Analysis
-
max time kernel
32s -
max time network
41s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 16:57
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/draven-office/discord-old-account-genrator
Resource
win10v2004-20240802-en
General
-
Target
https://github.com/draven-office/discord-old-account-genrator
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/917748860682657832/sSsKt4ikHoi9zkepKqNjrrQK503_MnWsxInF6XnFlC2W3mmbZI320rx6s-R3dnG3i8W3
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions ._cache_discord old account genrator.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions ._cache_Synaptics.exe -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools ._cache_discord old account genrator.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools ._cache_Synaptics.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ._cache_discord old account genrator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ._cache_Synaptics.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 3 IoCs
pid Process 5348 ._cache_discord old account genrator.exe 5652 Synaptics.exe 6136 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" discord old account genrator.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 120 ip4.seeip.org -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ._cache_discord old account genrator.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 ._cache_discord old account genrator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 ._cache_Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language discord old account genrator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Checks SCSI registry key(s) 3 TTPs 2 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S ._cache_discord old account genrator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S ._cache_Synaptics.exe -
Checks processor information in registry 2 TTPs 11 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 11 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation ._cache_discord old account genrator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName ._cache_discord old account genrator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 ._cache_discord old account genrator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer ._cache_discord old account genrator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName ._cache_Synaptics.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ discord old account genrator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\Downloads\discord-old-account-genrator-main.zip:Zone.Identifier firefox.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5168 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1632 firefox.exe Token: SeDebugPrivilege 1632 firefox.exe Token: SeDebugPrivilege 1632 firefox.exe Token: SeDebugPrivilege 5348 ._cache_discord old account genrator.exe Token: SeDebugPrivilege 6136 ._cache_Synaptics.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 1632 firefox.exe 5168 EXCEL.EXE 5168 EXCEL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2304 wrote to memory of 1632 2304 firefox.exe 82 PID 2304 wrote to memory of 1632 2304 firefox.exe 82 PID 2304 wrote to memory of 1632 2304 firefox.exe 82 PID 2304 wrote to memory of 1632 2304 firefox.exe 82 PID 2304 wrote to memory of 1632 2304 firefox.exe 82 PID 2304 wrote to memory of 1632 2304 firefox.exe 82 PID 2304 wrote to memory of 1632 2304 firefox.exe 82 PID 2304 wrote to memory of 1632 2304 firefox.exe 82 PID 2304 wrote to memory of 1632 2304 firefox.exe 82 PID 2304 wrote to memory of 1632 2304 firefox.exe 82 PID 2304 wrote to memory of 