Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
236s -
max time network
233s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
24/04/2023, 09:21 UTC
Static task
static1
Behavioral task
behavioral1
Sample
XBinder V2.7z
Resource
win10-20230220-en
General
-
Target
XBinder V2.7z
-
Size
430KB
-
MD5
74b35810d8e59fe03f0d59fb638b366e
-
SHA1
e254c557216cb5d7f5cf4ff721e8243846483571
-
SHA256
16b79fb36ba40a69bf07d9df4818c33957e82e98eeefac0cd9fcde4c868b666a
-
SHA512
b458a60af104451ac79390cc1a589c8998c9c27ad542d24a374e0f9912c4bf07414db77c6a2f60799910ecd5dc46d94f117fda9a054916ea881c68c4d322effa
-
SSDEEP
12288:GshIWsM0pwXyPFkTUa9TuOlqeMRrwEvOW8tQB/:xhIWezPFiDMlwEvF8tS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000\Control Panel\International\Geo\Nation XBinder v2.exe -
Executes dropped EXE 1 IoCs
pid Process 616 XBinder v2.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rescache\_merged\3720402701\2219095117.pri XBinder v2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133268089905915414" chrome.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Applications\7zFM.exe\shell\open OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0100000000000000ffffffff XBinder v2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" XBinder v2.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 8c0031000000000054560e97110050524f4752417e310000740009000400efbe724a6fa854560e972e0000003f0000000000010000000000000000004a0000000000f904d100500072006f006700720061006d002000460069006c0065007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100370038003100000018000000 OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\2\MRUListEx = ffffffff XBinder v2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239}\FFlags = "1" XBinder v2.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6 XBinder v2.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = ffffffff XBinder v2.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell XBinder v2.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\3\MRUListEx = ffffffff XBinder v2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{94D6DDCC-4A68-4175-A374-BD584A510B78}\FFlags = "1" XBinder v2.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\Shell XBinder v2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" XBinder v2.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202020202 XBinder v2.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 XBinder v2.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202020202 XBinder v2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\NodeSlot = "1" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\Shell\SniffedFolderType = "Pictures" XBinder v2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\5\ComDlg\{B3690E58-E961-423B-B687-386EBFD83239}\GroupByDirection = "1" XBinder v2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\3\NodeSlot = "6" XBinder v2.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings cmd.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\4\MRUListEx = ffffffff XBinder v2.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" XBinder v2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" XBinder v2.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = ffffffff OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Applications\7zFM.exe\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{94D6DDCC-4A68-4175-A374-BD584A510B78}\Mode = "4" XBinder v2.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance 7zFM.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" XBinder v2.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 020000000100000000000000ffffffff XBinder v2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg XBinder v2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" XBinder v2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" OpenWith.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{94D6DDCC-4A68-4175-A374-BD584A510B78}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000050000001800000030f125b7ef471a10a5f102608c9eebac0a000000a00000002e37a3569cced2119f0e006097c686f60700000028000000e0859ff2f94f6810ab9108002b27b3d902000000a00000002e37a3569cced2119f0e006097c686f602000000780000002e37a3569cced2119f0e006097c686f60400000088000000 XBinder v2.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" OpenWith.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\2\NodeSlot = "5" XBinder v2.exe Set value (data) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 03000000010000000200000000000000ffffffff XBinder v2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\6\ComDlg\{94D6DDCC-4A68-4175-A374-BD584A510B78}\IconSize = "16" XBinder v2.exe Set value (int) \REGISTRY\USER\S-1-5-21-3346939869-2835594282-3775165920-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\7\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" XBinder v2.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 4940 chrome.exe 4940 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 724 OpenWith.exe 3924 7zFM.exe 616 XBinder v2.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 3924 7zFM.exe Token: 35 3924 7zFM.exe Token: SeSecurityPrivilege 3924 7zFM.exe Token: SeDebugPrivilege 4804 firefox.exe Token: SeDebugPrivilege 4804 firefox.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeShutdownPrivilege 3224 chrome.exe Token: SeCreatePagefilePrivilege 3224 chrome.exe Token: SeSecurityPrivilege 3924 7zFM.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 3924 7zFM.exe 3924 7zFM.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3924 7zFM.exe 3924 7zFM.exe 616 XBinder v2.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 4804 firefox.exe 4804 firefox.exe 4804 firefox.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe -
Suspicious use of SetWindowsHookEx 53 IoCs
pid Process 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 724 OpenWith.exe 4804 firefox.exe 616 XBinder v2.exe 616 XBinder v2.exe 616 XBinder v2.exe 616 XBinder v2.exe 616 XBinder v2.exe 616 XBinder v2.exe 616 XBinder v2.exe 616 XBinder v2.exe 616 XBinder v2.exe 616 XBinder v2.exe 616 XBinder v2.exe 616 XBinder v2.exe 616 XBinder v2.exe 616 XBinder v2.exe 616 XBinder v2.exe 616 XBinder v2.exe 616 XBinder v2.exe 616 XBinder v2.exe 616 XBinder v2.exe 616 XBinder v2.exe 616 XBinder v2.exe 616 XBinder v2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 724 wrote to memory of 3924 724 OpenWith.exe 68 PID 724 wrote to memory of 3924 724 OpenWith.exe 68 PID 1400 wrote to memory of 4804 1400 firefox.exe 71 PID 1400 wrote to memory of 4804 1400 firefox.exe 71 PID 1400 wrote to memory of 4804 1400 firefox.exe 71 PID 1400 wrote to memory of 4804 1400 firefox.exe 71 PID 1400 wrote to memory of 4804 1400 firefox.exe 71 PID 1400 wrote to memory of 4804 1400 firefox.exe 71 PID 1400 wrote to memory of 4804 1400 firefox.exe 71 PID 1400 wrote to memory of 4804 1400 firefox.exe 71 PID 1400 wrote to memory of 4804 1400 firefox.exe 71 PID 1400 wrote to memory of 4804 1400 firefox.exe 71 PID 1400 wrote to memory of 4804 1400 firefox.exe 71 PID 4804 wrote to memory of 4388 4804 firefox.exe 72 PID 4804 wrote to memory of 4388 4804 firefox.exe 72 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 4588 4804 firefox.exe 73 PID 4804 wrote to memory of 5060 4804 firefox.exe 74 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\XBinder V2.7z"1⤵
- Modifies registry class
PID:4160
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\XBinder V2.7z"2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3924
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4804.0.1183149693\1322709728" -parentBuildID 20221007134813 -prefsHandle 1668 -prefMapHandle 1656 -prefsLen 20888 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1ef3433b-71ea-431f-bd36-830fbee374d4} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" 1748 1dd24e16558 gpu3⤵PID:4388
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4804.1.29863473\1473506334" -parentBuildID 20221007134813 -prefsHandle 2092 -prefMapHandle 2088 -prefsLen 20969 -prefMapSize 232675 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7f17cc16-c422-4787-9ab1-20965b307d3d} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" 2104 1dd1136f858 socket3⤵
- Checks processor information in registry
PID:4588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4804.2.1943861334\1785858311" -childID 1 -isForBrowser -prefsHandle 2724 -prefMapHandle 2720 -prefsLen 21052 -prefMapSize 232675 -jsInitHandle 1352 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a6fa7226-b9e0-4f0b-9d91-2839e7f13a30} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" 2712 1dd23d97a58 tab3⤵PID:5060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4804.3.946570594\230477587" -childID 2 -isForBrowser -prefsHandle 2576 -prefMapHandle 2616 -prefsLen 26562 -prefMapSize 232675 -jsInitHandle 1352 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {72fa495b-d613-4e01-bc4f-489f15508651} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" 2716 1dd266ea558 tab3⤵PID:4904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4804.4.226078475\1052436015" -childID 3 -isForBrowser -prefsHandle 4456 -prefMapHandle 4452 -prefsLen 26700 -prefMapSize 232675 -jsInitHandle 1352 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7c18a394-787a-4064-a3f2-2ea83a6a2928} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" 4376 1dd296c1a58 tab3⤵PID:2080
