Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
21-12-2022 15:29
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/bbambiku/promo-gen.git
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
https://github.com/bbambiku/promo-gen.git
Resource
win10v2004-20220812-en
General
-
Target
https://github.com/bbambiku/promo-gen.git
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003bad9e5810411a41b405bdc87c3b0eb8000000000200000000001066000000010000200000004f61df9e488a3bc6a3b6ba2c28192b6c6ef85dda8dad49769e4440cb95f9c810000000000e80000000020000200000000a378f79875a975cb7538885a8101a77c9914324cc12b626cffb18a4e44ca7f260010000ee9f651c269008ce4e52b77563c1a2de8e2375d4818aa2403fe6df455136074759908d51fe5d3da6f7a27aca4f6eb22f69a8569637c0f22aa16966a669a4b0e643aedfed63118cbb1093fd1e6055eeda55cd291c6c4fa41aa314ae58a2269462f8ba73153e8da87abf4cad9af8758143fc2652f1136849a30ec380c018d0f98304854d47b2a7e5f8070342c5481265bb38a5107958ba58a42ce38b7f3286323d359ed27dbd8e7c66a1ef36c677cca423afd21b060560217273016e50867f4c114ef2ccc4f056d3e3b6a7d5b0298cba717ce4c2310ced1cbafac40968e36aa393e8b2ab516ce73882ff7de80e3fe49d70dd03e04c96fb2e13810b096d4939eeaad0c2ff00233d7c4ab23be3a15740aa88d9448d2204987fa8a1709ca9468a21f8052354965409728cde6e410bd78b026c98d23e5faf12121ea0f154bbd4b538224da3610b3af2f2ba73e8efb994f2eff5a8426f122035b83be49f11c61f080670400000001e1ae822dc0b79719949cd68dc2b62b6a77f8d16e4420320729a9479a4b31153806b75a4beead8f6cdc75c1cc5ab7ad94a530a66d1732caa1444c6b8bd889975 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 0083ad8a5915d901 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003bad9e5810411a41b405bdc87c3b0eb8000000000200000000001066000000010000200000001caadb776786b8aa67aa3d0140d118fe15da24ac22625913dcc2e7b13144e210000000000e80000000020000200000008074e8c38384acf53c3303af5385366ae2139e76eb07eeaf254d09e488573a79200000007d8a4b55d0fe1eb2c0d1e19d8bb7b12b774ba7f4e37b11dd3456b0437e287ab440000000527bcfedd53e7f49256ad4666e884c77696a2b759ed96f4a4ec094ffdf46b619e319e71b5b297c13ea2442ab1ad8cb048690f2b225b8b5863e0581b8a663759b iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003bad9e5810411a41b405bdc87c3b0eb800000000020000000000106600000001000020000000dad65f6973525c0bf01aea8b844e03706a78f8eb9be10a327ecd38684e386410000000000e8000000002000020000000396702e6203c433ebf74089c4a7082a09647b8d861cda891dfef140c3deb1b9f9000000014f66e0278ff9363c851e6e5ce35e3d0413e780b2d00606e0c91f65cf633832a84743af8baa929b1741cd9c30a9ad4d2d135780f9a7c5971403b60a0297d0e025e67d4e9d8b1717334ea991d8a6d0e2b2d573d05205225b93925f66c9291e21e65242e0dc3284370dc8c427dae384bd28bef799257bc68e230061e7034056b85f06406e276dcfb5bac0b79ef7bb55d48400000007cba2cfbfed100f487ac69202f055077b718e93db5f464fcbd99364940f7ce208debcaefb1176aa4a0b796c6be684b94ae3e3adbff0f33a0eb54bed5e6c73ed0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B176BD81-814C-11ED-A5FF-56A236AC5043} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff5f0000000e000000e504000073020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "378405166" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1412 chrome.exe 672 chrome.exe 672 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1484 IEXPLORE.EXE 956 iexplore.exe -
Suspicious use of FindShellTrayWindow 54 IoCs
pid Process 956 iexplore.exe 956 iexplore.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe 672 chrome.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 956 iexplore.exe 956 iexplore.exe 1484 IEXPLORE.EXE 1484 IEXPLORE.EXE 1484 IEXPLORE.EXE 1484 IEXPLORE.EXE 956 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 956 wrote to memory of 1484 956 iexplore.exe 29 PID 956 wrote to memory of 1484 956 iexplore.exe 29 PID 956 wrote to memory of 1484 956 iexplore.exe 29 PID 956 wrote to memory of 1484 956 iexplore.exe 29 PID 672 wrote to memory of 472 672 chrome.exe 32 PID 672 wrote to memory of 472 672 chrome.exe 32 PID 672 wrote to memory of 472 672 chrome.exe 32 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1480 672 chrome.exe 33 PID 672 wrote to memory of 1412 672 chrome.exe 34 PID 672 wrote to memory of 1412 672 chrome.exe 34 PID 672 wrote to memory of 1412 672 chrome.exe 34 PID 672 wrote to memory of 1744 672 chrome.exe 35 PID 672 wrote to memory of 1744 672 chrome.exe 35 PID 672 wrote to memory of 1744 672 chrome.exe 35 PID 672 wrote to memory of 1744 672 chrome.exe 35 PID 672 wrote to memory of 1744 672 chrome.exe 35 PID 672 wrote to memory of 1744 672 chrome.exe 35 PID 672 wrote to memory of 1744 672 chrome.exe 35 PID 672 wrote to memory of 1744 672 chrome.exe 35 PID 672 wrote to memory of 1744 672 chrome.exe 35 PID 672 wrote to memory of 1744 672 chrome.exe 35 PID 672 wrote to memory of 1744 672 chrome.exe 35 PID 672 wrote to memory of 1744 672 chrome.exe 35 PID 672 wrote to memory of 1744 672 chrome.exe 35
