Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
1qyd priv.rar
windows10-1703-x64
3qyd priv.rar
windows10-2004-x64
3qyd priv p...ME.txt
windows10-1703-x64
1qyd priv p...ME.txt
windows10-2004-x64
1qyd priv p...up.exe
windows10-1703-x64
8qyd priv p...up.exe
windows10-2004-x64
8loader-o.pyc
windows10-1703-x64
3loader-o.pyc
windows10-2004-x64
3Analysis
-
max time kernel
614s -
max time network
1608s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
11/09/2024, 18:12
Static task
static1
Behavioral task
behavioral1
Sample
qyd priv.rar
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
qyd priv.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
qyd priv pred/READ ME.txt
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
qyd priv pred/READ ME.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
qyd priv pred/qpred-setup.exe
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
qyd priv pred/qpred-setup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
loader-o.pyc
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
loader-o.pyc
Resource
win10v2004-20240802-en
General
-
Target
qyd priv pred/qpred-setup.exe
-
Size
83.3MB
-
MD5
53e4003e2f973d76d725327f9a00374c
-
SHA1
396988c2a64b24f82c16b075430acfef8fb2e45b
-
SHA256
b17cb39f3d9da2e11a0f098e075fbd104327cbcf2143ccee63fb1510810a9d09
-
SHA512
0e45f43153c4ea80a50fffd1a29ff953d589f30f0f0866a05a3e7f594bc95e8f8b579d24f48c397d3e871df280abb1eacccd65b39447cbf9d0d33d14e42f7bda
-
SSDEEP
1572864:IKB7vFQqMrlpA+Ql4OdHxTivfSioqiASrrIo:IKBJykl9Hxen1obr0
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4144 powershell.exe 1364 powershell.exe 3348 powershell.exe 168 powershell.exe -
Loads dropped DLL 52 IoCs
pid Process 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral5/files/0x000700000001b024-835.dat upx behavioral5/memory/4596-839-0x00007FFF8D970000-0x00007FFF8E035000-memory.dmp upx behavioral5/files/0x000700000001ac21-841.dat upx behavioral5/memory/4596-847-0x00007FFFA15A0000-0x00007FFFA15C5000-memory.dmp upx behavioral5/files/0x000700000001ac5e-848.dat upx behavioral5/memory/4596-849-0x00007FFFA2620000-0x00007FFFA262F000-memory.dmp upx behavioral5/files/0x000700000001ac1f-850.dat upx behavioral5/memory/4596-852-0x00007FFFA1890000-0x00007FFFA18AA000-memory.dmp upx behavioral5/files/0x000700000001ac25-853.dat upx behavioral5/files/0x000700000001ac5d-855.dat upx behavioral5/memory/4596-876-0x00007FFFA1570000-0x00007FFFA159D000-memory.dmp upx behavioral5/files/0x000700000001ac29-877.dat upx behavioral5/files/0x000700000001ac2d-875.dat upx behavioral5/files/0x000700000001ac2b-873.dat upx behavioral5/files/0x000700000001ac2a-872.dat upx behavioral5/files/0x000700000001ac28-870.dat upx behavioral5/files/0x000700000001ac27-869.dat upx behavioral5/files/0x000700000001ac26-868.dat upx behavioral5/files/0x000700000001ac24-867.dat upx behavioral5/files/0x000700000001ac23-866.dat upx behavioral5/files/0x000700000001ac22-865.dat upx behavioral5/files/0x000700000001ac20-864.dat upx behavioral5/files/0x000700000001ac1e-863.dat upx behavioral5/files/0x000700000001b13c-861.dat upx behavioral5/files/0x000700000001b0cc-860.dat upx behavioral5/files/0x000700000001b027-859.dat upx behavioral5/files/0x000700000001b022-858.dat upx behavioral5/files/0x000700000001ac5f-856.dat upx behavioral5/memory/4596-880-0x00007FFFA2610000-0x00007FFFA261D000-memory.dmp upx behavioral5/memory/4596-879-0x00007FFFA1550000-0x00007FFFA1569000-memory.dmp upx behavioral5/memory/4596-882-0x00007FFFA19D0000-0x00007FFFA19DF000-memory.dmp upx