Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 12:37
Static task
static1
Behavioral task
behavioral1
Sample
Dearquiz.exe
Resource
win10v2004-20241007-en
General
-
Target
Dearquiz.exe
-
Size
2.7MB
-
MD5
ecd6e35111d8553e8c8b9a6d49120642
-
SHA1
f9e19739a6ec2be180eb56c95fc422d49d0d36de
-
SHA256
4badc43e761b7a46c9aed5a91a47605ce590b21f2a2126203cd1f264ea6eb81f
-
SHA512
50662478344f2079ee343499b69ba18062ba56816715baefc9f3f6a4976b26c32ea142b6b17657b03fc4b91babafa5f55fa0768309d5f8db350fca125bee3473
-
SSDEEP
49152:GjwzUTCh+Ha4I0ld3Ivjs+8I2m4V6PSBM3tmnWFUy1oGQhsKtAHkew6aO68:JlSaB0levem4EaBqYWfQzake
Malware Config
Extracted
xworm
85.203.4.77:7000
-
Install_directory
%ProgramData%
-
install_file
XClient.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000d000000023b9f-6.dat family_xworm behavioral1/memory/2404-36-0x0000000000B70000-0x0000000000B88000-memory.dmp family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Dearquiz.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk svchost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 2404 svchost.exe 632 Dearquiz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133759750907413721" chrome.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU taskmgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots taskmgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2404 svchost.exe 4440 chrome.exe 4440 chrome.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 2404 svchost.exe 2404 svchost.exe 2404 svchost.exe 2404 svchost.exe 2404 svchost.exe 2404 svchost.exe 2404 svchost.exe 2404 svchost.exe 4904 taskmgr.exe 2404 svchost.exe 2404 svchost.exe 2404 svchost.exe 2404 svchost.exe 2404 svchost.exe 2404 svchost.exe 4904 taskmgr.exe 2404 svchost.exe 2404 svchost.exe 2404 svchost.exe 2404 svchost.exe 2404 svchost.exe 2404 svchost.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4904 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2404 svchost.exe Token: SeDebugPrivilege 2404 svchost.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeDebugPrivilege 4904 taskmgr.exe Token: SeSystemProfilePrivilege 4904 taskmgr.exe Token: SeCreateGlobalPrivilege 4904 taskmgr.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe Token: SeCreatePagefilePrivilege 4440 chrome.exe Token: SeShutdownPrivilege 4440 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4440 chrome.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe 4904 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2404 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2404 1956 Dearquiz.exe 83 PID 1956 wrote to memory of 2404 1956 Dearquiz.exe 83 PID 1956 wrote to memory of 632 1956 Dearquiz.exe 84 PID 1956 wrote to memory of 632 1956 Dearquiz.exe 84 PID 4440 wrote to memory of 240 4440 chrome.exe 105 PID 4440 wrote to memory of 240 4440 chrome.exe 105 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4204 4440 chrome.exe 106 PID 4440 wrote to memory of 4528 4440 chrome.exe 107 PID 4440 wrote to memory of 4528 4440 chrome.exe 107 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108 PID 4440 wrote to memory of 2648 4440 chrome.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dearquiz.exe"C:\Users\Admin\AppData\Local\Temp\Dearquiz.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\svchost.exe"C:\Users\Admin\svchost.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2404
-
-
C:\Users\Admin\Dearquiz.exe"C:\Users\Admin\Dearquiz.exe"2⤵
- Executes dropped EXE