1632 2304 firefox.exe 82 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4684 1632 firefox.exe 83 PID 1632 wrote to memory of 4736 1632 firefox.exe 84 PID 1632 wrote to memory of 4736 1632 firefox.exe 84 PID 1632 wrote to memory of 4736 1632 firefox.exe 84 PID 1632 wrote to memory of 4736 1632 firefox.exe 84 PID 1632 wrote to memory of 4736 1632 firefox.exe 84 PID 1632 wrote to memory of 4736 1632 firefox.exe 84 PID 1632 wrote to memory of 4736 1632 firefox.exe 84 PID 1632 wrote to memory of 4736 1632 firefox.exe 84 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "https://github.com/draven-office/discord-old-account-genrator"1⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url https://github.com/draven-office/discord-old-account-genrator2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2004 -parentBuildID 20240401114208 -prefsHandle 1916 -prefMapHandle 1908 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ed3a07e8-8749-4e66-ad7f-0d3180ac65a5} 1632 "\\.\pipe\gecko-crash-server-pipe.1632" gpu3⤵PID:4684
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2484 -prefMapHandle 2480 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ef736716-4ae4-4315-aea9-552ccab640d1} 1632 "\\.\pipe\gecko-crash-server-pipe.1632" socket3⤵PID:4736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3000 -childID 1 -isForBrowser -prefsHandle 2992 -prefMapHandle 2988 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1232 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d1694e3d-a617-40be-8fd3-e65b64f95f4e} 1632 "\\.\pipe\gecko-crash-server-pipe.1632" tab3⤵PID:2128
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3620 -childID 2 -isForBrowser -prefsHandle 3644 -prefMapHandle 3640 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1232 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4d811927-3838-4e6e-bbc5-ad50a6efe8e8} 1632 "\\.\pipe\gecko-crash-server-pipe.1632" tab3⤵PID:2016
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4480 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4464 -prefMapHandle 4400 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2a867d11-987b-4a11-a88c-ccaa7b838773} 1632 "\\.\pipe\gecko-crash-server-pipe.1632" utility3⤵
- Checks processor information in registry
PID:4144
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5452 -childID 3 -isForBrowser -prefsHandle 5444 -prefMapHandle 5440 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1232 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {803698d6-195a-476d-a8c8-4146638b7c7b} 1632 "\\.\pipe\gecko-crash-server-pipe.1632" tab3⤵PID:4460
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5592 -childID 4 -isForBrowser -prefsHandle 5600 -prefMapHandle 5604 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1232 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ef889edb-2f4d-4872-911e-054285fc4fa4} 1632 "\\.\pipe\gecko-crash-server-pipe.1632" tab3⤵PID:4368
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5784 -childID 5 -isForBrowser -prefsHandle 5912 -prefMapHandle 5908 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1232 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ab5a45ec-35cb-415d-9a21-11bfe9ee761f} 1632 "\\.\pipe\gecko-crash-server-pipe.1632" tab3⤵PID:1016
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3772 -childID 6 -isForBrowser -prefsHandle 3780 -prefMapHandle 4452 -prefsLen 29357 -prefMapSize 244658 -jsInitHandle 1232 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b04b7bcb-a6ad-423e-ad35-4d15a73bd7e6} 1632 "\\.\pipe\gecko-crash-server-pipe.1632" tab3⤵PID:2776
