Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-05-2024 01:18

General

  • Target

    39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81.exe

  • Size

    25.8MB

  • MD5

    9b28351713f6b95a04996fee315aa7fd

  • SHA1

    edac4aa27925404263fafdaad6dd375732861ad1

  • SHA256

    39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81

  • SHA512

    7971eacbb3e56be9803abcd11f9fd3246ba763b16de5d3331e984b040c2c9730a9ba085ed1a7d0ae0d24bd28ed108938284111c8f65d011ee0e62c6c2c4fc624

  • SSDEEP

    393216:M+Jsv6tWKFdu9CRXu3AzmqTL6zemNMg56LLnToMjmmV5BBWCJP0/3uj7XlC4t6no:RfmqG3Q3TTyanWCJM/e9Ch6dv

Malware Config

Signatures

  • Detected Egregor ransomware 1 IoCs
  • Egregor Ransomware

    Variant of the Sekhmet ransomware first seen in September 2020.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 18 IoCs
  • Loads dropped DLL 64 IoCs
  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks system information in the registry 2 TTPs 8 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 47 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 5 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 42 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 3 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81.exe
    "C:\Users\Admin\AppData\Local\Temp\39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveUnattended.exe
      "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveUnattended.exe" -regsvc
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks system information in the registry
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:780
      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveProcessChecker.exe
        "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveProcessChecker.exe" -regsvc -expectadmin -starterpid 780 -WorkFolder "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572" -ApplicationType 4
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:2636
    • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveTools64.exe
      "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveTools64.exe" -InstallVDD
      2⤵
      • Executes dropped EXE
      • Checks system information in the registry
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Checks processor information in registry
      PID:4604
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /S /C ""C:\Users\Admin\AppData\Local\Temp\39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81.exe.cmd" "C:\Users\Admin\AppData\Local\Temp\39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81.exe""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3868
      • C:\Windows\SysWOW64\timeout.exe
        timeout /T 3
        3⤵
        • Delays execution with timeout.exe
        PID:1076
      • C:\Windows\SysWOW64\timeout.exe
        timeout /T 3
        3⤵
        • Delays execution with timeout.exe
        PID:2508
      • C:\Windows\SysWOW64\timeout.exe
        timeout /T 3
        3⤵
        • Delays execution with timeout.exe
        PID:3380
  • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveProcessChecker.exe
    "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveProcessChecker.exe" -Service -WorkFolder "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572" -ApplicationType "4"
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1496
    • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveUnattended.exe
      "C:/Program Files (x86)/GoTo Resolve Unattended/1937918270322737572/GoToResolveUnattended.exe" "-RegisteredProcess" "1" "-ParentProcessId" "1496" "-WtsStartingUsername" "-ServiceName" "GoToResolve_1937918270322737572" "-Service"
      2⤵
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Registers COM server for autorun
      • Checks system information in the registry
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Checks processor information in registry
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4840
      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveCrashHandler.exe
        "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveCrashHandler.exe" "--attachment=attachment_GoToResolveUnattended.log=C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\GoToResolveUnattended.log" "--attachment=attachment_unattended.json=C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\unattended.json" "--database=C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\UnattendedCrashReportDB" "--metrics-dir=C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\UnattendedCrashReportDB" --url=https://dumpster.console.gotoresolve.com/api/dump --annotation=format=minidump --annotation=hostname=Objiyuie --annotation=installationid=a09BsaRWd2 --annotation=version=1.15.2.3338 --initial-client-data=0x568,0x56c,0x570,0x544,0x574,0x7482e09c,0x7482e0ac,0x7482e0bc
