Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2025 16:40
Static task
static1
Behavioral task
behavioral1
Sample
daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe
Resource
win7-20241023-en
General
-
Target
daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe
-
Size
2.0MB
-
MD5
cc8bd47e840a98a8ee43b37608275684
-
SHA1
263b14b75634c53aa33b0ee108743fcfd8d0e362
-
SHA256
daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32
-
SHA512
da32624bd08d85a4db92a1214c5198e0b19b0476b1517ad789dbce4e7500d841c76500766e7ac46605457489244f98764fd7bebc51ac4f410eeebab8e98df2fa
-
SSDEEP
49152:XPEpksGULjU7cAGVRHxOOonAjZPeDaAVDjzP/V/Oc:XcpkCfUIvVRjoSZCzVmc
Malware Config
Extracted
phorphiex
http://185.215.113.66/
http://91.202.233.141/
0xCa90599132C4D88907Bd8E046540284aa468a035
TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6
qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
XryzFMFVpDUvU7famUGf214EXD3xNUSmQf
rsXCXBf9SagxV8JfC12d8Bybk84oPdMNN9
AULzfBuUAPfCGAXoG5Vq14aP9s6fx3AH4Z
LdgchXq1sKbAaAJ1EXAPSRBzLb8jnTZstT
MP8GEm8QpYgQYaMo8oM5NQhRBgDGiLZW5Q
4AtjkCVKbtEC3UEN77SQHuH9i1XkzNiRi5VCbA2XGsJh46nJSXfGQn4GjLuupCqmC57Lo7LvKmFUyRfhtJSvKvuw3h9ReKK
15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC
1BzmrjmKPKSR2hH5BeJySfiVA676E8DYaK
ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp
3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc
3ESHude8zUHksQg1h6hHmzY79BS36L91Yn
DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA
t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh
stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj
bnb1msyt0djx4ecspfxg5en0ye465kg3kmv9utzml2
bc1ppypcmu3684n648gyj62gjp2rw0xy7w3vwfamatlg29ajp4z52desafa0sr
bc1qc9edl4hzl9jyt8twdad3zjeh2df2znq96tdezd
GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3
bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
-
mutex
753f85d83d
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36
Signatures
-
Phorphiex family
-
Phorphiex payload 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023cbc-69.dat family_phorphiex -
Downloads MZ/PE file 3 IoCs
flow pid Process 72 5516 Process not Found 1 2804 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 9 2244 8618.exe -
Executes dropped EXE 36 IoCs
pid Process 2244 8618.exe 2128 8E55.exe 4948 8E75.exe 1408 2285919817.exe 2688 456225277.exe 2656 2925925633.exe 2632 A21C.exe 452 sysnldcvmr.exe 1572 14918327.exe 2924 BA48.exe 4424 BA47.exe 3664 201728786.exe 4792 D292.exe 4676 D282.exe 1548 D293.exe 3536 D283.exe 2776 777116379.exe 4484 2142616533.exe 2512 783416787.exe 2736 EAFF.exe 2408 EAFC.exe 2576 EAED.exe 4852 EB0C.exe 4192 EAEC.exe 1460 EAFE.exe 4000 EAFD.exe 4596 EB0D.exe 5384 164314122.exe 5408 245664174.exe 5452 219524223.exe 5560 274734325.exe 5600 246294583.exe 5664 86116111.exe 5712 167456163.exe 5748 86746519.exe 1472 2989029365.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysnldcvmr.exe" 2285919817.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\sysnldcvmr.exe 2285919817.exe File opened for modification C:\Windows\sysnldcvmr.exe 2285919817.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 56 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EAFF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB0D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8E55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2285919817.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D293.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EAEC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 245664174.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A21C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EAFE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EAFD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 164314122.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysnldcvmr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 783416787.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2142616533.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EAED.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86116111.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14918327.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D283.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 274734325.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 777116379.