Analysis
-
max time kernel
250s -
max time network
252s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 10:22
Static task
static1
Behavioral task
behavioral1
Sample
spacedesk_driver_Win_10_64_v2122.msi
Resource
win10v2004-20240802-en
General
-
Target
spacedesk_driver_Win_10_64_v2122.msi
-
Size
4.7MB
-
MD5
65f5f179e3da0dbfbd6b35cda7af3e0a
-
SHA1
2569f9f147e989d5e0a766b80e18a64f44b531f7
-
SHA256
049cad32f63e51a5c7755fe00d6cda2dc70bee89640d821ff3760cc42bad2499
-
SHA512
810e97256811b409dffd063d91dc2d10ae7573ea2b76d6b1854f522b8bb5ba812f1b8a8a35d219f4e56c0e8e94a0724f577b9e5e474b5de382a401a1d590225b
-
SSDEEP
98304:Jm0qsQ5enKbkLRkKGv6ySKD6GjwLNIUbG:IjxAKbkAvWujwBb
Malware Config
Signatures
-
Drops file in Drivers directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\SETD5C5.tmp DrvInst.exe File created C:\Windows\System32\drivers\SETD5C5.tmp DrvInst.exe File opened for modification C:\Windows\System32\drivers\spacedeskDriverBus.sys DrvInst.exe File opened for modification C:\Windows\System32\drivers\spacedeskDriverAndroidControl.sys DrvInst.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 4 4724 msiexec.exe 10 4724 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\Temp\{90619e4d-e633-1742-a089-d31c731f4338}\SETD0B4.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{90619e4d-e633-1742-a089-d31c731f4338}\SETD0D4.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\spacedeskdriverandroidcontrol.inf_amd64_c78e51cb686ef158\spacedeskDriverAndroidControl.cat DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{f1eade71-bdfe-e646-9048-b78f94ddcc0e}\SETCFAC.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{90619e4d-e633-1742-a089-d31c731f4338}\spacedeskDisplay.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\spacedeskdisplay.inf_amd64_24a24ddd75e05e73\amd64\spacedeskDisplayUmode1_0.dll DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\spacedeskdriveraudio.inf_amd64_5f028417c7e42db4\amd64\spacedeskDriverAudio.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\spacedeskdriverandroidcontrol.inf_amd64_c78e51cb686ef158\amd64\spacedeskDriverAndroidControl.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{90619e4d-e633-1742-a089-d31c731f4338} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d2cbc354-593e-a245-a89e-6695a006c9a6}\SETCCAF.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{f1eade71-bdfe-e646-9048-b78f94ddcc0e}\SETCFAB.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{f1eade71-bdfe-e646-9048-b78f94ddcc0e}\spacedeskDriverHid.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{a47c58c0-a396-0640-970d-6821560b605a}\spacedeskdriveraudio.cat DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{d2cbc354-593e-a245-a89e-6695a006c9a6}\SETCCAF.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d2cbc354-593e-a245-a89e-6695a006c9a6}\amd64 DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{f1eade71-bdfe-e646-9048-b78f94ddcc0e}\amd64\SETCF9B.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{90619e4d-e633-1742-a089-d31c731f4338}\amd64\SETD0E6.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{c341b2bd-e89e-344f-83bd-5663f2171480} DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{90619e4d-e633-1742-a089-d31c731f4338}\SETD0B4.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{a47c58c0-a396-0640-970d-6821560b605a}\spacedeskDriverAudio.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{a47c58c0-a396-0640-970d-6821560b605a} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\spacedeskdriverbus.inf_amd64_97eac36ebcea4166\spacedeskDriverBus.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\spacedeskdriverandroidcontrol.inf_amd64_c78e51cb686ef158\amd64\spacedeskDriverAndroidControl.sys DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\spacedeskdriverandroidusb.inf_amd64_f5bd7a6351e515b7\spacedeskDriverAndroidUsb.cat DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{9995677e-7253-9d43-b02b-ebadd8a181e7}\SETCE83.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{f1eade71-bdfe-e646-9048-b78f94ddcc0e}\amd64\SETCF9B.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{a47c58c0-a396-0640-970d-6821560b605a}\amd64\SETD27B.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{c341b2bd-e89e-344f-83bd-5663f2171480}\spacedeskDriverBus.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9995677e-7253-9d43-b02b-ebadd8a181e7}\SETCE82.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9995677e-7253-9d43-b02b-ebadd8a181e7} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\spacedeskdriverhid.inf_amd64_696ff26a48c2be30\spacedeskDriverHid.inf DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{a47c58c0-a396-0640-970d-6821560b605a}\SETD26A.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{d2cbc354-593e-a245-a89e-6695a006c9a6}\SETCCAE.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{9995677e-7253-9d43-b02b-ebadd8a181e7}\spacedeskKtmInputmouse.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\spacedeskktminputmouse.inf_amd64_96adfd1912f06435\spacedeskKtmInputmouse.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\spacedeskdriveraudio.inf_amd64_5f028417c7e42db4\spacedeskDriverAudio.inf DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{a47c58c0-a396-0640-970d-6821560b605a}\amd64 DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{db461666-5c56-564d-87a4-1fccaa9aaaa7}\SETCA4C.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\spacedeskdisplay.inf_amd64_24a24ddd75e05e73\spacedeskDisplay.cat DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{a47c58c0-a396-0640-970d-6821560b605a}\SETD269.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\spacedeskdriverbus.inf_amd64_97eac36ebcea4166\spacedeskDriverBus.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d2cbc354-593e-a245-a89e-6695a006c9a6}\spacedeskDriverAndroidUsb.inf DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{f1eade71-bdfe-e646-9048-b78f94ddcc0e}\amd64\spacedeskDriverHid.dll DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{c341b2bd-e89e-344f-83bd-5663f2171480}\SETD44E.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{c341b2bd-e89e-344f-83bd-5663f2171480}\amd64\spacedeskDriverBus.sys DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{c341b2bd-e89e-344f-83bd-5663f2171480}\amd64 DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{db461666-5c56-564d-87a4-1fccaa9aaaa7}\amd64\SETCA5D.tmp DrvInst.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\spacedeskConsole.exe.log spacedeskConsole.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{d2cbc354-593e-a245-a89e-6695a006c9a6}\amd64\spacedeskDriverAndroidUsb.sys DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{9995677e-7253-9d43-b02b-ebadd8a181e7}\SETCE82.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{f1eade71-bdfe-e646-9048-b78f94ddcc0e}\SETCFAC.tmp DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\spacedeskktminputmouse.inf_amd64_96adfd1912f06435\spacedeskKtmInputmouse.inf DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{f1eade71-bdfe-e646-9048-b78f94ddcc0e} DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{c341b2bd-e89e-344f-83bd-5663f2171480}\SETD44E.tmp DrvInst.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\spacedeskConsole.exe.log spacedeskConsole.exe -
Drops file in Program Files directory 26 IoCs
description ioc Process File created C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\spacedeskDriverHid.inf msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\spacedeskktminputmouse.inf msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskService.exe msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\amd64\spacedeskDisplayUmode1_0.dll msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\spacedeskDriverAndroidControl.cat msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\amd64\spacedeskDriverAudio.sys msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\SpacedeskSetupCustomAction64.exe msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\spacedeskDriverAndroidUsb.cat msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\spacedeskDriverAndroidUsb.inf msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\amd64\spacedeskDriverAndroidUsb.sys msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\spacedeskdriverbus.cat msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\amd64\spacedeskDriverBus.sys msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\spacedeskdriveraudio.cat msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\spacedeskDriverAudio.inf msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\spacedeskdriverhid.cat msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\amd64\spacedeskDriverHid.dll msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\spacedeskktminputmouse.cat msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\amd64\spacedeskDisplayUmode1_2.dll msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\spacedeskDriverBus.inf msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskConsole.exe msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\spacedeskdisplay.inf msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\spacedeskDriverAndroidControl.inf msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\amd64\spacedeskKtmInput.sys msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskServiceTray.exe msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\spacedeskdisplay.cat msiexec.exe File created C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\amd64\spacedeskDriverAndroidControl.sys msiexec.exe -
Drops file in Windows directory 59 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\inf\oem4.inf DrvInst.exe File opened for modification C:\Windows\inf\oem8.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\MSID63C.tmp msiexec.exe File created C:\Windows\Installer\{1315C629-9D5B-4B6C-9FD4-7AE689B30A1F}\installerIcon.ico msiexec.exe File created C:\Windows\INF\oem1.PNF MSIC7EB.tmp File opened for modification C:\Windows\Installer\e59c3d3.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSIC7EB.tmp msiexec.exe File opened for modification C:\Windows\inf\oem7.inf DrvInst.exe File opened for modification C:\Windows\Installer\MSICC53.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log MSICC53.tmp File opened for modification C:\Windows\INF\setupapi.dev.log MSICF33.tmp File created C:\Windows\inf\oem8.inf DrvInst.exe File opened for modification C:\Windows\inf\oem6.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log MSID39B.tmp File opened for modification C:\Windows\Installer\MSID7C6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSIC993.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log MSID03E.tmp File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\Installer\{1315C629-9D5B-4B6C-9FD4-7AE689B30A1F}\ShortCutIcon.exe msiexec.exe File created C:\Windows\inf\oem7.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log MSID1B6.tmp File created C:\Windows\inf\oem9.inf DrvInst.exe File created C:\Windows\Installer\SourceHash{1315C629-9D5B-4B6C-9FD4-7AE689B30A1F} msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log MSIC993.tmp File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File created C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\inf\oem4.inf DrvInst.exe File opened for modification C:\Windows\Installer\MSID719.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICDCB.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\e59c3d5.msi msiexec.exe File created C:\Windows\INF\oem0.PNF MSIC7EB.tmp File opened for modification C:\Windows\Installer\MSIC8E6.tmp msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log MSICDCB.tmp File opened for modification C:\Windows\inf\oem9.inf DrvInst.exe File opened for modification C:\Windows\Installer\MSID1B6.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID6E9.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSIC569.tmp msiexec.exe File created C:\Windows\INF\oem2.PNF MSIC7EB.tmp File created C:\Windows\inf\oem6.inf DrvInst.exe File opened for modification C:\Windows\Installer\MSID03E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICF33.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSID39B.tmp msiexec.exe File created C:\Windows\Installer\e59c3d3.msi msiexec.exe File created C:\Windows\inf\oem5.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\inf\oem5.inf DrvInst.exe File opened for modification C:\Windows\Installer\{1315C629-9D5B-4B6C-9FD4-7AE689B30A1F}\installerIcon.ico msiexec.exe File created C:\Windows\Installer\{1315C629-9D5B-4B6C-9FD4-7AE689B30A1F}\ShortCutIcon.exe msiexec.exe -
