Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17-05-2024 01:18
Static task
static1
Behavioral task
behavioral1
Sample
39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81.exe
Resource
win10v2004-20240508-en
General
-
Target
39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81.exe
-
Size
25.8MB
-
MD5
9b28351713f6b95a04996fee315aa7fd
-
SHA1
edac4aa27925404263fafdaad6dd375732861ad1
-
SHA256
39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81
-
SHA512
7971eacbb3e56be9803abcd11f9fd3246ba763b16de5d3331e984b040c2c9730a9ba085ed1a7d0ae0d24bd28ed108938284111c8f65d011ee0e62c6c2c4fc624
-
SSDEEP
393216:M+Jsv6tWKFdu9CRXu3AzmqTL6zemNMg56LLnToMjmmV5BBWCJP0/3uj7XlC4t6no:RfmqG3Q3TTyanWCJM/e9Ch6dv
Malware Config
Signatures
-
Detected Egregor ransomware 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023406-57.dat family_egregor -
Egregor Ransomware
Variant of the Sekhmet ransomware first seen in September 2020.
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GoToResolveQuickView.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GoToResolveUnattended.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation GoToResolveUnattended.exe -
Executes dropped EXE 18 IoCs
pid Process 780 GoToResolveUnattended.exe 4604 GoToResolveTools64.exe 2636 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 4840 GoToResolveUnattended.exe 1528 GoToResolveCrashHandler.exe 3180 GoToResolveLoggerProcess.exe 1260 GoToResolveCrashHandler.exe 2316 GoToResolveFileManager.exe 3492 GoToResolveQuickView.exe 4108 GoToResolveTerminal.exe 4872 GoToResolveCrashHandler.exe 3224 GoToResolveCrashHandler.exe 972 GoTo.Resolve.DeviceData.App.exe 1968 GoTo.Resolve.PatchManagement.Client.exe 2620 RemoteExecution.Runner.exe 3216 GoTo.Resolve.Alerts.Monitor.App.exe 5028 GoTo.Resolve.Alerts.Monitor.App.exe -
Loads dropped DLL 64 IoCs
pid Process 780 GoToResolveUnattended.exe 780 GoToResolveUnattended.exe 780 GoToResolveUnattended.exe 780 GoToResolveUnattended.exe 780 GoToResolveUnattended.exe 780 GoToResolveUnattended.exe 2636 GoToResolveProcessChecker.exe 2636 GoToResolveProcessChecker.exe 2636 GoToResolveProcessChecker.exe 2636 GoToResolveProcessChecker.exe 2636 GoToResolveProcessChecker.exe 2636 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 3180 GoToResolveLoggerProcess.exe 3180 GoToResolveLoggerProcess.exe 3180 GoToResolveLoggerProcess.exe 3180 GoToResolveLoggerProcess.exe 3180 GoToResolveLoggerProcess.exe 3180 GoToResolveLoggerProcess.exe 2316 GoToResolveFileManager.exe 2316 GoToResolveFileManager.exe 2316 GoToResolveFileManager.exe 2316 GoToResolveFileManager.exe 2316 GoToResolveFileManager.exe 2316 GoToResolveFileManager.exe 3492 GoToResolveQuickView.exe 3492 GoToResolveQuickView.exe 3492 GoToResolveQuickView.exe 3492 GoToResolveQuickView.exe 3492 GoToResolveQuickView.exe 3492 GoToResolveQuickView.exe 4108 GoToResolveTerminal.exe 4108 GoToResolveTerminal.exe 4108 GoToResolveTerminal.exe 4108 GoToResolveTerminal.exe 4108 GoToResolveTerminal.exe 4108 GoToResolveTerminal.exe 2620 RemoteExecution.Runner.exe 2620 RemoteExecution.Runner.exe 2620 RemoteExecution.Runner.exe 2620 RemoteExecution.Runner.exe 2620 RemoteExecution.Runner.exe 2620 RemoteExecution.Runner.exe 2620 RemoteExecution.Runner.exe 2620 RemoteExecution.Runner.exe 2620 RemoteExecution.Runner.exe 2620 RemoteExecution.Runner.exe 2620 RemoteExecution.Runner.exe 2620 RemoteExecution.Runner.exe 2620 RemoteExecution.Runner.exe 2620 RemoteExecution.Runner.exe 2620 RemoteExecution.Runner.exe 2620 RemoteExecution.Runner.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5de81d42-ce2b-4a7e-b1b7-1312fa11c82b}\InprocServer32\ThreadingModel = "Apartment" GoToResolveUnattended.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5de81d42-ce2b-4a7e-b1b7-1312fa11c82b}\InprocServer32 GoToResolveUnattended.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5de81d42-ce2b-4a7e-b1b7-1312fa11c82b}\InprocServer32\ = "GoToResolveUnlock64.dll" GoToResolveUnattended.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry 2 TTPs 8 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer GoToResolveQuickView.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer GoToResolveTools64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName GoToResolveTools64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer GoToResolveUnattended.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName GoToResolveUnattended.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer GoToResolveUnattended.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName GoToResolveUnattended.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName GoToResolveQuickView.exe -
Drops file in System32 directory 47 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\ApplicationInsights\11624532ce422ae1e7fc411f7cf2679a7518cefe9461376d910905ef4633e2c0\u5lnm1kh.p50 GoTo.Resolve.PatchManagement.Client.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\ApplicationInsights\49a79555446a342df02477815a2e44309b6db288b6f82a7fb9c8c03c3af6f5d9\ljv2cwnk.ehu GoTo.Resolve.Alerts.Monitor.App.exe File created C:\Windows\System32\DriverStore\FileRepository\wvmbusvideo.inf_amd64_c531b5e68fd6f6bf\wvmbusvideo.PNF GoToResolveTools64.exe File created C:\Windows\System32\DriverStore\FileRepository\vrd.inf_amd64_81fbd405ff2470fc\vrd.PNF GoToResolveTools64.exe File created C:\Windows\System32\DriverStore\drvstore.tmp DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1 GoToResolveUnattended.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_325DC716E4289E0AE281439314ED4BFA GoToResolveUnattended.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content GoToResolveUnattended.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3E3E9689537B6B136ECF210088069D55_EF6C9357BB54DDB629FD2D79F1594F95 GoToResolveUnattended.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\ApplicationInsights\49a79555446a342df02477815a2e44309b6db288b6f82a7fb9c8c03c3af6f5d9\rl55itd5.v5c GoTo.Resolve.Alerts.Monitor.App.exe File created C:\Windows\System32\DriverStore\FileRepository\rdvgwddmdx11.inf_amd64_e8336336d081cc11\rdvgwddmdx11.PNF GoToResolveTools64.exe File created C:\Windows\System32\DriverStore\Temp\{60337a4f-25a7-444b-94de-719fcdeb38c3}\SET9124.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{60337a4f-25a7-444b-94de-719fcdeb38c3}\SET9136.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{60337a4f-25a7-444b-94de-719fcdeb38c3}\g2rvdd.inf DrvInst.exe File created C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Keys\4C0B9A131D5B1AD05F0796261DA40D004F3FC6E1 GoToResolveUnattended.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\ApplicationInsights\49a79555446a342df02477815a2e44309b6db288b6f82a7fb9c8c03c3af6f5d9\kkur2iwi.oxq GoTo.Resolve.Alerts.Monitor.App.