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB0C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2989029365.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8618.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D292.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D282.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2925925633.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2113028633.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 219524223.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 456225277.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 167456163.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8E75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EAFC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86746519.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 201728786.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 246294583.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5816 MicrosoftEdgeUpdate.exe -
Checks processor information in registry 2 TTPs 32 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1176 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 1176 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 764 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 764 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 764 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 764 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 764 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 764 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2244 2804 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 89 PID 2804 wrote to memory of 2244 2804 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 89 PID 2804 wrote to memory of 2244 2804 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 89 PID 2804 wrote to memory of 1176 2804 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 90 PID 2804 wrote to memory of 1176 2804 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 90 PID 2804 wrote to memory of 1176 2804 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 90 PID 2804 wrote to memory of 764 2804 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 91 PID 2804 wrote to memory of 764 2804 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 91 PID 2804 wrote to memory of 764 2804 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 91 PID 1176 wrote to memory of 2128 1176 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 92 PID 1176 wrote to memory of 2128 1176 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 92 PID 1176 wrote to memory of 2128 1176 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 92 PID 764 wrote to memory of 4948 764 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 93 PID 764 wrote to memory of 4948 764 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 93 PID 764 wrote to memory of 4948 764 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 93 PID 2244 wrote to memory of 1408 2244 8618.exe 95 PID 2244 wrote to memory of 1408 2244 8618.exe 95 PID 2244 wrote to memory of 1408 2244 8618.exe 95 PID 2128 wrote to memory of 2688 2128 8E55.exe 96 PID 2128 wrote to memory of 2688 2128 8E55.exe 96 PID 2128 wrote to memory of 2688 2128 8E55.exe 96 PID 4948 wrote to memory of 2656 4948 8E75.exe 97 PID 4948 wrote to memory of 2656 4948 8E75.exe 97 PID 4948 wrote to memory of 2656 4948 8E75.exe 97 PID 2804 wrote to memory of 1500 2804 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 98 PID 2804 wrote to memory of 1500 2804 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 98 PID 2804 wrote to memory of 1500 2804 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 98 PID 1500 wrote to memory of 2632 1500 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 99 PID 1500 wrote to memory of 2632 1500 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 99 PID 1500 wrote to memory of 2632 1500 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 99 PID 1408 wrote to memory of 452 1408 2285919817.exe 100 PID 1408 wrote to memory of 452 1408 2285919817.exe 100 PID 1408 wrote to memory of 452 1408 2285919817.exe 100 PID 2632 wrote to memory of 1572 2632 A21C.exe 101 PID 2632 wrote to memory of 1572 2632 A21C.exe 101 PID 2632 wrote to memory of 1572 2632 A21C.exe 101 PID 1500 wrote