Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2024, 12:21
Static task
static1
Behavioral task
behavioral1
Sample
c263ebdc90fdb0a75d6570f178156c0ba665ac9f846b8172d7835733e5c3de59.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c263ebdc90fdb0a75d6570f178156c0ba665ac9f846b8172d7835733e5c3de59.exe
Resource
win10v2004-20241007-en
General
-
Target
c263ebdc90fdb0a75d6570f178156c0ba665ac9f846b8172d7835733e5c3de59.exe
-
Size
1.6MB
-
MD5
0f4af03d2ba59b5c68066c95b41bfad8
-
SHA1
ecbb98b5bde92b2679696715e49b2e35793f8f9f
-
SHA256
c263ebdc90fdb0a75d6570f178156c0ba665ac9f846b8172d7835733e5c3de59
-
SHA512
ea4de68e9eb4a9b69527a3924783b03b4b78bffc547c53a0ecd74d0bd0b315d312ae2f17313085acd317be1e0d6f9a63e0089a8a20bf9facc5157a9b8bea95a3
-
SSDEEP
24576:Wa0E71YwbX4e2F4fOfq444sMDF6XR5w5ZVcs5I0wzvZBjQB/CtNJb/zUJH++QLS0:vYwD4e2FkCq/yYB5alxUNJLzyiegcIZ
Malware Config
Extracted
vidar
https://t.me/asg7rd
https://steamcommunity.com/profiles/76561199794498376
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Signatures
-
Detect Vidar Stealer 17 IoCs
resource yara_rule behavioral2/memory/1604-663-0x0000000004AA0000-0x0000000004DA0000-memory.dmp family_vidar_v7 behavioral2/memory/1604-664-0x0000000004AA0000-0x0000000004DA0000-memory.dmp family_vidar_v7 behavioral2/memory/1604-665-0x0000000004AA0000-0x0000000004DA0000-memory.dmp family_vidar_v7 behavioral2/memory/1604-687-0x0000000004AA0000-0x0000000004DA0000-memory.dmp family_vidar_v7 behavioral2/memory/1604-688-0x0000000004AA0000-0x0000000004DA0000-memory.dmp family_vidar_v7 behavioral2/memory/1604-740-0x0000000004AA0000-0x0000000004DA0000-memory.dmp family_vidar_v7 behavioral2/memory/1604-741-0x0000000004AA0000-0x0000000004DA0000-memory.dmp family_vidar_v7 behavioral2/memory/1604-747-0x0000000004AA0000-0x0000000004DA0000-memory.dmp family_vidar_v7 behavioral2/memory/1604-748-0x0000000004AA0000-0x0000000004DA0000-memory.dmp family_vidar_v7 behavioral2/memory/1604-941-0x0000000004AA0000-0x0000000004DA0000-memory.dmp family_vidar_v7 behavioral2/memory/1604-1108-0x0000000004AA0000-0x0000000004DA0000-memory.dmp family_vidar_v7 behavioral2/memory/1604-1114-0x0000000004AA0000-0x0000000004DA0000-memory.dmp family_vidar_v7 behavioral2/memory/1604-1115-0x0000000004AA0000-0x0000000004DA0000-memory.dmp family_vidar_v7 behavioral2/memory/1604-1143-0x0000000004AA0000-0x0000000004DA0000-memory.dmp family_vidar_v7 behavioral2/memory/1604-1144-0x0000000004AA0000-0x0000000004DA0000-memory.dmp family_vidar_v7 behavioral2/memory/1604-1151-0x0000000004AA0000-0x0000000004DA0000-memory.dmp family_vidar_v7 behavioral2/memory/1604-1152-0x0000000004AA0000-0x0000000004DA0000-memory.dmp family_vidar_v7 -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
description pid Process procid_target PID 1604 created 3408 1604 Plates.pif 56 PID 1604 created 3408 1604 Plates.pif 56 -
Vidar family
-
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2908 msedge.exe 4772 msedge.exe 4436 chrome.exe 1416 chrome.exe 3352 chrome.exe 3428 msedge.exe 512 msedge.exe 2948 chrome.exe 2876 msedge.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation c263ebdc90fdb0a75d6570f178156c0ba665ac9f846b8172d7835733e5c3de59.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Plates.pif -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SkySync.url cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SkySync.url cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 1604 Plates.pif 3928 KECGDBFCBK.exe 3212 FHIDAKFIJJ.exe -
Loads dropped DLL 3 IoCs