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4804.7.78082401\1663250412" -childID 6 -isForBrowser -prefsHandle 5004 -prefMapHandle 4888 -prefsLen 26781 -prefMapSize 232675 -jsInitHandle 1352 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3080ed8d-ffe1-45f4-ac87-736342422a53} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" 5108 1dd2a5a3858 tab3⤵PID:2280
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4804.6.1589760627\1317518450" -childID 5 -isForBrowser -prefsHandle 4912 -prefMapHandle 4916 -prefsLen 26781 -prefMapSize 232675 -jsInitHandle 1352 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1be9132f-c9e0-4364-975b-84627dc5025e} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" 4904 1dd2a5a2358 tab3⤵PID:2884
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4804.5.436023456\110566378" -childID 4 -isForBrowser -prefsHandle 4664 -prefMapHandle 4644 -prefsLen 26781 -prefMapSize 232675 -jsInitHandle 1352 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1efd919a-2d12-421e-b555-1fa569efaddb} 4804 "\\.\pipe\gecko-crash-server-pipe.4804" 4452 1dd1135bb58 tab3⤵PID:444
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3224 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fffc5589758,0x7fffc5589768,0x7fffc55897782⤵PID:4176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1828 --field-trial-handle=1656,i,14416089024717752363,8519375604242974546,131072 /prefetch:82⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1656,i,14416089024717752363,8519375604242974546,131072 /prefetch:22⤵PID:1796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2124 --field-trial-handle=1656,i,14416089024717752363,8519375604242974546,131072 /prefetch:82⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1656,i,14416089024717752363,8519375604242974546,131072 /prefetch:12⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1656,i,14416089024717752363,8519375604242974546,131072 /prefetch:12⤵PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4456 --field-trial-handle=1656,i,14416089024717752363,8519375604242974546,131072 /prefetch:12⤵PID:1232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4592 --field-trial-handle=1656,i,14416089024717752363,8519375604242974546,131072 /prefetch:82⤵PID:32
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4724 --field-trial-handle=1656,i,14416089024717752363,8519375604242974546,131072 /prefetch:82⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 --field-trial-handle=1656,i,14416089024717752363,8519375604242974546,131072 /prefetch:82⤵PID:1240
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:2468
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x24c,0x250,0x254,0x228,0x258,0x7ff7982d7688,0x7ff7982d7698,0x7ff7982d76a83⤵PID:1444
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 --field-trial-handle=1656,i,14416089024717752363,8519375604242974546,131072 /prefetch:82⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4716 --field-trial-handle=1656,i,14416089024717752363,8519375604242974546,131072 /prefetch:12⤵PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 --field-trial-handle=1656,i,14416089024717752363,8519375604242974546,131072 /prefetch:82⤵PID:1084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3032 --field-trial-handle=1656,i,14416089024717752363,8519375604242974546,131072 /prefetch:82⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4884 --field-trial-handle=1656,i,14416089024717752363,8519375604242974546,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4468
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:836
-
C:\Users\Admin\Desktop\XBinder V2\XBinder v2.exe"C:\Users\Admin\Desktop\XBinder V2\XBinder v2.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:616
Network
-
Remote address:8.8.8.8:53Request1.77.109.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestcontile.services.mozilla.comIN AResponsecontile.services.mozilla.comIN A34.117.237.239
-
Remote address:8.8.8.8:53Requestgetpocket.cdn.mozilla.netIN AResponsegetpocket.cdn.mozilla.netIN CNAMEgetpocket-cdn.prod.mozaws.netgetpocket-cdn.prod.mozaws.netIN CNAMEprod.pocket.prod.cloudops.mozgcp.netprod.pocket.prod.cloudops.mozgcp.netIN A34.120.5.221
-
Remote address:8.8.8.8:53Requestfirefox.settings.services.mozilla.comIN AResponsefirefox.settings.services.mozilla.comIN A35.241.9.150
-
Remote address:34.117.237.239:443RequestGET /v1/tiles HTTP/2.0
host: contile.services.mozilla.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0
accept: */*
accept-language: en-US,en;q=0.5
accept-encoding: gzip, deflate, br