to memory of 4840 1500 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 102 PID 1500 wrote to memory of 4840 1500 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 102 PID 1500 wrote to memory of 4840 1500 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 102 PID 2804 wrote to memory of 540 2804 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 103 PID 2804 wrote to memory of 540 2804 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 103 PID 2804 wrote to memory of 540 2804 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 103 PID 540 wrote to memory of 2924 540 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 104 PID 540 wrote to memory of 2924 540 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 104 PID 540 wrote to memory of 2924 540 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 104 PID 4840 wrote to memory of 4424 4840 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 105 PID 4840 wrote to memory of 4424 4840 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 105 PID 4840 wrote to memory of 4424 4840 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 105 PID 4424 wrote to memory of 3664 4424 BA47.exe 107 PID 4424 wrote to memory of 3664 4424 BA47.exe 107 PID 4424 wrote to memory of 3664 4424 BA47.exe 107 PID 540 wrote to memory of 2904 540 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 108 PID 540 wrote to memory of 2904 540 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 108 PID 540 wrote to memory of 2904 540 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 108 PID 4840 wrote to memory of 4092 4840 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 109 PID 4840 wrote to memory of 4092 4840 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 109 PID 4840 wrote to memory of 4092 4840 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 109 PID 1500 wrote to memory of 384 1500 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 110 PID 1500 wrote to memory of 384 1500 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 110 PID 1500 wrote to memory of 384 1500 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 110 PID 2804 wrote to memory of 3860 2804 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 111 PID 2804 wrote to memory of 3860 2804 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 111 PID 2804 wrote to memory of 3860 2804 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 111 PID 2904 wrote to memory of 4792 2904 daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe"C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe"1⤵
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\8618.exe"C:\Users\Admin\AppData\Local\Temp\8618.exe"2⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\2285919817.exeC:\Users\Admin\AppData\Local\Temp\2285919817.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\sysnldcvmr.exeC:\Windows\sysnldcvmr.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:452
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe"C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --local-service2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\8E55.exe"C:\Users\Admin\AppData\Local\Temp\8E55.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\456225277.exeC:\Users\Admin\AppData\Local\Temp\456225277.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2688
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe"C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --local-control2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\8E75.exe"C:\Users\Admin\AppData\Local\Temp\8E75.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\2925925633.exeC:\Users\Admin\AppData\Local\Temp\2925925633.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2656
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe"C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\A21C.exe"C:\Users\Admin\AppData\Local\Temp\A21C.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\14918327.exeC:\Users\Admin\AppData\Local\Temp\14918327.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1572
-
-
-
C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe"C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend3⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\BA47.exe"C:\Users\Admin\AppData\Local\Temp\BA47.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\201728786.exeC:\Users\Admin\AppData\Local\Temp\201728786.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3664
