Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
http://insprocks.com/Insprock289.exe

Overview

General Information

Sample URL:http://insprocks.com/Insprock289.exe
Analysis ID:1632518
Infos:

Detection

Score:48
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Creates files inside the system directory
Deletes files inside the Windows folder
Drops PE files
PE file contains an invalid checksum
PE file does not import any functions
PE file overlay found

Classification

  • System is w10x64
  • chrome.exe (PID: 5476 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank" MD5: E81F54E6C1129887AEA47E7D092680BF)
    • chrome.exe (PID: 1252 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2396,i,12129604371323239629,78036794554064545,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2416 /prefetch:3 MD5: E81F54E6C1129887AEA47E7D092680BF)
  • chrome.exe (PID: 1696 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://insprocks.com/Insprock289.exe" MD5: E81F54E6C1129887AEA47E7D092680BF)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://insprocks.com/Insprock289.exeAvira URL Cloud: detection malicious, Label: malware
Source: unknownHTTPS traffic detected: 204.79.197.222:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
Source: unknownTCP traffic detected without corresponding DNS query: 131.253.33.254
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
Source: unknownTCP traffic detected without corresponding DNS query: 20.189.173.27
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.222
Source: unknownTCP traffic detected without corresponding DNS query: 13.107.246.60
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: www.google.com
Source: global trafficDNS traffic detected: DNS query: insprocks.com
Source: Unconfirmed 383884.crdownload.1.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49678 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49727 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49727
Source: unknownNetwork traffic detected: HTTP traffic on port 49680 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
Source: unknownHTTPS traffic detected: 204.79.197.222:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Windows\SystemTemp\scoped_dir5476_988958185Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile deleted: C:\Windows\SystemTemp\scoped_dir5476_988958185Jump to behavior
Source: 1bd7b465-1ea3-4a3f-8a82-6ce810d21386.tmp.1.drStatic PE information: No import functions for PE file found
Source: 1bd7b465-1ea3-4a3f-8a82-6ce810d21386.tmp.1.drStatic PE information: Data appended to the last section found
Source: 1bd7b465-1ea3-4a3f-8a82-6ce810d21386.tmp.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: classification engineClassification label: mal48.win@21/2@6/3
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\1bd7b465-1ea3-4a3f-8a82-6ce810d21386.tmpJump to behavior
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2396,i,12129604371323239629,78036794554064545,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2416 /prefetch:3
Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" "http://insprocks.com/Insprock289.exe"
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2396,i,12129604371323239629,78036794554064545,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2416 /prefetch:3Jump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: 1bd7b465-1ea3-4a3f-8a82-6ce810d21386.tmp.1.drStatic PE information: real checksum: 0x45f0de6 should be: 0xf8e0
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\Unconfirmed 383884.crdownloadJump to dropped file
Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\Downloads\1bd7b465-1ea3-4a3f-8a82-6ce810d21386.tmpJump to dropped file
Source: Unconfirmed 383884.crdownload.1.drBinary or memory string: VmCi9M
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath Interception1
Process Injection
11
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Software Packing
LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
File Deletion
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
http://insprocks.com/Insprock289.exe100%Avira URL Cloudmalware
SourceDetectionScannerLabelLink
C:\Users\user\Downloads\Unconfirmed 383884.crdownload3%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
www.google.com
142.250.186.132
truefalse
    high
    insprocks.com
    104.21.32.1
    truefalse
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://nsis.sf.net/NSIS_ErrorErrorUnconfirmed 383884.crdownload.1.drfalse
        high
