analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
File name:

Balance remittance advice.exe

Full analysis: https://app.any.run/tasks/1fd7ed51-ff80-46f1-9971-07b991481afa
Verdict: Malicious activity
Threats:

Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold.

Analysis date: December 06, 2022, 06:20:18
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
agenttesla
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

D19B22DF7EB03F1BE9F2359742386587

SHA1:

D32947941833558EC0D5D1B2E83CA853B9500363

SHA256:

AE91D68A41E56272D651D94AC67588C7C7FD558B766AF81036D141068C560587

SSDEEP:

24576:V+D7sqlKxlJ7I6Et48rQA1oaZOCOJ9PL7pRbH25Ykuw+mi:QD7sdToCrkOCOJtL7pRbH21Ji

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Steals credentials from Web Browsers

      • Balance remittance advice.exe (PID: 2272)
    • AGENTTESLA detected by memory dumps

      • Balance remittance advice.exe (PID: 2272)
  • SUSPICIOUS

    • Application launched itself

      • Balance remittance advice.exe (PID: 1844)
    • Reads the Internet Settings

      • Balance remittance advice.exe (PID: 2272)
    • Reads settings of System Certificates

      • Balance remittance advice.exe (PID: 2272)
  • INFO

    • Reads the computer name

      • Balance remittance advice.exe (PID: 1844)
      • Balance remittance advice.exe (PID: 2272)
    • Reads Environment values

      • Balance remittance advice.exe (PID: 2272)
    • Checks supported languages

      • Balance remittance advice.exe (PID: 1844)
      • Balance remittance advice.exe (PID: 2272)
    • Process looks inside Credentials folder

      • Balance remittance advice.exe (PID: 2272)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

