Analysis
-
max time kernel
1083s -
max time network
1207s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
28-07-2021 15:50
Static task
static1
URLScan task
urlscan1
Sample
https://1drv.ms/u/s!AlA0pbYwD0JUbpku6hERsshTUjw?e=EOKOsf
General
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
software_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exepid process 4044 software_reporter_tool.exe 4972 software_reporter_tool.exe 4084 software_reporter_tool.exe 4316 software_reporter_tool.exe -
Loads dropped DLL 7 IoCs
Processes:
software_reporter_tool.exepid process 4084 software_reporter_tool.exe 4084 software_reporter_tool.exe 4084 software_reporter_tool.exe 4084 software_reporter_tool.exe 4084 software_reporter_tool.exe 4084 software_reporter_tool.exe 4084 software_reporter_tool.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exesoftware_reporter_tool.exepowershell.exechrome.exepid process 2920 chrome.exe 2920 chrome.exe 804 chrome.exe 804 chrome.exe 4656 chrome.exe 4656 chrome.exe 3172 chrome.exe 3172 chrome.exe 4580 chrome.exe 4580 chrome.exe 4696 chrome.exe 4696 chrome.exe 4136 chrome.exe 4136 chrome.exe 4044 software_reporter_tool.exe 4044 software_reporter_tool.exe 4948 powershell.exe 4948 powershell.exe 4948 powershell.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe 4696 chrome.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
7zG.exe7zG.exesoftware_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exesoftware_reporter_tool.exepowershell.exedescription pid process Token: SeRestorePrivilege 748 7zG.exe Token: 35 748 7zG.exe Token: SeSecurityPrivilege 748 7zG.exe Token: SeSecurityPrivilege 748 7zG.exe Token: SeRestorePrivilege 5008 7zG.exe Token: 35 5008 7zG.exe Token: SeSecurityPrivilege 5008 7zG.exe Token: SeSecurityPrivilege 5008 7zG.exe Token: 33 4972 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 4972 software_reporter_tool.exe Token: 33 4044 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 4044 software_reporter_tool.exe Token: 33 4084 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 4084 software_reporter_tool.exe Token: 33 4316 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 4316 software_reporter_tool.exe Token: SeDebugPrivilege 4948 powershell.exe -
Suspicious use of FindShellTrayWindow 20 IoCs
Processes:
chrome.exe7zG.exe7zG.exepid process 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 804 chrome.exe 748 7zG.exe 5008 7zG.exe 804 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 804 wrote to memory of 2648 804 chrome.exe chrome.exe PID 804 wrote to memory of 2648 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 4000 804 chrome.exe chrome.exe PID 804 wrote to memory of 2920 804 chrome.exe chrome.exe PID 804 wrote to memory of 2920 804 chrome.exe chrome.exe PID 804 wrote to memory of 3528 804 chrome.exe chrome.exe PID 804 wrote to memory of 3528 804 chrome.exe chrome.exe PID 804 wrote to memory of 3528 804 chrome.exe chrome.exe PID 804 wrote to memory of 3528 804 chrome.exe chrome.exe PID 804 wrote to memory of 3528 804 chrome.exe chrome.exe PID 804 wrote to memory of 3528 804 chrome.exe chrome.exe PID 804 wrote to memory of 3528 804 chrome.exe chrome.exe PID 804 wrote to memory of 3528 804 chrome.exe chrome.exe PID 804 wrote to memory of 3528 804 chrome.exe chrome.exe PID 804 wrote to memory of 3528 804 chrome.exe chrome.exe PID 804 wrote to memory of 3528 804 chrome.exe chrome.exe PID 804 wrote to memory of 3528 804 chrome.exe chrome.exe PID 804 wrote to memory of 3528 804 chrome.exe chrome.exe PID 804 wrote to memory of 3528 804 chrome.exe chrome.exe PID 804 wrote to memory of 3528 804 chrome.exe chrome.exe PID 804 wrote to memory of 3528 804 chrome.exe chrome.exe PID 804 wrote to memory of 3528 804 chrome.exe chrome.exe PID 804 wrote to memory of 3528 804 chrome.exe chrome.exe PID 804 wrote to memory of 3528 804 chrome.exe chrome.exe PID 804 wrote to memory of 3528 804 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://1drv.ms/u/s!AlA0pbYwD0JUbpku6hERsshTUjw?e=EOKOsf1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc8,0xcc,0xd0,0xa4,0xd4,0x7ffaa2864f50,0x7ffaa2864f60,0x7ffaa2864f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1812 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1520 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2776 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2784 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3012 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4960 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4032 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --channel --force-configure-user-settings2⤵
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x23c,0x240,0x244,0x224,0x248,0x7ff68bbfa890,0x7ff68bbfa8a0,0x7ff68bbfa8b03⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5524 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5444 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5660 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5524 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5648 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5948 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5972 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6084 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5568 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6208 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6204 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6488 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6624 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6756 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5416 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7028 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5980 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6348 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6004 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5416 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7320 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7384 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7528 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5448 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7000 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6968 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7640 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5588 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6200 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6392 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6448 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5776 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5712 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5856 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6752 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6732 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5320 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7676 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7716 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6848 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=56 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6792 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8020 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7204 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7136 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=60 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7708 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=61 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6312 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --disable-gpu-compositing --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=62 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5720 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=64 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7340 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7356 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7740 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7204 /prefetch:82⤵
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\91.266.200\software_reporter_tool.exe"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\91.266.200\software_reporter_tool.exe" --engine=2 --scan-locations=1,2,3,4,5,6,7,8,10 --disabled-locations=9,11 --session-id=pX9fdxFVF1qqYVBm9Q637bzuJRXErJLqazYo3PCU --registry-suffix=ESET --srt-field-trial-group-name=Off2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\91.266.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\91.266.200\software_reporter_tool.exe" --crash-handler "--database=c:\users\admin\appdata\local\Google\Software Reporter Tool" --url=https://clients2.google.com/cr/report --annotation=plat=Win32 --annotation=prod=ChromeFoil --annotation=ver=91.266.200 --initial-client-data=0x244,0x248,0x24c,0x220,0x250,0x7ff664953270,0x7ff664953280,0x7ff6649532903⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\91.266.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\91.266.200\software_reporter_tool.exe" --use-crash-handler-with-id="\\.\pipe\crashpad_4044_DYSHEFLSVRHIAXHZ" --sandboxed-process-id=2 --init-done-notifier=716 --sandbox-mojo-pipe-token=1036170568147378030 --mojo-platform-channel-handle=692 --engine=23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\91.266.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\91.266.200\software_reporter_tool.exe" --use-crash-handler-with-id="\\.\pipe\crashpad_4044_DYSHEFLSVRHIAXHZ" --sandboxed-process-id=3 --init-done-notifier=916 --sandbox-mojo-pipe-token=17706677186631394792 --mojo-platform-channel-handle=9123⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6444 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5700 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1048 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6492 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3392 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4768 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2144 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=984 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4700 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2112 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=984 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3180 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6672 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1500,6304507821522398296,12853877765300665187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6988 /prefetch:82⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\1ixh8NwNmQj6 (1)\" -spe -an -ai#7zMap28628:94:7zEvent34901⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap10649:94:7zEvent325641⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
-
C:\Windows\system32\cscript.execscript 1ixh8NwNmQj6.vbs3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datMD5
0f3bac0fad2b6bdf7336bcb734096a90
SHA1260a4f1dc5b600904024bb8fb92be0e72932bfbe
SHA2565181bd62d497103ab4c164f3d67a0d5bf9b7a787674e16237f92d1146d9514c9
SHA512ae2f9266c40532cdc8d01ec7c8cc52f459f1f360bb3e37471953f7428bfa827255b9c69755d28e61a6d57bdd502f983df5d01ca7286badb8d5f584f945daf8fd
-
\??\pipe\crashpad_804_PVNTBQIFBAEQXPPOMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/580-358-0x0000000000000000-mapping.dmp
-
memory/744-137-0x0000000000000000-mapping.dmp
-
memory/856-312-0x0000000000000000-mapping.dmp
-
memory/2164-422-0x0000000000000000-mapping.dmp
-
memory/2224-303-0x0000000000000000-mapping.dmp
-
memory/2256-144-0x0000000000000000-mapping.dmp
-
memory/2288-140-0x0000000000000000-mapping.dmp
-
memory/2308-293-0x0000000000000000-mapping.dmp
-
memory/2456-298-0x0000000000000000-mapping.dmp
-
memory/2648-116-0x0000000000000000-mapping.dmp
-
memory/2876-425-0x0000000000000000-mapping.dmp
-
memory/2920-122-0x0000000000000000-mapping.dmp
-
memory/3172-229-0x0000000000000000-mapping.dmp
-
memory/3192-161-0x0000000000000000-mapping.dmp
-
memory/3332-343-0x0000000000000000-mapping.dmp
-
memory/3528-129-0x0000000000000000-mapping.dmp
-
memory/3864-149-0x0000000000000000-mapping.dmp
-
memory/4000-123-0x00007FFAAC2A0000-0x00007FFAAC2A1000-memory.dmpFilesize
4KB
-
memory/4000-121-0x0000000000000000-mapping.dmp
-
memory/4004-154-0x0000000000000000-mapping.dmp
-
memory/4056-248-0x0000000000000000-mapping.dmp
-
memory/4084-559-0x0000018B0C570000-0x0000018B0C5B0000-memory.dmpFilesize
256KB
-
memory/4084-486-0x00007FFAAC1E0000-0x00007FFAAC1E1000-memory.dmpFilesize
4KB
-
memory/4084-485-0x00007FFAAE9E0000-0x00007FFAAE9E1000-memory.dmpFilesize
4KB
-
memory/4124-452-0x0000000000000000-mapping.dmp
-
memory/4224-419-0x0000000000000000-mapping.dmp
-
memory/4328-233-0x0000000000000000-mapping.dmp
-
memory/4332-395-0x0000000000000000-mapping.dmp
-
memory/4348-177-0x0000000000000000-mapping.dmp
-
memory/4356-315-0x0000000000000000-mapping.dmp
-
memory/4456-438-0x0000000000000000-mapping.dmp
-
memory/4472-236-0x0000000000000000-mapping.dmp
-
memory/4476-184-0x0000000000000000-mapping.dmp
-
memory/4528-243-0x0000000000000000-mapping.dmp
-
memory/4568-390-0x0000000000000000-mapping.dmp
-
memory/4588-409-0x0000000000000000-mapping.dmp
-
memory/4652-253-0x0000000000000000-mapping.dmp
-
memory/4656-412-0x0000000000000000-mapping.dmp
-
memory/4656-190-0x0000000000000000-mapping.dmp
-
memory/4684-353-0x0000000000000000-mapping.dmp
-
memory/4712-380-0x0000000000000000-mapping.dmp
-
memory/4732-194-0x0000000000000000-mapping.dmp
-
memory/4732-350-0x0000000000000000-mapping.dmp
-
memory/4760-198-0x0000000000000000-mapping.dmp
-
memory/4776-258-0x0000000000000000-mapping.dmp
-
memory/4792-385-0x0000000000000000-mapping.dmp
-
memory/4800-308-0x0000000000000000-mapping.dmp
-
memory/4816-201-0x0000000000000000-mapping.dmp
-
memory/4820-373-0x0000000000000000-mapping.dmp
-
memory/4836-320-0x0000000000000000-mapping.dmp
-
memory/4844-205-0x0000000000000000-mapping.dmp
-
memory/4864-268-0x0000000000000000-mapping.dmp
-
memory/4892-263-0x0000000000000000-mapping.dmp
-
memory/4920-401-0x0000000000000000-mapping.dmp
-
memory/4928-210-0x0000000000000000-mapping.dmp
-
memory/4940-273-0x0000000000000000-mapping.dmp
-
memory/4948-500-0x000001CEC4203000-0x000001CEC4205000-memory.dmpFilesize
8KB
-
memory/4948-498-0x000001CEC4200000-0x000001CEC4202000-memory.dmpFilesize
8KB
-
memory/4964-445-0x0000000000000000-mapping.dmp
-
memory/4972-365-0x0000000000000000-mapping.dmp
-
memory/4976-278-0x0000000000000000-mapping.dmp
-
memory/4976-368-0x0000000000000000-mapping.dmp
-
memory/4980-215-0x0000000000000000-mapping.dmp
-
memory/4996-323-0x0000000000000000-mapping.dmp
-
memory/5000-328-0x0000000000000000-mapping.dmp
-
memory/5032-220-0x0000000000000000-mapping.dmp
-
memory/5048-333-0x0000000000000000-mapping.dmp
-
memory/5052-225-0x0000000000000000-mapping.dmp
-
memory/5080-283-0x0000000000000000-mapping.dmp
-
memory/5104-286-0x0000000000000000-mapping.dmp