behavioral5/memory/4596-885-0x00007FFFA1500000-0x00007FFFA1536000-memory.dmp upx behavioral5/memory/4596-887-0x00007FFF9EC20000-0x00007FFF9EC2D000-memory.dmp upx behavioral5/memory/4596-891-0x00007FFF9EC00000-0x00007FFF9EC14000-memory.dmp upx behavioral5/memory/4596-890-0x00007FFF8D970000-0x00007FFF8E035000-memory.dmp upx behavioral5/memory/4596-893-0x00007FFFA15A0000-0x00007FFFA15C5000-memory.dmp upx behavioral5/memory/4596-892-0x00007FFF9D6F0000-0x00007FFF9DC19000-memory.dmp upx behavioral5/memory/4596-895-0x00007FFF9E970000-0x00007FFF9E9A3000-memory.dmp upx behavioral5/memory/4596-898-0x00007FFF9E550000-0x00007FFF9E61D000-memory.dmp upx behavioral5/memory/4596-897-0x00007FFFA1890000-0x00007FFFA18AA000-memory.dmp upx behavioral5/memory/4596-901-0x00007FFF9B780000-0x00007FFF9B89A000-memory.dmp upx behavioral5/files/0x000700000001ac82-904.dat upx behavioral5/memory/4596-906-0x00007FFF9E6F0000-0x00007FFF9E708000-memory.dmp upx behavioral5/memory/4596-908-0x00007FFF9E520000-0x00007FFF9E544000-memory.dmp upx behavioral5/memory/4596-911-0x00007FFF97F10000-0x00007FFF9808F000-memory.dmp upx behavioral5/memory/4596-910-0x00007FFFA19D0000-0x00007FFFA19DF000-memory.dmp upx behavioral5/files/0x000700000001ac69-912.dat upx behavioral5/memory/4596-915-0x00007FFF9D690000-0x00007FFF9D69B000-memory.dmp upx behavioral5/files/0x000700000001ac6b-914.dat upx behavioral5/memory/4596-918-0x00007FFF9D670000-0x00007FFF9D68C000-memory.dmp upx behavioral5/files/0x000700000001abf6-917.dat upx behavioral5/memory/4596-922-0x00007FFF9D660000-0x00007FFF9D66B000-memory.dmp upx behavioral5/memory/4596-921-0x00007FFF9EC00000-0x00007FFF9EC14000-memory.dmp upx behavioral5/files/0x000700000001abf1-920.dat upx behavioral5/files/0x000700000001abf2-924.dat upx behavioral5/memory/4596-925-0x00007FFF9D6F0000-0x00007FFF9DC19000-memory.dmp upx behavioral5/memory/4596-926-0x00007FFF9D650000-0x00007FFF9D65B000-memory.dmp upx behavioral5/memory/4596-932-0x00007FFF9E970000-0x00007FFF9E9A3000-memory.dmp upx behavioral5/memory/4596-931-0x00007FFF9D640000-0x00007FFF9D64C000-memory.dmp upx behavioral5/memory/4596-930-0x00007FFF9D600000-0x00007FFF9D60C000-memory.dmp upx behavioral5/memory/4596-929-0x00007FFF9D610000-0x00007FFF9D61B000-memory.dmp upx behavioral5/memory/4596-927-0x00007FFF9D630000-0x00007FFF9D63B000-memory.dmp upx behavioral5/memory/4596-928-0x00007FFF9D620000-0x00007FFF9D62C000-memory.dmp upx behavioral5/memory/4596-933-0x00007FFF9E550000-0x00007FFF9E61D000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 raw.githubusercontent.com 4 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ip-api.com -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4572 cmd.exe 1860 PING.EXE -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 4432 WMIC.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1860 PING.EXE -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 4596 qpred-setup.exe 3348 powershell.exe 3348 powershell.exe 3348 powershell.exe 4144 powershell.exe 4144 powershell.exe 4144 powershell.exe 1364 powershell.exe 1364 powershell.exe 1364 powershell.exe 168 powershell.exe 168 powershell.exe 168 powershell.exe 4596 qpred-setup.exe 4596 qpred-setup.