        3⤵
        • Executes dropped EXE
        PID:1528
      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveLoggerProcess.exe
        GoToResolveLoggerProcess.exe -ParentProcessId 4840 -CompanyId 1937918270322737572 -InstallationId a09BsaRWd2 -MonitoringUrl https://dumpster.console.gotoresolve.com -HostId f35a6a105df53dca4111781156b6ab04 -LogLevel 2 -MonitoringApiKey cnl6269ktie1dcpmz8y2ddxhjhhgi0nebxwpr4a3c71lbfwnubk2w7l7c6evabi3 -SessionType Unattended
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:3180
        • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveCrashHandler.exe
          "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveCrashHandler.exe" "--attachment=attachment_GoToResolveLoggerProcess.log=C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\GoToResolveLoggerProcess.log" "--attachment=attachment_logger.json=C:/Program Files (x86)/GoTo Resolve Unattended/1937918270322737572\logger.json" "--database=C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\LoggerProcessCrashReportDB" "--metrics-dir=C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\LoggerProcessCrashReportDB" --url=https://dumpster.console.gotoresolve.com/api/dump --annotation=format=minidump --annotation=hostname=Objiyuie --annotation=installationid=a09BsaRWd2 --annotation=version=1.15.2.3338 --initial-client-data=0x4d0,0x4d4,0x4d8,0x4a4,0x4dc,0x7482e09c,0x7482e0ac,0x7482e0bc
          4⤵
          • Executes dropped EXE
          PID:1260
      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveFileManager.exe
        GoToResolveFileManager.exe -CompanyId 1937918270322737572 -InstallationId a09BsaRWd2 -LogLevel 2 -MonitoringUrl https://dumpster.console.gotoresolve.com
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2316
        • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveCrashHandler.exe
          "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveCrashHandler.exe" "--database=C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\FileManagerCrashReportDB" "--metrics-dir=C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\FileManagerCrashReportDB" --url=https://dumpster.console.gotoresolve.com/api/dump --annotation=format=minidump --annotation=hostname=Objiyuie --annotation=installationid=a09BsaRWd2 --annotation=version=1.15.2.3338 --initial-client-data=0x5f0,0x5f4,0x5f8,0x5c4,0x5fc,0x7482e09c,0x7482e0ac,0x7482e0bc
          4⤵
          • Executes dropped EXE
          PID:4872
      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveQuickView.exe
        GoToResolveQuickView.exe -InstallationId a09BsaRWd2 -LogLevel 2
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks system information in the registry
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3492
      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveTerminal.exe
        GoToResolveTerminal.exe -CompanyId 1937918270322737572 -InstallationId a09BsaRWd2 -LogLevel 2 -MonitoringUrl https://dumpster.console.gotoresolve.com
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4108
        • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveCrashHandler.exe
          "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveCrashHandler.exe" "--database=C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\TerminalCrashReportDB" "--metrics-dir=C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\TerminalCrashReportDB" --url=https://dumpster.console.gotoresolve.com/api/dump --annotation=format=minidump --annotation=hostname=Objiyuie --annotation=installationid=a09BsaRWd2 --annotation=version=1.15.2.3338 --initial-client-data=0x5e8,0x5ec,0x5f0,0x5bc,0x5f4,0x7482e09c,0x7482e0ac,0x7482e0bc
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          PID:3224
      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\DeviceDataModule\1.71.0\GoTo.Resolve.DeviceData.App.exe
        "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\DeviceDataModule\1.71.0\GoTo.Resolve.DeviceData.App.exe" --Credentials:CompanyId 1937918270322737572 --Credentials:HostId syn-prd-ava-unattended-8e5d127a-7247-4442-9464-04325cf6c408 --Communication:IpcFolderPath "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\DeviceDataModule\IPC" --Authentication:TokenFilePath "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\token.txt" --ZeroTrust:ReferencePublicKeyHash 79297ed57ba94f2dde0d121e431d4ed4d8f143a35e3f89ed9b9c2fc1c3015ae8 --Native:Version 1.15.2.3338
