRunner.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Firework Stars.png"1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\dashost.exedashost.exe {a6817933-1dc2-4fcd-b98c379e550cd118}2⤵
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Sets file execution options in registry
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2ABDB40C82F86206AFF10674C9581AF42⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 0372D2EF5F6A1A393FBC9C8ABC086B20 E Global\MSI00002⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Registers COM server for autorun
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\Installer\MSIBECD.tmp"C:\Windows\Installer\MSIBECD.tmp" /b 3 120 02⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe" ClearToasts2⤵
- Executes dropped EXE
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\7-Zip\Uninstall.exe"C:\Program Files\7-Zip\Uninstall.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zB2B1DC4C\Uninst.exeC:\Users\Admin\AppData\Local\Temp\7zB2B1DC4C\Uninst.exe /N /D="C:\Program Files\7-Zip\"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\7-Zip\Uninstall.exe"C:\Program Files\7-Zip\Uninstall.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7zB6AE1988\Uninst.exeC:\Users\Admin\AppData\Local\Temp\7zB6AE1988\Uninst.exe /N /D="C:\Program Files\7-Zip\"2⤵
- Executes dropped EXE
- Registers COM server for autorun
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\SystemSettingsAdminFlows.exe"C:\Windows\system32\SystemSettingsAdminFlows.exe" TroubleshootActivation1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\PickerHost.exeC:\Windows\System32\PickerHost.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff825c0ab58,0x7ff825c0ab68,0x7ff825c0ab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=616 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2320 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3052 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3060 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4404 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4544 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4648 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4752 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4816 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4552 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe" --reenable-autoupdates --system-level2⤵
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x254,0x258,0x25c,0x230,0x260,0x7ff6b0f6ae48,0x7ff6b0f6ae58,0x7ff6b0f6ae683⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=1828 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5064 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4944 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4956 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2808 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4288 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=5220 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=5540 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=5252 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3144 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5320 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4496 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4508 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4028 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3144 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Users\Admin\Downloads\VirtualBox-7.0.18-162988-Win.exe"C:\Users\Admin\Downloads\VirtualBox-7.0.18-162988-Win.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of FindShellTrayWindow
-
C:\Program Files\Oracle\VirtualBox\VirtualBox.exe"C:\Program Files\Oracle\VirtualBox\VirtualBox.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5400 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5388 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5832 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5728 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Users\Admin\Downloads\MediaCreationTool_22H2.exe"C:\Users\Admin\Downloads\MediaCreationTool_22H2.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\$Windows.~WS\Sources\SetupHost.Exe"C:\$Windows.~WS\Sources\SetupHost.Exe" /Download /Web3⤵
- Checks computer location settings
- Executes dropped EXE
- Checks system information in the registry
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\$Windows.~WS\Sources\DiagTrackRunner.exeC:\$Windows.~WS\Sources\DiagTrackRunner.exe /UploadEtlFilesOnly4⤵
- Executes dropped EXE
- System policy modification
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5732 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5840 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6016 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5632 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5796 --field-trial-handle=1836,i,18124482500454789611,13907595269481922581,131072 /prefetch:82⤵
-
C:\Users\Admin\Downloads\MediaCreationTool_22H2 (1).exe"C:\Users\Admin\Downloads\MediaCreationTool_22H2 (1).exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\$Windows.~WS\Sources\SetupHost.Exe"C:\$Windows.~WS\Sources\SetupHost.Exe" /Download /Web3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
-
C:\Windows\system32\mstsc.exe"C:\Windows\system32\mstsc.exe"1⤵
- Enumerates connected drives
- Checks SCSI registry key(s)
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Registers COM server for autorun
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding B1E94323B1F6D73914715A4340FE961C C2⤵
- Loads dropped DLL
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding B3F48E4EFCFAC0F5F9C7E400EA269AD42⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 969738C386DB2E7EDDDCDF670028553A2⤵
- Loads dropped DLL
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 4AC5E300A9583A4F7764F90E46EB4437 E Global\MSI00002⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B91AD63FD8D24584F8D27BABECC036D1 M Global\MSI00002⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Checks SCSI registry key(s)
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "1" "C:\Program Files\Oracle\VirtualBox\drivers\USB\device\VBoxUSB.inf" "9" "48f6bcb47" "0000000000000138" "WinSta0\Default" "0000000000000158" "208" "C:\Program Files\Oracle\VirtualBox\drivers\USB\device"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "1" "C:\Program Files\Oracle\VirtualBox\drivers\network\netadp6\VBoxNetAdp6.inf" "9" "473b17b7b" "0000000000000158" "WinSta0\Default" "000000000000015C" "208" "C:\Program Files\Oracle\VirtualBox\drivers\network\netadp6"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "1" "C:\Program Files\Oracle\VirtualBox\drivers\network\netlwf\VBoxNetLwf.inf" "9" "431e52bcb" "000000000000015C" "WinSta0\Default" "000000000000017C" "208" "C:\Program Files\Oracle\VirtualBox\drivers\network\netlwf"2⤵
- Drops file in System32 directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Program Files\Oracle\VirtualBox\VBoxSVC.exe"C:\Program Files\Oracle\VirtualBox\VBoxSVC.exe" -Embedding1⤵
- Executes dropped EXE
-
C:\Program Files\Oracle\VirtualBox\VBoxSDS.exe"C:\Program Files\Oracle\VirtualBox\VBoxSDS.exe"1⤵
- Executes dropped EXE
- Drops file in System32 directory
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Windows.~WS\Sources\DiagTrackRunner.exeFilesize
77KB
MD576f30a1e149792d2542a253b920cbef6
SHA19040e0873df5cc2a64b850d1b8159b77528ba62c
SHA256488cbc8330952dd13b797bb40e4e30610ed03483c25919c39555f7b334a3c159
SHA512ec39861a3f39f88aad52975974c988ae76376a09136d95f5d4fedd60ee7ec252736d882cef77298d82d786e0dad13c61148b29d7c5fb7ba7d7c74b05de9d7e84
-
C:\$Windows.~WS\Sources\Panther\DlTel-Merge.etlFilesize
192KB
MD55599c84b4ab16196f491b946e131fcfd
SHA1b32c9260727cf1cb34369c9fb0675dfaf004822e
SHA2560c4d63df044ef35dc1be118a5a6d44fe70499f70e629f1d60aa10187c1177d7d
SHA5122010f241cb748984ab3ed70e7fb7a0553248903c88a5d4012c8087404b6afb6d9776ff262b85cd5f5ab2ba4a88e314d4b9a21d215a9b581f2c48d1dfbe560ade
-
C:\$Windows.~WS\Sources\Panther\Eula.rtfFilesize
199KB
MD5cd28b51516a9309b350607dc57faca76
SHA1c9f8e72f1184dac6ad40a94295a594a94b1e48c4
SHA2567fbf900fdd0eabe63def6c5b432b5d3ff51f8ec9af7d9e9ab3a9d7441d032c22
SHA5127c7cb19b814debcdd5a1717f2039492ef9fd018ddf5ff0647cfb13fcff550eb20f44960ce239033e8bef4bffc0d2668e9574f2aff3b4385606ab1aecc1e1de12
-
C:\$Windows.~WS\Sources\SetupPlatform.iniFilesize
95B
MD5db00f6b69e3f1a48a474bdb234f578da
SHA17e308766abac1238fdb2115d81ed7f78f2102c40
SHA256cfadafdb6fd96cebf33ecd8f36235339d452550bbef536cbdcd56669b4576276
SHA512277135c81df157c2ca8a07848b836fcebce8f1f414e2bff1e4c6c53d0c565eb59e29c0c2dcb710d91f812ce1a14193f07887c0d1f94d3172597c6804d494f622
-
C:\$Windows.~WS\Sources\products.cabFilesize
43KB
MD552b7d0637974ed697dd8aa819ed3c8b0
SHA1e81a7094362964e9ae69580b91a1e72207be667d
SHA2567677dd6247c5768737b643911894374939aac5ae2dea158c272511fdd2ac52bf
SHA512173a5893612a789f51ee9d914ae26e1faec557dcfab4ddb8aa8c8baa7690ca456af117e14e2b6d004c963573cb67a02f0e2760cc8c609287587dc335f9c4c1a8
-
C:\$Windows.~WS\Sources\products.xmlFilesize
2.7MB
MD5f9c1df5c8718468b892af250f6d7b78e
SHA1040da263bc223436f929dbc1f2ab88198e299610
SHA25676fcc8eeacb7da966441a7e0ac8b79cc095f13682abb92ee5a614c52f72ce54c
SHA512edeb708e50f815ef022bd9275255dd3644b07597e9a90736364fbb7206b77ba44953d61735def7e2653a12442fd623baff0630793b507eccf4508e772ba02a39
-
C:\Config.Msi\e5ab549.rbsFilesize
1.7MB
MD566379ccbcba74175512a52955cb82f02
SHA186ad8bfcb3e40e2f5b1c784bd78c98dee22c1791
SHA2567c96afe126beb5af73d0687744b18e27d5af566309ba7f56cae7f82fdc833e05
SHA5128e75b8b8b9df0cfa08b9f2eb6ea3cd53f2803aae7d7baa18dec0eb636e875b0c3b5a584cc95155aef260dec08b8bc3edbff2249d53592649d30a76a08898dc48
-
C:\Config.Msi\e5ab54a.rbfFilesize
2KB
MD5da25537606b91b5e67ac1ea0b04003a7
SHA10f8c8d9480f89b67cef9a5779572ed9561f49e00
SHA2562e342a04b7ba3c72981d31246513d2cb62c8b8ab8e3eb665121c3c8096e62c18
SHA5120251e29bcfe740c45c443a8021ad971a5537d51fd0841509684fd2319e57cedfd9238df872c38fdc28fabc1055fa7b57aca12e7cc49686d922dc86036915741a
-
C:\Config.Msi\e5ab6f9.rbfFilesize
3B
MD521438ef4b9ad4fc266b6129a2f60de29
SHA15eb8e2242eeb4f5432beeec8b873f1ab0a6b71fd
SHA25613bf7b3039c63bf5a50491fa3cfd8eb4e699d1ba1436315aef9cbe5711530354
SHA51237436ced85e5cd638973e716d6713257d692f9dd2e1975d5511ae3856a7b3b9f0d9e497315a058b516ab31d652ea9950938c77c1ad435ea8d4b49d73427d1237
-
C:\Config.Msi\e6b707c.rbsFilesize
2.6MB
MD5363d4eb8986af4fc8ca42b4ce95b48e0
SHA171fae7c0e0fed2045c8042f96a6e3061337ea6b5
SHA25646086c197700ef54f2bac8e8da736b080bba15edf9cf3b9f823ae4a48e19bd32
SHA5127c33a219e77c953e8af23bffcf914b4cfc2f9cfba5e67a7b7ff78035cb0b503feea49950391910e66155a516c2035f34f9f6ffe8b7be161e32c428ed311fe979
-
C:\Program Files\Oracle\VirtualBox\VirtualBox.exeFilesize
2.5MB
MD5798dda25ae933ec87d20974df6b998c7
SHA128f97c07cb49b679ca71d415067987f339097631
SHA2566c7420e68eb52e3d998b953b1c004496878bf151a147dc66e2211c8ec29599b5
SHA512e8ba3d3db8f19be0417057294cbc4526d5af064171c0ffd9fde5b9ab2c81af830101a9753c18a3ead4939daf4c0c91ad2af635d8582c26c276fadb6d36e244f6
-
C:\Users\Admin\.VirtualBox\VirtualBox.xmlFilesize
1KB
MD5d9d28bd2ef7192fb0efb99607d7a0807
SHA17fb6f32f1c0f227118613dd7779e1bf0a6e2ce4a
SHA256dad710b076d96b3de34a58363a3241935bfe205b7240ce57f9d85bf2058e6dd5
SHA512e058987d5fd8ea6cd3c3081c7ac45ce1e3719c4a38b46390133b19539fad35a0d8ad699023a3d934d18e3356cb6def62bd197b5a32ad496b620469c55d9efb13
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\796d42b7-0fe7-49b7-9649-36efacbc6c20.tmpFilesize
6KB
MD5eea8cb2c87cd377716d77530f1a9fe1f
SHA1fe4bec9ce27ee5d8cc5af5545ebd6975080cd45e
SHA256b0478c2a74ece5a31b5159083dc5f1eda74dbdfd828638e6de470ad1aaf6598f
SHA512d8ff30c9ed96e6ce4f9af9e36b0f818706360348d69a1767ec5db02de676f68754ec7603ddd38627ca5e403a7df193e37c7d00076484598ad5c6c368bb905140
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
600B
MD5afd063dc503fcbee9b799e205caf7136
SHA15029c15925c751ef41da0f3fa322fb51a7a093a8
SHA256c43a0197cdfd6ac88ee054109320a7a1a3c9a2ae69fa5b552811112846d18624
SHA51270eeb15198645308fb12bdc21cc09fbc33ed73a57531d65251403299171b4b4df4c6b72440b260faa1a41c32bf506f9d2a1c03065528c5f01f44e411909b3617