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4596 qpred-setup.exe Token: SeDebugPrivilege 3348 powershell.exe Token: SeDebugPrivilege 4144 powershell.exe Token: SeIncreaseQuotaPrivilege 4144 powershell.exe Token: SeSecurityPrivilege 4144 powershell.exe Token: SeTakeOwnershipPrivilege 4144 powershell.exe Token: SeLoadDriverPrivilege 4144 powershell.exe Token: SeSystemProfilePrivilege 4144 powershell.exe Token: SeSystemtimePrivilege 4144 powershell.exe Token: SeProfSingleProcessPrivilege 4144 powershell.exe Token: SeIncBasePriorityPrivilege 4144 powershell.exe Token: SeCreatePagefilePrivilege 4144 powershell.exe Token: SeBackupPrivilege 4144 powershell.exe Token: SeRestorePrivilege 4144 powershell.exe Token: SeShutdownPrivilege 4144 powershell.exe Token: SeDebugPrivilege 4144 powershell.exe Token: SeSystemEnvironmentPrivilege 4144 powershell.exe Token: SeRemoteShutdownPrivilege 4144 powershell.exe Token: SeUndockPrivilege 4144 powershell.exe Token: SeManageVolumePrivilege 4144 powershell.exe Token: 33 4144 powershell.exe Token: 34 4144 powershell.exe Token: 35 4144 powershell.exe Token: 36 4144 powershell.exe Token: SeDebugPrivilege 1364 powershell.exe Token: SeIncreaseQuotaPrivilege 1364 powershell.exe Token: SeSecurityPrivilege 1364 powershell.exe Token: SeTakeOwnershipPrivilege 1364 powershell.exe Token: SeLoadDriverPrivilege 1364 powershell.exe Token: SeSystemProfilePrivilege 1364 powershell.exe Token: SeSystemtimePrivilege 1364 powershell.exe Token: SeProfSingleProcessPrivilege 1364 powershell.exe Token: SeIncBasePriorityPrivilege 1364 powershell.exe Token: SeCreatePagefilePrivilege 1364 powershell.exe Token: SeBackupPrivilege 1364 powershell.exe Token: SeRestorePrivilege 1364 powershell.exe Token: SeShutdownPrivilege 1364 powershell.exe Token: SeDebugPrivilege 1364 powershell.exe Token: SeSystemEnvironmentPrivilege 1364 powershell.exe Token: SeRemoteShutdownPrivilege 1364 powershell.exe Token: SeUndockPrivilege 1364 powershell.exe Token: SeManageVolumePrivilege 1364 powershell.exe Token: 33 1364 powershell.exe Token: 34 1364 powershell.exe Token: 35 1364 powershell.exe Token: 36 1364 powershell.exe Token: SeDebugPrivilege 168 powershell.exe Token: SeIncreaseQuotaPrivilege 168 powershell.exe Token: SeSecurityPrivilege 168 powershell.exe Token: SeTakeOwnershipPrivilege 168 powershell.exe Token: SeLoadDriverPrivilege 168 powershell.exe Token: SeSystemProfilePrivilege 168 powershell.exe Token: SeSystemtimePrivilege 168 powershell.exe Token: SeProfSingleProcessPrivilege 168 powershell.exe Token: SeIncBasePriorityPrivilege 168 powershell.exe Token: SeCreatePagefilePrivilege 168 powershell.exe Token: SeBackupPrivilege 168 powershell.exe Token: SeRestorePrivilege 168 powershell.exe Token: SeShutdownPrivilege 168 powershell.exe Token: SeDebugPrivilege 168 powershell.exe Token: SeSystemEnvironmentPrivilege 168 powershell.exe Token: SeRemoteShutdownPrivilege 168 powershell.exe Token: SeUndockPrivilege 168 powershell.exe Token: SeManageVolumePrivilege 168 powershell.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 4952 wrote to memory of 4596 4952 qpred-setup.exe 74 PID 4952 wrote to memory of 4596 4952 qpred-setup.exe 74 PID 4596 wrote to memory of 4556 4596 qpred-setup.exe 76 PID 4596 wrote to memory of 4556 4596 qpred-setup.exe 76 PID 4556 wrote to memory of 3348 4556 cmd.exe 78 PID 4556 wrote to memory of 3348 4556 cmd.exe 78 PID 4596 wrote to memory of 2764 4596 qpred-setup.exe 79 PID 4596 wrote to memory of 2764 4596 qpred-setup.exe 79 PID 2764 wrote to memory of 4144 2764 cmd.exe 81 PID 2764 wrote to memory of 4144 2764 cmd.exe 81 PID 2764 wrote to memory of 1364 2764 cmd.exe 83 PID 2764 wrote to memory of 1364 2764 cmd.exe 83 PID 2764 wrote to memory of 168 2764 cmd.exe 84 PID 2764 wrote to memory of 168 2764 cmd.exe 84 PID 4596 wrote to memory of 3896 4596 qpred-setup.exe 85 PID 4596 wrote to memory of 3896 4596 qpred-setup.exe 85 PID 3896 wrote to memory of 5116 3896 cmd.exe 87 PID 3896 wrote to memory of 5116 3896 cmd.exe 87 PID 4596 wrote to memory of 1668 4596 qpred-setup.exe 88 PID 4596 wrote to memory of 1668 4596 qpred-setup.exe 88 PID 4596 wrote to memory of 2252 4596 qpred-setup.exe 90 PID 4596 wrote to memory of 2252 4596 qpred-setup.exe 90 PID 2252 wrote to memory of 4432 2252 cmd.exe 92 PID 2252 wrote to memory of 4432 2252 cmd.exe 92 PID 4596 wrote to memory of 2720 4596 qpred-setup.exe 93 PID 4596 wrote to memory of 2720 4596 qpred-setup.exe 93 PID 2720 wrote to memory of 1716 2720 cmd.exe 95 PID 2720 wrote to memory of 1716 2720 cmd.exe 95 PID 4596 wrote to memory of 2388 4596 qpred-setup.exe 96 PID 4596 wrote to memory of 2388 4596 qpred-setup.exe 96 PID 2388 wrote to memory of 4560 2388 cmd.exe 98 PID 2388 wrote to memory of 4560 2388 cmd.exe 98 PID 4596 wrote to memory of 2824 4596 qpred-setup.exe 99 PID 4596 wrote to memory of 2824 4596 qpred-setup.exe 99 PID 2824 wrote to memory of 3808 2824 cmd.exe 101 PID 2824 wrote to memory of 3808 2824 cmd.exe 101 PID 4596 wrote to memory of 1928 4596 qpred-setup.exe 102 PID 4596 wrote to memory of 1928 4596 qpred-setup.exe 102 PID 1928 wrote to memory of 2776 1928 cmd.exe 104 PID 1928 wrote to memory of 2776 1928 cmd.exe 104 PID 4596 wrote to memory of 4572 4596 qpred-setup.exe 105 PID 4596 wrote to memory of 4572 4596 qpred-setup.exe 105 PID 4572 wrote to memory of 1860 4572 cmd.exe 107 PID 4572 wrote to memory of 1860 4572 cmd.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\qyd priv pred\qpred-setup.exe"C:\Users\Admin\AppData\Local\Temp\qyd priv pred\qpred-setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\qyd priv pred\qpred-setup.exe"C:\Users\Admin\AppData\Local\Temp\qyd priv pred\qpred-setup.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2"3⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath %USERPROFILE%\AppData" & powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath %USERPROFILE%\Local" & powershell.exe -command "Set-MpPreference -ExclusionExtension '.exe','.py'""3⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath C:\Users\Admin\AppData"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4144
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath C:\Users\Admin\Local"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Set-MpPreference -ExclusionExtension '.exe','.py'"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:168
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic os get Caption"3⤵
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\System32\Wbem\WMIC.exewmic os get Caption4⤵PID:5116
-
-
-
C:\Windows\System32\Wbem\wmic.exewmic cpu get Name3⤵PID:1668
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"3⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name4⤵
- Detects videocard installed
PID:4432
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"3⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\System32\Wbem\WMIC.exewmic computersystem get totalphysicalmemory4⤵PID:1716
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\\Windows\\System32\\wbem\\WMIC.exe csproduct get uuid"3⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\System32\wbem\WMIC.exeC:\\Windows\\System32\\wbem\\WMIC.exe csproduct get uuid4⤵PID:4560
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "wmic path softwarelicensingservice get OA3xOriginalProductKey"3⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\System32\Wbem\WMIC.exewmic path softwarelicensingservice get OA3xOriginalProductKey4⤵PID:3808