AgentTesla

(PID) Process(2272) Balance remittance advice.exe
Protocolsmtp
PasswordmQqt$sHJba83
Port587
Strings (792)
:
<b>[
</b>
<b>]</b> (
)
False
{BACK}
{ALT+TAB}
{ALT+F4}
{TAB}
{ESC}
{Win}
{CAPSLOCK}
&uarr;
&darr;
&larr;
&rarr;
{DEL}
{END}
{HOME}
{Insert}
{NumLock}
{PageDown}
{PageUp}
{ENTER}
{F1}
{F2}
{F3}
{F4}
{F5}
{F6}
{F7}
{F8}
{F9}
{F10}
{F11}
{F12}
control
{CTRL}
&
&amp;
<
&lt;
>
&gt;
"
&quot;
Copied Text:
The binary key cannot have an odd number of digits: {0}
Index must be from {0} to {1}.
:Zone.Identifier
SystemDrive
\
WScript.Shell
RegRead
ObjectLength
ChainingModeGCM
AuthTagLength
ChainingMode
KeyDataBlob
AES
Microsoft Primitive Provider
CONNECTION
KEEP-ALIVE
PROXY-AUTHENTICATE
PROXY-AUTHORIZATION
TE
TRAILER
TRANSFER-ENCODING
UPGRADE
g
401
502
500
-
Windows RDP
credential
policy
blob
rdg
chrome
{{{0}}}
Length
CopyTo
ComputeHash
sha512
Copy
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0
20
/
%discordapi%
yyyy-MM-dd HH:mm:ss
yyyy_MM_dd_HH_mm_ss
<br>
<hr>
https://api.ipify.org
mail.siliconsafepack.com
mQqt$sHJba83
appdata
tCeln
tCeln.exe
http://yqaoqZ.com
\ofX
2025-11-21
yyyy-MM-dd
Subtract
Days
Software\Microsoft\Windows\CurrentVersion\Run
\drivers\etc\hosts
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
SC
SC_
_
.jpeg
Screenshot
image/jpeg
/log.tmp
KL
KL_
.html
<html>
</html>
Log
text/html
[
]
,
URL:
Username:
Password:
Application:
PW
PW_
CO
CO_
.zip
Cookie
application/zip
-f
\Data\Tor\torrc
p=
127.0.0.1
POST
+
%2B
application/x-www-form-urlencoded
image/jpg
STOR
Add
chat_id
caption
yyyy-MM-dd HH-mm-ss
.jpg
sendDocument
document
html
jpg
zip
---------------------------
x
--
multipart/form-data; boundary=
Content-Disposition: form-data; name="{0}" {1}
Content-Disposition: form-data; name="{0}"; filename="{1}" Content-Type: {2}
--
Time:
MM/dd/yyyy HH:mm:ss
User Name:
Computer Name:
OSFullName:
CPU:
RAM:
IP Address:
New
Recovered!
User Name
OSFullName
None
win32_processor
processorID
1f46b319-063b-4cbf-8645-96bf73e754ac
Win32_NetworkAdapterConfiguration
IPEnabled
MacAddress
:
0dfa66e4-8f80-4f3e-96e4-60c733d4df21
WinMgmts:
InstancesOf
Win32_BaseBoard
SerialNumber
137b6dd9-3b84-4278-ab68-98feecc6ca8b
x2
Tor
AUTHENTICATE "NpXAkhmRlj"
SIGNAL NEWNYM
250
tor
StartInfo
FileName
\Tor\tor.exe
Arguments
UseShellExecute
RedirectStandardOutput
CreateNoWindow
Start
StandardOutput
ReadLine
Contains
Bootstrapped 100%
EndOfStream
Id
AvoidDiskWrites 1 Log notice stdout DormantCanceledByStartup 1 ControlPort 9051 CookieAuthentication 1 runasdaemon 1 ExtORPort auto hashedcontrolpassword %hash% DataDirectory %tordir%\Data\Tor GeoIPFile %tordir%\Data\Tor\geoip GeoIPv6File %tordir%\Data\Tor\geoip6
\tor.zip
%tordir%
%hash%
NpXAkhmRlj
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
https://www.theonionrouter.com/dist.torproject.org/torbrowser/
<a.+?href\s*=\s*(["'])(?<href>.+?)\1[^>]*>
href
Replace
TrimStart
.
TrimEnd
tor-win32-
GetBytes
TransformBlock
TransformFinalBlock
Hash
16:
filename
fileformat
file
username
content
----------{0:N}
--{0} Content-Disposition: form-data; name="{1}"; filename="{2}" Content-Type: {3}
application/octet-stream
--{0} Content-Disposition: form-data; name="{1}" {2}
GET
OK
\tmpG
.tmp
SELECT * FROM Win32_Processor
Name
MB
Unknown
Wr
W
C
ExtractFile
n
http://127.0.0.1:
HTTP/1.1
Hostname
Port
200 Connection established Proxy-Agent: HToS5x
Connect
Host
PathAndQuery
Fragment
Host:
{0}
Key
Mode
IV
Padding
CreateDecryptor
SEQUENCE {
{0:X2}
INTEGER
OCTETSTRING
OBJECTIDENTIFIER
}
sha256
Cookies
Opera
Opera Software\Opera Stable
Comodo Dragon
Comodo\Dragon\User Data
Chrome
\Google\Chrome\User Data
360 Browser
\360Chrome\Chrome\User Data
Yandex
Yandex\YandexBrowser\User Data
SRWare Iron
Chromium\User Data
Torch Browser
Torch\User Data
Brave Browser
BraveSoftware\Brave-Browser\User Data
Iridium Browser
\Iridium\User Data
CoolNovo
MapleStudio\ChromePlus\User Data
7Star
7Star\7Star\User Data
Epic Privacy Browser
Epic Privacy Browser\User Data
Amigo
Amigo\User Data
CentBrowser
CentBrowser\User Data
CocCoc
CocCoc\Browser\User Data
Chedot
Chedot\User Data
Elements Browser
Elements Browser\User Data
Kometa
Kometa\User Data
Sleipnir 6
Fenrir Inc\Sleipnir5\setting\modules\ChromiumViewer
Citrio
CatalinaGroup\Citrio\User Data
Coowon
Coowon\Coowon\User Data
Liebao Browser
liebao\User Data
QIP Surf
QIP Surf\User Data
QQ Browser
Tencent\QQBrowser\User Data
UC Browser
UCBrowser\
Orbitum
Orbitum\User Data
Sputnik
Sputnik\Sputnik\User Data
uCozMedia
uCozMedia\Uran\User Data
Vivaldi
Vivaldi\User Data
cookies.sqlite
Firefox
APPDATA
\Mozilla\Firefox\
IceCat
\Mozilla\icecat\
PaleMoon
\Moonchild Productions\Pale Moon\
SeaMonkey
\Mozilla\SeaMonkey\
Flock
\Flock\Browser\
K-Meleon
\K-Meleon\
Postbox
\Postbox\
Thunderbird
\Thunderbird\
IceDragon
\Comodo\IceDragon\
WaterFox
\Waterfox\
BlackHawk
\NETGATE Technologies\BlackHawk\
CyberFox
\8pecxstudios\Cyberfox\
Path=([A-z0-9\/\.\-]+)
profiles.ini
\Default\
Profile
origin_url
username_value
password_value
v10
v11
Opera Stable
\Local State
"encrypted_key":"(.*?)"
\Default\Login Data
\Login Data
Opera Browser
Yandex Browser
Iridium\User Data
Chromium
Cool Novo
Brave
360Chrome\Chrome\User Data
Uran
Epic Privacy
Coccoc
\Google\Chrome\User Data\
logins
Major
Minor
2F1A6504-0641-44CF-8BB5-3612D865F2E5
Windows Secure Note
3CCD5499-87A8-4B10-A215-608888DD3B55
Windows Web Password Credential
154E23D0-C644-4E6F-8CE6-5069272F999F
Windows Credential Picker Protector
4BF4C442-9B8A-41A0-B380-DD4A704DDB28
Web Credentials
77BC582B-F0A6-4E15-4E80-61736B6F3B29
Windows Credentials
E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
Windows Domain Certificate Credential
3E0E35BE-1B77-43E7-B873-AED901B6275B
Windows Domain Password Credential
3C886FF3-2669-4AA2-A8FB-3F6759A77548
Windows Extended Credential
00000000-0000-0000-0000-000000000000
SchemaId
pResourceElement
pIdentityElement
pPackageSid
pAuthenticatorElement
IE/Edge
\Common Files\Apple\Apple Application Support\plutil.exe
\Apple Computer\Preferences\keychain.plist
*
Login Data
journal
wow_logins
\Microsoft\Edge\User Data
Edge Chromium
\Microsoft\Credentials\
\Microsoft\Protect\
GuidMasterKey
\Default\EncryptedStorage
\EncryptedStorage
entries
category
Password
str3
str2
blob0
PopPassword
SmtpPassword
Software\IncrediMail\Identities\
\Accounts_New
EmailAddress
SmtpServer
incredimail
HKEY_CURRENT_USER\Software\Qualcomm\Eudora\CommandLine
current
Settings
SavePasswordText
ReturnAddress
Eudora
\falkon\profiles\
startProfile="([A-z0-9\/\.]+)"
\browsedata.db
autofill
Falkon Browser
startProfile=([A-z0-9\/\.]+)
Backend=([A-z0-9\/\.-]+)
\settings.ini
\Claws-mail
\clawsrc
passkey0
master_passphrase_salt=(.+)
master_passphrase_pbkdf2_rounds=(.+)
use_master_passphrase=(.+)
\accountrc
smtp_server
address
account
\passwordstorerc
{(.*),(.*)}(.*)
ClawsMail
signons3.txt
---
.
objects
Data
DecryptTripleDes
Flock Browser
ALLUSERSPROFILE
\\
DynDNS\Updater\config.dyndns
username=
=
password=
&H
t6KzXhCh
http://DynDns.com
DynDNS
name
jid
password
Psi/Psi+
Software\OpenVPN-GUI\configs
Software\OpenVPN-GUI\configs\
auth-data
entropy
Open VPN
\FileZilla\recentservers.xml
<Server>
<Host>
</Host>
<Port>
</Port>
<User>
</User>
<Pass encoding="base64">
</Pass>
<Pass>
FileZilla
SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
HostName
UserName
PublicKeyFile
PortNumber
22
[PRIVATE KEY LOCATION: "{0}"]
WinSCP
IP=
port=
user=
pass=
FlashFXP
SOFTWARE\FTPWare\COREFTP\Sites
CoreFTP
User
\FTP Navigator\Ftplist.txt
Server
No Password
FTP Navigator
Programfiles(x86)
programfiles
\jDownloader\config\database.script
programfiles(x86)
INSERT INTO CONFIG VALUES('AccountController','
sq
t
xt
JDownloader
Software\Paltalk
HKEY_CURRENT_USER\Software\Paltalk\
pwd
Paltalk
\.purple\accounts.xml
<account>
<protocol>
</protocol>
<name>
</name>
<password>
</password>
Pidgin
\SmartFTP\Client 2.0\Favorites\Quick Connect\
\SmartFTP\Client 2.0\Favorites\Quick Connect\*.xml
<Password>
</Password>
<Name>
</Name>
SmartFTP
\Ipswitch\WS_FTP\Sites\ws_ftp.ini
HOST
UID
PWD
WS_FTP
\cftp\Ftplist.txt
;Server=
;Port=
;Password=
;User=
;Anonymous=
Name=
FTPCommander
\FTPGetter\servers.xml
<server>
<server_ip>
</server_ip>
<server_port>
</server_port>
<server_user_name>
</server_user_name>
<server_user_password>
</server_user_password>
FTPGetter
HKEY_LOCAL_MACHINE\SOFTWARE\Vitalwerks\DUC
HKEY_CURRENT_USER\SOFTWARE\Vitalwerks\DUC
USERname
NO-IP
\The Bat!
\Account.CFN
zzz
TheBat
HKEY_CURRENT_USER\Software\RimArts\B2\Settings
DataDir
Folder.lst
\Mailbox.ini
Account
SMTPServer
MailAddress
PassWd
Becky!
\Trillian\users\global\accounts.dat
Accounts
Trillian
Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Email
IMAP Password
POP3 Password
HTTP Password
SMTP Password
SMTP Server
Outlook
COMPlus_legacyCorruptedStateExceptionsPolicy
1
Software\Microsoft\ActiveSync\Partners
syncpassword
mailoutgoing
Windows Mail App
HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
Executable
HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
FoxmailPath
\Storage\
\mail\
\VirtualStore\Program Files\Foxmail\mail\
\VirtualStore\Program Files (x86)\Foxmail\mail\
\Accounts\Account.rec0
\Account.stg
Read
Close
Dispose
POP3Host
SMTPHost
IncomingServer
POP3Password
Foxmail
\Opera Mail\Opera Mail\wand.dat
opera:
Opera Mail
\Pocomail\accounts.ini
POPPass
SMTPPass
SMTP
PocoMail
RealVNC 4.x
SOFTWARE\Wow6432Node\RealVNC\WinVNC4
RealVNC 3.x
SOFTWARE\RealVNC\vncserver
SOFTWARE\RealVNC\WinVNC4
Software\ORL\WinVNC3
TightVNC
Software\TightVNC\Server
PasswordViewOnly
TightVNC ControlPassword
ControlPassword
TigerVNC
Software\TigerVNC\Server
Trim
UltraVNC
ProgramFiles(x86)
\uvnc bvba\UltraVNC\ultravnc.ini
passwd
passwd2
ProgramFiles
\UltraVNC\ultravnc.ini
Substring
eM Client\accounts.dat
eM Client
"Username":"
",
"Secret":"
72905C47-F4FD-4CF7-A489-4E8121A155BD
"ProviderName":"
\Mailbird\Store\Store.db
Server_Host
Username
EncryptedPassword
Mailbird
SenderIdentities
NordVPN
NordVPN directory not found!
NordVpn.exe*
user.config
Load
SelectSingleNode
//setting[@name='Username']/value
InnerText
//setting[@name='Password']/value
\MySQL\Workbench\workbench_user_data.dat


