Resubmissions
16-03-2022 13:06
220316-qccq7aead6 416-03-2022 10:43
220316-msa1raagfn 416-03-2022 10:37
220316-mnxc7aagcj 416-03-2022 09:54
220316-lw79zsadap 10Analysis
-
max time kernel
46s -
max time network
956s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
16-03-2022 09:54
Behavioral task
behavioral1
Sample
1a9f775e93356e6d09549721bcab5e5ded27ef7d3a2200cce80b1f89514c8646.pdf
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
1a9f775e93356e6d09549721bcab5e5ded27ef7d3a2200cce80b1f89514c8646.pdf
Resource
win10v2004-en-20220113
General
-
Target
1a9f775e93356e6d09549721bcab5e5ded27ef7d3a2200cce80b1f89514c8646.pdf
-
Size
776KB
-
MD5
8a9f834abf7d6cfb6452ff3102ec998d
-
SHA1
14e108594294c230a5445b6df54bb8f74a984cdc
-
SHA256
1a9f775e93356e6d09549721bcab5e5ded27ef7d3a2200cce80b1f89514c8646
-
SHA512
68671bf392af9f82de5e3d99e7a13f04e82faab6cb980d5371dce5f08c2f85661f5e6d8016ec15e43c323f41fe304ddb7b95ff60fbc99b76c6295858d094bcbb
Malware Config
Signatures
-
PlugX Rat Payload 8 IoCs
resource yara_rule behavioral1/files/0x000400000001d300-60.dat PlugX behavioral1/files/0x000400000001d300-61.dat PlugX behavioral1/files/0x000400000001d300-62.dat PlugX behavioral1/files/0x000400000001d300-85.dat PlugX behavioral1/files/0x000500000001d363-92.dat PlugX behavioral1/files/0x000500000001d363-99.dat PlugX behavioral1/files/0x000400000001d300-121.dat PlugX behavioral1/files/0x000400000001d300-125.dat PlugX -
Executes dropped EXE 4 IoCs
pid Process 2280 software_reporter_tool.exe 2316 software_reporter_tool.exe 1140 software_reporter_tool.exe 2672 software_reporter_tool.exe -
Loads dropped DLL 8 IoCs
pid Process 1016 chrome.exe 1140 software_reporter_tool.exe 1140 software_reporter_tool.exe 1140 software_reporter_tool.exe 1140 software_reporter_tool.exe 1140 software_reporter_tool.exe 1140 software_reporter_tool.exe 1140 software_reporter_tool.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook OUTLOOK.EXE Key queried \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook OUTLOOK.EXE -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 14 IoCs
description ioc Process File created C:\Windows\system32\perfc009.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00A.dat OUTLOOK.EXE File created C:\Windows\system32\perfc00C.dat OUTLOOK.EXE File created C:\Windows\system32\perfh00C.dat OUTLOOK.EXE File created C:\Windows\SysWOW64\PerfStringBackup.TMP OUTLOOK.EXE File opened for modification C:\Windows\SysWOW64\PerfStringBackup.INI OUTLOOK.EXE File created C:\Windows\system32\perfc007.dat OUTLOOK.EXE File created C:\Windows\system32\perfh007.dat OUTLOOK.EXE File created C:\Windows\system32\perfh009.dat OUTLOOK.EXE File created C:\Windows\system32\perfc011.dat OUTLOOK.EXE File created C:\Windows\system32\perfc010.dat OUTLOOK.EXE File created C:\Windows\system32\perfh010.dat OUTLOOK.EXE File created C:\Windows\system32\perfh011.dat OUTLOOK.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File opened for modification C:\Windows\inf\Outlook\outlperf.h OUTLOOK.EXE File created C:\Windows\inf\Outlook\0009\outlperf.ini OUTLOOK.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" OUTLOOK.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\MenuExt OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel OUTLOOK.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" OUTLOOK.EXE Key created \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Internet Explorer\Toolbar OUTLOOK.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1804 OUTLOOK.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 272 chrome.exe 1016 chrome.exe 1016 chrome.exe 2584 chrome.exe 2628 chrome.exe 1016 chrome.exe 1016 chrome.exe 2280 software_reporter_tool.exe 2280 software_reporter_tool.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1568 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: 33 2316 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 2316 software_reporter_tool.exe Token: 33 2280 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 2280 software_reporter_tool.exe Token: 33 1140 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 1140 software_reporter_tool.exe Token: 33 2672 software_reporter_tool.exe Token: SeIncBasePriorityPrivilege 2672 software_reporter_tool.