Analysis
-
max time kernel
46s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 13:19
Static task
static1
General
-
Target
! Prefabs.txt
-
Size
17KB
-
MD5
6fc06edcb562b363ae47fe9dd553b23e
-
SHA1
2bddabe7eb5851cc685ff0ce6639d6654d76380b
-
SHA256
a9f6ca54ef2bf71e056c7ad098f64aa6f558ed2827b212b0a817877a4e43466c
-
SHA512
9143645b5b11d75361fcd81865464690641bd7a26fb5a6c1bc333a3fe13fa43aa35913faa3a615bafc814325afa7dd96f2a789b2cdea0a70034f073db32416ae
-
SSDEEP
384:7iF7lV68CrBAOVVCbGV6SqZdQNCR88Tg7AlkuYiLhPxb8kwL2V:u5rOrC86SqUCfg7AlkuYiLRxbTIq
Malware Config
Signatures
-
Detects Eternity stealer 3 IoCs
resource yara_rule behavioral1/files/0x000400000001cbb6-2128.dat eternity_stealer behavioral1/memory/896-2130-0x00000000012E0000-0x00000000013C6000-memory.dmp eternity_stealer behavioral1/memory/1772-2144-0x0000000000B60000-0x0000000000C46000-memory.dmp eternity_stealer -
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Eternity family
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2580 chrome.exe 2580 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe Token: SeShutdownPrivilege 2580 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe 2580 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2580 wrote to memory of 2064 2580 chrome.exe 31 PID 2580 wrote to memory of 2064 2580 chrome.exe 31 PID 2580 wrote to memory of 2064 2580 chrome.exe 31 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 2856 2580 chrome.exe 33 PID 2580 wrote to memory of 3008 2580 chrome.exe 34 PID 2580 wrote to memory of 3008 2580 chrome.exe 34 PID 2580 wrote to memory of 3008 2580 chrome.exe 34 PID 2580 wrote to memory of 2808 2580 chrome.exe 35 PID 2580 wrote to memory of 2808 2580 chrome.exe 35 PID 2580 wrote to memory of 2808 2580 chrome.exe 35 PID 2580 wrote to memory of 2808 2580 chrome.exe 35 PID 2580 wrote to memory of 2808 2580 chrome.exe 35 PID 2580 wrote to memory of 2808 2580 chrome.exe 35 PID 2580 wrote to memory of 2808 2580 chrome.exe 35 PID 2580 wrote to memory of 2808 2580 chrome.exe 35 PID 2580 wrote to memory of 2808 2580 chrome.exe 35 PID 2580 wrote to memory of 2808 2580 chrome.exe 35 PID 2580 wrote to memory of 2808 2580 chrome.exe 35 PID 2580 wrote to memory of 2808 2580 chrome.exe 35 PID 2580 wrote to memory of 2808 2580 chrome.exe 35 PID 2580 wrote to memory of 2808 2580 chrome.exe 35 PID 2580 wrote to memory of 2808 2580 chrome.exe 35 PID 2580 wrote to memory of 2808 2580 chrome.exe 35 PID 2580 wrote to memory of 2808 2580 chrome.exe 35 PID 2580 wrote to memory of 2808 2580 chrome.exe 35 PID 2580 wrote to memory of 2808 2580 chrome.exe 35
Processes
-
C:\Windows\system32\NOTEPAD.EXEC:\Windows\system32\NOTEPAD.EXE "C:\Users\Admin\AppData\Local\Temp\! Prefabs.txt"1⤵PID:2556
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6239758,0x7fef6239768,0x7fef62397782⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1144 --field-trial-handle=1280,i,16896226335418901082,10325429800816737209,131072 /prefetch:22⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1280,i,16896226335418901082,10325429800816737209,131072 /prefetch:82⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1520 --field-trial-handle=1280,i,16896226335418901082,10325429800816737209,131072 /prefetch:82⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2304 --field-trial-handle=1280,i,16896226335418901082,10325429800816737209,131072 /prefetch:12⤵PID:2136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2324 --field-trial-handle=1280,i,16896226335418901082,10325429800816737209,131072 /prefetch:12⤵PID:764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1292 --field-trial-handle=1280,i,16896226335418901082,10325429800816737209,131072 /prefetch:22⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3192 --field-trial-handle=1280,i,16896226335418901082,10325429800816737209,131072 /prefetch:12⤵PID:608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3624 --field-trial-handle=1280,i,16896226335418901082,10325429800816737209,131072 /prefetch:82⤵PID:1960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=1584 --field-trial-handle=1280,i,16896226335418901082,10325429800816737209,131072 /prefetch:12⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 --field-trial-handle=1280,i,16896226335418901082,10325429800816737209,131072 /prefetch:82⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3740 --field-trial-handle=1280,i,16896226335418901082,10325429800816737209,131072 /prefetch:12⤵PID:828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4248 --field-trial-handle=1280,i,16896226335418901082,10325429800816737209,131072 /prefetch:12⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3864 --field-trial-handle=1280,i,16896226335418901082,10325429800816737209,131072 /prefetch:12⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2000 --field-trial-handle=1280,i,16896226335418901082,10325429800816737209,131072 /prefetch:12⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=1060 --field-trial-handle=1280,i,16896226335418901082,10325429800816737209,131072 /prefetch:12⤵PID:2864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=688 --field-trial-handle=1280,i,16896226335418901082,10325429800816737209,131072 /prefetch:12⤵PID:836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3752 --field-trial-handle=1280,i,16896226335418901082,10325429800816737209,131072 /prefetch:82⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=4280 --field-trial-handle=1280,i,16896226335418901082,10325429800816737209,131072 /prefetch:12⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4412 --field-trial-handle=1280,i,16896226335418901082,10325429800816737209,131072 /prefetch:12⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4356 --field-trial-handle=1280,i,16896226335418901082,10325429800816737209,131072 /prefetch:82⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4588 --field-trial-handle=1280,i,16896226335418901082,10325429800816737209,131072 /prefetch:82⤵PID:2600
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1908
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2600
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Troxia 1.7 Proxy\" -spe -an -ai#7zMap9300:90:7zEvent226351⤵PID:1816
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:1556
-
C:\Users\Admin\Desktop\Troxia 1.7 Proxy\Ok free Proxy 1.7\Toxia 1.7.exe"C:\Users\Admin\Desktop\Troxia 1.7 Proxy\Ok free Proxy 1.7\Toxia 1.7.exe"1⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\dcd.exe"C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""2⤵PID:2164
-
-
C:\Users\Admin\Desktop\Troxia 1.7 Proxy\Ok free Proxy 1.7\Toxia 1.7.exe"C:\Users\Admin\Desktop\Troxia 1.7 Proxy\Ok free Proxy 1.7\Toxia 1.7.exe"1⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\dcd.exe"C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""2⤵PID:1488
-
-