Executes dropped EXE 17 IoCs
pid Process 4784 MSIC7EB.tmp 396 MSIC8E6.tmp 444 MSIC993.tmp 400 MSICC53.tmp 4772 MSICDCB.tmp 3720 MSICF33.tmp 1276 MSID03E.tmp 2216 MSID1B6.tmp 1188 MSID39B.tmp 416 MSID63C.tmp 4616 spacedeskService.exe 5044 spacedeskServiceTray.exe 4052 MSID6E9.tmp 3980 MSID719.tmp 2320 MSID7C6.tmp 4912 spacedeskConsole.exe 4724 spacedeskConsole.exe -
Loads dropped DLL 1 IoCs
pid Process 4548 MsiExec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 4724 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RUNDLL32.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spacedeskServiceTray.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 MSID03E.tmp Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID MSIC993.tmp Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs MSID1B6.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Service DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 MSIC993.tmp Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 MSID03E.tmp Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 MSICF33.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 MSID39B.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 MSID39B.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID MSICDCB.tmp Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs MSICF33.tmp Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID MSID03E.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\LowerFilters DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Service DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Phantom MSICDCB.tmp Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs MSICDCB.tmp Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom MSID03E.tmp Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs MSID03E.tmp Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\CompatibleIDs MSIC993.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs MSID39B.tmp Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom MSIC993.tmp Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs MSIC993.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom MSICF33.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Filters DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID MSID03E.tmp Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 MSIC993.tmp Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 MSID03E.tmp -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe -
Modifies registry class 23 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\926C5131B5D9C6B4F94DA76E983BA0F1\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\926C5131B5D9C6B4F94DA76E983BA0F1\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\926C5131B5D9C6B4F94DA76E983BA0F1 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\926C5131B5D9C6B4F94DA76E983BA0F1\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\926C5131B5D9C6B4F94DA76E983BA0F1\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\926C5131B5D9C6B4F94DA76E983BA0F1\ProductIcon = "C:\\Windows\\Installer\\{1315C629-9D5B-4B6C-9FD4-7AE689B30A1F}\\installerIcon.ico" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\B7D4CBC34A6B7014BBE966DEFF93900B msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\926C5131B5D9C6B4F94DA76E983BA0F1\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\926C5131B5D9C6B4F94DA76E983BA0F1\ProductFeature msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\926C5131B5D9C6B4F94DA76E983BA0F1\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\926C5131B5D9C6B4F94DA76E983BA0F1\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\926C5131B5D9C6B4F94DA76E983BA0F1\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\B7D4CBC34A6B7014BBE966DEFF93900B\926C5131B5D9C6B4F94DA76E983BA0F1 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\926C5131B5D9C6B4F94DA76E983BA0F1\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\926C5131B5D9C6B4F94DA76E983BA0F1\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\926C5131B5D9C6B4F94DA76E983BA0F1\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\926C5131B5D9C6B4F94DA76E983BA0F1\ProductName = "spacedesk Windows DRIVER" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\926C5131B5D9C6B4F94DA76E983BA0F1\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\926C5131B5D9C6B4F94DA76E983BA0F1\PackageCode = "F1E2619E391E0E8469BEE7C57647E2B8" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\926C5131B5D9C6B4F94DA76E983BA0F1\Version = "33619990" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\926C5131B5D9C6B4F94DA76E983BA0F1\SourceList\PackageName = "spacedesk_driver_Win_10_64_v2122.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\926C5131B5D9C6B4F94DA76E983BA0F1\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\926C5131B5D9C6B4F94DA76E983BA0F1 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 4084 msiexec.exe 4084 msiexec.exe 4784 MSIC7EB.tmp 4784 MSIC7EB.tmp 4912 spacedeskConsole.exe 4912 spacedeskConsole.exe 1836 powershell.exe 1836 powershell.exe 1836 powershell.exe 4760 powershell.exe 4760 powershell.exe 4760 powershell.exe 2388 powershell.exe 2388 powershell.exe 2388 powershell.exe 4724 spacedeskConsole.exe 4724 spacedeskConsole.