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
384B
MD5dbdc47508b6abfe12826ad287d82a44f
SHA1808ec2a41a474a9a7bd6968fe3067eb8f3460d41
SHA2562d318681fda875c36cc2f835ebac956a81801548e183612820f173233abf341b
SHA5129bfd1aa72ad72a47fe35354a70f7620f87f9ae0aaa5e79f718ad97ca9921604fe61e9093b719b92c5605ab6abc8f3ad78ec61be13e79822e6950cd40783def9f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_vlscppe.microsoft.com_0.indexeddb.leveldb\MANIFEST-000001Filesize
23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.microsoft.com_0.indexeddb.leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
3KB
MD512efad212e104c08b69eef78dca1b472
SHA114f489867c891286a95b8f6a9158793c44318bde
SHA256be39033d1ce0d0386419336bca758853a958782d2625c96dfa6440dd8191539a
SHA512d17b82a5037872b722c0a2faf7894acba36935f87cd5d45418c62d9e05895e351af2ea93a8df9b7844399d583024a41f58ae8577cd8fc28caafe566e9271b235
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD58d91ec25e200be8a9940a006a9bbb726
SHA12a2622e6b7162375d371fbfac32f83486042fe43
SHA256115ddd239ed1fff06af4a795349771e977d7a44d227a01e94dd20b6bb6434b78
SHA5128b7a30c9d5b69b9da1c497e07e01302d399d0d41919a6e7819902a906789183ac6e6754621f1fe2aa4e1e0ed21602f6285beb02794c70fc46ab2520fd2b38bbf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD5912e6b6e7b92add136d239570f7c914e
SHA15d9d55e686121213a33aeb41e3041117f6014c72
SHA256e4b52c7d4ed2c591c0b1086dd58cb1c61cc669e4079f02754598b6351fc59ef8
SHA512af54ab3f4047066818a26b9de5e8ebcd25f3555997f6aa969c7975b2c23ea8dac9cbea02816462f924e0fbb0c2819a286c32fc03c61b8292fb4339ef69cd6bcd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD5ca37dd4bbfb80facd80bfdde7791dd64
SHA17ae6c23cc079e0a40c51993c9269e1bd3b30e793
SHA256d45e7e713d9b265ef625f6395f5398358ecdf76b61a1761d0706a6d3ad9f5ab9
SHA512cd81971f7971d5792ee015f0c96665037f0dda662ad9d402af906e54575275700dcefa1fbc867e935be3e1f480b9c5e55598ffda2c769fcdfaf5674a0cc1fd09
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
2KB
MD57c3bfb8efb18a56873c6902000f2a18d
SHA128ef1b2120556074418074f1ebe675e6cac75d6a
SHA256574646739f783baede15c408078591dd2081a8db737c12a3052c54afbbe76759
SHA512f8765b122490bcd3955bb64f8ef82fcf1e9bf83c3e4c9b5c7ae345449828c36c4cd9ace4991c76f81843f9121785e4c2b8ab897d07ac9950ab585e404fc13a3e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
354B
MD5e8e7c983ec7931ceb7ad2710039fd868
SHA18f495f5d60f8c186c2f47a312120f909c0aecd4a
SHA256e636d3224b60fd4ee5939f7aa0beb43b259ea54db9be0160b9e1b3926df6cefe
SHA5123644b63e0bfee6b5ca0ecb8a966a3c4eaeba301638af36a60cdc703b02bfa543e6f7c7808731d68e911be4b7b84bfe60ac92e2ab9c980911befcfb8a9e3ae1f1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5c66e9c438a7f96d4f48bb7241cf0685a
SHA1ef742c981c49e7e0cd5358a04a77eed7eebcaa34
SHA25656b676cf8e9debfa396e330dae8be21a9842d897d3286c5d4b92d4db6313ae00
SHA512b70076861295c2118d761cfc583352d332a1d4d499f8b793a2e1fde1c4b2aec97ddabc6af2610303e9bd37385e47bf5a543d8be17a018f25c547382ddc647bff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD57e186efc807ffb55c06b44b16c5ffc1e
SHA1f9365ede2b29c8329e611d4764bb72d3a8968968
SHA25609997ddc6773b9b3e3ebda5786dabd535db71d3396a16c3fa35cd798f0258ec3
SHA512d5ef30e319d41eb402a974fb2998d2a36b7350b59bdbbcdf7d5ab080b5c8dc5a461eedb383e0c0cd8bd64d365c043ee6afc0333c1fa729ef3c34605b78e02db7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD55d3264d3b6d7f1da7d9e0e05242e3e14
SHA1d92f555ea0b6d4b9ef8d8c89b08ccd87de7e58d5
SHA256082e6803ff87dc836a8833e6f6d6a135ab5e007b3b35c72c2438905c04b6b70e
SHA512cc500380ea23ccfa547cbb676942372963f0c4f38ea197e1cf5814df11894764bb0da744dda89cc0eb61b1904a0dac942bc5600ce22eff4fc5c7ebacf2328acd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD598334c03a6ffb52c574cb2195964ce4b
SHA1b181134e6371819354e912448ce930e80ca935f1
SHA256575cf2fff2127e8ae389ad82c8dcecaaa4c19430e5aecfc539c85d601c1a5ac0
SHA5123b9ec053a12e08d01b445ecd8febee58143f26807531ee2cdac6d7586c9c3018f96b7312dc4c63547ef1ac562b6bef867e8fb6bf70047bec1524646295ec910d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5d8902c871b2b74302ccde6033276f2b3
SHA1b3c8d08ea3237201d98a81b78a09eabb4be5e8a6
SHA256eeb5a5a5db4fdc68357242a4c7041959777611fe7e2e766bc79b6807d6f1ab79
SHA512805466a79a93097c5cc5dd21eba30a90d3e2823dd40d0754095d75a32e3323d52861c4b92688ad39d10111dcc2c44f2b80f4eafcf7c388c740f2316f229664a8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
16KB
MD564f5484d3425cbe0ee9128ee24e1e118
SHA1f5c9e507d75a8b61528216fe95b1d04f7fc46ad5
SHA256fa1bea5cf722e999d47d4d18356ab264cbcf8da6a9c0578677951a74f7635e32
SHA51244aa7b793960bb18ffd0f03e9a7d1d3e65b59ce931a2ceb73163cb013fcf284fdc2c07d4f47a91b94fd6bb54bbb4d827d85db227054d7a9af7ae58cf6447e043
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
260KB
MD5c592eff96e9bc5ba7c9b74b0874cb688
SHA1e8c7e34252179b98b73df32e7c973b62c85bb976
SHA256086851676259ebe79650cfc731fbd85127cceefdaef3872754c37931dba1b908
SHA51250583e4acd4061921969b22edfc66701542c472049137ba1fba6580e6fb75ae27732bb183255fd755fee54656f370f7ab9566524edb4b1cad9dcb1e1bb37a456
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
260KB
MD5e1c092ec3c61f626c49a8c11dbd2b03b
SHA1c9ecaf38826e7f1a9858e851807eb2eb509f4141
SHA2564fba5a4ccd7574eac0814b91efef9300441aac99e7cca241100f3ce66140ccca
SHA5124c6cdefa917d80ee6b43e56d1fc71fcf58b8de09415780a2879820754994fc0113864990a95973bc53c22f20b466dce5237b2d5b6fa86caa0b8c357f986be639
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
260KB
MD563d601492ac66e5c04d9760773f55d0f
SHA1c0d5f87bb6f103958c80bb34096acfed07e2b833
SHA2561ff8f0ad61b5a1b22268b966c88c1e97c941149987116991436c2636bf0ec0a2
SHA51207294f9092f9b9f5358c12204e1e608a36811d491810579ae231744702cad21196bb2ca221ef4d6c8fb51d2dd9599b1d92722eb9b4d4aa6b40f0d8d813fde8b4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
101KB
MD53d88bb96319d8753bb835eba3a59746f
SHA1f089d21955eb68cb7f7a02406cf18003b0321b87
SHA2567557badba8fe8faf21e8fdfce685393ab507cdd4a9bb452e96eadfb8107183fc
SHA5126adde4b6581bd51e0cd82352b823d158029c24593a147d26390f27251f5a2eb18eb5e89a8d9f7dfa331b884eb2b26a64472249da026df8dec37b438daa449611
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe6b5bea.TMPFilesize
88KB
MD53907e713251926e789b2fa587abf1922
SHA1ce14f14ee1fd9ec437fa864b0e22256b3115c1a8
SHA2562a5f36919feab07dd8c701e491c0a5f736a5df9c183456814408f7758f44fd03
SHA512d12d0d2009b85c4102113aaeda0bf97ae116b9da4fcec3b45a56d7a57bd84275404ba0d584854fa7425f1188add5cea89d2ca7162c41c336f218d9d44e4aeac9
-
C:\Users\Admin\AppData\Local\Temp\7zB6AE1988\Uninst.exeFilesize
14KB
MD5ad782ffac62e14e2269bf1379bccbaae
SHA19539773b550e902a35764574a2be2d05bc0d8afc
SHA2561c8a77db924ebeb952052334dc95add388700c02b073b07973cd8fe0a0a360b8
SHA512a1e9d6316ffc55f4751090961733e98c93b2a391666ff50b50e9dea39783746e501d14127e7ee9343926976d7e3cd224f13736530354d8466ea995dab35c8dc2
-
C:\Users\Admin\AppData\Local\Temp\MSI3C9C.tmpFilesize
324KB
MD5d045098c42378ebe26f6da17977551ee
SHA180a93acee96419dd9c44d0d15d7518aea21f782a
SHA25692b89b56400e8d01a813513ef8af685fb23adcaba49d7775853e650266b2f63a
SHA5129e110110c6ec6aa43e64069744901c955ac90253a036b9837d2e0150c5da97cb8f927db4a36e9f289684c3b91724a4d93aa189a3fde9d06d07d62dd4b8c08a35
-
C:\Users\Admin\Desktop\ApproveLock.sqlFilesize
389KB
MD58579e78d9100f2ca2540105dd4765706
SHA180093a9b3cb4c1535ee63d547961622f4c0c8b72
SHA256d0cfd36036f45dc4ec7d0f724d1d955ed672f7e87441e25e52d8d32895bf6b89
SHA5127d654333392d47a14cab90062f87c01a68399e689edb41203d786109c7fbaddcfa3d5e0ae660354e308199b58e3362bc0dec0f07d6faa8812fbc5c76c1dc5a4d
-
C:\Users\Admin\Desktop\CheckpointAssert.docmFilesize
769KB
MD54b635a0fde28c1e9eeda43f58ff71d8c
SHA16fb735060bdacb373f9f8fbd6df91186725d33a3
SHA2567a89df76deca89e5ac33fdc5eab7b3b194197d5fa44b508c47bc54ee26c4a138
SHA512f6a5b14abe7a446d06245270a236bfdf6d8dc065105fa4b0fd68754cb260ac92383fb4fa1b0dccc5c800e1b8037c2e6d83f2f31c4c303b1b7f23f7526c12c074
-
C:\Users\Admin\Desktop\CloseInitialize.mhtFilesize
705KB
MD56675b0724fd63ee26bb4288f77702d64
SHA131c5e6697904c3ae5855a0c8126be44ce61aab62
SHA25606d6a666d67c1e0c39ef7d9ba4ab5fd0f1ab45763455521b60f7d0dcfc19b5a4
SHA512b42fb4461d2eb05aad9c9ef02f6f056c4e48727ab4bcf990bb09848e9eb9ef8e8c01543c632ce41211ad512422cec17286488ded4f8903a573200baedd18b94c
-
C:\Users\Admin\Desktop\CompressSelect.jpegFilesize
537KB
MD5cf2e70af3a35420ae2e31aca5c081690
SHA13681d2f79fe836f7e2da040638be663ce6ec3fa3
SHA2566362cece095ada97aaacd05593e5988b6714fe543d6eb91b64b822fe69fdb53a
SHA512e537e9132c1f18ff58701f86d6412df571441a4e6c714ad53ca48cf59121fe372055ab7dbc1d955cc820fcb1b6f860d4592d42a161356705e8ff04add99987e0
-
C:\Users\Admin\Desktop\ConvertEnable.wmFilesize
684KB
MD51c9eca4479ce4e7a368cd6fc68d22e5c
SHA16f9d347c55188a22fb0f5a2d939ebb12248c0094
SHA256881bbd8b51b204c158e36c90dbf57a8f645affaaa6a9256bf60e0992e73f93c9
SHA5127bcf9857d72827a94fdddae873a10562f72b33d87847cf199201639ad5ec6223ec68d7231d4c196847e66e92ecc0187b695fc71d44bce215699752db5075d256
-
C:\Users\Admin\Desktop\CopySkip.regFilesize
811KB
MD57ef153cb6a0ba38957c7ca9ced926aa2
SHA1e192c7ef8b177dd9a903297ec74581a788af5329
SHA25636e2326ca6e8bf8a46f5c3a58a1cb54256395c678094e3fbff88f6eb35774d4a
SHA512173099b889c176bb266760841b22d8dd9519599b59608b99abae3c6586999183d0240a357c2032b7d50f5417517ba34da3769d942402041923dba799cc0c4a94
-
C:\Users\Admin\Desktop\DebugSearch.mpgFilesize
558KB
MD55365d37d95750812bb25e7474029b161
SHA1ab8ab6d5ce84f254fe1f254929be549f79c7236c
SHA2563fa5e9b6cf686ee9ada28b4a162010a4d83d0a307ebe5c8648440d56b0220e77
SHA51204acd88e4bfea2717e3c26e262534010d0163a4514b96949118624ab115ae1ddcc146af33cd59931d35a26b19efd8a04bdade9dd912998a2c1835fb0f05b26cd
-
C:\Users\Admin\Desktop\DenyProtect.rtfFilesize
516KB
MD5f5a10ca7f3002ed261c2967adc1a1ab3
SHA16f28cdf1a7dce2b087bf28a2696d89f4c9a35957
SHA256eeca16b4d43bdf2f71976ffed89ea8c340f7e7c678477f426f36726bb73ab4ab
SHA5126ddf6c391c08afed7d69cf3d8fcd531b1bdc163cc99f80b30338126b24b636b8ecf1981e1126bbf8bc5e4b0679d2576bc93355558d3d27e631a7304dab8b54b0
-
C:\Users\Admin\Desktop\FindUninstall.cabFilesize
747KB
MD5ab7d39969ca04cdfb72bc1ec2280486a
SHA1c8da3ba667c14bee8deab95dac5b9fbb8b1b4ae2
SHA256bceaf3b95557c72f6df379ed893209a4f4f3c457876adb609d34943bbe97a19a
SHA5125ada16f9a07fb68bc8210b0ff0f79fb5e5513c809748abaf78f3e0096b3a0786b7ac667490f8ad2424d9420dcb1b1ad293dbf3a0c24b6b8d512dc1be88246ce4
-
C:\Users\Admin\Desktop\InitializeAssert.i64Filesize
431KB
MD5014c5695f341c91c4bddecdde07c1833
SHA10944be45fc028f2c0fda7af29ad497de8553efae
SHA256bcb4ef4a689f0e7cb7524294cd91711950f6fa0f49383d3bb7ccfb34254c590e
SHA51275d93567f81455ae76781b0946d824797e481b33aa8f7e5a452948e0200321d6ff4034154e624f24b92d0f1bfbe0aa0f4327259f31c2588b7f930d791e1552cb
-
C:\Users\Admin\Desktop\InitializeResize.csvFilesize
495KB
MD5ff011e3de0fa19f3ee512e96579e9f1e
SHA1526f4b355482ab10d066da3f08ec592cfb8eb0ab
SHA25634a4e6d434107a41669c7f1f612284b9beccc8e05c4154c0d6dfc133fa82ae43
SHA512a7b07bba954daa44e87e03d772b6a350c2c043b68b36bba394039ddabbc721be73e391f84943ed781cfbb1f6c65f83686ea6d9f056c771bd789a8c803df75463
-
C:\Users\Admin\Desktop\InvokeInitialize.ps1xmlFilesize
347KB
MD55230bac15ce215ea3b1b193520c0a278
SHA1eb0967b6e22a2cbf385085fb6ce112b61513e47d
SHA256065d846185942d7acbccc3c7393d5c9b95d7e91b8a5c31840d7f71e8c97781fa
SHA512ac1ed331b75d53368a84c51523d364799f884272fb299fc2bd3c73475f2c8bbcc5735e2a6cce139d05a0a5e56b0eea2280fbfae1906d845ac7d12f89d507b015
-
C:\Users\Admin\Desktop\JoinDebug.mhtFilesize
326KB
MD5075428d2e0a6ae04ede1cd14cbecd157
SHA15c0e697cba272e75b78d2f336b2c6a46a8265dde
SHA2565ce219d060dd2b6105ebcd6b8ecfd0171da5acad55155c0d9a7f1dbf99f0bda9
SHA512f877e4e105a5de1a8cd0bc6db5603b21a9eadc46017f89ebbfffcd579832b36b275eabfe6d0ab1c799b678913d00a92854097a24407ba4a45046d4ca6c8b4016
-
C:\Users\Admin\Desktop\LimitConfirm.htaFilesize
1.1MB
MD5b3266e9021bc3c16d0adf22678275fb5
SHA13130bb9bdecf025497daedd9a1655c138255a3b9
SHA256222802421545c4782d6f0d56e726ad0ea3dec4162e7ece8015cb830737e0aeeb
SHA51218341d00126bfdfeca6af01c4583a464fe0f3e84e2792187d01314dde8d6cac65c8da2ac2e68ab0f0944420b9cb242c1d8973f289b9100606de029c658cd4450
-
C:\Users\Admin\Desktop\PingConvertTo.wmFilesize
726KB
MD52eb9e28a40460c235ea7260979bf79bd