MySQL Workbench
%ProgramW6432%
Private Internet Access\data
\Private Internet Access\data
\account.json
.*"username":"(.*?)"
.*"password":"(.*?)"
Private Internet Access
Software\DownloadManager\Passwords\
EncPassword
Internet Download Manager
discord.com
Discord
Discord Token
hdfzpysvpzimorhk
quick.dat
Sites.dat
\FlashFXP\
yA36zA48dEhfrvghGRg57h5UlDv3
Type
Value
IterationCount
\Psi\profiles
\Psi+\profiles
\accounts.xml
USERPROFILE
\OpenVPN\config\
remote
PWD=
+-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
5A
71
abcçdefgğhıijklmnoöpqrsştuüvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
o6806642kbM7c5
[\w-]{24}\.[\w-]{6}\.[\w-]{27}
mfa\.[\w-]{84}
discordcanary
discordptb
Local Storage\leveldb
*.ldb
*.log
discord
<array>
<dict>
<string>
</string>
<data>
</data>
Safari Browser
-convert xml1 -s -o "
\fixed_keychain.xml"
A
10
B
11
12
D
13
E
14
F
15
ABCDEF
(
EndsWith
IndexOf
UNIQUE
table
00061561
Berkelet DB
00000002
1.85 (Hash, version 2, native byte-order)
Unknow database format
key4.db
metaData
id
item1
item2
nssPrivate
a11
a102
2a864886f70d0209
2a864886f70d010c050103
key3.db
global-salt
Version
password-check
logins.json
\"(hostname|encryptedPassword|encryptedUsername)":"(.*?)"
oauth
[^\u0020-\u007F]
signons.sqlite
moz_logins
hostname
encryptedUsername
encryptedPassword
;
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (56.7)
.exe | Win64 Executable (generic) (21.3)
.scr | Windows screen saver (10.1)
.dll | Win32 Dynamic Link Library (generic) (5)
.exe | Win32 Executable (generic) (3.4)