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4724 msiexec.exe Token: SeIncreaseQuotaPrivilege 4724 msiexec.exe Token: SeSecurityPrivilege 4084 msiexec.exe Token: SeCreateTokenPrivilege 4724 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4724 msiexec.exe Token: SeLockMemoryPrivilege 4724 msiexec.exe Token: SeIncreaseQuotaPrivilege 4724 msiexec.exe Token: SeMachineAccountPrivilege 4724 msiexec.exe Token: SeTcbPrivilege 4724 msiexec.exe Token: SeSecurityPrivilege 4724 msiexec.exe Token: SeTakeOwnershipPrivilege 4724 msiexec.exe Token: SeLoadDriverPrivilege 4724 msiexec.exe Token: SeSystemProfilePrivilege 4724 msiexec.exe Token: SeSystemtimePrivilege 4724 msiexec.exe Token: SeProfSingleProcessPrivilege 4724 msiexec.exe Token: SeIncBasePriorityPrivilege 4724 msiexec.exe Token: SeCreatePagefilePrivilege 4724 msiexec.exe Token: SeCreatePermanentPrivilege 4724 msiexec.exe Token: SeBackupPrivilege 4724 msiexec.exe Token: SeRestorePrivilege 4724 msiexec.exe Token: SeShutdownPrivilege 4724 msiexec.exe Token: SeDebugPrivilege 4724 msiexec.exe Token: SeAuditPrivilege 4724 msiexec.exe Token: SeSystemEnvironmentPrivilege 4724 msiexec.exe Token: SeChangeNotifyPrivilege 4724 msiexec.exe Token: SeRemoteShutdownPrivilege 4724 msiexec.exe Token: SeUndockPrivilege 4724 msiexec.exe Token: SeSyncAgentPrivilege 4724 msiexec.exe Token: SeEnableDelegationPrivilege 4724 msiexec.exe Token: SeManageVolumePrivilege 4724 msiexec.exe Token: SeImpersonatePrivilege 4724 msiexec.exe Token: SeCreateGlobalPrivilege 4724 msiexec.exe Token: SeCreateTokenPrivilege 4724 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4724 msiexec.exe Token: SeLockMemoryPrivilege 4724 msiexec.exe Token: SeIncreaseQuotaPrivilege 4724 msiexec.exe Token: SeMachineAccountPrivilege 4724 msiexec.exe Token: SeTcbPrivilege 4724 msiexec.exe Token: SeSecurityPrivilege 4724 msiexec.exe Token: SeTakeOwnershipPrivilege 4724 msiexec.exe Token: SeLoadDriverPrivilege 4724 msiexec.exe Token: SeSystemProfilePrivilege 4724 msiexec.exe Token: SeSystemtimePrivilege 4724 msiexec.exe Token: SeProfSingleProcessPrivilege 4724 msiexec.exe Token: SeIncBasePriorityPrivilege 4724 msiexec.exe Token: SeCreatePagefilePrivilege 4724 msiexec.exe Token: SeCreatePermanentPrivilege 4724 msiexec.exe Token: SeBackupPrivilege 4724 msiexec.exe Token: SeRestorePrivilege 4724 msiexec.exe Token: SeShutdownPrivilege 4724 msiexec.exe Token: SeDebugPrivilege 4724 msiexec.exe Token: SeAuditPrivilege 4724 msiexec.exe Token: SeSystemEnvironmentPrivilege 4724 msiexec.exe Token: SeChangeNotifyPrivilege 4724 msiexec.exe Token: SeRemoteShutdownPrivilege 4724 msiexec.exe Token: SeUndockPrivilege 4724 msiexec.exe Token: SeSyncAgentPrivilege 4724 msiexec.exe Token: SeEnableDelegationPrivilege 4724 msiexec.exe Token: SeManageVolumePrivilege 4724 msiexec.exe Token: SeImpersonatePrivilege 4724 msiexec.exe Token: SeCreateGlobalPrivilege 4724 msiexec.exe Token: SeCreateTokenPrivilege 4724 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4724 msiexec.exe Token: SeLockMemoryPrivilege 4724 msiexec.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4724 msiexec.exe 5044 spacedeskServiceTray.exe 5044 spacedeskServiceTray.exe 4724 msiexec.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 5044 spacedeskServiceTray.exe 5044 spacedeskServiceTray.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4084 wrote to memory of 4548 4084 msiexec.exe 91 PID 4084 wrote to memory of 4548 4084 msiexec.exe 91 PID 4084 wrote to memory of 4548 4084 msiexec.exe 91 PID 4084 wrote to memory of 1216 4084 msiexec.exe 97 PID 4084 wrote to memory of 1216 4084 msiexec.exe 97 PID 4084 wrote to memory of 4784 4084 msiexec.exe 99 PID 4084 wrote to memory of 4784 4084 msiexec.exe 99 PID 4084 wrote to memory of 396 4084 msiexec.exe 100 PID 4084 wrote to memory of 396 4084 msiexec.exe 100 PID 4084 wrote to memory of 444 4084 msiexec.exe 101 PID 4084 wrote to memory of 444 4084 msiexec.exe 101 PID 4404 wrote to memory of 4656 4404 svchost.exe 103 PID 4404 wrote to memory of 4656 4404 svchost.exe 103 PID 4404 wrote to memory of 2036 4404 svchost.exe 104 PID 4404 wrote to memory of 2036 4404 svchost.exe 104 PID 4084 wrote to memory of 400 4084 msiexec.exe 105 PID 4084 wrote to memory of 400 4084 msiexec.exe 105 PID 4404 wrote to memory of 896 4404 svchost.exe 106 PID 4404 wrote to memory of 896 4404 svchost.exe 106 PID 4084 wrote to memory of 4772 4084 msiexec.exe 107 PID 4084 wrote to memory of 4772 4084 msiexec.exe 107 PID 4404 wrote to memory of 1600 4404 svchost.exe 108 PID 4404 wrote to memory of 1600 4404 svchost.exe 108 PID 4084 wrote to memory of 3720 4084 msiexec.exe 109 PID 4084 wrote to memory of 3720 4084 msiexec.exe 109 PID 4404 wrote to memory of 3944 4404 svchost.exe 110 PID 4404 wrote to memory of 3944 4404 svchost.exe 110 PID 4084 wrote to memory of 1276 4084 msiexec.exe 111 PID 4084 wrote to memory of 1276 4084 msiexec.exe 111 PID 4404 wrote to memory of 4312 4404 svchost.exe 112 PID 4404 wrote to memory of 4312 4404 svchost.exe 112 PID 4084 wrote to memory of 2216 4084 msiexec.exe 113 PID 4084 wrote to memory of 2216 4084 msiexec.exe 113 PID 4404 wrote to memory of 4904 4404 svchost.exe 114 PID 4404 wrote to memory of 4904 4404 svchost.exe 114 PID 4084 wrote to memory of 1188 4084 msiexec.exe 115 PID 4084 wrote to memory of 1188 4084 msiexec.exe 115 PID 4404 wrote to memory of 4800 4404 svchost.exe 116 PID 4404 wrote to memory of 4800 4404 svchost.exe 116 PID 4404 wrote to memory of 3004 4404 svchost.exe 117 PID 4404 wrote to memory of 3004 4404 svchost.exe 117 PID 4084 wrote to memory of 416 4084 msiexec.exe 118 PID 4084 wrote to memory of 416 4084 msiexec.exe 118 PID 4616 wrote to memory of 5044 4616 spacedeskService.exe 120 PID 4616 wrote to memory of 5044 4616 spacedeskService.exe 120 PID 4616 wrote to memory of 5044 4616 spacedeskService.exe 120 PID 4084 wrote to memory of 4052 4084 msiexec.exe 121 PID 4084 wrote to memory of 4052 4084 msiexec.exe 121 PID 4084 wrote to memory of 3980 4084 msiexec.exe 122 PID 4084 wrote to