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\ApplicationInsights\49a79555446a342df02477815a2e44309b6db288b6f82a7fb9c8c03c3af6f5d9\pvprksjk.4m0 GoTo.Resolve.Alerts.Monitor.App.exe File created C:\Windows\System32\DriverStore\FileRepository\displayoverride.inf_amd64_c7a5777273c98ebf\displayoverride.PNF GoToResolveTools64.exe File created C:\Windows\System32\DriverStore\Temp\{60337a4f-25a7-444b-94de-719fcdeb38c3}\SET9135.tmp DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft GoToResolveUnattended.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\ApplicationInsights\bf35fe7d15f2a58d930da8c8f390b78245b9136f9bb24b2713ab881c60fe52f1\g0iz2cwb.duo RemoteExecution.Runner.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416 GoTo.Resolve.DeviceData.App.exe File created C:\Windows\system32\GoToResolveUnlock64.dll GoToResolveUnattended.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3E3E9689537B6B136ECF210088069D55_EF6C9357BB54DDB629FD2D79F1594F95 GoToResolveUnattended.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\ApplicationInsights\49a79555446a342df02477815a2e44309b6db288b6f82a7fb9c8c03c3af6f5d9\oxj2f14x.1ad GoTo.Resolve.Alerts.Monitor.App.exe File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF GoToResolveTools64.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{60337a4f-25a7-444b-94de-719fcdeb38c3}\SET9124.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\g2rvdd.inf_amd64_5e96164a846f7842\g2rvdd.inf DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_325DC716E4289E0AE281439314ED4BFA GoToResolveUnattended.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\ApplicationInsights\49a79555446a342df02477815a2e44309b6db288b6f82a7fb9c8c03c3af6f5d9\ofoe5vir.5rc GoTo.Resolve.Alerts.Monitor.App.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\g2rvdd.inf_amd64_5e96164a846f7842\g2rvdd.cat DrvInst.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1 GoToResolveUnattended.exe File created C:\Windows\System32\DriverStore\FileRepository\c_display.inf_amd64_c7457a37d16eaadf\c_display.PNF GoToResolveTools64.exe File created C:\Windows\System32\DriverStore\FileRepository\rdpidd.inf_amd64_ce12c614d182f4f9\rdpidd.PNF GoToResolveTools64.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{60337a4f-25a7-444b-94de-719fcdeb38c3}\g2rvdd.cat DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{60337a4f-25a7-444b-94de-719fcdeb38c3}\SET9135.tmp DrvInst.exe File created C:\Windows\System32\DriverStore\Temp\{60337a4f-25a7-444b-94de-719fcdeb38c3}\SET9136.tmp DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{60337a4f-25a7-444b-94de-719fcdeb38c3}\g2rvdd.dll DrvInst.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\g2rvdd.inf_amd64_5e96164a846f7842\g2rvdd.dll DrvInst.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache GoToResolveUnattended.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416 GoTo.Resolve.DeviceData.App.exe File opened for modification C:\Windows\system32\GoToResolveUnlock64.dll GoToResolveUnattended.exe File created C:\Windows\System32\DriverStore\FileRepository\virtualdisplayadapter.inf_amd64_bcc7550a6e285f92\virtualdisplayadapter.PNF GoToResolveTools64.exe File opened for modification C:\Windows\System32\DriverStore\Temp\{60337a4f-25a7-444b-94de-719fcdeb38c3} DrvInst.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Keys GoToResolveUnattended.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData GoToResolveUnattended.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\usr\share\squid\errors\templates\ERR_FTP_FORBIDDEN GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\System.Xml.Linq.dll GoToResolveUnattended.exe File opened for modification C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\.sentry-native\838c2e15-26b2-48fb-da29-27b605f80a4c.run.lock GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\lib\squid\negotiate_wrapper_auth.exe GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\Microsoft.AI.DependencyCollector.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\System.Linq.Expressions.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\System.Net.Sockets.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\bin\cygwin1.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\createdump.exe GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\etc\mtab GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\etc\squid\squid.conf GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\token.txt GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\System.Drawing.Primitives.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\System.Runtime.InteropServices.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\System.Security.AccessControl.dll GoToResolveUnattended.exe File opened for modification C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\GoToResolveLoggerProcess.log GoToResolveLoggerProcess.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\usr\share\squid\icons\silk\page_white_picture.png GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\System.Security.Cryptography.Cng.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\bin\cygcrypt-2.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\Microsoft.Extensions.Hosting.Abstractions.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\mscordaccore_amd64_amd64_7.0.1624.6629.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\mscordaccore_amd64_amd64_7.0.1724.11508.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\mscordbi.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\System.Net.WebHeaderCollection.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\FileManagerCrashReportDB\settings.dat GoToResolveFileManager.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\usr\share\squid\man\man1\purge.1 GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\System.Runtime.InteropServices.JavaScript.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\usr\share\squid\errors\templates\ERR_WRITE_ERROR GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\usr\share\squid\icons\silk\box.png GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\bin\cygattr-1.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\bin\cygbrotlidec-1.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\bin\cygkrb5support-0.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\etc\squid\mime.conf.default GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\.sentry-native\838c2e15-26b2-48fb-da29-27b605f80a4c.run.lock GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\usr\share\squid\errors\templates\ERR_ICAP_FAILURE GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\System.IO.FileSystem.AccessControl.