PID:632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffaabe9cc40,0x7ffaabe9cc4c,0x7ffaabe9cc582⤵PID:240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1920,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2188,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2212 /prefetch:32⤵PID:4528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2480 /prefetch:82⤵PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3284,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4580,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4780,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4792 /prefetch:82⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3760,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3752 /prefetch:82⤵PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5104,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4544 /prefetch:82⤵PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4776,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4772 /prefetch:82⤵PID:1428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4992,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4816 /prefetch:82⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4588,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4936,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5272 /prefetch:82⤵PID:4228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4924,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:1688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5292,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5216 /prefetch:22⤵PID:5648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5160,i,13736536324010348519,11797410809082280007,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5348 /prefetch:82⤵PID:6084
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2108
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4904
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:208
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5ea551c7ff107516a46903ed49eb2a5e1
SHA1dbd096e4fb523a13c18f3776a69d643056adf0ca
SHA256ce79435d9869760287df1071834ac144de5c0bd6ea36b3131932e565f87d2714
SHA5124578daee58217a043e098e6c8c892e2b047d01add2d0cde9f4bb3ba87bc4717a95a41725e09096d400045a408ba593b2d2b7a97b23a62ec4d0a1f70988537091
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2KB
MD54d4607d750df1ff7e2808fd0b450a4ac
SHA1952b8e97d82415cbc8a8f06397fffc76e13c8780
SHA256228d02a55c335f428d7dcc3d97205b105abb379437a7885bb2b617388da32ea8
SHA512312796b0bd994e153385f0ded2772b58d9d4452ba5617d0a4968418eab8d1b7f2ed7f7a354c0c6f5a71271c29e4cf236f560a8705ee1bc64586e5469c9f93327
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD58ce76c04ea636143eeed301ffc22186a
SHA18fad34160a7a44c99c7fd80997940f25c7468d33
SHA256a4b19ae238748bedfb9f3e1b3e793cc6720f3dd68b54e30ff6636c3d7c731a1a
SHA5129e9a756d3b9e38804e0efbe22b2fbd34f9c5278d18641a8af93b6c410666db77dc4b6bb5cfd7c5d9a7c27ca57a372893b77349dbfdf53febccaee7df90b6dc93
-
Filesize
9KB
MD58e8417125affa780356abcd23775f38f
SHA1d77e4d3346292230a20ababdb3139a78aeca0df7
SHA256a150b7959420493941ce957ecc28c55ef98be773d8db122c63fc2d1022b582a3
SHA512da26830e66b4b122be9d5482bdaec8bb94c4eae22ba2ce56950106e37c73e3527b0b89414521787531f859a77ec6d6c6cab7c3e8730f8be736947ad4b0a0c6bb
-
Filesize
9KB
MD5123ae1dc85e1a98bb3ae9bf6a99acdcb
SHA1b872372f9e3701cc43a28b90933ed4b8f4e44178
SHA256af787a0dbf40ceaf574b9ace12c72a2165142a9113b69b906a3fb4fbe62373ad
SHA512b4f0ddd6845b6371679cb540d7475f5d7d83ce2ee4b92fe9a5f24db0d5cb858c09392e45d3db91579c48267c6d90eb0ac5128e2912ce36583a7225454c7894bf
-
Filesize
9KB
MD5aed764220dce5177405e18f4768ce15c
SHA1fe5d65449866bd5c1e8af0ab875eed27d26f9244
SHA256a66851154f811fd45203e0675b4f8f239063bedc823dd68a5f9750c52d92a664
SHA512424361d7312f03ecc6fcad10cf3eba31d2ed2c23f49ae936b72ee5fe6e2a63004dac4b21d33d7f85a06ed903d642a6c903b95acfc9dd6b38ee4ef0817293baad
-
Filesize
9KB
MD57d128253e788ff3bbc36c4df99c13d0d
SHA17c30b83a65a3ff8ff2d94f91c00a1919f325a6a0
SHA256e2bf223f659923aeaa030a02652ea22bc106bc700ee00bb26b329be51963d1e5
SHA512c1d532f44c9ff948086270fba0ba633d677664852899a023c5340f6aa82887485af66869da113a5aaf42668769f4e5eb638e37b50984062e0ef5947ebde32037
-
Filesize
9KB
MD509fd0ef398951a02234dd49a4ec14c41