C:\Users\Admin\Desktop\Troxia 1.7 Proxy\Ok free Proxy 1.7\Toxia 1.7.exe"C:\Users\Admin\Desktop\Troxia 1.7 Proxy\Ok free Proxy 1.7\Toxia 1.7.exe"1⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\dcd.exe"C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""2⤵PID:780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
1KB
MD5c6150925cfea5941ddc7ff2a0a506692
SHA19e99a48a9960b14926bb7f3b02e22da2b0ab7280
SHA25628689b30e4c306aab53b027b29e36ad6dd1dcf4b953994482ca84bdc1ecac996
SHA512b3bd41385d72148e03f453e76a45fcd2111a22eff3c7f1e78e41f6744735444e058144ed68af88654ee62b0f117949f35739daad6ad765b8cde1cff92ed2d00c
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD594f5fbf857a37c239adcc7729cdcc44a
SHA17ac8ac59b1e0251c9afd2a78e0fcea1a990dd7f0
SHA256d41a5ae65771637c4c38c1887bd5ef6bb11eb92715daff270a08a4be5f4c2e02
SHA5125aca9f6dd3cab5435ecadbe68c868cc8172bcbf9f165e113f16c5ddcb24f34b0ced4f003cd702b1c61f3125d124e0f452a496b594012e487cc7cea2bed48230c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ed69e12c612411fb1489ee171cdfad02
SHA1c7db8f8483d6ca6ad86861ee39962070787245e4
SHA256ac3c8178d2ff99869fd2ee4d505a3e04d33b3194cc6d8f642e26581f04c2e439
SHA5122ccebddc1427a9fa09473ce7354a79366680419986e16d6ad54956257e701e3672b6f25cb9d2e8c5d748e4941a947fa7580c57a4f31fbabfd1e82e8823440f38
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD595671da43afd5576d95067f031c368ae
SHA1864883505bc281e708e8561c3ecb3586ea35d4c5
SHA2562d33d2cce0ef7be391032c11754a03436baddb1da20076cca0682b7c5380ac3f
SHA512c3f7f7458ea006ee78ba540375b3bedcd85bf15c377c768dbfdf937f19187ab447d20b6c3a07f9103a4a428df05de4598e983d17da6cd08c5b4b95efaa17d4d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d14dfb7f1be43994090901a2655a4a84
SHA1b3766cbc029047b1d421d07ecfc86280debdeac2
SHA2569a6ce4879f15811760673c855e22508323a8928378c9f248b6d0b1f7487421f9
SHA51246ea7201069e819046cdde93d06cf514a198b8d573afad60e24e808f4b72e66cc395829c3479a32cc95699ebdd9ce9dba2f1169a53a728092e4c8eedb51c0038
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD594939043b5e4fc30b5eba636d9379adb
SHA169e784598eea2153e8de1062f7ce8c73fd57a5d7
SHA256f632d60d71a1fbc708e9516db9e7dbf21ce47622e7ec7a42140f939ae6c1051e
SHA5128b777a3adb42fc665ae4903941bcfb89017868ddbf18190ff6806cd25024bb336271054c9bc0c12b5930353b3c7914cdbae34e479a311fec8ffa711d3f3311de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5850007f068d0af3b4648ab0e35b49354
SHA1051d889c92ab7ae64c5c75076013a5c3904eb16a
SHA2564c96564294df44368654efae43154cd4223d8d35cc549bc8de4793ed504e22d4
SHA512d0fb6a9ee7377768f7c5b88e4d9e337084daeac2dcf6a1fc047bca9a0d5f8542c5adf281052b6c719415071ea95b2a1365dc4037c278e823571d9c19018fe90c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5112eaa977653f661c672116d64a1bac8
SHA1eb408a97365f2cfa9147517d86fa3f792e2f7d84
SHA256eb52bc2580eb942bb5b04ee7a7eef758d8ab315ccde9bac9736781f16dc8888f
SHA512f2e45caad37e2bdb9226e39b8f6071e43d416a401c77054a97d513e8f41bbb4b7a3fbb59615f45ed57836dc1470c205b89d43e0cf8c87fb96c5e515287c6ae2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD530702e41da9cc732bb4310d49d484e03
SHA17da509863a82a3031b625e56588b29af6cad6baf
SHA25605917d0c63a0cbae0ef3dd60bf210a878a4b9ee6f40074c2fbae118387785caf
SHA5126cfba8459b35ad0a885a2b8f8461267a738ce7be1edd3e2666d6579458f4170080fe88df072b919b5f51d4f4b3469de5014e2bc334d70d18b6a62009fea5ed9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ced1b38074dfc5deafc9956e3c69116b
SHA1d2da28a786b697b9a66b1609a4c362e165d2751c
