Resubmissions
08-08-2022 19:45
220808-ygp63sfcck 1008-08-2022 19:37
220808-ybtbjsfbdn 1008-08-2022 19:31
220808-x8wx9sfbaj 10Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20220722-en -
resource tags
arch:x64arch:x86image:win10-20220722-enlocale:en-usos:windows10-1703-x64system -
submitted
08-08-2022 19:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://143894913.coreaquatech.com/905100119/aHR0cHM6Ly9lbnF1aXJlLWFzay5vbmxpbmUvP2VtYWlsPXRrZWVsZXJAbWF5ZXJicm93bi5jb20=
Resource
win10-20220722-en
General
-
Target
https://143894913.coreaquatech.com/905100119/aHR0cHM6Ly9lbnF1aXJlLWFzay5vbmxpbmUvP2VtYWlsPXRrZWVsZXJAbWF5ZXJicm93bi5jb20=
Malware Config
Signatures
-
Detected microsoft outlook phishing page
-
Executes dropped EXE 4 IoCs
Processes:
software_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exepid process 2312 software_reporter_tool.exe 4580 software_reporter_tool.exe 3824 software_reporter_tool.exe 2396 software_reporter_tool.exe -
Loads dropped DLL 7 IoCs
Processes:
software_reporter_tool.exepid process 3824 software_reporter_tool.exe 3824 software_reporter_tool.exe 3824 software_reporter_tool.exe 3824 software_reporter_tool.exe 3824 software_reporter_tool.exe 3824 software_reporter_tool.exe 3824 software_reporter_tool.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exesoftware_reporter_tool.exechrome.exepid process 4076 chrome.exe 4076 chrome.exe 2460 chrome.exe 2460 chrome.exe 4404 chrome.exe 4404 chrome.exe 4832 chrome.exe 4832 chrome.exe 1944 chrome.exe 1944 chrome.exe 460 chrome.exe 460 chrome.exe 536 chrome.exe 536 chrome.exe 1668 chrome.exe 1668 chrome.exe 2312 software_reporter_tool.exe 2312 software_reporter_tool.exe 2112 chrome.exe 2112 chrome.exe 2112 chrome.exe 2112 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
chrome.exepid process 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
software_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exedescription pid process Token: 33 4580 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 4580 software_reporter_tool.exe Token: 33 2312 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 2312 software_reporter_tool.exe Token: 33 3824 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 3824 software_reporter_tool.exe Token: 33 2396 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 2396 software_reporter_tool.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2460 wrote to memory of 2692 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 2692 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 3644 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 4076 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 4076 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 4320 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 4320 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 4320 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 4320 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 4320 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 4320 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 4320 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 4320 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 4320 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 4320 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 4320 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 4320 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 4320 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 4320 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 4320 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 4320 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 4320 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 4320 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 4320 2460 chrome.exe chrome.exe PID 2460 wrote to memory of 4320 2460 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://143894913.coreaquatech.com/905100119/aHR0cHM6Ly9lbnF1aXJlLWFzay5vbmxpbmUvP2VtYWlsPXRrZWVsZXJAbWF5ZXJicm93bi5jb20=1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffc57484f50,0x7ffc57484f60,0x7ffc57484f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1516 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1836 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2104 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2932 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2944 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4160 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4508 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3548 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5392 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5092 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5028 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5004 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4932 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3636 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2404 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1404 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5480 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4340 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4164 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\102.286.200\software_reporter_tool.exe"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\102.286.200\software_reporter_tool.exe" --engine=2 --scan-locations=1,2,3,4,5,6,7,8,10 --disabled-locations=9,11 --session-id=HFF4ZrHBCMOXZjG5YCAhMbH8Xc32n2h3ZCRJBhWh --registry-suffix=ESET --enable-crash-reporting --srt-field-trial-group-name=Off2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\102.286.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\102.286.200\software_reporter_tool.exe" --crash-handler "--database=c:\users\admin\appdata\local\Google\Software Reporter Tool" --url=https://clients2.google.com/cr/report --annotation=plat=Win32 --annotation=prod=ChromeFoil --annotation=ver=102.286.200 --initial-client-data=0x250,0x254,0x258,0x22c,0x25c,0x7ff63599ecc8,0x7ff63599ecd8,0x7ff63599ece83⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\102.286.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\102.286.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_2312_WVUPQRDQTDCPQUHL" --sandboxed-process-id=2 --init-done-notifier=720 --sandbox-mojo-pipe-token=9560765442196870693 --mojo-platform-channel-handle=696 --engine=23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\102.286.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\102.286.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_2312_WVUPQRDQTDCPQUHL" --sandboxed-process-id=3 --init-done-notifier=928 --sandbox-mojo-pipe-token=526921179748273624 --mojo-platform-channel-handle=9243⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4320 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1496,1576828702935519166,1230483256763880978,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4468 /prefetch:82⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\102.286.200\software_reporter_tool.exeFilesize
14.0MB
MD551a9cac9c4e8da44ffd7502be17604ee
SHA144543e0c6f30415c670c1322e61ca68602d58708
SHA2566fe5e57df8d132eaf06f9134461dd172e36cf01679f13eb0f6e70c1f21b18323
SHA512a30b1d043f4e0e64782c5b84651256338dcbaff19d1f98d4412f9f2f77172ed4444105d6e382397f92056fa383a2f1ebe611f37fb9efafab744e9ccb5478c2e4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\102.286.200\software_reporter_tool.exeFilesize
14.0MB
MD551a9cac9c4e8da44ffd7502be17604ee
SHA144543e0c6f30415c670c1322e61ca68602d58708
SHA2566fe5e57df8d132eaf06f9134461dd172e36cf01679f13eb0f6e70c1f21b18323
SHA512a30b1d043f4e0e64782c5b84651256338dcbaff19d1f98d4412f9f2f77172ed4444105d6e382397f92056fa383a2f1ebe611f37fb9efafab744e9ccb5478c2e4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\102.286.200\software_reporter_tool.exeFilesize
14.0MB
MD551a9cac9c4e8da44ffd7502be17604ee
SHA144543e0c6f30415c670c1322e61ca68602d58708
SHA2566fe5e57df8d132eaf06f9134461dd172e36cf01679f13eb0f6e70c1f21b18323
