Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-06-2022 07:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://bit.ly/3JpFXp4
Resource
win7-20220414-en
General
-
Target
https://bit.ly/3JpFXp4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000358f16e0538341458b70f68dad1eafd4000000000200000000001066000000010000200000004efc9633a7c91bef46f342c35c0db102c67ff5d993ead874773c50e31f43983e000000000e8000000002000020000000654d13c1802c7f4dc40152dfa69923631e815dd4c130ef5c8fade0a993360b1820000000de6d9d7b9b0417db1f3d6b80b30e8b357494dce4d29afdc822a14adcb8728ed24000000025975707a09eb1e778da190f082a1a422a55898affbf95793682867699fc96c7626aff4158ccebf66af676e7422fdd1655e75175ff971f06b2f5028df2f2d741 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DOMStorage\support.google.com\ = "32" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000358f16e0538341458b70f68dad1eafd4000000000200000000001066000000010000200000008ba3554d35bf317b4142f2acf77582acc92a31fdf4974ebf1ad0ca562f8c7edb000000000e800000000200002000000080b7124a15947cc6b6dfeb2eddb9a0f02631ecdf9bf8338b4149bbc8778ce12090000000d14ac6e86b93b61038d3ecde42453a75266aee3951a01da1e50f327f8610fde18988234e9dba8b1497d06ecffd4021c59f3bd0f5a10303c20ef8d634246aebdc3288c1f88238b7ec5d678481179ae6e27095d62dbd66dd9289322c0aa5ee045772b7a5926dd31e2834cadcac90d26e5b0bf292323b3cb5b2805cbf70323309f8e4e8d82ab21d126d1c6a7d6f32de1230400000001000dbac5bd6803546b1ae1a18b131b0d496abc98a07165d143251103756effc16ee7f7008f702bef96a41505332e3d5c99179a52267101cf1f3e4fe61e77188 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DOMStorage\support.google.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\Total = "32" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "362567978" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "32" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DOMStorage\support.google.com\ = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 501757ba4f85d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DDF04791-F142-11EC-80B4-C621D3E3FB96} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\DOMStorage\google.com\NumberOfSubdomains = "1" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 1740 chrome.exe 336 chrome.exe 336 chrome.exe 2692 chrome.exe 2684 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
Processes:
iexplore.exechrome.exepid process 1960 iexplore.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe 336 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1960 iexplore.exe 1960 iexplore.exe 1792 IEXPLORE.EXE 1792 IEXPLORE.EXE 1792 IEXPLORE.EXE 1792 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
iexplore.exechrome.exedescription pid process target process PID 1960 wrote to memory of 1792 1960 iexplore.exe IEXPLORE.EXE PID 1960 wrote to memory of 1792 1960 iexplore.exe IEXPLORE.EXE PID 1960 wrote to memory of 1792 1960 iexplore.exe IEXPLORE.EXE PID 1960 wrote to memory of 1792 1960 iexplore.exe IEXPLORE.EXE PID 336 wrote to memory of 392 336 chrome.exe chrome.exe PID 336 wrote to memory of 392 336 chrome.exe chrome.exe PID 336 wrote to memory of 392 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1612 336 chrome.exe chrome.exe PID 336 wrote to memory of 1740 336 chrome.exe chrome.exe PID 336 wrote to memory of 1740 336 chrome.exe chrome.exe PID 336 wrote to memory of 1740 336 chrome.exe chrome.exe PID 336 wrote to memory of 1648 336 chrome.exe chrome.exe PID 336 wrote to memory of 1648 336 chrome.exe chrome.exe PID 336 wrote to memory of 1648 336 chrome.exe chrome.exe PID 336 wrote to memory of 1648 336 chrome.exe chrome.exe PID 336 wrote to memory of 1648 336 chrome.exe chrome.exe PID 336 wrote to memory of 1648 336 chrome.exe chrome.exe PID 336 wrote to memory of 1648 336 chrome.exe chrome.exe PID 336 wrote to memory of 1648 336 chrome.exe chrome.exe PID 336 wrote to memory of 1648 336 chrome.exe chrome.exe PID 336 wrote to memory of 1648 336 chrome.exe chrome.exe PID 336 wrote to memory of 1648 336 chrome.exe chrome.exe PID 336 wrote to memory of 1648 336 chrome.exe chrome.exe PID 336 wrote to memory of 1648 336 chrome.exe chrome.