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/bbambiku/promo-gen.git1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:956 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef57d4f50,0x7fef57d4f60,0x7fef57d4f702⤵PID:472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1104,10223125020637637763,9155155293971428631,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1116 /prefetch:22⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1104,10223125020637637763,9155155293971428631,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1308 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1104,10223125020637637763,9155155293971428631,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1832 /prefetch:82⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1104,10223125020637637763,9155155293971428631,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2024 /prefetch:12⤵PID:1552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1104,10223125020637637763,9155155293971428631,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2096 /prefetch:12⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1104,10223125020637637763,9155155293971428631,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2956 /prefetch:82⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1104,10223125020637637763,9155155293971428631,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3312 /prefetch:22⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1104,10223125020637637763,9155155293971428631,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵PID:2156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1104,10223125020637637763,9155155293971428631,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3376 /prefetch:82⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1104,10223125020637637763,9155155293971428631,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3640 /prefetch:82⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1104,10223125020637637763,9155155293971428631,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3408 /prefetch:82⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1104,10223125020637637763,9155155293971428631,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3744 /prefetch:82⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1104,10223125020637637763,9155155293971428631,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3776 /prefetch:82⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1104,10223125020637637763,9155155293971428631,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3692 /prefetch:82⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1104,10223125020637637763,9155155293971428631,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3672 /prefetch:82⤵PID:2504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1104,10223125020637637763,9155155293971428631,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3588 /prefetch:82⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵PID:2372
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef57d4f50,0x7fef57d4f60,0x7fef57d4f702⤵PID:2384
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f19f706f4377177f63ada42599aac44b
SHA15721255244d7e69353263b80b30695bfcf68675b
SHA25684de22d284a858f487bf9cf654dd8d9c7ff2d3d47c878c7c78201a63291e34bb
SHA512af2fb38d8d66587c4f6989a459fa397340c8079b5bdfdaf681649b928d60d0e25b4f4bbe1579af15c67dcd25d8f925434022e80242eb609a8fd4bc7d5b35fa61
-
Filesize
40B
MD5e2bef241a62ab33280f991285ff2da5a
SHA114b6eca7e1ba753b1922dcdc32fe7e564b81f4d9
SHA2560ec0fa954061b903ef702d74e6a9622baf6e325a80403d5f21dce2b7cf368fb6
SHA5127ab359d434979331bb2c77d9370cb8ef7a707aaaddf4ff908a5e10b8f777c989ef02891e32eeb842f745d2d2096d8dfa3ece5fcbee63c6c1d4b4a060cbdae0aa
-
Filesize
40B
MD5e2bef241a62ab33280f991285ff2da5a
SHA114b6eca7e1ba753b1922dcdc32fe7e564b81f4d9
SHA2560ec0fa954061b903ef702d74e6a9622baf6e325a80403d5f21dce2b7cf368fb6
SHA5127ab359d434979331bb2c77d9370cb8ef7a707aaaddf4ff908a5e10b8f777c989ef02891e32eeb842f745d2d2096d8dfa3ece5fcbee63c6c1d4b4a060cbdae0aa
-
Filesize
1KB
MD5ccfd39bfa912eb9a0b8f7fc69e205018
SHA1b8ea98a01656da67f22cb596fe6a83ec064f4621
SHA256d3bfa0fdab6457f23f025840c3538477f34a82b1c380828eda8c0f38325558da
SHA512152d6051a73418230cbc43002cdfd63fc1fe3210cb4bf40ed0ec8f20ff6fa3d4467551218ef7afc04ed32fbff57fe16bf9b1a21ae6134e6c35df7898491ce231
-
Filesize
608B
MD543805d591f264b5860687600b8f40972
SHA1b3760ffc8c4dcf967c76120e5caa078e8874988d
SHA256db65ae2292c1087ca362f407c98bcb40cf2f2bd8d694d257284e6c126e2bfd9d
SHA512703da0fc0c3da3a741f740e1d37f34426f41faa1bc608a2bd23c6f1a95b23b4c177a179b6b6421fe2b380d9b008e82004ab4e141e2510ce17287e0a1e5d612d9