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        PID:972
      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\PatchManagementModule\1.2024.0507.5\GoTo.Resolve.PatchManagement.Client.exe
        "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\PatchManagementModule\1.2024.0507.5\GoTo.Resolve.PatchManagement.Client.exe" --Credentials:CompanyId 1937918270322737572 --Credentials:HostId syn-prd-ava-unattended-8e5d127a-7247-4442-9464-04325cf6c408 --Communication:IpcFolderPath "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\PatchManagementModule\IPC" --Authentication:TokenFilePath "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\token.txt" --ZeroTrust:ReferencePublicKeyHash 79297ed57ba94f2dde0d121e431d4ed4d8f143a35e3f89ed9b9c2fc1c3015ae8 --Native:Version 1.15.2.3338
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1968
        • C:\Windows\SYSTEM32\where.exe
          "where" -r "C:\Program Files\WindowsApps" Winget.exe
          4⤵
            PID:3092
          • C:\Windows\SYSTEM32\where.exe
            "where" -r "C:\Program Files\WindowsApps" AppInstallerCLI.exe
            4⤵
              PID:3340
          • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\RemoteExecution.Runner.exe
            "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\RemoteExecution.Runner.exe" --Credentials:CompanyId 1937918270322737572 --Credentials:HostId syn-prd-ava-unattended-8e5d127a-7247-4442-9464-04325cf6c408 --Communication:IpcFolderPath "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\IPC" --Authentication:TokenFilePath "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\token.txt" --ZeroTrust:ReferencePublicKeyHash 79297ed57ba94f2dde0d121e431d4ed4d8f143a35e3f89ed9b9c2fc1c3015ae8 --Native:Version 1.15.2.3338
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious use of AdjustPrivilegeToken
            PID:2620
          • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\AlertsModule\1.2024.0430.2\GoTo.Resolve.Alerts.Monitor.App.exe
            "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\AlertsModule\1.2024.0430.2\GoTo.Resolve.Alerts.Monitor.App.exe" --Credentials:CompanyId 1937918270322737572 --Credentials:HostId syn-prd-ava-unattended-8e5d127a-7247-4442-9464-04325cf6c408 --Communication:IpcFolderPath "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\AlertsModule\IPC" --Authentication:TokenFilePath "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\token.txt" --ZeroTrust:ReferencePublicKeyHash 79297ed57ba94f2dde0d121e431d4ed4d8f143a35e3f89ed9b9c2fc1c3015ae8 --Native:Version 1.15.2.3338
            3⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious use of AdjustPrivilegeToken
            PID:3216
          • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\AlertsModule\1.2024.0430.2\GoTo.Resolve.Alerts.Monitor.App.exe
            "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\AlertsModule\1.2024.0430.2\GoTo.Resolve.Alerts.Monitor.App.exe" --Credentials:CompanyId 1937918270322737572 --Credentials:HostId syn-prd-ava-unattended-8e5d127a-7247-4442-9464-04325cf6c408 --Communication:IpcFolderPath "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\AlertsModule\IPC" --Authentication:TokenFilePath "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\token.txt" --ZeroTrust:ReferencePublicKeyHash 79297ed57ba94f2dde0d121e431d4ed4d8f143a35e3f89ed9b9c2fc1c3015ae8 --Native:Version 1.15.2.3338
            3⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious use of AdjustPrivilegeToken
            PID:5028
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
        1⤵
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1960
        • C:\Windows\system32\DrvInst.exe
          DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{bf826117-e460-2344-b279-d03a19ba702c}\g2rvdd.inf" "9" "415529917" "0000000000000148" "WinSta0\Default" "0000000000000158" "208" "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\x64"
          2⤵
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Checks SCSI registry key(s)
          • Modifies data under HKEY_USERS
          PID:3012
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start GoToResolve_1937918270322737572
        1⤵
        • Launches sc.exe
        PID:1808

