![]() While I was looking through files trying to find which might contain these paths, Francisco Falcon provided the answer. Several people on Twitter commented that this was part of Windows Application Compatibility. I’m wondering if anyone has seen this before, or knows what could be doing this. No matter where I tried these following steps from, I would see 100s of these requests to read files on the share. Finally, I tried from a freshly built VM (I’ve also tried on existing VMs and on a physical machine, though not on a freshly installed physical machine). I thought it was maybe AV or some other product, but after disabling everything, they were still occurring. Through more testing, it appeared the client was making these requests. When it was investigated, the files didn’t exist on the server at all and apparently never had. Some odd files were seen being accessed on a server share. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |