Analysis
-
max time kernel
71s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-08-2024 06:35
Static task
static1
Behavioral task
behavioral1
Sample
disk-drill-win.exe
Resource
win10v2004-20240802-en
Errors
General
-
Target
disk-drill-win.exe
-
Size
27.0MB
-
MD5
db78eda8cb52e64d403890ad2201f007
-
SHA1
174c837386ce92144bb6c8d722e4809426b2519a
-
SHA256
97e296f77f96ea55d1e0f962f0fe980170a4e8d11464a7ca45b2976aa8ee16ee
-
SHA512
94691338ff0b788b16eed3eb2973b2534b5c7774ceba3aba11a2f73ee4d9e754c8039d47ed3b45ab55ea3e3a6f7138c5a70a40f516397167a97a36c2773c09ad
-
SSDEEP
786432:Ep3+DT+fEKOIYSwpcPa39JWJ2GsaZ/mCoq31/:l+MKrYSwqPa3HW7saZ/mPYJ
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
Processes:
msiexec.exerundll32.exeflow pid process 72 2760 msiexec.exe 73 2760 msiexec.exe 74 2760 msiexec.exe 76 1052 rundll32.exe 79 1052 rundll32.exe -
Drops file in Drivers directory 3 IoCs
Processes:
MsiExec.exedescription ioc process File opened for modification C:\Windows\system32\DRIVERS\SET437C.tmp MsiExec.exe File created C:\Windows\system32\DRIVERS\SET437C.tmp MsiExec.exe File opened for modification C:\Windows\system32\DRIVERS\dokan1.sys MsiExec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
DiskDrillSetup.5.5.900.0.exeVC_redist.x64.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{bf17c798-887e-4516-8036-35d6e0649a36} = "\"C:\\ProgramData\\Package Cache\\{bf17c798-887e-4516-8036-35d6e0649a36}\\DiskDrillSetup.5.5.900.0.exe\" /burn.runonce" DiskDrillSetup.5.5.900.0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{c649ede4-f16a-4486-a117-dcc2f2a35165} = "\"C:\\ProgramData\\Package Cache\\{c649ede4-f16a-4486-a117-dcc2f2a35165}\\VC_redist.x64.exe\" /burn.runonce" VC_redist.x64.exe -
Downloads MZ/PE file
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exedescription ioc process File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rundll32.exedisk-drill-win.exevc_redist.14.38.33135.x64.exeDokanSetup.1.5.1.1000.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation rundll32.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation disk-drill-win.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation vc_redist.14.38.33135.x64.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation DokanSetup.1.5.1.1000.exe -
Drops file in System32 directory 63 IoCs
Processes:
msiexec.exeMsiExec.exedescription ioc process File created C:\Windows\system32\concrt140.dll msiexec.exe File opened for modification C:\Windows\system32\mfcm140u.dll msiexec.exe File created C:\Windows\system32\mfc140u.dll msiexec.exe File created C:\Windows\system32\msvcp140_2.dll msiexec.exe File created C:\Windows\system32\mfc140enu.dll msiexec.exe File created C:\Windows\system32\mfc140ita.dll msiexec.exe File created C:\Windows\system32\mfcm140u.dll msiexec.exe File opened for modification C:\Windows\system32\vcruntime140.dll msiexec.exe File opened for modification C:\Windows\system32\vcomp140.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140rus.dll msiexec.exe File created C:\Windows\SysWOW64\dokan1.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140cht.dll msiexec.exe File created C:\Windows\System32\dokan1.dll msiexec.exe File opened for modification C:\Windows\system32\DRVSTORE\dokan_C9C23E1918E5ABD45F0BAFDE646F163969BA20F8\dokan.inf MsiExec.exe File created C:\Windows\system32\mfc140chs.dll msiexec.exe File created C:\Windows\system32\mfc140esn.dll msiexec.exe File created C:\Windows\system32\mfc140rus.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140chs.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140fra.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140jpn.dll msiexec.exe File created C:\Windows\system32\mfc140deu.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140deu.dll msiexec.exe File created C:\Windows\system32\mfc140.dll msiexec.exe File created C:\Windows\SysWOW64\dokanfuse1.dll msiexec.exe File created C:\Windows\system32\DRVSTORE\dokan_C9C23E1918E5ABD45F0BAFDE646F163969BA20F8\dokan1.cat MsiExec.exe File opened for modification C:\Windows\system32\mfcm140.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140kor.dll msiexec.exe File opened for modification C:\Windows\system32\msvcp140.dll msiexec.exe File opened for modification C:\Windows\system32\msvcp140_codecvt_ids.dll msiexec.exe File created C:\Windows\system32\vcruntime140.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140enu.dll msiexec.exe File created C:\Windows\system32\mfc140kor.dll msiexec.exe File opened for modification C:\Windows\system32\vcruntime140_1.dll msiexec.exe File created C:\Windows\system32\msvcp140.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140u.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140esn.dll msiexec.exe File opened for modification C:\Windows\system32\concrt140.dll msiexec.exe File created C:\Windows\system32\msvcp140_atomic_wait.dll msiexec.exe File created C:\Windows\system32\vcruntime140_1.dll msiexec.exe File opened for modification C:\Windows\system32\msvcp140_atomic_wait.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140.dll msiexec.exe File created C:\Windows\system32\mfc140cht.dll msiexec.exe File created C:\Windows\System32\dokanfuse1.dll msiexec.exe File created C:\Windows\system32\msvcp140_codecvt_ids.dll msiexec.exe File created C:\Windows\system32\vcomp140.dll msiexec.exe File created C:\Windows\system32\mfc140jpn.dll msiexec.exe File opened for modification C:\Windows\system32\DRVSTORE MsiExec.exe File opened for modification C:\Windows\system32\msvcp140_2.dll msiexec.exe File created C:\Windows\system32\vcruntime140_threads.dll msiexec.exe File created C:\Windows\system32\mfc140fra.dll msiexec.exe File created C:\Windows\system32\mfcm140.dll msiexec.exe File created C:\Windows\system32\DRVSTORE\dokan_C9C23E1918E5ABD45F0BAFDE646F163969BA20F8\dokan.inf MsiExec.exe File created C:\Windows\system32\DRVSTORE\dokan_C9C23E1918E5ABD45F0BAFDE646F163969BA20F8\dokan1.sys MsiExec.exe File opened for modification C:\Windows\system32\msvcp140_1.dll msiexec.exe File opened for modification C:\Windows\system32\vccorlib140.dll msiexec.exe File opened for modification C:\Windows\system32\vcamp140.dll msiexec.exe File created C:\Windows\system32\msvcp140_1.dll msiexec.exe File created C:\Windows\system32\vcamp140.dll msiexec.exe File created C:\Windows\system32\vccorlib140.dll msiexec.exe File opened for modification C:\Windows\system32\mfc140ita.dll msiexec.exe File created C:\Windows\System32\dokannp1.dll msiexec.exe File created C:\Windows\SysWOW64\dokannp1.dll msiexec.exe File opened for modification C:\Windows\System32\CatRoot2\dberr.txt MsiExec.