Analysis
-
max time kernel
139s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12-01-2023 04:19
Static task
static1
Behavioral task
behavioral1
Sample
launcherfull-shiginima-v4400.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
launcherfull-shiginima-v4400.exe
Resource
win10v2004-20221111-en
General
-
Target
launcherfull-shiginima-v4400.exe
-
Size
5.4MB
-
MD5
c3db052da531710367faf5e011475715
-
SHA1
46f599e4e1ece582006739debe0a522925a9cd13
-
SHA256
7c6220b046553f9c95b8098ff83bfc6b7828093650becbc1b44e3d7819d7efd1
-
SHA512
67bfb67b36dab91e37b1ada7fbd688dc39cf19c337e3938d1f7e4f47173b7dc9d0b93dc035d6511ce65b8fe44384bb9cffa9953e97c6fffadb29fd561eec7feb
-
SSDEEP
98304:qpTJ89MMbcZsgsDlilods/txVGHTJKsTnEFnAzvDfBzXEYNsJ5Ono:aTm9MMbcFililB0HdRTnEFnAzlEQsJ5H
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\java.com\Total = "42" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\java.com\Total = "209" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.oracle.com\ = "42" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.oracle.com\ = "57" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000418445679f282844823cca6076dc469c00000000020000000000106600000001000020000000b95de396963f48305c90ce77940d2943f105db71af99a7b7a4e7724597634223000000000e80000000020000200000007f7390ae19942e508aa43f595cc7ec67feb84beeed8e3b0072d2b58ae4315fc12000000065154afbe9921d279d9f46985ff153b6dbf9fa72c8de13bc62ae12733b42471b40000000a928411407bb2bfe860d97686bd4f8712fbedb299f1b051fc28539739d79ac2b298b9f9654990354054b6796ba2f9881e8000f585e938c7ee58667454fdc2dd0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.java.com\ = "42" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.java.com\ = "22" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "18617" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.java.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\java.com\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "42" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\java.com\Total = "224" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\java.com\Total = "229" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "380265847" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\java.com\Total = "22" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\java.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "224" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.java.com\ = "224" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "209" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "266" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\oracle.com\Total = "18408" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\oracle.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EDB5CD21-9238-11ED-AE30-7E4CDA66D2DC} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "231" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.oracle.com\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\oracle.com\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "22" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.java.com\ = "209" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.oracle.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\oracle.com\Total = "57" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.oracle.com\ = "18408" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\oracle.com\Total = "42" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "229" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.oracle.com\ = "22" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\oracle.com\Total = "22" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "251" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\java.com\Total = "122" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.java.com\ = "0" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1164 chrome.exe 1964 chrome.exe 1964 chrome.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 1776 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1776 AUDIODG.EXE Token: 33 1776 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1776 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 304 iexplore.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe 1964 chrome.