SHA129d0ced60ed536771f70475453e1076fe5ce37c5
SHA25682a97e50082064cba7a1b403554a932fefe5f6dd6d03566b8c018e84e6e4d6ab
SHA51218f380f063dd438d595e557a4435685779a88d9b531a23812186d8934c08444b76dc3566eb9a8b3c88896331f95aa112a41c80e7163cbdf73c13d27e9b948113
-
C:\Users\Admin\Desktop\ReceiveConfirm.odsFilesize
663KB
MD575d64aab7b95ddaf250901409d9f7101
SHA1327125387958529b67662cb10f1ab1bebb08634e
SHA256c2bcce564a2eaa9763c71932438fdf85f797f9ce3e2974a004383c234bf4aac2
SHA51223dec697e05a3d791a495abb4117f04a90d86c90ff3210b80c74656a3e7c12a0bd6ed585b394893851056e3eb619b0d57cf39a5bc8553c03acba8219b7f86176
-
C:\Users\Admin\Desktop\RedoTest.MODFilesize
474KB
MD57e1adfd8c85f8a3f928305b7c81046ba
SHA1128bb6794d6bc07bc1f773ef310f8704b4963286
SHA256f48c31503e6c2918f15d80476fde3563631925be4872fbb7aec6424927793118
SHA51228257f0176a6891047050e92ff3152e91befdd67db59f55b373fdfee4157ca0b99387d5e4307884775323362005b8041865335a9894c84fccccffb4fad4ab0b2
-
C:\Users\Admin\Desktop\RestartExpand.TTSFilesize
579KB
MD5a69042f844ede890fe2320baa48d3fb7
SHA105e8b2b199e349c566a7c1e54082c97538cf82e3
SHA256c37089abfea73d695236057020d9ee79b91104c54c7e9333b76eed7ca99339e8
SHA51284533a73c4c5c30fc8113cceee2e0ed55659ec7eca6a2ff1cb6ea93832fdb709cb9319b27197317febb98313e68813f5764105f20a4af1682c78f77f66b61bdc
-
C:\Users\Admin\Desktop\SendDisconnect.shtmlFilesize
621KB
MD510b54ef9301e4f840968d06c3bca807d
SHA1e846f8e1a57542fdf7751115af7faf1c10b5814e
SHA2562e2e413c15a974c4ff48d3f819db7ea208633fc5fa896fc25ab493e4e0531527
SHA5126cbbfea52fb46af9fd27830042d02fdc44328f7f98181bc85e559c4ba1a2c9dea2f71f601e640e5ab0c61f7d412c56cb618169e1911123fbe158402b014f7c17
-
C:\Users\Admin\Desktop\SendRestore.MODFilesize
284KB
MD5d1e2a1bd2a197cb6cef22b1f916bcde5
SHA163ef779043c71c6e9e3c394fbf5c6660ade3069c
SHA25676eb4d53f1add1c3dade0e5ef756b5c5752c75fddb59fdb0e704a08eec3b15dd
SHA51211e5430637048e79b5a79d65ce0b3df9a1fa4ea92f042abf34888ac32ce464cc4a32aa37e278c48bf1b89a8db6a14bf60652d1df2c8ab390fa2f9bc94198ecdf
-
C:\Users\Admin\Desktop\SetSkip.vstFilesize
600KB
MD5d27c0a6615086de3cc7ad7dba54fdc92
SHA187a6457092a016a7f57cbb80387303fb0c85923b
SHA2569123d84098522f2c22464d231cb2add55c0fc5bad2272521530bf462c5b11d00
SHA512fb955668c269a9139d488484463a334b5eaa9320bd36ac9c37d441eac5c28552e347be4e40785f90674e73bb660f1052c67912be00bf991877cdd6cf060935c9
-
C:\Users\Admin\Desktop\SetWrite.docxFilesize
368KB
MD5fc7c9770d33c394add614232f7195891
SHA134a9a3c559cc7dd8a1d20c06a252dfdce00eba4f
SHA256ee0e13e4a992d589614fdc9182ff5d5cba876638e6f5adcd36625f4ddea2b3f1
SHA512076014dea61e4118033ee7e766734bbc9b72204a1fd812191a6d50dd93b3716b1e47220a0b99ad8ff49483a440b81c7fb0bd7d82c417dbeeee92bd6484105629
-
C:\Users\Admin\Desktop\SplitRemove.htaFilesize
642KB
MD5853170891590d2e276e665723b5ff97e
SHA17a011aba9931273401c92ece8d37d31edb48e228
SHA256bddcaa281c7e1296d6310344d424c03f078d04d99b163dfd90194ab8635a38e7
SHA512d1dc00c77ca71b0d2cc6fda2294a9e4e73eec0db3c1df8958fe7e411bdb76eb1fa3fa03270a264bf79cd6424c643989173a58d20912c9c0098658b085f0b8bd7
-
C:\Users\Admin\Desktop\StopPing.mp2vFilesize
790KB
MD5e1c751b945d7feb07e155221cc10a173
SHA1167efb2bf50ef10cbdea45e5f1653b6043733658
SHA2565ea335edbf7ee5e0171d0d65b64728ef896555d4ea6e30c689d3a65ca8192777
SHA512f6491eb6dc16f7f235a55b3a123e2860a214b5d6994e98db37c66bc4f2843d44bb73186ab53dab2a470de71ae209d4ff95d178b5fc4f623a9b0aff19b0525273
-
C:\Users\Admin\Desktop\SubmitSend.wmvFilesize
410KB
MD5236be73f287cc69ef7c74163ac2625ce
SHA11589ad4ffa6e835a1d9fc35d6870e9cd4e18f5a3
SHA256d56dc2f190ae8162d0a2721356ea5c87c0eaad09a680bce0f2c73def7bfe0caf
SHA5127a1262c0ce94bd87399ed351c6d5ac0b5a1b5f5c84b0286245a322d5a8423d862e2607309ad56d5f94bd186ef5e8b639641dac6e5dc338fcc429e66c5aa5fa0b
-
C:\Users\Admin\Desktop\SyncMount.cabFilesize
305KB
MD5bde6ba84ab12b754b1fa9d82b8c298dd
SHA1eb43ba8b63d8346c981be113ce31a4b5a3124f00
SHA2566bf88187d1b6e544c031a4e073e911f2cf8160dbc6ffea7738dc70be838ba0a1
SHA5123ffcb9f78a87652855741498b24a6ccf5e0df279d900a06b4db00b086f9681f09bd7d953002c7ebe3ce9257733652f050667781d5c9f207ad2b9ad66ba37461c
-
C:\Users\Admin\Desktop\UninstallBlock.mhtmlFilesize
453KB
MD5c3febcbbb7b229a08c7bf61b17c29bd4
SHA1b76a7f2c505a091da2f17b59a02f22fbe5c32d95
SHA256d17cf22d5406d30dc050f7901138b277caaffd2121c6f9b6f3ae085d99ec7649
SHA5126937b158d7573ccd3063cc9755721a8a03fcfff78f8d2b1950b3667301f60264fcfcdb69e40c38ab4ab7547fd7377d1f35ebf64ad78694f1ff53538472d4a941
-
C:\Users\Admin\Documents\Files.docxFilesize
11KB
MD54a8fbd593a733fc669169d614021185b
SHA1166e66575715d4c52bcb471c09bdbc5a9bb2f615
SHA256714cd32f8edacb3befbfc4b17db5b6eb05c2c8936e3bae14ea25a6050d88ae42
SHA5126b2ebbbc34cd821fd9b3d7711d9cdadd8736412227e191883e5df19068f8118b7c80248eb61cc0a2f785a4153871a6003d79de934254b2c74c33b284c507a33b
-
C:\Users\Admin\Documents\LimitClear.xlsFilesize
521KB
MD5115e7fe08e70207fd182f9a48f3bb39e
SHA11ded6351fb851298d4601bc08168a84ded306299
SHA256b2c342675bcb5164ee55b92b90f767ba4c7da68147f93c603ebefce037b6f6f8
SHA512085ebffa2fcd491d3544adc291b0c2b2557defdcd40ac081f93803bfaf8703a07d08cbf227cd521bde6adb1fcd4d5f9081518cd180aa90cf0f6e9c3ee67396fe
-
C:\Users\Admin\Documents\NewEnter.xlsbFilesize
713KB
MD57ef398595087bb11a099ec33af833452
SHA187386a245ee9e04efe7d503eefbc187327b61660
SHA2566075080224a395646901e18086367a2f1d1f315b2e91310bff88dbb4ee573edc
SHA5128686629822688ef24d3d5faf21d940f3111e7d8c37de629de12ef22f4172a29838ae6099c88715217519b804f22d85562e064533452c086195f530f637d4498a
-
C:\Users\Admin\Downloads\AssertUnprotect.cssFilesize
525KB
MD59dcab3adaf3936f454bb963719026f5d
SHA119cc3cc6c0a5f8f0a6c42c2e92bc85c6297df601
SHA256999cd157faff0afef60f5c86ea5ab2d661c69f646835dafc7432fbed3bb87435
SHA5126b5ef67cebd5cc1c7708b17c57755a97bffd58b2a09435dbc3db3764e91b213c85566a84e9a0c5f4cc6b8c3a3d0d686d5eb8c095b8c5f2a1f4ac4c707ad7f848
-
C:\Users\Admin\Downloads\BackupExpand.pngFilesize
546KB
MD537d390193942e96723d74be6c994173e
SHA16bfebce3853c59aa435567493d08667576966806
SHA25644298a0d60e738251b3bda225baf4f679c9e12ab127742e0bd426716bcb51ef6
SHA512ced5adfe087f96a379dfec091fe5d83ae975ee5198eedb59aa1571f3aa882abb611e303c2e373d1587a59a0ec5457ec91d89a44dab848a9a597252457228b824
