Analysis
-
max time kernel
1800s -
max time network
1713s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 05:38
Behavioral task
behavioral1
Sample
loader.exe
Resource
win7-20240508-en
General
-
Target
loader.exe
-
Size
4.8MB
-
MD5
29f96a824141fe7a04589b67ee53edec
-
SHA1
bda00deeef354a6197cd5d2a9a56a93d2ffba917
-
SHA256
583c0e4cf4d95053c2ef79ccb19894837a104b9dfa5d65a80113d17633ff0fa6
-
SHA512
223e21c5f21c59dca00a17f76e26480d3f516482001ed75bb76f305ec3be9d75dc418366a3f475119d89751acead3081e33de5570d5e637ec05e0a6efff21c30
-
SSDEEP
98304:W1jRkfKsLdVIKicKe3Qj2Ya36Ve0gMkUeDbHa4z6/wEsga3xXk:KRkfKsLBt3QjyFzMkVDbH3z6jay
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ loader.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion loader.exe -
resource yara_rule behavioral2/memory/4608-0-0x0000000140000000-0x0000000140C41000-memory.dmp themida behavioral2/memory/4608-2-0x0000000140000000-0x0000000140C41000-memory.dmp themida behavioral2/memory/4608-3-0x0000000140000000-0x0000000140C41000-memory.dmp themida behavioral2/memory/4608-4-0x0000000140000000-0x0000000140C41000-memory.dmp themida behavioral2/memory/4608-5-0x0000000140000000-0x0000000140C41000-memory.dmp themida behavioral2/memory/4608-6-0x0000000140000000-0x0000000140C41000-memory.dmp themida behavioral2/memory/4608-11-0x0000000140000000-0x0000000140C41000-memory.dmp themida behavioral2/memory/4608-22-0x0000000140000000-0x0000000140C41000-memory.dmp themida behavioral2/memory/4608-26-0x0000000140000000-0x0000000140C41000-memory.dmp themida behavioral2/memory/4608-30-0x0000000140000000-0x0000000140C41000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA loader.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 32 pastebin.com 33 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4608 loader.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133625581200336424" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4700 chrome.exe 4700 chrome.exe 4788 chrome.exe 4788 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: 33 1508 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1508 AUDIODG.EXE Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe Token: SeShutdownPrivilege 4700 chrome.exe Token: SeCreatePagefilePrivilege 4700 chrome.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 4608 loader.exe 4608 loader.exe 4608 loader.exe 4608 loader.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 4608 loader.exe 4608 loader.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe 4700 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4700 wrote to memory of 2524 4700 chrome.exe 91 PID 4700 wrote to memory of 2524 4700 chrome.exe 91 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4736 4700 chrome.exe 92 PID 4700 wrote to memory of 4920 4700 chrome.exe 93 PID 4700 wrote to memory of 4920 4700 chrome.exe 93 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94 PID 4700 wrote to memory of 3172 4700 chrome.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4608
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ff878ddab58,0x7ff878ddab68,0x7ff878ddab782⤵PID:2524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 --field-trial-handle=1980,i,10207801156313784525,1801630778934097682,131072 /prefetch:22⤵PID:4736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1996 --field-trial-handle=1980,i,10207801156313784525,1801630778934097682,131072 /prefetch:82⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2324 --field-trial-handle=1980,i,10207801156313784525,1801630778934097682,131072 /prefetch:82⤵PID:3172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3060 --field-trial-handle=1980,i,10207801156313784525,1801630778934097682,131072 /prefetch:12⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3076 --field-trial-handle=1980,i,10207801156313784525,1801630778934097682,131072 /prefetch:12⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4420 --field-trial-handle=1980,i,10207801156313784525,1801630778934097682,131072 /prefetch:12⤵PID:348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4560 --field-trial-handle=1980,i,10207801156313784525,1801630778934097682,131072 /prefetch:82⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4728 --field-trial-handle=1980,i,10207801156313784525,1801630778934097682,131072 /prefetch:82⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 --field-trial-handle=1980,i,10207801156313784525,1801630778934097682,131072 /prefetch:82⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 --field-trial-handle=1980,i,10207801156313784525,1801630778934097682,131072 /prefetch:82⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5108 --field-trial-handle=1980,i,10207801156313784525,1801630778934097682,131072 /prefetch:82⤵PID:848
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:3784
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x254,0x258,0x25c,0x230,0x260,0x7ff646d2ae48,0x7ff646d2ae58,0x7ff646d2ae683⤵PID:3368