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://bit.ly/3JpFXp41⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6724f50,0x7fef6724f60,0x7fef6724f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1108,16879661440904946803,14127014228618251590,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1112 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1108,16879661440904946803,14127014228618251590,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1108,16879661440904946803,14127014228618251590,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1744 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1108,16879661440904946803,14127014228618251590,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2040 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1108,16879661440904946803,14127014228618251590,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2068 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1108,16879661440904946803,14127014228618251590,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1108,16879661440904946803,14127014228618251590,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3280 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1108,16879661440904946803,14127014228618251590,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1108,16879661440904946803,14127014228618251590,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3488 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1108,16879661440904946803,14127014228618251590,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3600 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1108,16879661440904946803,14127014228618251590,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2964 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1108,16879661440904946803,14127014228618251590,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=536 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1108,16879661440904946803,14127014228618251590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1108,16879661440904946803,14127014228618251590,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3584 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1108,16879661440904946803,14127014228618251590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1108,16879661440904946803,14127014228618251590,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3104 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1108,16879661440904946803,14127014228618251590,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=108 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1108,16879661440904946803,14127014228618251590,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
1KB
MD53b4b9909f269b872f785d1a73ae7fb81
SHA18440b51852c9291a504ca0c62581033344ca5e9c
SHA256213dee86ef094043d70abca4779866aa62c4cbb9e672800060126e63767fba95
SHA512d1c131fd1e4133f3d49b92cbfa818b848052ab443e4c4144bbe0c193fc8ba6e8e4291e55909a5fe64b8299f81145899219590b5c01484049f4d1d1593c2ed02b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
60KB
MD5308336e7f515478969b24c13ded11ede
SHA18fb0cf42b77dbbef224a1e5fc38abc2486320775
SHA256889b832323726a9f10ad03f85562048fdcfe20c9ff6f9d37412cf477b4e92ff9
SHA51261ad97228cd6c3909ef3ac5e4940199971f293bdd0d5eb7916e60469573a44b6287c0fa1e0b6c1389df35eb6c9a7d2a61fdb318d4a886a3821ef5a9dab3ac24f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A16C6C16D94F76E0808C087DFC657D99_8DCA010BCF802765AAFCD3E2E71834ABFilesize
472B
MD5b1737dcb600d90a006b82fbcb5118ed6
SHA191d10ec9cb1cf10456cc0d99328e000d50a5092f
SHA256d0448c4324be5909dfaf3e11629f7266eec458c4b2253716c411af54e41bbc2f
SHA5121cb168220effaf6e5a52de831c26bd1aca6df18f4d7d8521a73b737466584085cdc7fcc328219ff66bc160209da9cceda643364829d7009c215d3a2335f10f18
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAFilesize
724B
MD55a11c6099b9e5808dfb08c5c9570c92f
SHA1e5dc219641146d1839557973f348037fa589fd18