-
-
-
C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe"C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\D282.exe"C:\Users\Admin\AppData\Local\Temp\D282.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\777116379.exeC:\Users\Admin\AppData\Local\Temp\777116379.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2776
-
-
-
C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe"C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend5⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\EAFC.exe"C:\Users\Admin\AppData\Local\Temp\EAFC.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\219524223.exeC:\Users\Admin\AppData\Local\Temp\219524223.exe7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5452
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe"C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\EAFE.exe"C:\Users\Admin\AppData\Local\Temp\EAFE.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\86746519.exeC:\Users\Admin\AppData\Local\Temp\86746519.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5748
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe"C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend3⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:384 -
C:\Users\Admin\AppData\Local\Temp\D283.exe"C:\Users\Admin\AppData\Local\Temp\D283.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\783416787.exeC:\Users\Admin\AppData\Local\Temp\783416787.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2512
-
-
-
C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe"C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\EAED.exe"C:\Users\Admin\AppData\Local\Temp\EAED.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\245664174.exeC:\Users\Admin\AppData\Local\Temp\245664174.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5408
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe"C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend3⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\EAFF.exe"C:\Users\Admin\AppData\Local\Temp\EAFF.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\164314122.exeC:\Users\Admin\AppData\Local\Temp\164314122.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5384
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe"C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\BA48.exe"C:\Users\Admin\AppData\Local\Temp\BA48.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\2113028633.exeC:\Users\Admin\AppData\Local\Temp\2113028633.exe4⤵
- System Location Discovery: System Language Discovery
PID:3396
-
-
-
C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe"C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend3⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\D292.exe"C:\Users\Admin\AppData\Local\Temp\D292.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\2989029365.exeC:\Users\Admin\AppData\Local\Temp\2989029365.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1472
-
-
-
C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe"C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend4⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\EB0D.exe"C:\Users\Admin\AppData\Local\Temp\EB0D.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\86116111.exeC:\Users\Admin\AppData\Local\Temp\86116111.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5664
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe"C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend3⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\EAFD.exe"C:\Users\Admin\AppData\Local\Temp\EAFD.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\167456163.exeC:\Users\Admin\AppData\Local\Temp\167456163.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5712
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe"C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\D293.exe"C:\Users\Admin\AppData\Local\Temp\D293.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\2142616533.exeC:\Users\Admin\AppData\Local\Temp\2142616533.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4484
-
-
-