sec-fetch-dest: empty
sec-fetch-mode: cors
sec-fetch-site: cross-site
te: trailers
-
Remote address:8.8.8.8:53Requestcontile.services.mozilla.comIN AResponsecontile.services.mozilla.comIN A34.117.237.239
-
GEThttps://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=40249-e88c401e1b1f2242d9e441c4&locale_lang=en-US®ion=IE&count=30firefox.exeRemote address:34.120.5.221:443RequestGET /v3/firefox/global-recs?version=3&consumer_key=40249-e88c401e1b1f2242d9e441c4&locale_lang=en-US®ion=IE&count=30 HTTP/2.0
host: getpocket.cdn.mozilla.net
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0
accept: */*
accept-language: en-US,en;q=0.5
accept-encoding: gzip, deflate, br
sec-fetch-dest: empty
sec-fetch-mode: cors
sec-fetch-site: cross-site
te: trailers
-
Remote address:8.8.8.8:53Requestprod.pocket.prod.cloudops.mozgcp.netIN AResponseprod.pocket.prod.cloudops.mozgcp.netIN A34.120.5.221
-
Remote address:8.8.8.8:53Requestfirefox.settings.services.mozilla.comIN AResponsefirefox.settings.services.mozilla.comIN A35.241.9.150
-
Remote address:8.8.8.8:53Requestcontile.services.mozilla.comIN AAAAResponse
-
Remote address:8.8.8.8:53Requestprod.pocket.prod.cloudops.mozgcp.netIN AAAAResponseprod.pocket.prod.cloudops.mozgcp.netIN AAAA2600:1901:0:524c::
-
Remote address:8.8.8.8:53Requestfirefox.settings.services.mozilla.comIN AAAAResponse
-
Remote address:8.8.8.8:53Requestpush.services.mozilla.comIN AResponsepush.services.mozilla.comIN CNAMEautopush.prod.mozaws.netautopush.prod.mozaws.netIN A34.117.65.55
-
Remote address:8.8.8.8:53Requestshavar.services.mozilla.comIN AResponseshavar.services.mozilla.comIN CNAMEshavar.prod.mozaws.netshavar.prod.mozaws.netIN A52.39.163.23shavar.prod.mozaws.netIN A34.211.203.81shavar.prod.mozaws.netIN A54.189.57.246shavar.prod.mozaws.netIN A54.149.234.21shavar.prod.mozaws.netIN A34.215.121.165shavar.prod.mozaws.netIN A35.160.145.179
-
Remote address:8.8.8.8:53Requestautopush.prod.mozaws.netIN AResponseautopush.prod.mozaws.netIN A34.117.65.55
-
Remote address:8.8.8.8:53Requestshavar.prod.mozaws.netIN AResponseshavar.prod.mozaws.netIN A54.149.234.21shavar.prod.mozaws.netIN A34.215.121.165shavar.prod.mozaws.netIN A35.160.145.179shavar.prod.mozaws.netIN A52.39.163.23shavar.prod.mozaws.netIN A34.211.203.81shavar.prod.mozaws.netIN A54.189.57.246
-
Remote address:8.8.8.8:53Requestautopush.prod.mozaws.netIN AAAAResponse
-
Remote address:8.8.8.8:53Requestshavar.prod.mozaws.netIN AAAAResponse
-
Remote address:34.117.65.55:443RequestGET / HTTP/1.1
Host: push.services.mozilla.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Sec-WebSocket-Version: 13
Origin: wss://push.services.mozilla.com/
Sec-WebSocket-Protocol: push-notification
Sec-WebSocket-Extensions: permessage-deflate
Sec-WebSocket-Key: 4c6c3XB7EujR92S2lOlU6w==
Connection: keep-alive, Upgrade
Sec-Fetch-Dest: websocket
Sec-Fetch-Mode: websocket
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
Upgrade: websocket
ResponseHTTP/1.1 101 Switching Protocols
Upgrade: websocket
Sec-WebSocket-Accept: ArtLjOJQWV0PeXAerk+8uEyrAxA=
Date: Mon, 24 Apr 2023 09:22:39 GMT
Via: 1.1 google
Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
-
Remote address:8.8.8.8:53Request239.237.117.34.in-addr.arpaIN PTRResponse239.237.117.34.in-addr.arpaIN PTR23923711734bcgoogleusercontentcom
-
Remote address:8.8.8.8:53Request221.5.120.34.in-addr.arpaIN PTRResponse221.5.120.34.in-addr.arpaIN PTR221512034bcgoogleusercontentcom
-
Remote address:8.8.8.8:53Request150.9.241.35.in-addr.arpaIN PTRResponse150.9.241.35.in-addr.arpaIN PTR150924135bcgoogleusercontentcom
-
Remote address:8.8.8.8:53Request55.65.117.34.in-addr.arpaIN PTRResponse55.65.117.34.in-addr.arpaIN PTR556511734bcgoogleusercontentcom
-
Remote address:8.8.8.8:53Request23.163.39.52.in-addr.arpaIN PTRResponse23.163.39.52.in-addr.arpaIN PTRec2-52-39-163-23 us-west-2compute amazonawscom
-
Remote address:8.8.8.8:53Request196.168.217.172.in-addr.arpaIN PTRResponse196.168.217.172.in-addr.arpaIN PTRams16s32-in-f41e100net
-
Remote address:8.8.8.8:53Request250.255.255.239.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request195.179.250.142.in-addr.arpaIN PTRResponse195.179.250.142.in-addr.arpaIN PTRams15s42-in-f31e100net
-
Remote address:8.8.8.8:53Requestapis.google.comIN AResponseapis.google.comIN CNAMEplus.l.google.complus.l.google.comIN A172.217.23.206
-
GEThttps://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.UjJbvPIecP0.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/rs=AHpOoo_flbzE3yQmWQ7n7N3yCQZtJt8-oA/cb=gapi.loaded_0chrome.exeRemote address:172.217.23.206:443RequestGET /_/scs/abc-static/_/js/k=gapi.gapi.en.UjJbvPIecP0.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/rs=AHpOoo_flbzE3yQmWQ7n7N3yCQZtJt8-oA/cb=gapi.loaded_0 HTTP/2.0
