Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2023 17:35
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://click.alamode.com/?adcode=cpemaqm0913_1&url=https%3a%2f%2fxu8qyi.junkcarsquickcash.com%2f%3fregister=yw1lcnjpy2tayw50zxjvcmvzb3vyy2vzlmnvbq==
Resource
win10v2004-20230220-en
General
-
Target
https://click.alamode.com/?adcode=cpemaqm0913_1&url=https%3a%2f%2fxu8qyi.junkcarsquickcash.com%2f%3fregister=yw1lcnjpy2tayw50zxjvcmvzb3vyy2vzlmnvbq==
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2554804855" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006507d91124f95a4a8bd1d5fde8e8f2a90000000002000000000010660000000100002000000099a48b62564837a6b18a7e7e7d14d78a047ab84dd244e33aa2d2ea83e3c9e206000000000e80000000020000200000005e109ac1a13e89034166a59dce069a7bef0c2b362a247cb8b193e18fff204c57200000001991826b5656182aacd886f819421aa481fc471761b96211572e62848cbe07164000000014d9ce20e3678b0741f1e4fc5ad514e7af24e9dd6d5e91639fd76e9c1f7faccb59afec244cb5ba05675483d46a7a72af47fbbc779f5e592a0189dad4666f2662 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "391549084" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8042249ae48cd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2532106365" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31034596" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 7004139ae48cd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31034596" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2532106365" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{C21E4834-F8D7-11ED-ABF7-6E9A6C474791} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31034596" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006507d91124f95a4a8bd1d5fde8e8f2a900000000020000000000106600000001000020000000bc94d463ab6ee8aa20ccfd8a4da7159d34ed5d7c050b1218f46defbb11f42e6d000000000e800000000200002000000083f14a18e8a98f9a132cebec6dd113134b13c378f66056b6a8402481e980c67820000000c031b6435d9d7df99b1352abf0a915c7d61dd61cefc93e33cbb3ca1055a58ce540000000217d67772b11875d72f9faaba38955d10c1aab87142d32bfeb7be2243e0fb70e4a15e3b7bd979d6a4be711a824f204308a06ceec7adbce8b1c7f36dee93e5fff iexplore.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133292577396109090" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3076 chrome.exe 3076 chrome.exe 4548 chrome.exe 4548 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe Token: SeShutdownPrivilege 3076 chrome.exe Token: SeCreatePagefilePrivilege 3076 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1428 iexplore.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe 3076 chrome.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1428 iexplore.exe 1428 iexplore.exe 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE 2020 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1428 wrote to memory of 2020 1428 iexplore.exe 84 PID 1428 wrote to memory of 2020 1428 iexplore.exe 84 PID 1428 wrote to memory of 2020 1428 iexplore.exe 84 PID 3076 wrote to memory of 4896 3076 chrome.exe 99 PID 3076 wrote to memory of 4896 3076 chrome.exe 99 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4296 3076 chrome.exe 100 PID 3076 wrote to memory of 4272 3076 chrome.exe 101 PID 3076 wrote to memory of 4272 3076 chrome.exe 101 PID 3076 wrote to memory of 3684 3076 chrome.exe 102 PID 3076 wrote to memory of 3684 3076 chrome.exe 102 PID 3076 wrote to memory of 3684 3076 chrome.exe 102 PID 3076 wrote to memory of 3684 3076 chrome.exe 102 PID 3076 wrote to memory of 3684 3076 chrome.exe 102 PID 3076 wrote to memory of 3684 3076 chrome.exe 102 PID 3076 wrote to memory of 3684 3076 chrome.exe 102 PID 3076 wrote to memory of 3684 3076 chrome.exe 102 PID 3076 wrote to memory of 3684 3076 chrome.exe 102 PID 3076 wrote to memory of 3684 3076 chrome.exe 102 PID 3076 wrote to memory of 3684 3076 chrome.exe 102 PID 3076 wrote to memory of 3684 3076 chrome.exe 102 PID 3076 wrote to memory of 3684 3076 chrome.exe 102 PID 3076 wrote to memory of 3684 3076 chrome.exe 102 PID 3076 wrote to memory of 3684 3076 chrome.exe 102 PID 3076 wrote to memory of 3684 3076 chrome.exe 102 PID 3076 wrote to memory of 3684 3076 chrome.exe 102 PID 3076 wrote to memory of 3684 3076 chrome.exe 102 PID 3076 wrote to memory of 3684 3076 chrome.exe 102
