Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

27/03/2024, 15:17

240327-sn4edsab21 8

27/03/2024, 15:01

240327-sec6vaef54 8

27/03/2024, 15:00

240327-sdj8rsef32 3

Analysis

  • max time kernel
    1144s
  • max time network
    1193s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240214-en
  • resource tags

    arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    27/03/2024, 15:17

General

  • Target

    SSA-taxID-351788.exe

  • Size

    84KB

  • MD5

    6fbb5177c1783b1a798b116887307962

  • SHA1

    e77ad960baea0c7c882ba91ddcc5848a479e91c2

  • SHA256

    4443b89e20c8ad7df0158ebeb2bb0266951ea1885aec2a1f8e7011ba275a1682

  • SHA512

    a64684c80c7d9840375f05eb491dacc2685ed02a6612f3f5fc4f3bdaeb6da774da65fb0a550ef2343511bd58e2f0105d468f9454c4fa44512116c34858217a85

  • SSDEEP

    1536:+azWlKzJVcNp++yQNS6xNNCT2l8NE8llbpTaCJRpsWr6cdaQTJSvYYS7Q8xm:yFNpo6rIKlUE8fbkqRfbaQlaYYSm

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Manipulates Digital Signatures 1 TTPs 4 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 16 IoCs
  • Drops file in System32 directory 3 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: AddClipboardFormatListener 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SSA-taxID-351788.exe
    "C:\Users\Admin\AppData\Local\Temp\SSA-taxID-351788.exe"
    1⤵
    • Manipulates Digital Signatures
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
      2⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4636
      • C:\Users\Admin\AppData\Local\Apps\2.0\HY3JQD3E.Y6X\VDHRKP5E.68T\scre..tion_25b0fbb6ef7eb094_0017.0009_f980a3533165990d\ScreenConnect.WindowsClient.exe
        "C:\Users\Admin\AppData\Local\Apps\2.0\HY3JQD3E.Y6X\VDHRKP5E.68T\scre..tion_25b0fbb6ef7eb094_0017.0009_f980a3533165990d\ScreenConnect.WindowsClient.exe"
        3⤵
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:3904
        • C:\Users\Admin\AppData\Local\Apps\2.0\HY3JQD3E.Y6X\VDHRKP5E.68T\scre..tion_25b0fbb6ef7eb094_0017.0009_f980a3533165990d\ScreenConnect.ClientService.exe
          "C:\Users\Admin\AppData\Local\Apps\2.0\HY3JQD3E.Y6X\VDHRKP5E.68T\scre..tion_25b0fbb6ef7eb094_0017.0009_f980a3533165990d\ScreenConnect.ClientService.exe" "?e=Support&y=Guest&h=instance-mguhbu-relay.screenconnect.com&p=443&s=56803b7a-ca34-4801-af8b-8afe3bdff8cd&k=BgIAAACkAABSU0ExAAgAAAEAAQDhx8OBj8FY8rB1VrDLChLP1LLvdBBljaauOrbEq6YeMiLKF8LA3tBnj7v%2bjnNSUoOgIYPdPVZVC89yNv4W6OHmtypYW6YajtDJo5zSReYHx%2fMVp1JeQxEyGWGVCcQaECUzy2npekQLBoCxF4skgFnbSweEO0PYHaDJL3LQ916%2fNkbdny3ByOho6jMuGHldl7DFDrdhGxxo91apGBvgTWZjjcLUCmmza2jEJqNDpgolf6%2fw6SGFOWJmoAo%2bHAL2HAr2bIEXc1TO55YYZu04meZuADpu3TP%2bZdwje%2bhzckgeVv7fnDETwzx84R41umbfOLsz1%2fBvfyca4Ps3ogcrRTS9&r=&i=Untitled%20Session" "1"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:3276
  • C:\Users\Admin\AppData\Local\Apps\2.0\HY3JQD3E.Y6X\VDHRKP5E.68T\scre..tion_25b0fbb6ef7eb094_0017.0009_f980a3533165990d\ScreenConnect.ClientService.exe