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"3⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName4⤵PID:2776
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ping localhost -n 3 > NUL && del /A H /F "C:\Users\Admin\AppData\Local\Temp\qyd priv pred\qpred-setup.exe""3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\system32\PING.EXEping localhost -n 34⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1860
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5d9f0780e8df9e0adb12d1c4c39d6c9be
SHA12335d8d81c1a65d4f537553d66b70d37bc9a55b6
SHA256e91c6bba58cf9dd76cb573f787c76f1da4481f4cbcdf5da3899cce4d3754bbe7
SHA5127785aadb25cffdb736ce5f9ae4ca2d97b634bc969a0b0cb14815afaff4398a529a5f86327102b8005ace30c0d196b2c221384a54d7db040c08f0a01de3621d42
-
Filesize
10KB
MD524e69b6ec11c3099a0ce0f553653ffe8
SHA10e351eded34beecddba1f1f55fdbcf2e82388072
SHA2569399b42e3ee1694b84a07229d4b550ae03162a2fce290ccc8910e0594eb79760
SHA512a9373f88511bdb44079a5bb0620ff6380622be0695939c1cd3f2c3cdc9918ea6ec18f5c9d44579b4e15ea7a4d61be5c136c73a54bdd0a8c122859b3dc168698c
-
Filesize
9KB
MD5768559588eef33d33d9fa64ab5ed482b
SHA109be733f1deed8593c20afaf04042f8370e4e82f
SHA25657d3efc53d8c4be726597a1f3068947b895b5b8aba47fd382c600d8e72125356
SHA5123bf9cd35906e6e408089faea9ffcdf49cc164f58522764fe9e481d41b0e9c6ff14e13b0954d2c64bb942970bbf9d94d07fce0c0d5fdbd6ca045649675ecff0f2
-
Filesize
48KB
MD5f8dfa78045620cf8a732e67d1b1eb53d
SHA1ff9a604d8c99405bfdbbf4295825d3fcbc792704
SHA256a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5
SHA512ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371
-
Filesize
37KB
MD5d9f56d51d32bcbade2d954a9427337dc
SHA1d0e5cee77d5038193580335e3271bb5f1fb6bfc4
SHA2561b6c23b6f235ad58e4062b1dc4ce2c36f031f1469bf9e60c11e07603ca4656e3
SHA512fc18968a319c11b2d9f20a376b93cc74503139506b1c9f9ee3dd226edc1ba753cad85c20368e162c14d26cf2f75f70ae7e82b2b9881088235f5eaca66e8dad66
-
Filesize
48KB
MD59da23eb807a43a954d40048b53a98e6f
SHA1e639bd9a27409fc72f36b4ec3383eeecdacb9dc5
SHA25602d0d3c0163f69a7e6713742ab98e73321c5298976089fe9a03b6d91d3293ebb
SHA512c8d164c8d4722dcd04f13aa11307fddd655e73fd03b15c8056b34252bce925ca679b48032313b8587369500d03574213da20e513c3b4c155099a84de9ac0bba8
-
Filesize
71KB
MD5e8204fbeced1bbe02489cfee909d573e
SHA17625ee886d50ffa837db6e2ade9c74e86f0d4fa2
SHA256d0aa34b160311a35ca2b888dbb9423e8990962b7c89655a5e9c1ba97324ace6b
SHA5123638126cc76adb7c4aa23c2d62219dfe8a04cffb3dafac50adbd1f53fc603084f48b9240f10fcd92681bc7fb1f0a54159149e4c90f7ee8043a64c3a5c50bd05a
-
Filesize
59KB
MD578f5225e986641eaebfe2bef27865603
SHA1118ac80fdf764f5bfbaad2d803420087b854817d
SHA256ae55ad9ad1f4cbc398cd0c87556f1f263505cde025c7c7f2c43ce4ae818eb183
SHA51270e18ea660120d60d6bfa17883c2aced276aa858c5da4dca1e1d56203891d996da4f349596c911cb16497db81b42af4ad85e473c3e80f8932557d967c9dad0e4
-
Filesize
107KB
MD5c67548fec576c79aa4c7d829ebbcb8fd
SHA13c1dd3daf407257ded9717dadcf017fdd8a2c07c
SHA25631c2c5200f59969c7078a5a913067dfcdf326cb0d43754e38893239774286fab
SHA512696d76f6baf739aa2a0d1d057df6d3f8cba1008c0528c8060bb3808a775393bf5e61578154e0d1bd0f3162195b108fbe51daf005d29d368447b5c8fe844a338b
-
Filesize
59KB
MD522fc5be528d33809cbb192b065cbbb05
SHA1a15379c180f7fd2970eb37dda69f1961df4bbfc8
SHA2568987b547d08c762fa665e28636f14d205dbcd3e599fad0beaf7607ef4c3477a8
SHA512b0a9c62f962e0c2a7d7f37f63f4b39eb64fe884266d88990343cfbbb145d3cfa76332ca6f996a31f912fecc448173acfb08792a22940779403cc99216d699f1c
-
Filesize
35KB
MD5121f21e4c072b1307ec96e26dbb54f48
SHA1fd7ffeb22377db68bd6abce8ea526afa14faad0f
SHA2568dac9aa352bfcb960501682d412a9eeebea5d1cdde3771ba9b70a0ae2e08e883
SHA512bec606d0b9c4cabc263a4eda3b8cd403e2486a4e3369fe99117386c4d1969248c54d762b465ab5bdf87fdcc7a08bf90aa873064c65063db8cd4dc437e7e1e6c5
-
Filesize
86KB
MD524a598b2caa17caee2e24d2bb97b445d
SHA1262f07406e170284fea0c1e41093bfe1c4a25eab
SHA256af4ae25b17c7cf23d06e1f37fdefe903a840073266d4314e410a4acec2af6270
SHA5127bdf0a599c488436c118523a67ab154a37ffc5aab0ecec95c463bd068d1121b197c0ebb91dc7db3cf2a3db913abaffd0a60aedb373c0e670c63cd8d85f716f3a
-
Filesize
27KB
MD53cba83d3acab104d0237ca3fd0fda954
SHA16fd08494729a6f3bef6b908365268bdac1e170f1
SHA256a50471d9a065b2e4f0fa61fb88c2dcaa04b7f104fae9ea4bc981d0f6fe39e5fc
SHA51209105f6e6ad13d8d89ef81f9d8c6273c0c540d29227d653d3e3a86d210030b1737f3779839088bc3ea1e08aaf2de70cf55d5288f34b7441bfbd8999a33b6e2d9
-
Filesize
33KB
MD5ab8d1617e9c0c43c1683a567498c1441
SHA169ee6500c1bb30b437693283075165dec0861433
SHA2567779b8fc61da810db720956b3d49c0d1c8cd4e05cc662f767fc8f0088cf923d4
SHA512f1f79c4499b135c56eef659b82fc46e3869519c1adf0704c0e5fab34f593c741549c236c0c62610f4c9ee2ea10e9acbccb39474a518b66f41c84b3466c133b01
-
Filesize
26KB
MD552e8135f08c61f94b536d1a1c787bf23
SHA16ea0d2bd42d3293273b27ea5fb64abef3361ba3f
SHA256fdcd6416bcbaddc8d0e3b029d2c5f621956066cb95c5fa06c948e7eec25152b8
SHA51206e75181a0831d1493ecc28a02f2f52fd30c1b53a4053e94a974b577ace6cdc912f1cb7223059cdacecf5fabfff1f2fff2955b1ba8f54ce5b15b7a6eec77c452
-
Filesize
57KB
MD54381c00145ed565ed992f415aa4e33da
SHA1378be370c2290e9d6a9dee406f989c211cf0efe2
SHA256d81d61074ed8a476af01a46eefb32a908eb8ab34f7cf7d4f53dcfd8274a163be
SHA51257b527e0a2f55c45e1aaee147adb67933b6f6acd5f8eebe6efe97fc5f8c23f20a1303972b45076565d0bff880b751fc039a85673ee88a77a17f969e17ec0a3a7
-
Filesize
66KB
MD5e5353f0aa2c35efd5b4a1a0805a6978c
SHA1d92f1066fe79dc1a1afe7ca3c0b9e803aced7e9f
SHA256908a3938b962132f3f4429badad0e26a8b138de192a060ca1c1067e2b2ce128a
SHA51211c632e69c982a77053fefb22e764dfdb30f6d10abe6c88e2512aa7daf26a0ef59dcc109d262cdb58875f2fba46312027b6e180dc7f0fa24ddc02b78a55c0c28
-
Filesize
25KB
MD58f5402bb6aac9c4ff9b4ce5ac3f0f147
SHA187207e916d0b01047b311d78649763d6e001c773
SHA256793e44c75e7d746af2bb5176e46c454225f07cb27b1747f1b83d1748d81ad9ac
SHA51265fdef32aeba850aa818a8c8bf794100725a9831b5242350e6c04d0bca075762e1b650f19c437a17b150e9fca6ad344ec4141a041fa12b5a91652361053c7e81
-
Filesize
28KB
MD59ba21832765a278dfc220426e9c6a2e3
SHA1b82716b165f3094b70e41a01b4785ca1b1e2c2de
SHA256aa23361fc26c1b91fcc458156eeca0ee869c6f9eca30182ceb2b83c810cfaab4
SHA512a9232b7593c29543091c0f7d1043cc1b39ff0b7c324362fe860d3ee0674ca069c93a85d0a8c2bb6133904318f67e448c1fd99e491f0ddda57d8d9f984ed106a3
-
Filesize
1.3MB
MD5763d1a751c5d47212fbf0caea63f46f5
SHA1845eaa1046a47b5cf376b3dbefcf7497af25f180
SHA256378a4b40f4fa4a8229c93e0afee819085251af03402ccefa3b469651e50e60b7
SHA512bb356dd610e6035f4002671440ce96624addf9a89fd952a6419647a528a551a6ccd0eca0ee2eeb080d9aad683b5afc9415c721fa62c3bcddcb7f1923f59d9c45
-
Filesize
268KB
MD559a15f9a93dcdaa5bfca246b84fa936a
SHA17f295ea74fc7ed0af0e92be08071fb0b76c8509e
SHA2562c11c3ce08ffc40d390319c72bc10d4f908e9c634494d65ed2cbc550731fd524
SHA512746157a0fcedc67120c2a194a759fa8d8e1f84837e740f379566f260e41aa96b8d4ea18e967e3d1aa1d65d5de30453446d8a8c37c636c08c6a3741387483a7d7
-
Filesize
1.6MB
MD563eb76eccfe70cff3a3935c0f7e8ba0f
SHA1a8dd05dce28b79047e18633aee5f7e68b2f89a36
SHA256785c8dde9803f8e1b279895c4e598a57dc7b01e0b1a914764fcedef0d7928b4e
SHA5128da31fa77ead8711c0c6ffedcef6314f29d02a95411c6aacec626e150f329a5b96e9fdeae8d1a5e24d1ca5384ae2f0939a5cc0d58eb8bdbc5f00e62736dcc322
-
Filesize
222KB