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\FileManager.dll

        Filesize

        16.1MB

        MD5

        d3fa69a91fe17f9c4523d8fad2992f78

        SHA1

        d2a353b94ba3d718a489af7fe72cc858b74fe87e

        SHA256

        94df392a600acb29ff711f164073c1c80bbcf270dcc5a4cd8cba8e762b1ae40f

        SHA512

        cf2b0898bbf783e49112c61a7373c896856c5e5777d229b791804b29ab288f7613c5a67f4ebf38389d9b9c2100b88e93489a8d8aae68b090d9c7d6283d647e86

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveCrashHandler.exe

        Filesize

        1.1MB

        MD5

        c6e96dd2f500e4b3cedf7e627015e032

        SHA1

        35ea9753ca13c92971eff137c1cee613c0e93cab

        SHA256

        2b4556e9c709e1da52cab89aa754fab86c7bb5265e63850dc133dc4ca387fc70

        SHA512

        06e557d87fed5a1ff9d5d6a520429f6dc6d97e3f2952524ce30af5c25b017d39c15ce189092d0a9234c827510a07020cd31b9d172d60a8fdae6ad3f430b6339d

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveFileManager.exe

        Filesize

        109KB

        MD5

        62912afba6014da200e40c49f685f084

        SHA1

        38e4bd808305bf4b41c10da91daea49587743e32

        SHA256

        b2fc90c66d76aa33da449039e6ea5f66b43880b3ef86e7ae263e1e113f7c3296

        SHA512

        351938c08a92b663727ffb3b2f4a3377104013b3680f7ccd60394463c3b8992ea0e6115ebe847e0cfd9dba942c219af51de334204b2afdcc663a15901a81603f

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveLoggerProcess.exe

        Filesize

        109KB

        MD5

        d319e53da0d6ea80140611a19dd6c468

        SHA1

        e47768dbad5bc1bf81bd9f135c9d7a4f62de4573

        SHA256

        dc21f66e9dd2ca56504c3dcc02862117f2da94f212b289d3b09349bc59f57a25

        SHA512

        092617eb831cde6da475a759f9962c94ca70b78905f892a3a798a21cfe8d1e8e50d72dd0d2cdc89949a5f81e6a5d85b1597712112934a3ffab271b750089e32b

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveProcessChecker.exe

        Filesize

        107KB

        MD5

        5145ef194fdd47be876847e9b9534cdc

        SHA1

        34711371a01494b7432528821c75bd5fcfe851a4

        SHA256

        34e6f7d1fd0aa8b20cb8cac184b8ecd90c157ccc62e38568699efa10c411c7ea

        SHA512

        7e5fdaea1bb2501bc52801c11f36bbd6d165282eb920cddaba59a5c5999be57032a5e9f2b5196f54b300c51ae99381e7e1c831fa73422e0065174385a3ef6757

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveQuickView.exe

        Filesize

        109KB

        MD5

        507b2e37df1a16dadbb308b874984b31

        SHA1

        1a522ce23cd94052760ddf2109ff7b06e3f3735d

        SHA256

        72d654e3f4f292ed8c8bb56ef29f1400fa38a943b4e9eff09fa5fe11e0145d32

        SHA512

        1ec31fe64d1dc629cdd149a40b08b5a78b22e6d05d195a2184806543d0b88d144602bb44da29c77ffea2757932cc7bd743fd9860e499b88e91ccc6fc80e37ada

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveTools64.exe

        Filesize

        1.3MB

        MD5

        c3d3d6a881753584b29d60f4c5b6a965

        SHA1

        0952c70ea06b932a6c20cf8af10d3aa281880b7c

        SHA256

        f36b1c32a5fa8969422d99042287685634bb8d85c9643100032e9df5744dd39e

        SHA512

        5d1ebc3603690d1534d0624ffb73f947d1afe48f407540e07810df89ab737b47a1728a1829f9207be26bf03c2da3e7097ab8aedf31b212fc25ffe2ed632edcbf

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveUnattended.exe

        Filesize

        109KB

        MD5

        0e688254065af78d95a3fdf159ab8d86

        SHA1

        e1178f76ea31e1009f631ca0f0b948807392faa9

        SHA256

        1b6fc8321728fccd3a9a0f88f51ab115f0c6d227d644b948d9d0b58d1123c923

        SHA512

        71efb2e36026fd859522c593662ac7f607ad639027c0fa6cc2f4fc9e0c0bc9156ca4e90448f3e2795d693bad0d337b28147bea33747687524da70e598ddb430c