SHA19cf0f205dc4052f61811797d74c73eef0d775009
SHA256c201cb6f6f23fab0ae6aec56bb2f3383a1bf56029f0afc0caf7b53660adc4add
SHA512cfdd927c59a5075c2f0c306bd210ac4e85484f4af6322ba27d1edc0dcaae1fd32d5f359249e39eab171187021541314da84886cf380d62abc4236e4b75a7f582
-
Filesize
9KB
MD5c7559bd69a11bc89976d140fbf856c21
SHA1195cca1655864a8923199b4d400e414e88843046
SHA256271d6054e90f5cdcd114922b24b378aa097d339df0754cf37d1f11bfb870bcaa
SHA512920827d4f3d927393b14beda52d525093493e96c27194086ccfdf4f1881dd442268ec265879ab0f15de0b691da95fbcf357e1f63aa29505df41afb21b9034974
-
Filesize
9KB
MD5ad172f8ee5727df0993b1c68829772ab
SHA1164af6d060ca5c102a27de34d8f8f1ad44af1d1b
SHA256d0a6acc0bd414ee7de4dbff1f219ba8469b73c8884e067dd076662132f61c93d
SHA512f456370460d7f552e36f816247d2b42ac17df8572bafed8324b1d55c66fdab959efcb15b717c7238dd65aa9c7d55df8bc71a93253762f2719a7f9f89e47c0a7e
-
Filesize
9KB
MD59b86f4bea778a28becae7955d7c8baa7
SHA15c2d1f2aa7f27db08deac15e6fe55e40d4b35110
SHA2566522a5e46d191584a4702bdc66b250dbb06851495b4ded00ed476a7a3c1410d9
SHA51232617e826fa8e9eb112b3e8f9b1bbe4407b421d0593d0da9d1e1df6b3ea663a8efa26772c00a0a136325b8fa04b446c7e7f33c5c0f682cdcf8b371367821a2bb
-
Filesize
15KB
MD508c0290ad5985e8168d813497389356c
SHA1464f1b10a4932ea1b472bfa5d27b5ffebee7ecf9
SHA2560d0cf6f5721edfc1852237c23e6431ab6e9e89ba53ccbc9e3ff2cdbccb53fcca
SHA5125e34519a568e4ca4f9d3ae1e9ce30a26057ab7eced3c9c81dae8d43d34238e7490534cfe37c0df2c68cfb20e672c29e5a783ed915591bd08ca5ae7e980e4aa18
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5ed1a7efd6a2194b1d6829e25a462159d
SHA13816f7e11651300f21cede34d591f8aa8beeacbc
SHA256bf4a1a27d2ea0c8a228413a92064bc8ebf24b5a16bed094470b7f6f412d244ef
SHA512c1fc36867eb3e09dc755edb3d39f233f64aed69e8704a5d8932ea1e4b10a0eee2adeeff04e16506dcea17fd7c740e180051ffd908875c31eebfba2de03c7f47d
-
Filesize
233KB
MD5e5f3861e3b037545dec6fccee1f39dd9
SHA13bf9dd0ffd4865963211eee8f9c3ce7e7d88a84a
SHA2560c3a602658d946da7a409224c5bb96b4de858ebce625ff864c9f12bbb0e9904d
SHA5129ae87a7404565b91d7d7141b875ab3ebe25150fad61efd72c5daad8986423f66e473d116daa015a477faf15451528dace11c7a28a673c0c4060e7433a8149310
-
Filesize
233KB
MD58731155342c24873d7fc0add826aff29
SHA1398b3b52c285bf3981b52a7ef2ebe1935e2d20e7
SHA25667e31f55d27349b196e8e3509c1df6ab43815c67d3c18368eaffaa77bc287fca
SHA512b351412480c9906443428ff3a7ef46b8be640b14d4aea30ae64337b1bd9128bcd4ae9cba92d55a0760c991fbde03ac934ab20fd81fd57a88dfaab3540c59e2a5
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4440_1235845879\39607af5-6095-441c-9b1c-baedfe76c6a3.tmp
Filesize132KB
MD5da75bb05d10acc967eecaac040d3d733
SHA195c08e067df713af8992db113f7e9aec84f17181
SHA25633ae9b8f06dc777bb1a65a6ba6c3f2a01b25cd1afc291426b46d1df27ea6e7e2
SHA51256533de53872f023809a20d1ea8532cdc2260d40b05c5a7012c8e61576ff092f006a197f759c92c6b8c429eeec4bb542073b491ddcfd5b22cd4ecbe1a8a7c6ef
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4440_1235845879\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
670B
MD5314fc75e54731832881db84d7d2015e8
SHA1d77ea1f37dd32d1a69156917c2123aa4b268d411
SHA256cd67b9597036881dc0853fc18ef4739aa2f99acda1922b48153607cd5f30c464
SHA512ddca8a2a94205a0ade44edff86f483ecb99ed7956734b2921c8234206a4f136d1587f93a49ae833375b50bdc82934895c0156961fa15753e92b9f4c466fdafb9
-
Filesize
2.5MB
MD568268f230cf98d8c9494a955384e9448
SHA13c4c1dd67819c62f81aff206ff080084cc086196
SHA256bbc1310c8b98f4b052e78f695abdf15113911d10d8e1db4a7a351b2957d8570e
SHA512cf4508b363a6f3ed4caeea0a3af2719f997aab765d17389103315cdba842d852f93f6bef18bb6c9a6d15675fc2c54d485bfa6007170c5d5fff6bd9705688db41
-
Filesize
69KB
MD55b77ac5d1b88f4e69b3485b65048810c
SHA15159298eba8bb888806d43381c2afe91574a13ff
SHA256031264d45baafa3302be48ffcecc8c27261f1f34b21556889d76dbb34c1f7f78
SHA5121bc510af0b94557e9b7e217178d4028320a2cf793bc61d643410572875a4d604268fd24937a5e04399b58430de3078d014ecd9acdd4aee48a27a0476cafdb024