Overview
overview
10Static
static
10XWorm-V5.0...db.dll
windows7-x64
1XWorm-V5.0...db.dll
windows10-2004-x64
1XWorm-V5.0...db.dll
windows7-x64
1XWorm-V5.0...db.dll
windows10-2004-x64
1XWorm-V5.0...ks.dll
windows7-x64
1XWorm-V5.0...ks.dll
windows10-2004-x64
1XWorm-V5.0...il.dll
windows7-x64
1XWorm-V5.0...il.dll
windows10-2004-x64
1XWorm-V5.0...ts.dll
windows7-x64
1XWorm-V5.0...ts.dll
windows10-2004-x64
1XWorm-V5.0...re.dll
windows7-x64
1XWorm-V5.0...re.dll
windows10-2004-x64
1XWorm-V5.0...rs.dll
windows7-x64
1XWorm-V5.0...rs.dll
windows10-2004-x64
1XWorm-V5.0...ed.dll
windows7-x64
1XWorm-V5.0...ed.dll
windows10-2004-x64
1XWorm-V5.0...ls.dll
windows7-x64
1XWorm-V5.0...ls.dll
windows10-2004-x64
1XWorm-V5.0/NAudio.dll
windows7-x64
1XWorm-V5.0/NAudio.dll
windows10-2004-x64
1XWorm-V5.0...ws.dll
windows7-x64
1XWorm-V5.0...ws.dll
windows10-2004-x64
1XWorm-V5.0...ne.dll
windows7-x64
1XWorm-V5.0...ne.dll
windows10-2004-x64
1XWorm-V5.0...at.dll
windows7-x64
1XWorm-V5.0...at.dll
windows10-2004-x64
1XWorm-V5.0...rd.dll
windows7-x64
1XWorm-V5.0...rd.dll
windows10-2004-x64
1XWorm-V5.0...er.dll
windows7-x64
1XWorm-V5.0...er.dll
windows10-2004-x64
1XWorm-V5.0...er.dll
windows7-x64
1XWorm-V5.0...er.dll
windows10-2004-x64
1Analysis
-
max time kernel
449s -
max time network
448s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 08:27
Behavioral task
behavioral1
Sample
XWorm-V5.0/Mono.Cecil.Mdb.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
XWorm-V5.0/Mono.Cecil.Mdb.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
XWorm-V5.0/Mono.Cecil.Pdb.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
XWorm-V5.0/Mono.Cecil.Pdb.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
XWorm-V5.0/Mono.Cecil.Rocks.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
XWorm-V5.0/Mono.Cecil.Rocks.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
XWorm-V5.0/Mono.Cecil.dll
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
XWorm-V5.0/Mono.Cecil.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
XWorm-V5.0/MonoMod.Backports.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
XWorm-V5.0/MonoMod.Backports.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
XWorm-V5.0/MonoMod.Core.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
XWorm-V5.0/MonoMod.Core.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
XWorm-V5.0/MonoMod.ILHelpers.dll
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
XWorm-V5.0/MonoMod.ILHelpers.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
XWorm-V5.0/MonoMod.Iced.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
XWorm-V5.0/MonoMod.Iced.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
XWorm-V5.0/MonoMod.Utils.dll
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
XWorm-V5.0/MonoMod.Utils.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
XWorm-V5.0/NAudio.dll
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
XWorm-V5.0/NAudio.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
XWorm-V5.0/Plugins/ActiveWindows.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
XWorm-V5.0/Plugins/ActiveWindows.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
XWorm-V5.0/Plugins/All-In-One.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
XWorm-V5.0/Plugins/All-In-One.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
XWorm-V5.0/Plugins/Chat.dll
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
XWorm-V5.0/Plugins/Chat.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
XWorm-V5.0/Plugins/Clipboard.dll
Resource
win7-20240220-en
Behavioral task
behavioral28
Sample
XWorm-V5.0/Plugins/Clipboard.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
XWorm-V5.0/Plugins/FileManager.dll
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
XWorm-V5.0/Plugins/FileManager.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
XWorm-V5.0/Plugins/FileSeacher.dll
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
XWorm-V5.0/Plugins/FileSeacher.dll
Resource
win10v2004-20240508-en
General
-
Target
XWorm-V5.0/MonoMod.Iced.dll
-
Size
623KB
-
MD5
c24584c6b5bc57ac46727ab15e332c4a
-
SHA1
dadd68f0fa45845fbc30fd0f8f54e8616cdd2d0b
-
SHA256
ef4a8f28226db390dd07de13afc01c8000e127c978ebf428a6637f39ac277033
-
SHA512
aabc699eef08e3483049c7ceb48842deddc52284de7f6f72d56d6eccac3989cc373839aeac61f03e7b2af203744d579fd96a4eb911cfdd0461b151c41dc6771d
-
SSDEEP
6144:Xw98C3SQzlfuStslPYAH+jUmLdf26bfDcj2511Qxu7F:q8CCYlfuGslPn+jvDTDcj251+xuR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133620499803359772" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 2152 chrome.exe 2152 chrome.exe 1248 chrome.exe 1248 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe Token: SeShutdownPrivilege 2152 chrome.exe Token: SeCreatePagefilePrivilege 2152 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe 2152 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2152 wrote to memory of 4972 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4972 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4028 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4048 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4048 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe PID 2152 wrote to memory of 4980 2152 chrome.exe chrome.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\XWorm-V5.0\MonoMod.Iced.dll,#11⤵PID:4840
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb6355ab58,0x7ffb6355ab68,0x7ffb6355ab782⤵PID:4972
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=1928,i,2589457287053162040,5973114726237732867,131072 /prefetch:22⤵PID:4028
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 --field-trial-handle=1928,i,2589457287053162040,5973114726237732867,131072 /prefetch:82⤵PID:4048
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2256 --field-trial-handle=1928,i,2589457287053162040,5973114726237732867,131072 /prefetch:82⤵PID:4980
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2988 --field-trial-handle=1928,i,2589457287053162040,5973114726237732867,131072 /prefetch:12⤵PID:4588
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2996 --field-trial-handle=1928,i,2589457287053162040,5973114726237732867,131072 /prefetch:12⤵PID:1908
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4008 --field-trial-handle=1928,i,2589457287053162040,5973114726237732867,131072 /prefetch:12⤵PID:3064
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4544 --field-trial-handle=1928,i,2589457287053162040,5973114726237732867,131072 /prefetch:82⤵PID:1744
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4240 --field-trial-handle=1928,i,2589457287053162040,5973114726237732867,131072 /prefetch:82⤵PID:2692
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4748 --field-trial-handle=1928,i,2589457287053162040,5973114726237732867,131072 /prefetch:82⤵PID:3872
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 --field-trial-handle=1928,i,2589457287053162040,5973114726237732867,131072 /prefetch:82⤵PID:4128
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4716 --field-trial-handle=1928,i,2589457287053162040,5973114726237732867,131072 /prefetch:82⤵PID:4604
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2576 --field-trial-handle=1928,i,2589457287053162040,5973114726237732867,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1248
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD5a171a8128d4a7241bb3eef4236891398
SHA1e6cf0013d342860ed828b21d17f3f189b4322836
SHA25669f0ef3a3b52b7582e0a212cb0ee11b7199ab3a6447ab59e87783ee2eaa9130b
SHA51286fb0ff66f3a1c408f7c41db5efe7d14849d8586e9c39376c4e34126042f9027e0ac517e798fac57cade6997d45659a1357089d60a6dad5bf0dc300e7ae8d38d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
354B
MD5ab6c3a264a94001234a0ff3682f8daad
SHA111a6be17c4def4d39d5c02655673a91f055fbe14
SHA256e1b9c31d2da844407414d2eea28416d837798825c0f9ff262e98165a8cadda27
SHA512af5b6cc562f072108426137ff79ab2c7b516a633aae171c15d0d815b4b91af0f6215fdb992be473d342df661e624aab6931f2370b609db4bc164de58e4b5a604
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD539c4ec37b278215f2386483f2b931fae
SHA11b0a8d7c2bb89f0f98e4eaa550416acd0dcd131c
SHA256dc2449d0eaba7fa62ba2a18777fd5b46dc3d1815314efecad1013a71836ba551
SHA51207cf5d9efa335195b15e82ffd58002397536f68ca1e8eb2bc559c4d6cd263df368f1c4f619cc93b0b5f5ddb0a39747f34a369c408c0849430f17add58cbfe636
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
16KB
MD5620336ac51c226bf82562b6452505b46
SHA1dd886b2fc0aac6cc8dce1f7ddfe74dba555f9160
SHA25606971ab5019a74f922cdce61be4f0992b88de8ed206cd6f097f47b574fd567ef
SHA512408e81ac0963cd896ef8fe152216c8f8e876a1e4589a0b8fc08895ff3eb929c2f4ca9d21fb35ba008d2a713df3dbf8135ea70bbbad1c874bac95e78988da535b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
261KB
MD5010033c86875907afd1530dcc4d08e0a
SHA1eae7945d3ee6b216df3e1f8249699c3d72175045
SHA2569dd87c2594b6c956986fac40079a052b66ecfd66cf370e2734394b4d0d378d5f
SHA51213d4e04a2de90be4dbb578029a0a93f7ec9a4ae58e6c8543afdcdae4190ba9db6db6e5d233ef986f7d127269aa8e18e17d1bf8362216d39a230cc13e9893a175
-
\??\pipe\crashpad_2152_HDMEMEZVEPJJVKRHMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e