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        104.21.112.1
        unknownUnited States
        13335CLOUDFLARENETUSfalse
        142.250.186.132
        www.google.comUnited States
        15169GOOGLEUSfalse
        IP
        192.168.2.4
        Joe Sandbox version:42.0.0 Malachite
        Analysis ID:1632518
        Start date and time:2025-03-08 04:21:57 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 3m 44s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:browseurl.jbs
        Sample URL:http://insprocks.com/Insprock289.exe
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:19
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal48.win@21/2@6/3
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, RuntimeBroker.exe, ShellExperienceHost.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 142.250.184.195, 142.250.184.238, 142.250.185.78, 66.102.1.84, 142.250.186.78, 172.217.18.110, 199.232.214.172, 142.250.185.110, 142.250.186.110, 216.58.206.78, 142.250.185.206, 142.250.186.35, 142.250.185.195, 142.250.186.46, 142.250.185.238, 95.100.70.200
        • Excluded domains from analysis (whitelisted): fs.microsoft.com, clients2.google.com, edgedl.me.gvt1.com, accounts.google.com, redirector.gvt1.com, update.googleapis.com, ctldl.windowsupdate.com, clientservices.googleapis.com, clients.l.google.com, c.pki.goog
        • Not all processes where analyzed, report is missing behavior information
        • Report size exceeded maximum capacity and may have missing network information.
        • Report size getting too big, too many NtOpenFile calls found.
        • VT rate limit hit for: http://insprocks.com/Insprock289.exe
        No simulations
        No context
        No context
        No context
        No context
        No context
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):2729
        Entropy (8bit):5.385896936754169
        Encrypted:false
        SSDEEP:48:SkhSl1bpeErO5xOgirB5FWXj4Eqwmpj+gvkxT5:zSPlgil5Y0lV0
        MD5:004D474CE9F8E0D8078CD6EC43D00A73
        SHA1:8AB67D969B132533A037F5248237C5304684098E
        SHA-256:3CBEDE14B5F2A08D054D703F9B071050BE4A8FD83EBCE35D3E9A900C1BC219CE
        SHA-512:E21806FAFC06E9870B2A8955F09E45482FD59979765554102F3B33C49995F04CB716180CF8567DAF4D832E05130F22C6DA5B96A8C439DBA4B2C7C9C92CA89D4B
        Malicious:false
        Reputation:low
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L......\.................h...8...@...3............@..................................._...@..........................................p..H.............^.@&...........................................................................................text...'f.......h.................. ..`.rdata...............l..............@..@.data...............................@....ndata...................................rsrc...H....p......................@..@................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Program Files\Google\Chrome\Application\chrome.exe
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
        Category:dropped
        Size (bytes):73279064
        Entropy (8bit):7.9999909100429685
        Encrypted:true
        SSDEEP:
        MD5:438F0C0D9F12A6D97C0DCE2190832BC0
        SHA1:316794630D95E55385EB806E8544DF718E1EABDA
        SHA-256:378FB3F303469B11713DDB68409900EEF42386C0B88FF6BBCB588023174507CC
        SHA-512:86E60C92869866EC66A1AFF0E9F409CC9EB6E514B9F4E1578F541A5AF5DAD3699D8A4EC7A0BC35E2D5A0C88AD36EA48B7841A1F4DB26DE309E0E7A170DBC18AB
        Malicious:false
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 3%
        Reputation:low
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf.sV..Pf..V`..Pf.Rich.Pf.........................PE..L......\.................h...8...@...3............@..................................._...@..........................................p..H.............^.@&...........................................................................................text...'f.......h.................. ..`.rdata...............l..............@..@.data...............................@....ndata...................................rsrc...H....p......................@..@................................................................................................................................................................................................................................................................................................................................................
        No static file info