pid Process 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2044 tasklist.exe 4532 tasklist.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3928 set thread context of 1668 3928 KECGDBFCBK.exe 165 PID 3212 set thread context of 1908 3212 FHIDAKFIJJ.exe 169 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\BookmarkRolling c263ebdc90fdb0a75d6570f178156c0ba665ac9f846b8172d7835733e5c3de59.exe File opened for modification C:\Windows\HimselfConsumption c263ebdc90fdb0a75d6570f178156c0ba665ac9f846b8172d7835733e5c3de59.exe File opened for modification C:\Windows\SanyoToday c263ebdc90fdb0a75d6570f178156c0ba665ac9f846b8172d7835733e5c3de59.exe File opened for modification C:\Windows\DeletedWilliam c263ebdc90fdb0a75d6570f178156c0ba665ac9f846b8172d7835733e5c3de59.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3504 3928 WerFault.exe 153 1716 3212 WerFault.exe 157 -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c263ebdc90fdb0a75d6570f178156c0ba665ac9f846b8172d7835733e5c3de59.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KECGDBFCBK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Plates.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FHIDAKFIJJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Plates.pif Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Plates.pif Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1620 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133750237416884250" chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1960 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 2044 tasklist.exe Token: SeDebugPrivilege 4532 tasklist.exe Token: SeShutdownPrivilege 4436 chrome.exe Token: SeCreatePagefilePrivilege 4436 chrome.exe Token: SeShutdownPrivilege 4436 chrome.exe Token: SeCreatePagefilePrivilege 4436 chrome.exe Token: SeShutdownPrivilege 4436 chrome.exe Token: SeCreatePagefilePrivilege 4436 chrome.exe Token: SeShutdownPrivilege 4436 chrome.exe Token: SeCreatePagefilePrivilege 4436 chrome.exe Token: SeShutdownPrivilege 4436 chrome.exe Token: SeCreatePagefilePrivilege 4436 chrome.exe Token: SeShutdownPrivilege 4436 chrome.exe Token: SeCreatePagefilePrivilege 4436 chrome.exe Token: SeShutdownPrivilege 4436 chrome.exe Token: SeCreatePagefilePrivilege 4436 chrome.exe Token: SeShutdownPrivilege 4436 chrome.exe Token: SeCreatePagefilePrivilege 4436 chrome.exe Token: SeShutdownPrivilege 4436 chrome.exe Token: SeCreatePagefilePrivilege 4436 chrome.exe Token: SeDebugPrivilege 1668 MSBuild.exe -
Suspicious use of FindShellTrayWindow 54 IoCs
pid Process 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe 2876 msedge.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1604 Plates.pif 1604 Plates.pif 1604 Plates.pif -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1592 wrote to memory of 3484 1592 c263ebdc90fdb0a75d6570f178156c0ba665ac9f846b8172d7835733e5c3de59.exe 85 PID 1592 wrote to memory of 3484 1592 c263ebdc90fdb0a75d6570f178156c0ba665ac9f846b8172d7835733e5c3de59.exe 85 PID 1592 wrote to memory of 3484 1592 c263ebdc90fdb0a75d6570f178156c0ba665ac9f846b8172d7835733e5c3de59.exe 85 PID 3484 wrote to memory of 2044 3484 cmd.exe 93 PID 3484 wrote to memory of 2044 3484 cmd.exe 93 PID 3484 wrote to memory of 2044 3484 cmd.exe 93 PID 3484 wrote to memory of 3928 3484 cmd.exe 94 PID 3484 wrote to memory of 3928 3484 cmd.exe 94 PID 3484 wrote to memory of 3928 3484 cmd.exe 94 PID 3484 wrote to memory of 4532 3484 cmd.exe 95 PID 3484 wrote to memory of 4532 3484 cmd.exe 95 PID 3484 wrote to memory of 4532 3484 cmd.exe 95 PID 3484 wrote to memory of 2136 3484 cmd.exe 96 PID 3484 wrote to memory of 2136 3484 cmd.exe 96 PID 3484 wrote to memory of 2136 3484 cmd.exe 96 PID 3484 wrote to memory of 1452 3484 cmd.exe 97 PID 3484 wrote to memory of 1452 3484 cmd.exe 97 PID 3484 wrote to memory of 1452 3484 cmd.exe 97 PID 3484 wrote to memory of 3460 3484 cmd.exe 98 PID 3484 wrote to memory of 3460 3484 cmd.exe 98 PID 3484 