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Program Files\Dokan\Dokan Library-1.5.1\sample\mirror\dokan1.dll msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\sample\mirror\mirror.exe msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\ar\DD.resources.dll msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\DD.exe msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\Smart\language\Ukrainian.lang msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\System.IO.Pipelines.dll msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\tr\DD.resources.dll msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\sample\memfs\memfs_helper.h msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\x86\sample\memfs\memfs.cpp msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\sample\mirror\mirror.c msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\Smart\language\Danish.lang msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\Smart\language\Italian.lang msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\SQLite-net.dll msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\Smart\JMB39x64.dll msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\uk\DD.resources.dll msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\x86\lib\dokanfuse1.lib msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\sample\memfs\filenode.cpp msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\include\fuse\fuse_common.h msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\Microsoft.VisualStudio.Validation.dll msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\plist-cil.dll msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\pt-BR\DD.resources.dll msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\Smart\language\Japanese.lang msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\x86\sample\memfs\filenodes.cpp msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\sample\fuse_mirror\mirror.exe msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\x86\sample\memfs\memfs_operations.h msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\include\dokan\public.h msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\pt\DD.resources.dll msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\Smart\AMD_RC2t7x64.dll msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\x86\sample\mirror\dokan1.dll msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\sample\memfs\memfs_operations.h msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\IPAddressRange.dll msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\pl\DD.resources.dll msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\Smart\language\Norwegian.lang msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\Smart\language\Turkish.lang msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\x86\dokanctl.exe msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\CrashSender1403.exe msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\hi\DD.resources.dll msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\Smart\language\Spanish.lang msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\sample\fuse_mirror\dokan1.dll msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\sample\memfs\memfs.cpp msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\x86\dokanfuse1.dll msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\libmodi.dll msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\DD.deps.json msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\Smart\language\Arabic.lang msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\Smart\language\Slovak.lang msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\dokan1.pdb msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\libphdi.dll msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\x86\sample\fuse_mirror\cygdokanfuse1.dll msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\sample\memfs\memfs.exe msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\Smart\language\Korean.lang msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\Smart\language\Polish.lang msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\Smart\language\Serbian.lang msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\Smart\language\Hungarian.lang msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\sample\mirror\dokan_mirror.vcxproj msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\cygdokanfuse1.dll msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\lib\dokannp1.lib msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\x86\sample\memfs\memfs_helper.h msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\CrystalSmart.dll msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\DD.runtimeconfig.json msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\include\dokan\fileinfo.h msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\x86\sample\memfs\filenode.cpp msiexec.exe File created C:\Program Files\Dokan\Dokan Library-1.5.1\sample\memfs\memfs_operations.cpp msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\libvmdk.dll msiexec.exe File created C:\Program Files\CleverFiles\Disk Drill\Newtonsoft.Json.dll msiexec.exe -
Drops file in Windows directory 51 IoCs
Processes:
msiexec.exerundll32.exerundll32.exerundll32.exedescription ioc process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSI2D07.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4305.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI61AC.tmp-\msiGaCustomAction.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI62C6.tmp-\msiGaCustomAction.dll rundll32.exe File opened for modification C:\Windows\Installer\{4E4DB27B-ACF9-4F10-8D53-9A0463612025}\url.ico msiexec.exe File created C:\Windows\Installer\e5828f9.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI61AC.tmp-\CustomAction.config rundll32.exe File created C:\Windows\Installer\SourceHash{4E4DB27B-ACF9-4F10-8D53-9A0463612025} msiexec.exe File created C:\Windows\Installer\e582900.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI40A3.tmp msiexec.exe File created C:\Windows\Installer\{65A3A964-3DC3-0105-0001-211126123627}\DokanIcon msiexec.exe File opened for modification C:\Windows\Installer\{65A3A964-3DC3-0105-0001-211126123627}\DokanIcon msiexec.exe File opened for modification C:\Windows\Installer\MSI61AC.tmp-\libSoftMeter.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI6B84.tmp-\msiGaCustomAction.dll rundll32.exe File created C:\Windows\Installer\SourceHash{AA0C8AB5-7297-4D46-A0D9-08096FE59E46} msiexec.exe File created C:\Windows\Installer\SourceHash{19AFE054-CA83-45D5-A9DB-4108EF4BD391} msiexec.exe File created C:\Windows\Installer\e5828fe.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI63D1.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI4643.tmp msiexec.exe File opened for modification C:\Windows\Installer\e5828f9.msi msiexec.exe File created C:\Windows\Installer\e5828e3.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI3305.tmp msiexec.exe File created C:\Windows\Installer\e5828f8.msi msiexec.exe File opened for modification C:\Windows\Installer\e5828fe.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI61AC.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\{4E4DB27B-ACF9-4F10-8D53-9A0463612025}\DD.ico msiexec.exe File created C:\Windows\Installer\e5828d0.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI61AC.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI6B84.tmp msiexec.exe File created C:\Windows\Installer\e5828fd.