Analysis
-
max time kernel
435s -
max time network
438s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
24-04-2024 17:56
Behavioral task
behavioral1
Sample
vmpdump.7z
Resource
win10v2004-20240412-en
General
-
Target
vmpdump.7z
-
Size
6.0MB
-
MD5
608cf8450afa1a80db5764a828236a39
-
SHA1
50497a35a99887fd2f26c0334660d2a45632ffc1
-
SHA256
4e3028f3452ac0c7fc2ca4d243f519e538e21ec45e02d4b4568c7e8d1a558b83
-
SHA512
7c691b8acb4f7508b09806e5e3178facbcdfcfa1642b9984099a601275a28da53417016b013a13a470a22fd5e5a156d6d0425281c9f5597090e288237106d3ee
-
SSDEEP
98304:R2LCWwHN8zTy5ACe4Vec9b3p73x531cabk2imDsO+FyjXfrN1SRMvIvo3:eiN15AFz4Rx5SeimDsO+0Tfe+qo3
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
Processes:
Loader (2).exeVMPDump.exeLoader (2).VMPDump.exeVMPDump.exeLoader (2).exeVMPDump.exeVMPDump.exeVMPDump.exeVMPDump.exeVMPDump.exepid process 2892 Loader (2).exe 532 VMPDump.exe 4772 Loader (2).VMPDump.exe 4324 VMPDump.exe 1988 Loader (2).exe 2620 VMPDump.exe 3236 VMPDump.exe 4104 VMPDump.exe 5032 VMPDump.exe 5040 VMPDump.exe -
Processes:
resource yara_rule C:\Users\Admin\Desktop\Loader (2).exe vmprotect behavioral1/memory/2892-6-0x00007FF7BF150000-0x00007FF7BFB33000-memory.dmp vmprotect C:\Users\Admin\Desktop\Loader (2).VMPDump.exe vmprotect behavioral1/memory/1988-20-0x00007FF7BF150000-0x00007FF7BFB33000-memory.dmp vmprotect C:\Users\Admin\Desktop\Loader (2).VMPDump.exe vmprotect C:\Users\Admin\Desktop\Loader (2).VMPDump.exe vmprotect -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 3 IoCs
Processes:
tasklist.exetasklist.exetasklist.exepid process 3912 tasklist.exe 4352 tasklist.exe 3012 tasklist.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exepid process 4336 ipconfig.exe 1056 ipconfig.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 4760 taskkill.exe 1672 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133584553040508571" chrome.exe -
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2288054676-1871194608-3559553667-1000_Classes\Local Settings OpenWith.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 1612 chrome.exe 1612 chrome.exe 1924 chrome.exe 1924 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
Processes:
chrome.exepid process 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
7zFM.exetaskkill.exetasklist.exetasklist.exetaskkill.exetasklist.exechrome.exedescription pid process Token: SeRestorePrivilege 1440 7zFM.exe Token: 35 1440 7zFM.exe Token: SeSecurityPrivilege 1440 7zFM.exe Token: SeDebugPrivilege 4760 taskkill.exe Token: SeDebugPrivilege 3912 tasklist.exe Token: SeDebugPrivilege 4352 tasklist.exe Token: SeDebugPrivilege 1672 taskkill.exe Token: SeDebugPrivilege 3012 tasklist.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe Token: SeShutdownPrivilege 1612 chrome.exe Token: SeCreatePagefilePrivilege 1612 chrome.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
Processes:
7zFM.exechrome.exepid process 1440 7zFM.exe 1440 7zFM.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe 1612 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
OpenWith.exeLoader (2).exeLoader (2).VMPDump.exeLoader (2).exepid process 3472 OpenWith.exe 2892 Loader (2).exe 2892 Loader (2).exe 4772 Loader (2).VMPDump.exe 1988 Loader (2).exe 1988 Loader (2).exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Loader (2).execmd.exenet.execmd.execmd.execmd.execmd.exeLoader (2).execmd.exenet.execmd.execmd.execmd.exechrome.exedescription pid process target process PID 2892 wrote to memory of 4168 2892 Loader (2).exe cmd.exe PID 2892 wrote to memory of 4168 2892 Loader (2).exe cmd.exe PID 4168 wrote to memory of 1124 4168 cmd.exe net.exe PID 4168 wrote to memory of 1124 4168 cmd.exe net.exe PID 1124 wrote to memory of 3812 1124 net.exe net1.exe PID 1124 wrote to memory of 3812 1124 net.exe net1.exe PID 2892 wrote to memory of 1720 2892 Loader (2).exe cmd.exe PID 2892 wrote to memory of 1720 2892 Loader (2).exe cmd.exe PID 1720 wrote to memory of 4736 1720 cmd.exe w32tm.exe PID 1720 wrote to memory of 4736 1720 cmd.exe w32tm.exe PID 2892 wrote to memory of 4884 2892 Loader (2).exe cmd.exe PID 2892 wrote to memory of 4884 2892 Loader (2).exe cmd.exe PID 4884 wrote to memory of 4760 4884 cmd.exe taskkill.exe PID 4884 wrote to memory of 4760 4884 cmd.exe taskkill.exe PID 2892 wrote to memory of 2080 2892 Loader (2).exe cmd.exe PID 2892 wrote to memory of 2080 2892 Loader (2).exe cmd.exe PID 2080 wrote to memory of 1056 2080 cmd.exe ipconfig.exe PID 2080 wrote to memory of 1056 2080 cmd.exe ipconfig.exe PID 4872 wrote to memory of 3912 4872 cmd.exe tasklist.exe PID 4872 wrote to memory of 3912 4872 cmd.exe tasklist.exe PID 4872 wrote to memory of 2124 4872 cmd.exe findstr.exe PID 4872 wrote to memory of 2124 4872 cmd.exe findstr.exe PID 4872 wrote to memory of 4352 4872 cmd.exe tasklist.exe PID 4872 wrote to memory of 4352 4872 cmd.exe tasklist.exe PID 4872 wrote to memory of 2836 4872 cmd.exe findstr.exe PID 4872 wrote to memory of 2836 4872 cmd.exe findstr.exe PID 4872 wrote to memory of 532 4872 cmd.exe VMPDump.exe PID 4872 wrote to memory of 532 4872 cmd.exe VMPDump.exe PID 4872 wrote to memory of 4324 4872 cmd.exe VMPDump.exe PID 4872 wrote to memory of 4324 4872 cmd.exe VMPDump.exe PID 1988 wrote to memory of 1760 1988 Loader (2).exe cmd.exe PID 1988 wrote to memory of 1760 1988 Loader (2).exe cmd.exe PID 1760 wrote to memory of 1096 1760 cmd.exe net.exe PID 1760 wrote to memory of 1096 1760 cmd.exe net.exe PID 1096 wrote to memory of 1644 1096 net.exe net1.exe PID 1096 wrote to memory of 1644 1096 net.exe net1.exe PID 1988 wrote to memory of 1624 1988 Loader (2).exe cmd.exe PID 1988 wrote to memory of 1624 1988 Loader (2).exe cmd.exe PID 1624 wrote to memory of 1032 1624 cmd.exe w32tm.exe PID 1624 wrote to memory of 1032 1624 cmd.exe w32tm.exe PID 1988 wrote to memory of 1676 1988 Loader (2).exe cmd.exe PID 1988 wrote to memory of 1676 1988 Loader (2).exe cmd.exe PID 1676 wrote to memory of 1672 1676 cmd.exe taskkill.exe PID 1676 wrote to memory of 1672 1676 cmd.exe taskkill.exe PID 1988 wrote to memory of 1224 1988 Loader (2).exe cmd.exe PID 1988 wrote to memory of 1224 1988 Loader (2).exe cmd.exe PID 1224 wrote to memory of 4336 1224 cmd.exe ipconfig.exe PID 1224 wrote to memory of 4336 1224 cmd.exe ipconfig.exe PID 4872 wrote to memory of 3012 4872 cmd.exe tasklist.exe PID 4872 wrote to memory of 3012 4872 cmd.exe tasklist.exe PID 4872 wrote to memory of 2448 4872 cmd.exe findstr.exe PID 4872 wrote to memory of 2448 4872 cmd.exe findstr.exe PID 4872 wrote to memory of 2620 4872 cmd.exe VMPDump.exe PID 4872 wrote to memory of 2620 4872 cmd.exe VMPDump.exe PID 4872 wrote to memory of 3236 4872 cmd.exe VMPDump.exe PID 4872 wrote to memory of 3236 4872 cmd.exe VMPDump.exe PID 4872 wrote to memory of 4104 4872 cmd.exe VMPDump.exe PID 4872 wrote to memory of 4104 4872 cmd.exe VMPDump.exe PID 4872 wrote to memory of 5032 4872 cmd.exe VMPDump.exe PID 4872 wrote to memory of 5032 4872 cmd.exe VMPDump.exe PID 4872 wrote to memory of 5040 4872 cmd.exe VMPDump.exe PID 4872 wrote to memory of 5040 4872 cmd.exe VMPDump.exe PID 1612 wrote to memory of 4712 1612 chrome.exe chrome.exe PID 1612 wrote to memory of 4712 1612 chrome.exe chrome.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\vmpdump.7z1⤵