wrote to memory of 3460 3484 cmd.exe 98 PID 3484 wrote to memory of 1072 3484 cmd.exe 99 PID 3484 wrote to memory of 1072 3484 cmd.exe 99 PID 3484 wrote to memory of 1072 3484 cmd.exe 99 PID 3484 wrote to memory of 1604 3484 cmd.exe 100 PID 3484 wrote to memory of 1604 3484 cmd.exe 100 PID 3484 wrote to memory of 1604 3484 cmd.exe 100 PID 3484 wrote to memory of 3480 3484 cmd.exe 101 PID 3484 wrote to memory of 3480 3484 cmd.exe 101 PID 3484 wrote to memory of 3480 3484 cmd.exe 101 PID 1604 wrote to memory of 2652 1604 Plates.pif 102 PID 1604 wrote to memory of 2652 1604 Plates.pif 102 PID 1604 wrote to memory of 2652 1604 Plates.pif 102 PID 1604 wrote to memory of 4004 1604 Plates.pif 104 PID 1604 wrote to memory of 4004 1604 Plates.pif 104 PID 1604 wrote to memory of 4004 1604 Plates.pif 104 PID 2652 wrote to memory of 1960 2652 cmd.exe 106 PID 2652 wrote to memory of 1960 2652 cmd.exe 106 PID 2652 wrote to memory of 1960 2652 cmd.exe 106 PID 1604 wrote to memory of 4436 1604 Plates.pif 116 PID 1604 wrote to memory of 4436 1604 Plates.pif 116 PID 4436 wrote to memory of 1916 4436 chrome.exe 117 PID 4436 wrote to memory of 1916 4436 chrome.exe 117 PID 4436 wrote to memory of 4536 4436 chrome.exe 118 PID 4436 wrote to memory of 4536 4436 chrome.exe 118 PID 4436 wrote to memory of 4536 4436 chrome.exe 118 PID 4436 wrote to memory of 4536 4436 chrome.exe 118 PID 4436 wrote to memory of 4536 4436 chrome.exe 118 PID 4436 wrote to memory of 4536 4436 chrome.exe 118 PID 4436 wrote to memory of 4536 4436 chrome.exe 118 PID 4436 wrote to memory of 4536 4436 chrome.exe 118 PID 4436 wrote to memory of 4536 4436 chrome.exe 118 PID 4436 wrote to memory of 4536 4436 chrome.exe 118 PID 4436 wrote to memory of 4536 4436 chrome.exe 118 PID 4436 wrote to memory of 4536 4436 chrome.exe 118 PID 4436 wrote to memory of 4536 4436 chrome.exe 118 PID 4436 wrote to memory of 4536 4436 chrome.exe 118 PID 4436 wrote to memory of 4536 4436 chrome.exe 118 PID 4436 wrote to memory of 4536 4436 chrome.exe 118 PID 4436 wrote to memory of 4536 4436 chrome.exe 118 PID 4436 wrote to memory of 4536 4436 chrome.exe 118 PID 4436 wrote to memory of 4536 4436 chrome.exe 118 PID 4436 wrote to memory of 4536 4436 chrome.exe 118 PID 4436 wrote to memory of 4536 4436 chrome.exe 118
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\c263ebdc90fdb0a75d6570f178156c0ba665ac9f846b8172d7835733e5c3de59.exe"C:\Users\Admin\AppData\Local\Temp\c263ebdc90fdb0a75d6570f178156c0ba665ac9f846b8172d7835733e5c3de59.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy Treat Treat.bat & Treat.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa opssvc"4⤵
- System Location Discovery: System Language Discovery
PID:3928
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
C:\Windows\SysWOW64\findstr.exefindstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"4⤵
- System Location Discovery: System Language Discovery
PID:2136
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 6467514⤵
- System Location Discovery: System Language Discovery
PID:1452
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "AffiliateRobotsJoinedNewsletter" Purse4⤵
- System Location Discovery: System Language Discovery
PID:3460
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b ..\Suitable + ..\Johnson + ..\July + ..\Firmware + ..\Invalid + ..\Baby + ..\Bar + ..\Continental + ..\Ruled + ..\Gay + ..\Hop + ..\Clearance + ..\Wisdom + ..\January + ..\Denmark + ..\Bull c4⤵
- System Location Discovery: System Language Discovery
PID:1072
-
-