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 2040-Nov-05 16:06:23
Debug artifacts:
  • GesXMPM.pdb
Comments: -
CompanyName: Microsoft
FileDescription: Traffic Light
FileVersion: 1.0.0.0
InternalName: GesXMPM.exe
LegalCopyright: Copyright © 2021
LegalTrademarks: -
OriginalFilename: GesXMPM.exe
ProductName: Traffic Light
ProductVersion: 1.0.0.0
Assembly Version: 1.0.0.0

DOS Header

e_magic: MZ
e_cblp: 144
e_cp: 3
e_crlc: -
e_cparhdr: 4
e_minalloc: -
e_maxalloc: 65535
e_ss: -
e_sp: 184
e_csum: -
e_ip: -
e_cs: -
e_ovno: -
e_oemid: -
e_oeminfo: -
e_lfanew: 128

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
NumberofSections: 3
TimeDateStamp: 2040-Nov-05 16:06:23
PointerToSymbolTable: -
NumberOfSymbols: -
SizeOfOptionalHeader: 224
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
8192
1160916
1161216
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
7.6612
.rsrc
1171456
1476
1536
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.15168
.reloc
1179648
12
512
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
0.0980042

Resources

Title
Entropy
Size
Codepage
Language
Type
1
3.33177
820
UNKNOWN
UNKNOWN
RT_VERSION
1 (#2)
5.00112
490
UNKNOWN
UNKNOWN
RT_MANIFEST

Imports

mscoree.dll
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start balance remittance advice.exe no specs #AGENTTESLA balance remittance advice.exe