    "C:\Users\Admin\AppData\Local\Apps\2.0\HY3JQD3E.Y6X\VDHRKP5E.68T\scre..tion_25b0fbb6ef7eb094_0017.0009_f980a3533165990d\ScreenConnect.ClientService.exe" "?e=Support&y=Guest&h=instance-mguhbu-relay.screenconnect.com&p=443&s=56803b7a-ca34-4801-af8b-8afe3bdff8cd&k=BgIAAACkAABSU0ExAAgAAAEAAQDhx8OBj8FY8rB1VrDLChLP1LLvdBBljaauOrbEq6YeMiLKF8LA3tBnj7v%2bjnNSUoOgIYPdPVZVC89yNv4W6OHmtypYW6YajtDJo5zSReYHx%2fMVp1JeQxEyGWGVCcQaECUzy2npekQLBoCxF4skgFnbSweEO0PYHaDJL3LQ916%2fNkbdny3ByOho6jMuGHldl7DFDrdhGxxo91apGBvgTWZjjcLUCmmza2jEJqNDpgolf6%2fw6SGFOWJmoAo%2bHAL2HAr2bIEXc1TO55YYZu04meZuADpu3TP%2bZdwje%2bhzckgeVv7fnDETwzx84R41umbfOLsz1%2fBvfyca4Ps3ogcrRTS9&r=&i=Untitled%20Session" "1"
    1⤵
    • Sets service image path in registry
    • Executes dropped EXE
    • Loads dropped DLL
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3772
    • C:\Users\Admin\AppData\Local\Apps\2.0\HY3JQD3E.Y6X\VDHRKP5E.68T\scre..tion_25b0fbb6ef7eb094_0017.0009_f980a3533165990d\ScreenConnect.WindowsClient.exe
      "C:\Users\Admin\AppData\Local\Apps\2.0\HY3JQD3E.Y6X\VDHRKP5E.68T\scre..tion_25b0fbb6ef7eb094_0017.0009_f980a3533165990d\ScreenConnect.WindowsClient.exe" "RunRole" "09e41274-4292-4096-a381-630aae1c9075" "User"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4052
    • C:\Users\Admin\AppData\Local\Apps\2.0\HY3JQD3E.Y6X\VDHRKP5E.68T\scre..tion_25b0fbb6ef7eb094_0017.0009_f980a3533165990d\ScreenConnect.WindowsClient.exe
      "C:\Users\Admin\AppData\Local\Apps\2.0\HY3JQD3E.Y6X\VDHRKP5E.68T\scre..tion_25b0fbb6ef7eb094_0017.0009_f980a3533165990d\ScreenConnect.WindowsClient.exe" "RunRole" "c1e8e834-e5d2-4fe7-aac8-9a4bb1b282ef" "System"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Checks processor information in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: AddClipboardFormatListener
      PID:2296
    • C:\Users\Admin\AppData\Local\Apps\2.0\HY3JQD3E.Y6X\VDHRKP5E.68T\scre..tion_25b0fbb6ef7eb094_0017.0009_f980a3533165990d\ScreenConnect.WindowsClient.exe
      "C:\Users\Admin\AppData\Local\Apps\2.0\HY3JQD3E.Y6X\VDHRKP5E.68T\scre..tion_25b0fbb6ef7eb094_0017.0009_f980a3533165990d\ScreenConnect.WindowsClient.exe" "RunRole" "624ec1b0-5605-48d4-a2c9-4d736167dd06" "System"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: AddClipboardFormatListener
      PID:1860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Apps\2.0\HY3JQD3E.Y6X\VDHRKP5E.68T\manifests\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445.cdf-ms

    Filesize

    24KB

    MD5

    b4f8b314ce8467404c66884b2d42e716

    SHA1

    f762577d8f795a6c911dd3972bfbb328c89be3bf

    SHA256

    4f4d863e00269b0ec5b174df83a5128ffbbd226eb83aa406f340f02fedcc2326

    SHA512

    06077f36b0595033fc2ee5eb953193223602f0d82eab3b0f52100f6b0ff7c16c11ac4f54ff7dcabb28d885c85ddecb72d5b1d630e9232b98fffcca659e53f5f9

  • C:\Users\Admin\AppData\Local\Apps\2.0\HY3JQD3E.Y6X\VDHRKP5E.68T\manifests\scre..core_4b14c015c87c1ad8_0017.0009_none_65cb6507f0c2a5b9.cdf-ms