memory of 3980 4084 msiexec.exe 122 PID 4084 wrote to memory of 2320 4084 msiexec.exe 123 PID 4084 wrote to memory of 2320 4084 msiexec.exe 123 PID 5044 wrote to memory of 4912 5044 spacedeskServiceTray.exe 125 PID 5044 wrote to memory of 4912 5044 spacedeskServiceTray.exe 125 PID 4912 wrote to memory of 1836 4912 spacedeskConsole.exe 126 PID 4912 wrote to memory of 1836 4912 spacedeskConsole.exe 126 PID 4912 wrote to memory of 4760 4912 spacedeskConsole.exe 128 PID 4912 wrote to memory of 4760 4912 spacedeskConsole.exe 128 PID 4912 wrote to memory of 2388 4912 spacedeskConsole.exe 132 PID 4912 wrote to memory of 2388 4912 spacedeskConsole.exe 132 PID 5044 wrote to memory of 4724 5044 spacedeskServiceTray.exe 134 PID 5044 wrote to memory of 4724 5044 spacedeskServiceTray.exe 134 PID 5044 wrote to memory of 2308 5044 spacedeskServiceTray.exe 135 PID 5044 wrote to memory of 2308 5044 spacedeskServiceTray.exe 135 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\spacedesk_driver_Win_10_64_v2122.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4724
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding DAD3749DE5F68717F3065DFBB02A78BC C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4548
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:1216
-
-
C:\Windows\Installer\MSIC7EB.tmp"C:\Windows\Installer\MSIC7EB.tmp" -preInstallCheck_W102⤵
- Drops file in Windows directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4784
-
-
C:\Windows\Installer\MSIC8E6.tmp"C:\Windows\Installer\MSIC8E6.tmp" -qWaveCheck2⤵
- Executes dropped EXE
PID:396
-
-
C:\Windows\Installer\MSIC993.tmp"C:\Windows\Installer\MSIC993.tmp" -install_android_control,C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\2⤵
- Drops file in Windows directory
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:444
-
-
C:\Windows\Installer\MSICC53.tmp"C:\Windows\Installer\MSICC53.tmp" -install_android_usb,C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\2⤵
- Drops file in Windows directory
- Executes dropped EXE
PID:400
-
-
C:\Windows\Installer\MSICDCB.tmp"C:\Windows\Installer\MSICDCB.tmp" -install_ktm,C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\2⤵
- Drops file in Windows directory
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:4772
-
-
C:\Windows\Installer\MSICF33.tmp"C:\Windows\Installer\MSICF33.tmp" -install_hid,C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\2⤵
- Drops file in Windows directory
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:3720
-
-
C:\Windows\Installer\MSID03E.tmp"C:\Windows\Installer\MSID03E.tmp" -install_iddcx,C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\,02⤵
- Drops file in Windows directory
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1276
-
-
C:\Windows\Installer\MSID1B6.tmp"C:\Windows\Installer\MSID1B6.tmp" -install_audio,C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\2⤵
- Drops file in Windows directory
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:2216
-
-
C:\Windows\Installer\MSID39B.tmp"C:\Windows\Installer\MSID39B.tmp" -install_bus,C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\2⤵
- Drops file in Windows directory
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1188
-
-
C:\Windows\Installer\MSID63C.tmp"C:\Windows\Installer\MSID63C.tmp" -install_server,C:\Program Files\datronicsoft\spacedesk\2⤵
- Executes dropped EXE
PID:416
-
-
C:\Windows\Installer\MSID6E9.tmp"C:\Windows\Installer\MSID6E9.tmp" -openFirewall,C:\Program Files\datronicsoft\spacedesk\2⤵
- Executes dropped EXE
PID:4052
-
-
C:\Windows\Installer\MSID719.tmp"C:\Windows\Installer\MSID719.tmp" -spacedeskProgramFilesDelete,C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\2⤵
- Executes dropped EXE
PID:3980
-
-
C:\Windows\Installer\MSID7C6.tmp"C:\Windows\Installer\MSID7C6.tmp" -otherFirewallCheck2⤵
- Executes dropped EXE
PID:2320
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:5060
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{84621e0f-fad5-ce4d-8f84-9ac98974dcf1}\spacedeskDriverAndroidControl.inf" "9" "44282f7e3" "0000000000000148" "WinSta0\Default" "0000000000000158" "208" "C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:4656
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "1" "ROOT\SPACEDESK_ANDROID_CONTROL\0000" "C:\Windows\System32\DriverStore\FileRepository\spacedeskdriverandroidcontrol.inf_amd64_c78e51cb686ef158\spacedeskdriverandroidcontrol.inf" "oem3.inf:*:*:1.0.452.9:ROOT\VID_DATRONICSOFT_PID_SPACEDESK_DRIVER_USB_ANDROID_0001," "44282f7e3" "0000000000000148"2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:2036
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "1" "C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\spacedeskDriverAndroidUsb.inf" "9" "4c4c2d17b" "000000000000015C" "WinSta0\Default" "0000000000000148" "208" "C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:896
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{da1478d6-81b3-5d47-a8c2-6c844a0bab9c}\spacedeskKtmInputmouse.inf" "9" "431da1b7b" "0000000000000148" "WinSta0\Default" "0000000000000160" "208" "C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:1600
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{dc2ee47a-f26b-4543-98ca-ded4eec082ed}\spacedeskDriverHid.inf" "9" "4427793e7" "0000000000000154" "WinSta0\Default" "000000000000015C" "208" "C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:3944
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{51b17a3d-39c1-1243-9839-0a45dc633543}\spacedeskdisplay.inf" "9" "442436977" "000000000000015C" "WinSta0\Default" "0000000000000164" "208" "C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:4312
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{e4348a7c-e7b9-c944-9f4e-836b0ebe846b}\spacedeskDriverAudio.inf" "9" "447268673" "0000000000000164" "WinSta0\Default" "0000000000000174" "208" "C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:4904
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{bdca03fa-971c-e14c-b159-3cfe9b3701be}\spacedeskDriverBus.inf" "9" "4522ade83" "0000000000000154" "WinSta0\Default" "0000000000000178" "208" "C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:4800
-
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "2" "1" "ROOT\SPACEDESK_VIRTUAL_BUS\0000" "C:\Windows\System32\DriverStore\FileRepository\spacedeskdriverbus.inf_amd64_97eac36ebcea4166\spacedeskdriverbus.inf" "oem9.inf:*:*:1.0.455.42:Root\VID_DATRONICSOFT_PID_SPACEDESK_VIRTUAL_BUS_0001," "4522ade83" "0000000000000154"2⤵
- Drops file in Drivers directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
PID:3004
-
-
C:\Program Files\datronicsoft\spacedesk\spacedeskService.exe"C:\Program Files\datronicsoft\spacedesk\spacedeskService.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Program Files\datronicsoft\spacedesk\spacedeskServiceTray.exeThis is spacedesk Service calling.2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Program Files\datronicsoft\spacedesk\spacedeskConsole.exe"C:\Program Files\datronicsoft\spacedesk\spacedeskConsole.exe"3⤵
- Drops file in System32 directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" /c Get-AppXPackage -Name AppleInc.iTunes > "C:\Users\Public\spAppxpackageinstalled.txt"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" /c Get-NetConnectionProfile > "C:\Users\Public\netconnectionprofile.txt"4⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:4760
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" /c Get-AppXPackage -Name AppleInc.AppleDevices > "C:\Users\Public\spAppxpackageinstalled.txt"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2388
-
-
-
C:\Program Files\datronicsoft\spacedesk\spacedeskConsole.exe"C:\Program Files\datronicsoft\spacedesk\spacedeskConsole.exe"3⤵
- Drops file in System32 directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4724
-
-
C:\Windows\SysWOW64\RUNDLL32.EXERUNDLL32.EXE SHELL32.DLL,Control_RunDLL desk.cpl,,33⤵
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe" ms-settings:display4⤵PID:3024
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2488
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:1404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD51d3bb51711277a6474dbae661fb9509d
SHA1e81735634fd7b04abbd1e6b0bbf57b258c24a476
SHA25664203023bb70d762384787793972dc32f152705a4daf4c9cc909cc5f75907695
SHA512055f39b6f88fd5f6dfee0d6f9a36a00e5a32a0f78ed968e9b3122d704893ebdfbf3b1eeb2b16b6472dac8ac5e3dfae6cb2d8363273a9a4ca5224c71d2d08f0ab
-
Filesize
136KB
MD561ca37c0f525639d335c072395db5583
SHA122c2144fac657311d596edf01633c4dcd44eb7f1
SHA256cd06c9a3499a6a0c39d247ca2f762016c07f4f424a53917dec06819a0d489803
SHA51285d1314a02e987977f8e377f44d33a32161a0bef81d5875e60f9bbf621c01c72bb736036a5b59c7d3b8040c8bc867986f029cd3514a6407fc44700ee81e9760e
-
Filesize
136KB
MD5e7162bda03b7d309f5e45699cf126446
SHA1802dc50367b678c858d7f6a8cb859f80947098e7
SHA256250888b00cd42b3f16bd1f9296e591d4435a5973319878afae4515a98222a7cb
SHA512d5f7c4c0a23e8946a664c9db049e8aa1effdda496cf3533fdf5671c77649fca17f30f8478697caa852c6a2fec5d423cd75c9206953c885416b5204c4980c4360
-
Filesize
51KB
MD53c4582ccc12d41c6ddcb8bebc3ffb62e
SHA1799a3809b91768d081b994ae1e98fa548275de71
SHA256d7c80666182b9e9418f24dac56f05dfe53bd28d37f7764572e2bc325d96054fa
SHA512abd3265fc3e5c16167befe800d755678e2d4ac3008ae03c51f1c251a23e250be9bd72e05f1d10727edcd0334eed6c3f4ba76852a37a9d47fb93c9a97854dbb9d
-
Filesize
42KB
MD5242f5cd519d0497129c9d8ca22e127eb
SHA11854b58cca948918f8e26864e727318482675e7f
SHA25646585160227ef5c164a7005693ff0927f3048bbc57309f0061aaa5bca0e83038
SHA5121f24b08e8c3c274638620ff6cb2de753fa56bf9c70adbb15ebe20ab0a09149d28be402795588c537c97075b3f5f960d0486e0df678f45875eb845ab9fdcc4e36
-
Filesize
97KB
MD55095a2b55a1b7831a558ab8990e9801b
SHA1bd157677e737b7238dee44d6405c4d6c36a5862d
SHA25680e4565cca358710288c7bbc6a3287cbc03e61cf682eeadeb30d72e24b417224
SHA512c5a6f1a81722297ca745cdd9bd74d86daf8d75f6bc5156f24d6647eeece0cdb0c00c0c77cfc75bb4d553a449e36ca1da77dbebf2d3ffc6b457d42ac00cda019a
-
Filesize
41KB
MD5fad80e5e02e03e48609c852a489f6cd3
SHA1b711d9025e0b6f6567d1407d65d7f67daca292a5
SHA256398582f8456f404653129df83d04b40f85c6b61cf213c86b75766cf77d323386
SHA512fcc2bac894faae66c28168775bb97d75a708443bb4000c64e74ca21a3c357215f6a7bd626bbdbc090e6a55eec707de2faa7e7631129d3d4ed196fc6804033c06
-
Filesize
13KB
MD50ec09de9e91d4756f1a77a978a2722a7
SHA17ceb26ff0728b0c06ce3736af7d3e5896185ef0b
SHA256b97ec9c0cdb7374929cdafd4d40f441fa6423fce9d7a2d70c2cbc2ad8e00ba2b
SHA512b81e20ae2c6bcdef995b9442c3f9dd5e5f8d000eaabba984adbf5aaf755d7922e5e54a5137409445c96f0dba69773c5305533b9c979931712f5cd2bb93bec03e
-
Filesize
12KB
MD571832827d1b1780b3151c6c1a75dace0
SHA1dca0d64d9cc14d31c52d4cbf45653796ed935373
SHA2566d638c3d97337d40f9d7863913e1bd588064a697475ddb43949d4924d4364835
SHA512cf99c7314dc16abb13d7cbb948654be6b70a0e9baeebece5bb887362f0f2ddfef3e165e578b11606ea9ecb63b1f24760787f464b96d38212cac8192809f203ba
-
Filesize
12KB
MD506d3d57965a43836abc68b7ea95d9f81
SHA12c3bebf703e6c8c79918ea6b2db9f35546fe5670
SHA25613cd508b1e6cd8ad6e13adef666e391ac1b1be627aceadc15e2335390885cfbf
SHA512799c15ad5e76363c96b5c5b0265fe0e9574ac30491acec5e8c323dd4a416b4c82ff28652227ca353904cb00e84f4e2865122e5356047c00585c1f59aef0f0e8a
-
Filesize
12KB
MD5b6264f45c48cf007079dab66a0817025
SHA1033f03ff29eebe1ca7fca1112fa5c1bf1358e00d
SHA256c90188d91977544ea6bb213d6b7b648a313a8b751b41799b6b9ef89d661b9567
SHA512f35e78482c98f6400063ab09621fe856634caa46513dfec84924f7415c2b132faac097b9ec433ed390e72c86c897048d3deb0af4d9e814b7405363b1baa58c97
-
Filesize
12KB
MD542a4ed6e6b94e1b74e9c5538ea3af0b4
SHA1b394e9f6c9cde7985a86c87ab2823641f32c8eea
SHA2566d363492a43aa06bf2e5ee919c3a1d4cdd4de1ae6eca0c6d94cedd0490d1e530
SHA5125d9620a8f7c6b7033ead1e99ef74976c6fec066d56e5ba51abfbb616b93c970e73961aae8511656779a36d6c799363f1cf57eec889bb06223077a304a9f8848a
-
Filesize
15KB
MD5710ee13c1f6ba72e25414ee4bff1e993
SHA150993cf17f397fe7f8b06df7af50b750781b76da
