URL:

https://massgrave.dev/

Full analysis: https://app.any.run/tasks/f1fbe288-0b94-48e8-80ca-0bec5237ee58
Verdict: Malicious activity
Analysis date: March 11, 2024, 09:47:03
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

5C95876F594CFFB1178B8861F8C741E0

SHA1:

4F3DD1555BACB0851AD877F9B40BD8DCC884A71D

SHA256:

6019AF861964CFB41AE5A5FE576ACA4521AFBA41255E5C636B1F53DFA0B6BE7F

SSDEEP:

3:N8a0Kn:2a0K

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts NET.EXE for service management

      • cmd.exe (PID: 2108)
      • net.exe (PID: 3104)
      • net.exe (PID: 2152)
      • cmd.exe (PID: 896)
      • net.exe (PID: 3484)
      • net.exe (PID: 2616)
      • net.exe (PID: 1768)
      • net.exe (PID: 1020)
      • net.exe (PID: 1852)
  • SUSPICIOUS

    • Executing commands from ".cmd" file

      • powershell.exe (PID: 2260)
      • cmd.exe (PID: 3984)
      • powershell.exe (PID: 3556)
      • cmd.exe (PID: 2108)
      • cmd.exe (PID: 1796)
      • powershell.exe (PID: 784)
      • cmd.exe (PID: 896)
    • The Powershell connects to the Internet

      • powershell.exe (PID: 2260)
    • Reads the Internet Settings

      • powershell.exe (PID: 2260)
      • powershell.exe (PID: 3556)
      • WMIC.exe (PID: 3420)
      • WMIC.exe (PID: 1388)
      • WMIC.exe (PID: 1348)
      • WMIC.exe (PID: 3956)
      • WMIC.exe (PID: 2572)
      • WMIC.exe (PID: 3692)
      • WMIC.exe (PID: 3720)
      • WMIC.exe (PID: 784)
      • WMIC.exe (PID: 3272)
      • WMIC.exe (PID: 1692)
      • WMIC.exe (PID: 2028)
      • powershell.exe (PID: 784)
      • WMIC.exe (PID: 2580)
      • WMIC.exe (PID: 3508)
      • WMIC.exe (PID: 2192)
      • WMIC.exe (PID: 3420)
      • WMIC.exe (PID: 2856)
      • WMIC.exe (PID: 2496)
      • WMIC.exe (PID: 3708)
      • WMIC.exe (PID: 1740)
      • WMIC.exe (PID: 1976)
      • WMIC.exe (PID: 1348)
      • WMIC.exe (PID: 1836)
      • WMIC.exe (PID: 2100)
      • WMIC.exe (PID: 3324)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 3984)
      • cmd.exe (PID: 2108)
      • cmd.exe (PID: 2036)
      • cmd.exe (PID: 3932)
      • cmd.exe (PID: 3608)
      • cmd.exe (PID: 1796)
      • cmd.exe (PID: 896)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 3984)
      • cmd.exe (PID: 2108)
      • cmd.exe (PID: 1796)
      • cmd.exe (PID: 896)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 3984)
      • powershell.exe (PID: 2260)
      • powershell.exe (PID: 3556)
      • cmd.exe (PID: 2108)
      • cmd.exe (PID: 1796)
      • cmd.exe (PID: 896)
      • powershell.exe (PID: 784)
    • Application launched itself

      • cmd.exe (PID: 3984)
      • cmd.exe (PID: 2108)
      • cmd.exe (PID: 1796)
      • cmd.exe (PID: 896)
    • Unusual connection from system programs

      • powershell.exe (PID: 2260)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 3984)
      • cmd.exe (PID: 2108)
      • cmd.exe (PID: 2588)
      • cmd.exe (PID: 2656)
      • cmd.exe (PID: 3608)
      • cmd.exe (PID: 1796)
      • cmd.exe (PID: 896)
    • Uses WMIC.EXE to obtain computer system information

      • cmd.exe (PID: 2108)
      • cmd.exe (PID: 896)
    • Uses WMIC.EXE to obtain Windows Installer data

      • cmd.exe (PID: 2108)
      • cmd.exe (PID: 3992)
      • cmd.exe (PID: 3932)
      • cmd.exe (PID: 2036)
      • cmd.exe (PID: 1124)
      • cmd.exe (PID: 3072)
      • cmd.exe (PID: 1880)
      • cmd.exe (PID: 896)
      • cmd.exe (PID: 2648)
    • Hides command output