host: apis.google.com
sec-ch-ua: "Chromium";v="106", "Google Chrome";v="106", "Not;A=Brand";v="99"
sec-ch-ua-mobile: ?0
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
sec-ch-ua-platform: "Windows"
accept: */*
sec-fetch-site: cross-site
sec-fetch-mode: no-cors
sec-fetch-dest: script
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
cookie: 1P_JAR=2023-04-24-09
cookie: NID=511=ZJeZhea2uCVVrzYtTUcGWKz1cwX7X_t92nKObCssxm6R27StLrLgE2ZhYM5R33a9h2Een0Ku4rh1zvK3SK1Zga9JYzyIp5x5PULLZUMdiXLlqCOTXp7_lAbrehtQBK39ZiDp7h6CQYPOjwVQXF3974EAs9D9KiuLebDyQK_FTuo
-
Remote address:8.8.8.8:53Request206.23.217.172.in-addr.arpaIN PTRResponse206.23.217.172.in-addr.arpaIN PTRprg03s05-in-f2061e100net206.23.217.172.in-addr.arpaIN PTRprg03s05-in-f14�J206.23.217.172.in-addr.arpaIN PTRams16s37-in-f14�J
-
Remote address:8.8.8.8:53Request251.0.0.224.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestb.f.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.f.f.ip6.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request131.179.250.142.in-addr.arpaIN PTRResponse131.179.250.142.in-addr.arpaIN PTRams17s10-in-f31e100net
-
Remote address:8.8.8.8:53Requestid.google.comIN AResponseid.google.comIN A142.251.36.35
-
GEThttps://id.google.com/verify/AFW7geq9Pdv42ztH0kJe5Vj50othesOaB7ISm0oz4yuEVHIGHDB8DhrKAFIAXKbIRBZ676qqCevFleNIU3u6J3FDKoybMYT5Yf4WjCXkyRL7G-cchrome.exeRemote address:142.251.36.35:443RequestGET /verify/AFW7geq9Pdv42ztH0kJe5Vj50othesOaB7ISm0oz4yuEVHIGHDB8DhrKAFIAXKbIRBZ676qqCevFleNIU3u6J3FDKoybMYT5Yf4WjCXkyRL7G-c HTTP/2.0
host: id.google.com
sec-ch-ua: "Chromium";v="106", "Google Chrome";v="106", "Not;A=Brand";v="99"
sec-ch-ua-mobile: ?0
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
sec-ch-ua-platform: "Windows"
accept: image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
x-client-data: CNP5ygE=
sec-fetch-site: same-site
sec-fetch-mode: no-cors
sec-fetch-dest: image
referer: https://www.google.com/
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
cookie: 1P_JAR=2023-04-24-09
cookie: AEC=AUEFqZejPLaJ0ckAOLNGovC0ngSv2oJOesqk1PJEXztvsMdALvTFA0psHw
cookie: NID=511=sf4FfUe5VgfNA14mgaW3IL-6rDIyM4RGHlU-4o-5fNPszWA7MxOoNC4DBKfyJAYq7jUbOhwjLkditIwjmZ_R_0P3YgCv4C_tlkVP7_bpKd_IcBpcTdXRLxld2m7OLhWhKB6oVzo9fpXfiUVjeBcEzVTiGZqPDOvJVn_mZ0bTh9I
-
Remote address:8.8.8.8:53Requestcontent-autofill.googleapis.comIN AResponsecontent-autofill.googleapis.comIN A142.251.36.10content-autofill.googleapis.comIN A142.251.39.106content-autofill.googleapis.comIN A172.217.168.202content-autofill.googleapis.comIN A172.217.23.202content-autofill.googleapis.comIN A216.58.214.10content-autofill.googleapis.comIN A142.250.179.138content-autofill.googleapis.comIN A142.251.36.42content-autofill.googleapis.comIN A172.217.168.234content-autofill.googleapis.comIN A142.250.179.170content-autofill.googleapis.comIN A142.250.179.202
-
Remote address:8.8.8.8:53Request35.36.251.142.in-addr.arpaIN PTRResponse35.36.251.142.in-addr.arpaIN PTRams17s12-in-f31e100net
-
GEThttps://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTA2LjAuNTI0OS4xMTkSEAlL1An4iaKj4hIFDUqFnlI=?alt=protochrome.exeRemote address:142.251.36.10:443RequestGET /v1/pages/ChVDaHJvbWUvMTA2LjAuNTI0OS4xMTkSEAlL1An4iaKj4hIFDUqFnlI=?alt=proto HTTP/2.0
host: content-autofill.googleapis.com
x-goog-encode-response-if-executable: base64
x-goog-api-key: AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
x-client-data: CNP5ygE=
sec-fetch-site: none
sec-fetch-mode: no-cors
sec-fetch-dest: empty
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Requestplay.google.comIN AResponseplay.google.comIN A142.251.36.14
-
Remote address:142.251.36.14:443RequestOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/2.0
host: play.google.com
accept: */*
access-control-request-method: POST
access-control-request-headers: x-goog-authuser
origin: https://www.google.com
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
sec-fetch-mode: cors
sec-fetch-site: same-site
sec-fetch-dest: empty
referer: https://www.google.com/
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Request10.36.251.142.in-addr.arpaIN PTRResponse10.36.251.142.in-addr.arpaIN PTRams15s44-in-f101e100net
-
Remote address:8.8.8.8:53Request10.36.251.142.in-addr.arpaIN PTRResponse10.36.251.142.in-addr.arpaIN PTRams15s44-in-f101e100net
-
Remote address:8.8.8.8:53Request14.36.251.142.in-addr.arpaIN PTRResponse14.36.251.142.in-addr.arpaIN PTRams15s44-in-f141e100net
-
Remote address:8.8.8.8:53Request14.36.251.142.in-addr.arpaIN PTRResponse14.36.251.142.in-addr.arpaIN PTRams15s44-in-f141e100net
-
