Analysis
-
max time kernel
69s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2022 11:08
Static task
static1
Behavioral task
behavioral1
Sample
Draw.io _caMQZ.exe
Resource
win7-20220901-en
General
-
Target
Draw.io _caMQZ.exe
-
Size
5.1MB
-
MD5
5347d1465f1abfbe142bee26234c2d42
-
SHA1
43aa39e7c91122fac3ceff37278f878eb60df870
-
SHA256
3eeab0e2bbd7e74117cf4d36fa98a7d0125fc46161a1193f0b72fca297f5c8ac
-
SHA512
afe6c2b058056813ef2f6642c5e4593c37bfc12b38f7f8990e3a923e56922a7c2647eb2e214d7da22de60648475bf59b2b3a9f4818f2861dbc37f9f8e10815bd
-
SSDEEP
49152:nhvEwVL6q9TUDEYh8ESu07hZPKBmeSOlNUA2lEj6T6RSUvfkt9Y:1LVQYA08RSUnkt6
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 8 IoCs
Processes:
Quick_Driver_Updater.exeQuick_Driver_Updater.tmpdraw.io-13.9.9-windows-installer.exeqdu.exedraw.io.exedraw.io.exedraw.io.exedraw.io.exepid Process 1072 Quick_Driver_Updater.exe 1544 Quick_Driver_Updater.tmp 1956 draw.io-13.9.9-windows-installer.exe 4308 qdu.exe 1360 draw.io.exe 4740 draw.io.exe 2372 draw.io.exe 3688 draw.io.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
draw.io.exedraw.io.exeQuick_Driver_Updater.tmpdescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation draw.io.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation draw.io.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Quick_Driver_Updater.tmp -
Loads dropped DLL 17 IoCs
Processes:
draw.io-13.9.9-windows-installer.exedraw.io.exedraw.io.exedraw.io.exedraw.io.exepid Process 1956 draw.io-13.9.9-windows-installer.exe 1956 draw.io-13.9.9-windows-installer.exe 1956 draw.io-13.9.9-windows-installer.exe 1956 draw.io-13.9.9-windows-installer.exe 1956 draw.io-13.9.9-windows-installer.exe 1956 draw.io-13.9.9-windows-installer.exe 1956 draw.io-13.9.9-windows-installer.exe 1956 draw.io-13.9.9-windows-installer.exe 1956 draw.io-13.9.9-windows-installer.exe 1956 draw.io-13.9.9-windows-installer.exe 1956 draw.io-13.9.9-windows-installer.exe 1360 draw.io.exe 4740 draw.io.exe 2372 draw.io.exe 3688 draw.io.exe 4740 draw.io.exe 4740 draw.io.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
Processes:
svchost.exedescription ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{1684A3C0-82BD-46C6-9D9D-1F5EEC9A31CC}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{FB243E1E-8F8E-4F60-9A01-9F2CF06507F3}.catalogItem svchost.exe -
Drops file in Program Files directory 64 IoCs
Processes:
draw.io-13.9.9-windows-installer.exeQuick_Driver_Updater.tmpdescription ioc Process File created C:\Program Files\draw.io\locales\fi.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\locales\fil.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\locales\hu.pak draw.io-13.9.9-windows-installer.exe File opened for modification C:\Program Files\draw.io\locales draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\chrome_100_percent.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\locales\ar.pak draw.io-13.9.9-windows-installer.exe File opened for modification C:\Program Files\Quick Driver Updater\x64\SQLite.Interop.dll Quick_Driver_Updater.tmp File opened for modification C:\Program Files\draw.io\locales\hi.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\swiftshader\libGLESv2.dll draw.io-13.9.9-windows-installer.exe File opened for modification C:\Program Files\Quick Driver Updater\WPFToolkit.dll Quick_Driver_Updater.tmp File created C:\Program Files\Quick Driver Updater\is-RDKSQ.tmp Quick_Driver_Updater.tmp File created C:\Program Files\Quick Driver Updater\langs\is-LQGRP.tmp Quick_Driver_Updater.tmp File opened for modification C:\Program Files\draw.io\chrome_100_percent.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\locales\bn.pak draw.io-13.9.9-windows-installer.exe File opened for modification C:\Program Files\draw.io\locales\lt.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\locales\lv.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\locales\ml.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\Quick Driver Updater\is-8IJQD.tmp Quick_Driver_Updater.tmp File opened for modification C:\Program Files\draw.io\locales\fr.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\locales\he.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\locales\lt.pak draw.io-13.9.9-windows-installer.exe File opened for modification C:\Program Files\draw.io\locales\zh-CN.