- Modifies registry class
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\vmpdump.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\findstr.exefindstr loader2⤵
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\findstr.exefindstr Loader2⤵
-
C:\Users\Admin\Desktop\VMPDump.exeVMPDump.exe 2892 ""2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\VMPDump.exeVMPDump.exe 2892 "" -ep=0x1404fea84 -disable-reloc2⤵
- Executes dropped EXE
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\findstr.exefindstr Loader2⤵
-
C:\Users\Admin\Desktop\VMPDump.exeVMPDump.exe 1988 "" -ep=0x1404fea84 -disable-reloc2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\VMPDump.exeVMPDump.exe 1988 "" -ep=0x1404926bdb -disable-reloc2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\VMPDump.exeVMPDump.exe 1988 "" -ep=0x1404fea9f -disable-reloc2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\VMPDump.exeVMPDump.exe 1988 "" -ep=0x140302000 -disable-reloc2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\VMPDump.exeVMPDump.exe 1988 "" -disable-reloc2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\Loader (2).exe"C:\Users\Admin\Desktop\Loader (2).exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net start w32time2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net.exenet start w32time3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start w32time4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c w32tm /resync /nowait2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /resync /nowait3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM RainbowSix.exe /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /IM RainbowSix.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /flushdns2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
-
C:\Users\Admin\Desktop\Loader (2).VMPDump.exe"C:\Users\Admin\Desktop\Loader (2).VMPDump.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Desktop\Loader (2).exe"C:\Users\Admin\Desktop\Loader (2).exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net start w32time2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net.exenet start w32time3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start w32time4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c w32tm /resync /nowait2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /resync /nowait3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM RainbowSix.exe /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /IM RainbowSix.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /flushdns2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff84a07ab58,0x7ff84a07ab68,0x7ff84a07ab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=1964,i,14110700903385250689,5264450279538552228,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 --field-trial-handle=1964,i,14110700903385250689,5264450279538552228,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2272 --field-trial-handle=1964,i,14110700903385250689,5264450279538552228,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3096 --field-trial-handle=1964,i,14110700903385250689,5264450279538552228,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3124 --field-trial-handle=1964,i,14110700903385250689,5264450279538552228,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4324 --field-trial-handle=1964,i,14110700903385250689,5264450279538552228,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4520 --field-trial-handle=1964,i,14110700903385250689,5264450279538552228,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4896 --field-trial-handle=1964,i,14110700903385250689,5264450279538552228,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4328 --field-trial-handle=1964,i,14110700903385250689,5264450279538552228,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5048 --field-trial-handle=1964,i,14110700903385250689,5264450279538552228,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5036 --field-trial-handle=1964,i,14110700903385250689,5264450279538552228,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5092 --field-trial-handle=1964,i,14110700903385250689,5264450279538552228,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3308 --field-trial-handle=1964,i,14110700903385250689,5264450279538552228,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4496 --field-trial-handle=1964,i,14110700903385250689,5264450279538552228,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 --field-trial-handle=1964,i,14110700903385250689,5264450279538552228,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4992 --field-trial-handle=1964,i,14110700903385250689,5264450279538552228,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000006Filesize
201KB
MD5f5bc40498b73af1cc23f51ea60130601
SHA144de2c184cf4e0a2b9106756fc860df9ed584666
SHA256c11b6273f0c5f039dfef3bf5d8efe45a2ecf65966e89eeb1a6c2277d712ae9fb
SHA5129c993ef3ec746cbe937bbe32735410257f94ceb6f734d75e401fb78dc2e3ab3b7d83c086086f0e1230dc8dafd5328f9af664341eb781c72e67c4d84d1f6c1112
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
168B
MD57b3ff945ef7a95a428bfaefc433e18d8
SHA169e710bcabbc4b963d55082abd500f9b117c613d
SHA2562669a0b46366f4c8a8fb0cde359a4f3b3ee59f4288ae54df9fc5d3f44f2f16f6
SHA5120ce7854a39e6c21fa1c612cdca10f3ecfd672904cbcc70d56a1eb075795ca24ca7d739cc332a2e24abff9ec0cdd52be02143349fdc712cf42c0c2263d4025183
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
168B
MD54e9a57ca119e17b70673f2a2db0ea541
SHA19a3b6bc5baac5e9b3dbe633fbecf8b523fde7600
SHA25653739edc3e17499831f312ed6943a5f6fa221898b10b232bfd9fbb47b7230e88
SHA512027eab423a76fc73650f738a82d6f1838c8300e3fef671bf0cdc243ab87fc5e4a8ca78745d9dc3cb6780c9d0577c74f68a9e8bdb31abc558c818b83694d1bbf5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD5818e0c8d73f0b2c84af3ede68faf6bc9
SHA10d574daf07b83b91a2fe296e40513cfd14fdf2ea
SHA256648f3266e13386a0af46cee0b9d588887c77e34148dd1901dc6a7fcb9e0de26f
SHA512e7ed3cc06e2dc14fd77f0cace747147ee9734cd989dcba46af8c37f20331088781956591ff4696e9bb1b466ea478f694d2ad1183f49411f6c421f256d8631e78
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD542b4f1fccb9cf92c2057b9d5ee9d0b17
SHA1ee1545b9fd51ba6387f81dc36848eeee2e4b4d38
SHA256d6ce13abf6c209f2f6e3bb4163343a1200f94aa0223ff9ca9ea4422547a0dd98
SHA5122287a64d2a36432a6038220ca4290abfdf82baf73cb0ddb9560a7d88129278d0994a70cea5fb7a605ff4a65b96e6afc64a1fe01980ff964723304e256ddeecbf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
356B
MD5e8acbbf2ec470c40e310e8bbd3ef7c33
SHA10abb51df15b58893c7ca4ba51af726d05cd9ec81
SHA256500a683db687e73a3019e855dcee4a8697b2b31f2a8d114e0dddfd09e2b2be5d