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\LibGoToResolve.dll

        Filesize

        19.7MB

        MD5

        c2b7eec9b082f83609d40a977c980c09

        SHA1

        e68345a8387c9644e1cc695ea1f8273e2911c63b

        SHA256

        1f13a2911d6cad19314f330bab9a57d81c8323575fdc7182e1c2eb6f844ba89b

        SHA512

        e0032b2acd49f20def25e799c39c7d9648e55250fb851c64b7a52b29aecfb5a3f8a83ded6963e221d16259b0e064504f92f1991a53c1e6a1a01044136e53de4e

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\MediaClientLib.dll

        Filesize

        13.9MB

        MD5

        12c3b59bbafa6ea8d0d3209e70ad39c2

        SHA1

        7f699dd519c20ecf8bf24947d03868c580913b39

        SHA256

        c132232018896ba3f84ff37a1ece4a7a58eef08afecf495fc31176b276b000bb

        SHA512

        55ebe552343ef28939d427f32e5ed98d11d734a65e050917e918efdf400806bbf809d8fc77beb48b6d2f4f5c7961f0c2c8a728691c4f217427578476bf64b10f

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\PasswordPrivacyDll.dll

        Filesize

        1.1MB

        MD5

        7a5ddf82d45f1060ac2386bf4ba89dd3

        SHA1

        ca26ead1e092c6612d7393873854ba0a257ae832

        SHA256

        95743c6c9d2f626fa66c3b95e2b3c003313089f653681c82c1e9c214ddd2778d

        SHA512

        5ad98d4985d36d6259027374c600913a5729635c71453c6191510ac1c4f3b9b732c6436eb49b9c0ddb2af753b08c699c1ca6c26c151cf52fce9cdb2b5a77bd5d

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\GoToResolveProcessChecker.log

        Filesize

        8KB

        MD5

        fe3c6d6887d206f0c7fe739fa0aa92df

        SHA1

        119667a720111c90c98e0b3b20a334305a12f76b

        SHA256

        f85367da7c6ae5e6dbb69211a218eb3467e83554616616cc15da27564979d41f

        SHA512

        fbf11dde8da4dedd20573fb7499c412e41d74042fc651e271dab5f6b37405e0197bd50e49ac527b72d40296f18f4fb5d1aa287dcc32880229c6168c70207f0cd

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\GoToResolveUnattended.log

        Filesize

        28KB

        MD5

        e20948f716b42d819a7c7704ffd35696

        SHA1

        94e7d8d8d030ef568a29ef5138bb95e6b0ffa798

        SHA256

        ae82e2e694796c94df8f879173c43bb0a98fee97300f937d3fb4fe6282d520b9

        SHA512

        3c8ba110e947c222bd117f74c9af5f478bec41e02965d542dcbc0e146b1a4106d3bff0bf295d4fa8ca0b07848cb985652839e4cda2a72186517c97320ec283a8

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\AlertsModule\1.2024.0430.2\logs\2024-05-17.log

        Filesize

        1KB

        MD5

        5a6a1f16574c1cb96feca277c2886e59

        SHA1

        f0b34700b907cd97bdbc3c9ac4c5d3ce126d5b1f

        SHA256

        f6b02f5f75849d1ffb714efd0238c7414b20457c03f527efc7c452bcd86cab41

        SHA512

        9e6b52c3c785457574f2ef1b547543986b3578bd70f5c3b01b36d61fed172b5422f082478664edebb2c88570aa51188bcc7a44c85f9360a1add1e8b0cce36c2d

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\AlertsModule\1.2024.0430.2\logs\2024-05-17.log

        Filesize

        4KB

        MD5

        7ed53cc73d14d53f09fb8b1678bd4763

        SHA1

        c52a8537d0129b7424b557484b9f96d0b714ef06

        SHA256

        96b77e6ccf1c2b388821027cfda6e2bee0107c3fecae33b076b376323cb37d12

        SHA512

        a1d2261d964db9a3bcd02b8dc4b90c99c2796b8d9bbbe5c686da6840f743e4286b5afd819dc9b03e733e702e061607340e042eba376d34ef13d33d868dc827df