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI62C6.tmp-\CustomAction.config rundll32.exe File opened for modification C:\Windows\Installer\MSI62C6.tmp-\libSoftMeter.dll rundll32.exe File created C:\Windows\Installer\e5828e2.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI62C6.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI6B84.tmp-\libSoftMeter.dll rundll32.exe File opened for modification C:\Windows\Installer\MSI2B03.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI443F.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI645F.tmp msiexec.exe File created C:\Windows\Installer\SourceHash{65A3A964-3DC3-0105-0001-211126123627} msiexec.exe File opened for modification C:\Windows\Installer\MSI6B84.tmp-\Microsoft.Deployment.WindowsInstaller.dll rundll32.exe File opened for modification C:\Windows\Installer\e5828d0.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File opened for modification C:\Windows\Installer\MSI4035.tmp msiexec.exe File created C:\Windows\Installer\{4E4DB27B-ACF9-4F10-8D53-9A0463612025}\url.ico msiexec.exe File opened for modification C:\Windows\Installer\e5828e3.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI30F0.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI62C6.tmp msiexec.exe File created C:\Windows\Installer\{4E4DB27B-ACF9-4F10-8D53-9A0463612025}\DD.ico msiexec.exe File opened for modification C:\Windows\Installer\MSI6B84.tmp-\CustomAction.config rundll32.exe -
Executes dropped EXE 10 IoCs
Processes:
disk-drill-win.exeDiskDrillSetup.5.5.900.0.exevc_redist.14.38.33135.x64.exevc_redist.14.38.33135.x64.exeVC_redist.x64.exeDokanSetup.1.5.1.1000.exeDokanSetup.1.5.1.1000.exeDokanSetup.exedokanctl.execfbackd.w32.exepid process 4864 disk-drill-win.exe 3088 DiskDrillSetup.5.5.900.0.exe 1636 vc_redist.14.38.33135.x64.exe 3768 vc_redist.14.38.33135.x64.exe 1448 VC_redist.x64.exe 1508 DokanSetup.1.5.1.1000.exe 4536 DokanSetup.1.5.1.1000.exe 2796 DokanSetup.exe 2668 dokanctl.exe 3004 cfbackd.w32.exe -
Loads dropped DLL 25 IoCs
Processes:
disk-drill-win.exevc_redist.14.38.33135.x64.exeVC_redist.x64.exeDokanSetup.1.5.1.1000.exeMsiExec.exeMsiExec.exeMsiExec.exedokanctl.exeMsiExec.exerundll32.exerundll32.exeMsiExec.exerundll32.exepid process 4864 disk-drill-win.exe 3768 vc_redist.14.38.33135.x64.exe 816 VC_redist.x64.exe 4536 DokanSetup.1.5.1.1000.exe 640 MsiExec.exe 3220 MsiExec.exe 3836 MsiExec.exe 2668 dokanctl.exe 640 MsiExec.exe 2308 MsiExec.exe 4540 rundll32.exe 4540 rundll32.exe 4540 rundll32.exe 2308 MsiExec.exe 4928 rundll32.exe 4928 rundll32.exe 4928 rundll32.exe 1988 MsiExec.exe 2308 MsiExec.exe 1052 rundll32.exe 1052 rundll32.exe 1052 rundll32.exe 1052 rundll32.exe 620 620 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
vc_redist.14.38.33135.x64.exeVC_redist.x64.exeVC_redist.x64.exeVC_redist.x64.exeDokanSetup.1.5.1.1000.exeMsiExec.exedisk-drill-win.exeVC_redist.x64.exeMsiExec.exedisk-drill-win.execfbackd.w32.exeDokanSetup.exevc_redist.14.38.33135.x64.exeDokanSetup.1.5.1.1000.exeDiskDrillSetup.5.5.900.0.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vc_redist.14.38.33135.x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VC_redist.x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VC_redist.x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VC_redist.x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DokanSetup.1.5.1.1000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language disk-drill-win.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VC_redist.x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language disk-drill-win.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfbackd.w32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DokanSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vc_redist.14.38.33135.x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DokanSetup.1.5.1.1000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DiskDrillSetup.5.5.900.0.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
vssvc.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2444 taskkill.exe -
Modifies data under HKEY_USERS 38 IoCs
Processes:
msiexec.exeLogonUI.exeMsiExec.exedescription ioc process Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\2A\52C64B7E msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@%SystemRoot%\System32\fveui.dll,-844 = "BitLocker Data Recovery Agent" MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124 = "Document Encryption" MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@%SystemRoot%\system32\NgcRecovery.dll,-100 = "Windows Hello Recovery Key Encryption" MsiExec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@%SystemRoot%\System32\ci.dll,-100 = "Isolated User Mode (IUM)" MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@%SystemRoot%\System32\ci.dll,-101 = "Enclave" MsiExec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@%SystemRoot%\System32\fveui.dll,-843 = "BitLocker Drive Encryption" MsiExec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@%SystemRoot%\System32\wuaueng.dll,-400 = "Windows Update" MsiExec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\2B msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2c msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\29 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "237" LogonUI.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\27 msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\29 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2b msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\28 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a msiexec.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@%SystemRoot%\system32\dnsapi.dll,-103 = "Domain Name System (DNS) Server Trust" MsiExec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe -
Modifies registry class 64 IoCs
Processes:
msiexec.exeDiskDrillSetup.5.5.900.0.exeVC_redist.x64.exeVC_redist.x64.exeDokanSetup.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\469A3A563CD350100010121162216372\DokanLibBFeature = "DokanDevFeature" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shell\DiskDrillUndelete\Icon = "C:\\Program Files\\CleverFiles\\Disk Drill\\DD.exe" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B72BD4E49FCA01F4D835A94036160252\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\450EFA9138AC5D549ABD1480FEB43D19\Servicing_Key msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\88AAB0B9F51EF1A3CA0C2B609EDD7FC1 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\450EFA9138AC5D549ABD1480FEB43D19\SourceList\Media msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\469A3A563CD350100010121162216372\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B72BD4E49FCA01F4D835A94036160252\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\450EFA9138AC5D549ABD1480FEB43D19\SourceList\LastUsedSource = "n;1;C:\\ProgramData\\Package Cache\\{19AFE054-CA83-45D5-A9DB-4108EF4BD391}v14.38.33135\\packages\\vcRuntimeAdditional_amd64\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{4E4DB27B-ACF9-4F10-8D53-9A0463612025}\ = "{4E4DB27B-ACF9-4F10-8D53-9A0463612025}" DiskDrillSetup.5.5.900.0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{8E5816F9-297E-4C51-8728-6FB385159C68}\Dependents\{bf17c798-887e-4516-8036-35d6e0649a36} DiskDrillSetup.5.5.900.0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x64,amd64,14.38,bundle\Dependents\{c649ede4-f16a-4486-a117-dcc2f2a35165} VC_redist.x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\450EFA9138AC5D549ABD1480FEB43D19\Provider msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x64,amd64,14.38,bundle\Dependents VC_redist.x64.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5BA8C0AA792764D40A9D8090F65EE964\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\450EFA9138AC5D549ABD1480FEB43D19\ProductName = "Microsoft Visual C++ 2022 X64 Additional Runtime - 14.38.33135" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B72BD4E49FCA01F4D835A94036160252\PackageCode = "91D4BDD2214C94B4DAAD54BCE8D4719B" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5BA8C0AA792764D40A9D8090F65EE964\AdvertiseFlags = "388" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\450EFA9138AC5D549ABD1480FEB43D19\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B72BD4E49FCA01F4D835A94036160252\ProductName = "Disk Drill 5.5.900.0 (x64)" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\450EFA9138AC5D549ABD1480FEB43D19 msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\INSTALLER\DEPENDENCIES\MICROSOFT.VS.VC_RUNTIMEADDITIONALVSU_AMD64,V14\DEPENDENTS\{57A73DF6-4BA9-4C1D-BBBB-517289FF6C13} VC_redist.x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\46C08FE26A801EF4EB2931DF92C338B1 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\469A3A563CD350100010121162216372\SourceList\Media\1 = ";" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B72BD4E49FCA01F4D835A94036160252\DeploymentFlags = "3" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5BA8C0AA792764D40A9D8090F65EE964\AuthorizedLUAApp = "0" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\88AAB0B9F51EF1A3CA0C2B609EDD7FC1 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\469A3A563CD350100010121162216372\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\469A3A563CD350100010121162216372\ProductName = "Dokan Library 1.5.1.1000 (x64)" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\469A3A563CD350100010121162216372\SourceList\LastUsedSource = "n;1;C:\\ProgramData\\Package Cache\\{65A3A964-3DC3-0105-0001-211126123627}v1.5.1.1000\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{65A3A964-3DC3-0105-0001-211126123627}\Dependents DokanSetup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B72BD4E49FCA01F4D835A94036160252\AuthorizedLUAApp = "0" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8800A266DCF6DD54E97A86760485EA5D\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5BA8C0AA792764D40A9D8090F65EE964\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\450EFA9138AC5D549ABD1480FEB43D19\VC_Runtime_Additional msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5BA8C0AA792764D40A9D8090F65EE964\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\09A86F63C932FD435BC8463B1035EC53 msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8A567BD6FA501A947AD1F646E53EEC14\SourceList\Net msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8A567BD6FA501A947AD1F646E53EEC14 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_amd64,v14\ = "{19AFE054-CA83-45D5-A9DB-4108EF4BD391}" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\8800A266DCF6DD54E97A86760485EA5D msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeMinimumVSU_amd64,v14 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5BA8C0AA792764D40A9D8090F65EE964\Language = "1033" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\469A3A563CD350100010121162216372\SourceList\Net msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\469A3A563CD350100010121162216372\SourceList\Net\1 = "C:\\ProgramData\\Package Cache\\{65A3A964-3DC3-0105-0001-211126123627}v1.5.1.1000\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\450EFA9138AC5D549ABD1480FEB43D19\SourceList\Net\1 = "C:\\ProgramData\\Package Cache\\{19AFE054-CA83-45D5-A9DB-4108EF4BD391}v14.38.33135\\packages\\vcRuntimeAdditional_amd64\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{5F030BFA-CE6E-408A-9694-F593B319DBBE}\Dependents\{05c046de-f751-48c8-b8d3-77259ea88eb7} DokanSetup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\469A3A563CD350100010121162216372\AuthorizedLUAApp = "0" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\VC,redist.x64,amd64,14.30,bundle VC_redist.x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{8E5816F9-297E-4C51-8728-6FB385159C68}\ = "{bf17c798-887e-4516-8036-35d6e0649a36}" DiskDrillSetup.5.5.900.0.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8800A266DCF6DD54E97A86760485EA5D msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\Microsoft.VS.VC_RuntimeAdditionalVSU_amd64,v14\Dependents\{c649ede4-f16a-4486-a117-dcc2f2a35165} VC_redist.x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{8E5816F9-297E-4C51-8728-6FB385159C68}\DisplayName = "Disk Drill 5.5.900.0" DiskDrillSetup.5.5.900.0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B72BD4E49FCA01F4D835A94036160252\Version = "84214660" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B72BD4E49FCA01F4D835A94036160252\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{5F030BFA-CE6E-408A-9694-F593B319DBBE}\Version = "1.5.1.1000" DokanSetup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{65A3A964-3DC3-0105-0001-211126123627}\ = "{65A3A964-3DC3-0105-0001-211126123627}" DokanSetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B72BD4E49FCA01F4D835A94036160252\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B72BD4E49FCA01F4D835A94036160252\SourceList\Media msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Dependencies\VC,redist.x64,amd64,14.38,bundle VC_redist.x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\5BA8C0AA792764D40A9D8090F65EE964\SourceList\PackageName = "vc_runtimeMinimum_x64.msi" msiexec.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\8A567BD6FA501A947AD1F646E53EEC14\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{5F030BFA-CE6E-408A-9694-F593B319DBBE}\ = "{05c046de-f751-48c8-b8d3-77259ea88eb7}" DokanSetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\B72BD4E49FCA01F4D835A94036160252\SourceList\Net msiexec.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
msiexec.exepid process 2760 msiexec.exe 2760 msiexec.exe 2760 msiexec.exe 2760 msiexec.exe 2760 msiexec.exe 2760 msiexec.exe 2760 msiexec.exe 2760 msiexec.exe 2760 msiexec.exe 2760 msiexec.exe 2760 msiexec.exe 2760 msiexec.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 660 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
vssvc.exesrtasks.exeVC_redist.x64.exemsiexec.exedescription pid process Token: SeBackupPrivilege 2276 vssvc.exe Token: SeRestorePrivilege 2276 vssvc.exe Token: SeAuditPrivilege 2276 vssvc.exe Token: SeBackupPrivilege 4248 srtasks.exe Token: SeRestorePrivilege 4248 srtasks.exe Token: SeSecurityPrivilege 4248 srtasks.exe Token: SeTakeOwnershipPrivilege 4248 srtasks.exe Token: SeBackupPrivilege 4248 srtasks.exe Token: SeRestorePrivilege 4248 srtasks.exe Token: SeSecurityPrivilege 4248 srtasks.exe Token: SeTakeOwnershipPrivilege 4248 srtasks.exe Token: SeShutdownPrivilege 1448 VC_redist.x64.exe Token: SeIncreaseQuotaPrivilege 1448 VC_redist.x64.exe Token: SeSecurityPrivilege 2760 msiexec.exe Token: SeCreateTokenPrivilege 1448 VC_redist.x64.exe Token: SeAssignPrimaryTokenPrivilege 1448 VC_redist.x64.exe Token: SeLockMemoryPrivilege 1448 VC_redist.x64.exe Token: SeIncreaseQuotaPrivilege 1448 VC_redist.x64.exe Token: SeMachineAccountPrivilege 1448 VC_redist.x64.exe Token: SeTcbPrivilege 1448 VC_redist.x64.exe Token: SeSecurityPrivilege 1448 VC_redist.x64.exe Token: SeTakeOwnershipPrivilege 1448 VC_redist.x64.exe Token: SeLoadDriverPrivilege 1448 VC_redist.x64.exe Token: SeSystemProfilePrivilege 1448 VC_redist.x64.exe Token: SeSystemtimePrivilege 1448 VC_redist.x64.exe Token: SeProfSingleProcessPrivilege 1448 VC_redist.x64.exe Token: SeIncBasePriorityPrivilege 1448 VC_redist.x64.exe Token: SeCreatePagefilePrivilege 1448 VC_redist.x64.exe Token: SeCreatePermanentPrivilege 1448 VC_redist.x64.exe Token: SeBackupPrivilege 1448 VC_redist.x64.exe Token: SeRestorePrivilege 1448 VC_redist.x64.exe Token: SeShutdownPrivilege 1448 VC_redist.x64.exe Token: SeDebugPrivilege 1448 VC_redist.x64.exe Token: SeAuditPrivilege 1448 VC_redist.x64.exe Token: SeSystemEnvironmentPrivilege 1448 VC_redist.x64.exe Token: SeChangeNotifyPrivilege 1448 VC_redist.x64.exe Token: SeRemoteShutdownPrivilege 1448 VC_redist.x64.exe Token: SeUndockPrivilege 1448 VC_redist.x64.exe Token: SeSyncAgentPrivilege 1448 VC_redist.x64.exe Token: SeEnableDelegationPrivilege 1448 VC_redist.x64.exe Token: SeManageVolumePrivilege 1448 VC_redist.x64.exe Token: SeImpersonatePrivilege 1448 VC_redist.x64.exe Token: SeCreateGlobalPrivilege 1448 VC_redist.x64.exe Token: SeRestorePrivilege 2760 msiexec.exe Token: SeTakeOwnershipPrivilege 2760 msiexec.exe Token: SeRestorePrivilege 2760 msiexec.exe Token: SeTakeOwnershipPrivilege 2760 msiexec.exe Token: SeRestorePrivilege 2760 msiexec.exe Token: SeTakeOwnershipPrivilege 2760 msiexec.exe Token: SeRestorePrivilege 2760 msiexec.exe Token: SeTakeOwnershipPrivilege 2760 msiexec.exe Token: SeRestorePrivilege 2760 msiexec.exe Token: SeTakeOwnershipPrivilege 2760 msiexec.exe Token: SeRestorePrivilege 2760 msiexec.exe Token: SeTakeOwnershipPrivilege 2760 msiexec.exe Token: SeRestorePrivilege 2760 msiexec.exe Token: SeTakeOwnershipPrivilege 2760 msiexec.exe Token: SeRestorePrivilege 2760 msiexec.exe Token: SeTakeOwnershipPrivilege 2760 msiexec.exe Token: SeRestorePrivilege 2760 msiexec.exe Token: SeTakeOwnershipPrivilege 2760 msiexec.exe Token: SeRestorePrivilege 2760 msiexec.exe Token: SeTakeOwnershipPrivilege 2760 msiexec.exe Token: SeRestorePrivilege 2760 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
disk-drill-win.exepid process 4864 disk-drill-win.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 892 LogonUI.exe -
Suspicious use of WriteProcessMemory 58 IoCs
Processes:
disk-drill-win.exedisk-drill-win.exeDiskDrillSetup.5.5.900.0.exevc_redist.14.38.33135.x64.exevc_redist.14.38.33135.x64.exeVC_redist.x64.exeVC_redist.x64.exeVC_redist.x64.exeDokanSetup.1.5.1.1000.exeDokanSetup.1.5.1.1000.exemsiexec.exeMsiExec.exeMsiExec.exeMsiExec.exedescription pid process target process PID 516 wrote to memory of 4864 516 disk-drill-win.exe disk-drill-win.exe PID 516 wrote to memory of 4864 516 disk-drill-win.exe disk-drill-win.exe PID 516 wrote to memory of 4864 516 disk-drill-win.exe disk-drill-win.exe PID 4864 wrote to memory of 3088 4864 disk-drill-win.exe DiskDrillSetup.5.5.900.0.exe PID 4864 wrote to memory of 3088 4864 disk-drill-win.exe DiskDrillSetup.5.5.900.0.exe PID 4864 wrote to memory of 3088 4864 disk-drill-win.exe DiskDrillSetup.5.5.900.0.exe PID 3088 wrote to memory of 1636 3088 DiskDrillSetup.5.5.900.0.exe vc_redist.14.38.33135.x64.exe PID 3088 wrote to memory of 1636 3088 DiskDrillSetup.5.5.900.0.exe vc_redist.14.38.33135.x64.exe PID 3088 wrote to memory of 1636 3088 DiskDrillSetup.5.5.900.0.exe vc_redist.14.38.33135.x64.exe PID 1636 wrote to memory of 3768 1636 vc_redist.14.38.33135.x64.exe vc_redist.14.38.33135.x64.exe PID 1636 wrote to memory of 3768 1636 vc_redist.14.38.33135.x64.exe vc_redist.14.38.33135.x64.exe PID 1636 wrote to memory of 3768 1636 vc_redist.14.38.33135.x64.exe vc_redist.14.38.33135.x64.exe PID 3768 wrote to memory of 1448 3768 vc_redist.14.38.33135.x64.exe VC_redist.x64.exe PID 3768 wrote to memory of 1448 3768 vc_redist.14.38.33135.x64.exe VC_redist.x64.exe PID 3768 wrote to memory of 1448 3768 vc_redist.14.38.33135.x64.exe VC_redist.x64.exe PID 1448 wrote to memory of 1052 1448 VC_redist.x64.exe VC_redist.x64.exe PID 1448 wrote to memory of 1052 1448 VC_redist.x64.exe VC_redist.x64.exe PID 1448 wrote to memory of 1052 1448 VC_redist.x64.exe VC_redist.x64.exe PID 1052 wrote to memory of 816 1052 VC_redist.x64.exe VC_redist.x64.exe PID 1052 wrote to memory of 816 1052 VC_redist.x64.exe VC_redist.x64.exe PID 1052 wrote to memory of 816 1052 VC_redist.x64.exe VC_redist.x64.exe PID 816 wrote to memory of 4828 816 VC_redist.x64.exe VC_redist.x64.exe PID 816 wrote to memory of 4828 816 VC_redist.x64.exe VC_redist.x64.exe PID 816 wrote to memory of 4828 816 VC_redist.x64.exe VC_redist.x64.exe PID 3088 wrote to memory of 1508 3088 DiskDrillSetup.5.5.900.0.exe DokanSetup.1.5.1.1000.exe PID 3088 wrote to memory of 1508 3088 DiskDrillSetup.5.5.900.0.exe DokanSetup.1.5.1.1000.exe PID 3088 wrote to memory of 1508 3088 DiskDrillSetup.5.5.900.0.exe DokanSetup.1.5.1.1000.exe PID 1508 wrote to memory of 4536 1508 DokanSetup.1.5.1.1000.exe DokanSetup.1.5.1.1000.exe PID 1508 wrote to memory of 4536 1508 DokanSetup.1.5.1.1000.exe DokanSetup.1.5.1.1000.exe PID 1508 wrote to memory of 4536 1508 DokanSetup.1.5.1.1000.exe DokanSetup.1.5.1.1000.exe PID 4536 wrote to memory of 2796 4536 DokanSetup.1.5.1.1000.exe DokanSetup.exe PID 4536 wrote to memory of 2796 4536 DokanSetup.1.5.1.1000.exe DokanSetup.exe PID 4536 wrote to memory of 2796 4536 DokanSetup.1.5.1.1000.exe DokanSetup.exe PID 2760 wrote to memory of 640 2760 msiexec.exe MsiExec.exe PID 2760 wrote to memory of 640 2760 msiexec.exe MsiExec.exe PID 2760 wrote to memory of 3220 2760 msiexec.exe MsiExec.exe PID 2760 wrote to memory of 3220 2760 msiexec.exe MsiExec.exe PID 2760 wrote to memory of 3836 2760 msiexec.exe MsiExec.exe PID 2760 wrote to memory of 3836 2760 msiexec.exe MsiExec.exe PID 2760 wrote to memory of 3836 2760 msiexec.exe MsiExec.exe PID 3836 wrote to memory of 2668 3836 MsiExec.exe dokanctl.exe PID 3836 wrote to memory of 2668 3836 MsiExec.exe dokanctl.exe PID 2760 wrote to memory of 2308 2760 msiexec.exe MsiExec.exe PID 2760 wrote to memory of 2308 2760 msiexec.exe MsiExec.exe PID 2308 wrote to memory of 4540 2308 MsiExec.exe rundll32.exe PID 2308 wrote to memory of 4540 2308 MsiExec.exe rundll32.exe PID 2308 wrote to memory of 4928 2308 MsiExec.exe rundll32.exe PID 2308 wrote to memory of 4928 2308 MsiExec.exe rundll32.exe PID 2760 wrote to memory of 1988 2760 msiexec.exe MsiExec.exe PID 2760 wrote to memory of 1988 2760 msiexec.exe MsiExec.exe PID 2760 wrote to memory of 1988 2760 msiexec.exe MsiExec.exe PID 1988 wrote to memory of 2444 1988 MsiExec.exe taskkill.exe PID 1988 wrote to memory of 2444 1988 MsiExec.exe taskkill.exe PID 2760 wrote to memory of 3004 2760 msiexec.exe cfbackd.w32.exe PID 2760 wrote to memory of 3004 2760 msiexec.exe cfbackd.w32.exe PID 2760 wrote to memory of 3004 2760 msiexec.exe cfbackd.w32.exe PID 2308 wrote to memory of 1052 2308 MsiExec.exe rundll32.exe PID 2308 wrote to memory of 1052 2308 MsiExec.exe rundll32.