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6200 -childID 7 -isForBrowser -prefsHandle 6188 -prefMapHandle 6532 -prefsLen 27211 -prefMapSize 244658 -jsInitHandle 1232 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ee2cf009-09ee-4b9f-b464-1bc4e0f2f5c8} 1632 "\\.\pipe\gecko-crash-server-pipe.1632" tab3⤵PID:1396
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1688
-
C:\Users\Admin\Desktop\discord-old-account-genrator-main\discord old account genrator.exe"C:\Users\Admin\Desktop\discord-old-account-genrator-main\discord old account genrator.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2436 -
C:\Users\Admin\Desktop\discord-old-account-genrator-main\._cache_discord old account genrator.exe"C:\Users\Admin\Desktop\discord-old-account-genrator-main\._cache_discord old account genrator.exe"2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:5348
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5652 -
C:\Users\Admin\Desktop\discord-old-account-genrator-main\._cache_Synaptics.exe"C:\Users\Admin\Desktop\discord-old-account-genrator-main\._cache_Synaptics.exe" InjUpdate3⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:6136
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5168
-
C:\Users\Admin\Desktop\discord-old-account-genrator-main\discord old account genrator.exe"C:\Users\Admin\Desktop\discord-old-account-genrator-main\discord old account genrator.exe"1⤵PID:6016
-
C:\Users\Admin\Desktop\discord-old-account-genrator-main\._cache_discord old account genrator.exe"C:\Users\Admin\Desktop\discord-old-account-genrator-main\._cache_discord old account genrator.exe"2⤵PID:6080
-
-
C:\Users\Admin\Desktop\discord-old-account-genrator-main\discord old account genrator.exe"C:\Users\Admin\Desktop\discord-old-account-genrator-main\discord old account genrator.exe"1⤵PID:5600
-
C:\Users\Admin\Desktop\discord-old-account-genrator-main\._cache_discord old account genrator.exe"C:\Users\Admin\Desktop\discord-old-account-genrator-main\._cache_discord old account genrator.exe"2⤵PID:216
-
-
C:\Users\Admin\Desktop\discord-old-account-genrator-main\discord old account genrator.exe"C:\Users\Admin\Desktop\discord-old-account-genrator-main\discord old account genrator.exe"1⤵PID:5944
-
C:\Users\Admin\Desktop\discord-old-account-genrator-main\._cache_discord old account genrator.exe"C:\Users\Admin\Desktop\discord-old-account-genrator-main\._cache_discord old account genrator.exe"2⤵PID:6024
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
814KB
MD5a7885d5a280d874597fa46ce44150902
SHA1f9e5676fffb7ed9712edea377001f8afe873fcbd
SHA2568687c478dfa4c98ff859800174c5d53f8fb7d57669e520d7b94c7898bbddd2e9
SHA5123032a182c8579d370d7b05b264d7b583096278ae20ac9c9c81fbc87e3309a931f56d9601464ffac5ee85d20e4c117e76540c5ba076580cfd6cd2d238a6fc776d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zrrtvxky.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD51f1bf05c6026045ac73d4033f02849c7
SHA1aa25c1d733c4681c91d718902897e0582072f68f
SHA256a13e4c6fed245a0fd690360362a4e7b3513f0755f127664e213259afc8c4555e
SHA5129db8a24fb02a24250251783c9fa88c7ad6461fb0ff38d2f30e79cc64d7ffe3f8f98ac047a6323913038ef3b1ac274c542afdbb0ca2c8ebb5203671bd0c3b79d8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zrrtvxky.default-release\cache2\entries\2492994A253B970917AF5CDF605580B1C2DC16A0
Filesize792KB
MD56db229625b57f5bc24d2df019045ec0c
SHA1e96d439a05a0965a91959fdd890f46eaf227aa70
SHA2568f4501251dbb508420d6f0971ddf99edd037e43ba2e9893b03c1ff481586476c
SHA5120ef518e2308482a027515023fbc9fa675f97701e2efc50a37d2c31ca2d3e6d496f25beec5057a97cdce49ed8653e449317afb3aea8e68b7688be914cfc4e1893
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zrrtvxky.default-release\cache2\entries\41EC50669FDC2584229785DF61A01D6345DCF71D