C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe"C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend3⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\EAEC.exe"C:\Users\Admin\AppData\Local\Temp\EAEC.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\246294583.exeC:\Users\Admin\AppData\Local\Temp\246294583.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5600
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe"C:\Users\Admin\AppData\Local\Temp\daaac938091ba0a74843749afaae6f923c5bddf0e206ed5f5f1d0c6eb987ce32.exe" --frontend2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\EB0C.exe"C:\Users\Admin\AppData\Local\Temp\EB0C.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\274734325.exeC:\Users\Admin\AppData\Local\Temp\274734325.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5560
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIxIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODIxNjkiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1MzE4NTEwMTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTU1NzE3NjY1Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5816
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD50c883b1d66afce606d9830f48d69d74b
SHA1fe431fe73a4749722496f19b3b3ca0b629b50131
SHA256d921fc993574c8be76553bcf4296d2851e48ee39b958205e69bdfd7cf661d2b1
SHA512c047452a23efad4262479fbfeb5e23f9497d7cefd4cbb58e869801206669c2a0759698c70d18050316798d5d939b989537fdce3842aa742449f5e08ed7fa60a5
-
Filesize
10KB
MD58ce09f13942ab5bcb81b175996c8385f
SHA16fa685d66ac5fff4e9d984dc1903c47a1a6b6cbd
SHA256757bf8be40693456e7cdee5c53416d1cb223da5f7d0b9d55f4aca95f6a57605d
SHA51211ae4651b3dd55355b2cb7bf2f6b042dea47bb895f898d967d63ee652652c633cc5becf31cb2fd7f8797b238b264195d09d4e08211b797eae29e2a7bb31b277f
-
Filesize
31KB
MD5620b27a9481e6937c33138b494387532
SHA1af4b98ecf4f114829e6b3053ea9ba9c4adae3fc1
SHA256c012da5cd4fd87cc9594e3995329222cef85ab40261792066035c9065bbd772d
SHA5128a8f84514aa2e207fba73c98d116f87b3b32a7c428bc5f4c16458029600ef3086f9aa726ca630c674b578a17ad6ab1a7f6e4b24c1bb549a2b9050128f380cf49
-
Filesize
43KB
MD5988d23a0813c74f74cfc73c86ce08f27
SHA17532c3b45736a4648710b410fa82f9828e22ad08
SHA25672b245debe947fc34343de9929dd668fc18a0071a7ea2fdee261338aeb85da9a
SHA5124f0d1693b9b00266af56eff4c813cbbfee833917d687d70351156dc00e6e4f698bdad25df321510a29fac0bee82d68fe37e8afc00ee5a0bcdbfaf771c944cce0
-
Filesize
45KB
MD5536adec89918d4aec6179206b88c1f28
SHA1238e646a6fafded86d70857c5b2e78d65e1212ac
SHA256b2bc6d4653627c5e314801e1c13dc9028e6e886baa6f699ffdfc79e21184114f
SHA5123137e31eac98891a20608fd81285ba986b5aff297744e2bf35c4ecc11b4dacacc290b6a080f587d94b5c212d5f2eff7410505550c442a97688cfb12e1377abc4
-
Filesize
48KB
MD5683138701a57c4aea4368f31e5de2251
SHA1632b318fdcd56fb3278cffe35948734e82cfe5a4
SHA25606f867fea174e88f6d1bc46e9423958a0bebcc4ac8e3e1537827aebe4af9931f
SHA512f10ad732942a03d65a8566acafd956f8f9a1b187d369d7235cbe0784df7ec3803967d2e40aa12b6cefbd85753d598882880395d26a2447a6717cac2864069e2e
-
Filesize
4KB
MD550c2f1e0b83edf7464954836bcab4e7a
SHA1bc6af20ffda89a6e4351e1ade7fabaaaa5aae6d9
SHA256a1c6ed722d650df32696281eba2ee3ae43a8dd383a54b1a07c98e0f6b1c8b9c3
SHA51277542576f76651c352ff069108efffa84baee4f7ef2ad5c82834121f37adbc992c9a23e2b8ed15323daad911c49c468841c1a67e387659c416b4bd7daf166755
-
Filesize
15KB
MD587653b6ee790dfea6602d3bd2ff4c3a3
SHA17c98900fae4bcd74ca12e855ff52cc9f1f33ae3f
SHA256fc0ad996173d990ff15953fb8e856e01d935a0f356940515059fee33abb4ec10
SHA512c892cca622b49647ba85fe3067ea72972e7ea9e507a99e3857ebd31d137379de17c807f0af7ef33f77af3446d526595214095b44be2eb51317da2e88438b93fc
-
Filesize
20KB
MD52668f3837ddb2ecb67358ecace110b12
SHA12a3fffd69285a056f0ed59ec6a23051e515a05a3
SHA256373b961e4530f591bf6c0101761f0971fd25c8cb00b1e1095f7705295385ffdc
SHA5129a23225f617dbd9c81486249eae83aa06380e374e4a360651dafd2acaf495ba5925d45491cd9265584a9f76a1a09366e43277ae990cb49e245ae2c1b628d2fd2
-
Filesize
2KB
MD56ea9b6d3570290bcffb41cfa1775a3af
SHA10da272171529afbcfa0c4f54e89b273f65bebc28
SHA25687dc616f96847dcb22f9dd52a62fc18bb7c97b2709545fdef62076c4eacd7feb
SHA512a955c3a89877d76161a651a51f1626cc661f97149dbe51cbc14f9ff0016a0b28bf6ae622befdc0a21e9ea33c405375cd8464f11cc8888c75f70eab2b2c7db6e8
-
Filesize
105B
MD5788efe12f6439dec8aa394234cc29b08
SHA15f32b101add75331247ec3397496924e3791b65b
SHA2562d27061afec8d92c4b1c163136d4e187ec3ad2b4e8583ab9087d6b970302d07f
SHA5124f581f3bd45e5af9a84fa5c29f6268fbc10492a88110d4c27d67d9ad7e24b882df4ee96cf4107ff64cbd1456b79ed31a2adb5415db6949df0133c40895fa0978
-
Filesize
132B
MD5123c524682c9ff72ec7924efdb41b28c
SHA11e696d9f3e2bf149773186496c7ab9d5df35f9dd
SHA256e67a68c5e7fa7d227a2fbdd50789472dbbf58471664b1d9b776a579de2757ff6
SHA512676e5e2c4ff76b1942c1013a7ee9cd88b42424798e07c699c0cb534575bf4f6908366fe9c9a7e17d81e3f2209bf3fd7dd31463cdab5eea5d19475c10c00f696b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0HVQW03YJFNG3PRGHWCC.temp
Filesize4KB
MD5de89e40873d1073eef1a84272fddcd6a
SHA1d52d52a590f0119d50092a6f60cc24fcc6b98916
SHA256cc4e754cf2e19f30416c516beb9363ba2c1b40b6e9d59c6165951b0ee7572390
SHA51232aa12b9a31b56e4e2415bf6d9fee928f9e7d977c9b4b961a711367e56123386a91814846a635840afdcdd9ac18f33db6057015a42d12892348ba019e5587b81
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\26YKM6JW0F75FKDDHCI5.temp
Filesize4KB
MD5909244f5ae12abea93590312a0d7d25e
SHA1db62f5032288b20cff29923864ba9645376212e9
SHA25630c24e535f036281037238ac62bab73ce10da17a04979933678245e40fef677a
SHA51253b88682af226ad167becf6d8c546119206bed60c7e90fef2e9fde155efe55ad97eb3e3707fc3e054a330adffff2db1246a64e31d1b415cec62316a237ea64af
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms
Filesize4KB
MD5a671cbae07f8d7749efc4e66406535a2
SHA18d9cb836029ef62d8aed6495c01a50f375dfb4f5
SHA256cb42fd3ade6e8e023c7ebc1555049aa9777052ece0286668e02fad10d08d9426
SHA512d8fe455c2ff05d34a153adcfafca00d47d7b8b525b3b9b1f01576f08acec23e73c2363bb507eadfbe94444c20e0704e464f03d0f6bf0d76f9c441e07d7c688f8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms
Filesize4KB
MD5c83e7397a6cc94121f584a956b0ab519
SHA1851be7cdfc08989af4543dc8a972a5c650159c19
SHA256890a197687328aba2712811dee1d11ca2311d8c78abbb85eeb1edffe33b7c4c3
SHA512f0badcd4a6bd3f2f81ed39747d2e33ae74e9fce8e6ba30cbca4f7bd68a8a9987522102c63dd88a1744ef379ab2d50acc11184ddf30af9acdb8425dd1e936473b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms
Filesize4KB
MD5dc3923974ad74ae3772f27a2c0795c24
SHA17df35b9a81bb6a337a67ca2d4e50eb09eeafe5f3
SHA256254af1dd9e315a7e918d46d49b45a37f87a0205d92431f50d03e77b4738b490a
SHA5123d56328f7ecfe91d9cb6cd945e923d4abd7a5b4d39331cf46346f005477b920e59ce4b24b0fce0d437061cf75dd25fdbc5fd1bb7feae9f42a68d8ac25f9476da
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms
Filesize4KB
MD51fd12be76720acd7b7cbfbc386f0c507
SHA11e75623b71e50390aaa99f929dd9d2279bc8cdeb
SHA256f8efbd6409dc7ec6f251c91404d705ce9ce20921d2209cee272484faba3e430a
SHA512093a0c96d7600959c2c52020552ffd05c81dde0afb35b748a85badf3f8fcb157c7026d6de3be71a003487712ee4eea7ee87422509d975073fd706e383e81f012
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms
Filesize4KB
MD5c79ecf747980f188ad655aa9517c0376
SHA17c5b3efb27824d8a8c40d2a14ef40a97a3ea7ea7
SHA256dc583fc13fa9455528eab28e0973595681ad07955f0347101dc34f37f7aeb6ba
SHA512ae3510362d4b9f0ff8a2438a86e54b5aaeee45ed157832f86e1a07dc900ee41bc9e66b2bc110f7f9b482663478b493ed0f62206a7f926ed5ebb6f7b7167e572c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms
Filesize4KB
MD552caa84900d626f8cd2cf8eeac179694
SHA1f2809844cc0a3e538a22cfa352d356e64f5242fc
SHA256905aa949c0b54019695523500acdff99605c33766e904d12e5221c935febc1da
SHA5121ece2d3612f895704619eede1f5f07396e880c86d0f3308edd14a9edb4f3a4d17fc668eb6fd9ea71a114e1995e3df622e128cbd12464f4fd23da0f54586aa6ed
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms
Filesize4KB
MD58bc1674597855788cd92ef577e7dbc18
SHA105811a3b796fecdd505172f5ab17d2e783fd9f6b
SHA256715549c2ea5a272589c2b2e1c80006ba6f8877104c436f79840f11a4cc754ebd
SHA5120a311d50d5eae4556ac58670f77f093e0fbe240af0009135a66e9dd9756d164055bb7522252b1c5c060f2c3fad3cf57d9264f6e139f559c886e70bc8765c7af8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms
Filesize4KB
MD5d5819949423d5a9c953bfdbca23270e9
SHA1b7e16f0f835c88db27f4cf52fd8af7de874bbbc5
SHA256545516276eda0a0fa289625537ec3db709ff5fd06de04e271a6c9ba5bb0eed9d
SHA51247236b1d619d362e144f6bcfd87d8cd5834759b66c5fda61e498a5f4c411cde7ce25672f4a859ba734ba117aac53999d56a8a5de14b892a8583a95e37209b7eb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms
Filesize4KB
MD5804883a236d4dd3b6f4cbc7ad5f765be
SHA1d90239467caa2288a94a2e908e3f68d06273f422
SHA2561e9e25075d8788fd9a5273d198e98eb518bfef86cfa87f9223e455a38e0bb512
SHA512c7c49d1ed559fb0dac694f6583aaf5bd2cdcabd84524596a926929fdd7fd524d7d9d398b504d09b50c00c264f3ca583f82f4d57180462634558bd77009fb8307