MD57e87c34b39f3a8c332df6e15fd83160b
SHA1db712b55f23d8e946c2d91cbbeb7c9a78a92b484
SHA25641448b8365b3a75cf33894844496eb03f84e5422b72b90bdcb9866051939c601
SHA512eceda8b66736edf7f8e7e6d5a17e280342e989c5195525c697cc02dda80fd82d62c7fd4dc6c4825425bae69a820e1262b8d8cc00dbcd73868a26e16c14ac5559
-
Filesize
61KB
MD5b80144d5415de7500a4043585c0847bf
SHA13697ce3e4c3686b29eddc91165d6603e07937e6e
SHA256e73afff4b1a202c892ba78c9d39ddbfe89020e1ca07fb5ac4e98437125f995ff
SHA512eb3fb0f24117cfdd5cd8336267b86cb9b3d65d4257f479b3a80405aa0e47dd85d93bfa7c0afd2c6ebe49263680addb4a5f2eb4240e9d6fc182180588f64d43f7
-
Filesize
9KB
MD52792ecc8fd33e03d84a8554dc8518db4
SHA189465011321f5cecdad86e6f835aa1d8d0ad13d2
SHA25636c5354b5f4dd1bc66ebbc73474bd9d663662769833045735ec6751a3bf69d76
SHA5121c65466454ae5da134d7cd59d663d82cff87e95fa8060befa9aa82a3793dbf8a987936df29b04ec5b0be42cfa8af16f18b3e7c4c7b7b5c6bf03a042b8070c879
-
Filesize
32KB
MD53343d0b8c531b780b2a6b3cda19d7b7f
SHA1bdb760d25d3d9da136901f43d505493159fe4fd7
SHA25653b59145c034e9374b29cdb2a9901d6591670b42306b4ab97a89e671e0f5e775
SHA51284f76063d2bd413717ba1c247682a7f2845f87bc19048adad532ff79e7cabf687848356d9a9b82781acca5843c425da4c0e52691bee8065787be7d7a6d0f76fc
-
Filesize
31KB
MD53adca2ff39adeb3567b73a4ca6d0253c
SHA1ae35dde2348c8490f484d1afd0648380090e74fc
SHA25692202b877579b74a87be769d58f9d1e8aced8a97336ad70e97d09685a10afeb3
SHA512358d109b23cf99eb7396c450660f193e9e16f85f13737ecf29f4369b44f8356041a08443d157b325ccb5125a5f10410659761eda55f24fcc03a082ac8acdd345
-
Filesize
88KB
MD5cfcb1a1159cc2aadba3c62ac44dc2363
SHA1e19df1a6c3dfa545c6b2c20355b24584933d7f9f
SHA256279aac95d765000d7b3b09b75e66a311a03833a0e28361683cf41161f37e3331
SHA512f7f42bc3eb6a2db706f784e2b772c3ce5d0f87b4b3ff6bda6d2f934aecce0174d52623aad0a082dd1efc0f70c990a07fa9768ac96d42ddb52ea5be594198b447
-
Filesize
66KB
MD58dbe9bbf7118f4862e02cd2aaf43f1ab
SHA1935bc8c5cea4502d0facf0c49c5f2b9c138608ed
SHA25629f173e0147390a99f541ba0c0231fdd7dfbca84d0e2e561ef352bf1ec72f5db
SHA512938f8387dcc356012ac4a952d371664700b110f7111fcc24f5df7d79791ae95bad0dbaf77d2d6c86c820bfd48a6bdbe8858b7e7ae1a77df88e596556c7135ed4
-
Filesize
1.7MB
MD5ca67f0baf3cc3b7dbb545cda57ba3d81
SHA15b4e36aef877307af8a8f78f3054d068d1a9ce89
SHA256f804ed205e82003da6021ee6d2270733ca00992816e7e89ba13617c96dd0fba3
SHA512a9f07dd02714c3efba436326425d443969018ace7ebd7cc33c39d43e3d45480a4fcd4c46c09ad132b4f273888f13e9f598de257130429fcb2519c000e4fab6f7
-
Filesize
25KB
MD56c123b56f3a37c129eff6fc816868b25
SHA1ac6b6e3bdc53870ba044a38b9ae9a067b70e7641
SHA25699687f9b1648ac684dfb7937c75e3e50dc16704abd4c4c19601c40ec6971c5ee
SHA512b840871278a6cc32d5ab0cc6d9c129da0ba2d08b93c3c6c000e3989fe1ab8b09ed82ca547a1057690f52f22e44b203f424e2ccd9655be82a1094547a94ddc3c2
-
C:\Users\Admin\AppData\Local\Temp\_MEI49522\setuptools\_vendor\autocommand-2.2.2.dist-info\INSTALLER
Filesize4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1
-
Filesize
1023B
MD5141643e11c48898150daa83802dbc65f
SHA10445ed0f69910eeaee036f09a39a13c6e1f37e12
SHA25686da0f01aeae46348a3c3d465195dc1ceccde79f79e87769a64b8da04b2a4741
SHA512ef62311602b466397baf0b23caca66114f8838f9e78e1b067787ceb709d09e0530e85a47bbcd4c5a0905b74fdb30df0cc640910c6cc2e67886e5b18794a3583f
-
Filesize
92B
MD543136dde7dd276932f6197bb6d676ef4
SHA16b13c105452c519ea0b65ac1a975bd5e19c50122
SHA256189eedfe4581172c1b6a02b97a8f48a14c0b5baa3239e4ca990fbd8871553714
SHA512e7712ba7d36deb083ebcc3b641ad3e7d19fb071ee64ae3a35ad6a50ee882b20cd2e60ca1319199df12584fe311a6266ec74f96a3fb67e59f90c7b5909668aee1
-
Filesize
1KB
MD54ce7501f6608f6ce4011d627979e1ae4