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\System.Net.Http.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\usr\share\squid\man\man8\cachemgr.cgi.8 GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\usr\share\squid\errors\templates\ERR_AGENT_CONFIGURE GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\usr\share\squid\icons\silk\application.png GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\bin\cygdb-5.3.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\bin\cygxxhash-0.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\RemoteExecution.Runner.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\mandatory.json.tmp GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\UnattendedUpdater.log 39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\System.Windows.dll GoToResolveUnattended.exe File opened for modification C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\AlertsModule GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\bin\cygevent_pthreads-2-0-5.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\System.Web.HttpUtility.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\usr\share\squid\man\man8\ext_unix_group_acl.8 GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\Microsoft.ApplicationInsights.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\System.Diagnostics.FileVersionInfo.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\lib\squid\security_fake_certverify GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\usr\share\squid\man\man8\basic_ldap_auth.8 GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\bin\cygserver-config GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\etc\rebase.db.x86_64 GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\Microsoft.Extensions.Configuration.EnvironmentVariables.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\Microsoft.Extensions.Hosting.dll GoToResolveUnattended.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\System.Linq.dll GoToResolveUnattended.exe File opened for modification C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\.sentry-native\838c2e15-26b2-48fb-da29-27b605f80a4c.run.lock GoToResolveFileManager.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\usr\share\squid\man\man1\squidclient.1 GoToResolveUnattended.exe File opened for modification C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\.sentry-native\1a282c03-e543-479e-c544-c723f6f76811.run.lock GoToResolveTerminal.exe File opened for modification C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\TerminalCrashReportDB\metadata GoToResolveCrashHandler.exe File created C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\ZtnaModule\1.19.0\squid\usr\share\squid\man\man8\basic_ncsa_auth.8 GoToResolveUnattended.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.dev.log svchost.exe File opened for modification C:\Windows\INF\setupapi.dev.log DrvInst.exe File opened for modification C:\Windows\inf\oem3.inf DrvInst.exe File created C:\Windows\inf\oem3.inf DrvInst.exe File opened for modification C:\Windows\INF\setupapi.dev.log GoToResolveTools64.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1808 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 42 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom GoToResolveTools64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs GoToResolveTools64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 GoToResolveTools64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID GoToResolveTools64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags GoToResolveTools64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID GoToResolveTools64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 GoToResolveTools64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 GoToResolveTools64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\CompatibleIDs GoToResolveTools64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Phantom DrvInst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Phantom DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags GoToResolveTools64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs GoToResolveTools64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID GoToResolveTools64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID GoToResolveTools64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom GoToResolveTools64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 GoToResolveTools64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs GoToResolveTools64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\CompatibleIDs DrvInst.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs DrvInst.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString GoToResolveTools64.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GoToResolveUnattended.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString GoToResolveUnattended.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GoToResolveQuickView.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString GoToResolveQuickView.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz GoToResolveQuickView.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GoToResolveTools64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz GoToResolveTools64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString GoToResolveUnattended.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz GoToResolveUnattended.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 GoToResolveUnattended.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz GoToResolveUnattended.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 1076 timeout.exe 2508 timeout.exe 3380 timeout.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-842 = "Argentina Standard Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2532 = "Chatham Islands Standard Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2791 = "Novosibirsk Daylight Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-202 = "US Mountain Standard Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-82 = "Atlantic Standard Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-512 = "Central Asia Standard Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-652 = "AUS Central Standard Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-105 = "Central Brazilian Standard Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-732 = "Fiji Standard Time" GoTo.Resolve.DeviceData.App.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1721 = "Libya Daylight Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-212 = "Pacific Standard Time" GoTo.Resolve.DeviceData.App.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPublisher\CRLs GoToResolveUnattended.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2062 = "North Korea Standard Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-631 = "Tokyo Daylight Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-42 = "E. South America Standard Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-291 = "Central European Daylight Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-771 = "Montevideo Daylight Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1932 = "Russia TZ 11 Standard Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" GoTo.Resolve.DeviceData.App.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates GoToResolveUnattended.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs GoToResolveUnattended.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C\Blob = 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 GoToResolveUnattended.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2792 = "Novosibirsk Standard Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1871 = "Russia TZ 7 Daylight Time" GoTo.Resolve.DeviceData.App.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-449 = "Azerbaijan Standard Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-361 = "GTB Daylight Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1821 = "Russia TZ 1 Daylight Time" GoTo.Resolve.DeviceData.App.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-441 = "Arabian Daylight Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-335 = "Jordan Standard Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-792 = "SA Western Standard Time" GoTo.Resolve.DeviceData.App.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates GoTo.Resolve.DeviceData.App.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates GoTo.Resolve.DeviceData.App.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-602 = "Taipei Standard Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2591 = "Tocantins Daylight Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-241 = "Samoa Daylight Time" GoTo.Resolve.DeviceData.App.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs GoToResolveLoggerProcess.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" GoTo.Resolve.DeviceData.App.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates GoToResolveUnattended.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPublisher\CTLs GoToResolveUnattended.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2432 = "Cuba Standard Time" GoTo.Resolve.DeviceData.App.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs GoTo.Resolve.DeviceData.App.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates DrvInst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates DrvInst.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2871 = "Magallanes Daylight Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-561 = "SE Asia Daylight Time" GoTo.Resolve.DeviceData.App.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates GoToResolveUnattended.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2162 = "Altai Standard Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-41 = "E. South America Daylight Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-141 = "Canada Central Daylight Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-182 = "Mountain Standard Time (Mexico)" GoTo.Resolve.DeviceData.App.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections GoTo.Resolve.PatchManagement.Client.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-142 = "Canada Central Standard Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" GoTo.Resolve.DeviceData.App.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2321 = "Sakhalin Daylight Time" GoTo.Resolve.DeviceData.App.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5de81d42-ce2b-4a7e-b1b7-1312fa11c82b}\InprocServer32\ = "GoToResolveUnlock64.dll" GoToResolveUnattended.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5de81d42-ce2b-4a7e-b1b7-1312fa11c82b}\InprocServer32\ThreadingModel = "Apartment" GoToResolveUnattended.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5de81d42-ce2b-4a7e-b1b7-1312fa11c82b} GoToResolveUnattended.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5de81d42-ce2b-4a7e-b1b7-1312fa11c82b}\ = "RescueAssistCredProv" GoToResolveUnattended.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5de81d42-ce2b-4a7e-b1b7-1312fa11c82b}\InprocServer32 GoToResolveUnattended.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\MY\Certificates\97E3EEF1934876CB2B8732B78DF413AF267CECBD GoToResolveUnattended.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\MY\Certificates\97E3EEF1934876CB2B8732B78DF413AF267CECBD\Blob = 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 GoToResolveUnattended.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\MY\Certificates\97E3EEF1934876CB2B8732B78DF413AF267CECBD\Blob = 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 GoToResolveUnattended.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 3492 GoToResolveQuickView.exe 3492 GoToResolveQuickView.exe 3492 GoToResolveQuickView.exe 3492 GoToResolveQuickView.exe 3492 GoToResolveQuickView.exe 3492 GoToResolveQuickView.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 1496 GoToResolveProcessChecker.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe 4840 GoToResolveUnattended.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeShutdownPrivilege 780 GoToResolveUnattended.exe Token: SeCreatePagefilePrivilege 780 GoToResolveUnattended.exe Token: SeShutdownPrivilege 2636 GoToResolveProcessChecker.exe Token: SeCreatePagefilePrivilege 2636 GoToResolveProcessChecker.exe Token: SeShutdownPrivilege 1496 GoToResolveProcessChecker.exe Token: SeCreatePagefilePrivilege 1496 GoToResolveProcessChecker.exe Token: SeShutdownPrivilege 1496 GoToResolveProcessChecker.exe Token: SeCreatePagefilePrivilege 1496 GoToResolveProcessChecker.exe Token: SeShutdownPrivilege 4840 GoToResolveUnattended.exe Token: SeCreatePagefilePrivilege 4840 GoToResolveUnattended.exe Token: SeShutdownPrivilege 2316 GoToResolveFileManager.exe Token: SeCreatePagefilePrivilege 2316 GoToResolveFileManager.exe Token: SeShutdownPrivilege 3492 GoToResolveQuickView.exe Token: SeCreatePagefilePrivilege 3492 GoToResolveQuickView.exe Token: SeShutdownPrivilege 4108 GoToResolveTerminal.exe Token: SeCreatePagefilePrivilege 4108 GoToResolveTerminal.exe Token: SeAuditPrivilege 1960 svchost.exe Token: SeSecurityPrivilege 1960 svchost.exe Token: SeDebugPrivilege 972 GoTo.Resolve.DeviceData.App.exe Token: SeDebugPrivilege 1968 GoTo.Resolve.PatchManagement.Client.exe Token: SeDebugPrivilege 2620 RemoteExecution.Runner.exe Token: SeDebugPrivilege 3216 GoTo.Resolve.Alerts.Monitor.App.exe Token: SeDebugPrivilege 5028 GoTo.Resolve.Alerts.Monitor.App.