    Filesize

    3KB

    MD5

    0a10fffeba5a882071758ffbb3ff8886

    SHA1

    8ad10945ab49f43c07d6462470ef093bb8a92099

    SHA256

    8a24242d2002dea29529ae6ba0b0dac397d1ba019e29d82c6372c555819a3a97

    SHA512

    c47bd5fa6e72a8166b565e56ad49ab865a102261d4141d556e0692ac6f9babc52ea1c99efc1d50d0cf7eba39774cc78f51197d2c15b065b5cba55196f9a4e4c6

  • C:\Users\Admin\AppData\Local\Apps\2.0\HY3JQD3E.Y6X\VDHRKP5E.68T\manifests\scre..dows_4b14c015c87c1ad8_0017.0009_none_6a433ce92d10b8e9.cdf-ms

    Filesize

    5KB

    MD5

    41ab71cacb9597c8f03cde50e5a5be96

    SHA1

    b98a39c4254a670af848230c8f8ee47e54c734c6

    SHA256

    31bbbf266e9e4372ee3c9172d442b049ae992636f5a7174b6355ea366352e3b5

    SHA512

    bca89e6e75bddf03aba47d47242c8fe1f153205b86e3969773e3fff6259c5fb37c49bab746b2da0f37c222ba691fc825d7eb364ec44722864c5d3d8ae0eaabec

  • C:\Users\Admin\AppData\Local\Apps\2.0\HY3JQD3E.Y6X\VDHRKP5E.68T\manifests\scre..ient_4b14c015c87c1ad8_0017.0009_none_c7123e2bd9a688c6.cdf-ms

    Filesize

    6KB

    MD5

    33334085bdae4a873242b6c3abaa0c62

    SHA1

    50e5f4bb5a01c173eeecba63c35c225d0392b710

    SHA256

    7bff3f077761bd4b5941f9287074d0f0f6093d40df2338e52cdc7fa7ea472d12

    SHA512

    36cacd5b2f5138cd7ae1f7242af7823daf0b569dcbb2acecb924938e843e8a0add31045c3cf60540fdbbe7874deafcfb7402d0c108fdce8160344314b81767f5

  • C:\Users\Admin\AppData\Local\Apps\2.0\HY3JQD3E.Y6X\VDHRKP5E.68T\manifests\scre..ient_4b14c015c87c1ad8_0017.0009_none_fbe0c2da0011fbbd.cdf-ms

    Filesize

    2KB

    MD5

    244a6a5be646c296a8bebc9959963251

    SHA1

    f9ea30005c788b11486e363e2f56680b30e1ec44

    SHA256

    f391f234418706011bf186d0ac19e2277be6dd4d823bce8de99678d176906d90

    SHA512

    0e9e8f907b91f9293006b3b47b096b1249c4b82b9778223a8908fc12f647243c0d8f4b220d2e8440c31212d02da82e329809cc009545cd3677851b69e3f20901

  • C:\Users\Admin\AppData\Local\Apps\2.0\HY3JQD3E.Y6X\VDHRKP5E.68T\manifests\scre..tion_25b0fbb6ef7eb094_0017.0009_none_4b563d129b766e28.cdf-ms

    Filesize

    14KB

    MD5

    79d72da2662fa97b45217d5433d21b24

    SHA1

    fd7ba165e55869d5980878cb97eca47e7b740b70

    SHA256

    241c447764fccd7fc667a370679da8468db8c651fab6f08d1ec3433422cb894c

    SHA512

    5487d9774f27520273214f674ec6e2d33613bb5caff97d185cebebc0f704082bf07e10d334509c0ffda40e4827e50a66f403db4dc93b20c09960081866dc8ec9

  • C:\Users\Admin\AppData\Local\Apps\2.0\HY3JQD3E.Y6X\VDHRKP5E.68T\manifests\scre..vice_4b14c015c87c1ad8_0017.0009_none_171efd5086820924.cdf-ms

    Filesize

    4KB

    MD5

    b19223334980a8d31400412255c86283

    SHA1

    1e4693bd834fb2514ea98dab9ebda490c053b97a

    SHA256

    87e406239e86f4ad27f71b26feb078c0a4ca7b60d1e0a0b3a4ec500248111fa4

    SHA512

    552623793b759f08f164e2a95d9059b97520235065efd6d968861de0fcc4c41baec0e174ea62811e1175e17c9470b779f3d2ee7eb7024cb361f1c06726129142

  • C:\Users\Admin\AppData\Local\Apps\2.0\HY3JQD3E.Y6X\VDHRKP5E.68T\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\ScreenConnect.ClientService.exe