Process information

PID
CMD
Path
Indicators
Parent process
1844"C:\Users\admin\AppData\Local\Temp\Balance remittance advice.exe" C:\Users\admin\AppData\Local\Temp\Balance remittance advice.exeExplorer.EXE
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Description:
Traffic Light
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\balance remittance advice.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
c:\windows\system32\rpcrt4.dll
2272"{path}"C:\Users\admin\AppData\Local\Temp\Balance remittance advice.exe
Balance remittance advice.exe
User:
admin
Company:
Microsoft
Integrity Level:
MEDIUM
Description:
Traffic Light
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\balance remittance advice.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
AgentTesla
(PID) Process(2272) Balance remittance advice.exe
Protocolsmtp
PasswordmQqt$sHJba83
Port587
Strings (792)
:
<b>[
</b>
<b>]</b> (
)
False
{BACK}
{ALT+TAB}
{ALT+F4}
{TAB}
{ESC}
{Win}
{CAPSLOCK}
&uarr;
&darr;
&larr;
&rarr;
{DEL}
{END}
{HOME}
{Insert}
{NumLock}
{PageDown}
{PageUp}
{ENTER}
{F1}
{F2}
{F3}
{F4}
{F5}
{F6}
{F7}
{F8}
{F9}
{F10}
{F11}
{F12}
control
{CTRL}
&
&amp;
<
&lt;
>
&gt;
"
&quot;
Copied Text:
The binary key cannot have an odd number of digits: {0}
Index must be from {0} to {1}.
:Zone.Identifier
SystemDrive
\
WScript.Shell
RegRead
ObjectLength
ChainingModeGCM
AuthTagLength
ChainingMode
KeyDataBlob
AES
Microsoft Primitive Provider
CONNECTION
KEEP-ALIVE
PROXY-AUTHENTICATE
PROXY-AUTHORIZATION
TE
TRAILER
TRANSFER-ENCODING
UPGRADE
g
401
502
500
-
Windows RDP
credential
policy
blob
rdg
chrome
{{{0}}}
Length
CopyTo
ComputeHash
sha512
Copy
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0
20
/
%discordapi%
yyyy-MM-dd HH:mm:ss
yyyy_MM_dd_HH_mm_ss
<br>
<hr>
https://api.ipify.org
mail.siliconsafepack.com
mQqt$sHJba83
appdata
tCeln
tCeln.exe
http://yqaoqZ.com
\ofX
2025-11-21
yyyy-MM-dd
Subtract
Days
Software\Microsoft\Windows\CurrentVersion\Run
\drivers\etc\hosts
SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run
SC
SC_
_
.jpeg
Screenshot
image/jpeg
/log.tmp
KL
KL_
.html
<html>
</html>
Log
text/html
[
]
,
URL:
Username:
Password:
Application:
PW
PW_
CO
CO_
.zip
Cookie
application/zip
-f
\Data\Tor\torrc
p=
127.0.0.1
POST
+
%2B
application/x-www-form-urlencoded
image/jpg
STOR
Add
chat_id
caption
yyyy-MM-dd HH-mm-ss
.jpg
sendDocument
document
html
jpg
zip
---------------------------
x
--
multipart/form-data; boundary=
Content-Disposition: form-data; name="{0}" {1}
Content-Disposition: form-data; name="{0}"; filename="{1}" Content-Type: {2}
--
Time:
MM/dd/yyyy HH:mm:ss
User Name:
Computer Name:
OSFullName:
CPU:
RAM:
IP Address:
New
Recovered!
User Name
OSFullName
None
win32_processor
processorID
1f46b319-063b-4cbf-8645-96bf73e754ac
Win32_NetworkAdapterConfiguration
IPEnabled
MacAddress
:
0dfa66e4-8f80-4f3e-96e4-60c733d4df21
WinMgmts:
InstancesOf
Win32_BaseBoard
SerialNumber
137b6dd9-3b84-4278-ab68-98feecc6ca8b
x2
Tor
AUTHENTICATE "NpXAkhmRlj"
SIGNAL NEWNYM
250
tor
StartInfo
FileName
\Tor\tor.exe
Arguments
UseShellExecute
RedirectStandardOutput
CreateNoWindow
Start
StandardOutput
ReadLine
Contains
Bootstrapped 100%
EndOfStream
Id
AvoidDiskWrites 1 Log notice stdout DormantCanceledByStartup 1 ControlPort 9051 CookieAuthentication 1 runasdaemon 1 ExtORPort auto hashedcontrolpassword %hash% DataDirectory %tordir%\Data\Tor GeoIPFile %tordir%\Data\Tor\geoip GeoIPv6File %tordir%\Data\Tor\geoip6
\tor.zip
%tordir%
%hash%
NpXAkhmRlj
https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
https://www.theonionrouter.com/dist.torproject.org/torbrowser/
<a.+?href\s*=\s*(["'])(?<href>.+?)\1[^>]*>
href
Replace
TrimStart
.
TrimEnd
tor-win32-
GetBytes
TransformBlock
TransformFinalBlock
Hash
16:
filename
fileformat
file
username
content
----------{0:N}
--{0} Content-Disposition: form-data; name="{1}"; filename="{2}" Content-Type: {3}
application/octet-stream
--{0} Content-Disposition: form-data; name="{1}" {2}
GET
OK
\tmpG
.tmp
SELECT * FROM Win32_Processor
Name
MB
Unknown
Wr
W
C
ExtractFile
n
http://127.0.0.1:
HTTP/1.1
Hostname
Port
200 Connection established Proxy-Agent: HToS5x
Connect
Host
PathAndQuery
Fragment
Host:
{0}
Key
Mode
IV
Padding
CreateDecryptor
SEQUENCE {
{0:X2}
INTEGER
OCTETSTRING
OBJECTIDENTIFIER
}
sha256
Cookies
Opera
Opera Software\Opera Stable
Comodo Dragon
Comodo\Dragon\User Data
Chrome
\Google\Chrome\User Data
360 Browser
\360Chrome\Chrome\User Data
Yandex
Yandex\YandexBrowser\User Data
SRWare Iron
Chromium\User Data
Torch Browser
Torch\User Data
Brave Browser
BraveSoftware\Brave-Browser\User Data
Iridium Browser
\Iridium\User Data
CoolNovo
MapleStudio\ChromePlus\User Data
7Star
7Star\7Star\User Data
Epic Privacy Browser
Epic Privacy Browser\User Data
Amigo
Amigo\User Data
CentBrowser
CentBrowser\User Data
CocCoc
CocCoc\Browser\User Data
Chedot
Chedot\User Data
Elements Browser
Elements Browser\User Data
Kometa
Kometa\User Data
Sleipnir 6
Fenrir Inc\Sleipnir5\setting\modules\ChromiumViewer
Citrio
CatalinaGroup\Citrio\User Data
Coowon
Coowon\Coowon\User Data
Liebao Browser
liebao\User Data
QIP Surf
QIP Surf\User Data
QQ Browser
Tencent\QQBrowser\User Data
UC Browser
UCBrowser\
Orbitum
Orbitum\User Data
Sputnik
Sputnik\Sputnik\User Data
uCozMedia
uCozMedia\Uran\User Data
Vivaldi
Vivaldi\User Data
cookies.sqlite
Firefox
APPDATA
\Mozilla\Firefox\
IceCat
\Mozilla\icecat\
PaleMoon
\Moonchild Productions\Pale Moon\
SeaMonkey
\Mozilla\SeaMonkey\
Flock
\Flock\Browser\
K-Meleon
\K-Meleon\