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 620 wrote to memory of 780 620 39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81.exe 86 PID 620 wrote to memory of 780 620 39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81.exe 86 PID 620 wrote to memory of 780 620 39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81.exe 86 PID 620 wrote to memory of 4604 620 39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81.exe 87 PID 620 wrote to memory of 4604 620 39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81.exe 87 PID 620 wrote to memory of 3868 620 39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81.exe 88 PID 620 wrote to memory of 3868 620 39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81.exe 88 PID 620 wrote to memory of 3868 620 39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81.exe 88 PID 3868 wrote to memory of 1076 3868 cmd.exe 90 PID 3868 wrote to memory of 1076 3868 cmd.exe 90 PID 3868 wrote to memory of 1076 3868 cmd.exe 90 PID 780 wrote to memory of 2636 780 GoToResolveUnattended.exe 91 PID 780 wrote to memory of 2636 780 GoToResolveUnattended.exe 91 PID 780 wrote to memory of 2636 780 GoToResolveUnattended.exe 91 PID 1496 wrote to memory of 4840 1496 GoToResolveProcessChecker.exe 94 PID 1496 wrote to memory of 4840 1496 GoToResolveProcessChecker.exe 94 PID 1496 wrote to memory of 4840 1496 GoToResolveProcessChecker.exe 94 PID 4840 wrote to memory of 1528 4840 GoToResolveUnattended.exe 95 PID 4840 wrote to memory of 1528 4840 GoToResolveUnattended.exe 95 PID 4840 wrote to memory of 1528 4840 GoToResolveUnattended.exe 95 PID 4840 wrote to memory of 3180 4840 GoToResolveUnattended.exe 96 PID 4840 wrote to memory of 3180 4840 GoToResolveUnattended.exe 96 PID 4840 wrote to memory of 3180 4840 GoToResolveUnattended.exe 96 PID 3180 wrote to memory of 1260 3180 GoToResolveLoggerProcess.exe 97 PID 3180 wrote to memory of 1260 3180 GoToResolveLoggerProcess.exe 97 PID 3180 wrote to memory of 1260 3180 GoToResolveLoggerProcess.exe 97 PID 4840 wrote to memory of 2316 4840 GoToResolveUnattended.exe 99 PID 4840 wrote to memory of 2316 4840 GoToResolveUnattended.exe 99 PID 4840 wrote to memory of 2316 4840 GoToResolveUnattended.exe 99 PID 4840 wrote to memory of 3492 4840 GoToResolveUnattended.exe 100 PID 4840 wrote to memory of 3492 4840 GoToResolveUnattended.exe 100 PID 4840 wrote to memory of 3492 4840 GoToResolveUnattended.exe 100 PID 4840 wrote to memory of 4108 4840 GoToResolveUnattended.exe 101 PID 4840 wrote to memory of 4108 4840 GoToResolveUnattended.exe 101 PID 4840 wrote to memory of 4108 4840 GoToResolveUnattended.exe 101 PID 2316 wrote to memory of 4872 2316 GoToResolveFileManager.exe 102 PID 2316 wrote to memory of 4872 2316 GoToResolveFileManager.exe 102 PID 2316 wrote to memory of 4872 2316 GoToResolveFileManager.exe 102 PID 4108 wrote to memory of 3224 4108 GoToResolveTerminal.exe 103 PID 4108 wrote to memory of 3224 4108 GoToResolveTerminal.exe 103 PID 4108 wrote to memory of 3224 4108 GoToResolveTerminal.exe 103 PID 3868 wrote to memory of 2508 3868 cmd.exe 104 PID 3868 wrote to memory of 2508 3868 cmd.exe 104 PID 3868 wrote to memory of 2508 3868 cmd.exe 104 PID 1960 wrote to memory of 3012 1960 svchost.exe 106 PID 1960 wrote to memory of 3012 1960 svchost.exe 106 PID 3868 wrote to memory of 3380 3868 cmd.exe 107 PID 3868 wrote to memory of 3380 3868 cmd.exe 107 PID 3868 wrote to memory of 3380 3868 cmd.exe 107 PID 4840 wrote to memory of 972 4840 GoToResolveUnattended.exe 120 PID 4840 wrote to memory of 972 4840 GoToResolveUnattended.exe 120 PID 4840 wrote to memory of 1968 4840 GoToResolveUnattended.exe 123 PID 4840 wrote to memory of 1968 4840 GoToResolveUnattended.exe 123 PID 1968 wrote to memory of 3092 1968 GoTo.Resolve.PatchManagement.Client.exe 125 PID 1968 wrote to memory of 3092 1968 GoTo.Resolve.PatchManagement.Client.exe 125 PID 4840 wrote to memory of 2620 4840 GoToResolveUnattended.exe 126 PID 4840 wrote to memory of 2620 4840 GoToResolveUnattended.exe 126 PID 1968 wrote to memory of 3340 1968 GoTo.Resolve.PatchManagement.Client.exe 131 PID 1968 wrote to memory of 3340 1968 GoTo.Resolve.PatchManagement.Client.exe 131 PID 4840 wrote to memory of 3216 4840 GoToResolveUnattended.exe 129 PID 4840 wrote to memory of 3216 4840 GoToResolveUnattended.exe 129 PID 4840 wrote to memory of 5028 4840 GoToResolveUnattended.exe 133 PID 4840 wrote to memory of 5028 4840 GoToResolveUnattended.exe 133
Processes
-
C:\Users\Admin\AppData\Local\Temp\39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81.exe"C:\Users\Admin\AppData\Local\Temp\39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveUnattended.exe"C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveUnattended.exe" -regsvc2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveProcessChecker.exe"C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveProcessChecker.exe" -regsvc -expectadmin -starterpid 780 -WorkFolder "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572" -ApplicationType 43⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
-
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveTools64.exe"C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveTools64.exe" -InstallVDD2⤵
- Executes dropped EXE
- Checks system information in the registry
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Checks processor information in registry
PID:4604
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /S /C ""C:\Users\Admin\AppData\Local\Temp\39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81.exe.cmd" "C:\Users\Admin\AppData\Local\Temp\39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\timeout.exetimeout /T 33⤵
- Delays execution with timeout.exe
PID:1076
-
-
C:\Windows\SysWOW64\timeout.exetimeout /T 33⤵
- Delays execution with timeout.exe
PID:2508
-
-
C:\Windows\SysWOW64\timeout.exetimeout /T 33⤵
- Delays execution with timeout.exe
PID:3380
-
-
-
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveProcessChecker.exe"C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveProcessChecker.exe" -Service -WorkFolder "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572" -ApplicationType "4"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveUnattended.exe"C:/Program Files (x86)/GoTo Resolve Unattended/1937918270322737572/GoToResolveUnattended.exe" "-RegisteredProcess" "1" "-ParentProcessId" "1496" "-WtsStartingUsername" "-ServiceName" "GoToResolve_1937918270322737572" "-Service"2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Registers COM server for autorun