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\DeviceDataModule\1.71.0\GoTo.Resolve.DeviceData.App.exe

        Filesize

        11.5MB

        MD5

        5c76b75ea22c81a9224456f77ab1175f

        SHA1

        b681216752e17148d341390d1c778e4c5ba33364

        SHA256

        0bc404e30bdad9be1d7ed633adc054800f2e7e757e6414795136c0a896b0bb87

        SHA512

        a18172f9ba6f6ee62c64cd4f506791c9592436a7cd9f06710794e86a26748bd6d51406420cfc89474fe0c1375e56f3ce1ccc834cd1799a5cc7decadcf63eef0a

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\RemoteExecution.Runner.exe

        Filesize

        164KB

        MD5

        840ed278c7882f3b877df906937aa3c5

        SHA1

        0262be6cd5f1596e5b54ecc910efd6e277920c03

        SHA256

        8f70badc067ff6e828d6afccaead174a7623a8ef89c1c81a614f5fa8648f1019

        SHA512

        2e2ae3b5ba9b9394f386c2243da93ad3f7f35102f50be2206bf06cd48401bb8de5e1fb4ab18b29fa53ad8530474fdef3490df98aca7bc3ba2295485b911630c2

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\libcrypto-3.dll

        Filesize

        4.2MB

        MD5

        dc2bd7e6e6a3b528424410af077ba2a7

        SHA1

        aa891f61820e7c6d0ed35989a595af77f4b7203b

        SHA256

        e852018ec59efbe2dc2e32c064f35ee68171417d8c5bc5ba319609555dde2bc6

        SHA512

        a96f57f5d0272f8ba4ccb1b184289f0caeace54d001f641622fe38892fa9d0f6781808cf5a585d77fc75c356bb90c03a062b2fb17b09a29e20b0264b12c8358f

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\libssl-3.dll

        Filesize

        1.1MB

        MD5

        4f19c36b09b820d9371d8b6510497475

        SHA1

        03b8ee682eeac39e120aac474a54344c2b391150

        SHA256

        11598140036154dcd8ccd5619ac059aea4012cf9a4535ffa7c9b2f0ae405906d

        SHA512

        8ed2ee897c54abf13beae299902018861c4bc30a1ce5d14a64129af3856a3d2e5829eb060a99f7ea7bb894966e21a2d5eec473323883c865c0caed9de832d1b6

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\logger.json.tmp

        Filesize

        375B

        MD5

        44e28e7f1d04b2cdb26f706eb6f1a9ab

        SHA1

        4d6c72513e059122c6533bf93a1a838819db1889

        SHA256

        49508c56717c40172f09d25c14e9a0f42fc8f03a906b1b84f3eee6cd1bee657d

        SHA512

        e78ad1b5c3b4321a394bcbd33293d1be4c074b9c0f7e815950ad60294230f03d06627b6a7fda5cba565da950efc63a5d112d6274842ab3df9a313deb891b2b53

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\mandatory.json

        Filesize

        74B

        MD5

        f50767df127a399996304f5a1259653a

        SHA1

        0a03f644be27865e0031b235ca6a21353e265ed7

        SHA256

        afc6a427fd31151d995e93e66edd9138df27dc88580b03b12d8a8012c481f3bd

        SHA512

        29898528d9047d2689de8be7938662c0e80c5161c20fcb9fa9135378b2c2193c6185cd560148f3fd7100824f7f43265434d9982c1b85933f3d00490804c7853e

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\mandatory.json.tmp

        Filesize

        1KB

        MD5

        ec54b6d9d7bdc6f5186b2153480de7e6

        SHA1

        e6df5346cb0ca83d2e3a7385d39b2e8929b4c44a

        SHA256

        3f03911d3bfd349767124a665912153d207bad0a58aedcb4e005433c205847f4

        SHA512

        30d90003be867d17b363d8bb4b37656b39c156bd5766b7f50e368b807dc99c9ae56fe80c18526faef23b427aaf95c23bbbca602ca3eb45c039c4a996428f0430

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\unattended.json

        Filesize

        582B

        MD5

        c5b571903e37d2b955cd21f584471ed3

        SHA1

        267332217a876f04c16e8b92141fa8321dd6fc74

        SHA256

        f967768b99cebe2225ef1c41d9ee31c21f9014f87f29cf30c487b448aa074dfa

        SHA512

        e849d1bfceaa9450505c27119ec407d19b017a3748d907c73fcb915b46fbf7b1bb75c85be066d8898cdbda0d942389c965f2102522cd049211269f4ba4cdac3a

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\unattended.json.tmp

        Filesize

        703B

        MD5

        49271953cc7e7b5b920c292bd93026c1

        SHA1

        bddb772d4c859a56bea173c61023f973600d4bd8

        SHA256

        19eb67cc4ed0b294ba19f7ff2ab3c3f616cb05f27b9d6b87071fa52b9754b8ef

        SHA512

        d8e74aaf6eb247b64f2881711cd15d490a21373a197142aa9edb6593fed1d39b44e38c7783621b47b56b78861920dba720d311ad601150905f2365544acbf224

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\unattended.json.tmp

        Filesize

        1KB

        MD5

        5f05f950d05fd102878da7c91f6b567e

        SHA1

        9b1378f9e08d5db57a575b7149aa89310c5d1946

        SHA256

        60fd37449ac9050fc4db20f10b8671a4f35e821b6eee9fb4c939f16167120636

        SHA512

        4b76d1a9948dcdc69bad284167736d3807c63f9faac87b2ed9feea0322cecc4698a0809b60605091e191999f70b9263696ed7efdfa7bcc13f1eb6d44433c44a5

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\unattended.json.tmp

        Filesize

        1KB

        MD5

        f04525148fcd222fddfc876734dfb017

        SHA1

        fe2c657e820f2111a5e9feb51ba96a2128ffb3af

        SHA256

        3629ad46423b8150a6ec21c1412f958c8331f4e2bf01c49ec8f224a5df5cd1c3

        SHA512

        ea08b2f9f459e42c22970123a45d511fb38900d13b414e7013a24a14eaad26796ef9fe76836c9290a9898d4b553c07520e8acbcabe24cd0031f3796f778b61b1

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\unattended.json.tmp

        Filesize

        1KB

        MD5

        e6464a2670a2caef554ffbdb459dcee8

        SHA1

        6424382cbf3909b17fc3b298da9eaf9418b5c885

        SHA256

        be9cc4edc8727a0656d1ceeca29030255b34e25fb6607770af920b558b5b6436

        SHA512

        f09aee2d45774ccc6074878db0f96fab8840307b624e03fb46bcf8c8e23b7214490f474f158c4da03136168caf7ddd70d0df11d7dc005646bef899546307ab8b

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\unattended.json.tmp

        Filesize

        1KB

        MD5

        421d95aa876f95215ee8d000e88ff2c6

        SHA1

        d42911b7b360a172049242b8bbdd04ea9dfa00b3

        SHA256

        b9fe3ef599a8984d1e58ab10194d98c019115f82b80778c13edbebcd3a68c8fd

        SHA512

        7044a01940d6a76234618492945e93e178d6ede0088b340d3668e5c17c9d627cd4160b0eec334745be8b3755d5239f450e26417b207fd0ecab5b89a7e9b5a89d

      • C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\unattended.json.tmp

        Filesize

        2KB

        MD5

        1fec8a510fa8f8c5eca3ca57eaef87aa

        SHA1

        93d085863b627dff5ece72a3cf9fda5c9fce9cff

        SHA256

        9be0b584f97789d0c9d1730f0caa51700762e78e8ea9688b6d07f78318627d06

        SHA512

        9e71a1363fb8412d02edf320b947b8dffcc253ef2b4bd3f11de61c5919a41045209cc596722c7b19c411653696d04bd96321a3d13c7a9b4dffa64114c9842baf

      • C:\Users\Admin\AppData\Local\GoTo Resolve Installer\GoTo0001.tmp\UnattendedUpdater.csv