      • cmd.exe (PID: 1124)
      • cmd.exe (PID: 2736)
      • cmd.exe (PID: 3564)
      • cmd.exe (PID: 3744)
      • cmd.exe (PID: 2080)
      • cmd.exe (PID: 3048)
      • cmd.exe (PID: 3400)
      • cmd.exe (PID: 2588)
      • cmd.exe (PID: 3024)
      • cmd.exe (PID: 3472)
      • cmd.exe (PID: 3056)
      • cmd.exe (PID: 3364)
      • cmd.exe (PID: 2796)
      • cmd.exe (PID: 3020)
      • cmd.exe (PID: 2808)
    • The process creates files with name similar to system file names

      • Dism.exe (PID: 2740)
      • Dism.exe (PID: 1888)
    • Process drops legitimate windows executable

      • Dism.exe (PID: 2740)
      • Dism.exe (PID: 1888)
    • Starts a Microsoft application from unusual location

      • DismHost.exe (PID: 668)
      • DismHost.exe (PID: 2728)
    • Executable content was dropped or overwritten

      • Dism.exe (PID: 2740)
      • Dism.exe (PID: 1888)
    • Probably obfuscated PowerShell command line is found

      • cmd.exe (PID: 3608)
      • cmd.exe (PID: 2108)
    • Uses WMIC.EXE to obtain operating system information

      • cmd.exe (PID: 3564)
    • Executes as Windows Service

      • VSSVC.exe (PID: 3724)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 896)
    • Starts NET.EXE to map network drives

      • cmd.exe (PID: 896)
    • Uses WMIC.EXE to obtain service application data

      • cmd.exe (PID: 2932)
  • INFO

    • Manual execution by a user

      • powershell.exe (PID: 2260)
      • wmpnscfg.exe (PID: 2172)
    • Application launched itself

      • chrome.exe (PID: 3672)
    • Checks operating system version

      • cmd.exe (PID: 3984)
      • cmd.exe (PID: 2108)
      • cmd.exe (PID: 1796)
      • cmd.exe (PID: 896)
    • Checks supported languages

      • mode.com (PID: 3248)
      • mode.com (PID: 3024)
      • mode.com (PID: 2864)
      • mode.com (PID: 840)
      • mode.com (PID: 924)
      • DismHost.exe (PID: 668)
      • mode.com (PID: 2124)
      • mode.com (PID: 1548)
      • DismHost.exe (PID: 2728)
      • mode.com (PID: 1548)
      • mode.com (PID: 1288)
      • mode.com (PID: 2756)
      • mode.com (PID: 2936)
      • mode.com (PID: 3488)
      • wmpnscfg.exe (PID: 2172)
    • Create files in a temporary directory

      • Dism.exe (PID: 2740)
      • Dism.exe (PID: 1888)
    • Drops the executable file immediately after the start

      • Dism.exe (PID: 2740)
      • Dism.exe (PID: 1888)
    • Reads the computer name

      • DismHost.exe (PID: 668)
      • DismHost.exe (PID: 2728)
      • wmpnscfg.exe (PID: 2172)
    • Reads the machine GUID from the registry

      • DismHost.exe (PID: 668)
      • DismHost.exe (PID: 2728)
    • Reads Environment values

      • DismHost.exe (PID: 668)
    • Reads Microsoft Office registry keys

      • reg.exe (PID: 3000)
      • reg.exe (PID: 1072)
      • reg.exe (PID: 664)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
407
Monitored processes
348
Malicious processes
11
Suspicious processes
0

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs powershell.exe cmd.exe no specs sc.exe no specs find.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs find.exe no specs fltmc.exe no specs powershell.exe no specs cmd.exe sc.exe no specs find.exe no specs findstr.exe no specs cmd.exe no specs find.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs find.exe no specs fltmc.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs ping.exe no specs find.exe no specs cmd.exe no specs cmd.exe no specs find.exe no specs cmd.exe no specs find.exe no specs cmd.exe no specs find.exe no specs cmd.exe no specs reg.exe no specs mode.com no specs findstr.exe no specs findstr.exe no specs choice.exe no specs mode.com no specs powershell.exe no specs cmd.exe no specs wmic.exe no specs find.exe no specs sc.exe no specs net.exe no specs net1.exe no specs wmic.exe no specs findstr.exe no specs net.exe no specs net1.exe no specs wmic.exe no specs findstr.exe no specs wmic.exe no specs findstr.exe no specs cmd.exe no specs wmic.exe no specs wmic.exe no specs cmd.exe no specs findstr.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs findstr.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs cmd.exe no specs findstr.exe no specs mode.com no specs findstr.exe no specs findstr.exe no specs choice.exe no specs mode.com no specs findstr.exe no specs findstr.exe no specs choice.exe no specs cmd.exe no specs mode.com no specs cmd.exe no specs powershell.exe no specs find.exe no specs cmd.exe no specs wmic.exe no specs find.exe no specs sc.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs powershell.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs wmic.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs dism.exe find.exe no specs dismhost.exe cmd.exe no specs reg.exe no specs powershell.exe no specs find.exe no specs cmd.exe no specs powershell.exe no specs findstr.exe no specs cmd.exe no specs find.exe no specs cmd.exe no specs findstr.exe no specs mode.com no specs powershell.exe no specs powershell.exe no specs mode.com no specs powershell.exe no specs powershell.exe no specs choice.exe no specs powershell.exe no specs dism.exe dismhost.exe vssvc.exe no specs cmd.exe no specs sc.exe no specs find.exe no specs findstr.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs find.exe no specs powershell.exe no specs fltmc.exe no specs cmd.exe sc.exe no specs find.exe no specs findstr.exe no specs cmd.exe no specs find.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs find.exe no specs reg.exe no specs fltmc.exe no specs find.exe no specs cmd.exe no specs ping.exe no specs cmd.exe no specs cmd.exe no specs find.exe no specs find.exe no specs cmd.exe no specs cmd.exe no specs find.exe no specs find.exe no specs cmd.exe no specs reg.exe no specs mode.com no specs findstr.exe no specs findstr.exe no specs choice.exe no specs cmd.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs mode.com no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs choice.exe no specs mode.com no specs findstr.exe no specs findstr.exe no specs choice.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs reg.exe no specs wmic.exe no specs find.exe no specs find.exe no specs reg.exe no specs reg.exe no specs find.exe no specs reg.exe no specs find.exe no specs find.exe no specs reg.exe no specs reg.exe no specs findstr.exe no specs mode.com no specs findstr.exe no specs findstr.exe no specs choice.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs wmic.exe no specs find.exe no specs net.exe no specs reg.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs reg.exe no specs mode.com no specs powershell.exe no specs cmd.exe no specs ping.exe no specs cmd.exe no specs ping.exe no specs cmd.exe no specs sc.exe no specs cmd.exe no specs sc.exe no specs find.exe no specs net.exe no specs net1.exe no specs find.exe no specs sc.exe no specs find.exe no specs sc.exe no specs net1.exe no specs net.exe no specs sc.exe no specs find.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs wmic.exe no specs findstr.exe no specs cmd.exe no specs wmic.exe no specs reg.exe no specs reg.exe no specs wmic.exe no specs cmd.exe no specs wmic.exe no specs findstr.exe no specs wmic.exe no specs findstr.exe no specs wmic.exe no specs findstr.exe no specs wmic.exe no specs findstr.exe no specs cmd.exe no specs wmic.exe no specs reg.exe no specs reg.exe no specs net.exe no specs net1.exe no specs wmic.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs wmic.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs find.exe no specs findstr.exe no specs wmic.exe no specs sc.exe no specs sc.exe no specs find.exe no specs sc.exe no specs net.exe no specs net1.exe no specs sc.exe no specs find.exe no specs find.exe no specs sc.exe no specs net.exe no specs net1.exe no specs find.exe no specs sc.exe no specs sc.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs findstr.exe no specs wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
240findstr /i VOLUME_KMSCLIENT C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
240find /i "ComputerSystem" C:\Windows\System32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (grep) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\find.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
296findstr /v "f7f81a39-5f63-5b42-9efd-1f13b5431005quot; "MAS_80066066.cmd" C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
324C:\Windows\system32\cmd.exe /c "prompt $H&for %B in (1) do rem"C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
392choice /C:123456780 /NC:\Windows\System32\choice.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Offers the user a choice
Exit code:
5
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\choice.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ws2_32.dll
392findstr /i Windows C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
532sc query sppsvc C:\Windows\System32\sc.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
A tool to aid in developing services for WindowsNT
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
532reg delete "HKLM\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform" /f /v KeyManagementServicePortC:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
548C:\Windows\system32\cmd.exe /S /D /c" echo "-el" "C:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
568find /i "STOPPED" C:\Windows\System32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (grep) Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\find.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
43 339
Read events
43 075
Write events
245
Delete events
19

Modification events

(PID) Process:(3672) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(3672) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(3672) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(3672) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(3672) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(3672) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(3672) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(3672) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(3672) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(3672) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid
Value:
Executable files
62
Suspicious files
50
Text files
52
Unknown types
9

Dropped files

PID
Process
Filename
Type
3672chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF17f6c4.TMP
MD5:
SHA256:
3672chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
3672chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datbinary
MD5:9C016064A1F864C8140915D77CF3389A
SHA256:0E7265D4A8C16223538EDD8CD620B8820611C74538E420A88E333BE7F62AC787
3672chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Last Versiontext
MD5:9F941EA08DBDCA2EB3CFA1DBBBA6F5DC
SHA256:127F71DF0D2AD895D4F293E62284D85971AE047CA15F90B87BF6335898B0B655
3672chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:358570F689377CE6838812643E03734B
SHA256:5B41FCC2E1A843AEAB9437B06E27B798870FF10D86A51B163BF48862BCD32590
3672chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.oldtext
MD5:ECD3386BCC950E73B86EB128A5F57622
SHA256:C9A068EAFBC587EDFC89392F64DDD350EEB96C5CF195CDB030BAB8F6DD33833B
3672chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF17fd8a.TMP
MD5:
SHA256:
3672chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old
MD5:
SHA256:
3672chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF17f6c4.TMPtext
MD5:05CF4C3C5148DA6355D3561A9EAA5E8A
SHA256:8D720243F6876898E4F197C8867C4CEE69F1C7335C55B8A29C120B1028D93E41
3672chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase\LOG.old~RF180903.TMP
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
13
DNS requests
13
Threats
1

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
3672
chrome.exe
239.255.255.250:1900
unknown
3228
chrome.exe
142.250.110.84:443
accounts.google.com
GOOGLE
US
unknown
3228
chrome.exe
5.45.97.157:443
massgrave.dev
netcup GmbH
DE
unknown
3228
chrome.exe
18.245.86.38:443
mathjax.rstudio.com
US
unknown
3672
chrome.exe
224.0.0.251:5353
unknown
3228
chrome.exe
216.58.206.36:443
www.google.com
GOOGLE
US
whitelisted
2260
powershell.exe
5.45.97.157:443
massgrave.dev
netcup GmbH
DE
unknown

DNS requests

Domain
IP
Reputation
accounts.google.com
  • 142.250.110.84
shared
massgrave.dev
  • 5.45.97.157
unknown
mathjax.rstudio.com
  • 18.245.86.38
  • 18.245.86.101
  • 18.245.86.104
  • 18.245.86.124
whitelisted
www.google.com
  • 216.58.206.36
whitelisted
raw.githubusercontent.com
  • 185.199.110.133
  • 185.199.109.133
  • 185.199.108.133
  • 185.199.111.133
shared
updatecheck.massgrave.dev
  • 127.69.2.5
unknown
kms.zhuxiaole.org
  • 202.5.28.218
unknown
kms.moeyuuko.com
  • 124.223.166.218
unknown

Threats

PID
Process
Class
Message
2260
powershell.exe
Misc activity
ET INFO Observed ZeroSSL SSL/TLS Certificate
Process
Message
Dism.exe
PID=2740 Instantiating the Provider Store. - CDISMImageSession::get_ProviderStore
Dism.exe
PID=2740 Initializing a provider store for the LOCAL session type. - CDISMProviderStore::Final_OnConnect
Dism.exe
PID=2740 Attempting to initialize the logger from the Image Session. - CDISMProviderStore::Final_OnConnect
Dism.exe
PID=2740 Provider has not previously been encountered. Attempting to initialize the provider. - CDISMProviderStore::Internal_GetProvider
Dism.exe
PID=2740 Loading Provider from location C:\Windows\System32\Dism\LogProvider.dll - CDISMProviderStore::Internal_GetProvider
Dism.exe
PID=2740 Connecting to the provider located at C:\Windows\System32\Dism\LogProvider.dll. - CDISMProviderStore::Internal_LoadProvider
Dism.exe
PID=2740 Getting Provider OSServices - CDISMProviderStore::GetProvider
Dism.exe
PID=2740 The requested provider was not found in the Provider Store. - CDISMProviderStore::Internal_GetProvider(hr:0x80004005)
Dism.exe
PID=2740 Failed to get an OSServices provider. Must be running in local store. Falling back to checking alongside the log provider for wdscore.dll. - CDISMLogger::FindWdsCore(hr:0x80004005)
DismHost.exe
PID=668 Encountered a loaded provider DISMLogger. - CDISMProviderStore::Internal_DisconnectProvider