SHA25634ffd8509dc23002d2d1dd9c1fef27ae8cd14bac5a99db73d427314c46c5ae8c
SHA5124034b3eb2c2b03ba05f7215eba863c87a87f79389d55a3ac481b87256c21af2938d08d4549d089264e06e44e5d56eea21e1167331db32f4c602823487bd0c721
-
C:\Program Files\datronicsoft\spacedesk\spacedeskTemporarySetupFiles\spacedeskDriverAndroidControl.inf
Filesize3KB
MD5b53adfc1d7f2a50f2964aefb0319ec28
SHA1e3d1e97cc0c1e3654ead6a79b0cbb45daf415c00
SHA25697238c12c44025580e4393f0b4e9f0d7e08d85f4b4496fd905e3cd99501b9a0b
SHA51287f7886d85eba57c8546669bc1d3e72563e7cbb3bd65948d2274866dc3a451512dcd8c389e9117286e2e1bf5141d2a8ea67677d6872d5485e507611d7b8d03eb
-
Filesize
4KB
MD5a72d5e569094dedbeb0527254d90ff7b
SHA11199188d064d3bc8e4569a5793aba4a6e362e4c1
SHA256cb73077aea0dbc48d46fbf270578654b3fff83d5c017d89f1a6ffe5d168b2cc5
SHA5127b5a3a597823348c23d7a230dcd86c1aee9d19223869d3d4d74bd60f44881b0fd5ae6d27e9c1952952eee3a8845c3ed424c1a10d09750f423ce6e9e9766a8bb7
-
Filesize
20KB
MD523e653a98b3ebfb5a474a30c0fb7f770
SHA18e9f5b638451379a5706df066e11657c484ae160
SHA2566f1ea7acb6c668695d64cfe3d4323eaa6e997702b9ccb588e32d8e8156c5ed4b
SHA51216d8acc399c92e94066b2e14a64e468363fb3e47e13b9cbe9da033ba085cf7054b8db57457ba1e1b437f0c5239a12e21a23070fce6bab9035d1f25f546f3c9b6
-
Filesize
6KB
MD57ededd3c7eab082b9ddc718b7db642e6
SHA153be30a1f2892ef54bbee533aad022cdb3b32d55
SHA256a99a951bd2ef1362f5d2700fb5c2f326ed3def7a31824718d46bb802b83a07c0
SHA512ff50e4a65bfd26e482367b620c13150c9bb0d95661627e0cd8494980d0ed0bee26586feffd5c7871527999d3c1356ad85119ddc66bcb0503890576264146adcf
-
Filesize
2KB
MD5c8e701ea27a2a1d0abc8bfa99509c5c4
SHA1b3bd4debbd0ae0499a9da6867c83014f7328753d
SHA256bfd53b3c4e0bbbda52a631f882eafb946d62c50ae6f8df0f446984b64eb5b474
SHA5127dcc00c31c952d84858c34354214f738f58e1d20698a2f33ba5692b6ceda41e0dec78923739427392cbe14c7114dc73a0d89429727661b86fab21a260a335bef
-
Filesize
4KB
MD51a26d9000f4f98b8709d0745d11974d0
SHA1bf17ca852de9a0a2266366919af8f1037a0505c7
SHA256d23f24c69153f4ee1aec3b1d05f205eee71d39c6af8705432b6b23534b17bc9f
SHA5123be8687f4917d3b24b3d99fea1c0c1c3c6a5f9dbc97719cf1a22940d7b1811f4397814fda6a7fac3a89b4b2fcbcffe5d71eb4c0c9a32a00444c58ab86899773f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
Filesize471B
MD566c5789a95e11f7e48ee7c7aa494e081
SHA1b590f30510690030aaf7a8e979223f1783f175cf
SHA256ab2891d4e0867a968da5fd8803fa3f23235bc12260612301cc121725f1100207
SHA512d5ab41515086bcb0fd1ee9dadb43c2b74c8ecc7e6f38671320438afb8d8cebd32d8740159f3203fea40998436c37bba840afa781f9b36c7135d701618270c09c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_15A751EAC52E3BDD7E5151D6C1F63C61
Filesize727B
MD595bb1968b0d42948e5ac25beb7491688
SHA11153020bfe4db3ae932ca6d267f0ea882c5052ac
SHA256a773e37d275469ffd4dc9da02a8384ae020ffdaf44e61f770866a2868eaa4791
SHA5121d59357cd0e1e3df44d572105423f0f9ec7321d72a8164c7a990cc13547b3b8d3ef3b355c812f22d369ee06db84222e6be847b8d835fe84406517fbb880dd5cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
Filesize727B
MD52f149ff2949173cc82d27f2dbd226f84
SHA1454829da9fdc5e864b04bc4891d827bc4345a7e2
SHA256555d04832624cbe78ac96f5b93deb72f41b271b93b4b6807d03aa64e255afa3f
SHA5127d7ee697ba51df5ae45e53c444bf54aa0c4561c0f44c265e941cf060f226a5aac6fa79f6df6d5a73e007c4ccfd1e19d2c2043dfb980478e7491ecf80f8ea9706
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
Filesize400B
MD5e66d05a6a5811213c4275387884d0525
SHA1bf19695231b628d5e3e481db038d54ca8bdfbfc9
SHA256903692e344feb353657361f9a9770beb61e7400c0f1e78763643deb6e4e64542
SHA5127f639fa6091c18bfe1a4f8a68a974e3b454c68b482cb510253209ed8f89251a2e99b21945bf542003636b2caba1311a6470289f9b9924570d306dd76e7f946d8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_15A751EAC52E3BDD7E5151D6C1F63C61
Filesize408B
MD57585699c35737bbd00bbdd850d6bc7a4
SHA19c6bd23e8a6004bc5a6717114f9b40673dafce40
SHA2563b63a08f24d4b9cf64e4af68673f4ee3c9b7a73a815ad011052eef8ee3a691c3
SHA5120a6d0cb5349f8dd5102099d4c3ac6e9a7cab5dfe563ebbc6c1ce97575a726ccf1959914afc4fc26d164e86db13c1d0ede33709443fa3ced8832c3d1bf7d5657c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
Filesize412B
MD5927283931f6517972afed8a2d8ca876d
SHA186ea47d13dcfe75b06aad91a7770a0cb891ba4cc
SHA256565a628423fde8084a0c62c0d60c480be142f582277d11d345f5e26b5230f7fc
SHA51211722a6ac32933092c39ae8ba450e98c2ed02f41be96573bd50cc18e039909d49a58ab227326ec39c869379e09675af1ad5791e6feebb12799215145c14102ea
-
Filesize
113KB
MD54fdd16752561cf585fed1506914d73e0
SHA1f00023b9ae3c8ce5b7bb92f25011eaebe6f9d424
SHA256aecd2d2fe766f6d439acc2bbf1346930ecc535012cf5ad7b3273d2875237b7e7
SHA5123695e7eb1e35ec959243a91ab5b4454eb59aeef0f2699aa5de8e03de8fbb89f756a89130526da5c08815408cb700284a17936522ad2cad594c3e6e9d18a3f600
-
Filesize
9KB
MD51f8f88c23861d9ab00d7f5f35d24a38f
SHA198931a031431e1c7a162dae55cf0a269a7cd1a33
SHA256432ef2d6945812a00ee955b207df6de0b4485f58445b76ad8b9cab8e3e8d8331
SHA51214ec9fce96997405f4bfa60cde53030617a214c4a0b06365c5a682a27fd21716be9092c85c0c8fcf7910101c1fae052771c6f6ceec8810bb5818fbeba176b9d3
-
Filesize
10KB
MD594f48f62100ebef0cc292017a6a0b910
SHA138a60d9367234de9c30aa12eeb6720c43fff7700
SHA25655fa67db91cabb6f3e30fb63baf69986881e5ceeb597ff714e49b553bf915e81
SHA5126a27cc8b0d030e174fe770892f2b8344aa4df0db62295c856ce00e4a53e0c0ef58cd78370cbd3681771d4705484cf840eb43d45513e18f64cdbbbc37dabd6105
-
Filesize
11KB
MD566b144ee8b95f7a483e32f768414712d
SHA1881ba208a5c42366418ca0401c9fc54cf05701b5
SHA256cbfa39ff4033a6c2bd7426d088b47ce3fb1c16d272bb394cbeb6d7474d737b57
SHA5124ea24a96e0dd58544420aab519dbdee68ac7bf3adf58bd4729f4e6627e5617dd85930deb22f2a1a96a049155890c36ce18926663b5badf9a8d51183dcb5f8bb7
-
Filesize
11KB
MD5b4346f6b4fc8bd3af62b3dff1901e4d1
SHA14214da6ebc035f9a10700584952a5d1009bd7441
SHA2565a583d299a90ea88403dedbd3abafe37fbdc50b4f746c913ff160945675b4218
SHA5125bf6ed423cac0dcad144e31826dd6cedc39ef496c746f1ae3d003abe06caa3255180a8e1b0d8ae8749f8b1c4f945cc1f11a1ddee8c9a8b4c8ae2f1eb1f5111dd
-
Filesize
12KB
MD5e4e22f4d7759f8ca759e69adf64398ed
SHA1c15039932e9a49c1e0a28aab7e8fa1d69d47b07f
SHA2561bbac70b5700fc205e03445e351b4ccc6b3f20f21ebbc9c401bfdba4148a07f8