        Filesize

        3KB

        MD5

        a6ad2d7d0bda19a2cdb5af8019d5661b

        SHA1

        e049051959a6c6f7d3642aacdf4345e23be1d328

        SHA256

        ac0c4baa041c62636eae153a846992b236ddcdee63ca8f18af78ab2c4caa68a2

        SHA512

        84b0390ffade75b9a26b606d934f0bfdf32dfc130d2ebef1b11197dd69216a175f27e1d9faad30ea311e77c9a177cc2a59f8092fd944fae92a9a0c061ffd5f10

      • C:\Users\Admin\AppData\Local\Temp\39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81.exe.cmd

        Filesize

        537B

        MD5

        2d1ec5c3d0d2fd67e0aa148f4e523d93

        SHA1

        24a6528837fe7c825f44be9e0c2bd942203bb9b0

        SHA256

        5653c22a6d0f410d2a1207c131206c1f990be9a3fcd2c8e5a5dfa77b01d73c1b

        SHA512

        7fdeeb8471cc5916131011186ea9da7c9ccea6b9755bbdec2ecce4f564079c05b566ff147b700b3535fe608e48a69c5d2922d74be5003995a77a19a03bf06f25

      • C:\Windows\System32\DriverStore\Temp\{60337a4f-25a7-444b-94de-719fcdeb38c3}\SET9124.tmp

        Filesize

        10KB

        MD5

        8d2c58325f63af51d37693e7ffbdbc4d

        SHA1

        ea0507cdf4528faa174eb5883eb20b90363ed512

        SHA256

        6fe045e8a6ff18e27c6aceeeb7dbea3e5f3f25c3796d42f0d844b1b48f38c0be

        SHA512

        71ee9b93d70ace69344d9aeb582ab8110eeb5364cd0d593ecd95b2d57000114aac18f2496c160d2b761b0117c5e26d261d757b424fa6e57b91b98b75ac72dd62

      • C:\Windows\System32\DriverStore\Temp\{60337a4f-25a7-444b-94de-719fcdeb38c3}\SET9135.tmp

        Filesize

        141KB

        MD5

        e00f914a13981678cc130f7c65807f03

        SHA1

        0a00739f6f2b1c57946fc09f084deb5bd3d9e342

        SHA256

        484300ed3462124e23f42433678f8110aaebeec2da6b82e97fcd10ba2e60a0b8

        SHA512

        ec278c9d1dc3c066a2a1abd16a4d0f92142941916e0259d0787b7b3146979fba99e273bbbb2fc01fbab79f273d15892434e2685bc2badf4bbb48928d7e89f53c

      • C:\Windows\System32\DriverStore\Temp\{60337a4f-25a7-444b-94de-719fcdeb38c3}\SET9136.tmp

        Filesize

        3KB

        MD5

        79c299099a8f43e1a94047355ebdf1cc

        SHA1

        55ede099780c9e2dcc8cb3dd9006fbf098c8997b

        SHA256

        0a70026b5ac03d6c3c930c245fb992ad9c02192be607e62d27691909f331fe8d

        SHA512

        270c8600ed3c00aa6625bbd2c5777a19949773f8c58ddd560bf2d39fac2e9f5868ed633d60728e8d4a106d97a62d43056d818e1fea565198446c487a83342a7d

      • C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\ApplicationInsights\49a79555446a342df02477815a2e44309b6db288b6f82a7fb9c8c03c3af6f5d9\kkur2iwi.oxq

        Filesize

        1B

        MD5

        93b885adfe0da089cdf634904fd59f71

        SHA1

        5ba93c9db0cff93f52b521d7420e43f6eda2784f

        SHA256

        6e340b9cffb37a989ca544e6bb780a2c78901d3fb33738768511a30617afa01d

        SHA512

        b8244d028981d693af7b456af8efa4cad63d282e19ff14942c246e50d9351d22704a802a71c3580b6370de4ceb293c324a8423342557d4e5c38438f0e36910ee