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe 1016 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1568 AcroRd32.exe 1568 AcroRd32.exe 1568 AcroRd32.exe 1568 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1016 wrote to memory of 604 1016 chrome.exe 31 PID 1016 wrote to memory of 604 1016 chrome.exe 31 PID 1016 wrote to memory of 604 1016 chrome.exe 31 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 1452 1016 chrome.exe 32 PID 1016 wrote to memory of 272 1016 chrome.exe 33 PID 1016 wrote to memory of 272 1016 chrome.exe 33 PID 1016 wrote to memory of 272 1016 chrome.exe 33 PID 1016 wrote to memory of 1976 1016 chrome.exe 34 PID 1016 wrote to memory of 1976 1016 chrome.exe 34 PID 1016 wrote to memory of 1976 1016 chrome.exe 34 PID 1016 wrote to memory of 1976 1016 chrome.exe 34 PID 1016 wrote to memory of 1976 1016 chrome.exe 34 PID 1016 wrote to memory of 1976 1016 chrome.exe 34 PID 1016 wrote to memory of 1976 1016 chrome.exe 34 PID 1016 wrote to memory of 1976 1016 chrome.exe 34 PID 1016 wrote to memory of 1976 1016 chrome.exe 34 PID 1016 wrote to memory of 1976 1016 chrome.exe 34 PID 1016 wrote to memory of 1976 1016 chrome.exe 34 PID 1016 wrote to memory of 1976 1016 chrome.exe 34 PID 1016 wrote to memory of 1976 1016 chrome.exe 34 PID 1016 wrote to memory of 1976 1016 chrome.exe 34 PID 1016 wrote to memory of 1976 1016 chrome.exe 34 PID 1016 wrote to memory of 1976 1016 chrome.exe 34 PID 1016 wrote to memory of 1976 1016 chrome.exe 34 -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-2932610838-281738825-1127631353-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook OUTLOOK.EXE
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\1a9f775e93356e6d09549721bcab5e5ded27ef7d3a2200cce80b1f89514c8646.pdf"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1568 -
C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE"C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE" -c IPM.Note /m "mailto:[email protected]"2⤵
- Accesses Microsoft Outlook profiles
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- outlook_win_path
PID:1804
-
-
C:\Windows\system32\verclsid.exe"C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x4011⤵PID:2004
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6194f50,0x7fef6194f60,0x7fef6194f702⤵PID:604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1156 /prefetch:22⤵PID:1452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1284 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1728 /prefetch:82⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2096 /prefetch:12⤵PID:1012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2084 /prefetch:12⤵PID:1948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2504 /prefetch:22⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2648 /prefetch:12⤵PID:2204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3032 /prefetch:82⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3932 /prefetch:82⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2984 /prefetch:82⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3796 /prefetch:82⤵PID:2484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3256 /prefetch:82⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3344 /prefetch:82⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1004 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=640 /prefetch:82⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1484 /prefetch:82⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1852 /prefetch:82⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3388 /prefetch:82⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3776 /prefetch:82⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4100 /prefetch:82⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2984 /prefetch:82⤵PID:2172
-
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\SwReporter\99.279.200\software_reporter_tool.exe" --engine=2 --scan-locations=1,2,3,4,5,6,7,8,10 --disabled-locations=9,11 --session-id=XWu2ADi3H6NTAGG1LmqptBnNJdbkcsflNXau9uSa --registry-suffix=ESET --enable-crash-reporting --srt-field-trial-group-name=NewCleanerUIExperiment2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2280 -
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe" --crash-handler "--database=c:\users\admin\appdata\local\Google\Software Reporter Tool" --url=https://clients2.google.com/cr/report --annotation=plat=Win32 --annotation=prod=ChromeFoil --annotation=ver=99.279.200 --initial-client-data=0x160,0x164,0x168,0x134,0x16c,0x1402525a0,0x1402525b0,0x1402525c03⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_2280_MJLVRMPMNNWKBHYC" --sandboxed-process-id=2 --init-done-notifier=492 --sandbox-mojo-pipe-token=10835913212268237509 --mojo-platform-channel-handle=468 --engine=23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
-
\??\c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe"c:\users\admin\appdata\local\google\chrome\user data\swreporter\99.279.200\software_reporter_tool.exe" --enable-crash-reporting --use-crash-handler-with-id="\\.\pipe\crashpad_2280_MJLVRMPMNNWKBHYC" --sandboxed-process-id=3 --init-done-notifier=652 --sandbox-mojo-pipe-token=11456883304056548087 --mojo-platform-channel-handle=6483⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2472 /prefetch:82⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1492 /prefetch:12⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=996 /prefetch:82⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1160,670257903202582121,10941459272768551242,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3252 /prefetch:82⤵PID:2656
-