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\disk-drill-win.exe"C:\Users\Admin\AppData\Local\Temp\disk-drill-win.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\Temp\{7F7F4B7B-AAD5-461D-B657-2D1165A17AB7}\.cr\disk-drill-win.exe"C:\Windows\Temp\{7F7F4B7B-AAD5-461D-B657-2D1165A17AB7}\.cr\disk-drill-win.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\disk-drill-win.exe" -burn.filehandle.attached=544 -burn.filehandle.self=5562⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\Temp\{360B3340-2F5A-44E8-A3A8-BBBD2F7DF610}\.be\DiskDrillSetup.5.5.900.0.exe"C:\Windows\Temp\{360B3340-2F5A-44E8-A3A8-BBBD2F7DF610}\.be\DiskDrillSetup.5.5.900.0.exe" -q -burn.elevated BurnPipe.{7CD2ED5B-2445-4F1A-AE27-DC184A33BFA7} {FD1F3E4A-124E-4BBF-AB26-FD88E7055A2D} 48643⤵
- Adds Run key to start application
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\ProgramData\Package Cache\046F00C519900FCBF2E6E955FC155B11156A733B\vc_redist.14.38.33135.x64.exe"C:\ProgramData\Package Cache\046F00C519900FCBF2E6E955FC155B11156A733B\vc_redist.14.38.33135.x64.exe" /norestart /q /chainingpackage ADMINDEPLOYMENT /pipe NetFxSection.{F9E96E32-C82D-4059-B2D5-E36F2DA59E4B}4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\Temp\{B3564742-A04E-4CF9-8E78-2A46624EB511}\.cr\vc_redist.14.38.33135.x64.exe"C:\Windows\Temp\{B3564742-A04E-4CF9-8E78-2A46624EB511}\.cr\vc_redist.14.38.33135.x64.exe" -burn.clean.room="C:\ProgramData\Package Cache\046F00C519900FCBF2E6E955FC155B11156A733B\vc_redist.14.38.33135.x64.exe" -burn.filehandle.attached=540 -burn.filehandle.self=548 /norestart /q /chainingpackage ADMINDEPLOYMENT /pipe NetFxSection.{F9E96E32-C82D-4059-B2D5-E36F2DA59E4B}5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\Temp\{A031C5CE-D156-4C22-9E15-4AB3CE9238E5}\.be\VC_redist.x64.exe"C:\Windows\Temp\{A031C5CE-D156-4C22-9E15-4AB3CE9238E5}\.be\VC_redist.x64.exe" -q -burn.elevated BurnPipe.{2F977838-A2A3-4DA3-82F0-E8160590DDE0} {0094880C-67E6-4546-8726-09106010CA58} 37686⤵
- Adds Run key to start application
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe"C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={c649ede4-f16a-4486-a117-dcc2f2a35165} -burn.filehandle.self=1080 -burn.embedded BurnPipe.{60589030-6351-4D9F-8A9F-F34B1B99CC4E} {727AC31A-77C8-4419-B4F8-934C257F89E5} 14487⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe"C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe" -burn.clean.room="C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe" -burn.filehandle.attached=516 -burn.filehandle.self=536 -uninstall -quiet -burn.related.upgrade -burn.ancestors={c649ede4-f16a-4486-a117-dcc2f2a35165} -burn.filehandle.self=1080 -burn.embedded BurnPipe.{60589030-6351-4D9F-8A9F-F34B1B99CC4E} {727AC31A-77C8-4419-B4F8-934C257F89E5} 14488⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:816 -
C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe"C:\ProgramData\Package Cache\{57a73df6-4ba9-4c1d-bbbb-517289ff6c13}\VC_redist.x64.exe" -q -burn.elevated BurnPipe.{85BF82E2-A41B-4433-ACED-972665915898} {0D9CEF63-769E-4F2A-867D-FEB7C7468932} 8169⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4828 -
C:\ProgramData\Package Cache\20B1CAB9BCD5CAD52C5407D60E8556437242C730\DokanSetup.1.5.1.1000.exe"C:\ProgramData\Package Cache\20B1CAB9BCD5CAD52C5407D60E8556437242C730\DokanSetup.1.5.1.1000.exe" /norestart /quiet /install -burn.filehandle.self=1048 -burn.embedded BurnPipe.{37320CD3-D216-4A88-86B2-E0074800534A} {899DAB2D-5627-42D5-BAC3-01AD770127F9} 30884⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\Temp\{CF706B10-56D7-4E4D-96F9-F5C3781677D9}\.cr\DokanSetup.1.5.1.1000.exe"C:\Windows\Temp\{CF706B10-56D7-4E4D-96F9-F5C3781677D9}\.cr\DokanSetup.1.5.1.1000.exe" -burn.clean.room="C:\ProgramData\Package Cache\20B1CAB9BCD5CAD52C5407D60E8556437242C730\DokanSetup.1.5.1.1000.exe" -burn.filehandle.attached=540 -burn.filehandle.self=648 /norestart /quiet /install -burn.filehandle.self=1048 -burn.embedded BurnPipe.{37320CD3-D216-4A88-86B2-E0074800534A} {899DAB2D-5627-42D5-BAC3-01AD770127F9} 30885⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\Temp\{73A3666B-C577-4020-891C-6AFF550FE3E6}\.be\DokanSetup.exe"C:\Windows\Temp\{73A3666B-C577-4020-891C-6AFF550FE3E6}\.be\DokanSetup.exe" -q -burn.elevated BurnPipe.{4F399F79-5F0C-4C9F-A2D4-4B35CB9B6D78} {3FDAB572-463D-4280-9E18-F7A591F9FBC8} 45366⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2796
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 0B31162622FB93CE4A927015F85000822⤵
- Loads dropped DLL
PID:640 -
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding CE636E482C514541F4DA6A6D1C7296EE E Global\MSI00002⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Loads dropped DLL
- Modifies data under HKEY_USERS
PID:3220 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding E393BBC68F5FCA78A93BF00ED1BA0B1D E Global\MSI00002⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Program Files\Dokan\Dokan Library-1.5.1\dokanctl.exe"C:\Program Files\Dokan\Dokan Library-1.5.1\dokanctl.exe" /i n3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2668 -
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding 23ADD5CE1D8195845E94082F297418272⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Windows\Installer\MSI61AC.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240673234 88 msiGaCustomAction!msiGaCustomAction.CustomActions.gaCheckInstallPathCustomAction3⤵
- Drops file in Windows directory
- Loads dropped DLL
PID:4540 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Windows\Installer\MSI62C6.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240673515 92 msiGaCustomAction!msiGaCustomAction.CustomActions.gaCheckInstallConditionCustomAction3⤵
- Drops file in Windows directory
- Loads dropped DLL
PID:4928 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\Windows\Installer\MSI6B84.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240675703 114 msiGaCustomAction!msiGaCustomAction.CustomActions.gaSuccessCustomAction3⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops file in Windows directory
- Loads dropped DLL
- Checks processor information in registry
PID:1052 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 51242755E4A98DDAC09773BB31DC43F2 E Global\MSI00002⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\System32\taskkill.exe"C:\Windows\\System32\taskkill.exe" /F /IM DD.exe3⤵
- Kills process with taskkill
PID:2444 -
C:\Program Files\CleverFiles\Disk Drill\cfbackd.w32.exe"C:\Program Files\CleverFiles\Disk Drill\cfbackd.w32.exe" -i2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3004