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://click.alamode.com/?adcode=cpemaqm0913_1&url=https%3a%2f%2fxu8qyi.junkcarsquickcash.com%2f%3fregister=yw1lcnjpy2tayw50zxjvcmvzb3vyy2vzlmnvbq==1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1428 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b14e9758,0x7ff9b14e9768,0x7ff9b14e97782⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 --field-trial-handle=1812,i,16236605057672300612,9881191058241674658,131072 /prefetch:22⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1812,i,16236605057672300612,9881191058241674658,131072 /prefetch:82⤵PID:4272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 --field-trial-handle=1812,i,16236605057672300612,9881191058241674658,131072 /prefetch:82⤵PID:3684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3196 --field-trial-handle=1812,i,16236605057672300612,9881191058241674658,131072 /prefetch:12⤵PID:3420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3332 --field-trial-handle=1812,i,16236605057672300612,9881191058241674658,131072 /prefetch:12⤵PID:3996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4512 --field-trial-handle=1812,i,16236605057672300612,9881191058241674658,131072 /prefetch:82⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4676 --field-trial-handle=1812,i,16236605057672300612,9881191058241674658,131072 /prefetch:12⤵PID:1252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4836 --field-trial-handle=1812,i,16236605057672300612,9881191058241674658,131072 /prefetch:82⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4644 --field-trial-handle=1812,i,16236605057672300612,9881191058241674658,131072 /prefetch:82⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4512 --field-trial-handle=1812,i,16236605057672300612,9881191058241674658,131072 /prefetch:82⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4644 --field-trial-handle=1812,i,16236605057672300612,9881191058241674658,131072 /prefetch:12⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4640 --field-trial-handle=1812,i,16236605057672300612,9881191058241674658,131072 /prefetch:82⤵PID:5132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4852 --field-trial-handle=1812,i,16236605057672300612,9881191058241674658,131072 /prefetch:82⤵PID:5144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4856 --field-trial-handle=1812,i,16236605057672300612,9881191058241674658,131072 /prefetch:82⤵PID:5272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=4912 --field-trial-handle=1812,i,16236605057672300612,9881191058241674658,131072 /prefetch:12⤵PID:5412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3208 --field-trial-handle=1812,i,16236605057672300612,9881191058241674658,131072 /prefetch:12⤵PID:5548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3520 --field-trial-handle=1812,i,16236605057672300612,9881191058241674658,131072 /prefetch:12⤵PID:5568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=4820 --field-trial-handle=1812,i,16236605057672300612,9881191058241674658,131072 /prefetch:12⤵PID:5764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=5488 --field-trial-handle=1812,i,16236605057672300612,9881191058241674658,131072 /prefetch:12⤵PID:5936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3540 --field-trial-handle=1812,i,16236605057672300612,9881191058241674658,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
503B
MD5cb482430a184eb85d8f4364ccd48c1c1
SHA1a193e800e7f80ee164ce63330e8d54e50d864e49
SHA25698bc6343dbe14740a3c7fb4d49a96770217efb483ed1442e5d55c54bfdac16fe
SHA512776d5bfc7037022d11aa2a586dc1c40844a77ce4983933c6478a7b20146cb1a7d939492d0eb4ad275845132bee7026d8b04eb33da9c156086db588abf6325e76
-
Filesize
717B
MD560fe01df86be2e5331b0cdbe86165686
SHA12a79f9713c3f192862ff80508062e64e8e0b29bd
SHA256c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8
SHA512ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5931ac31f82e01c4a5ed27d29ed4ac208
SHA13c0e857f02516e94d3086ec277790e5c2c4bebf4
SHA25625f80b41222c619107eebc45f57f927f46cdd4fc8370183857e6893015437a60