- Checks system information in the registry
- Drops file in System32 directory
- Drops file in Program Files directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveCrashHandler.exe"C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveCrashHandler.exe" "--attachment=attachment_GoToResolveUnattended.log=C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\GoToResolveUnattended.log" "--attachment=attachment_unattended.json=C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\unattended.json" "--database=C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\UnattendedCrashReportDB" "--metrics-dir=C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\UnattendedCrashReportDB" --url=https://dumpster.console.gotoresolve.com/api/dump --annotation=format=minidump --annotation=hostname=Objiyuie --annotation=installationid=a09BsaRWd2 --annotation=version=1.15.2.3338 --initial-client-data=0x568,0x56c,0x570,0x544,0x574,0x7482e09c,0x7482e0ac,0x7482e0bc3⤵
- Executes dropped EXE
PID:1528
-
-
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveLoggerProcess.exeGoToResolveLoggerProcess.exe -ParentProcessId 4840 -CompanyId 1937918270322737572 -InstallationId a09BsaRWd2 -MonitoringUrl https://dumpster.console.gotoresolve.com -HostId f35a6a105df53dca4111781156b6ab04 -LogLevel 2 -MonitoringApiKey cnl6269ktie1dcpmz8y2ddxhjhhgi0nebxwpr4a3c71lbfwnubk2w7l7c6evabi3 -SessionType Unattended3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveCrashHandler.exe"C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveCrashHandler.exe" "--attachment=attachment_GoToResolveLoggerProcess.log=C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\GoToResolveLoggerProcess.log" "--attachment=attachment_logger.json=C:/Program Files (x86)/GoTo Resolve Unattended/1937918270322737572\logger.json" "--database=C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\LoggerProcessCrashReportDB" "--metrics-dir=C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\LoggerProcessCrashReportDB" --url=https://dumpster.console.gotoresolve.com/api/dump --annotation=format=minidump --annotation=hostname=Objiyuie --annotation=installationid=a09BsaRWd2 --annotation=version=1.15.2.3338 --initial-client-data=0x4d0,0x4d4,0x4d8,0x4a4,0x4dc,0x7482e09c,0x7482e0ac,0x7482e0bc4⤵
- Executes dropped EXE
PID:1260
-
-
-
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveFileManager.exeGoToResolveFileManager.exe -CompanyId 1937918270322737572 -InstallationId a09BsaRWd2 -LogLevel 2 -MonitoringUrl https://dumpster.console.gotoresolve.com3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveCrashHandler.exe"C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveCrashHandler.exe" "--database=C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\FileManagerCrashReportDB" "--metrics-dir=C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\FileManagerCrashReportDB" --url=https://dumpster.console.gotoresolve.com/api/dump --annotation=format=minidump --annotation=hostname=Objiyuie --annotation=installationid=a09BsaRWd2 --annotation=version=1.15.2.3338 --initial-client-data=0x5f0,0x5f4,0x5f8,0x5c4,0x5fc,0x7482e09c,0x7482e0ac,0x7482e0bc4⤵
- Executes dropped EXE
PID:4872
-
-
-
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveQuickView.exeGoToResolveQuickView.exe -InstallationId a09BsaRWd2 -LogLevel 23⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveTerminal.exeGoToResolveTerminal.exe -CompanyId 1937918270322737572 -InstallationId a09BsaRWd2 -LogLevel 2 -MonitoringUrl https://dumpster.console.gotoresolve.com3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveCrashHandler.exe"C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\GoToResolveCrashHandler.exe" "--database=C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\TerminalCrashReportDB" "--metrics-dir=C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\TerminalCrashReportDB" --url=https://dumpster.console.gotoresolve.com/api/dump --annotation=format=minidump --annotation=hostname=Objiyuie --annotation=installationid=a09BsaRWd2 --annotation=version=1.15.2.3338 --initial-client-data=0x5e8,0x5ec,0x5f0,0x5bc,0x5f4,0x7482e09c,0x7482e0ac,0x7482e0bc4⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3224
-
-
-
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\DeviceDataModule\1.71.0\GoTo.Resolve.DeviceData.App.exe"C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\DeviceDataModule\1.71.0\GoTo.Resolve.DeviceData.App.exe" --Credentials:CompanyId 1937918270322737572 --Credentials:HostId syn-prd-ava-unattended-8e5d127a-7247-4442-9464-04325cf6c408 --Communication:IpcFolderPath "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\DeviceDataModule\IPC" --Authentication:TokenFilePath "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\token.txt" --ZeroTrust:ReferencePublicKeyHash 79297ed57ba94f2dde0d121e431d4ed4d8f143a35e3f89ed9b9c2fc1c3015ae8 --Native:Version 1.15.2.33383⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:972
-
-
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\PatchManagementModule\1.2024.0507.5\GoTo.Resolve.PatchManagement.Client.exe"C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\PatchManagementModule\1.2024.0507.5\GoTo.Resolve.PatchManagement.Client.exe" --Credentials:CompanyId 1937918270322737572 --Credentials:HostId syn-prd-ava-unattended-8e5d127a-7247-4442-9464-04325cf6c408 --Communication:IpcFolderPath "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\PatchManagementModule\IPC" --Authentication:TokenFilePath "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\token.txt" --ZeroTrust:ReferencePublicKeyHash 79297ed57ba94f2dde0d121e431d4ed4d8f143a35e3f89ed9b9c2fc1c3015ae8 --Native:Version 1.15.2.33383⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SYSTEM32\where.exe"where" -r "C:\Program Files\WindowsApps" Winget.exe4⤵PID:3092
-
-
C:\Windows\SYSTEM32\where.exe"where" -r "C:\Program Files\WindowsApps" AppInstallerCLI.exe4⤵PID:3340
-
-
-
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\RemoteExecution.Runner.exe"C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\RemoteExecution.Runner.exe" --Credentials:CompanyId 1937918270322737572 --Credentials:HostId syn-prd-ava-unattended-8e5d127a-7247-4442-9464-04325cf6c408 --Communication:IpcFolderPath "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\IPC" --Authentication:TokenFilePath "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\token.txt" --ZeroTrust:ReferencePublicKeyHash 79297ed57ba94f2dde0d121e431d4ed4d8f143a35e3f89ed9b9c2fc1c3015ae8 --Native:Version 1.15.2.33383⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2620
-
-