Filesize50KB
MD5d59fb3bd1d45173c41da493ff78ae546
SHA1da339d40aee7c77404d04b886feef204d62759d0
SHA256f58d1f04b8337335c8210a7d10061954199932df09225d552d3df833a6707fab
SHA5120fb844d2c39a2ca7144414668e06209dd96075b980c5dd7f83d22de4459febb36ef31880362364ac5acdacad630388599636550be4a5163f500723710f7b0fa7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zrrtvxky.default-release\cache2\entries\4412D919A32B54AB53754B2E68861EB10099D124
Filesize115KB
MD5f197e2d1065799e0baa7605f8b94e681
SHA1f30c3af311af9ade2959226dfcf3bacf7e0a934e
SHA256ed4807144b83aa7d4ea903c25435f4b4c1367ae7e18b83ccd693b0f11822f592
SHA512284a8f26fc89142a0037f51b8884d7f1f60edd09f2d96f2b07ac220198a1f8e9b4765a08a0c851dda71cc30980580697ef5267017bf1d30e71d4414da72eadcd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zrrtvxky.default-release\cache2\entries\645AEB44FBEE3EC2FE9DB6CA5209F74C6FC79689
Filesize125KB
MD58d4280edd2ff67cf78bc1b80cd77862e
SHA1f90a86a884bdf649c6b08f3b9cc271d900759928
SHA2567a82c6415052b6a85b87c7475bf1d1967acafc73a458010b9b39994eb4a91122
SHA51286e8c325aa86e6434ecf84718b333b916b845abe0bf444bc8d618277cf27d2aacba5640396af2c2268d2f4d66e4aa9eda5077ef8913476f9c044f716acc164e4
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zrrtvxky.default-release\cache2\entries\AF53CFF42FEF0E7B1D062270D59DF12108CAF066
Filesize65KB
MD5014189d5bea0602e7c818804e2aef9c5
SHA1bd63bfa926dcb4887b0627499a472e301aafca35
SHA256e33229ac5b78fec7e09ed3d01d90fa33bc664476604e9e519cb521b51a3b0b70
SHA512936ff3e21577c8132e4d1f79a71364c4a883b1b6b9dccb5a48e29651d1e75e48e165299c8c16cc44ddc1388d7299c2fdf6e787c7d3b4571a568e6ed590bed20c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zrrtvxky.default-release\cache2\entries\D16479E925AF122292501EFEF9D2A14A47D3245A
Filesize79KB
MD50f9945b1c8c486f33e6aa5bce5364275
SHA114cce73c2faec4f02628d354d4afc7ec57d25ac4
SHA2563ac034ecc956205746b61c6deba15b00e65093ad7f841f2e7ae024a502af7a85
SHA5120a2bdebfe19086c0d0ed60ec6c0aa6d3db58d4df76b68c3c20a553132debd10b3de3669d727627573be3c5f3bdad9978040c39d2041783c30d894a7e8d4cf83d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zrrtvxky.default-release\cache2\entries\DBB1D200AAA5C0E8FECF3BF2C49AAADAD31FFE96
Filesize2.1MB
MD53f2f44cc38ed4c09723c59afc8a7a139
SHA1026e023d72f961f0a1fe4ac706f010d27c17ca3a
SHA256169992afab002eda2defe15d8e5c8760317c047f7fa7afee9e91f5ac7f381ca7
SHA51273659500167f84b94458d73f2605f3c3d58ab383cd033aa38d95fc352ae911fa92d757822b1e1000a342b265b98ebc986e1e9e06e1c99b28acda8a57955eb1e0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zrrtvxky.default-release\cache2\entries\EA726DCDA5B8B23EC1701AEA8E27C4CDBC1142CD
Filesize53KB
MD564e629d77391aaa93fc265b751571797
SHA1cc0326b7897c5bea0f1808607cfb502488322c26
SHA2560e06d20060995b9aa8ff47a4b0264b9adced7b701a0f7f65cb8ed66a889fbe59
SHA5129f57e80cd03c60c5e971574ac36ed6691ad9d5a9cf40ad8ff56e9b0dd92edd956ac08998e8b70394c6ef5f352e609ea7da1941a47132ff90e4d7f0c10baf3016
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\AlternateServices.bin
Filesize6KB
MD5a1ff19a5f3278b15f72c600c9415d966
SHA1854b53480e96dd8180cba0ffe83463ee711f0deb
SHA2562ff4ea28eecf1eccdf241987d2a1ee2cc44c64acdb90a298c047c7be5d6cbd17
SHA51263c789f2c78a3ed505f324c662cb83e7aec58d02620b5094395fde336fcf4cce55d8170655c166d0c3e7eb49047b67bcfb597695b02c85a06b3a60e911bfcd39
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\AlternateServices.bin
Filesize8KB
MD5790979ce368e223a59ecd79d32059c04
SHA1fa38a7d71b97a3e1cf43f7a352554dde6422896a
SHA256507c423f19e298c5fa10401476576ab491e5ae54f28ca1b686fc6bb24eae6314
SHA512a9f6f954ad5c1701d21873091902aaf470835f6ed09a8347cf231a1712c3cb0df17afdccd440c35d0300a67c9969efbe1d96d260df8fb4128e2ac10867308df9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5709529ed5086ef4722f999d38c8473e1