SHA25691291a5edc4e10a225d3c23265d236ecc74473d9893be5bd07e202d95b3fb172
SHA512c2435b6619464a14c65ab116ab83a6e0568bdf7abc5e5a5e19f3deaf56c70a46360965da8b60e1256e9c8656aef9751adb9e762731bb8dbab145f1c8224ac8f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_F0A97D71D13E6B76B92AB131242D3705Filesize
472B
MD5ca2d3837e48e543d3fe27337f8618075
SHA1ea681c6c8cccb53d1a68c6832acfaa66d2a72358
SHA2566c28b8b048657fe92c7bd17eb70ae6653b2db4fd5f0d6a9dd9a7f31b1ade61a8
SHA512143db8e0df8c2c1a0630ad7946859c972d5b5268afe12483256799febae09b42ae624032b753f35c3b2a4cfdd5bb119372d8837e1b26f793c34ca6ed5c88afd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_9727017B118BD261ACD7FB12EE290EC4Filesize
472B
MD5eb4188b68cdb6fa038c7e1e853a82c3c
SHA1ba29651ec72ba4d7dec6c8b3e8fc7e7f9ec5f158
SHA256a9901e0974b41c1647b239fdab3692faaf9c82f104960199cb69e287290b3042
SHA512bda2af05ff93049cece93a22750649f9d416d5b13260386669c9ce7ade448524b05862e98c6e918e2dc446eba03d54914dbf64809e072e371f5ae7636d17e66e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
410B
MD5e60eb79cd2e9d9f566c51d17eab6edea
SHA15db1cc63559746382b273ef03569fbe75fe0c64e
SHA256e1a196ec8f9cbdd4fba6306dbb60a59ce37d107a91173400b62b68434601efec
SHA512ce57f648c007511b9fd7ea97500450f60a8445e9323caae776b53420efbf3e9b456233db95b86bf397f93716b50741357161daa4a86e3c85eda73a6916dd9fd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD598f5e52febcffc19b79859579fe5361f
SHA157aa3c08c2740810d51bb5183ac90d3ae2625e1d
SHA25672fcc1c4fa3691f128b102128cac51f83c616e0d2d650d6a1f2dc09224a715ec
SHA51298bbf9831baab5314f126111e69c4c4f93845869fe8e698c2c5c9d6aa124c75f985426f01e4cc0b14ea9672e5474998495c66aefac9a3f35520d172d79d748be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A16C6C16D94F76E0808C087DFC657D99_8DCA010BCF802765AAFCD3E2E71834ABFilesize
406B
MD55e9cdde2fc298083080eb3c7faf1ce8b
SHA1f10b8678a41b5d6552eb5a5443b996950e06bb4a
SHA256e31632c0dc4632fe15a7d437b6db07ba1d31bc7efa671e72b8a0cf06c2e00179
SHA51216b4ba778cff3e7c9caec9a03f38ebd533ff5ff92595ca433edf24fd8002cdf57d83e11eaad89f7bd06107ba04a0966e79761d37dcc854c0ff9601e0f93ed9fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAFilesize
392B
MD59055e9ea1a2ff636ab1b7f399a40e88a
SHA1099a7dd547f9a6cacfd6e5cbfa99612d99a16b96
SHA25648fb7afd8ed64c2843f1dce9dd11a3b988e359e097e17fa3debed2a538a40b0f
SHA512e2f9655a2a5eef270e3991edc02cfd5b143b074292fefef8601e74875735ba8a6dda7ab1231ca4d39ad81dfa49df64372d22c248c632e0d87f461b0268624483
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_F0A97D71D13E6B76B92AB131242D3705Filesize
406B
MD50b4444f6e8e4399f87f1b9759d87ce7d
SHA1aad67db049cfeaa0c355ed568512641f82255fde
SHA256df6fc42b5a5a918949e442d574e86311988d7ffeb0fb26c377962e065967e682
SHA512c4cec4650f93bd6fc1ea29d5110ab1d534e660d7594fe29defb246f5f21014444a7a187705688a8c7edf5ad56ae2d662493133775917e0c9feac20e3194d9c01
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_9727017B118BD261ACD7FB12EE290EC4Filesize
402B
MD51cc1c66a76ac667036fc47ccdfed000b
SHA18e3aec929e1b0ef49d3e57f6cd4aeff1ef42fd1e
SHA2565fb65fc2208bdc9420b5ffb07abfbd7768f42aa1508c172c6f462da1c5030405
SHA512aa022e27b26d6f6b442d9c21e12793275b389593ff6df95a9e1c37e274966c149ab3761dcef078ec72763428be2654f74b6e8fe69094f6b3d504f10f41cf7a51
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\k007hrg\imagestore.datFilesize
9KB
MD5d0dfbd81df7c94eb90bba5ab0bdfe199
SHA19af4a84d63e1191fcd45144a3413f1395653f775
SHA2561205221d5a8dd06ef12aa177fde020e2642923bc42c8c449538ad4d19db0d03a
SHA51285c43a8837654661d3d5f563381b450e36556ce6a37bfe371c3621994df4c04436efba5d782f2855d1bae04f3417714d37fcfa20ad9b6ed2d03449e390f97864
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\OWCWGLBH.txtFilesize
603B
MD5e25b116b326bcf17a11329ecd5b155e3
SHA13614239c78458422c97aaf4eb8304e4f0a96f75f
SHA256e9c291562b1dd2d3e59edc7a9c7747be9f80a11780a586c3fad55d1877f4bcf5
SHA512387cef623395af9ce8191c3d53581f43975ed826dcd47e48442a765a5ac01f2cc805c63f9f29eb6f4eafe1759a0447c983d94a45e3b03f27a1d557de5ecfb914
-
\??\pipe\crashpad_336_LGLMPYFYEJENOMXCMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e