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\locales\bg.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\Quick Driver Updater\is-3ESC3.tmp Quick_Driver_Updater.tmp File created C:\Program Files\Quick Driver Updater\is-BBK4G.tmp Quick_Driver_Updater.tmp File created C:\Program Files\draw.io\resources\app.asar draw.io-13.9.9-windows-installer.exe File created C:\Program Files\Quick Driver Updater\is-IFOIN.tmp Quick_Driver_Updater.tmp File created C:\Program Files\draw.io\locales\da.pak draw.io-13.9.9-windows-installer.exe File opened for modification C:\Program Files\draw.io\locales\da.pak draw.io-13.9.9-windows-installer.exe File opened for modification C:\Program Files\draw.io\locales\ml.pak draw.io-13.9.9-windows-installer.exe File opened for modification C:\Program Files\Quick Driver Updater\qdu.exe Quick_Driver_Updater.tmp File opened for modification C:\Program Files\Quick Driver Updater\Newtonsoft.Json.dll Quick_Driver_Updater.tmp File opened for modification C:\Program Files\draw.io\locales\am.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\locales\en-US.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\locales\fr.pak draw.io-13.9.9-windows-installer.exe File opened for modification C:\Program Files\draw.io\locales\mr.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\locales\pl.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\locales\hi.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\locales\nb.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\Quick Driver Updater\is-1AD23.tmp Quick_Driver_Updater.tmp File created C:\Program Files\Quick Driver Updater\is-4C9O0.tmp Quick_Driver_Updater.tmp File created C:\Program Files\Quick Driver Updater\langs\is-LQLBD.tmp Quick_Driver_Updater.tmp File opened for modification C:\Program Files\draw.io\swiftshader\libGLESv2.dll draw.io-13.9.9-windows-installer.exe File opened for modification C:\Program Files\draw.io\locales\ko.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\locales\tr.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\locales\es-419.pak draw.io-13.9.9-windows-installer.exe File opened for modification C:\Program Files\draw.io\locales\es.pak draw.io-13.9.9-windows-installer.exe File opened for modification C:\Program Files\draw.io\locales\bn.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\locales\fa.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\locales\pt-BR.pak draw.io-13.9.9-windows-installer.exe File opened for modification C:\Program Files\draw.io\locales\sw.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\locales\vi.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\locales\hr.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\locales\te.pak draw.io-13.9.9-windows-installer.exe File opened for modification C:\Program Files\draw.io\locales\es-419.pak draw.io-13.9.9-windows-installer.exe File opened for modification C:\Program Files\draw.io\locales\ms.pak draw.io-13.9.9-windows-installer.exe File opened for modification C:\Program Files\draw.io\locales\ro.pak draw.io-13.9.9-windows-installer.exe File opened for modification C:\Program Files\draw.io\libEGL.dll draw.io-13.9.9-windows-installer.exe File opened for modification C:\Program Files\draw.io\locales\zh-TW.pak draw.io-13.9.9-windows-installer.exe File created C:\Program Files\draw.io\draw.io.exe draw.io-13.9.9-windows-installer.exe File opened for modification C:\Program Files\draw.io\locales\he.pak draw.io-13.9.9-windows-installer.exe File opened for modification C:\Program Files\draw.io\locales\ca.pak draw.io-13.9.9-windows-installer.exe File opened for modification C:\Program Files\draw.io\locales\ru.pak draw.io-13.9.9-windows-installer.exe File opened for modification C:\Program Files\draw.io\ffmpeg.dll draw.io-13.9.9-windows-installer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid Process 3680 taskkill.exe -
Processes:
Draw.io _caMQZ.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION Draw.io _caMQZ.exe Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\Draw.io _caMQZ.exe = "11000" Draw.io _caMQZ.exe -
Modifies registry class 26 IoCs
Processes:
draw.io-13.9.9-windows-installer.exedescription ioc Process Key created \REGISTRY\MACHINE\Software\Classes\draw.io Diagram\DefaultIcon draw.io-13.9.9-windows-installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vsdx\ = "VSDX Document" draw.io-13.9.9-windows-installer.exe Key created \REGISTRY\MACHINE\Software\Classes\VSDX Document\DefaultIcon draw.io-13.9.9-windows-installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.drawio\ = "draw.io Diagram" draw.io-13.9.9-windows-installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\draw.io Diagram\DefaultIcon\ = "C:\\Program Files\\draw.io\\draw.io.exe,0" draw.io-13.9.9-windows-installer.exe Key created \REGISTRY\MACHINE\Software\Classes\draw.io Diagram\shell draw.io-13.9.9-windows-installer.exe Key created \REGISTRY\MACHINE\Software\Classes\.vsdx draw.io-13.9.9-windows-installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VSDX Document\DefaultIcon\ = "C:\\Program Files\\draw.io\\draw.io.exe,0" draw.io-13.9.9-windows-installer.exe Key created \REGISTRY\MACHINE\Software\Classes\VSDX Document\shell\open draw.io-13.9.9-windows-installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VSDX Document\shell\open\ = "Open with draw.io" draw.io-13.9.9-windows-installer.exe Key created \REGISTRY\MACHINE\Software\Classes\VSDX Document\shell\open\command draw.io-13.9.9-windows-installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\draw.io Diagram\ = "draw.io Diagram" draw.io-13.9.9-windows-installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\draw.io Diagram\shell\open\ = "Open with draw.io" draw.io-13.9.9-windows-installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.vsdx\VSDX Document_backup = "VisioViewer.Viewer" draw.io-13.9.9-windows-installer.exe Key created \REGISTRY\MACHINE\Software\Classes\VSDX Document draw.io-13.9.9-windows-installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VSDX Document\ = "VSDX Document" draw.io-13.9.9-windows-installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VSDX Document\shell\ = "open" draw.io-13.9.9-windows-installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VSDX Document\shell\open\command\ = "C:\\Program Files\\draw.io\\draw.io.exe \"%1\"" draw.io-13.9.9-windows-installer.exe Key created \REGISTRY\MACHINE\Software\Classes\draw.io Diagram draw.io-13.9.9-windows-installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.drawio\draw.io Diagram_backup draw.io-13.9.9-windows-installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\draw.io Diagram\shell\ = "open" draw.io-13.9.9-windows-installer.exe Key created \REGISTRY\MACHINE\Software\Classes\draw.io Diagram\shell\open draw.io-13.9.9-windows-installer.exe Key created \REGISTRY\MACHINE\Software\Classes\draw.io Diagram\shell\open\command draw.io-13.9.9-windows-installer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\draw.io Diagram\shell\open\command\ = "C:\\Program Files\\draw.io\\draw.io.exe \"%1\"" draw.io-13.9.9-windows-installer.exe Key created \REGISTRY\MACHINE\Software\Classes\VSDX Document\shell draw.io-13.9.9-windows-installer.exe Key created \REGISTRY\MACHINE\Software\Classes\.drawio draw.io-13.9.9-windows-installer.exe -
Processes:
qdu.exedescription ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 qdu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 qdu.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 qdu.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 qdu.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 qdu.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 qdu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 qdu.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 qdu.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
Draw.io _caMQZ.exeQuick_Driver_Updater.tmpdraw.io-13.9.9-windows-installer.exedraw.io.exedraw.io.exepid Process 3232 Draw.io _caMQZ.exe 3232 Draw.io _caMQZ.exe 3232 Draw.io _caMQZ.exe 3232 Draw.io _caMQZ.exe 3232 Draw.io _caMQZ.exe 3232 Draw.io _caMQZ.exe 3232 Draw.io _caMQZ.exe 3232 Draw.io _caMQZ.exe 3232 Draw.io _caMQZ.exe 3232 Draw.io _caMQZ.exe 3232 Draw.io _caMQZ.exe 3232 Draw.io _caMQZ.exe 3232 Draw.io _caMQZ.exe 3232 Draw.io _caMQZ.exe 3232 Draw.io _caMQZ.exe 3232 Draw.io _caMQZ.exe 3232 Draw.io _caMQZ.exe 3232 Draw.io _caMQZ.exe 3232 Draw.io _caMQZ.exe 3232 Draw.io _caMQZ.exe 1544 Quick_Driver_Updater.tmp 1544 Quick_Driver_Updater.tmp 1956 draw.io-13.9.9-windows-installer.exe 1956 draw.io-13.9.9-windows-installer.exe 1956 draw.io-13.9.9-windows-installer.exe 1956 draw.io-13.9.9-windows-installer.exe 1956 draw.io-13.9.9-windows-installer.exe 1956 draw.io-13.9.9-windows-installer.exe 2372 draw.io.exe 2372 draw.io.exe 3688 draw.io.exe 3688 draw.io.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
taskkill.exedraw.io-13.9.9-windows-installer.exeqdu.exedescription pid Process Token: SeDebugPrivilege 3680 taskkill.exe Token: SeSecurityPrivilege 1956 draw.io-13.9.9-windows-installer.exe Token: SeDebugPrivilege 4308 qdu.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
Quick_Driver_Updater.tmppid Process 1544 Quick_Driver_Updater.tmp -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Draw.io _caMQZ.exepid Process 3232 Draw.io _caMQZ.exe 3232 Draw.io _caMQZ.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
Draw.io _caMQZ.exeQuick_Driver_Updater.exeQuick_Driver_Updater.tmpdraw.io.exedescription pid Process procid_target PID 3232 wrote to memory of 1072 3232 Draw.io _caMQZ.exe 95 PID 3232 wrote to memory of 1072 3232 Draw.io _caMQZ.exe 95 PID 3232 wrote to memory of 1072 3232 Draw.io _caMQZ.exe 95 PID 1072 wrote to memory of 1544 1072 Quick_Driver_Updater.exe 96 PID 1072 wrote to memory of 1544 1072 Quick_Driver_Updater.exe 96 PID 1072 wrote to memory of 1544 1072 Quick_Driver_Updater.exe 96 PID 3232 wrote to memory of 1956 3232 Draw.io _caMQZ.exe 97 PID 3232 wrote to memory of 1956 3232 Draw.io _caMQZ.exe 97 PID 3232 wrote to memory of 1956 3232 Draw.io _caMQZ.exe 97 PID 1544 wrote to memory of 4540 1544 Quick_Driver_Updater.tmp 98 PID 1544 wrote to memory of 4540 1544 Quick_Driver_Updater.tmp 98 PID 1544 wrote to memory of 4540 1544 Quick_Driver_Updater.tmp 98 PID 1544 wrote to memory of 3680 1544 Quick_Driver_Updater.tmp 100 PID 1544 wrote to memory of 3680 1544 Quick_Driver_Updater.tmp 100 PID 1544 wrote to memory of 3680 1544 Quick_Driver_Updater.tmp 100 PID 1544 wrote to memory of 4720 1544 Quick_Driver_Updater.tmp 103 PID 1544 wrote to memory of 4720 1544 Quick_Driver_Updater.tmp 103 PID 1544 wrote to memory of 4308 1544 Quick_Driver_Updater.tmp 105 PID 1544 wrote to memory of 4308 1544 Quick_Driver_Updater.tmp 105 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 4740 1360 draw.io.exe 110 PID 1360 wrote to memory of 2372 1360 draw.io.exe 111 PID 1360 wrote to memory of 2372 1360 draw.io.exe 111 PID 1360 wrote to memory of 3688 1360 draw.io.exe 112 PID 1360 wrote to memory of 3688 1360 draw.io.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\Draw.io _caMQZ.exe"C:\Users\Admin\AppData\Local\Temp\Draw.io _caMQZ.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\Quick_Driver_Updater_exe_410182022109245055287816\Quick_Driver_Updater.exe"C:\Users\Admin\AppData\Local\Temp\Quick_Driver_Updater_exe_410182022109245055287816\Quick_Driver_Updater.exe" /verysilent /ppi=1 /ppinag=1 /ddtime=500 /delay=5 /source=sftqdu1 /pixel=SFT5696_SFT5567_RUNT2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\is-JQRPI.tmp\Quick_Driver_Updater.tmp"C:\Users\Admin\AppData\Local\Temp\is-JQRPI.tmp\Quick_Driver_Updater.tmp" /SL5="$30202,5773230,1034240,C:\Users\Admin\AppData\Local\Temp\Quick_Driver_Updater_exe_410182022109245055287816\Quick_Driver_Updater.exe" /verysilent /ppi=1 /ppinag=1 /ddtime=500 /delay=5 /source=sftqdu1 /pixel=SFT5696_SFT5567_RUNT3⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /delete /tn "Quick Driver Updater_launcher" /f4⤵PID:4540
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im "qdu.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
C:\Windows\system32\schtasks.exe"schtasks" /Create /F /RL Highest /SC ONCE /st 00:00 /TN "Quick Driver Updater skipuac" /TR "'C:\Program Files\Quick Driver Updater\qdu.exe'"4⤵
- Creates scheduled task(s)
PID:4720
-
-
C:\Program Files\Quick Driver Updater\qdu.exe"C:\Program Files\Quick Driver Updater\qdu.exe" cntryphnno4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:4308
-
-
C:\Program Files\Quick Driver Updater\qdu.exe"C:\Program Files\Quick Driver Updater\qdu.exe" silentlnch4⤵PID:3644
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\draw_io-13_9_9-windows-installer_exe_210182022109191406136285\draw.io-13.9.9-windows-installer.exe"C:\Users\Admin\AppData\Local\Temp\draw_io-13_9_9-windows-installer_exe_210182022109191406136285\draw.io-13.9.9-windows-installer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:3816