SHA512b2a7a84eb5d02f7a3be57a4e589c936fd766be96d801171fe5ae501b9fd79a88e44febe6e7cdb5816a8d8e3e1b001d668a6e6fe336838845a3d62746f0efdd1d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5902b02d1945658d5d0687f6ca97237f0
SHA1a030f4255dede32e3b2b9ceae9871378f49172eb
SHA2567f9ee45aeea8da00cf1ed41583420162630d7acb183fccc35711dcfe97141f04
SHA512b880a8d058f15e1cb990438df6ca6210c81c3f0b825a9f1aaf3bfb5e30f90af2aacdbbe307a2c5d3f6a542cdcb7ddb5ba1ee7847dead3a23b1acd885cb4a9067
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD50c8fdc6038ec5683277b803ed008a4da
SHA17d43bea3e9143fc4eb612c2fe56414b34e7f58aa
SHA2567af6cc71556f077ce44a9c72c06884254596850d58221434839a662a468fe6db
SHA512e445c4fb0d60c1e1096250504a6299de944c0c3d517147420ddc98954defb3bb88f0906646afe2db2b61c8dc6f4f7ba8282e61ece0c0b4b084ec3fc91592d657
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
1KB
MD5ee7c306d86c3003835e0d38dbcc21d6e
SHA1b452bd14d89c3b70422dba0c43c0dedd7c4d8242
SHA2568a83c998714fcd257d8fa9248702fcd949127e55cc5683dc961b5a15c0ab2318
SHA512c98ca2b2e74fd713f2712d5d67554e22ea20b68e8c53ef1fa4bbac22f7e5e3a83d0b737376d835b220967f0131a1614d77701bde789ef105e669859b55041747
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD50b9c7352ddc717c38d14c01a861433c2
SHA1fca048254bbf28a637640501e9492f1ef4071a83
SHA256e686ae26a152829be86c6fdcbd36fe6929842cbf098f0eed6de2e80e37f70b2b
SHA512b4d15c5ba54f2282eb7aac4da6f92731fa03bd4a768a3cd30487887e579eb86e3b78a9d53cbefa6b02915a50e36ae0811db4933a00832a9bab85abd2a65ec792
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5ba94cc5dc54724cc30e3aad257e69663
SHA1e831a0d8d3df9846cd3cbbc6138b405f9a8a9e4f
SHA25669a0612feda3aad41b2b16c0e4e6b84f63c53c7297f37fd45cf610aac42a22b2
SHA5124ee8da67c8d1326f47c503ed73454e5ffdd250180c51c8dfdb3e1748bd7460c87fd74bc360e210583a1a77f7e8c6b5677913426a4eff7eb9516acf62ce44a414
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD533c5f77d91b0bf376071a3bf1f2539fc
SHA10c773135a1c5f3d8076ad800ea0d77154624657d
SHA256b9a78b1333c0beef4ba5fefb3412ea16a4c4c0e6f3c53ff93594281bb271ca9b
SHA512222e5e159627f8a7115ae5405fac1bd19bb8ba909a46e67db3f4a8eb01f4c48a19d4c19ac2f84bd2a35e7b5687722cddea53e4ffe5169a83876f18675f869e8d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5bdbb734222fb3de474f4b057b65b3b41
SHA13f057e77d3885a1a10ea88beb0fce8d23da38377
SHA2562ae8a92b4f1a57471bc0be536726c7dfe501ed4552973b9b85e317d6f773ad46
SHA512a38e6eb43aebd68bc8506981cc5b3dce51248c0e3582d00ae8fe90875f41b334fec29688bdcb2d3f1c16de02b7b5da21262abcff54fcc2628ba8b17ccb1ac28a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD59abadb1b31bcc21820bc8cbbbcf305e5
SHA16238a2df2248e630fa4d5cdd8b1facd3bd13e411
SHA256c914324e2feb5e31270ae1c8ed4109293acf0f3bd5a53d80d22269cb345f58bf
SHA512400adc0ef8485bfc043c7918c1d34a2bf368caa68fa2b77398894bba8f7f4970a98ef321b1161e0df8e618c2b2cfeff32c14dfc0fd7f062f9fffa489cc91d515
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
16KB
MD552b33e695aa5c8dd5444cbf69ec1bc3e
SHA175f75f47bcf73e68b337a40c7c69f53386c90ce3
SHA25693a1e4c615ad8e4c23ca524c6046c30b9b140670bfb80549f27ec71696622f4c
SHA51236c021271c0e529f2f3e6d407a5f23fd61505fbc27e27b51f6afcb45dc4a0256bc466b717c632cc60de68b63249d01c5f75e7f7c8fb4bc8498531f723aa44ba6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
252KB
MD5fd1359afcbdd8ab06b3254c1cd37e433
SHA15db13c416f547ecfb39f963f556b22017ff1ccf2
SHA2567b4f05c9802176b2e683b9cb68ba1c134af70a20813d2de2cf954272c22f25d5