Postbox
\Postbox\
Thunderbird
\Thunderbird\
IceDragon
\Comodo\IceDragon\
WaterFox
\Waterfox\
BlackHawk
\NETGATE Technologies\BlackHawk\
CyberFox
\8pecxstudios\Cyberfox\
Path=([A-z0-9\/\.\-]+)
profiles.ini
\Default\
Profile
origin_url
username_value
password_value
v10
v11
Opera Stable
\Local State
"encrypted_key":"(.*?)"
\Default\Login Data
\Login Data
Opera Browser
Yandex Browser
Iridium\User Data
Chromium
Cool Novo
Brave
360Chrome\Chrome\User Data
Uran
Epic Privacy
Coccoc
\Google\Chrome\User Data\
logins
Major
Minor
2F1A6504-0641-44CF-8BB5-3612D865F2E5
Windows Secure Note
3CCD5499-87A8-4B10-A215-608888DD3B55
Windows Web Password Credential
154E23D0-C644-4E6F-8CE6-5069272F999F
Windows Credential Picker Protector
4BF4C442-9B8A-41A0-B380-DD4A704DDB28
Web Credentials
77BC582B-F0A6-4E15-4E80-61736B6F3B29
Windows Credentials
E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
Windows Domain Certificate Credential
3E0E35BE-1B77-43E7-B873-AED901B6275B
Windows Domain Password Credential
3C886FF3-2669-4AA2-A8FB-3F6759A77548
Windows Extended Credential
00000000-0000-0000-0000-000000000000
SchemaId
pResourceElement
pIdentityElement
pPackageSid
pAuthenticatorElement
IE/Edge
\Common Files\Apple\Apple Application Support\plutil.exe
\Apple Computer\Preferences\keychain.plist
*
Login Data
journal
wow_logins
\Microsoft\Edge\User Data
Edge Chromium
\Microsoft\Credentials\
\Microsoft\Protect\
GuidMasterKey
\Default\EncryptedStorage
\EncryptedStorage
entries
category
Password
str3
str2
blob0
PopPassword
SmtpPassword
Software\IncrediMail\Identities\
\Accounts_New
EmailAddress
SmtpServer
incredimail
HKEY_CURRENT_USER\Software\Qualcomm\Eudora\CommandLine
current
Settings
SavePasswordText
ReturnAddress
Eudora
\falkon\profiles\
startProfile="([A-z0-9\/\.]+)"
\browsedata.db
autofill
Falkon Browser
startProfile=([A-z0-9\/\.]+)
Backend=([A-z0-9\/\.-]+)
\settings.ini
\Claws-mail
\clawsrc
passkey0
master_passphrase_salt=(.+)
master_passphrase_pbkdf2_rounds=(.+)
use_master_passphrase=(.+)
\accountrc
smtp_server
address
account
\passwordstorerc
{(.*),(.*)}(.*)
ClawsMail
signons3.txt
---
.
objects
Data
DecryptTripleDes
Flock Browser
ALLUSERSPROFILE
\\
DynDNS\Updater\config.dyndns
username=
=
password=
&H
t6KzXhCh
http://DynDns.com
DynDNS
name
jid
password
Psi/Psi+
Software\OpenVPN-GUI\configs
Software\OpenVPN-GUI\configs\
auth-data
entropy
Open VPN
\FileZilla\recentservers.xml
<Server>
<Host>
</Host>
<Port>
</Port>
<User>
</User>
<Pass encoding="base64">
</Pass>
<Pass>
FileZilla
SOFTWARE\\Martin Prikryl\\WinSCP 2\\Sessions
HostName
UserName
PublicKeyFile
PortNumber
22
[PRIVATE KEY LOCATION: "{0}"]
WinSCP
IP=
port=
user=
pass=
FlashFXP
SOFTWARE\FTPWare\COREFTP\Sites
CoreFTP
User
\FTP Navigator\Ftplist.txt
Server
No Password
FTP Navigator
Programfiles(x86)
programfiles
\jDownloader\config\database.script
programfiles(x86)
INSERT INTO CONFIG VALUES('AccountController','
sq
t
xt
JDownloader
Software\Paltalk
HKEY_CURRENT_USER\Software\Paltalk\
pwd
Paltalk
\.purple\accounts.xml
<account>
<protocol>
</protocol>
<name>
</name>
<password>
</password>
Pidgin
\SmartFTP\Client 2.0\Favorites\Quick Connect\
\SmartFTP\Client 2.0\Favorites\Quick Connect\*.xml
<Password>
</Password>
<Name>
</Name>
SmartFTP
\Ipswitch\WS_FTP\Sites\ws_ftp.ini
HOST
UID
PWD
WS_FTP
\cftp\Ftplist.txt
;Server=
;Port=
;Password=
;User=
;Anonymous=
Name=
FTPCommander
\FTPGetter\servers.xml
<server>
<server_ip>
</server_ip>
<server_port>
</server_port>
<server_user_name>
</server_user_name>
<server_user_password>
</server_user_password>
FTPGetter
HKEY_LOCAL_MACHINE\SOFTWARE\Vitalwerks\DUC
HKEY_CURRENT_USER\SOFTWARE\Vitalwerks\DUC
USERname
NO-IP
\The Bat!
\Account.CFN
zzz
TheBat
HKEY_CURRENT_USER\Software\RimArts\B2\Settings
DataDir
Folder.lst
\Mailbox.ini
Account
SMTPServer
MailAddress
PassWd
Becky!
\Trillian\users\global\accounts.dat
Accounts
Trillian
Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Software\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676
Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Email
IMAP Password
POP3 Password
HTTP Password
SMTP Password
SMTP Server
Outlook
COMPlus_legacyCorruptedStateExceptionsPolicy
1
Software\Microsoft\ActiveSync\Partners
syncpassword
mailoutgoing
Windows Mail App
HKEY_CURRENT_USER\Software\Aerofox\FoxmailPreview
Executable
HKEY_CURRENT_USER\Software\Aerofox\Foxmail\V3.1
FoxmailPath
\Storage\
\mail\
\VirtualStore\Program Files\Foxmail\mail\
\VirtualStore\Program Files (x86)\Foxmail\mail\
\Accounts\Account.rec0
\Account.stg
Read
Close
Dispose
POP3Host
SMTPHost
IncomingServer
POP3Password
Foxmail
\Opera Mail\Opera Mail\wand.dat
opera:
Opera Mail
\Pocomail\accounts.ini
POPPass
SMTPPass
SMTP
PocoMail
RealVNC 4.x
SOFTWARE\Wow6432Node\RealVNC\WinVNC4
RealVNC 3.x
SOFTWARE\RealVNC\vncserver
SOFTWARE\RealVNC\WinVNC4
Software\ORL\WinVNC3
TightVNC
Software\TightVNC\Server
PasswordViewOnly
TightVNC ControlPassword
ControlPassword
TigerVNC
Software\TigerVNC\Server
Trim
UltraVNC
ProgramFiles(x86)
\uvnc bvba\UltraVNC\ultravnc.ini
passwd
passwd2
ProgramFiles
\UltraVNC\ultravnc.ini
Substring
eM Client\accounts.dat
eM Client
"Username":"
",
"Secret":"
72905C47-F4FD-4CF7-A489-4E8121A155BD
"ProviderName":"
\Mailbird\Store\Store.db
Server_Host
Username
EncryptedPassword
Mailbird
SenderIdentities
NordVPN
NordVPN directory not found!
NordVpn.exe*
user.config
Load
SelectSingleNode
//setting[@name='Username']/value
InnerText
//setting[@name='Password']/value
\MySQL\Workbench\workbench_user_data.dat