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Mar 8, 2025 04:23:02.607270002 CET192.168.2.41.1.1.10xc5deStandard query (0)www.google.comA (IP address)IN (0x0001)false
        Mar 8, 2025 04:23:02.607702017 CET192.168.2.41.1.1.10x8e55Standard query (0)www.google.com65IN (0x0001)false
        Mar 8, 2025 04:23:06.420350075 CET192.168.2.41.1.1.10x9cdbStandard query (0)insprocks.comA (IP address)IN (0x0001)false
        Mar 8, 2025 04:23:06.423062086 CET192.168.2.41.1.1.10xd228Standard query (0)insprocks.com65IN (0x0001)false
        Mar 8, 2025 04:23:06.442991018 CET192.168.2.41.1.1.10x46fcStandard query (0)insprocks.comA (IP address)IN (0x0001)false
        Mar 8, 2025 04:23:06.443454027 CET192.168.2.41.1.1.10x51ceStandard query (0)insprocks.com65IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Mar 8, 2025 04:23:02.614535093 CET1.1.1.1192.168.2.40xc5deNo error (0)www.google.com142.250.186.132A (IP address)IN (0x0001)false
        Mar 8, 2025 04:23:02.614593983 CET1.1.1.1192.168.2.40x8e55No error (0)www.google.com65IN (0x0001)false
        Mar 8, 2025 04:23:06.429991007 CET1.1.1.1192.168.2.40x9cdbNo error (0)insprocks.com104.21.32.1A (IP address)IN (0x0001)false
        Mar 8, 2025 04:23:06.429991007 CET1.1.1.1192.168.2.40x9cdbNo error (0)insprocks.com104.21.48.1A (IP address)IN (0x0001)false
        Mar 8, 2025 04:23:06.429991007 CET1.1.1.1192.168.2.40x9cdbNo error (0)insprocks.com104.21.112.1A (IP address)IN (0x0001)false
        Mar 8, 2025 04:23:06.429991007 CET1.1.1.1192.168.2.40x9cdbNo error (0)insprocks.com104.21.16.1A (IP address)IN (0x0001)false
        Mar 8, 2025 04:23:06.429991007 CET1.1.1.1192.168.2.40x9cdbNo error (0)insprocks.com104.21.80.1A (IP address)IN (0x0001)false
        Mar 8, 2025 04:23:06.429991007 CET1.1.1.1192.168.2.40x9cdbNo error (0)insprocks.com104.21.64.1A (IP address)IN (0x0001)false
        Mar 8, 2025 04:23:06.429991007 CET1.1.1.1192.168.2.40x9cdbNo error (0)insprocks.com104.21.96.1A (IP address)IN (0x0001)false
        Mar 8, 2025 04:23:06.435039997 CET1.1.1.1192.168.2.40xd228No error (0)insprocks.com65IN (0x0001)false
        Mar 8, 2025 04:23:06.450352907 CET1.1.1.1192.168.2.40x46fcNo error (0)insprocks.com104.21.112.1A (IP address)IN (0x0001)false
        Mar 8, 2025 04:23:06.450352907 CET1.1.1.1192.168.2.40x46fcNo error (0)insprocks.com104.21.16.1A (IP address)IN (0x0001)false
        Mar 8, 2025 04:23:06.450352907 CET1.1.1.1192.168.2.40x46fcNo error (0)insprocks.com104.21.96.1A (IP address)IN (0x0001)false
        Mar 8, 2025 04:23:06.450352907 CET1.1.1.1192.168.2.40x46fcNo error (0)insprocks.com104.21.80.1A (IP address)IN (0x0001)false
        Mar 8, 2025 04:23:06.450352907 CET1.1.1.1192.168.2.40x46fcNo error (0)insprocks.com104.21.64.1A (IP address)IN (0x0001)false
        Mar 8, 2025 04:23:06.450352907 CET1.1.1.1192.168.2.40x46fcNo error (0)insprocks.com104.21.48.1A (IP address)IN (0x0001)false
        Mar 8, 2025 04:23:06.450352907 CET1.1.1.1192.168.2.40x46fcNo error (0)insprocks.com104.21.32.1A (IP address)IN (0x0001)false
        Mar 8, 2025 04:23:06.452414036 CET1.1.1.1192.168.2.40x51ceNo error (0)insprocks.com65IN (0x0001)false

        Click to jump to process

        Click to jump to process

        Click to jump to process

        Target ID:1
        Start time:22:22:55
        Start date:07/03/2025
        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
        Imagebase:0x7ff786830000
        File size:3'388'000 bytes
        MD5 hash:E81F54E6C1129887AEA47E7D092680BF
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:2
        Start time:22:22:59
        Start date:07/03/2025
        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-pre-read-main-dll --field-trial-handle=2396,i,12129604371323239629,78036794554064545,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20250306-183004.429000 --mojo-platform-channel-handle=2416 /prefetch:3
        Imagebase:0x7ff786830000
        File size:3'388'000 bytes
        MD5 hash:E81F54E6C1129887AEA47E7D092680BF
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Target ID:9
        Start time:22:23:05
        Start date:07/03/2025
        Path:C:\Program Files\Google\Chrome\Application\chrome.exe
        Wow64 process (32bit):false
        Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://insprocks.com/Insprock289.exe"
        Imagebase:0x7ff659320000
        File size:3'388'000 bytes
        MD5 hash:E81F54E6C1129887AEA47E7D092680BF
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        No disassembly