SHA5125995db97f0ef69496ead92d05b23e7917fbc5ec21b67409b33d9db0be40c73c2dcfd39fb30aedc47868c2a3cc7e459ea33a73ad792fae3b000b00dec36c10551
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
96KB
MD5d126ddd91b92325f97a2d4e66e782fc7
SHA16e172cdc81e9f4f4008409daeab3afd9105704db
SHA25619bbe021ab6851cce20288ca399e3bb235d17618c590cf958bf13e8af9115d57
SHA512c6c5367b95b8fa9b52b90fde3b6021abdc4beba6b49e8514bbcf0a740bba4b6efa002daacd5d4b60059dfdd901d2dde0e7c5fcb4057253600cccad317def4940
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
90KB
MD571a82ec923453b88a320020666afe4dc
SHA1a4c0aeb2cb9ce1e0e8bab5e083dc078ff00e5531
SHA256ca32b8e37bd1874d2a445c93a779eda54bd562a38579b4e6b2b3d7a6c4b9d200
SHA5127902697333cbcbe19f5e20f14e1ff376c42b524cc2aa6340a02b5ee22b66bf2b4104ce7d897b9b3e606e67a838f20f2cd2f61157c18a1ec40da3b1be80bcb051
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe5da849.TMPFilesize
89KB
MD5b69bcdd31654aa6b15d7b45f26725594
SHA18ac6e2971bbe717945d4b8c013feb7ff609e5b5a
SHA256bc7d6aa53d6c2eb861a1b827ba460c1b6f51abb08fa53f5e831782302ee3b31b
SHA512f64952eebad0b5e23ae1d5366b3e59b897cae35f44aba0fa88cb9dd9f3ea783dc5e1f3f4ddea5938081ef225d1a3a3649aa773479203e8468e630ccbee4dfffd
-
C:\Users\Admin\Desktop\AdminFilesize
1.4MB
MD58beb4b0676d3c064750be6edad0764ba
SHA1020d2082f15556b277d2df90098f619570e5e053
SHA256c63799634e85f95f9b6160f64557ae171f79f67305cbfbaf8b6f4218cf1201ec
SHA512dc28c8f1ae8c9a4fc2fa9e61e533a7367d0e4485ed1c0bbe9c9d64b7a14502f3d2e727906d2efd6f30c067f273217c45c63256ded91be9a56180dc3bc874733f
-
C:\Users\Admin\Desktop\Loader (2).VMPDump.exeFilesize
9.9MB
MD5112a60705113e7a2b46a6933aaa8d2d7
SHA12979876df87b398bf7280a9241ad52eb5e41cc15
SHA2567e92df4d8a508cda5e856642e93240b8ceb148c161d4225c7b73bd984655b8ae
SHA512e6f8ed3f502e101f02846cdca2f4c97a2f5bb82e74bc3a724598b15204b6e78fb9f03b01801ad0e640a1824cdac09a3a68377959a5b9d622ac82894cebde328b
-
C:\Users\Admin\Desktop\Loader (2).VMPDump.exeFilesize
9.9MB
MD59e4e6eab92aa1b26db44001fd7af323c
SHA12d4ef1ab0fbe5733df804dbf57ae4ba77e33d1a0
SHA2564f880322be2c02b4ada32ba4361848c2ba3218ed76a2bef06d288f90fadf0f40
SHA5126f641aa1042254fec1ff95146d41c933d512f3556b74d54faafa58e0ece9b009d4c7d4c1abce73c57cf7ef0026f8af219da007025effa96d2a781fae519f7a7a
-
C:\Users\Admin\Desktop\Loader (2).VMPDump.exeFilesize
9.9MB
MD5ff71a2f2f5b434d246a8eab6de5f5847
SHA19c36b6341cba680aea824a32f6d970614bb6fb0a
SHA256ed47bd6a71e1de464495c2ef7ee73b9f07cdc445efd3b9f834357e97cd2afd1c
SHA512b2325b59a0ae5e0d91814f996bfc696a9cae16477ac629c535b0b8d627cbc031d2dfc48b607bd9c31f08e88ec3fba3bafda7cd476c0c3f9415321f999e246472
-
C:\Users\Admin\Desktop\Loader (2).exeFilesize
4.9MB
MD5c01c4d326d65d94e05361c30821b2dbd
SHA116c0e2a2dff1e06cbdc5036d13a7444edc469193
SHA2566a79b18a0b6ce048bd93586272612296073c5b7c252e13f378914a9d2d7fc9a2
SHA51269ef9d5870d76e8175f5749b8ab24e9574c021fa8c2a0b0ea088bcd2ad93373efac252295395eb6f0d5896474d9f22275948dd79baded12a634e97e72f50abed
-
C:\Users\Admin\Desktop\VMPDump.exeFilesize
14.0MB
MD5711909ae32e6bebfe5f54336299c03ab
SHA165502a98579a6d38f2f7447f3962d25fa53c4b1d
SHA256b20bd2523d7b58b76d25c941db391038879c89b33f463f5ec136fcc5a3503e6d
SHA51243f03076874ac60d7aac3337ba638f9d41807ecb6af85b04ea5f82257bf0e5fb03604b15bc8a909e79e43cfdf08d1cf3b77584c4ad653fef932c99a8238ae3db
-
\??\pipe\crashpad_1612_EHYQTMNVOOXABDOBMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1988-20-0x00007FF7BF150000-0x00007FF7BFB33000-memory.dmpFilesize
9.9MB
-
memory/2892-6-0x00007FF7BF150000-0x00007FF7BFB33000-memory.dmpFilesize
9.9MB