Remote address:8.8.8.8:53Request162.179.250.142.in-addr.arpaIN PTRResponse162.179.250.142.in-addr.arpaIN PTRams15s41-in-f21e100net
-
Remote address:8.8.8.8:53Requestbeacons.gcp.gvt2.comIN AResponsebeacons.gcp.gvt2.comIN CNAMEbeacons-handoff.gcp.gvt2.combeacons-handoff.gcp.gvt2.comIN A216.58.214.3
-
Remote address:8.8.8.8:53Requestbeacons.gcp.gvt2.comIN AResponsebeacons.gcp.gvt2.comIN CNAMEbeacons-handoff.gcp.gvt2.combeacons-handoff.gcp.gvt2.comIN A216.58.214.3
-
Remote address:216.58.214.3:443RequestPOST /domainreliability/upload HTTP/2.0
host: beacons.gcp.gvt2.com
content-length: 539
content-type: application/json; charset=utf-8
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Request3.214.58.216.in-addr.arpaIN PTRResponse3.214.58.216.in-addr.arpaIN PTRlhr26s05-in-f31e100net3.214.58.216.in-addr.arpaIN PTR�73.214.58.216.in-addr.arpaIN PTRams17s09-in-f3�F
-
Remote address:8.8.8.8:53Request3.214.58.216.in-addr.arpaIN PTRResponse3.214.58.216.in-addr.arpaIN PTRlhr26s05-in-f31e100net3.214.58.216.in-addr.arpaIN PTRams17s09-in-f3�F3.214.58.216.in-addr.arpaIN PTR�7
-
Remote address:8.8.8.8:53Requestbeacons2.gvt2.comIN AResponsebeacons2.gvt2.comIN A142.251.133.195
-
Remote address:142.251.133.195:443RequestOPTIONS /domainreliability/upload-nel HTTP/2.0
host: beacons2.gvt2.com
origin: https://beacons.gcp.gvt2.com
access-control-request-method: POST
access-control-request-headers: content-type
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:142.251.133.195:443RequestPOST /domainreliability/upload-nel HTTP/2.0
host: beacons2.gvt2.com
content-length: 405
content-type: application/reports+json
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
accept-encoding: gzip, deflate, br
accept-language: en-US,en;q=0.9
-
Remote address:8.8.8.8:53Request195.133.251.142.in-addr.arpaIN PTRResponse195.133.251.142.in-addr.arpaIN PTReze10s07-in-f31e100net
-
Remote address:8.8.8.8:53Request195.133.251.142.in-addr.arpaIN PTRResponse195.133.251.142.in-addr.arpaIN PTReze10s07-in-f31e100net
-
322 B 7
-
322 B 7
-
-
1.8kB 7.3kB 16 20
HTTP Request
GET https://contile.services.mozilla.com/v1/tiles -
34.120.5.221:443https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=40249-e88c401e1b1f2242d9e441c4&locale_lang=en-US®ion=IE&count=30tls, http2firefox.exe2.0kB 51.2kB 19 49
HTTP Request
GET https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=40249-e88c401e1b1f2242d9e441c4&locale_lang=en-US®ion=IE&count=30 -
1.6kB 6.3kB 15 19
-
2.2kB 4.1kB 10 9
-
1.9kB 6.0kB 12 13
HTTP Request
GET https://push.services.mozilla.com/HTTP Response
101 -
-
172.217.23.206:443https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.UjJbvPIecP0.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/rs=AHpOoo_flbzE3yQmWQ7n7N3yCQZtJt8-oA/cb=gapi.loaded_0tls, http2chrome.exe3.1kB 47.1kB 38 42
HTTP Request
GET https://apis.google.com/_/scs/abc-static/_/js/k=gapi.gapi.en.UjJbvPIecP0.O/m=gapi_iframes,googleapis_client/rt=j/sv=1/d=1/ed=1/rs=AHpOoo_flbzE3yQmWQ7n7N3yCQZtJt8-oA/cb=gapi.loaded_0 -
142.251.36.35:443https://id.google.com/verify/AFW7geq9Pdv42ztH0kJe5Vj50othesOaB7ISm0oz4yuEVHIGHDB8DhrKAFIAXKbIRBZ676qqCevFleNIU3u6J3FDKoybMYT5Yf4WjCXkyRL7G-ctls, http2chrome.exe2.2kB 9.5kB 17 19
HTTP Request
GET https://id.google.com/verify/AFW7geq9Pdv42ztH0kJe5Vj50othesOaB7ISm0oz4yuEVHIGHDB8DhrKAFIAXKbIRBZ676qqCevFleNIU3u6J3FDKoybMYT5Yf4WjCXkyRL7G-c -
142.251.36.10:443https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTA2LjAuNTI0OS4xMTkSEAlL1An4iaKj4hIFDUqFnlI=?alt=prototls, http2chrome.exe1.9kB 7.0kB 16 17
HTTP Request
GET https://content-autofill.googleapis.com/v1/pages/ChVDaHJvbWUvMTA2LjAuNTI0OS4xMTkSEAlL1An4iaKj4hIFDUqFnlI=?alt=proto -
142.251.36.14:443https://play.google.com/log?format=json&hasfast=true&authuser=0tls, http2chrome.exe1.8kB 8.6kB 15 17
HTTP Request
OPTIONS https://play.google.com/log?format=json&hasfast=true&authuser=0 -
2.2kB 7.0kB 15 14
HTTP Request
POST https://beacons.gcp.gvt2.com/domainreliability/upload -
2.4kB 7.6kB 18 22
HTTP Request
OPTIONS https://beacons2.gvt2.com/domainreliability/upload-nelHTTP Request
POST https://beacons2.gvt2.com/domainreliability/upload-nel -
907 B 5.7kB 7 7
-
70 B 144 B 1 1
DNS Request
1.77.109.52.in-addr.arpa
-
74 B 90 B 1 1
DNS Request
contile.services.mozilla.com
DNS Response
34.117.237.239
-
71 B 174 B 1 1
DNS Request
getpocket.cdn.mozilla.net
DNS Response
34.120.5.221
-
83 B 99 B 1 1
DNS Request
firefox.settings.services.mozilla.com
DNS Response
35.241.9.150
-
74 B 90 B 1 1
DNS Request
contile.services.mozilla.com
DNS Response
34.117.237.239
-
82 B 98 B 1 1
DNS Request
prod.pocket.prod.cloudops.mozgcp.net
DNS Response
34.120.5.221
-
83 B 99 B 1 1
DNS Request
firefox.settings.services.mozilla.com
DNS Response
35.241.9.150
-
74 B 155 B 1 1
DNS Request
contile.services.mozilla.com
-
82 B 110 B 1 1
DNS Request
prod.pocket.prod.cloudops.mozgcp.net
DNS Response
2600:1901:0:524c::
-
83 B 167 B 1 1
DNS Request
firefox.settings.services.mozilla.com
-
71 B 125 B 1 1
DNS Request
push.services.mozilla.com
DNS Response
34.117.65.55
-
73 B 205 B 1 1
DNS Request
shavar.services.mozilla.com
DNS Response
52.39.163.2334.211.203.8154.189.57.24654.149.234.2134.215.121.16535.160.145.179
-
70 B 86 B 1 1
DNS Request
autopush.prod.mozaws.net
DNS Response
34.117.65.55
-
68 B 164 B 1 1
DNS Request
shavar.prod.mozaws.net
DNS Response
54.149.234.2134.215.121.16535.160.145.17952.39.163.2334.211.203.8154.189.57.246
-
70 B 155 B 1 1
DNS Request
autopush.prod.mozaws.net
-
68 B 153 B 1 1
DNS Request
shavar.prod.mozaws.net
-
73 B 126 B 1 1
DNS Request
239.237.117.34.in-addr.arpa
-
71 B 122 B 1 1
DNS Request
221.5.120.34.in-addr.arpa
-
71 B 122 B 1 1
DNS Request
150.9.241.35.in-addr.arpa
-
71 B 122 B 1 1
DNS Request
55.65.117.34.in-addr.arpa
-
71 B 133 B 1 1
DNS Request
23.163.39.52.in-addr.arpa
-
74 B 112 B 1 1
DNS Request
196.168.217.172.in-addr.arpa
-
74 B 131 B 1 1
DNS Request
250.255.255.239.in-addr.arpa
-
74 B 112 B 1 1
DNS Request
195.179.250.142.in-addr.arpa
-
61 B 98 B 1 1
DNS Request
apis.google.com
DNS Response
172.217.23.206
-
73 B 173 B 1 1
DNS Request
206.23.217.172.in-addr.arpa
-
204 B 3
-
70 B 127 B 1 1
DNS Request
251.0.0.224.in-addr.arpa
-
118 B 182 B 1 1
DNS Request
b.f.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.f.f.ip6.arpa
-
74 B 112 B 1 1
DNS Request
131.179.250.142.in-addr.arpa
-
59 B 75 B 1 1
DNS Request
id.google.com
DNS Response
142.251.36.35
-
4.7kB 48.3kB 25 41
-
77 B 237 B 1 1
DNS Request
content-autofill.googleapis.com
DNS Response
142.251.36.10142.251.39.106172.217.168.202172.217.23.202216.58.214.10142.250.179.138142.251.36.42172.217.168.234142.250.179.170142.250.179.202
-
72 B 110 B 1 1
DNS Request
35.36.251.142.in-addr.arpa
-
61 B 77 B 1 1
DNS Request
play.google.com
DNS Response
142.251.36.14
-
4.2kB 7.2kB 8 11
-
144 B 222 B 2 2
DNS Request
10.36.251.142.in-addr.arpa
DNS Request
10.36.251.142.in-addr.arpa
-
144 B 222 B 2 2
DNS Request
14.36.251.142.in-addr.arpa
DNS Request
14.36.251.142.in-addr.arpa
-
74 B 112 B 1 1
DNS Request
162.179.250.142.in-addr.arpa
-
132 B 224 B 2 2
DNS Request
beacons.gcp.gvt2.com
DNS Request
beacons.gcp.gvt2.com
DNS Response
216.58.214.3
DNS Response
216.58.214.3
-
142 B 304 B 2 2
DNS Request
3.214.58.216.in-addr.arpa
DNS Request
3.214.58.216.in-addr.arpa
-
63 B 79 B 1 1
DNS Request
beacons2.gvt2.com
DNS Response
142.251.133.195
-
3.2kB 7.7kB 9 10
-
148 B 224 B 2 2
DNS Request
195.133.251.142.in-addr.arpa
DNS Request
195.133.251.142.in-addr.arpa
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488B
MD56d971ce11af4a6a93a4311841da1a178
SHA1cbfdbc9b184f340cbad764abc4d8a31b9c250176
SHA256338ddefb963d5042cae01de7b87ac40f4d78d1bfa2014ff774036f4bc7486783
SHA512c58b59b9677f70a5bb5efd0ecbf59d2ac21cbc52e661980241d3be33663825e2a7a77adafbcec195e1d9d89d05b9ccb5e5be1a201f92cb1c1f54c258af16e29f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
456B
MD59d20c6362daa41d9d424a02ec2d3d5dc
SHA1444d34de3b5a0f8a31675b7d11e7c539eac7a16a
SHA2562eb1658450803dcd0b279e635dbf87fbe8f937687c5c2d6586824562b4a4b2ab
SHA512c3cd110e6c9d02e402cb5ca2c172ee7ca5443d42c6b356dbf40315b6731a14e3968175f3347aec7eab392c47b120115642bbaa2922f5ced0fe6f90c61bb3544b
-
Filesize
2KB
MD50f55390346974504677ace8094b43b00
SHA1f3469543cc4eaa4c4229f22b36b4a3d3994f77a8
SHA2564e6b897de70fcc4b44baec7bf63e303d617fbc8783be12921f67740f78e3d477
SHA512483ac9e9df693c18a2b83cb6c6190894bf81e838bb29f0ad9f14161a76cb182a6385f6add8c8c8bae5cf44d5a61c96a9737fe7c01feb3c408e046591bd968ea1
-
Filesize
371B
MD55cc8195dea440eece87b2237e853d113
SHA11ed9d13609712efa65eca358d44945794da5e6ba
SHA25621e6a1b18f4d1a9a2a7231e3d26a04956c807bcf85c5370632ca1c8dd33bdcb3
SHA51297b5ca82e4771f10302dce96b2e55834da6e6c7bff8abc5ac279543917fbefbd00b8c425c5eeb5a040141ac5f861f3357d24804c391d136c4fc564978a2ef0bf
-
Filesize
6KB
MD5a60c3a06ab969b9d39c740de09416dba
SHA19d784ceb3e8cc29e77f0ac1c6ebdf414a48a4808
SHA256ee82feebaeafde1f604b1844d3d9e9bf6879e093859752d67fedd49c3b392f5b
SHA512290cd985873b621a6f08c8e82e4ec6e107ba3734fa81f27ed62d705295926d62a8abece8a3a3ba37435daa13283b351df097f7a60c39e0eeb8ce73ca3326ffc9
-
Filesize
6KB
MD5105711354cfebf2f4e09220bd1eb54c2
SHA11df215cfe9108622a832eeb75b7fea7b29e39151
SHA256d01c0d2b1d0a6822cef908dcc9b79418d4bcabebe3b3fc455c74aa28e1cb1bae
SHA51256c2ccfe5f7064730041298f0fdb09d3b67954aaf417d0a864d3e4f94aec636c80aa00a3e33b9b95ce635a2ed8dac4c4d54d5f0ecedc3138e6539c08dee0bf08