-
C:\Program Files\draw.io\draw.io.exe"C:\Program Files\draw.io\draw.io.exe"1⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Program Files\draw.io\draw.io.exe"C:\Program Files\draw.io\draw.io.exe" --type=gpu-process --field-trial-handle=1600,2396087647627452588,12912770997049205573,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1608 /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4740
-
-
C:\Program Files\draw.io\draw.io.exe"C:\Program Files\draw.io\draw.io.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1600,2396087647627452588,12912770997049205573,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1956 /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
-
C:\Program Files\draw.io\draw.io.exe"C:\Program Files\draw.io\draw.io.exe" --type=renderer --field-trial-handle=1600,2396087647627452588,12912770997049205573,131072 --enable-features=WebComponentsV0Enabled --disable-features=CookiesWithoutSameSiteMustBeSecure,SameSiteByDefaultCookies,SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Program Files\draw.io\resources\app.asar" --node-integration --node-integration-in-worker --no-sandbox --no-zygote --enable-remote-module --background-color=#fff --enable-spellcheck --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=3 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2164 /prefetch:12⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3688
-
-
C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exeC:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe1⤵PID:2164
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4612
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
456KB
MD5195ed09e0b4f3b09ea4a3b67a0d3f396
SHA101a250631397c93c4aab9a777a86e39fd8d84f09
SHA256aef9fcbb874fc82e151e32279330061f8f22a77c05f583a0cb5e5696654ac456
SHA512b801c03efa3e8079366a7782d2634a3686d88f64c3c31a03aa5ce71b7bf472766724d209290c231d55da89dd4f03bd1c0153ffeb514e1d5d408cc2c713cd4098
-
Filesize
4.0MB
MD5dfe06df90a37a45b23e33f510dda9554
SHA1370edde62c86c1cdae423e966c6e31d5f0bffb58
SHA25668e15d06d36f57bb45c819e0a3aada7023493bfbea1d2cbd1f3c1f421fe4b546
SHA512c3a5589006c4e194f2cc7d5c053cd1ddcd4f0a4cdc76d104c0a32c64f0fb0103755523c90e8cba4c3818b49f0b9e144d010d4b97003cf66b9779e0e776220d70
-
Filesize
4.0MB
MD5dfe06df90a37a45b23e33f510dda9554
SHA1370edde62c86c1cdae423e966c6e31d5f0bffb58
SHA25668e15d06d36f57bb45c819e0a3aada7023493bfbea1d2cbd1f3c1f421fe4b546
SHA512c3a5589006c4e194f2cc7d5c053cd1ddcd4f0a4cdc76d104c0a32c64f0fb0103755523c90e8cba4c3818b49f0b9e144d010d4b97003cf66b9779e0e776220d70
-
Filesize
4.0MB
MD5dfe06df90a37a45b23e33f510dda9554
SHA1370edde62c86c1cdae423e966c6e31d5f0bffb58
SHA25668e15d06d36f57bb45c819e0a3aada7023493bfbea1d2cbd1f3c1f421fe4b546
SHA512c3a5589006c4e194f2cc7d5c053cd1ddcd4f0a4cdc76d104c0a32c64f0fb0103755523c90e8cba4c3818b49f0b9e144d010d4b97003cf66b9779e0e776220d70
-
Filesize
3KB
MD5b6cd223552358a991d62398d8a769bda
SHA121c4455118aabf5064f4743007ea31795f07ceac
SHA2561d890e3d22dbd0177acb4d307b98e5ec491b8085b7ca70c08ef5bd666489b619
SHA512a019eeefba7672e13891a3ce1c29dbe781535e7e5bb9d035c50bcc1de67c37f4dfa8a46f0972c3f88c8da8db21cc9b1fda139c31350ec9672dd5ee2d685c3b0e
-
Filesize
4.3MB
MD57641e39b7da4077084d2afe7c31032e0
SHA12256644f69435ff2fee76deb04d918083960d1eb
SHA25644422e6936dc72b7ac5ed16bb8bcae164b7554513e52efb66a3e942cec328a47
SHA5128010e1cb17fa18bbf72d8344e1d63ded7cef7be6e7c13434fa6d8e22ce1d58a4d426959bdcb031502d4b145e29cb111af929fcbc66001111fbc6d7a19e8800a5
-
Filesize
176KB
MD5d5719b1f791ac999c3cfda2e4405bdce
SHA1c5d94054bcb271dee08714c313476abd67be28ca
SHA2567cb9d93a16e5621ab765e3f3b459f4698ae496035e283f2c0c390b188a487741
SHA512ce75bde78ddf6bc394662c5d0ce107ba375b13bf75a31ba1888dffa74900fa86babd65ce222c38db73a11c8d54b3c6f6046b8f71ce80281eec884fd7f0cd1583
-
Filesize
313KB
MD50649df49260e18326c9a54545131aaec
SHA176de40e3b828cb42cb8b9beb31808ea2145eda56
SHA256070a6cb68318a032ec17cd7b07f8af8bd6983f16997f50a231d232396a2f570f
SHA512c196726564ea218c1e58121f43ab6f138a676a47cd53ad9099daec4cc3a491cf7f9127c56f31f8ec460080ba5f2f56eb2f6c7d37e286e05c4dbd9592552185d4
-
Filesize
4.3MB
MD57641e39b7da4077084d2afe7c31032e0
SHA12256644f69435ff2fee76deb04d918083960d1eb
SHA25644422e6936dc72b7ac5ed16bb8bcae164b7554513e52efb66a3e942cec328a47