    Filesize

    93KB

    MD5

    dc615e9d8ec81cbf2e2452516373e5a0

    SHA1

    ec83d37a4f45caeb07b1605324d0315f959452e9

    SHA256

    e9ab064ed381c29a3930f75ca3e05605c6ee07f30a69c043f576a5461de3bafc

    SHA512

    82fe00447fb9785264dfb8032399adf6d33d91d71058212d252742c9e5fd54f5a52f6baf4fb05e95f9a4055057c60a33a7c1c642f18a6a4e045b49be88fa5d9f

  • C:\Users\Admin\AppData\Local\Apps\2.0\HY3JQD3E.Y6X\VDHRKP5E.68T\scre..tion_25b0fbb6ef7eb094_0017.0009_f980a3533165990d\Client.en-US.resources

    Filesize

    47KB

    MD5

    3e83a3aa62c5ff54ed98e27b3fbecf90

    SHA1

    96d8927c870a74a478864240b3ace94ad543dfb8

    SHA256

    2d88b97d28be01abca4544c6381a4370c1a1ce05142c176742f13b44889ddf90

    SHA512

    ea9d05a4aa1ee5cccc61c4f5e8994efba9efff0549b69577bef1f2a22cce908739124eff1e0db5cfdd69e077ad2d7cdb1307de92d79673c9309ee621cb139956

  • C:\Users\Admin\AppData\Local\Apps\2.0\HY3JQD3E.Y6X\VDHRKP5E.68T\scre..tion_25b0fbb6ef7eb094_0017.0009_f980a3533165990d\Client.resources

    Filesize

    26KB

    MD5

    5cd580b22da0c33ec6730b10a6c74932

    SHA1

    0b6bded7936178d80841b289769c6ff0c8eead2d

    SHA256

    de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c

    SHA512

    c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787

  • C:\Users\Admin\AppData\Local\Apps\2.0\HY3JQD3E.Y6X\VDHRKP5E.68T\scre..tion_25b0fbb6ef7eb094_0017.0009_f980a3533165990d\user.config

    Filesize

    585B

    MD5

    1117548d5e9ef7a99815c5548e8930bf

    SHA1

    34f6aaf96830566cd851caa2f6c3c0f78ef2d11d

    SHA256

    246cbd5de8e127aa08a977a7825f1e62c4f7623ff21ff6bfe0b9cb4f762b17ac

    SHA512

    4d60b6fcfa125b18feec8d1d440fc44d1787c445818b4393e6046518f270623c30ddc0c0fd529e56b526e4ed43b4c297c3c47729eb7123f876abcbecb3cd2590

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log

    Filesize

    1KB

    MD5

    11aed5858c042e91c8b581692542c5a9

    SHA1

    b06ee43f6cfd94e97da6856c96d961001b5cb488

    SHA256

    5d7a4f823ab9e9b53c6bc5b76a190211aa77409aa5a1d0a30ada6184ae9c8cdf

    SHA512

    fd9b0230b0f6205591287f42662d284f59425d16da5249286924330897b3b4c5287f9f9f5d2c5570d243e81726ad873b0be15fdea361c98c9225d77ca8395bab

  • C:\Users\Admin\AppData\Local\Temp\Deployment\DAX2EHD1.N1Y\2K33JR7G.EJ4\ScreenConnect.Client.dll

    Filesize

    188KB

    MD5

    6bc9611d5b6cee698149a18d986547a8

    SHA1

    f36ab74e4e502fdaf81e101836b94c91d80cb8ea

    SHA256

    17377a52eeae11e8ee01eb629d6a60c10015ad2bb8bc9768e5c8e4b6500a15ed

    SHA512

    3f23670d0ba150de19a805db6beb6eed8538bbad6fbe3cc21d17d738a43cf411c679a23cea11549e69be0321e672f740791d40e92498aef9d1f8650743ee85ea

  • C:\Users\Admin\AppData\Local\Temp\Deployment\DAX2EHD1.N1Y\2K33JR7G.EJ4\ScreenConnect.Client.dll.genman