SHA256e06f4f4b98dced52e93d0de4ec784e4dd94d9f3f89fa7bbc1ad384ce156ca9a3
SHA51254c87b8c933d03ddfd5ec590f89e7c1a9b214cd84cb49b7b756402de2605d72dc7a9757754b02fb7d5829006483136f9bb8d98b3b149d7c5be20e58ef35955a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58395d7fd1fbd3a45b85c090f96a835f1
SHA13f5e58096984bdebbba5c003cfa166c423f22f37
SHA256e5fa990fbb982dbf69fb08721f263ed5114c3ff4cb3b65b1f35d69cb2421c410
SHA512a5e3c168efff27999859304d6953bd75479ab37f92d0a1f1fab94e9551e0417c0808558677286f80d68ff73664e7cb6b8e9fe4f942e6f5127a51796d13ac6ace
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD570559e1e5d5b891226deeffcaa1b6b7f
SHA1227d09f55936ed1c955af96b2e2ef0e88d0cb459
SHA256d2ad47298850b8d2263988f55990d50ffe6110058ffa9923daae3f6ae4015b20
SHA512d425f4046d574f058aee27c679fa6a9b0f5520044b25d2e5dc3947fd8f359e7d7b367e2d8bb56d5c3103d7f34ad58cb90cc106cc40a7eb430f21f3506fe4d454
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543db0d065a7db6b750a4411403940509
SHA1f0f00588c8f3cdf4330beb45aeba5e1dc0bf1b68
SHA2568352bd0f9101f8deef64acbe1a4e820efd666b0eea278f02140d9ae9e995ba47
SHA51216d93f04575388732dc2f8151b0b96de212b64f4e446378d7ef2b0363daa65e9cc0953d6b6bd666b12f97cc5d76f1a7347cdab559b55f10555dc2a1d58928653
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e9fc0a5f90945b901a8fe09d6b517c6f
SHA15527e33e7f1328cdd2bbff479a339a7524dc806a
SHA2562ad0a705ba4c5ded5e87336523b2d512fd4a1548e5091da7faa96daf32cd6a4c
SHA5121a979b1e87b5529929cc60b3a598885e4c36e37d46aa2afc250d59794d125c65737e73f7fd77c26b421744358e8a2f2b48745c423cdfb453d69c056e9fd4be54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57b4266d0e0561a1e907d25e006a5e3a6
SHA1893a8305a008246a8eb386725a032a04b7463481
SHA2563ebb4a5034047799a56242caa56a1250946780985b985ed0ac20a989caf3ebcc
SHA512e4587bd8abc88671e8d4b2c3687ff3b6d6f91abc1ced68af49f2b262701941533204e2676744084c6f4e57dac7e343470c7a8e4d59230174e17ea7f5b44856b0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e56de7f12a75b9d8153fb6f01c75a67e
SHA11612866af7698cbad0321bbf259fca13dd9948e0
SHA256f7bf4470757a6bd95acd99a544a97435f4471bc97709f9637ba88d21fc1cc1bf
SHA512cf68846b279a87c06f5398bb5e3513d85d19fd6841db70e710cccf194cc52af1a22d418514d7d94c0dd7deea6aa65255b6589cecf1a7f3a46852e9bd96a1b010
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51cf2bfa8ad347f0c079110e7f81270ba
SHA1140d3f92a521f196d2e660469871f22406154c7f
SHA2561276be17ef5991a88d97c035c3610a99bd86f020b5caf4730805e7b8d79b7df4
SHA51274dce00e329659fa5450f80d0a3ce251c96d05c992f7e4ff045f4fc9669b40b81fcf02aa353e74eca1c26d6a7ac5b57a87c8189686a8c022ab1d8d4af1e5cd9c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DABA17F5E36CBE65640DD2FE24F104E7
Filesize276B
MD5d37bfd4a8bd97612183808c01d42b3ae
SHA15b283c233d030536e33f12edfc8c4ba1d5d74740
SHA256af875b78d22042d1dc73e2685eebb1ca71c135e87bf533db1616f639320e2a79
SHA512b6efad33e780b07ab823a3f307898c08dfe9b520270ba17e75d837fa26c0ac85d682afbda8f5a7dd6ff38cf18a0432f3f3da8b8b26e17fa15619a4752571d1f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD501057961da03f5c3d92ca049b669eab9
SHA1e2f2a53fd73363e34f3616732772c465495144a1
SHA256b2a0d359b9626546979ea1c35d4761f5945dc57e52944dc4c944714edd4057f9
SHA5128ace2efed85bec841e53a17a92736b99a848b910a70c503eeee2ceceb8515ddab38b4ca2a945e9bea29d66f7cf76b0c5c9584904393aa3d9eb3e98208da99d6d
-
Filesize
355KB
MD52df39aad4b3be84f3bee6dd89e41e105
SHA133e727146e784f2f766bc586454eadb99507fb05