-
C:\Users\Admin\Downloads\CompareRedo.xpsFilesize
819KB
MD56f95ba24a8cb3510b66dc31d5921b166
SHA12e194b5cd44bd8dcfb3d930804412edfeba63585
SHA2561795f0ebb09e61de7daded002126b60a27c61331837a3e9ccc8da0a30be88b11
SHA512f491dd78c2b0c3c564a08f77467d9aca6144c87bfce566ecac92e0a324c03dc21886e79281ca30efdd6a0dd4ad94a243dd7cd59de2e26ab3e704e40cedd56129
-
C:\Users\Admin\Downloads\CompleteBackup.vsdxFilesize
966KB
MD558b355ee5255e6188947345bf73c748f
SHA183e85054390b8b1d77c7b784656ccceef30f3c6b
SHA256457077e34e5f346ddc44b73bb4933ddf91bfd27645ccd5947c44ea85c0efffe0
SHA5128bbf0b26a3761541b086cce92b1b5cd2a54aa183a92061f90c9c4e7018ecaae827a3c7f72e388fb1d7a78659ba693afdcbbbb8e20315ecdaab2966ecc5c508a7
-
C:\Users\Admin\Downloads\ConnectExit.vsxFilesize
924KB
MD54c07fdeddb35a0e177c0d4652bef7612
SHA158dc07acc2cc9f18b76d916be2d746a483b7e32d
SHA25680feca7ea055cb7ea34f3fe07d2764cff9d5d60b0e7f91be2369e84149f1b963
SHA5121cc0d3a9db30feccee6650d2e6a6026ff8f727026d3d76548c0dd1bb9c7ef446fb52499f61fbc3d789c2d47f552781baea59149265e4306f26840de0a0981c34
-
C:\Users\Admin\Downloads\ConvertCheckpoint.wavFilesize
483KB
MD515417cd74f0c61c43684e89f7e589155
SHA13cad5fda6ffeed6dcd6e7b4b77c4955ab4994151
SHA2569246600e2260a0ab6b48c9b6d7fda382cd3c94b61a8c966f1812c4390d56e60d
SHA5126986580fe5d1fc103ed49e40ae4857f324b848c85dfd8c233ea877f74adc6367071174d6cea9ea34c18b496d24e7ef0e26599abecfb0826dce0b43b9570c1ca8
-
C:\Users\Admin\Downloads\ConvertFromStep.svgzFilesize
672KB
MD5ce3a020409e6dbbea8593618934ac5b9
SHA12f31a30a05e149f87caf3d61273f02b00b64bcae
SHA256c59171cbd3df5fe8f7094cab8ec09fc048d0d5dcb5b4455545032f017a6d8562
SHA512c98cca47bed049f987dcaf90ea067c399bdcc521707c28e45e436bfe9b6a765759a34e29276e4959ed92e12766498f8ddaaf1ddce18fdde71fa4186d9c4d6cf3
-
C:\Users\Admin\Downloads\ConvertSearch.xlsmFilesize
882KB
MD50168ef8687a8d151a66fd227ad508770
SHA1d8454490096329e3999b9311d076c646bf2a8e7d
SHA25619a04abcd5d4974f121b0d6927566fcb06183929c2fd57db923d00d632ef2c5d
SHA512cd26546262dd062e1953854b1388a9e2d39b96d582dd8bd60bf03cd47814aad92846f84df52f78cf3d15a9909cf0e6a0845f6360410cc982d25a810bcedf780e
-
C:\Users\Admin\Downloads\ConvertToConvertFrom.auFilesize
693KB
MD553939129f375875fab5b8c050e757541
SHA1422c43fe4c088db8cd1d11c035c94daf597af382
SHA256fcd1c0051259aef44a2c6b3a60feecc2ac065c426e85f71b5b710df6780a664b
SHA5129145b893d95f2ea3374ac7e33d7a8572d18ff9e6202f8979939432b583454d984af900a662fbffae49806053bcb1299a26fc295d40120591409a2b5d31d0bf27
-
C:\Users\Admin\Downloads\EnterHide.mpeFilesize
588KB
MD507b8986121f398dd778abc2e488a6b8b
SHA1382a2b81e3ad1c310fed7336db28348d4a064371
SHA25682ca4d2c7343d10fb3d613b4179752575a87ed4701901085308d12b7c3320cb2
SHA51292408704f1c72b2b097d7779f3cb75b9b364cd54cb76607a42940b75dda85a69a912fef3a1bf91195b7d26b10eda5f8ec41a46fa464ae3372c7e37a5b368dd13
-
C:\Users\Admin\Downloads\ExpandShow.wvxFilesize
903KB
MD558faaa458d695dfaa5d2556a0471109d
SHA12f1f604cea1965caeecfca935ae8f0146e925090
SHA2564249d3c27215b8f4825af738d228a50719d970df3ecf4b1312dfb3a8abbc83b0
SHA5125d627bfd1eb9a78a1218bff66e147034a91b230eb76c9223cbfba3e2052b31a64b6799968309eb0589ded9f555d7de1a1183aa7c1d8e97e204d73be61bc24b61
-
C:\Users\Admin\Downloads\ExportEnter.gifFilesize
735KB
MD5964a0735cbda06a7881535f75184fd9c
SHA13a4c7ca6e14bc9db44a91d40541057126513679d
SHA256de7a4a03572f62974ab3f73b7bbbb5509c3ef34de9bb7c0cb09c3016c2929a4e
SHA5128eca00e61b5a5c1f9ba707eccb27bd70b05733eaa33b66f3c3373f6169916c27f2844affb1ac7377dde25897f39fa3ec15c28df086bf4c41e89771187fe89300
-
C:\Users\Admin\Downloads\HideSplit.xhtFilesize
336KB
MD568ba9fca6e0ace05bb086a7151d79703
SHA1f72e47b58b7423863eefb30d16ad517c170bc72e
SHA256be6ef9125b32659263d8dc4cf5cbc2e421f4154c8e8dc41ab94e43241e0c2089
SHA5128e6fd0eae85e79a961caefed797f7f07e13e70eedfb40d9d104ffe6bb7b63cab025577575d033df86ceb8315c4a29fc94d2ac91aa0895bfd62a10040bd3e1a0e
-
C:\Users\Admin\Downloads\InstallSearch.svgzFilesize
777KB
MD569379c3fd99ea3be75caccec1b42ca92
SHA1a3469c39966f410e092c9883a276a1db9255b723
SHA2561f8995cce6bf1d5804d5de50b042f161f735082ab31482180ccf220871d7b79c
SHA5124653f6cba59aff393bcc0ee1717e6d009bfd5bc250786f6abc28e31d002900cdb1b31f40fff75f3b9eafdc0de5cfd938a1ced3bcf46c9c3ad9d4e10f1fb5c0cd
-
C:\Users\Admin\Downloads\JoinExpand.movFilesize
399KB
MD5446102706b9cfa9f7f9cbe853b221b5a
SHA1a558d8b0af442372343e1be4ba12cb328143fb05
SHA256eec8b0afa175e7967fb1cb53ddd9b186a0a2d884ac796822ba23579b65384385
SHA5120b5cf75ed8291ce9c4dfe888c62166c1f2a3d4b1df923d106f040a895261b311a7e005df6c924ce1f9d387c20bde322364f8c89c4b880995411e242147032d39
-
C:\Users\Admin\Downloads\MeasureSwitch.aifFilesize
504KB
MD5dfc4124da6cd902eba3e6fea448451e5
SHA1b4356637430fbf46816a1cb68279f1d4777273c5
SHA256983bf84407bc496f067d5e4b46799a8eb628b857d2767721770cd3cd729e8d1a
SHA51202ca7a7321350218f12c6cc5fd43eb57fe799db16d4842991f40dd3c5a29cf597b0b661fadc4a4c152d39795a5827ff4955db34670eeab700e5e952f6db54d43
-
C:\Users\Admin\Downloads\MoveComplete.easmxFilesize
840KB
MD5c993f1884a2b754370322cc4957cc031
SHA1b65ae9275f514f5f760240c8faebc1b3569d419a
SHA256cc61b32215a8c50d8e8f618b63e2f1544599a888a8900beb7d7bf6cd1f19de01
SHA512078c5c08ed6f365e67144bbb2145a7b74c98042238384d0e49494666ea0479282a407cf9db0ff34cdeac8d466f7b77fd22635b4eacc8b5c37e031c8a58f6ae23
-
C:\Users\Admin\Downloads\OutSkip.otfFilesize
861KB
MD584c17768c727d5c1736ad1abb34a6362
SHA158919577be244dcaaa494ae2b0ac6487855f6186
SHA256aaa863bd9c723b2b9dbe2c3e802e5c17772cbf2ec3dc454584b1bf893df9eb26
SHA51230dc9a11fb50e65f5e8428a786de4fff75d0643c682972706c0de4905bd94824c7e285e95d36e50d9a505ece79082eb58903451b4342ad20a04a31a408880a48
-
C:\Users\Admin\Downloads\PingFormat.kixFilesize
756KB
MD534b0950ba19f13b983db04807dc13298
SHA139e096fd189cda4ac8c9a396e3dd7db155b46627
SHA2565c4faae22cb17970aecbdc4b7bd86d778ff0051ba5eb7cef19d2b1199ed6c2eb
SHA512b90113360f7afef41028d470acc770e1014c36a72b35723bec7f046b6fcca77d21f5764a54bf7d8a5254af7cab9c0e290ad5728a4c936b27916606c2d180ce26
-
C:\Users\Admin\Downloads\PublishInitialize.3g2Filesize
609KB
MD50cd77b7f4cd8b32b81aa36fa533637ba