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\AlertsModule\1.2024.0430.2\GoTo.Resolve.Alerts.Monitor.App.exe"C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\AlertsModule\1.2024.0430.2\GoTo.Resolve.Alerts.Monitor.App.exe" --Credentials:CompanyId 1937918270322737572 --Credentials:HostId syn-prd-ava-unattended-8e5d127a-7247-4442-9464-04325cf6c408 --Communication:IpcFolderPath "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\AlertsModule\IPC" --Authentication:TokenFilePath "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\token.txt" --ZeroTrust:ReferencePublicKeyHash 79297ed57ba94f2dde0d121e431d4ed4d8f143a35e3f89ed9b9c2fc1c3015ae8 --Native:Version 1.15.2.33383⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3216
-
-
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\AlertsModule\1.2024.0430.2\GoTo.Resolve.Alerts.Monitor.App.exe"C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\AlertsModule\1.2024.0430.2\GoTo.Resolve.Alerts.Monitor.App.exe" --Credentials:CompanyId 1937918270322737572 --Credentials:HostId syn-prd-ava-unattended-8e5d127a-7247-4442-9464-04325cf6c408 --Communication:IpcFolderPath "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\AlertsModule\IPC" --Authentication:TokenFilePath "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\token.txt" --ZeroTrust:ReferencePublicKeyHash 79297ed57ba94f2dde0d121e431d4ed4d8f143a35e3f89ed9b9c2fc1c3015ae8 --Native:Version 1.15.2.33383⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall1⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\system32\DrvInst.exeDrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{bf826117-e460-2344-b279-d03a19ba702c}\g2rvdd.inf" "9" "415529917" "0000000000000148" "WinSta0\Default" "0000000000000158" "208" "C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\x64"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
PID:3012
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start GoToResolve_19379182703227375721⤵
- Launches sc.exe
PID:1808
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16.1MB
MD5d3fa69a91fe17f9c4523d8fad2992f78
SHA1d2a353b94ba3d718a489af7fe72cc858b74fe87e
SHA25694df392a600acb29ff711f164073c1c80bbcf270dcc5a4cd8cba8e762b1ae40f
SHA512cf2b0898bbf783e49112c61a7373c896856c5e5777d229b791804b29ab288f7613c5a67f4ebf38389d9b9c2100b88e93489a8d8aae68b090d9c7d6283d647e86
-
Filesize
1.1MB
MD5c6e96dd2f500e4b3cedf7e627015e032
SHA135ea9753ca13c92971eff137c1cee613c0e93cab
SHA2562b4556e9c709e1da52cab89aa754fab86c7bb5265e63850dc133dc4ca387fc70
SHA51206e557d87fed5a1ff9d5d6a520429f6dc6d97e3f2952524ce30af5c25b017d39c15ce189092d0a9234c827510a07020cd31b9d172d60a8fdae6ad3f430b6339d
-
Filesize
109KB
MD562912afba6014da200e40c49f685f084
SHA138e4bd808305bf4b41c10da91daea49587743e32
SHA256b2fc90c66d76aa33da449039e6ea5f66b43880b3ef86e7ae263e1e113f7c3296
SHA512351938c08a92b663727ffb3b2f4a3377104013b3680f7ccd60394463c3b8992ea0e6115ebe847e0cfd9dba942c219af51de334204b2afdcc663a15901a81603f
-
Filesize
109KB
MD5d319e53da0d6ea80140611a19dd6c468
SHA1e47768dbad5bc1bf81bd9f135c9d7a4f62de4573
SHA256dc21f66e9dd2ca56504c3dcc02862117f2da94f212b289d3b09349bc59f57a25
SHA512092617eb831cde6da475a759f9962c94ca70b78905f892a3a798a21cfe8d1e8e50d72dd0d2cdc89949a5f81e6a5d85b1597712112934a3ffab271b750089e32b
-
Filesize
107KB
MD55145ef194fdd47be876847e9b9534cdc
SHA134711371a01494b7432528821c75bd5fcfe851a4
SHA25634e6f7d1fd0aa8b20cb8cac184b8ecd90c157ccc62e38568699efa10c411c7ea
SHA5127e5fdaea1bb2501bc52801c11f36bbd6d165282eb920cddaba59a5c5999be57032a5e9f2b5196f54b300c51ae99381e7e1c831fa73422e0065174385a3ef6757
-
Filesize
109KB
MD5507b2e37df1a16dadbb308b874984b31
SHA11a522ce23cd94052760ddf2109ff7b06e3f3735d
SHA25672d654e3f4f292ed8c8bb56ef29f1400fa38a943b4e9eff09fa5fe11e0145d32
SHA5121ec31fe64d1dc629cdd149a40b08b5a78b22e6d05d195a2184806543d0b88d144602bb44da29c77ffea2757932cc7bd743fd9860e499b88e91ccc6fc80e37ada
-
Filesize
1.3MB
MD5c3d3d6a881753584b29d60f4c5b6a965
SHA10952c70ea06b932a6c20cf8af10d3aa281880b7c
SHA256f36b1c32a5fa8969422d99042287685634bb8d85c9643100032e9df5744dd39e
SHA5125d1ebc3603690d1534d0624ffb73f947d1afe48f407540e07810df89ab737b47a1728a1829f9207be26bf03c2da3e7097ab8aedf31b212fc25ffe2ed632edcbf
-
Filesize
109KB
MD50e688254065af78d95a3fdf159ab8d86
SHA1e1178f76ea31e1009f631ca0f0b948807392faa9
SHA2561b6fc8321728fccd3a9a0f88f51ab115f0c6d227d644b948d9d0b58d1123c923
SHA51271efb2e36026fd859522c593662ac7f607ad639027c0fa6cc2f4fc9e0c0bc9156ca4e90448f3e2795d693bad0d337b28147bea33747687524da70e598ddb430c
-
Filesize
19.7MB
MD5c2b7eec9b082f83609d40a977c980c09
SHA1e68345a8387c9644e1cc695ea1f8273e2911c63b
SHA2561f13a2911d6cad19314f330bab9a57d81c8323575fdc7182e1c2eb6f844ba89b
SHA512e0032b2acd49f20def25e799c39c7d9648e55250fb851c64b7a52b29aecfb5a3f8a83ded6963e221d16259b0e064504f92f1991a53c1e6a1a01044136e53de4e
-
Filesize
13.9MB
MD512c3b59bbafa6ea8d0d3209e70ad39c2
SHA17f699dd519c20ecf8bf24947d03868c580913b39
SHA256c132232018896ba3f84ff37a1ece4a7a58eef08afecf495fc31176b276b000bb
SHA51255ebe552343ef28939d427f32e5ed98d11d734a65e050917e918efdf400806bbf809d8fc77beb48b6d2f4f5c7961f0c2c8a728691c4f217427578476bf64b10f
-
Filesize
1.1MB
MD57a5ddf82d45f1060ac2386bf4ba89dd3
SHA1ca26ead1e092c6612d7393873854ba0a257ae832
SHA25695743c6c9d2f626fa66c3b95e2b3c003313089f653681c82c1e9c214ddd2778d
SHA5125ad98d4985d36d6259027374c600913a5729635c71453c6191510ac1c4f3b9b732c6436eb49b9c0ddb2af753b08c699c1ca6c26c151cf52fce9cdb2b5a77bd5d
-
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\GoToResolveProcessChecker.log
Filesize8KB
MD5fe3c6d6887d206f0c7fe739fa0aa92df
SHA1119667a720111c90c98e0b3b20a334305a12f76b
SHA256f85367da7c6ae5e6dbb69211a218eb3467e83554616616cc15da27564979d41f
SHA512fbf11dde8da4dedd20573fb7499c412e41d74042fc651e271dab5f6b37405e0197bd50e49ac527b72d40296f18f4fb5d1aa287dcc32880229c6168c70207f0cd
-
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\appdata\GoToResolveUnattended.log
Filesize28KB
MD5e20948f716b42d819a7c7704ffd35696
SHA194e7d8d8d030ef568a29ef5138bb95e6b0ffa798
SHA256ae82e2e694796c94df8f879173c43bb0a98fee97300f937d3fb4fe6282d520b9
SHA5123c8ba110e947c222bd117f74c9af5f478bec41e02965d542dcbc0e146b1a4106d3bff0bf295d4fa8ca0b07848cb985652839e4cda2a72186517c97320ec283a8
-
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\AlertsModule\1.2024.0430.2\logs\2024-05-17.log
Filesize1KB
MD55a6a1f16574c1cb96feca277c2886e59
SHA1f0b34700b907cd97bdbc3c9ac4c5d3ce126d5b1f
SHA256f6b02f5f75849d1ffb714efd0238c7414b20457c03f527efc7c452bcd86cab41
SHA5129e6b52c3c785457574f2ef1b547543986b3578bd70f5c3b01b36d61fed172b5422f082478664edebb2c88570aa51188bcc7a44c85f9360a1add1e8b0cce36c2d
-
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\AlertsModule\1.2024.0430.2\logs\2024-05-17.log
Filesize4KB
MD57ed53cc73d14d53f09fb8b1678bd4763
SHA1c52a8537d0129b7424b557484b9f96d0b714ef06
SHA25696b77e6ccf1c2b388821027cfda6e2bee0107c3fecae33b076b376323cb37d12