MySQL Workbench
%ProgramW6432%
Private Internet Access\data
\Private Internet Access\data
\account.json
.*"username":"(.*?)"
.*"password":"(.*?)"
Private Internet Access
Software\DownloadManager\Passwords\
EncPassword
Internet Download Manager
discord.com
Discord
Discord Token
hdfzpysvpzimorhk
quick.dat
Sites.dat
\FlashFXP\
yA36zA48dEhfrvghGRg57h5UlDv3
Type
Value
IterationCount
\Psi\profiles
\Psi+\profiles
\accounts.xml
USERPROFILE
\OpenVPN\config\
remote
PWD=
+-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
5A
71
abcçdefgğhıijklmnoöpqrsştuüvwxyz1234567890_-.~!@#$%^&*()[{]}\|';:,<>/?+=
o6806642kbM7c5
[\w-]{24}\.[\w-]{6}\.[\w-]{27}
mfa\.[\w-]{84}
discordcanary
discordptb
Local Storage\leveldb
*.ldb
*.log
discord
<array>
<dict>
<string>
</string>
<data>
</data>
Safari Browser
-convert xml1 -s -o "
\fixed_keychain.xml"
A
10
B
11
12
D
13
E
14
F
15
ABCDEF
(
EndsWith
IndexOf
UNIQUE
table
00061561
Berkelet DB
00000002
1.85 (Hash, version 2, native byte-order)
Unknow database format
key4.db
metaData
id
item1
item2
nssPrivate
a11
a102
2a864886f70d0209
2a864886f70d010c050103
key3.db
global-salt
Version
password-check
logins.json
\"(hostname|encryptedPassword|encryptedUsername)":"(.*?)"
oauth
[^\u0020-\u007F]
signons.sqlite
moz_logins
hostname
encryptedUsername
encryptedPassword
;
Total events
4 710
Read events
4 684
Write events
26
Delete events
0