SHA1ddbcaf93354f043cdefc7279fe468c49ca246991
SHA256b24668c1c1745bbc0647d1570b35e24f93364168652b0e2612e9ba95326f87a3
SHA5121d5debfbe2a8bec5eb516e91bd236118bbe59b27144c0f77a6b2123a3d7a464df52c8747669c2e98c1153e94b6608f21d8c346004b4438b448db5c191e690ed6
-
C:\Users\Admin\Downloads\RegisterLock.aviFilesize
357KB
MD59d052c827e880b753faa28cf1e298e4b
SHA104faf2f8bfc17c71c714a8c82c32ca4929c94412
SHA2568d63fea2f90970cb5dc8408ca7b053b854ac3281619894ca6b0a3403a618fb50
SHA512639d3606ba7a4c9bf8fb34a56a1948b84d8ec9f6251bb0938cdf916c0736ca54c79eb614690c6d4d2b8abb4773007a44a4b8d5c019b6aa914398ff205dd3b861
-
C:\Users\Admin\Downloads\RequestMeasure.ps1Filesize
462KB
MD5bfb8201d107291d27d8db01e9b03adf4
SHA17f2d08a9019a0f1f0930c0d1d8242bb6121fb5e2
SHA2562eb47f7bac645e58d5f5d20e09a7676ef4c3343876efd388c4e9262cac8948bf
SHA5127a4186a1fb1898f912ddce20ff989a5833685fcc1e0d8c468c2a1596f35502fde1da69af1b287b088616e1087dc87bc7a46a06386be23fec244828bd8644c2f3
-
C:\Users\Admin\Downloads\ResolveCopy.tifFilesize
441KB
MD5b6d9495e4a93c33f801724ace2257d6a
SHA1a93915a5a9e328f3d605640138b3cce0d874ae31
SHA256d023618efd8b4d6de8daa7500f447791654424e509c96f0df274f05fd05ac789
SHA512b62b2fecaae5331f26185fbeb4e5ef5170977afde7facb8dedee5d8518e154775cf647d3b1c603b822c2b68aa4968f9bdb04e9e34ae02f9eaaac7b4152dc1b7b
-
C:\Users\Admin\Downloads\RestoreReset.ttfFilesize
630KB
MD5e2bb11e312ddcee708c1c27f274e10a9
SHA1025af5b841ff7e56d889091cd62ba90d7805c0ce
SHA2565ed34f029dbd6164e511e755fbd149c6a24d2849b75af7ba3ed0abfd9a186043
SHA5121f04c247ca3b6025d624c3c0827efa7fcb1179d58ea40bbdb8b4e0fa6dfbec1b4f69dd103524091b1c1968d2209fae6677c96da6dd4e7e5f69397c9187b919a9
-
C:\Users\Admin\Downloads\SaveAdd.jpegFilesize
651KB
MD5f4e570dfe86e551b09acbde9cb1e0feb
SHA1c47637d093b319255203a3078252681be194e739
SHA2561dd61414f81f98250e1105caa0981c6d196be760ee3500ef2aacde2df32c31ac
SHA512700c38623e50d06231a763ec3e5bb1926d2a26784da0ad5a8c0908f89cdfcdde10c0bb8f89dc9fe0ca2e59cc0ce170d6b19c8a63d314c591ce0643b74d395abc
-
C:\Users\Admin\Downloads\SetConvert.phpFilesize
945KB
MD5c1a41c3c77574e1ebe424351c16ec48d
SHA1859d0c45349f0735be87f32e87a1791f176ef801
SHA256a3c4194ea0576a4bf0d109413d56497ab0ee09456140260b34288781003ccaf5
SHA512321013cfb592cc4f2497efb8184932f8b269248c66f77088c3c4993c7534992e4c121703d87e376354246757a769b32b739fec74f0a726c0b9ee649fd25c27f5
-
C:\Users\Admin\Downloads\SkipImport.vstFilesize
1.3MB
MD5bc6605ae76bd608f63fd59f086800e52
SHA1809c7640e0813c57ba29fbaa09d099a59e18a596
SHA256e5cce08d5b8010f45ff448b01d450c656294673b669c2eaabab07dee6421839f
SHA512b68b639486c221e6d4198b1f7a96d3ade2b1aab235934d92e308c5195d0a82008275099f8c6dda5ac756737f3b38f4fb5e01929e3611fb065f112e49a3fb4029
-
C:\Users\Admin\Downloads\SubmitSearch.search-msFilesize
798KB
MD52eaf20d867e1069ae0dfea6b6c285a61
SHA1817874fb6a79e2c62d4f24002d80add1ed569a3b
SHA2568620070c9120f3b232f06eed185b12e7b387d06e32a77a57eea308ba1b3c48cb
SHA512881040504c4c6f9c5368d96b34f90fe2d1080cc980450978df96328f3ba16d45e02a6a2a6ed11259cea29edea7ae80580dcc2be05455acdffb71749e1a33c4b8
-
C:\Users\Admin\Downloads\SuspendMount.MTSFilesize
714KB
MD51c3098fefb304fca51fd3b5d3a31c75d
SHA1f0f467d01fc4ee1ea09ffb1791c598ef0802f876
SHA256b88e9a829de3669fde5a2c5716fc76571ae347e28e9aa54d33cc453ed7f883fb
SHA512f7afbc836c2fb14309562e4e1a2ff34e676155254d179f3b0e26eff7c92c480c3192bef16fce6308a66a718dccc2f451614825bfd8b9e324db78aa403d1f8966
-
C:\Users\Admin\Downloads\Unconfirmed 145091.crdownloadFilesize
18.6MB
MD5aa2ad37bb74c05a49417e3d2f1bd89ce
SHA11bf5f814ffe801b4e6f118e829c0d2821d78a60a
SHA256690c8a63769d444fad47b7ddecee7f24c9333aa735d0bd46587d0df5cf15cde5
SHA512fab34ccbefbcdcec8f823840c16ae564812d0e063319c4eb4cc1112cf775b8764fea59d0bbafd4774d84b56e08c24056fa96f27425c4060e12eb547c2ae086cc
-
C:\Users\Admin\Downloads\UnlockClose.mp4Filesize
567KB
MD567b8bf6bb6bfe0af1c51cae5105d713c
SHA18f89305d1c649a117924b23d0e2da11aa1d55d6b
SHA25660d097d426e5ae104438bfe0f52a75b982660380786c91450808752bde90cbb6
SHA512b1089a80ed16a2f0cbbb6dca45f7b17f5f963b8c45ebee6cb9109e463c821bcf2f99ee7812255f48632ccfff0a403a77c24a1f4f31d1e613ec6dc884f40fa2a8
-
C:\Users\Admin\Downloads\UpdateExit.xltFilesize
378KB
MD5f5f0a51d4669be7dc39e95edd2cfbc20
SHA11fddafec4d61a559760038bee972d907f880ccf4
SHA256b5417427706e6d8425c06725727c157e03e6cc3ecced3f732915ee0191079306
SHA512c280a426716b41c28f8265c4c5a363a668fd1d78f24a4bd6992db1739d6160dfd4e7d9d268702464c5e5f0a76ed83fef1ae07245d0b1949c19e11a5a7194ebb5
-
C:\Users\Admin\Downloads\WaitInstall.gifFilesize
420KB
MD50172c4908673769eaa82e1f50409bb7c
SHA131d76603cf63d46b7611098e7ef288f21621a9a8
SHA2567b842670f4315a9bd9e8c900ecbd1d90171e13985a6c4dd9de3ba25b672820db
SHA51200d052d036beaca705acdfdbfdb62a2634e964efda983d63bf1bd40e637754b1c689fce03547b03e347c0085d1e5b67f966b57326b2bb17d2c212f2d759b8557
-
C:\Users\Public\Desktop\Acrobat Reader DC.lnkFilesize
2KB
MD556199e5f771ee4374bc0f1cf1e1b69cf
SHA1277e712d07cf54cad917e582bc208ffc84d77d98
SHA256b978a10843ea9a5b65630d39378b5dcca55e2fa6b6e975a49b85e1de273c64df
SHA512edac13520b066281059bd28de3a93bbe115a8644e5b15a68986827c7535d24e1e3b3967a8051b9b5823d1183d53abeccd809c28cfea44823dbc160d9c072a236
-
C:\Users\Public\Desktop\VLC media player.lnkFilesize
923B
MD54510edda3bdea610c6aa4b4153e9fa91
SHA1c1b5df5a5876bb68d301039622724b4266955525
SHA256ba8c33211395672ca326fbf04623114557a78c17373bdf6718d9e85646bf4ff9
SHA512b1406e42a8d890b3155e8dbf69a1e60c0a0e467600ab733547bfa2a653257c7f6d2964b310480fb35af2a823b38b8ca7c3c9f19c7a1a673c65a7d8b0369ef165
-
C:\Windows\Installer\MSI82C7.tmpFilesize
690KB
MD58deb7d2f91c7392925718b3ba0aade22
SHA1fc8e9b10c83e16eb0af1b6f10128f5c37b389682
SHA256cb42fac1aebb6e1ac4907a38035b218b5f992d1bcd4dece11b1664a588e876e4
SHA51237f2c132b632c8e5a336bdc773d953c7f39872b1bae2ba34fbaf7794a477fd0dcb9ff60a3ddb447fe76abd98e557bd5ee544876584adea152b0841b3e313054c
-
C:\Windows\Installer\MSIB51D.tmpFilesize
418KB
MD567f23a38c85856e8a20e815c548cd424
SHA116e8959c52f983e83f688f4cce3487364b1ffd10
SHA256f3c935cac911d9024c7797e8ffe4cce7d28154b236ad3e182f9efb85cd5a0a40