SHA512a1d2261d964db9a3bcd02b8dc4b90c99c2796b8d9bbbe5c686da6840f743e4286b5afd819dc9b03e733e702e061607340e042eba376d34ef13d33d868dc827df
-
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\DeviceDataModule\1.71.0\GoTo.Resolve.DeviceData.App.exe
Filesize11.5MB
MD55c76b75ea22c81a9224456f77ab1175f
SHA1b681216752e17148d341390d1c778e4c5ba33364
SHA2560bc404e30bdad9be1d7ed633adc054800f2e7e757e6414795136c0a896b0bb87
SHA512a18172f9ba6f6ee62c64cd4f506791c9592436a7cd9f06710794e86a26748bd6d51406420cfc89474fe0c1375e56f3ce1ccc834cd1799a5cc7decadcf63eef0a
-
C:\Program Files (x86)\GoTo Resolve Unattended\1937918270322737572\externalmodules\RemoteExecutionModule\1.2024.0506.1\RemoteExecution.Runner.exe
Filesize164KB
MD5840ed278c7882f3b877df906937aa3c5
SHA10262be6cd5f1596e5b54ecc910efd6e277920c03
SHA2568f70badc067ff6e828d6afccaead174a7623a8ef89c1c81a614f5fa8648f1019
SHA5122e2ae3b5ba9b9394f386c2243da93ad3f7f35102f50be2206bf06cd48401bb8de5e1fb4ab18b29fa53ad8530474fdef3490df98aca7bc3ba2295485b911630c2
-
Filesize
4.2MB
MD5dc2bd7e6e6a3b528424410af077ba2a7
SHA1aa891f61820e7c6d0ed35989a595af77f4b7203b
SHA256e852018ec59efbe2dc2e32c064f35ee68171417d8c5bc5ba319609555dde2bc6
SHA512a96f57f5d0272f8ba4ccb1b184289f0caeace54d001f641622fe38892fa9d0f6781808cf5a585d77fc75c356bb90c03a062b2fb17b09a29e20b0264b12c8358f
-
Filesize
1.1MB
MD54f19c36b09b820d9371d8b6510497475
SHA103b8ee682eeac39e120aac474a54344c2b391150
SHA25611598140036154dcd8ccd5619ac059aea4012cf9a4535ffa7c9b2f0ae405906d
SHA5128ed2ee897c54abf13beae299902018861c4bc30a1ce5d14a64129af3856a3d2e5829eb060a99f7ea7bb894966e21a2d5eec473323883c865c0caed9de832d1b6
-
Filesize
375B
MD544e28e7f1d04b2cdb26f706eb6f1a9ab
SHA14d6c72513e059122c6533bf93a1a838819db1889
SHA25649508c56717c40172f09d25c14e9a0f42fc8f03a906b1b84f3eee6cd1bee657d
SHA512e78ad1b5c3b4321a394bcbd33293d1be4c074b9c0f7e815950ad60294230f03d06627b6a7fda5cba565da950efc63a5d112d6274842ab3df9a313deb891b2b53
-
Filesize
74B
MD5f50767df127a399996304f5a1259653a
SHA10a03f644be27865e0031b235ca6a21353e265ed7
SHA256afc6a427fd31151d995e93e66edd9138df27dc88580b03b12d8a8012c481f3bd
SHA51229898528d9047d2689de8be7938662c0e80c5161c20fcb9fa9135378b2c2193c6185cd560148f3fd7100824f7f43265434d9982c1b85933f3d00490804c7853e
-
Filesize
1KB
MD5ec54b6d9d7bdc6f5186b2153480de7e6
SHA1e6df5346cb0ca83d2e3a7385d39b2e8929b4c44a
SHA2563f03911d3bfd349767124a665912153d207bad0a58aedcb4e005433c205847f4
SHA51230d90003be867d17b363d8bb4b37656b39c156bd5766b7f50e368b807dc99c9ae56fe80c18526faef23b427aaf95c23bbbca602ca3eb45c039c4a996428f0430
-
Filesize
582B
MD5c5b571903e37d2b955cd21f584471ed3
SHA1267332217a876f04c16e8b92141fa8321dd6fc74
SHA256f967768b99cebe2225ef1c41d9ee31c21f9014f87f29cf30c487b448aa074dfa
SHA512e849d1bfceaa9450505c27119ec407d19b017a3748d907c73fcb915b46fbf7b1bb75c85be066d8898cdbda0d942389c965f2102522cd049211269f4ba4cdac3a
-
Filesize
703B
MD549271953cc7e7b5b920c292bd93026c1
SHA1bddb772d4c859a56bea173c61023f973600d4bd8
SHA25619eb67cc4ed0b294ba19f7ff2ab3c3f616cb05f27b9d6b87071fa52b9754b8ef
SHA512d8e74aaf6eb247b64f2881711cd15d490a21373a197142aa9edb6593fed1d39b44e38c7783621b47b56b78861920dba720d311ad601150905f2365544acbf224
-
Filesize
1KB
MD55f05f950d05fd102878da7c91f6b567e
SHA19b1378f9e08d5db57a575b7149aa89310c5d1946
SHA25660fd37449ac9050fc4db20f10b8671a4f35e821b6eee9fb4c939f16167120636
SHA5124b76d1a9948dcdc69bad284167736d3807c63f9faac87b2ed9feea0322cecc4698a0809b60605091e191999f70b9263696ed7efdfa7bcc13f1eb6d44433c44a5
-
Filesize
1KB
MD5f04525148fcd222fddfc876734dfb017
SHA1fe2c657e820f2111a5e9feb51ba96a2128ffb3af
SHA2563629ad46423b8150a6ec21c1412f958c8331f4e2bf01c49ec8f224a5df5cd1c3
SHA512ea08b2f9f459e42c22970123a45d511fb38900d13b414e7013a24a14eaad26796ef9fe76836c9290a9898d4b553c07520e8acbcabe24cd0031f3796f778b61b1
-
Filesize
1KB
MD5e6464a2670a2caef554ffbdb459dcee8
SHA16424382cbf3909b17fc3b298da9eaf9418b5c885
SHA256be9cc4edc8727a0656d1ceeca29030255b34e25fb6607770af920b558b5b6436
SHA512f09aee2d45774ccc6074878db0f96fab8840307b624e03fb46bcf8c8e23b7214490f474f158c4da03136168caf7ddd70d0df11d7dc005646bef899546307ab8b
-
Filesize
1KB
MD5421d95aa876f95215ee8d000e88ff2c6
SHA1d42911b7b360a172049242b8bbdd04ea9dfa00b3
SHA256b9fe3ef599a8984d1e58ab10194d98c019115f82b80778c13edbebcd3a68c8fd
SHA5127044a01940d6a76234618492945e93e178d6ede0088b340d3668e5c17c9d627cd4160b0eec334745be8b3755d5239f450e26417b207fd0ecab5b89a7e9b5a89d
-
Filesize
2KB
MD51fec8a510fa8f8c5eca3ca57eaef87aa
SHA193d085863b627dff5ece72a3cf9fda5c9fce9cff
SHA2569be0b584f97789d0c9d1730f0caa51700762e78e8ea9688b6d07f78318627d06
SHA5129e71a1363fb8412d02edf320b947b8dffcc253ef2b4bd3f11de61c5919a41045209cc596722c7b19c411653696d04bd96321a3d13c7a9b4dffa64114c9842baf
-
Filesize
3KB
MD5a6ad2d7d0bda19a2cdb5af8019d5661b
SHA1e049051959a6c6f7d3642aacdf4345e23be1d328
SHA256ac0c4baa041c62636eae153a846992b236ddcdee63ca8f18af78ab2c4caa68a2
SHA51284b0390ffade75b9a26b606d934f0bfdf32dfc130d2ebef1b11197dd69216a175f27e1d9faad30ea311e77c9a177cc2a59f8092fd944fae92a9a0c061ffd5f10
-
C:\Users\Admin\AppData\Local\Temp\39e246d194e4a5ade27a08d4a925dbff009fa8b66963c05f18712c1472e24a81.exe.cmd
Filesize537B
MD52d1ec5c3d0d2fd67e0aa148f4e523d93
SHA124a6528837fe7c825f44be9e0c2bd942203bb9b0
SHA2565653c22a6d0f410d2a1207c131206c1f990be9a3fcd2c8e5a5dfa77b01d73c1b
SHA5127fdeeb8471cc5916131011186ea9da7c9ccea6b9755bbdec2ecce4f564079c05b566ff147b700b3535fe608e48a69c5d2922d74be5003995a77a19a03bf06f25
-
Filesize
10KB
MD58d2c58325f63af51d37693e7ffbdbc4d
SHA1ea0507cdf4528faa174eb5883eb20b90363ed512
SHA2566fe045e8a6ff18e27c6aceeeb7dbea3e5f3f25c3796d42f0d844b1b48f38c0be
SHA51271ee9b93d70ace69344d9aeb582ab8110eeb5364cd0d593ecd95b2d57000114aac18f2496c160d2b761b0117c5e26d261d757b424fa6e57b91b98b75ac72dd62
-
Filesize
141KB
MD5e00f914a13981678cc130f7c65807f03
SHA10a00739f6f2b1c57946fc09f084deb5bd3d9e342
SHA256484300ed3462124e23f42433678f8110aaebeec2da6b82e97fcd10ba2e60a0b8
SHA512ec278c9d1dc3c066a2a1abd16a4d0f92142941916e0259d0787b7b3146979fba99e273bbbb2fc01fbab79f273d15892434e2685bc2badf4bbb48928d7e89f53c
-
Filesize
3KB
MD579c299099a8f43e1a94047355ebdf1cc
SHA155ede099780c9e2dcc8cb3dd9006fbf098c8997b
SHA2560a70026b5ac03d6c3c930c245fb992ad9c02192be607e62d27691909f331fe8d
SHA512270c8600ed3c00aa6625bbd2c5777a19949773f8c58ddd560bf2d39fac2e9f5868ed633d60728e8d4a106d97a62d43056d818e1fea565198446c487a83342a7d
-
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\ApplicationInsights\49a79555446a342df02477815a2e44309b6db288b6f82a7fb9c8c03c3af6f5d9\kkur2iwi.oxq
Filesize1B
MD593b885adfe0da089cdf634904fd59f71
SHA15ba93c9db0cff93f52b521d7420e43f6eda2784f
SHA2566e340b9cffb37a989ca544e6bb780a2c78901d3fb33738768511a30617afa01d
SHA512b8244d028981d693af7b456af8efa4cad63d282e19ff14942c246e50d9351d22704a802a71c3580b6370de4ceb293c324a8423342557d4e5c38438f0e36910ee