SHA5128010e1cb17fa18bbf72d8344e1d63ded7cef7be6e7c13434fa6d8e22ce1d58a4d426959bdcb031502d4b145e29cb111af929fcbc66001111fbc6d7a19e8800a5
-
Filesize
77.3MB
MD554b4773785bd3e2b76df19247f9e1be0
SHA1a062db10f0d74281d1f3ef250832bca5133dc011
SHA256a9b8a574a1ae154bf2907881d2efa83075a5d3de78e63d7599ff68bb7f93904b
SHA512a63db0e20105dea1f9a9cea2f6a8dc95b4b4add8e323ee2adb9c2bb189ff33cf7c8085d32787cd203debe4362c76105f8cee3006ace5f9b4ecfc8a7b88a3263c
-
Filesize
77.3MB
MD554b4773785bd3e2b76df19247f9e1be0
SHA1a062db10f0d74281d1f3ef250832bca5133dc011
SHA256a9b8a574a1ae154bf2907881d2efa83075a5d3de78e63d7599ff68bb7f93904b
SHA512a63db0e20105dea1f9a9cea2f6a8dc95b4b4add8e323ee2adb9c2bb189ff33cf7c8085d32787cd203debe4362c76105f8cee3006ace5f9b4ecfc8a7b88a3263c
-
Filesize
70.4MB
MD571719c23b8bab45aa0779d3e2ff751bc
SHA19ddb8166cb0d36d51eb1af198ed68c47190c4e75
SHA2565d9744d8534d1101aa796bd187f12fa4604b0fa7a50af737de9b9516f7befaa9
SHA51235818750f8f8fe33d376c4990798a2fc8d56b11521578c17e50ec6fb0c0e4f0f9e52a5a3dd46e2a1e58983864c34d7184e024b61ba952213c3eb27d8f57a35de
-
Filesize
71.3MB
MD509e728b06ba75affd54a0ad1de896e31
SHA10b945ef2c373005a1731b1a74a6d1ca3c8e21dfa
SHA25687a4ffa79ae147c45bdd425e9e9fe0c9bbdab9d0d006ce0711a7088bb11bc9c6
SHA51241010273e699aa4ca4dc645c8fff8552c1b73488674c0270bdb7aa317e28e867771eee5396e98ebdf253c0f971895c044126d005b01aceb2b32f52ad9e7eb752
-
Filesize
61.3MB
MD5df1f2883360c35245a5384b831d75f57
SHA13dde09f0bf1dca923a9c8d57622b2e9214e31156
SHA2567d9fc6e5c9414d3e758aabfe3f69144780edc8ac6225b6867cce2457fec786e8
SHA512e1308a00570eca6a83937654a39cb2379cb324441d4a9f6ac95cf8c79c3e312278ea4d5e4de7911cbe48b32f005e1fe15aa46157d64067c75beb6f706d82a90f
-
Filesize
2.7MB
MD5e1197e74621313b2597792f61355314e
SHA12c7999023cd7051805fc196a865986b01fdeef45
SHA256a3d1b9c673d242c2d862c30acb308cfb89b19e1cfb0db1f79daf69cf0d78dfe7
SHA512ebb4d025a7622aedde7a32bbb4a3c6f05c48fee32fb1839b50a3145660c71112273af152b5290c0a92ecbc52d12f81420dd032e685ae84cf1b578978fc16a35c
-
Filesize
2.7MB
MD5e1197e74621313b2597792f61355314e
SHA12c7999023cd7051805fc196a865986b01fdeef45
SHA256a3d1b9c673d242c2d862c30acb308cfb89b19e1cfb0db1f79daf69cf0d78dfe7
SHA512ebb4d025a7622aedde7a32bbb4a3c6f05c48fee32fb1839b50a3145660c71112273af152b5290c0a92ecbc52d12f81420dd032e685ae84cf1b578978fc16a35c
-
Filesize
2.7MB
MD5e1197e74621313b2597792f61355314e
SHA12c7999023cd7051805fc196a865986b01fdeef45
SHA256a3d1b9c673d242c2d862c30acb308cfb89b19e1cfb0db1f79daf69cf0d78dfe7
SHA512ebb4d025a7622aedde7a32bbb4a3c6f05c48fee32fb1839b50a3145660c71112273af152b5290c0a92ecbc52d12f81420dd032e685ae84cf1b578978fc16a35c
-
Filesize
2.7MB
MD5e1197e74621313b2597792f61355314e
SHA12c7999023cd7051805fc196a865986b01fdeef45
SHA256a3d1b9c673d242c2d862c30acb308cfb89b19e1cfb0db1f79daf69cf0d78dfe7
SHA512ebb4d025a7622aedde7a32bbb4a3c6f05c48fee32fb1839b50a3145660c71112273af152b5290c0a92ecbc52d12f81420dd032e685ae84cf1b578978fc16a35c
-
Filesize
2.7MB
MD5e1197e74621313b2597792f61355314e
SHA12c7999023cd7051805fc196a865986b01fdeef45
SHA256a3d1b9c673d242c2d862c30acb308cfb89b19e1cfb0db1f79daf69cf0d78dfe7
SHA512ebb4d025a7622aedde7a32bbb4a3c6f05c48fee32fb1839b50a3145660c71112273af152b5290c0a92ecbc52d12f81420dd032e685ae84cf1b578978fc16a35c
-
Filesize
10.0MB
MD59732e28c054db1e042cd306a7bc9227a
SHA16bab2e77925515888808c1ef729c5bb1323100dd
SHA25627993e2079711d5f0f04a72f48fee88b269604c8e3fbdf50a7f7bb3f5bfc8d8e
SHA5123eb67ab896a56dab4a2d6eea98f251affd6864c5f5b24f22b61b6acc1df4460d86f0a448f1983aac019e79ff930286c3510891be9d48ef07a93ff975a0e55335
-
Filesize
80KB
MD569d7c5168de6b4311a36c39ca7ca60f0
SHA140ff72437b51677065d68a6486e3b03e0a27102d
SHA256fdeb2723f423dfe7ee4c19cc052398cbe796bfce7d432d0abe4ea40e6c6e3dab
SHA5124e1fd01bd7d5f65f8aa2f0b2f4845106df916a53dd4898d0cec7fc538c2908d22f4ffd3dacf023c7854f4854534468a9bc93763be21075661501c6ceca2ca0e7
-
Filesize
4.1MB
MD5977bdf44c3bd2fa5ece6f23915a7acc6
SHA1df371edc31eb80fe0899447deac2921f519c8cc5
SHA2562fe8dd43b377a908df6454ec3005b3e25409a82bfb45c35ba871f05cc578c21e
SHA512d437bcc48bec3ad66a5cd0e6d6c3948276b897f6eca034b3c221ea1dc00fe7b27425d1491a1634b6ac843fc1f12aecd20bf2a7da5fe8023aac824adc0f791639
-
Filesize
76.4MB
MD549046f9f52c9ed76fb61f54d1782efe6
SHA1666b2164e8afec1d641942995008e46724a0f72c
SHA256e4d7ed27d269b3d0ce074d0516b52a2589650d5fd771c376b52dcde3b2bd8cbf
SHA5123b50c55f4f4ca054f7d75e8fb49d9d794fbd200e2be2773a362ad7671052839239ad7b395dfdc1f55f3b53ccea80b37e0e7bfeecdebe8f3e98afe9b93ab2c061
-
Filesize
454KB
MD5bece984ec1b5cf0c936b03488ed035a2
SHA142672d98362521a2d0a0da4ac750079b6e45c582
SHA256bb90cc33e368654f57b08c9d2a4ebcf8e723757b997dc60c55b9964680071ff2
SHA5122ae39d4fd3ad7f01b1f12b7b1df3366568e84c0f8596241197c1e9ca5cdd44ee1a706b9dea5f53121d2c00cbd9dcdfb97a9c41e7afbabfaf675cd7e7699d1f30
-
Filesize
3.0MB
MD530f7a174e44be1fd6fc9e24b05edca24
SHA16356342fea69d182efe019f388e7169a3ee820de
SHA256c13b6b090847741433c50e229875100d7a7debb20940fbf99e287f46379c1371
SHA512c60878ce10e536f797894447cc0141e19af1aa1386c3d7a57e3904f3d5a40e4e7bb49c109fb2b61cc5bbd7ef1be6cf38a37447a97ea88efb826a0584cb97e508
-
Filesize
454KB
MD5bece984ec1b5cf0c936b03488ed035a2
SHA142672d98362521a2d0a0da4ac750079b6e45c582
SHA256bb90cc33e368654f57b08c9d2a4ebcf8e723757b997dc60c55b9964680071ff2
SHA5122ae39d4fd3ad7f01b1f12b7b1df3366568e84c0f8596241197c1e9ca5cdd44ee1a706b9dea5f53121d2c00cbd9dcdfb97a9c41e7afbabfaf675cd7e7699d1f30
-
Filesize
3.0MB
MD530f7a174e44be1fd6fc9e24b05edca24
SHA16356342fea69d182efe019f388e7169a3ee820de
SHA256c13b6b090847741433c50e229875100d7a7debb20940fbf99e287f46379c1371
SHA512c60878ce10e536f797894447cc0141e19af1aa1386c3d7a57e3904f3d5a40e4e7bb49c109fb2b61cc5bbd7ef1be6cf38a37447a97ea88efb826a0584cb97e508
-
Filesize
167KB
MD5e6206aadd29eb87ab1d398266885b5a4
SHA16bdb54ed5fe55c9a1977cf2f3b27bc0ed560a889
SHA256e55f6e08ff8baed84b5de903466311ae08b15e99dbbea2b5764d855a52e6fad8
SHA51282739ccbf1823dce179eba73948f1f2263213d12d684282dfaaed3f147528074df82468453ed33b504d10d84357d834c0f29d928274d45ddfdc69a88989f2522
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB
Filesize765B
MD570a71c0974d75e0f92ff009db6d2e4c0
SHA1135672bddd9b8b7419a538a9354b92f5528a5fb5
SHA256690d500a922de8ef35d77e9cf49fdc8896783dd8e8fcba1b48e737af7082e0b8
SHA512ed8111964831b0e58bafec5b75a7d79137006c2a960df506158f1acab97a282192f9edfb04329fa3d3282e85a44cab38333c7e142cda7772c6be337c9728964d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AEACCDA8653DD8D7B2EA32F21D15D44F_E490EA7FE9CCA5E70E3DD1BCBE4988BC
Filesize637B
MD54d5b34f9c31fc254cd23897db0ec9bcb
SHA182e25b7fb504b2ad11bd7d765d1be2efbc7585c8
SHA256158e7fc9d3810590dad736cafc6ddf4c65e8ec3a8ef728adf36820ecdfe414ac
SHA5123c418e2a73b242d009bda3756e771a463bacf8e57024b16588656fc7c005915b55cb2d31d7e2ac1ac00abe739a15b2547611fa33c073322000831204c41a03a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F
Filesize1KB
MD59210c5a817a690d6850087f678c435bb
SHA19139f7f514119ff49eb67185150bad8defcb0524
SHA2566509bfffa24551ae43cac49096d26d46d1894b3bb5ef124f3e38549b2da6afae
SHA512b1210b4900c4a417d43fedea1a26d0398a8b2668685738ca831fb787a103795c7c713b4c3506a93131de8f14fd6f271308da829136e752a729966fd0e86df30c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB
Filesize484B
MD5553778404a29e727d9a7aaff9a0ac17a
SHA141e8df14c7cd5b5b4642c8a976de30f80fe1ec5c
SHA256ec0764cce0de9e41fead95f6b879180fa1886b7cb7b164140a2bfac5a3f0a153
SHA51217bea195759c609634d723ec7effd0165dd058a110c4b8a6bc1c9480b975446bd47505a82fc769e867715fc5fe13e8706966b16a22145a36c1bc79bb855b1ce6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AEACCDA8653DD8D7B2EA32F21D15D44F_E490EA7FE9CCA5E70E3DD1BCBE4988BC
Filesize488B
MD5e532eeac06925c96e1af0a43a97d3933
SHA1dab21ead24a14c876dd9d24d931636737c4e0ba0
SHA256c1a0bd290171844291a0e47a0f4d7a212a61e6b13452f27e6de2d1f980b88e3a
SHA5126ca83f4c54694d36bc59b11084f04e8affe29e7ffe874d04787883056716ba893be472dc65ec384cd24203d9db14fbd50a03740b40c549a859f9ef8f744458fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F
Filesize482B
MD57832550d8207fc2f66796b86af38a122
SHA119dde0bd21ded3c9604c95024c200d9219b0d16f
SHA256cdc44fcd0dd83dbd00a42b9157072b9a976e0208282be1cb180a04c7791b12e0
SHA512b173aed4d0a76e20396318853394da25e88d433363446ba23bf13fb74dddda9753017bee86ea0e2960013970f31f359c17656a3a90fe76d9bdeb2e11635af0b9
-
Filesize
1KB
MD5ca4923e942db86b0e1143cda0275c8e8
SHA1485e9d1ffbfbba3eb941c53b80eddae9152e8b1c
SHA256ec12426c580f4473812d8d5633194f616a89c3ec90c2774ca77372e10031b67b
SHA512c17d1278bc430812821202b87426593cffc41307bf7e096f97b1bd247906e9a1157c3902b8a578892908952ca77a4c426b0bfda3f52743db996453019aed81f4
-
C:\Users\Admin\AppData\Local\Temp\Quick_Driver_Updater_exe_410182022109245055287816\Quick_Driver_Updater.exe
Filesize6.4MB
MD54aae3da061f772f90bae6902c72f7cf2
SHA1c27cbebaa722793d0208e9908079d2caea70dace