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms
Filesize4KB
MD5b8731b6a402332cabc9274826be66d99
SHA14102eeb01d6f205a5c480ee6e5a7318ca2b3eed8
SHA256ef78fbdf5d428496bee449de45bcdeeb48504ea1ff37be243b7a655a2bf6112b
SHA512c11b2e09199ef17790c02b5e5d8c48720fb2e5773ce96418bb2fb971ea597100e1dbb2e7d55936c8602308cb06530bbb0ac14af76973f5386b9f0012d2a1729e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms
Filesize4KB
MD54b9cfb71e6253955a9fce84d0fc1b396
SHA1aa98bc2eeb624e8f05e27b4c9e76b40edf180a86
SHA256ab43ea5d99a7dfc67670466cbf3776f4a8e6461dc7c0cd07c84520351f71f7a4
SHA5127159c139ddece657520ced798574406da1c1e5e3d93c182a5c7ec4f22d3284d61eb1482acb574fbe8a526fdb0b5b36168a443c27d38dd1092a634d5eb0644081
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms
Filesize4KB
MD5e8224c39b609a8e60537646a4a0e2774
SHA1b097447e657d5031cb40e7f9ce4c0bd591f5dd4f
SHA256c51bbb56fe48b2d5a9d1694bd3d58b0e88e05ce79aaf4efeed758f15bda13686
SHA51241d1804898f8417e10a036ebdd6a4cb48c965460f60e84fa56c4fdb82d56a0e191531b2bd8f01e0846ae504094f51de8bfa9624470011274fd1b523528377d90
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms
Filesize4KB
MD5869ed7493b6b802c685910367d1dfd35
SHA193aa0ca65539ae5ebb9aa6df19a12437816be9e1
SHA256df4cf3732b4cfb2ef85844312613afb742915c317ebd412a6d3f7894afb3c8d6
SHA512279a8ad58efdc3ecb5aa6d698364b3d0ad896b577f66bcacd3c13daafd94fa7d4fc02be7dce018a8da7328a5b3c7b8ad82f3cc0bb78218da4d863a3869fcb246
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms
Filesize4KB
MD59172a1099cb9f27680522971bcfa66f6
SHA18646fec2b3d802e64d486ca4736cc7576adfffad
SHA256fcc8c15dce5051f7465e3a21c2465b201f89e10b44f12a2c84bd0ad8bd3af985
SHA5127559c35ec1d109d8f706f904533a03d3d4d4a0b5778706ee334b769252d37e15156db6bcfadc9636a926c1f65b6a96378ce5315f0643dd9bb7860f1cfe97cb11
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms
Filesize4KB
MD53ea550b50039eae0ae6b1c71832d7754
SHA13d71e298083d68d106389adecf7eb31e135d4ea3
SHA2562154695862dc570288f4d3c04497163e380a7d7f1d8d3c05e7b6a7ab57b44c36
SHA5120992ac83312c20f3110fdd9103e2806d1b352bed631263cdf6496c3aecbba90fdc1c254557e8e6259f7449683278dc8b757ede2223a713352b4bcd4b8c1fc656
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms
Filesize4KB
MD5194d59f52c96f9b0f3e58f97af094563
SHA1d829b45da05cab15bb1ce8c002b07ff3be2c42e3
SHA256722bbd98271d35d2487d4ecc0b3249bd8745f60b78a0da9357775b4e9d0e651f
SHA5122208ba90e0b684420d18622216ae991ec36360db796c4b689199aa3b73006c92df21b2f877ad2cfcc4445a17fe09a5a1f7fa49e58d89d199bc65b6db0dec5604
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms
Filesize4KB
MD54c033871738455f046ca90ff094177b4
SHA18feae0876fdf80f2d31e81f21660ade8d77a73f3
SHA256dd345fe3df31eebb6e3092f7eb5edf46ae57cba450401dd2f8e6b77591ec3504
SHA512803165606cbac10d53d8b9b4b4779954c3dc87d205405eb227eb2e153944be714027b3ca72b10111feecbe03cd713ffdd546885b8ea335876bd295b39af2a2f5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms
Filesize4KB
MD5016bf62ea813ec509071510efeeed9dc
SHA1864514270f3f79c53b5dbb78b4f6d7a0af738d61
SHA256ebbf2d52fde08e9c7de9ea074947bc922504dd02781180ad67634fcf863064d5
SHA5128028a212a4d1c17752d36d37ba603142aee77b5530a55c575daecd6fa535f0bd31e8638f357bee1201e28538f066146da2ba12a64848bf237a9f75d1bd98e3c9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7G4CSJY8P868YUM0P49X.temp
Filesize4KB
MD5b8da8b7f1a4930f05afaa9549c332b34
SHA1bcde552fb2b65cadbacc2ddb1b7f37feed4c1d31
SHA25604da0be808912e52e6ca97afa04f7b779d6af9ec8d81a075ee433672dd7f9c2b
SHA51223c70121fc83798e96a3553cd34d755eee103248529f7ec5a4b475cee05d5d524f8d16a1edd7cbbd9dfc6ec63fd2dbfaa15334c8ba1c5b31161ce280b8e48c9a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LLU6WTE06BI8OOY3T7TA.temp
Filesize4KB
MD58f2764c1f5b9df0b1dc97b048cda78d7
SHA13aa00a856ef85dd5c13273cbab78425849a12574
SHA256645c2b27ad804284d0742a2a801b5674be5ebfeef6a63c8af855ae211de5025e
SHA5124d90bd65898031fc717b61e6635cb8e157705ab24721be749202cac82ea5170197f865996ebe7958c9b8486429c3c45f23a6fbd8e5fa7e702ab55a76d91cf17a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\O5F0FMHNVDRUQ8BQRB7P.temp
Filesize4KB
MD526c0bafc6290e1fbe7c5e98f8db9dd95
SHA1e27949b50997bfe561d8054e0f9a9d3653afca47
SHA2562b98173a1487bbfcf320a73ca0714a03b2ab03fbc17964e1e2069b29cc31f4e8
SHA512522749ee417ef71df90692854cbc8532b0c5969caf6078809238d2807af80a8285c7433ad00da793dcca2cabcabbc1c32d1080f813dac0a1e523c84135540821