    Filesize

    1KB

    MD5

    9ce092e164085ce2566f654314bf99dc

    SHA1

    acef36091ec262a4c42aa5a5b394c71b13b4767e

    SHA256

    6b36ddce4021fd15c29cf63c7102e60edfe2627d1b00ef97d0b4de3051737439

    SHA512

    95bd7f9315dc181de529d940e697b652651bc9e954e96fbc059998909259a719af062548c533d24350c25a159cb113f568eb7c622ae3069ce25fb9224ebf02a6

  • C:\Users\Admin\AppData\Local\Temp\Deployment\DAX2EHD1.N1Y\2K33JR7G.EJ4\ScreenConnect.ClientService.dll

    Filesize

    60KB

    MD5

    22af3a23bd30484514cdacf67c5b3810

    SHA1

    e92a4eaee9d896964de541ce2f01c2404b638258

    SHA256

    7c5442121dba2a30ab9579ec08e111ded372cf9cf90fb3256f273980b975afa9

    SHA512

    95e40b27e90fce7ca85e76afbbc16eb62b4bb977664702b987de2eb2294e6fe9e6df5610ec7b2362c2c68493313f30fbbcbd3446dbe8ae2fa47b89407f5d5936

  • C:\Users\Admin\AppData\Local\Temp\Deployment\DAX2EHD1.N1Y\2K33JR7G.EJ4\ScreenConnect.ClientService.dll.genman

    Filesize

    1KB

    MD5

    f94d041a8128be81c4347caf6a3c47bf

    SHA1

    3285f9acf70c0e4d34f888c28bd3f693e3df5909

    SHA256

    91a65bacad5f7f70bddc6209ed65dd5c375cef9f3c289eab83fd90d622adf46b

    SHA512

    90199543207caf9b4501be7e9509dc9526dafcd5602aaed700314763021c8f3ed06d93a31a90a34cb19d4fb7184aa7d154b197f9e535657aeb9eb872da377a41

  • C:\Users\Admin\AppData\Local\Temp\Deployment\DAX2EHD1.N1Y\2K33JR7G.EJ4\ScreenConnect.Core.dll

    Filesize

    519KB

    MD5

    b319407e807be1a49e366f7f8ea7ee2a

    SHA1

    b12197a877fb7e33b1cb5ba11b0da5ca706581ba

    SHA256

    761b7e50baa229e8afcd9a50990d7f776ddb5ed1ea5fbb131c802e57cf918742

    SHA512

    dc497643790dc608dece9c8fe7264efedd13724bd24c9bf28a60d848b405fddefb8337a60f3f32bb91518910e02c7a2aaf29fc32f86a464dfcafa365526bdb7f

  • C:\Users\Admin\AppData\Local\Temp\Deployment\DAX2EHD1.N1Y\2K33JR7G.EJ4\ScreenConnect.Core.dll.genman

    Filesize

    1KB

    MD5

    6da6dc34636435e9c2bd1b5ff79091b5

    SHA1

    61b6d8c16330fe9063f041bcc025c10de82d876b

    SHA256

    98d4edaa86468540d2d17ef17a9bcd7224b128099a51a8f92a65a88950dcb44c

    SHA512

    0bb929107ecfa257dfb2ff7b37955d8c2402287e989c015632a6292362858667a398ad0563103c1324a29585a8177aaa4bce3c57d867735e40d2cc5c996bd5b9

  • C:\Users\Admin\AppData\Local\Temp\Deployment\DAX2EHD1.N1Y\2K33JR7G.EJ4\ScreenConnect.Windows.dll

    Filesize

    1.6MB

    MD5

    29454a0cb83f28c24805e9a70e53444a

    SHA1

    334202965b07ab69f08b16fed0ee6c7274463556

    SHA256

    998cc3f9af5bd41ccf0f9be86192bbe20cdec08a6ff73c1199e1364195a83e14

    SHA512

    62790920974a2f1b018d466ae3e3b5100006a3c8013f43bdb04af7074cfe5d992caaeb610de2b1b72ff0e4acf8762db1513a4a0cf331f9a340ae0ce53c3be895

  • C:\Users\Admin\AppData\Local\Temp\Deployment\DAX2EHD1.N1Y\2K33JR7G.EJ4\ScreenConnect.Windows.dll.genman