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4448 --field-trial-handle=1980,i,10207801156313784525,1801630778934097682,131072 /prefetch:82⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4604 --field-trial-handle=1980,i,10207801156313784525,1801630778934097682,131072 /prefetch:82⤵PID:516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5192 --field-trial-handle=1980,i,10207801156313784525,1801630778934097682,131072 /prefetch:82⤵PID:4168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5148 --field-trial-handle=1980,i,10207801156313784525,1801630778934097682,131072 /prefetch:82⤵PID:4488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5316 --field-trial-handle=1980,i,10207801156313784525,1801630778934097682,131072 /prefetch:12⤵PID:2572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=5328 --field-trial-handle=1980,i,10207801156313784525,1801630778934097682,131072 /prefetch:12⤵PID:4704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3088 --field-trial-handle=1980,i,10207801156313784525,1801630778934097682,131072 /prefetch:82⤵PID:1720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2396 --field-trial-handle=1980,i,10207801156313784525,1801630778934097682,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:876
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x49c 0x3241⤵
- Suspicious use of AdjustPrivilegeToken
PID:1508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264B
MD5bbca6723e280188a2970e8f9b6c1fba9
SHA1c515d992cd55d3dfcde0d5f7b3fc272dd3cf2d4a
SHA256eb3de58f13be4bafc65dd1a0a1531f0b481ef8905fd259f546e4c7976e656f31
SHA5123578601abc10261ebd05f5228baf521b0b6cbf9bb57defc7c4a85c4bad8d1b1752d0da6291dc14e10a5627e4b7c805863fa09cab108afe72f46eed1c8bc3270b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.78.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.78.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2KB
MD524813e7e583dabc0b668a2109dc5eba9
SHA1a884c64ae78b3a3f3047bb082fe3e0691e648669
SHA256428b2bafd1f4f6a005c3c44693544aa6b241f0fc41a924a0a0330ec33b42893e
SHA51223cdbf2d7d56d45bcf98407a5741113d54e7d55a5f5381fffc893568104a886296bef6ab9d2b96e5e3173a726fe6df7df432a609d771ef8351d102db4b954369
-
Filesize
3KB
MD5efcf6db44a46074e9e0dc214a94daafa
SHA1649201d3699ec4131a22f09e47a832085eb8e9ab
SHA256f466075a30edc29ae4613547fc23e3ea5ffbeff16e2ba4f04b46eb4bfc559978
SHA5125f3d45d5b82c3f0d3ef8d0e39f6b3d64748f1422e9f61c780ff7d98ccb4c23eb58d8485ef6a25322260109f8a7c6355f8ad5a4c8c6104a87f38ac1fbc11d81e2
-
Filesize
2KB
MD529819c29eca6bc1afa027452ac781cbc
SHA1194741f149ddfa1aeabe40cdae33ac35d299677e
SHA25604eac340c7c99c0d07f2c7b5117bd24a7a7057205590689b4fa662730d744676
SHA5127c9ab372a4148ed30a044c7189fb85f5452444ccfe7dfd66df9d0ef4c3565a8f79867a8c4ff7b3751d88fffc0afd6e58b4e038f95244d5b4244d13250b094277
-
Filesize
2KB
MD5feff8a02a0d41a79bb225bea29cea3fe
SHA106c1929279b8c12f0ad032769faef301653b2730
SHA25644a98b82174ae93d299ac646bdbb587c54eee2197bd2e02708f36c7a1f2aebe0
SHA512a1057f6187673f7eb6e836179185359c12cf42d9c8fed8fc60ad389c8b09c7c529f4c7d5809e00db06670aa3472b5d65daa7daaeee1882ee6ea193bf9916fde3
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD5ebe1c6870ef28ba37c56e88c5f8eafad
SHA14b7d95f6fd74039f4ba018cb7292dbcef869fa3f
SHA2561ab29a2d8d1d7431690782cf5a534a007a630d4a220bd3eb674eaecef6879fa2
SHA512dbba85494770a39b073a051dd80be99c047b0de40378dce52d290019d8d3d1c5c8ef3311da188192e094adad65562fa6caf05daccb7d85a8185ad07f2c170ffb
-
Filesize
7KB
MD5011cf388449a23d708e513369911906f
SHA1f181f8a353e93d53cc2456c8d144c710a8b2116a
SHA256b377424901fee0029892c836d65b8783d3f0e42274e82a308aa27595c2644dd4
SHA5125a4d28788d45fdca8540a8a06ceebe7c0c69577d391a4d03d4148dcd45ea82473851534d2dfd7cc37dc6eb1b3ca06ad0a433895d6cf244cb880ed29124f2dc35
-
Filesize
16KB
MD5eb932222dfc21fc10c71a445baa2ee32
SHA1dc531be6ce384781034b40e7b983cab0e8f85154
SHA2562da93567239e64c49b47ba4bcde9b3b88f48737750bce008cf1a5773873f638d
SHA51260c2c1f9fc1f59f69960486de1fe25a1a4ee19d70fea1219f1058bc2c4864538c895185ab345e4f367d935a79c4d221a2e930e697d110167e703d9365eec7db3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD55b9ce1b5d46cd0aee1979586253da88b
SHA1f00ffa690d7ec0c15d3487fda012f2b274f4cb05
SHA25610bd9c7c233e5a15acd77ce6b0cab7706b7a821a3090ec5132bbbcdfc705237e
SHA512a0c2d900bd97ca9fd3098b70c0aded3fe8f075f8cbaa2096eacb0136c60d23c76206b5d8c9f4b40c892daac8d992ed659bea7cab62e10a86e2a36511d0be0bcf
-
Filesize
264KB
MD50009c70515b0db04f1e7a07df5af756c
SHA18ee3ca394cb7e2d40d063fc255ba19fd09797d32
SHA2564d40353f79bd4ec67ec808edf6c705e9abaae0b1875e66920dd580a6ada4e31a
SHA5128f2e86c2dcb278053afa3cd447086c0a37ca4f9a9dd2d1b1ef849eefc24ede656228511a19cb0362b224870543501f05de9ba64c0f043097f19dfd7ceec620e5
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4700_1781088812\3859dab3-ef62-4135-a938-613fa477dd63.tmp
Filesize132KB
MD5f8e609603d53c701422bbc4e026740c8
SHA15d08ba917111a8fce835be950477156720e57437
SHA256aea99c066addc7157626d59326d8e5589402f6aac551a0560b92710ba68ded8a
SHA5125cbdfc06d076665752b4a1aefd697f8af7dd2f673c2a65d363dde5e27e97451bbf6d6097c0b9003cccc886b1ec0cc3cd66be58c57076c181d2749249395462bc
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4700_1781088812\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727