SHA512a30b1d043f4e0e64782c5b84651256338dcbaff19d1f98d4412f9f2f77172ed4444105d6e382397f92056fa383a2f1ebe611f37fb9efafab744e9ccb5478c2e4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\102.286.200\software_reporter_tool.exeFilesize
14.0MB
MD551a9cac9c4e8da44ffd7502be17604ee
SHA144543e0c6f30415c670c1322e61ca68602d58708
SHA2566fe5e57df8d132eaf06f9134461dd172e36cf01679f13eb0f6e70c1f21b18323
SHA512a30b1d043f4e0e64782c5b84651256338dcbaff19d1f98d4412f9f2f77172ed4444105d6e382397f92056fa383a2f1ebe611f37fb9efafab744e9ccb5478c2e4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\102.286.200\software_reporter_tool.exeFilesize
14.0MB
MD551a9cac9c4e8da44ffd7502be17604ee
SHA144543e0c6f30415c670c1322e61ca68602d58708
SHA2566fe5e57df8d132eaf06f9134461dd172e36cf01679f13eb0f6e70c1f21b18323
SHA512a30b1d043f4e0e64782c5b84651256338dcbaff19d1f98d4412f9f2f77172ed4444105d6e382397f92056fa383a2f1ebe611f37fb9efafab744e9ccb5478c2e4
-
C:\Users\Admin\AppData\Local\Google\Software Reporter Tool\software_reporter_tool-sandbox.logFilesize
4KB
MD522550c6f83a549e2b5e744f1ce1d43a1
SHA183bcb79269ffb58153cc7cdc21481d676409b9bf
SHA25620340074da18f14ddbb9edded2a65f62926700a725df42723b26d8c9fb570d58
SHA5126076d0fae100f8e7a0a77f37e2e58caa185e13bfb92a82082850afe7add3817181bd0a51d340fbe3bab210874bf9caf49d266f77d83b720462fbd25f0eccb998
-
\??\c:\users\admin\appdata\local\Google\Software Reporter Tool\settings.datFilesize
40B
MD57e8c2cb143c32d2572b2288d296db2b6
SHA11d81891e19b0790a407bee5e0f7ddf90f3a0a943
SHA25607e2cbb8aca3b1ffdadca5397e9b62212273dc340751c003747f7f6d53360382
SHA512700cdca3cdb1cbf1b54bc8f4749530653c01b1d78a15c8f6a2ab73016c1fe2c4e85598c54f514ebee121767a31fbe23c89bd1cc6c9c6e669108414808e672f25
-
\??\c:\users\admin\appdata\local\Google\Software Reporter Tool\settings.datFilesize
40B
MD57e8c2cb143c32d2572b2288d296db2b6
SHA11d81891e19b0790a407bee5e0f7ddf90f3a0a943
SHA25607e2cbb8aca3b1ffdadca5397e9b62212273dc340751c003747f7f6d53360382
SHA512700cdca3cdb1cbf1b54bc8f4749530653c01b1d78a15c8f6a2ab73016c1fe2c4e85598c54f514ebee121767a31fbe23c89bd1cc6c9c6e669108414808e672f25
-
\??\c:\users\admin\appdata\local\Google\Software Reporter Tool\settings.datFilesize
40B
MD57e8c2cb143c32d2572b2288d296db2b6
SHA11d81891e19b0790a407bee5e0f7ddf90f3a0a943
SHA25607e2cbb8aca3b1ffdadca5397e9b62212273dc340751c003747f7f6d53360382
SHA512700cdca3cdb1cbf1b54bc8f4749530653c01b1d78a15c8f6a2ab73016c1fe2c4e85598c54f514ebee121767a31fbe23c89bd1cc6c9c6e669108414808e672f25
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\102.286.200\edls_64.dllFilesize
449KB
MD579d7f318441c21d17739e43990697d1d
SHA19683265bf401d11313b768dfc4b3aeb10015d18c
SHA2560ce49dc9f71360bf9dd21b8e3af4641834f85eed7d80a7de0940508437e68970
SHA51267c7a7d3bbadeff21951809d2f843311328771ed46bc1ca14edba486263f56f86922668dd89d11b05a16130380b7543f7c9556d79503c505807407763e9d3595
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\102.286.200\em000_64.dllFilesize
37KB
MD5f8b7cac6e9587baabf4045c34890c7ce
SHA161814262c6ee5ceaab2c0263c913cae52e203af7
SHA2568b0613b91229c98dfa5398568a4fa40dde2a2d40028654f74923bc929d6b5b30
SHA5124f80021fa2a6e6bd3cdd8248d6139d105dca984a914184d5b1e251e97daa77e36c4e059ed3a617ad12dd998eb603accd34ef3951261ad997a081d8ac934b6211
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\102.286.200\em001_64.dllFilesize
378KB
MD57adcb76ec34d774d1435b477e8625c47
SHA1ec4ba0ad028c45489608c6822f3cabb683a07064
SHA256a55be2be943078157b7d1cfb52febd4a95e4c7a37995bb75b19b079cc1ee5b9d
SHA512c1af669ee971b4f4a3bb057fe423a63376cfc19026650036b29d77fed73458d235889a662ac5e12c871c3e77f6fbdb1fa29c0dfa488a4a40fa045d79eb61e7c4
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\102.286.200\em002_64.dllFilesize
2.2MB
MD53a5093644dd4071aba6916c76bd5a5b5
SHA149ccbdb0de90f80e35dfd0077873a1a49a63a7b6
SHA25688e899e431baa41906f067af6b609d20b7af35639fa48de64b298f53183d0f56
SHA51291dc2c63203c4694f8fbadba5e52cbd803a7d20cae71f673f674dcba25069905e12d820a3202a33153a8f19318fe1107f1f4baccf52d4ce5961d2fcb958a9dd6
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\102.286.200\em003_64.dllFilesize
1.3MB
MD5cce9db3ce5cbac028584bebfd4d6dccc
SHA19f1cc4cba0491c759eca8dcad2777b3f2c012871
SHA25681c2092dafc14b10a92bbf1644f592d5fad8ee0b77100611aa2c9e32bac6b604
SHA512e1b4c6e3c3ba0018c19a4f6a55177e7e55a99b4a8ebebad0d9d891dfb1bd0c4589d95dac54857f1176e00dde635648a1112ea0e6a1efb626be2654de2f2e21e9
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\102.286.200\em004_64.dllFilesize
6.1MB
MD5ee46beaa6c9244880e8a510d080b4416
SHA1a83c3946a2f53f064e91d8b60d5f6c697a560062
SHA256d4f17bd032ead2a73340e6c14e24a3fa901d0fbae78f49fe4d368a01b788b49c
SHA5124e69dddd1215b1675bac788996019ef3cb22418fbba75c0c7935dafb2b1742bad79cc9ea6814b5f8d1663657a7987499a155cdf57733d1afae42b0e25d475c25
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\102.286.200\em005_64.dllFilesize
576KB
MD5169a2ef320119891cf3189aa3fd23b0e
SHA1de51c936101ef79bbc0f1d3c800cf832d221eef8
SHA2561072d49da0a70640fb9716cb894f4834ff621ca96d4aea1f478754edf4d0f780
SHA5127fe27d360bbf6d410ea9d33d6003ab455cd8b9e5521c00db9bb6c44a7472ccf2083d51034bab5ffc5aef85db36fc758c76b02fa31f0d0024c9d532548a2bf9ca
-
\??\pipe\crashpad_2312_WVUPQRDQTDCPQUHLMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\crashpad_2460_GBYHWIIFXXTRMAKKMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\102.286.200\edls_64.dllFilesize
449KB
MD579d7f318441c21d17739e43990697d1d
SHA19683265bf401d11313b768dfc4b3aeb10015d18c
SHA2560ce49dc9f71360bf9dd21b8e3af4641834f85eed7d80a7de0940508437e68970
SHA51267c7a7d3bbadeff21951809d2f843311328771ed46bc1ca14edba486263f56f86922668dd89d11b05a16130380b7543f7c9556d79503c505807407763e9d3595
-
\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\102.286.200\em000_64.dllFilesize
37KB
MD5f8b7cac6e9587baabf4045c34890c7ce
SHA161814262c6ee5ceaab2c0263c913cae52e203af7
SHA2568b0613b91229c98dfa5398568a4fa40dde2a2d40028654f74923bc929d6b5b30
SHA5124f80021fa2a6e6bd3cdd8248d6139d105dca984a914184d5b1e251e97daa77e36c4e059ed3a617ad12dd998eb603accd34ef3951261ad997a081d8ac934b6211
-
\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\102.286.200\em001_64.dllFilesize
378KB
MD57adcb76ec34d774d1435b477e8625c47
SHA1ec4ba0ad028c45489608c6822f3cabb683a07064
SHA256a55be2be943078157b7d1cfb52febd4a95e4c7a37995bb75b19b079cc1ee5b9d
SHA512c1af669ee971b4f4a3bb057fe423a63376cfc19026650036b29d77fed73458d235889a662ac5e12c871c3e77f6fbdb1fa29c0dfa488a4a40fa045d79eb61e7c4
-
\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\102.286.200\em002_64.dllFilesize
2.2MB
MD53a5093644dd4071aba6916c76bd5a5b5
SHA149ccbdb0de90f80e35dfd0077873a1a49a63a7b6
SHA25688e899e431baa41906f067af6b609d20b7af35639fa48de64b298f53183d0f56
SHA51291dc2c63203c4694f8fbadba5e52cbd803a7d20cae71f673f674dcba25069905e12d820a3202a33153a8f19318fe1107f1f4baccf52d4ce5961d2fcb958a9dd6
-
\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\102.286.200\em003_64.dllFilesize
1.3MB
MD5cce9db3ce5cbac028584bebfd4d6dccc
SHA19f1cc4cba0491c759eca8dcad2777b3f2c012871
SHA25681c2092dafc14b10a92bbf1644f592d5fad8ee0b77100611aa2c9e32bac6b604
SHA512e1b4c6e3c3ba0018c19a4f6a55177e7e55a99b4a8ebebad0d9d891dfb1bd0c4589d95dac54857f1176e00dde635648a1112ea0e6a1efb626be2654de2f2e21e9
-
\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\102.286.200\em004_64.dllFilesize
6.1MB
MD5ee46beaa6c9244880e8a510d080b4416
SHA1a83c3946a2f53f064e91d8b60d5f6c697a560062
SHA256d4f17bd032ead2a73340e6c14e24a3fa901d0fbae78f49fe4d368a01b788b49c
SHA5124e69dddd1215b1675bac788996019ef3cb22418fbba75c0c7935dafb2b1742bad79cc9ea6814b5f8d1663657a7987499a155cdf57733d1afae42b0e25d475c25
-
\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\102.286.200\em005_64.dllFilesize
576KB
MD5169a2ef320119891cf3189aa3fd23b0e
SHA1de51c936101ef79bbc0f1d3c800cf832d221eef8
SHA2561072d49da0a70640fb9716cb894f4834ff621ca96d4aea1f478754edf4d0f780
SHA5127fe27d360bbf6d410ea9d33d6003ab455cd8b9e5521c00db9bb6c44a7472ccf2083d51034bab5ffc5aef85db36fc758c76b02fa31f0d0024c9d532548a2bf9ca
-
memory/2312-128-0x0000000000000000-mapping.dmp
-
memory/2396-158-0x0000000000000000-mapping.dmp
-
memory/3824-138-0x0000000000000000-mapping.dmp
-
memory/4580-132-0x0000000000000000-mapping.dmp