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 304 iexplore.exe 304 iexplore.exe 1208 IEXPLORE.EXE 1208 IEXPLORE.EXE 1208 IEXPLORE.EXE 1208 IEXPLORE.EXE 304 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1596 wrote to memory of 304 1596 launcherfull-shiginima-v4400.exe 27 PID 1596 wrote to memory of 304 1596 launcherfull-shiginima-v4400.exe 27 PID 1596 wrote to memory of 304 1596 launcherfull-shiginima-v4400.exe 27 PID 1596 wrote to memory of 304 1596 launcherfull-shiginima-v4400.exe 27 PID 304 wrote to memory of 1208 304 iexplore.exe 29 PID 304 wrote to memory of 1208 304 iexplore.exe 29 PID 304 wrote to memory of 1208 304 iexplore.exe 29 PID 304 wrote to memory of 1208 304 iexplore.exe 29 PID 304 wrote to memory of 1208 304 iexplore.exe 29 PID 304 wrote to memory of 1208 304 iexplore.exe 29 PID 304 wrote to memory of 1208 304 iexplore.exe 29 PID 1964 wrote to memory of 2036 1964 chrome.exe 35 PID 1964 wrote to memory of 2036 1964 chrome.exe 35 PID 1964 wrote to memory of 2036 1964 chrome.exe 35 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1544 1964 chrome.exe 37 PID 1964 wrote to memory of 1164 1964 chrome.exe 36 PID 1964 wrote to memory of 1164 1964 chrome.exe 36 PID 1964 wrote to memory of 1164 1964 chrome.exe 36 PID 1964 wrote to memory of 2024 1964 chrome.exe 38 PID 1964 wrote to memory of 2024 1964 chrome.exe 38 PID 1964 wrote to memory of 2024 1964 chrome.exe 38 PID 1964 wrote to memory of 2024 1964 chrome.exe 38 PID 1964 wrote to memory of 2024 1964 chrome.exe 38 PID 1964 wrote to memory of 2024 1964 chrome.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\launcherfull-shiginima-v4400.exe"C:\Users\Admin\AppData\Local\Temp\launcherfull-shiginima-v4400.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://java.com/download2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:304 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1208
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1568
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4641⤵
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef63f4f50,0x7fef63f4f60,0x7fef63f4f702⤵PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1364 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1028 /prefetch:22⤵PID:1544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1776 /prefetch:82⤵PID:2024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2116 /prefetch:12⤵PID:1292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2056 /prefetch:12⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3316 /prefetch:22⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3492 /prefetch:82⤵PID:2208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3664 /prefetch:82⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3872 /prefetch:82⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3912 /prefetch:82⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3940 /prefetch:82⤵PID:2324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3948 /prefetch:82⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3916 /prefetch:82⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4404 /prefetch:82⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4520 /prefetch:82⤵PID:2360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4496 /prefetch:82⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4552 /prefetch:82⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4540 /prefetch:82⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4528 /prefetch:82⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4676 /prefetch:82⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2008 /prefetch:12⤵PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:2900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,12256332781407525398,7419757027508841092,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:1752
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_A30EA9B4E1BC5DBF09A8EF399E086D27
Filesize471B
MD5ca1a34805a6c00dd9e1ef3e083cec05f
SHA149d47a87253ffe06953df7fac28939ba9acff00f
SHA2569dc7b7f6ffe9c069e31d88bfffaf8cf66795830b459375c34aa0ca44a270bd7a
SHA512e487c08505ae060fb9552554a8685d64127a31dfff36621b5e5a6663f422abe42485aa94ff59a709fffde9c85894ccbfc7762fa7686a97a6f438505fd9b969c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD503c43ce055f8989a6508481c8acb6608
SHA13dc33276158435396c4272531a62707a18a4a875
SHA2561e977bad400e43c86966889b895bbf3b00b929b4bf497c791ad0ed2a0749fd3e
SHA512fb69a674b2c2aa697a7c1fc94490298949831762d9d9612266314727ea85f84035df089f62e1aec24474caa1fc52fc94ea704d161335d37c1cf746c72af1f8ab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize471B
MD5b3d89d9661c98d590d789f7b5d65bc11
SHA181135996a1e8f2ace15cf3420f9ad968b0d616d7
SHA25632570e9ec35591b6579aabbb98ad79cfd9edec80a6526e704530133a5df3a0ba
SHA512c7ef12e408f9ffc6e47eb69278d65f484c09bf7c1f5fa5d79534f74115151a85aed2c0cd1601d3681194472074d9a0b1ad957470233f78fc5bc28d644b68ce0a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_ADE4E4D3A3BCBCA5C39C54D362D88565
Filesize471B
MD5817168bbd74c74f402a2b311fe5fa2ed
SHA1c1302bf9f089a82c3165103c024e9481fb74a6f2
SHA2563de7820145113b0cc3618840d6d665f3c151e3c9adc71a69895e7dd190d19e19