SHA1565340b3bb5618f5b6a8b3b8fc8fd3ea6e97fe51
SHA2566480bd46fe60bb29bb48a0454e9bb992d17256ff646ff7c6bfe61b9699097168
SHA512a1e0bba18af21b59d6017c50ab8f123f8b157aeb2245c3b7fe3404d0b195b931724bed4f82883b7ccf086c655eabbcbffd293e6c3559663d285a1a387bfee2b1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\datareporting\glean\db\data.safe.tmp
Filesize14KB
MD5d5011339e205a4e6d1f218b39ed79f96
SHA19c0fb17b4ce50729fbc04802c89ff7e65312bcff
SHA256c35c2e16f529cda63b8b5993eea3f8615eb0f6146994ed2e56e05e9b269f5aa6
SHA51217458d9490b4db88437ddda73182baa92b621dca6fd639bec92c3a9c30ea1c27852ea68210118d8c3de9ca9172e76a253ef2c3e4efa63819cd06e8394091b779
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\datareporting\glean\pending_pings\306d1c98-7ec1-4a9b-b35b-350f3db4f876
Filesize26KB
MD5bd954096431db12a1675f42c157c0160
SHA19c1e170af53bb3818eed605870b955717d9c3492
SHA256b0a54bad8593b4bd5191ad9a5602ecdff90de8697e2f3effc65f6bbf121f6295
SHA5123955a701b656f8d072d133b52e9df816cd3c7e839942ad82efd82d0eae8b1548343e1a5786b585b8993562a291250a8542d128b488ba09ff775c0ae1dead945c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\datareporting\glean\pending_pings\90ddf3b3-5164-4e58-9267-5871c0b81246
Filesize671B
MD578c43d0e689d59efbdf601410cd5947e
SHA158b8949b19c14a6fb36395bc70626c8a23ca3114
SHA256cd87a67b1356d0e50362450cd85a0829729ab2ad78df4416e8c1c984893c4ccf
SHA512340cef37d5a4f46218119fa43a5949b770b5a53ed17191bd2335cdf6f951f96ce330d3d56ddf7b1dc4c9b75ddb633a9b9ead91ae8ebfaa5f3fbdce5590fe6938
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\datareporting\glean\pending_pings\a5501019-606d-4564-8032-a04ae48ce668
Filesize982B
MD5b711ccca1c11dc718dad081f6aab5539
SHA12308ff0b294c2de26732b3799125ca48cd1e9661
SHA25668eb49115ecc19d3c061a65647ce87aa5fed7aa4bce2a4b65c58258e0a04cb07
SHA5126a1dc2f1a5404e8215248b8039264b369abe516c90ba93700003f873fc24e165f86fa91ea7dc7d0bef57054a2c99e3aac40a7de4af7de9c5194bc8570cfda5e6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD59bf7a55f1c2c33008158c36d3d2dee7a
SHA154aa1ab0d1d0f50389710c9892cc0ad1f768a272
SHA25632bdacb5d66a6974fca6afb9a7e52d9c19dc3e4a7ae5b2d937e0f029583f3eda
SHA512705df38ee963343581c55b069048af8159429bbafc8418355423852bebae072b51483fcb421dfb33cf4f4eec1d7203f26dad7002268921510ead6ffe6eca656e
-
Filesize
12KB
MD5252ff11b1d6e99e5e997e091aaf6d192
SHA16753bdd3be3dc117b9bdfcc8685ede8e009ca8cd
SHA2569ef4623b9a21e3d616b80a389474576df2499779d8846b0107e1c4d695bc800d
SHA512a018f14ac8938fb29eea1546583a47f89704ad7e0e46e8e7d38b635ba2037830d946f2b92b83d2000bfdbe6fdb709940feb949947f5f465367c72b520f17a54d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\sessionstore-backups\recovery.baklz4
Filesize3KB
MD526d76eb84ab8ea6ea4800ebeb72f6c80
SHA1be1561b2eeec497e729f337156aaac0025a484be
SHA256c089968d748b812304881e4e50d680e8b5e7d578d0da5a347d0f309ba084f877
SHA512d63d0b453dd2b3378a9ee1396ff8e69a167d72ab6161d81520ffb1323e72ab9bec3a845492b15f041956f58ec5c21f609a1352ab0acded2f8611868e78ed2704
-
Filesize
61KB
MD543c467f6fd42d77d1c27b2b2eded962c
SHA1321f7ea7ebe2e232aad0d108c24d7f462fef2b70
SHA256cc2f9757e42d736363e5d85c68359af2db73721e800e9775b79a6082ad40fe95
SHA512175b7849121359084883775bb83360eda0feca86cabc84875bfe01892f43679396a29d4575d54449730d6c8815f0a032f9d4a99f1829cd84dcebc482537e015d
-
Filesize
410KB
MD521cf7789abdcbff04229aa2d0469bfed
SHA18532148e576f617b843df821eab5a75ab7c314e1
SHA256c8e03e7b6d28aae5a1cea068149bd665a65e0556b266bfe00e199f221f703b6e
SHA5126723ff2df5eb7c2bd7ba50f9b4e87f207497be1e756b483f437ed8322f88a3a52133b6109e568f5eb7451895d1b7cf1363da7ea8e56d3db0f652f335472da6e1