Analysis
-
max time kernel
66s -
max time network
67s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2025, 18:08
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/file/9loe4v9lx5zi0qp/Discord-image-logger.zip/file
Resource
win10v2004-20250217-en
General
-
Target
https://www.mediafire.com/file/9loe4v9lx5zi0qp/Discord-image-logger.zip/file
Malware Config
Extracted
mercurialgrabber
https://dcwh.my/post?uniqueid=7b57f570
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Mercurialgrabber family
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions output.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools output.exe -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion output.exe -
Executes dropped EXE 1 IoCs
pid Process 1956 output.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 189 ip4.seeip.org 195 ip-api.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum output.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 output.exe -
Checks SCSI registry key(s) 3 TTPs 1 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S output.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 output.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString output.exe -
Enumerates system info in registry 2 TTPs 7 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation output.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer output.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName output.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 output.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 3448 msedge.exe 3448 msedge.exe 4544 identity_helper.exe 4544 identity_helper.exe 5716 msedge.exe 5716 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 5620 7zG.exe Token: 35 5620 7zG.exe Token: SeSecurityPrivilege 5620 7zG.exe Token: SeSecurityPrivilege 5620 7zG.exe Token: SeDebugPrivilege 1956 output.exe -
Suspicious use of FindShellTrayWindow 43 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 5620 7zG.exe 1776 NOTEPAD.EXE -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe 3448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3448 wrote to memory of 2456 3448 msedge.exe 84 PID 3448 wrote to memory of 2456 3448 msedge.exe 84 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 3116 3448 msedge.exe 86 PID 3448 wrote to memory of 5040 3448 msedge.exe 87 PID 3448 wrote to memory of 5040 3448 msedge.exe 87 PID 3448 wrote to memory of 3252 3448 msedge.exe 88 PID 3448 wrote to memory of 3252 3448 msedge.exe 88 PID 3448 wrote to memory of 3252 3448 msedge.exe 88 PID 3448 wrote to memory of 3252 3448 msedge.exe 88 PID 3448 wrote to memory of 3252 3448 msedge.exe 88 PID 3448 wrote to memory of 3252 3448 msedge.exe 88 PID 3448 wrote to memory of 3252 3448 msedge.exe 88 PID 3448 wrote to memory of 3252 3448 msedge.exe 88 PID 3448 wrote to memory of 3252 3448 msedge.exe 88 PID 3448 wrote to memory of 3252 3448 msedge.exe 88 PID 3448 wrote to memory of 3252 3448 msedge.exe 88 PID 3448 wrote to memory of 3252 3448 msedge.exe 88 PID 3448 wrote to memory of 3252 3448 msedge.exe 88 PID 3448 wrote to memory of 3252 3448 msedge.exe 88 PID 3448 wrote to memory of 3252 3448 msedge.exe 88 PID 3448 wrote to memory of 3252 3448 msedge.exe 88 PID 3448 wrote to memory of 3252 3448 msedge.exe 88 PID 3448 wrote to memory of 3252 3448 msedge.exe 88 PID 3448 wrote to memory of 3252 3448 msedge.exe 88 PID 3448 wrote to memory of 3252 3448 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://www.mediafire.com/file/9loe4v9lx5zi0qp/Discord-image-logger.zip/file1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa400146f8,0x7ffa40014708,0x7ffa400147182⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:5176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 /prefetch:82⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4688 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:5704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5496 /prefetch:82⤵PID:6080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6372 /prefetch:12⤵PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4056 /prefetch:12⤵PID:5284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6504 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6380 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6780 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7694031037282333022,11490949912969313045,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6964 /prefetch:12⤵PID:1852
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4936
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5296
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1116
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Discord-image-logger\" -spe -an -ai#7zMap20765:102:7zEvent14291⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5620
-
C:\Users\Admin\Downloads\Discord-image-logger\output.exe"C:\Users\Admin\Downloads\Discord-image-logger\output.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Discord-image-logger\tutorial.txt1⤵PID:2184
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Discord-image-logger\LICENSE.txt1⤵
- Suspicious use of FindShellTrayWindow
PID:1776
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD539c51e5592e99966d676c729e840107b
SHA1e2dd9be0ffe54508a904d314b3cf0782a9a508b7
SHA25629f29a3495976b65de3df2d537628d260bc005da5956b262ff35e9f61d3d9ed3
SHA512b20532d0131b12603410c3cb425cb5df0ddc740f34e688455eff757802ffc854be771b30c3ff196e56b396c6fe53928a1577c8330b00f3f7b849fcf625e51bf4
-
Filesize
152B
MD539e376ee2f541e6b1ed0bca701e8fb59
SHA1bfe3cc2eed8721339d433533aef6e18e0a13a9a3
SHA25680eda1e4d8c05e257ff17ef734d606e67d8ab70b3e351430b2b231631eed5e04
SHA512a3f082c32857db0e3dec24394a259fff85e21b6a7b057ef55933504c23ec38cbb3237eb519d38385fc53cbc584c52aaf66291f44231245d9afee509a108a3350
-
Filesize
214KB
MD5d20fef07db1e8a9290802e00d1d65064
SHA171befda9256ed5b8cd8889f0eeab41c50d66e64e
SHA256f9cb4624d03224bfce50c4c0e484418acd462c249f38b4684e72b27a1f30144d
SHA512ad5b2c8df60027c6dd5104bb8c2357b04eb24d69245c607ff99a6f2a887f929428252ad793d9aaa8c903c7b1e1bf9653cd35f79747d5281e7e3d2c21fa828537
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5a2f2c5986228390b3c091a56d311fefb
SHA1c1f6ac6fcc06be62233a6933b5e3ff561f47c055
SHA25682804b7d8b5ae91b3a4f26a5dcb99c0143af6ac08dc509a78f58ee5579279b72
SHA512864f3fe664b713e49a7e4ffe92aa619cf2c949587bce48ca40cdfa5638d60f8c90db77767545f6a6c0ac7225de949465e1720ae713d1208497f793fc630496a1
-
Filesize
8KB
MD5a7c3f49586ac2a63654568884299425d
SHA1f0a0c30d6a4d32a924e36ee00c239e8904aeb20d
SHA2565107f329b0733f3f3f86d5526e943d968e07f5c037325b1aa455e7b21577a051
SHA51270b259329102dcc0f3a282077c38cb7767f388c069e5796b236ef5c779ab9315c1d0a6cf46274bdab7f7df2be040270b874f63c403b141b433ee6f0fdda135fe
-
Filesize
8KB
MD536c36993ad9a6862a868b52a4acb4d35
SHA16c22dc58a5b50f11cbd4d2ee2f543ce40284699a
SHA2561badd8ba7f861cb6846c1104da17ac979cbb6125fd42fa63eac40362aedfbf24
SHA5129dac1633df9132e39bda650b537b19337cd0cd0069317a978efd53bccb4da25eccf9e5b34c14811e956eda67c6f728226f164ec2adc5f385d6395a2ebb945cf6