SHA512e6241bb5ad62ee6509f9f4ea4a629d34b320179262a21bd8cf4a48c6ac8c1240811332425a394ad0499e539b5319698b3cd35a0d73df3af8daa1eaae3b9c202a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E573CDF4C6D731D56A665145182FD759_802F9FA951B1DA9CEF4B352ADFCBBA1D
Filesize471B
MD5e3b4b96471574736b69661dcb87d4ba4
SHA1ad02ab22a67726a1911cef5e566595f71685c4a9
SHA2560efa529e8b66ba75eb79bf7ec20b564d27df700f61ad7c62a1311daae8c6fc11
SHA5120c278c7f652f32c55b1f723165f81ce1600c2c9d03ebe32eceb851d2fdcada73268b2a204d51b03e01bfa033a75a123bf452fb6b2f2bc2afdaa7c30f2f432b6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E573CDF4C6D731D56A665145182FD759_E746E584744B423128B6E8E7B6F11DE4
Filesize471B
MD595bff8a370f9162b44cc75dfa883fa11
SHA1cd115cdea720e14167fa9bdcca8e0317c525ece9
SHA256a281f6e6fe50e50fe0dc2d1a6caa749f414eb5c616dfbdf91000dc23b2ded4b5
SHA51275e2ea0be2bc720d006bf447b0abaa15a835ea4ee4bdaad9b3c14c04a85e3def4dda71963bdfe3e97a333a430ae57d12e2ccc82fd1a323cdfc4be047e79c38a0
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_A30EA9B4E1BC5DBF09A8EF399E086D27
Filesize404B
MD5cc77e0eefc57fe1c547958b96c387f0a
SHA103fc2d692e6f6a3e82caa97a4a33b87c23aa9dc6
SHA256a50170c4b3f542a914a315a777f586b3eb4a4bebdc6d03d35737dcf1e25f0b1d
SHA512e7d2d6fc4cf6f3cb3c77474b2e099086bf59491c6e9eef5e8ff2a7fb8cc9a42715aa8f8825ff6f0421b08b313e4405d8559f5d62784b1e7b7619be4c55dce46b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5efe8105c32652815357aa2de70876658
SHA1de95ba064ada09f6f936bd49e42ea1f9ffd37072
SHA2564baa1ab63a028076ae5f162e02dd6f731bf0e557202505f15d2ae1b1a6ca8370
SHA512e778ed134d9064fee67b3976feb8f6bcb9ab72689d5613606f06d2849be3501de5830131abaf5a1a5e432aedce26f4cd83dfbe6fea94dfb7234747883e3ca384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD545955b9b332284604fc88bc4ecb8fcbd
SHA12c42112d6899ad1aa12ac896714118e0e47cf8ee
SHA2569928c88c0fc611c29be01d9f1ebc4aca442ef85624c8f12aba58d6ce8fa2998d
SHA51248b4a616d5f6db7e045d5a1a79f6b5017b510bb2cbf83eaf217a8c22becee344542ab25862d48bc55ad1d1e43573a87a776c04c78a6103bcedf225fb4d8f001c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize400B
MD5c26ecc877997de0be29f7be1957c33c0
SHA1113343647bdf32ad9cb6810366ad0925f30a7b1d
SHA2569e7db3a95f51a3ccfb4de73172c43b167f2dd70257a0bb004d3049bdeed7073d
SHA5122630abfbdfb0cd6bfd6ca52a265e1ba47632863fa455f6d85e197e07d32874989f6ecf8684172eb4d1f540a6995d3d930a9ab00248f2e2709d1939d22e0b0938
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_ADE4E4D3A3BCBCA5C39C54D362D88565
Filesize434B
MD59eefa8bbe9a6e2acf6f95a75afbf5646
SHA1d1178edf58ffe6d57dfbef331e06a888847c16d6
SHA256c9d14eca400b0717cef2e03a0c6df278bf2c1085d0d0c58fbd1f2e58525eb7f6
SHA51287f0ca66315805ab2e81f185e1926c4699fb532e08e900401cf32db79faf914cb8d6e44c4c6f5e5b640aed4399f60168f1f6056a8f1aa04dbec6319498a5869e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E573CDF4C6D731D56A665145182FD759_802F9FA951B1DA9CEF4B352ADFCBBA1D
Filesize430B
MD56d08444a3215b3dc3fa16bd67e0ce889
SHA185fb883572860911e82c44977b2856870e7db446
SHA256bfa67c8b82a024fdd72dc7f1219dc63441586d9c7da09385e96c45b298c9a5e8
SHA512435805f875ffb89439d6c1b576c4740d3e6858a54ac94f954ec4352918c27563cc3c38da0cb84b5737002a34ac2bda52915d28f333b59401033f616e524ca90c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E573CDF4C6D731D56A665145182FD759_E746E584744B423128B6E8E7B6F11DE4
Filesize430B
MD56676f7eda8734da102d96033d41cb1a1
SHA1a7b5724319e9112c8f6a795243c82d2710c41cd9
SHA2569ccb3fb16276f024735f1b4839ad3bcf569e86c2641045d1b266a1afa524238b
SHA512f19f81c1e9b517af3e5ec8ad11839f665013a006be62a6094dafdec8c15aa79f88fb76668155e52808863059e634595716267ba2ef3a214e35d9cfed0d12671a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ec4d9ca9dd19b63bc747846894fddd5d
SHA10b8d1d1481089d2982fc60bf1862d2205e51edf5
SHA2562e1a42e4d8f67a7b5d57f91b85b452ba74335c1fc64da2786296ae79eea25c75
SHA512f385c3246f860e05b5e3c52841d9851d3e5af5c18825a3a9a00978dd2cab9baa951ba4dbb4ff139106a76db2abadeaf752116fa4aeb2697f8ea3f82f10f0201c
-
Filesize
5KB
MD51ec32c6263931cea90d5f95143ef83f6
SHA129ba0af37de30840aaf6e053f9570b9caed0276e
SHA256977f4a969293170f123333c1b97bd27fab7f7015a0d0e6cf03d582ae569c5cf7
SHA5125608f67ad020dc9569aa267d25000c943c111f049f1fbd95f3eff22061b369693d67bf0d45864e7cb1bd5975624e00284386581f004797117e12f14dc623e765
-
Filesize
6KB
MD587e881a0fa4f92dbe6be16ec1845c821
SHA127a1d232acff4d1f771a185265366689f45e5fe0
SHA25625a34b8abb25c14d63da80cffdaf50d328b6c7aac4f35561e20ab09a6e665c98
SHA51297aade3da43c50942c45806ceab844112cddd29cc86f104e9e8b6ea81fd166a8818a1a6c0d9119c135425166402a51d39c24811ec9411581e8ee061ce4eceb10
-
Filesize
603B
MD53d8498805556def373e5fe3fd918eca5
SHA18e8043e8eee402013fb255e760673d7daee4c087
SHA256bedf7a93356771e17754c18c31a503759fb9b309c3b945797817a22439a7ac4b
SHA512028b3eef60523133bdff4b137363495cf3770700b5b908724f81c6ad8be18502eb2b951c1423a15cb8b0ee0f0241706c9783b1657ffb60299472049171717841