    Filesize

    1KB

    MD5

    1fb3a39063c9fbbc9252d1224cf8c89d

    SHA1

    0f0622eb6205f515651e055c17d0067a94308721

    SHA256

    199c3f5089b07f1fb6cb343180620b2094bcdda9e1f6a3f41269c56402d98439

    SHA512

    8c70ff2fe2f1935454aa6bb4ce0998da1adcbfe7219f1eaee4688ee86bbc730de30347f39b9b1413cbd345d1bf786491ed2f79142d9333dba3a7f0edc9f48e3a

  • C:\Users\Admin\AppData\Local\Temp\Deployment\DAX2EHD1.N1Y\2K33JR7G.EJ4\ScreenConnect.WindowsBackstageShell.exe

    Filesize

    59KB

    MD5

    10dba57f22a6ab4039330000570f39f8

    SHA1

    b8b5c65a89256177da802c4c9cbd11b013221730

    SHA256

    9bd8d15759f83d99edd1f2617d59a94e1c2bb4bd7c4977958f5d5f22c5a7c469

    SHA512

    38230b63a4630145608f619d75ca3115c05ab0338fb57566e012df1bd157123a670a37ae0fea92351ab7352319a5af29f9db3f8bb14962f3f0de3a4f5a5b754c

  • C:\Users\Admin\AppData\Local\Temp\Deployment\DAX2EHD1.N1Y\2K33JR7G.EJ4\ScreenConnect.WindowsClient.exe

    Filesize

    573KB

    MD5

    5dec65c4047de914c78816b8663e3602

    SHA1

    8807695ee8345e37efec43cbc0874277ed9b0a66

    SHA256

    71602f6b0b27c8b7d8ad624248e6126970939effde785ec913ace19052e9960e

    SHA512

    27b5dcb5b0aeadf246b91a173d06e5e8d6cf2cd19d86ca358e0a85b84cd9d8f2b26372ef34c3d427f57803d90f2e97cf59692c80c268a71865f08fc0e7ce42d1

  • C:\Users\Admin\AppData\Local\Temp\Deployment\DAX2EHD1.N1Y\2K33JR7G.EJ4\ScreenConnect.WindowsClient.exe.config

    Filesize

    266B

    MD5

    728175e20ffbceb46760bb5e1112f38b

    SHA1

    2421add1f3c9c5ed9c80b339881d08ab10b340e3

    SHA256

    87c640d3184c17d3b446a72d5f13d643a774b4ecc7afbedfd4e8da7795ea8077

    SHA512

    fb9b57f4e6c04537e8fdb7cc367743c51bf2a0ad4c3c70dddab4ea0cf9ff42d5aeb9d591125e7331374f8201cebf8d0293ad934c667c1394dc63ce96933124e7

  • C:\Users\Admin\AppData\Local\Temp\Deployment\DAX2EHD1.N1Y\2K33JR7G.EJ4\ScreenConnect.WindowsClient.exe.genman

    Filesize

    2KB

    MD5

    efa59a7f55af829c3974a02f30ebe80c

    SHA1

    0faba6763d910d5ee104e3457045c63ccc5bf79b

    SHA256

    3e2d5cc7867afa23663d5894127ce6e2880d3075773a249b37576eda5088875a

    SHA512

    72262b09c21dc4a2b2701a5b32c149349fa3107035d5a115eac4335e3961dcf12a7a867aeff595c13aa618ea955b604538c0f4e529cb6a76fff0cb75927cc74d

  • C:\Users\Admin\AppData\Local\Temp\Deployment\DAX2EHD1.N1Y\2K33JR7G.EJ4\ScreenConnect.WindowsClient.exe.manifest

    Filesize

    17KB

    MD5

    f4b84e283123b025a90bbde33e2080fd

    SHA1

    cc57bfd02228be76c6e08bde16996fa992ff0e54

    SHA256

    93f9eb492b6952d8c7aa1ef1ee5a901234ba1fd2d5ef58d24e1faef597ea8e02

    SHA512

    abc92965bf97c37a614b556d2219d06e63687777d79df5ffb4b5d447dd138c160e5a45cab76a2353d758ad62960f2e58745f0523881ff6c0ea4ccbcd7ed40002

  • C:\Users\Admin\AppData\Local\Temp\Deployment\DAX2EHD1.N1Y\2K33JR7G.EJ4\ScreenConnect.WindowsFileManager.exe