-
Filesize
6KB
MD56f543fc48201c71a7f7b8a7bd01ded7f
SHA1527eebf1722149aa2642e69461eab8b1dec2a37e
SHA2563cbf278e4f9ec8e46d800cade290a04ccb89d1fdc4ff45ff609b3633d3c7602e
SHA51222d79149d061afd70490a428c198a69419fc61b774ff8e49a7f0e75d97a5c0c50b523380c6443d8ded84f0bba550fa9ffc4e82c9be2e2009991ae4c8c0befe65
-
Filesize
6KB
MD576a5eedb629db618071dbf29dde78670
SHA133c79081fd8b77642a075d478d2f0c25c20281db
SHA256da5f6f823029ab0f7df1d55f48909ec293a3c1c982817c90e94aa2ffade8793d
SHA512281ef3b83cb29cf9f98117102b10cdaa62b46fc46d09ed43f98ed8af807d714b7632489067f38797961a29f8acd77f8e40de3628d7265b17637d3058bc40bb67
-
Filesize
221KB
MD5a6dd5f59e3dd5ccf40a052d2bc5caef8
SHA132950d7814836aae2409fe65ff861555b1631058
SHA2569901632d039f8c2d4e69db30b509b484c6a5beea35d7448cd2e57dc3d98f8ab4
SHA51233bc0aea0c81db43e0ea46285f592a72995264b00c0dd1e0a09372c5232a27f2c3c084d82ce43ff800f03cf81833ef86d619c0ad3076bd3b0f4d9b13cdb04b7a
-
Filesize
202KB
MD5ae97aff78513f5930452d8341f732629
SHA1c8687727c0e25f03997315945e335b6eb96e5078
SHA25615ac2fd50fafd2c0a9a22ac7c3c72ada903da033e6c3c191cf4f6319a69e77b3
SHA5129ed95d49baa5580196d19085fcd8730e9f7d77b903811a78e88e76b28544a887b7f87aacee5813ed4f5389eb24d1cccec5e1c8d4acef3ad2999449f7d66fb4fb
-
Filesize
203KB
MD507a3c5fff1990e9cc3e473717dd7ddb1
SHA1554a91309f21e9a31c4de1ae654cd7abd19202a7
SHA256cdff94e4b3b82851770fbe99faaed34dc5cd35339f3a2efc779f596fefbbf52e
SHA5127a2ee5c85dace58ad2e93f03f74a4ab958b211fe35233cc4fbfabcb88599a72e6e877386694cf58797036c33cf1713ccac675d503b60d70a249c467968441696
-
Filesize
72KB
MD5cff9f87c2c858b5bfb165887459b1133
SHA17e4a61ad589a61d36cb9ad2c8337e685dcad73b6
SHA2568a5b2af2a4caa323e242e37a082debf92ae921d5f6f2aedb9acae8ddd2380e91
SHA512efb279a627346d85a8e3c10660c87d086a01882e8d8587fa4d1304abebe5670d87453736a73232a86e46c0e0b831b95cd9d3cda63d8503ba05c8a5979cdfab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\evlzgz75.default-release\activity-stream.discovery_stream.json.tmp
Filesize150KB
MD5381f3657ae78ad26355d3b8abf9c1023
SHA121c3de8693d6ca4976cce15aa8cbeaad3b169734
SHA2561c701105b0f7e1971ef52c6092edb227603dd93983bac6946ce9bfb72dc50009
SHA5120c8aba2633c9755900516bb087517bd101f3cc51f3de52c3fce6a56d649ea829ea6704c4d7127dbfebb098d65405a93381f1aa9e7b4d85843207aaa16ead9856
-
Filesize
6KB
MD5f843fc3b858888d342076c7199266348
SHA197dea7b7d8486f03cc085ef488fda80fe53515a0
SHA25619b6e95d7e0e109333b648d994d42f1f8552467f8f43a4570f84dc5c5e2189a4
SHA5129b25cfb2a279bda5827e7d4c3446c75cb5057e7a886e23b7f3eb44d3a2fbb04d19249ff423c821cc41ea7a6d8585fafb0b4f9ae8d54274883250c4a4a1c7c1f7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\sessionCheckpoints.json.tmp
Filesize193B
MD52ad4fe43dc84c6adbdfd90aaba12703f
SHA128a6c7eff625a2da72b932aa00a63c31234f0e7f
SHA256ecb4133a183cb6c533a1c4ded26b663e2232af77db1a379f9bd68840127c7933
SHA5122ee947dcf3eb05258c7a8c45cb60082a697dbe6d683152fe7117d20f7d3eb2beaaf5656154b379193cdc763d7f2f3b114cf61b4dd0f8a65326e662165ccf89cc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5a1819cfb6975a24a4a0668e3e1cc91bb
SHA1f177eb529f66bc6111a5d57390747dcf8923bf4e
SHA256a3a66eb606b94994be0d11ffb32ec70a963f3d0c6ea77156e796ec830196376d
SHA51295f306803624cb13aede0e6fef20f44ba8f6deb571aa37037cdb1e302ba19d8f4f2cd18005f6f747526ff28a02383518ff4f9a8b16a0ed979595ec53c5009d8c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\sessionstore.jsonlz4
Filesize976B
MD58a7fa815e1602153abef6aeb6582a14a
SHA13fa9119c9dcc92bcf9c6a1d0e23b8741d8a464f6
SHA256be8f144d52341760ffd603c318031b899eb2d2246ab2003c2c177ba69d5748e2
SHA51211e09f0b485a728b3f546a462e4dc32a72c75dbb54dbf9d87ca496a3810e416078285ab8880323ea47b33dfff4a0a734918305c2d2a9260bcd5738a278039cc6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\evlzgz75.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD513f4ea7224417985aabae4a2f59fc2ba
SHA12d20752d98ce84d37a69d349d2c008e302748b59
SHA256929688d666a67a627252819b523a1a80c92a092a94b155728b8ae603ec370c4f
SHA5120cf9e68368fff17491537a97f62cd1dc0ac9d1d7330cb2ad3f3e252ad973097fd53e416c70e9c0abb7a5cf97ac92e58f364fa96c47c95c071df71aca94dd8501
-
Filesize
3.5MB
MD5a98358eb7f4953aa6d60015ccd8506ce
SHA1d9be0c9d6d968c1baef11027a7ace6a0e869e75a
SHA25621e0cc9ef715cc2147b9ec481b3fb876dbae8a4491367b478513128d7f7b8555
SHA51262389e840c375a15d317d024d2e07b861b5b66447abb0423f603b73d2ec0853e3f947f78498a40dd835b48ca50562af9364c65c448a60172fa9011b6e564fac4
-
Filesize
3.5MB
MD5a98358eb7f4953aa6d60015ccd8506ce
SHA1d9be0c9d6d968c1baef11027a7ace6a0e869e75a
SHA25621e0cc9ef715cc2147b9ec481b3fb876dbae8a4491367b478513128d7f7b8555
SHA51262389e840c375a15d317d024d2e07b861b5b66447abb0423f603b73d2ec0853e3f947f78498a40dd835b48ca50562af9364c65c448a60172fa9011b6e564fac4