SHA178363672264d9cd3f72d5c1d3665e1657b1a5071
SHA25637fedcffbf73c4eb9f058f47677cb33203a436ff9390e4d38a8e01c9dad28e0b
SHA512a4cdf92725e1d740758da4dd28df5d1131f70cef46946b173fe6956cc0341f019d7c4fecc3c9605f354e1308858721dada825b4c19f59c5ad1ce01ab84c46b24
-
Filesize
644KB
MD5132614956f138f3594d1053e3fac4779
SHA195115f866a87db308ff00af0273e04e31a3fdaae
SHA2562a4ae8ca681fa6f8de3b6dbcc3d32652ea3ab3ee7e2be80b7aff822a382ca8ff
SHA5125b12b51c78bd72f410e2f53c086322557591d9d66b6d473264fa731763ec2317470009c13cbb9d0985c9006c7f62c4eed14c263295bd7ef11db0bc492c2ca5a0
-
Filesize
296KB
MD53d5cb46d212da9843d199f6989b37cd5
SHA1ce5e427d49ea1adba9c941140f3502c969b6819e
SHA25650a55bc145b1f43e5125ef0b09e508946221d02d5fea1b7550a43d8c8c41c970
SHA512c52014c96578db4c7f97878a13ca8c2a4574cc6671689bb554382ad0e593eb87fac55961c7c11ef82b04627fb851ac44848bac9ec91fca0afaa965e4f1f24aa5
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
11KB
MD5a33e5b189842c5867f46566bdbf7a095
SHA1e1c06359f6a76da90d19e8fd95e79c832edb3196
SHA2565abf8e3d1f78de7b09d7f6fb87f9e80e60caacf13ef3c1289665653dacd7c454
SHA512f2ad3812ec9b915e9618539b0f103f2e9acaad25fbbacd84941c954ce070af231324e83a4621e951c1dbae8d40d50410954e40dd52bbd46e34c54b0d1957407b
-
Filesize
1.1MB
MD5d98f327d65bd8fa07e61349fb7e21cbb
SHA1ffe687a8546074a4e5348bd34324c6a317a7f4fa
SHA25621e7c4fba8574f78921fca173bdfba11c325002d2666c9bde6b3170bbbc8603a
SHA512ed3bb2c86485517a8be9be491627beea44d5cb33cc82a04a991ea77f650a78d29d8a65fad01c4e73d2335c23bccec4e0149ea408f374acda7683009179c4a720
-
Filesize
1.2MB
MD52d129e4d2fe8968882eea95cb7c93ec7
SHA1547f1d8d671ac65d295e001991728fe698c59f69
SHA2561f7e2b24734020fd5aaec492e44b0c5eeca19c5560eb7141ef260733e80e6f35
SHA512fb260323cd3f0b655cd35dc89082b5f4ee16b12353eda52897f0c0d9eb4309a5a0e3a7a012ec9cfdf0d2eafdecb3cc5e3260e35b820a21d7e9b93b1834148727
-
Filesize
11KB
MD54a8fbd593a733fc669169d614021185b
SHA1166e66575715d4c52bcb471c09bdbc5a9bb2f615
SHA256714cd32f8edacb3befbfc4b17db5b6eb05c2c8936e3bae14ea25a6050d88ae42
SHA5126b2ebbbc34cd821fd9b3d7711d9cdadd8736412227e191883e5df19068f8118b7c80248eb61cc0a2f785a4153871a6003d79de934254b2c74c33b284c507a33b
-
Filesize
752KB
MD51b012ea2158d8a26621762972ab5bffa
SHA1a603119745f7d87e9657d4dd550e12bd6eb95c70
SHA256bcfd0319f0e8936cfe560062da5834a017449ecfddb563780cdf6807fcac7c52
SHA512897401e3fe962e76a5face78da88c70b7fc7f54f6bc1c9c15a25fda870d8801ff783f5a82ce6bb0f084e7b1a5623bbc11e3085da8875f1e8ec8f479090a1ff56
-
Filesize
140KB
MD5c89f75640d3bdc0297cb6cf3c580b320
SHA19a0f067fd873bd8117d2702e2e5c28f2414668d7
SHA256b6a0af61cee8b78c07a91aa8e40c783d478fbaefd1db9072bb5e7f0a7209465c
SHA512c15fadc8f75524e9f80ccfb86e5a41f1c55ec7a3892475a1ee60fd4952e9113bf128bda9f60e8fc10f356621be8b26862468e84070f5f97b6495ecf777276a6c
-
Filesize
116KB
MD5be8dbe2dc77ebe7f88f910c61aec691a
SHA1a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA2564d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA5120da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655
-
Filesize
44KB
MD5886d68f020a8a2232fbcb8ab431ff9f8
SHA165db84d574e9e38281475cb6d86acb94c74ce5b9
SHA256199c490b67f4364a78c6ba7df595e13e483e110345d067bf57b3826d3bf06715
SHA512bb33bb67ee0204817282373f72a2666aa32e8e47a717e443247bd493853f804949bb59ae3b4a213fcad306d1ced123cd1377e05df3e353400120928597ed34da
-
Filesize
29KB
MD5be8ceb4f7cb0782322f0eb52bc217797
SHA1280a7cc8d297697f7f818e4274a7edd3b53f1e4d
SHA2567d08df2c496c32281bf9a010b62e8898b9743db8b95a7ebee12d746c2e95d676
SHA51207318c71c3137114e0cfec7d8b4815fd6efa51ce70b377121f26dc469cefe041d5098e1c92af8ed0c53b21e9c845fddee4d6646d5bd8395a3f1370ba56a59571