    Filesize

    79KB

    MD5

    c333d3a6eeb74e4d76c3b9e0f6bfd04c

    SHA1

    a39e2643e8dbd2097829e0b08938726557cb8e36

    SHA256

    998d7a0cd6b1a837489e55e99cb992088b9fde220a1025346a461849e1f50d22

    SHA512

    58cc7741ebe1aada93fd82a3e0a571a9a1aa3e400c46e7cdddef876d74f4fbbcbae4293ac556b3823e8dc977e7ce72337a16c2d48eab0aa52b736412ae43c634

  • C:\Users\Admin\AppData\Local\Temp\Deployment\R25OMXXW.JYJ\BO0GYQRC.ZBW.application

    Filesize

    110KB

    MD5

    75f072db717adf065f2d4ddd705a2d49

    SHA1

    8165093de1c610b4cd5b301a6237e923170618c2

    SHA256

    3c7dd342a48bdacb6cc05c422ae960d7baf899593c7a14a075c70f478f17825c

    SHA512

    ae29ecd9cd13694075681790b909edf50903aa3820cf278889574969d2d954e1001f0bd89da6d4670bc08cbf0cdfcbd2cfc6ffc27e3bd16e0a6f1fc3f73c1517

  • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log

    Filesize

    1KB

    MD5

    8adef61669398b1af8b0ef42632c24e2

    SHA1

    49e7467ca605496d76ff6447bed04c7a7db57fe6

    SHA256

    b55ffe7ed15b4a95676ccb59a38fa6ea7b0136642c39ff0ca5a4dab85fa4abda

    SHA512

    275324bf50f7816f12856492040ae39d8f96d15cb569d0bf5916aef5a13b8c6f61e94a658d55f43618722764a4873f4b601971faef4fd8408be1cfe32d5a2e21