SHA51284aaa29ac4901426f4723ab4f428b3567b436ce1f988e204d8e87b077c03ffab4091aec94c17852de736fdb259f32740af22d7d442df2d0ba2177f820836bf8e
-
Filesize
12KB
MD51da6cd7d4f99da0f10e4b7db87c816fc
SHA151b91153e52242ab02573f4ed99ee41de7c78533
SHA25611af88c5292dfe313736e8b4333620a7db0a2851229029e91ad08ade606facf2
SHA5120a0ffbea722e7077c592a7b26fa2e6b9780ce6b40770aa36d709ca9eb98b0b9163745ab6f411f894b516beb7ef618c1033c10ec3001fdbf4ad91a6949c678a7c
-
Filesize
567B
MD5521501de7d2b4ac844ea535f4216dbac
SHA1e56e35f707afb48f0b3048b3f72540f23bf07ea5
SHA2569118ca009079d24a75da3ff17b827f3784b38fbe924d14b15a846bff5a4eb852
SHA5127dff86a07de5066be32a34b0e93eec5264347078c243bc30f7fff4b6b9bc81d0804aa5389aa35d350d229d1293ed2b62bde3706a17fcc50af0701eac9515a994
-
Filesize
13KB
MD5df0e25e5ecb247dbde0f76aea4cec9f0
SHA136d887ac03a145c10b36c750167eefb6c7cb95d6
SHA2563f045b06cd54dd9e7757a43e2757ef3b2732b1fd603c9644173cf2ebba0bd00d
SHA51210b3e5f30ae1cd686e10d73c2c46947c66c678dfd6a106053e8d94f0883c08b36fcf3231ddab9a828d41231a4b1966045a5904de01c5d926f5331db40a2a9ccf
-
Filesize
1KB
MD581a6aa236970daf112b8327477724b89
SHA12c8e4d92572d0f93a7ccba1b90cc0b324be4dd3a
SHA2568fcde6ec8269334e6485a7bef7f0858c6f15b8642bb55adab5d1870aa44c0592
SHA5125e5b75e669f139028b02cb5376eae4ff1a7f6f1fbea72a450905820b282fe1a90e48d08390435bbab9486a915dbbe83b0275455b5de3a0f0cff751de5c23b735
-
Filesize
5KB
MD5658be0685e93397243204b1e7af628ca
SHA1dcd9ca469813675b6ff2c1c4a2d544c69e95eafb
SHA256de2a679429d759b82126833110c45b955c9293e5bfe8790d57d04b5d0c421999
SHA5122438a6ae8bdba573732437f1e53f2c554d5382e1585080d5a62b434a145fbc86048530dae56d9e296c05983ed8da00f8ad76f76caa188f0d82cb599dbc943e42
-
Filesize
636B
MD509dc1faa2be8ccf3ad7e2d24259b00b7
SHA124cbd5d2ff77ffc50f22729118d5922ec98699ad
SHA256b57f5a4dcda2eebe0a80effeb7c0af7546875ba0cfae7d42fa52e7079b218964
SHA51221111dfbb31535a1c35f947e64d9c540efddec3a15721025442349bf1d694d0955645c9992ced27c4236bf87e1a66e9f44b68326d78b2c579f8ceb436a075378
-
Filesize
5KB
MD5bb4d4b6edf7dc24757693af92c6ead50
SHA1c3c71f1e62c9ee0da5aebe512351f3a3575ae2c1
SHA2568f38420ba7b61653cbcf0c80a9039525c4da1c15ce8c6af0fcbadc6631b37752
SHA512c550f377805f46ab8bb7525a30acf2b87f769dd4125fbff409a2703ddf64e5fa26a697c368791b4e6ff2d7491431e9ba4e7f965bb45cc75df04d8ddcd6d33169
-
Filesize
5KB
MD55e8728cc257b8064238be61acef4dd0b
SHA17336d0df5ef1307db7dea6f2800e9bf3a17597a1
SHA256989a2f2b7c4b29fc335433d12fdcbd61cab5d1b612ba8a40d44891c522111362
SHA5125e0762d55950d6238eaad16bc1307af7f42a50a4adc77daabfbf266e3f2424443026050e5fd9f30d79f25831787f27bcf1f9fec5c929ea7adab31629f55e711a
-
Filesize
6KB
MD50329b7705dfe228ebb37b72568d75999
SHA14183281161529b3bbe89fabbda78b9cda721dad0
SHA256f6fc252ec44df4d55654e589d67f369bee13c08c3c0b319f02a97134512888d4
SHA512b0a8ea3977c00906f916fd1b5de55d71c1dc6b5bec2ed70a1d5a2767ad486f248171046dbe70dab41869aec2be6742623611a473ef95476d73c8da1f83bb7b31
-
Filesize
520KB
MD52b201e0b41023ab27e222248dce7b5ae
SHA1fbddd3f35309a6396db5ddb1b551ff15a992e978
SHA256df9b26ad3d9064261ca7bcbc7de620c1eea51561c15becc1fe2162bde3c997cb
SHA512fe84d561e4886c6d646982ed29da174277bd2f2e153f0cc85def3ce2426e349bec6c5d4daffe2930d0d4f1321f0969b6f4cdb918819c0e9086cb883c1f6a8bc8
-
Filesize
4.7MB
MD565f5f179e3da0dbfbd6b35cda7af3e0a
SHA12569f9f147e989d5e0a766b80e18a64f44b531f7
SHA256049cad32f63e51a5c7755fe00d6cda2dc70bee89640d821ff3760cc42bad2499
SHA512810e97256811b409dffd063d91dc2d10ae7573ea2b76d6b1854f522b8bb5ba812f1b8a8a35d219f4e56c0e8e94a0724f577b9e5e474b5de382a401a1d590225b
-
Filesize
19KB
MD590ce281a3c2adc9631bacd23b9cd114f
SHA1db969411f2bc2becea06de8bc41dbf076fa7f2c9
SHA25653f395eafc65a76462308b8a9d72f153512a76f945862407633c770bc28175b0
SHA512697d12b8ad7c410a5628ae3255327ce2a175f90bdf27d0d083e4049295497082f029d72825604c2abf2403ce0926b0afd609e437e8e26fb580576109296f062b
-
Filesize
19KB
MD5d8f72f13ec414862e3467ed9c69a2656
SHA167462e31b9a44b087e038301d41a1d93262476ea
SHA256bc293c4afaad6cea2ebb0ad62a0ed96c042bb312aab7e849ce1fdf08f2168699
SHA512f8e6ef11bf8c5b8671cd3313addeed82b43e6e9f4b3814a40a61587ae75166b772cf6e89301447ac6b06fb5c15113552590422a1148c5e996a26239c82881fcf
-
Filesize
19KB
MD55f352d428f7aa580816b7bb6b4b932df
SHA16807bf117aef1be6bb17794ddd7805c6748267e0
SHA25651a570208d83d692796e0e38c17053772ae43e89b5e37e7d3fea3c0c788a60b2
SHA5122d49a61a231f65a497aebeefc2ca5eabdd694d20310a41ce9d744ec13271893eb73843a57b40bced4fd4e812edea07747c216183d0176dcdd3a21a12f49f5a48
-
Filesize
135KB
MD5330c31805c9e2f8b594f79b7d8c63cd7
SHA1af865cda469126d0f7208f92d8e5dd30331810d1
SHA256ff09c098f44679fc668a10a837ca9de8f57d986c26bdec73513c7df58b06b800
SHA512e23d5a1f1fbf75e5565dcf91555a025fb416bcee739b1c83d56c3f015668971b6422673ece28f2f4086b66d3bf1dbe3c00629cd2514c44459793581d03c1bbe2
-
Filesize
12KB
MD5f7cc07b6573930b73a5fbc6c34e29776
SHA1e1c5f999fc425320b2146d897c2d6beaa5d5960d
SHA2561ec01584f1f3d528689586b993e57adda75d5ace39babadab16a04041a0b0911
SHA512f48ea1d654dcea636269ba70f05d451909b102d9bc2f9b9506df0397b5f003711682fab1a0894e9ee649b07272b9f5992c1289e9d614326d07fb9e5813f818ee
-
Filesize
2KB
MD536764c342eacfc70e7861996ca2c4087
SHA19e877386d71118a1ef7f87a27b45558381d15bc9
SHA2565daba34d40face26ff8c742111a677993cf291f7df4a93daae13d022f9074bf2
SHA5128eb2af59cb1720d9cd3b25578a0b30db64ca46e0a546acf5f8eb05c562390ddb05e7be79dc4d08e2142e4b94e0240eb47a97a5e8bdc9d23a34f11e8a42d06867
-
Filesize
111KB
MD5acad54323537d3721edba7441f1982ed
SHA1c87c646d45b9a8ca25947c6b7098d967f2ef70ad
SHA25616688a5329af55f8410b09d802cb19ed079385e97ae64b34183e36cd3db2a1f3
SHA512a05e3d7d3897e2768f5bf160d860bd34f6f041f614e8d19c4a8047cdc43a477ba934304ed419d5ef43829a09bba9cb9e51a2b57b3c578af5df4eeee79f61a847
-
Filesize
19KB
MD577b8a3a4694d424be7a95c870a234cb4
SHA157d64fa94e943e0a112bbc84c3911d89369ccaf5
SHA2561e9df487a0b6d315fec76097411121340c6f8b2509adb7b0ced18d97bdb56a6a
SHA51231ce8cd86907e10e3625cd120de5949cc3c67d05e7bc013ddfac0b703799dd3a4026dffefd7246a97fc41c952c777e186735a74be6d211c57131825dbaf973e6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82