SHA512a21065c11a9054ae76793859dad589aff47cb98ed0557bdb334ef1c216038635c3b5841406a21969af77775334e316989f29195beb415f7fdd409f53b6589ec9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\06408A7309A358E6BE5923EC0D109D5F
Filesize548B
MD5fd683abe1d4bb931fd6d15ebe39889d0
SHA1000d54ecfe0103dc7cbc91fde7c40efb1c555d2a
SHA2561142b19c896b583101d16996efaed1bd3ea282355ee584418c2579b6092cc27c
SHA512ce70711ba943e46f9700e4dc6f254bd40bf79c95b1659a467d1bced3d11e12364791e54f1828557417e6a621a6f17712fc6c8e877a77abcdb3156c06ea4d844f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD501cad9677830bf22159a77cea9699177
SHA1a50dd1a75cddc76de7ec1d383bcd1be93e37a67b
SHA2562acb718cdb17489dd1ef6e47500a59cccdc12980935775652bba6fd4520a1a70
SHA512492e35db7166ad155d9c6e4317f754beae7f6090df516359bd62e21d4c30fdb15bb5030fbfce38bb7f3e74884bc5157c6168633d4e36ade84f4c4ee0aab5c586
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5ce22378c7465fbb31b79441bda7cfe77
SHA14980311622590998fd676a1d3fa10d3e4bb88d27
SHA256ef73be55b377129407b30070d5a116f2004752252cbb69e8876c8f108df8d00b
SHA51295cd875abe9eadf2cc59e785514771cc21ac18186b304c2c50347f5beddca39d47e81e9969c75f50e961b56b197307223d9fc9ea570e36f3c379ad206cbf1a9c
-
Filesize
336B
MD58607faa70172ab9bb5dd3a1c12717ed6
SHA1a50cd2e25879893e9b094c6bac52bb2b033454c7
SHA25664e42c2fbab517bf9e5e4cf7e3bd5e125d31702767737dfb578dcd5842a122a5
SHA512929b0a485450acdf80a7ae414c86bdfaf775724a2998ce56ca0bc56d97a8170cb43f40d43a36652effbf7d1d7bf835afc866fd379a2c406604e1a66ba9d0b1ea
-
Filesize
2KB
MD5c49905a464b4e40218ee6b223b7c2fda
SHA17eb1b9014dadeea3f58164e6e4a34c90e2a91808
SHA2569b0a0d87f2b29704737e9680337076d45e2eb30a707b0c67e2380be483d1ace6
SHA5126db95fb8a3fb7097e91a03d99551c20814f287160a7e0509b9091024b16c628a810319183372cb28ec5d5b1a0c0a92a180309c598c110b421b9710120c2f9791
-
Filesize
539B
MD5459bf6069962b9d74b188acd1940724a
SHA1a9dce6cfc3c064eb3da81e389fbb224d1721cf70
SHA256810dd1895400709be086f61f28a5c010b522f657c947b26e5f0aae81477845f2
SHA5127a80886c7b91ac729ab74e06c6d5b476dee7df0d4bbbec401cc3c53664c9c3e37c0d7fa94e2de65e92484e36c8c79be31d09c34cf726d9e22440ab4565903994
-
Filesize
706B
MD5e34264ace5bb88f11a2883ba4c0d8e5f
SHA19df4122c0d7c3a93fe645c88cc93c3fbda90f7cc
SHA256ac769c37d10201af7f913d06b773e036dde391b6fe9c71d91bb6fa502289b1c3
SHA5125894a755b6d3fe4e49e047ce0a9b03839051f59bf5f393b0b8620c8a234ba9eb5b51f8535cefe4e089610dcb1c2b2a4ce41a4ebbb63cd63da5f88f15574c9c35
-
Filesize
706B
MD546b15138931dd73e6ebbf6e3b2f4f615
SHA1291742e97bd543894411e8ec008b923e96c57d38
SHA2569695474130850b0e1835d51fc02eef1786fc9613ba8ec4ef0918146b4c9bd818
SHA51258ec76811cadf2562cdb0c016630310fe0084958a7978eef1e2f93a93e6370008e917afb177a65ec34773cc58d25306a964dd9789d63043d779a2f441a208f84
-
Filesize
6KB
MD5e4193ffabfe6a76b9ab0585b2113a875
SHA1f6976a98f40c85c93fd2a544dfbaa997577da06e
SHA2561b56599c09eead5fa9a054de124154aa0ddf2f93e7f8592c293aa8150623d635
SHA512d56541021ceb79df5af8a2422987a002ca7b2c6deb2290c5c580d70400699b8a8cbc754b879c1c96e255a35afd37ae73e60f57067e9752a35fb0a7a9c4835b5f
-
Filesize
6KB
MD547733d8db786cfec1758d08f3c9c0f84
SHA13ff2f38e05358efa768e4a1e08c0d90d9dfd12aa
SHA256957054a2394252eae4e21d00dbd0f537f42cb3564ce9671c9776fd58e2012a7e
SHA5122e5408c8ae9116ce32edae491f608bb015080aeabaf94e9f601a859271e7e0877d8adbd96118a5b1fde69a8b9db177621c2f32109fcfe660b054d1d58a72782a
-
Filesize
6KB
MD5eef3db7616d73d4f7358e8c694091f58
SHA15aa682c5eeb4757f78c6d32a673b48fd2ae3654c
SHA256281743df5e43bbe732a886be07c9e08c0a2f85779acb2a3cd54cbc00e5a402b7
SHA512dc803361c6e36438bee167c30135b47ae8a384d49ef2d313a7c365e6ea97e18f1f91cda6701b8c52ed71e4512fe890e5abbc401aa70da9da04ab95f18b19b7ae
-
Filesize
15KB
MD54d9804f895406bd8ee8851ed7e03d403
SHA11f2a6fda8bbb5d6afd72be9a1abc41cc3d796870
SHA25618349a63d63f46587d9b228a1f5429f9c066f3cf1e18af32387902d49485b507
SHA512bf7d3a1f5c389ac090f8f12bf164db885d2e6edf3370f6f1fa738c92b50ea2ff85e2d9956440604f5c5adeb98c95ca50f28eb3c78ccbe8f05f4d44f5ee3f7bf6
-
Filesize
151KB
MD552f649e6b2ca14fffeee19344e75e5db
SHA1c35f791c1dfc793f71b3a85c887cbd47eb91f4b8
SHA256e65a373c0036e17781d477d0727c6e82b0ff49ddf53567addc54c4792fb54bec
SHA512b28300f6fbf1258c6f584f3e048429fd0bcd54568fbfbb78dbf07d897aa9de80957cbab169d2bc2893cfdb2199ec0e3a85595bd732b1fc1d6fd4e9f0737516ed
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee