Analysis
-
max time kernel
562s -
max time network
564s -
platform
windows10_x64 -
resource
win10-20220223-en -
submitted
10-03-2022 14:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/W1s13aAa#MrVedGEWhd7LX9z-qbFgXE91wWlx86iq1R1UHTnOAoI
Resource
win10-20220223-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
https://mega.nz/file/W1s13aAa#MrVedGEWhd7LX9z-qbFgXE91wWlx86iq1R1UHTnOAoI
Resource
win10v2004-en-20220112
0 signatures
0 seconds
General
Malware Config
Signatures
-
PlugX Rat Payload 7 IoCs
resource yara_rule behavioral1/files/0x0006000000019fc8-116.dat PlugX behavioral1/files/0x0006000000019fc8-119.dat PlugX behavioral1/files/0x0006000000019fc8-124.dat PlugX behavioral1/files/0x0006000000019fd3-135.dat PlugX behavioral1/files/0x0006000000019fd3-142.dat PlugX behavioral1/files/0x0006000000019fc8-144.dat PlugX behavioral1/files/0x0006000000019fc8-152.dat PlugX -
Executes dropped EXE 5 IoCs
pid Process 3624 software_reporter_tool.exe 3616 software_reporter_tool.exe 392 software_reporter_tool.exe 1956 software_reporter_tool.exe 1360 photocrack_v317.exe -
Loads dropped DLL 7 IoCs
pid Process 392 software_reporter_tool.exe 392 software_reporter_tool.exe 392 software_reporter_tool.exe 392 software_reporter_tool.exe 392 software_reporter_tool.exe 392 software_reporter_tool.exe 392 software_reporter_tool.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 2 IoCs
pid pid_target Process procid_target 3636 1360 WerFault.exe 88 3512 1360 WerFault.exe 88 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-1937337463-1541593363-3360944660-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4048 chrome.exe 4048 chrome.exe 2332 chrome.exe 2332 chrome.exe 3064 chrome.exe 3064 chrome.exe 3056 chrome.exe 3056 chrome.exe 188 chrome.exe 188 chrome.exe 3672 chrome.exe 3672 chrome.exe 3648 chrome.exe 3648 chrome.exe 3984 chrome.exe 3984 chrome.exe 1384 chrome.exe 1384 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 1808 chrome.exe 228 chrome.exe 228 chrome.exe 3624 software_reporter_tool.exe 3624 software_reporter_tool.exe 2872 7zFM.exe 2872 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2872 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeRestorePrivilege 2872 7zFM.exe Token: 35 2872 7zFM.exe Token: 33 3616 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 3616 software_reporter_tool.exe Token: 33 3624 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 3624 software_reporter_tool.exe Token: 33 392 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 392 software_reporter_tool.exe Token: 33 1956 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 1956 software_reporter_tool.exe Token: SeSecurityPrivilege 2872 7zFM.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2872 7zFM.exe 2872 7zFM.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe 2332 chrome.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1936 OpenWith.exe 1936 OpenWith.exe 1936 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2332 wrote to memory of 3140 2332 chrome.exe 42 PID 2332 wrote to memory of 3140 2332 chrome.exe 42 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 3804 2332 chrome.exe 44 PID 2332 wrote to memory of 4048 2332 chrome.exe 43 PID 2332 wrote to memory of 4048 2332 chrome.exe 43 PID 2332 wrote to memory of 600 2332 chrome.exe 45 PID 2332 wrote to memory of 600 2332 chrome.exe 45 PID 2332 wrote to memory of 600 2332 chrome.exe 45 PID 2332 wrote to memory of 600 2332 chrome.exe 45 PID 2332 wrote to memory of 600 2332 chrome.exe 45 PID 2332 wrote to memory of 600 2332 chrome.exe 45 PID 2332 wrote to memory of 600 2332 chrome.exe 45 PID 2332 wrote to memory of 600 2332 chrome.exe 45 PID 2332 wrote to memory of 600 2332 chrome.exe 45 PID 2332 wrote to memory of 600 2332 chrome.exe 45 PID 2332 wrote to memory of 600 2332 chrome.exe 45 PID 2332 wrote to memory of 600 2332 chrome.exe 45 PID 2332 wrote to memory of 600 2332 chrome.exe 45 PID 2332 wrote to memory of 600 2332 chrome.exe 45 PID 2332 wrote to memory of 600 2332 chrome.exe 45 PID 2332 wrote to memory of 600 2332 chrome.exe 45 PID 2332 wrote to memory of 600 2332 chrome.exe 45 PID 2332 wrote to memory of 600 2332 chrome.exe 45 PID 2332 wrote to memory of 600 2332 chrome.exe 45 PID 2332 wrote to memory of 600 2332 chrome.exe 45
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://mega.nz/file/W1s13aAa#MrVedGEWhd7LX9z-qbFgXE91wWlx86iq1R1UHTnOAoI1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0x88,0xd8,0x7ff85fed4f50,0x7ff85fed4f60,0x7ff85fed4f702⤵PID:3140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1688 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1600 /prefetch:22⤵PID:3804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2312 /prefetch:82⤵PID:600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2916 /prefetch:12⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2900 /prefetch:12⤵PID:3828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4168 /prefetch:82⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5328 /prefetch:82⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5356 /prefetch:82⤵PID:3632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5452 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5240 /prefetch:82⤵PID:3320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4772 /prefetch:82⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4728 /prefetch:82⤵PID:3716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4640 /prefetch:82⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5524 /prefetch:82⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5812 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5724 /prefetch:82⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5592 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5724 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=772 /prefetch:82⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 /prefetch:82⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5812 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 /prefetch:82⤵PID:3080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4380 /prefetch:82⤵PID:3700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3276 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:3404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4456 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6008 /prefetch:82⤵PID:768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2516 /prefetch:82⤵PID:1444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3256 /prefetch:82⤵PID:188
-
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\97.278.200\software_reporter_tool.exe"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\97.278.200\software_reporter_tool.exe" --engine=2 --scan-locations=1,2,3,4,5,6,7,8,10 --disabled-locations=9,11 --session-id=2IvOXfhi9amY2c/0rPzVJZlbPZh/OF0gTiOL6Jep --registry-suffix=ESET --enable-crash-reporting --srt-field-trial-group-name=NewCleanerUIExperiment2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3624 -
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\97.278.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\97.278.200\software_reporter_tool.exe" --crash-handler "--database=c:\users\admin\appdata\local\Google\Software Reporter Tool" --url=https://clients2.google.com/cr/report --annotation=plat=Win32 --annotation=prod=ChromeFoil --annotation=ver=97.278.200 --initial-client-data=0x254,0x258,0x25c,0x230,0x260,0x7ff7d65569d8,0x7ff7d65569e8,0x7ff7d65569f83⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\97.278.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\97.278.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_3624_NMPHHAICXNRAXVWB" --sandboxed-process-id=2 --init-done-notifier=720 --sandbox-mojo-pipe-token=13331004989978430445 --mojo-platform-channel-handle=696 --engine=23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:392
-
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\97.278.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\97.278.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_3624_NMPHHAICXNRAXVWB" --sandboxed-process-id=3 --init-done-notifier=928 --sandbox-mojo-pipe-token=727847817789475638 --mojo-platform-channel-handle=9243⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3276 /prefetch:82⤵PID:524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1476,17281908031714912089,12248922043640599723,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4656 /prefetch:82⤵PID:3672
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1936
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2288
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\photocrack_password_1234.rar"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\7zO83B8A364\photocrack_v317.exe"C:\Users\Admin\AppData\Local\Temp\7zO83B8A364\photocrack_v317.exe"2⤵
- Executes dropped EXE
PID:1360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 3923⤵
- Program crash
PID:3636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 3843⤵
- Program crash
PID:3512
-
-