-
Filesize
5KB
MD5fe8c14704f2b9262c4b8cabe8f4c0d60
SHA1c7ab01c38ab0ddee89bd2e81bc270ca6199129bd
SHA2564f4459f9a5c42354a44ffe8948459fbae2e58447cd1df58d6cbf223af6b08869
SHA512da6acf8c337992dc8d29a28f10f147677b0b1554f44cae9e1fb5999bef3dcda8ea2f127aaa933ad013ae0ecf8bc726c70fb2d5099fc81d3efedb597ae73d3d76
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5784ab146c95aaa4103f73ea25ef89e6f
SHA18575060a2271089cdd920cde22f87ce2dc01fb2a
SHA256ae7c0f35992a7509aa1ba442afa34dc178ca2a013a64afdc78d56747bf1ee776
SHA5121febf8069c94ca542ccec80bbaa9214d9ec11ef31d65bd505f9e7c72a153604fbe84dff82b5c96f5469a7d1cd5843fa4a4b74553181495a1b4fe10dbdad962fd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe582b12.TMP
Filesize48B
MD54194b838dcae12141bef50f22253da20
SHA16e7de05d02fd7bcb3ef7d4294756d8a6b9443c9e
SHA25641b971c86373ec9808f4c92628e6247e54d0498443d1f5aa27b6a109045c53cf
SHA512abe68e6ec5641fa1a247c48748e7082d54bcefe44542c13a1adb8b42fee713cc76a010ace42cab8aa5ab9879f7582fba5e4682cfa72b686ea50abcddceb54721
-
Filesize
1KB
MD5296701983b4d5714dfdffc80090de8e3
SHA10efce66ee0b04e07b49854bb06cb6a54684b199d
SHA256dccbf23053cd5a2f4bd41053218bd3471914c4e82ddb0784fd11a6e178fc90b6
SHA5125693cde2740149f1d449c237f73dbdc54199d1abfb2a6aaf9f52acb033a19a08994c14cd1cd7f47b1db038f00abbc636d075810f80bdbe316265d20073495f40
-
Filesize
1KB
MD572851d6f290efe2be19b2f73d873a3d1
SHA17de43b1a330a896512bfd6c677606f89d8e3f589
SHA25684c9e802be36feab35532d414a9aa5b833bf3764dbf2c5ea4d9312f8822d6cfb
SHA512a2b0d59f1e47cd8462af7656806742c8f6c3eace07803da275db204a05f0f4f3da4bfc792b97be7608df247eb079997f5b7147f904232bc4a0c6360d23ef4e36
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5d536b2b469afe0c29b76872b0872087a
SHA1093e40aafa8bfca751b1a85fb7639d4168393797
SHA2562c808e589d778a4eb1d35b524650c278d4d36334aca83455beb232243ba94114
SHA5128e8f3476f0e562819cbb23565b81c54a0ab37cf9336c534db309267f6edd8913981f4de4186fabe31921515ea376d7eb326f7385963d65548bdb5c02a7fa7d72
-
Filesize
11KB
MD5630addbfb38bdd069e6dc82ed4c281a0
SHA15d687158e394392eb2752c8149de3c7d0c3c02d5
SHA2567f8508036103f5f97396124f0a8495181da3b633afd613f23d5b2673fc841545
SHA5120275381f274ca3f0cbe2b5fcb321d0031d8b6ecdfae6edfd3e72e32e7e016a19245485e36c81fa9ab241f607f120ccc9b71d43aa6a242d52e3d9b7415a8828c3
-
Filesize
23KB
MD50a300eead5c92c4499a2c3ae15c01b8e
SHA15f5343e4a65fd391a02238ddaa84ee0348dc8aab
SHA256138b3330c28bc569bffeeb110199f5d74a36acd88d4083cf1d800e8ba44ce544
SHA512c2b23043acb8bc34e01ae7cc6d488f65f69cdf37257e9c41ddaeab71951b98cc20cfdf0dc644c50d33375c15cbe73fd1bb77c44cac3e0d4fde310efaa34184f5
-
Filesize
11KB
MD52b42edef8fa55315f34f2370b4715ca9
SHA158853eb8199b5afe72a73a25fd8cf8c94285174b
SHA25643070e2d4e532684de521b885f385d0841030efa2b1a20bafb76133a5e1379c1
SHA51242edf58252a01b5858e6cc3c5a1a29bbcdf1295351b6a4383883a189499ec3c1a64cd5f2f6498a9385e85af21732c65afa866a8371afb4bf843f4e8bd38a7a73
-
Filesize
41KB
MD598a87217adbe6adf17a081b6d8decfcb
SHA14acb7591160456700369cab9c08e33c32a68fa18
SHA256658707c46d59a9fa66381766f47dd37f47895a4ac6bb1d16536bd62433148892
SHA512c1eb5502ffd61bdf0e340b634c8071394ff6b7d2580baebcda8ab94e0102790a1b633d6334286131ae9933321bba24737aceafc3fd7c72a54a893a06b8583e94
-
Filesize
187B
MD50304f31948156aee5319509e349d1b8d
SHA1fd358d34599d27922944f04813720598a3032cbd
SHA2561c90177fc706ce8234309d41212daabc26b15283ff1d90f314aca979754aad2c
SHA5125218a3d129400b24a8e8c2569b971bb9321905173eaf1b5781ee01fefdaf47d49197da74b129f5e80abcbc8d92c98b1605b15a3bd056a7b329bc122ff66f2427