SHA51241fc1b4e2f47d5705861ee726c8d5d7b42191e7d586b370981da268414f207f6dea00a59dc53012cf6510c44651fec4a3a33bf69e501d85fd2efd66517e4169d
-
C:\Windows\Installer\MSIBFF9.tmpFilesize
148KB
MD5be0b6bea2e4e12bf5d966c6f74fa79b5
SHA18468ec23f0a30065eee6913bf8eba62dd79651ec
SHA2566bac226fb3b530c6d4b409dd1858e0b53735abb5344779b6dfe8859658b2e164
SHA512dddb9689ad4910cc6c40f5f343bd661bae23b986156f2a56ab32832ddb727af5c767c9f21f94eec3986023bae9a4f10f8d24a9af44fa6e8e7e8610d7b686867b
-
C:\Windows\Installer\MSICBA6.tmpFilesize
209KB
MD50e91605ee2395145d077adb643609085
SHA1303263aa6889013ce889bd4ea0324acdf35f29f2
SHA2565472237b0947d129ab6ad89b71d8e007fd5c4624e97af28cd342919ba0d5f87b
SHA5123712c3645be47db804f08ef0f44465d0545cd0d435b4e6310c39966ccb85a801645adb98781b548472b2dfd532dd79520bf3ff98042a5457349f2380b52b45be
-
C:\Windows\System32\DRVSTORE\VBOXSU~1\VBoxSup.sysFilesize
1.0MB
MD58dc26c500f411c68a1cbd2523fe85dfc
SHA1c43446b2005130ad83579132c979def6841ff43f
SHA2565eddb05714b93fcbf3d9dc9210f2e29a7d49d738fecb63f89021a2b17cebc382
SHA51278974b608dc671eff7f1d7b31435d3bda4bb7897f8dd835b265cbf4d8a5f1367f1f7e09b387d1199046a44797bac5d180f488400a35d2946373b1f9fa576d0a4
-
C:\Windows\System32\DRVSTORE\VBoxUSBMon_76C300885A3BEF8EB122594DD2B3D02A309D39C3\VBoxUSBMon.sysFilesize
199KB
MD56bc9768cdd545c056faeaa153e73c686
SHA18dbfeff04cb7a6a32f3f2a09fbbfaff31dd34792
SHA2562e19d29e7e6b1d1a9093eb7f0bd2e2825ed08785d6042b90e3748f3d087e59c9
SHA5127b4e293dd8c1e7cb466d71c5a2b98814ebc973d717e46fcf5e63dcde925d9905fd5ec87f729c1feace5baba74eef9a8a769b47e191df6651d1122432fb8e6739
-
C:\Windows\System32\DriverStore\Temp\{26314ad6-3042-d547-8f14-ca5316fb3a46}\VBoxUSB.catFilesize
11KB
MD5e01c0f59ee96483ee31dd70fb1218795
SHA14dc98fcfa6dffdcc9fdb9733b58a0cfbb0957e39
SHA256775427086b53136855c0d6b65bf32412a06c92155e67351033cc4ff8be565d49
SHA5122ac8c7363fa40f5c2dc4e1e69905670ec890506b2cac7ba6b8ecfd1ed0b7abb65d252c3c2982c829393e3dea1712b5a2cf2dc728d49c36ebedc431f0eaca1a3d
-
C:\Windows\System32\DriverStore\Temp\{26314ad6-3042-d547-8f14-ca5316fb3a46}\VBoxUSB.infFilesize
2KB
MD535806a0ffff129546450cdcaffafc06b
SHA111251df1fbe7ab027059768154077eb985cca790
SHA25666a137a1a716e2d673666e74074b69b6f68f46072b359b4c17fee5055a3b98f3
SHA512ac3d4a434b75b22d3334c9e7c6dd2be51e55d5439c78b8e05c83ce84da78016d111a95f3890f950de57431b03cfc136fce7563ef7931b3e1724ada6f19defc4d
-
C:\Windows\System32\DriverStore\Temp\{26314ad6-3042-d547-8f14-ca5316fb3a46}\VBoxUSB.sysFilesize
184KB
MD51f50fa5bf6487796d2913e78ed8cb8b0
SHA18be143b0a7d6963e9ab911cfba9d3e4ec508f368
SHA256d38854405d1b7e9602bc288e2db9b8492d82f14410b44f655f5505ba9e41aa90
SHA512bfebbd90662901ea80a2f7eff4446c02bd0549f823b310908fc4e2e11b8cc370fc70a0da6945aa4335de81d61dd95980cd3a7bd58acdd06b015d5b4e163c6a29
-
C:\Windows\System32\DriverStore\Temp\{d19ee819-ee72-9a4b-b006-da2730cdbe0b}\VBoxNetLwf.catFilesize
11KB
MD560b2f9f910c1458e203a34fbcf0e1915
SHA110f1ea3e3ce1fc54d45d1ee2c9fe56e4a2b5dc1f
SHA25673eb94e2977c6b32799037de23da54adbd0f61d5c585dd1b65368c863e98fa7c
SHA5125514903acd301a6d865f37a3b8f8ec90d3b4846e5fc28a1372aa3af5e4201ab8011e1eedf1cf9e88809276bfeeac41b8ab33eea6a5c9b56991451105aae207c4
-
C:\Windows\System32\DriverStore\Temp\{d19ee819-ee72-9a4b-b006-da2730cdbe0b}\VBoxNetLwf.infFilesize
4KB
MD57cf28d3145d8b0f9cdde7f94a8729e03
SHA10cc9adc8322fe07ce03dd1e7e91a276a953fbefe
SHA2562585f5715d6a5ebf1e0ae04f11408bdded6789f677a6c4cc7111cf418a296c85
SHA5127b234e92235bf2422020da65cfcf9c05a884057e921befeda5c61cf0116e6bc549a06b53cec641e31b07bd378f711ad9911e74f0dece057d2660689438c138f9
-
C:\Windows\System32\DriverStore\Temp\{d19ee819-ee72-9a4b-b006-da2730cdbe0b}\VBoxNetLwf.sysFilesize
259KB
MD598c5be1edffae7850132d9950e8ed658
SHA13a04c50447bc8e8cf4f72fa3a21ac66e952dc19f
SHA256be8c1e532b226bc5882d62eeed88dfb45a230cf6f78dc65a3ae1de3b142cb171
SHA5127d1d3209fa2bd2123584ec4776ecb5e5e1ff1b239d5d35532cda0c60f26122faa74b0ab3c7e30ed31efc5ebc0d3a134604e2af4d1c8a72068776f6b71376f498
-
C:\Windows\System32\DriverStore\Temp\{ec246a16-50ae-2b49-aa26-cf14703f933b}\VBoxNetAdp6.catFilesize
11KB
MD5d8ca5a996bf2d542fc111586aa122cd7
SHA1002d5343fb1a35283f231d5d6d5f3537602ff94e
SHA256d2d1296289411c8c469312a9569549ba24f4b2d3d525047fded6b4cd178154af
SHA512d0e1617f91ebf93488a949d6f8548f0721b66786ef9788e176d5f2aa4daf84e0aeafaad097c22c8dd0f77f560f7cba2f597c7deef13abb0593d337f1d8652cf7
-
C:\Windows\System32\DriverStore\Temp\{ec246a16-50ae-2b49-aa26-cf14703f933b}\VBoxNetAdp6.infFilesize
3KB
MD54dee77e6d95b41afa3cf5582706438d7
SHA17e6914f9ca78d2b0022f1ba5db083a72165b3cda
SHA25681ac95d678978f9f82dccebe5887f52a9660a729f564698af7a4253e29032a88
SHA5127a3cf6a9d64ab9456206a066eb89968d64f9b459e5e7947c6201c25722e6122bfd8f2d24bdc57338db149a81f3e68cc3b3b9ac085059fe4cff1d9674903f1eb7
-
C:\Windows\System32\DriverStore\Temp\{ec246a16-50ae-2b49-aa26-cf14703f933b}\VBoxNetAdp6.sysFilesize
248KB
MD5dd03fbee01f74530584061fe46a3aee5
SHA149177c7d906c66b322499eaef9b26a0ba36e060e
SHA25644f9d678b6018602bf200772ac5588c2003ae9f413a5a5ef53fb73a70f0fe0be
SHA5124cf701d356a9ae529618e69fc1d9ae518dd20a2d3469f90d5b379f84b748dff4703ddc56e5c9bcc7f44f201bcc422b761b7313e09399f52ec0d2614e5e996dad
-
C:\Windows\System32\catroot2\dberr.txtFilesize
22KB
MD5058b69ad24e1283be24eab6c27960048
SHA17195f4a1306932f5d253a43403c33a6531ba7870
SHA256b5592d7a64c4d38c61ea5806e9747511aa70779c3fcf7875211d5ce0f52d8866
SHA5123ad74d0c8fb83c7ccec0866d06fc82085933707c08d7a7a8873f1867c2301bf85b76bcb5fd4fe942ca179c4b9ac6a3cfa38eb8d94ec6fd5f019a12b39f50f22c
-
memory/2860-186-0x000001CFA82D0000-0x000001CFA82E0000-memory.dmpFilesize
64KB
-
memory/2860-185-0x000001CFA82D0000-0x000001CFA82E0000-memory.dmpFilesize
64KB
-
memory/2860-184-0x000001CFA82D0000-0x000001CFA82E0000-memory.dmpFilesize
64KB
-
memory/2880-1011-0x00007FF81AB90000-0x00007FF81C76E000-memory.dmpFilesize
27.9MB
-
memory/2880-1010-0x00007FF81AB90000-0x00007FF81C76E000-memory.dmpFilesize
27.9MB
-
memory/2880-1012-0x00007FF751B20000-0x00007FF751DA4000-memory.dmpFilesize
2.5MB
-
memory/2880-1008-0x00007FF81C770000-0x00007FF81CCB1000-memory.dmpFilesize
5.3MB
-
memory/2880-1009-0x00007FF751B20000-0x00007FF751DA4000-memory.dmpFilesize
2.5MB