  • memory/1860-443-0x00007FF8E3A00000-0x00007FF8E44C2000-memory.dmp

    Filesize

    10.8MB

  • memory/1860-444-0x000000001D3F0000-0x000000001D400000-memory.dmp

    Filesize

    64KB

  • memory/1860-445-0x00000000015E0000-0x00000000015F6000-memory.dmp

    Filesize

    88KB

  • memory/1860-449-0x00007FF8E3A00000-0x00007FF8E44C2000-memory.dmp

    Filesize

    10.8MB

  • memory/2296-424-0x00007FF8E3A00000-0x00007FF8E44C2000-memory.dmp

    Filesize

    10.8MB

  • memory/2296-425-0x000000001CDA0000-0x000000001CDB0000-memory.dmp

    Filesize

    64KB

  • memory/2296-429-0x00007FF8E3A00000-0x00007FF8E44C2000-memory.dmp

    Filesize

    10.8MB

  • memory/3276-380-0x00000000034A0000-0x00000000034B6000-memory.dmp

    Filesize

    88KB

  • memory/3276-381-0x0000000005BA0000-0x0000000005BB0000-memory.dmp

    Filesize

    64KB

  • memory/3276-400-0x0000000074790000-0x0000000074F41000-memory.dmp

    Filesize

    7.7MB

  • memory/3276-387-0x0000000005A70000-0x0000000005AF8000-memory.dmp

    Filesize

    544KB

  • memory/3276-388-0x0000000005BA0000-0x0000000005BB0000-memory.dmp

    Filesize

    64KB

  • memory/3276-384-0x0000000005BA0000-0x0000000005BB0000-memory.dmp

    Filesize

    64KB

  • memory/3276-379-0x0000000074790000-0x0000000074F41000-memory.dmp

    Filesize

    7.7MB

  • memory/3772-435-0x00000000042B0000-0x00000000042C0000-memory.dmp

    Filesize

    64KB

  • memory/3772-402-0x00000000042B0000-0x00000000042C0000-memory.dmp

    Filesize

    64KB

  • memory/3772-433-0x00000000042B0000-0x00000000042C0000-memory.dmp

    Filesize

    64KB

  • memory/3772-411-0x0000000004790000-0x0000000004822000-memory.dmp

    Filesize

    584KB

  • memory/3772-410-0x00000000046B0000-0x00000000046E6000-memory.dmp

    Filesize

    216KB

  • memory/3772-401-0x0000000074790000-0x0000000074F41000-memory.dmp

    Filesize

    7.7MB

  • memory/3772-432-0x00000000042B0000-0x00000000042C0000-memory.dmp

    Filesize

    64KB

  • memory/3772-399-0x0000000004500000-0x00000000046AA000-memory.dmp

    Filesize

    1.7MB

  • memory/3772-403-0x0000000004C60000-0x0000000005206000-memory.dmp

    Filesize

    5.6MB

  • memory/3772-404-0x00000000042B0000-0x00000000042C0000-memory.dmp

    Filesize

    64KB

  • memory/3772-431-0x0000000074790000-0x0000000074F41000-memory.dmp

    Filesize

    7.7MB

  • memory/3772-407-0x00000000044A0000-0x00000000044F0000-memory.dmp

    Filesize

    320KB

  • memory/3904-406-0x00007FF8E3A00000-0x00007FF8E44C2000-memory.dmp

    Filesize

    10.8MB

  • memory/3904-353-0x0000000000F90000-0x0000000001024000-memory.dmp

    Filesize

    592KB

  • memory/3904-354-0x00007FF8E3A00000-0x00007FF8E44C2000-memory.dmp

    Filesize

    10.8MB

  • memory/3904-361-0x000000001C360000-0x000000001C370000-memory.dmp

    Filesize

    64KB

  • memory/4052-436-0x00007FF8E3A00000-0x00007FF8E44C2000-memory.dmp

    Filesize

    10.8MB

  • memory/4052-440-0x000000001CB50000-0x000000001CB60000-memory.dmp

    Filesize

    64KB

  • memory/4052-419-0x000000001CB50000-0x000000001CB60000-memory.dmp

    Filesize

    64KB

  • memory/4052-418-0x00007FF8E3A00000-0x00007FF8E44C2000-memory.dmp

    Filesize

    10.8MB

  • memory/4052-420-0x0000000002710000-0x0000000002726000-memory.dmp

    Filesize

    88KB

  • memory/4052-439-0x000000001CB50000-0x000000001CB60000-memory.dmp

    Filesize

    64KB

  • memory/4052-438-0x000000001CB50000-0x000000001CB60000-memory.dmp

    Filesize

    64KB

  • memory/4052-437-0x000000001CB50000-0x000000001CB60000-memory.dmp

    Filesize

    64KB

  • memory/4052-434-0x000000001CB50000-0x000000001CB60000-memory.dmp

    Filesize

    64KB

  • memory/4052-430-0x000000001CB50000-0x000000001CB60000-memory.dmp

    Filesize

    64KB

  • memory/4636-51-0x000001D70EC80000-0x000001D70EC90000-memory.dmp

    Filesize

    64KB

  • memory/4636-55-0x000001D72B760000-0x000001D72B7E8000-memory.dmp

    Filesize

    544KB

  • memory/4636-345-0x000001D70EC80000-0x000001D70EC90000-memory.dmp

    Filesize

    64KB

  • memory/4636-41-0x000001D72B770000-0x000001D72B804000-memory.dmp

    Filesize

    592KB

  • memory/4636-69-0x000001D72AF40000-0x000001D72AF56000-memory.dmp

    Filesize

    88KB

  • memory/4636-0-0x000001D70D0B0000-0x000001D70D0B8000-memory.dmp

    Filesize

    32KB

  • memory/4636-62-0x000001D72B5D0000-0x000001D72B606000-memory.dmp

    Filesize

    216KB

  • memory/4636-44-0x00007FF8E3A00000-0x00007FF8E44C2000-memory.dmp

    Filesize

    10.8MB

  • memory/4636-58-0x000001D70EC80000-0x000001D70EC90000-memory.dmp

    Filesize

    64KB

  • memory/4636-48-0x000001D72BA30000-0x000001D72BBDA000-memory.dmp

    Filesize

    1.7MB

  • memory/4636-31-0x000001D70EC80000-0x000001D70EC90000-memory.dmp

    Filesize

    64KB

  • memory/4636-7-0x000001D7293B0000-0x000001D729400000-memory.dmp

    Filesize

    320KB

  • memory/4636-4-0x000001D70EC80000-0x000001D70EC90000-memory.dmp

    Filesize

    64KB

  • memory/4636-3-0x000001D70EC80000-0x000001D70EC90000-memory.dmp

    Filesize

    64KB

  • memory/4636-2-0x00007FF8E3A00000-0x00007FF8E44C2000-memory.dmp

    Filesize

    10.8MB

  • memory/4636-1-0x000001D727790000-0x000001D727918000-memory.dmp

    Filesize

    1.5MB