C:\Users\Admin\AppData\Local\Temp\646751\Plates.pifPlates.pif c4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe42d0cc40,0x7ffe42d0cc4c,0x7ffe42d0cc586⤵PID:1916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1976,i,12273999357601202398,10519410850009266908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1972 /prefetch:26⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1832,i,12273999357601202398,10519410850009266908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2116 /prefetch:36⤵PID:2460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2004,i,12273999357601202398,10519410850009266908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2256 /prefetch:86⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3184,i,12273999357601202398,10519410850009266908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:16⤵
- Uses browser remote debugging
PID:2948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3212,i,12273999357601202398,10519410850009266908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3200 /prefetch:16⤵
- Uses browser remote debugging
PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4320,i,12273999357601202398,10519410850009266908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3164 /prefetch:16⤵
- Uses browser remote debugging
PID:3352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4560,i,12273999357601202398,10519410850009266908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3176 /prefetch:86⤵PID:3108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4364,i,12273999357601202398,10519410850009266908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4548 /prefetch:86⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4980,i,12273999357601202398,10519410850009266908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4780 /prefetch:86⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4924,i,12273999357601202398,10519410850009266908,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4916 /prefetch:86⤵PID:4956
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:2876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe42d146f8,0x7ffe42d14708,0x7ffe42d147186⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,16184575020519970665,4982990213630503846,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:26⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,16184575020519970665,4982990213630503846,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:36⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,16184575020519970665,4982990213630503846,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:86⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2164,16184575020519970665,4982990213630503846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:16⤵
- Uses browser remote debugging
PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2164,16184575020519970665,4982990213630503846,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:16⤵
- Uses browser remote debugging
PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2164,16184575020519970665,4982990213630503846,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:16⤵
- Uses browser remote debugging
PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2164,16184575020519970665,4982990213630503846,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3796 /prefetch:16⤵
- Uses browser remote debugging
PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,16184575020519970665,4982990213630503846,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:26⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,16184575020519970665,4982990213630503846,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:26⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,16184575020519970665,4982990213630503846,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2808 /prefetch:26⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,16184575020519970665,4982990213630503846,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4528 /prefetch:26⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,16184575020519970665,4982990213630503846,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4620 /prefetch:26⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,16184575020519970665,4982990213630503846,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2536 /prefetch:26⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,16184575020519970665,4982990213630503846,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2568 /prefetch:26⤵PID:2460
-
-
-
C:\ProgramData\KECGDBFCBK.exe"C:\ProgramData\KECGDBFCBK.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵PID:1432
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵PID:2544
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3928 -s 2846⤵
- Program crash
PID:3504
-
-
-
C:\ProgramData\FHIDAKFIJJ.exe"C:\ProgramData\FHIDAKFIJJ.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3212 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵
- System Location Discovery: System Language Discovery
PID:1908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 2566⤵
- Program crash
PID:1716
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\JKECGDBFCBKF" & exit5⤵
- System Location Discovery: System Language Discovery
PID:2244 -
C:\Windows\SysWOW64\timeout.exetimeout /t 106⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1620
-
-
-
-
C:\Windows\SysWOW64\choice.exechoice /d y /t 54⤵
- System Location Discovery: System Language Discovery
PID:3480
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks.exe /create /tn "Enjoy" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SkySync Technologies\SkySync.js'" /sc minute /mo 5 /F2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /tn "Enjoy" /tr "wscript //B 'C:\Users\Admin\AppData\Local\SkySync Technologies\SkySync.js'" /sc minute /mo 5 /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1960
-
-
-
C:\Windows\SysWOW64\cmd.execmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SkySync.url" & echo URL="C:\Users\Admin\AppData\Local\SkySync Technologies\SkySync.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SkySync.url" & exit2⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:4004
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2544
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3928 -ip 39281⤵PID:3540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3212 -ip 32121⤵PID:884
Network
MITRE ATT&CK Enterprise v15
Persistence
Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
751KB
MD56a054f0935f2ece44e58f88353ad230d
SHA1ff8fd9fe483e9e8ee767e77f7ccab4f4207ff0f1
SHA2562751c72ca341d5a05b1f4b947ebba74bf1e679b388cf560a104918a71adbcc5b
SHA51285e5db38d7c2e179c9d6bc5e76d9666e4f40c331cb6eca37cd264b1cac7c87ed64a7d8981fa198d57cf0ab645b55e7598a305f2763899877be4c09fc9f52f0df
-
Filesize
761KB
MD58c66851a94f593031f78c4b0139aa0fe
SHA177d44ebb62b4acb59cbbab47151de0260fa77889
SHA256801f91b149ccc94aef57d7052af2a68663c9549d538ef47f9d657e68b556a207
SHA51272896b71f972dff1bd911662f4beb86fccfcc6882588b1559708e973f6295c778938eb264103fb6286145a2e7ecf08eeed928f4d83d73c39807323beb75a0f2f
-
Filesize
676KB
MD5eda18948a989176f4eebb175ce806255
SHA1ff22a3d5f5fb705137f233c36622c79eab995897
SHA25681a4f37c5495800b7cc46aea6535d9180dadb5c151db6f1fd1968d1cd8c1eeb4
SHA512160ed9990c37a4753fc0f5111c94414568654afbedc05308308197df2a99594f2d5d8fe511fd2279543a869ed20248e603d88a0b9b8fb119e8e6131b0c52ff85
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
649B
MD5f1806298101f477b4592e32383d169b5
SHA149f297f9b9eaffbb0e77b905104a6020d4da8591
SHA256c4bf23343e4d186fd2aa58fb49b20aa894321fb726543ab065fb013f3798a300
SHA512dffde2f67177ccb114135b8421f004ae820623ff867717209126fa214e7b98c8f04e1d2f9c0aa9619f58c2e976b60660ac306f76f78cbec514a7e7bbc45c5042
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
954B
MD5bd25b2ebc4a982f4d382f0c6e1229252
SHA1bec10f93f36fdd5fd73ac2c309a9fef6300b1b78
SHA256fb9a2f9ee9f5473799299e79f9465f3576d13c1e0c3a2a5be9b535ccaecf8ba7
SHA512929b6a5c654f8965ee27db36d2f28618da56075334ef501a7ebb82505af562227234eeb24075d1408b9eb564dc1ce7a9729bd777b3cfda915519d12aa0c5ddde
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\00a77d4a-efb4-45b2-8a6b-fffffe68fe5b.dmp
Filesize830KB
MD576f7614a471b881199a5ef4679c9b6e1
SHA19fdb8cd07f00c3f1aa810ae8ae4f5db9e9f31883
SHA256e0c8da8ed77e52c102bf750cbe17035b8e799b1a7953333c9fe23104229c6b72
SHA5128f091d30400ee076d9e749d77350b83a642dec173b3a0097538e1204ac839ff99b4e7826311533b96b12ee5c2004da89c9dfcefe8479f52d47e40841a592f91a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\08634c62-a452-4b3a-ac9b-846dae8a571a.dmp
Filesize838KB
MD57814ad74d975e1e48ce7815ea1686fe8
SHA1ed256fb7d7bade514155f20ff573e3cb8cf39779
SHA256d8896d2b1a7a34196ccb22077ca3faa16552d93424cf0e85fb1285d579463748
SHA512f66e44a8f59005de3d788b44289681c889fe984c143ea8880b316ebe5b924a1c5e1ea06de0c1ff34117cad461054d659c1f34fa23cf06ad5fb98f188c0b41308
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\13623881-9385-4216-8d11-a0237bc3f5d8.dmp
Filesize838KB
MD543164319c41478869c72bf70fb62f1c3
SHA1c9fbfd126150f98017152c3c9f757e31c8653a47
SHA2568e64b6361cf70e1a731dffd0f0732b6bfa6a6e75bae25f4421d744315be2ca0b
SHA5125c1660fdc237ca10419888ae30e0fc609b6ec256fa19ab62a60f8687e07db0b3c31d538062e65a10344c8103bd311897e98ef514878c99a1011fbc9bd8d25676
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\5164c6cc-ef1c-41ed-bf72-f1e97665a843.dmp
Filesize830KB
MD5f5835bc780677e7d0d1ac0026cdf05f5
SHA17cfa1ae786ab8ee30fc40852ce4ba559741b51d4
SHA256fa1bcef8078c4df908a63e12527bd0924b79589412ea5e42d6620de1f163b43c
SHA5123a2bb993d3f50b3fb8ddbc963856ab05fdb0de3bdc07a99608db3d632771c363149c2ae627c22075cc0a977095ed9352d1eb431d3bfc731dadfd105387356ede
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\984507ee-e2db-48ca-a4cf-c26a7257cf16.dmp
Filesize838KB
MD52a365c88b59eaa8102a2d21a22bbea71
SHA191e1c033878b5cef8451960dacc3dba568599dec
SHA256464a2002fa4125163616dc89a2e609dc79d9f7d85909f0574a93439d65478157
SHA512e4083ec0d6d7c7dac9c996e73060fa9d887e605ad4f18588619d66af8f3ec1f1178903ddf943873369d08f8b48c436963a4a09815e38a4e335b36fe6cfb1d436
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\a8be3a55-c33e-44d2-a63e-dcc387134c04.dmp
Filesize826KB
MD530111e354be11d8ca122f0280a2a0b2e
SHA1695df9123f549a641ab2b44649fed9836beb5c16
SHA256304e9361d119e5027a6e4a5c373c8a8c3b624d71d78c78f662de224acf60562a
SHA512d72bb7626be1e75b37ea2c792a27cff1bacf1b14d9b7def70deff47b5151796a1020f594b8df17bf68ce371a480bb44b890bdcfb099e66e5af2d2eb01a9a21d7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\d90eaafe-e688-4571-a183-cdc0f175dd79.dmp
Filesize826KB
MD52f3ee0937ad494f0edb3fce43a2f0614
SHA157602a1521e69228f5177793c381ebaafd64cb25
SHA256aa7b5fb924a16179305287d2a8899254afb16cd02d65dea815dce0bce99a25a3
SHA5123c5eb12b0ea2f2d87f0e8738b26f413e10fc08d6d06aed35edf879aafb10db4a603f6b9f4d7617220bfc93e552505d537c98e241123cc720be8c81793683b1ef
-
Filesize
152B
MD56493b7a05b2fc88d9a84086cce47f124
SHA1b5dcbfb385d594b4714695ae032cf650886e96e4
SHA2569d29a3e5db91a8d88616f385b7b038edd9fe930dec58eddf9db05f240800293a
SHA512014e0f7650e172174b0b571cfd69f03400c1ad09658b9866a214adbb5264427af15c929952a216bb46ea9f06d162114a422a249c96b2cd519eddc364f750dcec
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5a940f318022ae6f007a95dbc9d8ffa43
SHA10fd55b326edeb9e09cfe13bcc4e24afe48cbc229
SHA2568b0bedde4baf4c5c4c64053103d6cb3cdd9418ff49b8cfbbc34ffced2b771da0
SHA512885b05d8a12f3fed179e715931eee33ee812492844f4cdea637e7ecb8753dd9ab905c787a4fae6753ab776abdbe2e78e42f10dac04a79af6f4855fd8c6e5ed59
-
Filesize
152B
MD5521e118c5d0e894036ba3612f308940c
SHA19cf2c260d9eda755d713b03784e33f0b68905d45
SHA256a91b905fa41ce88948ea762d6c584f43e2cb70aed65188474f4617e3ff644cde
SHA512ee6cdd5bf012a633482c4b0a95168856afc3f3b6fea37ffb376e4fbc1ad47976be89ce65772ed73ec3661890dcfd2bb8760ea5e8336cdb8e1f59aa5fb71459a7
-
Filesize
5KB
MD504983c811dc22bf61b0f2e9b50fbbde1
SHA1a7e678bcb3317aaf812c77d3c561685ce401f41d
SHA2566b9b5490eb6044ef19c20cce7654b1f5a088936a4077214bbc1e1aede95c5eaa
SHA5129d31e3220870a50c686b8cdfabb3057e5b57dcb6da1e410fe3df1db4ea4679f40ed8538ad0d26cfe4e6464b46fd59b681fe5abfaf6ae40ba59e327a5da5b571a
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
872KB
MD518ce19b57f43ce0a5af149c96aecc685
SHA11bd5ca29fc35fc8ac346f23b155337c5b28bbc36
SHA256d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd
SHA512a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558
-
Filesize
1.1MB
MD5e9040d6e82ffa0f28cecfb9c4cedc0ea
SHA10c899a8a0b527e4f9d8542facfae9c73ff2c2595
SHA256cf1c104480409dea5f86c6f0323ef71232ab062b7e719a7a10e2b69a3412f1a5
SHA5129f5e8c989c2a0ba8ef133ad7c95a6b70a849bfe5ca5f7f46ea9e9dcdd568800f9393c884def0fde00dc60d26251f8a81e65eff826555b0b6102faeaf4f890933
-
Filesize
82KB
MD5ee7c47686d35a3e258c1f45053cc75ab
SHA172341f88c79d79cb44ef60fc33783b9f14ff1ee8
SHA256b199ba689f6b383644345854c758629b925f9cb853c0e4e1dcb4d0f891be5eba
SHA512f007c9c101650842dd7b57310d22a0c04fa1fa71f1388285f55fe9cc0b70dbe7a1964ace594793bd707db07c3ea4911bfd21c458993b1bec8fa155250dac2471
-
Filesize
61KB
MD5b01f3d096606e9762d0a6b305163c763
SHA195c3623ad2693cfff27bc1f2fa60e5fb3292f4d7
SHA256adacdc0798acbc5bec0377956876c8b94b52528f51bb998c1f7f1cd2f0db5088
SHA51299e4fb8914a35396395638eb1542fb096ff3cb9ce56258e89350fe49738344819e707a3aa4c9731f02a47da5432a6ec96c42c121b1e8a7113e8aaff250c27b58
-
Filesize
6KB
MD5bca7d728d907c651e17ce086fe7e56ff
SHA1b91db7b274cf33c643c33edc13ec122564d798de
SHA256f837e6522cf5992ed8c1f016c95f84948a83c891294e1aebf0688e3275d3c593
SHA51234ec6af89ebe2c3625dcfb4961df148bd57042084a252d352837663e6a1aaa097a82a7138211a73a046f3b2eea7c459faaa80b22cf9098805f46548926f3b8c3
-
Filesize
866KB
MD5c1f370ffaaea402a8c74c0987b2844dd
SHA1751f94ebcbea6a4d62bf382f18cf83156b57ba44
SHA2563ba807e13102e920b109e89933b2b7fcd0612778dad22f9fb3b0b70f680dc573
SHA51292dfac93bf8cc7f22f0043c4ee36be0e63057242584c238e6625666a24d4a38e736be1910be3eeef14ef3573154c16750bd99a9f5be933b25d757d6715c86456
-
Filesize
59KB
MD511bbe9e6529811962d78cab3d0ee1c43
SHA1f96714a4791c2f655c6abf7288474c07dd48bc84
SHA2567cb10878d4544e53ca4730ab78c244f2e46ed76a7d1329c5c0e01fef8204cca3
SHA512d6fd22a48a1f8d725d921a59ee4ddba149235a329d6ea70dde8e956c080823c38479d2702b7cba27a4c0e7fbb9d028c0e876ae2f0d2f6dced8ad8ec8e179baf8
-
Filesize
95KB
MD5ecf9598497596bde26d0ad70777d6d75
SHA15225aa0982dc031c7361b72cdeff4b7e373f983e
SHA256013836f48c6a0b07dcfba2e219d0e5e4733f6959b9c683f2c7ddf213c973b18b
SHA51226d8e83f6b215a15c87f1ea4355502964cc84c3e991c7c93b47c977b9bfaa17248d7d8a8a8122e80d0187c5b63c831fda65cd7bcf0ca2299a13a2663286183fe
-
Filesize
57KB
MD5006481206cbd4c83fa649632f7222ef1
SHA16e2a05cddac05ce304a77460c6bd7b3f890393f5
SHA25642390451e4799e041cf688fe02a9c33b6aa1b1d873f5b8c954b0ed8ba0af63a3
SHA512ee44850bc2b0390394080198be27e8b74b6ee46e6e379bb3f3f9a4ba53830ecfe955efab4b2beec341ed302a110824350071c716dee80b984d465a7d4419d69a
-
Filesize
95KB
MD54ac36f51637d82d4d2354108de385a58
SHA10c556b79cc52b6710dadcfde1044c1481d996f33
SHA2560efec48bed8c476258cfc1a5a9694d42837234134d0947a2f9c041752f7485e0
SHA512ef661c0c5457002d521c8790e37bd286344a77dea70a9ea0f7bf74a22e6f3722ad67f0546047c29166cd273c6f9415ba0dc7f68d2282ae2e4c7ebd38402afd9a
-
Filesize
99KB
MD5997016fd2fa51b13fdff955e76b66d21
SHA11190f5454bb69687440fbe9699b26bf1a7dc65de
SHA25606978fa33a74ef4c3b3d4971bbb2b8efff84dad1fe2f822dd8c3e179dd3bd880
SHA512d9ca616e7cdbc7f7376ca75a9ea1e75dd140fecacdf5744f3dd36ddb2c332d37649016e495179e0832f8545fb2579150c6664c7678cb08841f7add1148be2865
-
Filesize
78KB
MD5246993f804971aff1da64d44386bef26
SHA18d04fb03b432670ee3b207fcbc616231ec862285
SHA2560bc854aa1b688f84e401919b4c2308f31b88c24068cb64b18bc8f8531f7bcc2c
SHA5122a181d37404fff73f897164152a1076a47517beafa5fe4852544b2f826cc5e700ee5ed0a86ec89ac748a310e34e95a3c0ee8a0656bed283340e25d24346dd5f6
-
Filesize
78KB
MD5804f99fc8fef68f602b5be45a6008a88
SHA182c7298d0abf37dedb6cf5420eace6020e4b9ca2
SHA2568cb4e2b1e61169ab59989e55ebe8c8234dbc13c571b5c87ee90ea4c0dd3f04c1
SHA5129573e28719d68a50e2171f3d9eda5af01236011b16efab4e90f0597612f9dbfe35ba7f137da965a5016e19c2a31e8c68de700588062eea0dd206dae0641197ad
-
Filesize
65KB
MD506b437c07120c91c7f92ce0bc670ab1d
SHA117f58c591c6f8bcfd92e88022dbb16d14c860c18
SHA256cda405b2f101febc4d73784eb66a0fb6241a068448f1f59da50f94d6427d2491
SHA512f49a3f0c9b4e6aca1a3c07183cee4a17ae0b6deb1dd95bfd63b50c768a10243bd49a46fbac3afd626cce4cfb50f9dcc9fa3ebe287955042aab705e305f747095
-
Filesize
87KB
MD545fce45ac7ba97912a521f861fffda46
SHA1f8b2190331947ea12e4b01a575cffc336d0e1821
SHA25623dbd2c3962063f75956f209933f5bbfc5f20364e4bacc198d32b832f624a49c
SHA512099dc0f6a696c4186b046a23ef532aa893d437c59fdb820eaee085516fedf28f4123f0239708e8ebe36ee405e4fca358b6175edf5b09cde69006c16180e56031
-
Filesize
96KB
MD504cad2ab332f64c6161a3a4308db8fd7
SHA1016a65c178852632b151eb917ebf7623bb9dffc0
SHA2569c4a70cf8295104b4b13fe9f7f99af2690ae94760521055c0f492169c1377df2
SHA512bf597406dc401f26d91679ef3aa275f6fe1549a0ae5424acb6879a7b003e53c3936a3e290ccf228cc1d2aaa67fa2a8b78cccae929aaf7397d33e363df52dd243
-
Filesize
6KB
MD5ef125e0bf013c42de1651613d7ba0375
SHA18b50ccabd5f95d730b5744a2d6460afc5bf7e9c7
SHA25625ba04aa9001223300db69f53e972056137193689eb964862228707099e618ba
SHA51223d9cb80f032f61f403d4cd6090e9a4e3849ad4a1002213a9838b1dce4c12da2f7e8ee5e6a9e366527f972ef572b8341845d64d876f95164132fa4e231f8f76c
-
Filesize
85KB
MD5aa5c108559abe590bc4edf77e20e2f2d
SHA188d41d1d1dbd210226b353339e89fca3d1664fc1
SHA256bb324d7599d0862f7e788f941204d85e7b47dc921e3d38a9a48acf80fcd0d0d2
SHA512091519a9ef4bf0a08e02adf30d627c2220a2374b10880a4d7e0eea3e4f39fe293214da3ae9051aa9ad0c83c41419996f44d56b5e878f0bcb352d67a271af39ea
-
Filesize
67KB
MD59a86a061ac6f60588a603dab694901fb
SHA1542fa7abe87867d17de53c1b430f02b6baa6c97a
SHA256aefc1a30b5a9cae66fa5e1e51b0f73e7214c6b5a07d14819e9c50cadf925517e
SHA5123892e394720d527962b09b6fb03b6c3639cf8e458808d36a1c910823801e54a548690260421cef7d69e4b365fa4cd09778bc9958a20c898f70783ea53373fca8
-
Filesize
28KB
MD584e3f6bfcd653acdb026346c2e116ecc
SHA143947c2dc41318970cccef6cdde3da618af7895e
SHA25600a0c805738394dfed356aae5a33ce80d8f751c3b5d7e09293817c07fbaeb9fd
SHA512eeba8f5c0f9163bc38080ac7cfcc5babf9dfdf36b34b341416ca969b9f19cebb141f8b0d2e12e7c41d886eec36e23cf1525a7ce28785ad09154bc3db78ca0591
-
Filesize
52KB
MD55efee5d7edbe127050e3ea3d197120ab
SHA15fa5546f2890ea0298314d46ed7f0bec3819c3f6
SHA256ae4adae2962a4dfca41929164973d98217401cfa39264f3a367220e09dc87e8b
SHA5123644b60eaee9d35e9fe33db8571d0fbe19c61ced979a68098be93c3cdfaf2a82b3ef8329a015fc0644a48c19782a27864948c120744b2d01d6e0284803dcfc61
-
Filesize
1023KB
MD557db742a0233f2b6f6d148234be655cd
SHA19c05f3ce66a4ce0ddb807f62e5c0b04defd698bb
SHA256cc99828a2747b338b5633c8c9a01260000843f2d3c6281301dc14089a88b1c8a
SHA5126270174d6293aad9ee4a682ed2fadeb687453215670b94f904d894257e5e5b309fdbc390c9f8e67a0a199388e7153f09a9bf392f9d60338ce41b30fd03e4b40b