SHA2567f89c9f64bd592f1ed986b5e2b7b19d63441121f9055d7554e4b0a9f80ddca2f
SHA5124e7b6bdea6fb7d9494558b7134604603f673b4aac4f456cf17caf7fa20dbf8a1cb04ea075b2c3c4db2abfe13b380dfa8ea8171c8e2424c79868eed855c5e0605
-
Filesize
575KB
MD56585b809ed7e19c3e6a7309b0133d767
SHA173c1eaec0a1c8a43d6fc945ddd26b567216f11a8
SHA256644af56554e242f5817e4432db93679342a784549ca1e0d7a6e63ca7576f8a2e
SHA512ca6ae63ff033bb33dfdb2e9be89910cd7372a7686ed06414aab6680032ef9b5f4980d99db2e7502fc2f94dc279eb19ff863e08c803ccb7cf9e1498afd6a4b56c
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_modsfire.com_0.indexeddb.leveldb\CURRENT~RFf7762e8.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
1KB
MD54783507ef09cf03cd2626e6179654cc3
SHA18797caf835ee21f4d2a655f00bd76ceeffb82217
SHA2565cbbbe7e2e2375f1926ee55822500b7bf030feebacd85305253b53466a0818e1
SHA5126b3e7458ace90a9189f4a3999ef9800a79a9cfc43877b9ae214245061f0a1eddda334bdeddebc0706bbaf396805a88f1e1713ca238a3874dda490c5e997c67ac
-
Filesize
363B
MD5e2da810f7f599c3fe26b93c68f42b489
SHA1d7c0a7ff36f1ec57fac5fb8ffbdea4f5434948bc
SHA256b4c92c88a275b0787efebf1d09f44cda0cc1844e34deeeabcc70bc814a18e489
SHA512210977230309b737170f04dae399b2f4b0b3637e63ad0abf8735c18ee1e5c148dc25664fdf17318a5a238bac031192434fcbdf8fd6880fd313f88628795253bf
-
Filesize
6KB
MD5f1816242b4477076104451b35e086cc2
SHA15480167e053db9d93d23ec056c7dff06370c74b3
SHA2564b2c1afe661e4214fe9dedde3a278480332eb55c16dbb9a58899e6addfc5ba57
SHA51292ee22754bbfff85b29fc0f4f2e033777d7a1c8868815ce2890ad11443c21f61ff5868a6d00a7210f05c38758cc3bab7813453af85a3518b6de6b8610cd10a8c
-
Filesize
5KB
MD5417456db8ab22b573363d8bb2a83fdb8
SHA1766a550d85418b5330269471d5fd416bde3d3a27
SHA25650a11c48db094fdf91e076623e8b21aa8f2daf32668743725056b359e158515c
SHA5128b267af2591f955dfb4868ea18feef0b364df8602c18cf8ee83443290b01be200eec361eed833008d2c1fc5bc31ee2023b82c839e2a326c596a04d940d4e060b
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\cb0e754d-1928-4bd2-b18a-742db24673cb.tmp
Filesize6KB
MD57a5ba48432fd2e73b89d6575b8491d4c
SHA1cbf90ea7a0c22e907002149108c4f03f9628d551
SHA256dbdd0626b8b790d2d01ec1788803e958eff38e9431f242f7926349a2c9a45a88
SHA512e7647202910fd15450ceb26971f02cb28eb63428f448aaaa5380be7b12538d7bb9352600c9fc642d6516000cf8d218146ecaa4c6e9a5145467ec65994d8ef8a3
-
Filesize
355KB
MD511e0eb5879ae869eeceff84fb0d43cac
SHA1ab033eb248a9981b5ca0b0a3426ceecc308c225c
SHA2560abe9ad04b3f449bfd639d2aae73d1c8e475c515ffd6a830c6557a5d7498c387
SHA5120a57fe0620fdb042a5b7f900e183ac3140462474be3d35bf702a82b6878d44dd4d0c93ff379728599e24cce91bf0ce2dbe3781dd548974c65fca4a3ce08bdb82
-
Filesize
355KB
MD5a47a36af951c2698cc60ef7350b285aa
SHA19e9bb823765e256ef18828671ceb6def97dc4375
SHA2569d48601c94fee67aa44c98c48218fc7fa54989ba73e62656fb850ce41cd38eb3
SHA512adc334a1d9aa4ac53b46edf2f84c0574ce528c05c18c4cba25b2de7c3dc59a61dc6e30c223454ec7b09fae8fa4a583fafc21dc1c845e741b38e3ded52d01aee0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
227KB
MD5b5ac46e446cead89892628f30a253a06
SHA1f4ad1044a7f77a1b02155c3a355a1bb4177076ca
SHA256def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669
SHA512bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87
-
Filesize
889KB
MD506cb919cf24126eb6e62136dae4b002e
SHA15cbf75c2b84f4cd11061a936a9ac211ff08b338c
SHA2563ec4d444c1f2cf56fa61147e55de2dcd71f048fa87719b8bb44354260e1ac673
SHA51202c8bbd8a68fb203bf9444b56834d9049b91e2f74c80945a4ebf3c405924e9943f6c34787cc93656f2bd30343b6febbc7f75bcf69d38663d320ef60f8ff471e7