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3910855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD571e1268c1192a9abba4e436e78edc62b
SHA152acf8c607d36bbf375f802a2ce55e7961600c80
SHA2564e36220e5688ff95b39cd1b8c0c7af693cafc6b440b943cb11f7942b10c795a0
SHA51205d0ce2daae56bd268b4ba36352e865c923ff98cde45f0f3a08a6721dd5d4dc55188662f46e91cb99334e1a505893ada2f617b5d57bf2f06e9fabd34b89b5349
-
Filesize
19KB
MD5450448b2d098ffd702fec842a53df010
SHA184bc2dd7745db1e0862be77ceb7def8a5fca4c15
SHA256faf8e79fb6da216de3145ec23be93ea2ad16d9b2a8ebac1daf908a37338a6dc8
SHA51288572bb6c95d46c6dcd8a46d12e3b87bb0b5e891adfc56da8c5a9093cb863d688cd3d31dd29dde3387490e182907de65c335c1ca8459028bfb9437d203f9cd20
-
Filesize
21KB
MD5c6d92e39a0353118823d35b75af1e3d3
SHA19146b24ecd50e69d630109257f2126ff2803f08e
SHA25678e710d9c41a47555b7816a5a7c76d70794299af8197775c4c5dd8320642dd02
SHA5126b57f3d2fa673b29cd0630cf344c1f2ca8cfb24b11b5dfbc77c3f0485822a5ddd629d9a2714203cb1f3e68654ba30ab657f93281b319f12926129033b3bc966c
-
Filesize
21KB
MD592c13808c7c7071013ec5f6c91a97342
SHA1f8ea4ca1faa3b318d996000a4625fc669720bce3
SHA256be5cec109b8bbd93c08b7f94ac52e5e88a3062927940dfda5b3ee530e8a2781f
SHA51267f5e21ffab9e6509fe38f84da88c85566a019a7b2aa8573079f1c739cb0f621d8bbe54f02faa10937157d8eae9191e27d67e0310479ee4aa4a27161bfefcc3d
-
Filesize
713KB
MD5c81f0e83f76abfa89ed72d866344c1e9
SHA14ea35be536958d868e2d4bf9da1c687097db3ca8
SHA2562371323633590f70cca50a1123f8d6935183ae2da153d2d080c87bd0d63f1229
SHA512a4d73e809c90b9942ad0600cd0de3c5ef7a5fbd87fff16536fd40c332b7fe229fa096a3408f4694a843a9a6fb99b2dfc20030ad8335410f32aa0eceffac3df8a
-
Filesize
28KB
MD5904f0cb10a07459ccc49dcfccc5877cc
SHA15ce62c63c1c92d4d6ebd0735f6e535b96c31428a
SHA2565f70f1a30a70b3a2fd4868f7460c8ac350fec54bad8f37d6e8c4f820bbec9de1
SHA512535be1b6d81482d13364254fd78eca12f5d01dd76e9811eb385428d17f5121e9619f5b0e3877bd26d67e70995244deca0fa4a36137a38526b4d837f1e14ac49d
-
Filesize
388KB
MD5a8df446d2c364532abb3a99ff593941d
SHA199482ba7d46169c1e388c9511764349a31e43a8e
SHA256f71184a0833a16f5e8eb0203fae916fee2392b58b217bd52119cfb792f2e1f04
SHA512d2207758dc7c194a0ca760773e6de1e06150b83c659e048cb595164ee0cb00376f25e7c39fe857b96186225a773490085f9c64b8306c766f1216c2e025c82b78
-
Filesize
301KB
MD5d0fcca93ba324f657a9b17f4714f1f82
SHA1a7f204f6a60f45199db94d615982c3490c506061
SHA25691f79df9c86b8b7bf6bf27739fee8492bf2ae661a06c2e589257fd7c267ff993
SHA512ebfded1fb5a57ea42f612dc51e7f62b1b41c50b034903e7866e9b7b6ae50941e3e6380c0baf9c0b02dbdd1f40b34ece9b8ccfb5de1cdbbb689c8df8c583f02b8
-
Filesize
141KB
MD52725dba3e6aacf3a49c9c9d493a4efec
SHA199b17c0aef3d01238b90caeb3738f1f279ab17a5
SHA25603e34f788305431d0540c0fddac2d9a66dcaf2cb7e267ffbe7678334ff3995ff
SHA5121bc76002e53d788d6bd8558ffb880863dcef28f8f03fda7e8ac6bf0eb46bb754e06b042cc56fd8549552320960a29e005b42f21c5acfb16e2de8e1ae05a48337
-
Filesize
1KB
MD55eeb5aa1f9e34a6f91fa5c431a072dcc
SHA1cc3268d2ff2e998d845b01e1fdb4188a749a4b9d
SHA2567f03ffd6cfa3a50539c9c5c6fe6e8b207183942df0e25bed513ee5dd39f975c5
SHA512b8a3e8fa80308a336be372ece7ea6ba4089a844ca7e2edf99e2601a6c69724442dc160f5df0bb6783f388ac46defd1763e33fd3acc6a70ed72749395b5f81f8a
-
Filesize
10KB
MD5a0eb9366a5d6042030c6aec99292f406
SHA1c9c23e1918e5abd45f0bafde646f163969ba20f8
SHA25690839856dddc01bf2af21340a83641dc40d2d68b8c01c3dd29eb261827a0ac7a
SHA512dbb636588d03010d027f15a8c1ad8e7641bbfc3f7ba2794ac6e4353f93f0da12a0bc039abdac664840d034bcdd15489d59768d829736d2b1eb725757370e590c
-
Filesize
377KB
MD598d68d07ed2759612018ef269f713dc8
SHA1830ae5d65a2782a874d2373f883de113867a3609
SHA2567a055d96a85ca1926e0f89da0bffe47e31beb0c75f756b38bdf935e5f972ded4
SHA5127c6cf6126b6625fda1f76add72db7864fde9d675d3a424dee91d558b618ebd65588e2ec6ba7fedc140555450a9fe8717ae27baa4d934adef0408fc3bb3447932
-
Filesize
394KB
MD5a60f678d0fd4524adc0eb934a1739365
SHA15dd45ab3c14a1998fec3a10fc998ab1c86f63485
SHA256d3ebcc2003be13a8fe9d9b35da2a08d59521beb19591cbecf808a8b68af419a1
SHA512e701a51dfb203e1483f13d75788e8d7182fc8f3c8e5807c60b492baf8dcb46c02fea90b33f56b3018737a06b8e03eaee46b8b0d3abf6c9b3facae93d6fc588bb
-
Filesize
874B
MD5c71531f94d4ae216f42c422668976ec5
SHA166cb93178d4adda899c9c4ac7c6fd67b79159163
SHA256ee356c60065ca500d3e2d8f6387718a3f7cc064f0a971e81a2c84bd9f04cf3a4
SHA512a851cda83108e05724d988ca9bea1ff917c340413e4cb89d01726c8cd1aa4636cf60551b87c3256a3e5e1e83dbb58d92e648d61100fd2734447da2ff0b94e3d7
-
Filesize
1KB
MD560dacc85e0efd9963e1d7621d84c1e4a
SHA145e5727d97dccf637491d5ddf48e0eb90b93f979
SHA256e4861eb65823511e6e18cd4228dc79f9a2d0cb472c13242d048e7e15826a9444
SHA512795cff6ccef94690f7d7209f1e2b32f6a87ec49e90802863eadb30c549d5d0cab48815a077c97d8e2dfc7e9fa8541fea51f8caa107e3f8c53a84e724a86d136c
-
Filesize
1KB
MD57eb236f10d5013e533c3322c975581ac
SHA134817692913f5648a0fc316065b5b8f6d961818d
SHA25608d02396e382b80765486f922c06d8840ca63a5251eee8f870499b045e52424d
SHA5126af25144233fee34d438250d8ae70d93ccab079e9f06b69c2cb8bec1a7a282fb48efe70fada5005b0b24433150a3bf62abdb89bd1a41ec95559a66aad2bd9d2f
-
Filesize
312B
MD521846b9f863ed86ec0c2ecf1f0442b32
SHA1528214e596a21929e4028bb465ee6b67508381cd
SHA256c89d4c69774227eed0d7bed828cb31c094b345150ed2367cbc0f8c02abe510aa
SHA512b8f00064223a01655314e9d81c6264bcf424201183aedb10d32edfeb1c526b6cf2e1e499051c64e80238aef69711094e566d0f802403d29defeb4075966aabbf
-
Filesize
1KB
MD58fd57988f9521ba8c5b2a6334219863c
SHA10e87d8734773a14850c96ed855c385467e481d2d
SHA25654b81ac9829ffbda50bfe97eb64e4ff7551eee8b7604c1f0b7285367ec72d7b2
SHA51227d15fc4586db21baed10c1b6d02f4b091f82d5f08d701db0414c3a769ef01f444a2dac6012f0eb27146060f6f5c826473eddc7775ca5aa24a3fd04e5c1d66d6
-
Filesize
1KB
MD58d9a1344da570b95303f5f60d163a764
SHA1f0c7821735a51a14ed2de12b8cb062349f49e4dd
SHA256933f9d2cd94489e23ca8415adae5fd1e510fde32648a34971f583bbd5e7bf67f
SHA5123e307f028b1aaaaa3dc2d63208812e8d0b766465bf9c2576de64134b1ad11d8996824e9ed25fa6a4a6ae48845ef1a7e7bf62e3797ba53e5497c52117a3092eb2
-
C:\Users\Admin\AppData\Local\Temp\Dokan_Library_1.5.1.1000_Bundle_20240813064105_000_Dokan_x64.msi.log
Filesize1KB
MD5a674ea890ebe61aa645f9d07946e6e76
SHA104ac8bb0e4b2c51eb73dc27672eb8568e5e9a6e0
SHA25648bfeae42eb558a5d0685de2e19a3eedf1313ceeb54f07d4f5bb5f5e933cb05c
SHA51295d017ecc288f3166b4c39c047d4f455e8d09c2c850981ef3106314a47d6c6b807919ae786ce4946f1a4e20fc162ae1542ba8499fa083adad28b63d03f0ec592
-
Filesize
2KB
MD5e7c1c28ee8bb323aa0a29429b0301b76
SHA1b5272c235e26434a33c846aeee43ebdc5dbf1c38
SHA25647c3f06e6c8df5feb305490188af23a212c2acab1fdccca2bd9938739e85aa17
SHA512423c1f4631e19118e274a55d5b3ca7600faeb7195af7b65177f33f475b143fe674777f2f777fb69f1868795647a8667434e0c03e542a1e63210c2d4a84180895
-
Filesize
2KB
MD56037e5b3a29d553508ef7a144bd9c91e
SHA122280cdd6ed9ea3e8c48e042e633b06496a8fbc0
SHA256511207cefebb9dd7eec63909e2cb66f1c0734b6f09b9a6309db59bad4aa4256f
SHA51284c372c71893dc936dd58353177666f92100c44e2d1f712c0a93977fef8167c6159ea8a8b032e746d5f7591611b6995d31876e36fb4b58677045824e63d9e960
-
Filesize
149KB
MD5418322f7be2b68e88a93a048ac75a757
SHA109739792ff1c30f73dacafbe503630615922b561
SHA256ea5d4b4c7e7be1ce24a614ae1e31a58bcae6f1694dd8bfb735cf47d35a08d59b
SHA512253f62f5ce75df3e9ac3c62e2f06f30c7c6de6280fbfc830cdd15bf29cb8ee9ed878212f6df5d0ac6a5c9be0e6259f900eccee472a890f15dd3ff1f84958aeef
-
Filesize
690KB