Modification events

(PID) Process:(2272) Balance remittance advice.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Balance remittance advice_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2272) Balance remittance advice.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Balance remittance advice_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2272) Balance remittance advice.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Balance remittance advice_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(2272) Balance remittance advice.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Balance remittance advice_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(2272) Balance remittance advice.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Balance remittance advice_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2272) Balance remittance advice.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Balance remittance advice_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(2272) Balance remittance advice.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Balance remittance advice_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2272) Balance remittance advice.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Balance remittance advice_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2272) Balance remittance advice.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Balance remittance advice_RASMANCS
Operation:writeName:FileTracingMask
Value:
(PID) Process:(2272) Balance remittance advice.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Balance remittance advice_RASMANCS
Operation:writeName:ConsoleTracingMask
Value:
Executable files
0
Suspicious files
3
Text files
0
Unknown types
1

Dropped files

PID
Process
Filename
Type
2272Balance remittance advice.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506binary
MD5:E05DDF29E2897E7BD3FA87ABDE3EDA08
SHA256:C6FE9FB2062BB61D423AEAE271ABD6409E94B8FA4B8DFC208CE34DC0FB28F657
2272Balance remittance advice.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506compressed
MD5:FC4666CBCA561E864E7FDF883A9E6661
SHA256:10F3DEB6C452D749A7451B5D065F4C0449737E5EE8A44F4D15844B503141E65B
2272Balance remittance advice.exeC:\Users\admin\AppData\Local\Temp\Cab7066.tmpcompressed
MD5:FC4666CBCA561E864E7FDF883A9E6661
SHA256:10F3DEB6C452D749A7451B5D065F4C0449737E5EE8A44F4D15844B503141E65B
2272Balance remittance advice.exeC:\Users\admin\AppData\Local\Temp\Tar7067.tmpcat
MD5:73B4B714B42FC9A6AAEFD0AE59ADB009
SHA256:C0CF8CC04C34B5B80A2D86AD0EAFB2DD71436F070C86B0321FBA0201879625FD
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
3
DNS requests
3
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2272
Balance remittance advice.exe
GET
200
178.79.242.0:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?448e989a78bd4595
DE
compressed
61.4 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2272
Balance remittance advice.exe
3.220.57.224:443
api.ipify.org
AMAZON-AES
US
malicious
2272
Balance remittance advice.exe
178.79.242.0:80
ctldl.windowsupdate.com
LLNW
DE
whitelisted
2272
Balance remittance advice.exe
204.11.58.189:587
mail.siliconsafepack.com
UNIFIEDLAYER-AS-1
US
suspicious

DNS requests

Domain
IP
Reputation
api.ipify.org
  • 3.220.57.224
  • 54.91.59.199
  • 52.20.78.240
  • 3.232.242.170
shared
mail.siliconsafepack.com
  • 204.11.58.189
malicious
ctldl.windowsupdate.com
  • 178.79.242.0
  • 178.79.242.128
whitelisted

Threats

PID
Process
Class
Message
2272
Balance remittance advice.exe
Generic Protocol Command Decode
SURICATA Applayer Detect protocol only one direction
1 ETPRO signatures available at the full report
No debug info