SHA2564df4c5e467ca99103d85bb250cda1279240bc2a7e892a0b174d32d8efe18b903
SHA512068fa6af3e7e7ab862ae7789d7fea5a6e748f7e8a9268e43bedbb26f6fce99d97ae9915907319ae1482e67cfd0fdfddfa01c0e74070624c51369bd61316d17bd
-
C:\Users\Admin\AppData\Local\Temp\Quick_Driver_Updater_exe_410182022109245055287816\Quick_Driver_Updater.exe
Filesize6.4MB
MD54aae3da061f772f90bae6902c72f7cf2
SHA1c27cbebaa722793d0208e9908079d2caea70dace
SHA2564df4c5e467ca99103d85bb250cda1279240bc2a7e892a0b174d32d8efe18b903
SHA512068fa6af3e7e7ab862ae7789d7fea5a6e748f7e8a9268e43bedbb26f6fce99d97ae9915907319ae1482e67cfd0fdfddfa01c0e74070624c51369bd61316d17bd
-
C:\Users\Admin\AppData\Local\Temp\draw_io-13_9_9-windows-installer_exe_210182022109191406136285\draw.io-13.9.9-windows-installer.exe
Filesize70.7MB
MD56383382cf2950ec6dab0255ad3426982
SHA12df82de8fd8408f0a7b96596f01cd1021ad816bf
SHA2566adbe273b47867fa881e44e17549214741039be1db9fd1f51f23fab6727ea053
SHA51200b08fda74d68c62867de01059f45a246a8294e534f36b40b6b5602bf2371ebebe800aa0260625a3ae7922a8c8e3289ba683c0a5d2db581e39c591e028e192ae
-
C:\Users\Admin\AppData\Local\Temp\draw_io-13_9_9-windows-installer_exe_210182022109191406136285\draw.io-13.9.9-windows-installer.exe
Filesize70.7MB
MD56383382cf2950ec6dab0255ad3426982
SHA12df82de8fd8408f0a7b96596f01cd1021ad816bf
SHA2566adbe273b47867fa881e44e17549214741039be1db9fd1f51f23fab6727ea053
SHA51200b08fda74d68c62867de01059f45a246a8294e534f36b40b6b5602bf2371ebebe800aa0260625a3ae7922a8c8e3289ba683c0a5d2db581e39c591e028e192ae
-
Filesize
2.7MB
MD5348e9aad9e445392ba5c9fe96daf6f8b
SHA1e04d450778d05cabb111903892dda0cdb288cd98
SHA2565bae7f43baa254ce2eba9018e11c575730427d4fdf3146165755cd4bb07c3e53
SHA512c19e21b4ce0908bd5b0d7f606f6ee44d0b8839ddcab7067933092a707d21131b7379a1850e35475e57be62cba1b61abde61331bd1bccdd875e756bb296f34024
-
Filesize
2.7MB
MD5348e9aad9e445392ba5c9fe96daf6f8b
SHA1e04d450778d05cabb111903892dda0cdb288cd98
SHA2565bae7f43baa254ce2eba9018e11c575730427d4fdf3146165755cd4bb07c3e53
SHA512c19e21b4ce0908bd5b0d7f606f6ee44d0b8839ddcab7067933092a707d21131b7379a1850e35475e57be62cba1b61abde61331bd1bccdd875e756bb296f34024
-
Filesize
100KB
MD5c6a6e03f77c313b267498515488c5740
SHA13d49fc2784b9450962ed6b82b46e9c3c957d7c15
SHA256b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
SHA5129870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803
-
Filesize
12KB
MD50d7ad4f45dc6f5aa87f606d0331c6901
SHA148df0911f0484cbe2a8cdd5362140b63c41ee457
SHA2563eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
Filesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
Filesize
3KB
MD51cc7c37b7e0c8cd8bf04b6cc283e1e56
SHA10b9519763be6625bd5abce175dcc59c96d100d4c
SHA2569be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
SHA5127acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f
-
Filesize
3KB
MD51cc7c37b7e0c8cd8bf04b6cc283e1e56
SHA10b9519763be6625bd5abce175dcc59c96d100d4c
SHA2569be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
SHA5127acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f
-
Filesize
3KB
MD51cc7c37b7e0c8cd8bf04b6cc283e1e56
SHA10b9519763be6625bd5abce175dcc59c96d100d4c
SHA2569be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
SHA5127acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f
-
Filesize
3KB
MD51cc7c37b7e0c8cd8bf04b6cc283e1e56
SHA10b9519763be6625bd5abce175dcc59c96d100d4c
SHA2569be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
SHA5127acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f
-
Filesize
9KB
MD5466179e1c8ee8a1ff5e4427dbb6c4a01
SHA1eb607467009074278e4bd50c7eab400e95ae48f7
SHA2561e40211af65923c2f4fd02ce021458a7745d28e2f383835e3015e96575632172
SHA5127508a29c722d45297bfb090c8eb49bd1560ef7d4b35413f16a8aed62d3b1030a93d001a09de98c2b9fea9acf062dc99a7278786f4ece222e7436b261d14ca817
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
4KB
MD5f0438a894f3a7e01a4aae8d1b5dd0289
SHA1b058e3fcfb7b550041da16bf10d8837024c38bf6
SHA25630c6c3dd3cc7fcea6e6081ce821adc7b2888542dae30bf00e881c0a105eb4d11
SHA512f91fcea19cbddf8086affcb63fe599dc2b36351fc81ac144f58a80a524043ddeaa3943f36c86ebae45dd82e8faf622ea7b7c9b776e74c54b93df2963cfe66cc7
-
Filesize
424KB
MD580e44ce4895304c6a3a831310fbf8cd0
SHA136bd49ae21c460be5753a904b4501f1abca53508
SHA256b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592
SHA512c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df