MD58deb7d2f91c7392925718b3ba0aade22
SHA1fc8e9b10c83e16eb0af1b6f10128f5c37b389682
SHA256cb42fac1aebb6e1ac4907a38035b218b5f992d1bcd4dece11b1664a588e876e4
SHA51237f2c132b632c8e5a336bdc773d953c7f39872b1bae2ba34fbaf7794a477fd0dcb9ff60a3ddb447fe76abd98e557bd5ee544876584adea152b0841b3e313054c
-
Filesize
113KB
MD5fa0d3eb4ff2a36049eb0373e645fc16a
SHA1e757a6f96303313778670e6f6fbdfd237743e7b1
SHA256ee2f295eacd7d54799e2f6df191ff1da3bac490a865bb9654bd1ecbf9f2bb4d3
SHA512be7508c9ca9f17ac0d2f9c656fa5eada18f345781d8ed210c23dc038394f7564b3821f4528139ae3db5067a4b2dcda1ed8d00150993f1904098c439da19dfc9f
-
Filesize
615KB
MD5a95da1b0805973f5becc95995e713a68
SHA12572032a0aaa9615cf20949c957ea5aeffd2c654
SHA256ecb80749bf597194f61699401e6805a45c4cb6cbdf50f8b4ad5e13890f82a900
SHA51295bf9485bfe43c0f387fc5741f08adbae027310b291ff8fe2343e9f5ac2c33ace365ede408f6b134f81876b35451006232f5e26638109a0b791caaa0564ab2df
-
Filesize
28KB
MD5f6fabea50d0e85ec3e0cb93794ac55d6
SHA1a985999df06adc4580811380db813e2e4697ec0c
SHA25626e377ee21ed4b09f1aaf241081e29c09d2e47bc0512fb7c755653b5fba5e11c
SHA512be9e31350d10f6f7f60434d06a350bf659a8a301659b303b6b323e145069bc774efd6fd3dec41fa8234099f9efe32b98d455adeb97ef223c6e4ac2b3f7f178ee
-
Filesize
1KB
MD501c01d040563a55e0fd31cc8daa5f155
SHA13c1c229703198f9772d7721357f1b90281917842
SHA25633d947c04a10e3aff3dca3b779393fa56ce5f02251c8cbae5076a125fdea081f
SHA5129c3f0cc17868479575090e1949e31a688b8c1cdfa56ac4a08cbe661466bb40ecfc94ea512dc4b64d5ff14a563f96f1e71c03b6eeacc42992455bd4f1c91f17d5
-
Filesize
179KB
MD51a5caea6734fdd07caa514c3f3fb75da
SHA1f070ac0d91bd337d7952abd1ddf19a737b94510c
SHA256cf06d4ed4a8baf88c82d6c9ae0efc81c469de6da8788ab35f373b350a4b4cdca
SHA512a22dd3b7cf1c2edcf5b540f3daa482268d8038d468b8f00ca623d1c254affbbc1446e5bd42adc3d8e274be3ba776b0034e179faccd9ac8612ccd75186d1e3bf1
-
Filesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
Filesize
931KB
MD579f8f96d861c87c949cc904020a2092b
SHA175eb3505e6bef949a0778c178ec87b417482a259
SHA256735006e0e39a3d38f42be4ee96434a239d2ba827ce7bc3e95d74c7cc8ce800da
SHA512f73f44da61ed29e0805afcbb8b652dd1fbbc6fad60452708697b12af22ed287fce640f3451015cf0dee14a852a9209c5093a6a892bc4264a427d9baddda1c03a
-
Filesize
507KB
MD53556298d25afd095b48279264d9911da
SHA1a1182374dd98b0ec3c9edfa3597f2142a25fed2b
SHA256e5a4d9f08f0faf571abfe0a361f5e5ad9fd80315c835f7a8ddb5d6a8f81e5b57
SHA512ab2b66b366ba6c56e075e652ac8a8a30e8310488d65db7812ba9676e4c500ba21c9c0e00730998693874d33924d4e2a591ec54aa2da394578d2c6e5262b49f5c
-
Filesize
80KB
MD5bc348d03ed3d614eeb776df9c17dd0c9
SHA10d0628742f480a07e08f251d7ffa6d2c671b6811
SHA256bcc352480c5bb9be1021442b5f1c948a33504d75b9c76f899eb3244e0b40c786
SHA51212b12b6ccece3de9e76562ca83e078cf502e0de34747abe84f70665bd2727f4cdd62d04a1811095440c5f52fcc2b4a07f3c45b2fd3bf7d1933b596a09b5cf311
-
Filesize
184KB
MD5fe7e0bd53f52e6630473c31299a49fdd
SHA1f706f45768bfb95f4c96dfa0be36df57aa863898
SHA2562bea14d70943a42d344e09b7c9de5562fa7e109946e1c615dd584da30d06cc80
SHA512feed48286b1e182996a3664f0facdf42aae3692d3d938ea004350c85764db7a0bea996dfddf7a77149c0d4b8b776fb544e8b1ce5e9944086a5b1ed6a8a239a3c
-
Filesize
26.8MB
MD5b0a9539ec71a5de35bc4e97332550498
SHA1403a5f29a4e1cbf5a2c410586ff53324cc622ca2
SHA256dc01ad88f8c85fd7436f6942fbec660fa8d9bbf5a5b69e979874cfa8b93303fa
SHA512da1c87c13547af669718ef4dc69154b9f81ff0d5ada84d2a0eb36d34dc77f357bce75e533695eaf28c362e8c8649b382860269989feca761a72a38e2a5050480
-
Filesize
17.6MB
MD55494822f54196466a02bfbd78b91e827
SHA120b1cab9bcd5cad52c5407d60e8556437242c730
SHA25648e7b21310d28bbef6961ba01d52ace8a08a937a8c9cf4f60f4fa17885eeb518
SHA512bf4d243f805087d8dbe5a36e5ebcf00bb7d0456d6304ea89ae4b1cb0aece790c04f5941424a91d988604472c910e02e7fc494b5718ed091ec4e92c710c2f125d
-
Filesize
24.2MB
MD5a8a68bcc74b5022467f12587baf1ef93
SHA1046f00c519900fcbf2e6e955fc155b11156a733b
SHA2561ad7988c17663cc742b01bef1a6df2ed1741173009579ad50a94434e54f56073
SHA51270a05bde549e5a973397cd77fe0c6380807cae768aa98454830f321a0de64bd0da30f31615ae6b4d9f0d244483a571e46024cf51b20fe813a6304a74bd8c0cc2
-
Filesize
4KB
MD50d1ae52cb83dc37298bd0872d1e08374
SHA1d6223fe2e4834b0e10d946879a2cb645c11e6db5
SHA2564e716f8dc1fdf9a803ea2441e2a6a185f7bbccd25dcb4a389742f056f9b4e74e
SHA5120e2a7938cab23eeb430a677f5061b40eb2b68d5691b9cdf4ac697caab52142a79f40ccd5e52d8b1eb73a3eff3495de92161e6cced5b4478f2240eb2c10add484
-
Filesize
11.9MB
MD5910c2771cc11e19efecc8b79437df6f0
SHA165cf740580e4c202579aedd2ec520a9f85e68e05
SHA256c7ab35e0d80d0f81a03e44cbeb7220625248d00de8c8019fc6a87ffe223db49f
SHA512492f4560c1505ada9d5c79ad0c098159af473de7567048e7dc48559328c9970641cd5e2eb8f749ce04918a9a0bb1a0bd943915abd686ea8824191c0747fafe1f
-
Filesize
888KB
MD5ddc2103d7db9f4b5ba331ed09293a336
SHA173bd031762f1168a4d7fed65bbc1663ca6cceb3c
SHA256386a38dd828a617f60d11719ad5eaa3fa21a21b46f3871f5b4553e9f6e67aced
SHA5122e77b5c6d7562bd23d1372903da819c5a905f791228dc89317159e9ed2c32e7dc40bb2067de6de3b43a887d3799b58fd44505d81fae3b6348e64bedeab2effb3
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
191KB
MD5eab9caf4277829abdf6223ec1efa0edd
SHA174862ecf349a9bedd32699f2a7a4e00b4727543d
SHA256a4efbdb2ce55788ffe92a244cb775efd475526ef5b61ad78de2bcdfaddac7041
SHA51245b15ade68e0a90ea7300aeb6dca9bc9e347a63dba5ce72a635957564d1bdf0b1584a5e34191916498850fc7b3b7ecfbcbfcb246b39dbf59d47f66bc825c6fd2
-
Filesize
5.4MB
MD5d0cbbe859fbb7c25dd5158e0f45d3682
SHA19c2f0b8379976fda1b46aa8c4a4a27b6f824b659
SHA25697aef328363e120e786841903bb51a17547aa84f64d5d3525940ec5a69b9a627
SHA5127ad84ae54668c07033ad100bc101fd0bf0b0783a1dd1f018d241097e167328b8e87cc15e4c0b45859e1946d41ef7528f46ca3c44deccd8859f11274d9e4189b6
-
Filesize
955KB
MD53d14b0e254ea96fef419e6da38eb25e4
SHA193341ef98a0e2ae2cccc7e467af23bcc477d9a5c
SHA2568717dc81d0345d8b81aa85e776fd3e0e6010dba974bf0f5660071e6d680c4526
SHA51264a656648c16aa78ed74196e327126f6a9eb5d89052cdcd8f83eb655842e41c4f42be7f61541371f36ce322d208d1d707f485e99a79aa799fad7fd2c51553811
-
Filesize
188KB
MD5d5a907e3b279f26804af0c56b0c65d52
SHA163bf7f0afd12ef21781dc14dd3b14c59d9e66518
SHA256401ffa2ef4f070e211ef3f6e4f8a2a7af2bc9ea0119bbacad040669ab6221bba
SHA5128d23fed4d26f0e2d1e40d5993ab2f588be1e7873cbcbe2064351ca8ef705bf74535225e9d0c2adf93fabfd45691077c7abb3991a013c8b4b234b9751c991f327
-
Filesize
188KB
MD5e312d6be7dee2b8f3737e0a1bc92e3aa
SHA172487572a3f8b8eff93489997c8a5041ea7a6867
SHA256d48c8e848a219bceb638b2505132756cb908703fe75dee78bdf475435420dc49
SHA512b39a0c18aa242887e3f9ae3d49bc9d6765ce15097718964cccd86b824d13481cbd53175105db29d17e3a08f74fe4d20dfb3f9989eca5276c3f5fbb255b80f8ae
-
Filesize
635KB
MD5b73be38096eddc4d427fbbfdd8cf15bd
SHA1534f605fd43cc7089e448e5fa1b1a2d56de14779
SHA256ab1164dcaf6c7d7d4905881f332a7b6f854be46e36b860c44d9eedc96ab6607a
SHA5125af779926d344bc7c4140725f90cddad5eb778f5ca4856d5a31a6084424964d205638815eab4454e0ea34ea56fafca19fadd1eb2779dc6b7f277e4e4ce4b1603
-
Filesize
700KB
MD5a506dc305fea77b94923f210e5389968
SHA15857367e32178fff8b501b16a025ecf02ed05d24
SHA256203b6c8e2d88200e290ffb83791e1953acbdd2aee21fa841c4c67081583a0d4c
SHA512c7c01c018c9fa07f2e0ae5dce31a3b22004ddbca5d794c193790f0685b8f511f95f8df6b3da6d0f8bfc392460f24faf84de450f968e0cb215fb6db813c03daf2
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e