Analysis
-
max time kernel
95s -
max time network
89s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/03/2025, 20:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://logicalrl.com/
Resource
win11-20250313-en
General
-
Target
https://logicalrl.com/
Malware Config
Signatures
-
Downloads MZ/PE file 1 IoCs
flow pid Process 31 4400 chrome.exe -
Executes dropped EXE 1 IoCs
pid Process 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe -
resource yara_rule behavioral1/files/0x001c00000002b238-126.dat vmprotect behavioral1/memory/3384-163-0x0000000140000000-0x00000001410D5000-memory.dmp vmprotect behavioral1/memory/3384-283-0x0000000140000000-0x00000001410D5000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs
When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.
description ioc Process File opened for modification C:\Users\Admin\Downloads\LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe:Zone.Identifier chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876656641610505" chrome.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2096 chrome.exe 2096 chrome.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe -
Suspicious use of AdjustPrivilegeToken 52 IoCs
description pid Process Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe Token: SeShutdownPrivilege 2096 chrome.exe Token: SeCreatePagefilePrivilege 2096 chrome.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
pid Process 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe 2096 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3384 LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2096 wrote to memory of 3484 2096 chrome.exe 79 PID 2096 wrote to memory of 3484 2096 chrome.exe 79 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 3916 2096 chrome.exe 80 PID 2096 wrote to memory of 4400 2096 chrome.exe 81 PID 2096 wrote to memory of 4400 2096 chrome.exe 81 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83 PID 2096 wrote to memory of 3688 2096 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://logicalrl.com/1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec006dcf8,0x7ffec006dd04,0x7ffec006dd102⤵PID:3484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1828,i,475005728095669570,10712309465584295612,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=1824 /prefetch:22⤵PID:3916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1412,i,475005728095669570,10712309465584295612,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=2224 /prefetch:112⤵
- Downloads MZ/PE file
PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2300,i,475005728095669570,10712309465584295612,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=2436 /prefetch:132⤵PID:3688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3096,i,475005728095669570,10712309465584295612,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:5696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3104,i,475005728095669570,10712309465584295612,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4164,i,475005728095669570,10712309465584295612,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=4188 /prefetch:92⤵PID:4436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4964,i,475005728095669570,10712309465584295612,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5128 /prefetch:142⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5524,i,475005728095669570,10712309465584295612,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5168,i,475005728095669570,10712309465584295612,262144 --variations-seed-version=20250313-050105.095000 --mojo-platform-channel-handle=5496 /prefetch:142⤵
- Subvert Trust Controls: Mark-of-the-Web Bypass
- NTFS ADS
PID:2688
-
-
C:\Users\Admin\Downloads\LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe"C:\Users\Admin\Downloads\LogicalLoader-j3I2kzSy9trlIZdsrdFuze1DD2DJYw.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3384
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:5848
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5a474714fb56e9cae1f25a30bb9b18c5a
SHA17c3bcaaffb1126074cd150bb0aade262ad633ba0
SHA256321089e8649e6fb65c6a4db5e9d00b33ef7088eb4e8e9b4dce8925edb5e1ccea
SHA512a58cd635cf5b1f5e134cab891cbda3e510c1893ced6e8f41d6836a371223cd80b0335986dc062eccbd7b64c7c3edb5ffe7962cb8aa3db6abd0dec0f7852c404a
-
Filesize
312B
MD58ce787f333cec0108ef93f244efe812a
SHA19239a52d8fc8a523ec62a6048f543409da047fcf
SHA2565cc3027877ab0ae4ef410ddd7eabc947915a9c030772c8da5eebeab0cd7d99a0
SHA5121b988923104a06aac57b5575166dc37787d109d7d3bbc92899bb52cd50650f330080d14f5f209a561a013d466babaf198f7b88edd0b21846c00395429b5dc4a5
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD5fa9cdc0cd8a0652f5d7b8903819acd40
SHA1f165c4f4ce80f6dbb1a378801d58b44b02b7591f
SHA256c3f42c8eb03d923e32c1913572923c2f694b22b7063f27ecca1a4098355a3e66
SHA5126c989b8b555982eca27908e6778730d2aefea2b8d2ff3e85cd25fe50bc4dd2cca23a42e41b341a3adafb4dc16d8362611ddf6ca1ecbae3ba7a03095529fe8980
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1019B
MD5b787330e54e6539aaeaf77fb8da10fa7
SHA120e54fc47c575f8f5ccb8a49f5c806a0c6b29e75
SHA256d33772e5ba94607e4f625b6fa71fb2ab72a37eb268103cefbce378fdc7f4cbf3
SHA512481708dc8615abf3fca808e73e877f283adeaabf3c27394ab220eb6131b39fd476e9712efd6ebf050e12769d44c27e5891f972c335c85ee8d52cfb33e03aa6fb
-
Filesize
10KB
MD5a3447dff58cc7ec072db3efeb937231c
SHA110ea65a996171121f1b017d29c4811d97b505838
SHA2560b7027d943685112501362a9b29e6810c708dd300877cffbe8d01005dbaef030
SHA512c2c086b8a4e8bc22a477f1318aec27eb6d6e1b9f4eebf960dd24af3a659e2434c76bd5ee810f8ebda68e078b408b102f1073eabe6647ddd0ce9f0b75a18fb690
-
Filesize
10KB
MD5d5d544488ea98efbbaaa8267338c2d67
SHA196d3623230dd89ea66f88f423f1587f77441c3f6
SHA256ff3fcf1293aaea4a9c7d58dfc97a15427661b410f7671946c58c487a7f1740cd
SHA512eb2cc8529f2ca5d1bf4a7f15c3b33afa75c33732c4cd689fe040ed868077f0e534310e2dc4d6f37a38e5350ef7ec9d167f1297aae60915b11b5847c89a99beff
-
Filesize
15KB
MD569b73254d9fba705761cc4ac24b246f9
SHA1fdccd69dc5d5ea1683dcd275cc4bed830ed0db67
SHA25679350f75b31ea293964b7d01e77fb8641a1530dd13ff2292a9ff459ccd4caebc
SHA5125087328ae5498b4812ab8e28b0f912550e2a40bc08ecbe20af79a6efedeb9234c76a42cfd3669a378272a55febc6dad58e4d5c75802e97db1d55a8c06ca3965a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD53c439555190649a3fb58ecb2fe16a0a1
SHA1c9607817876d2b94674545856e24a8ac760e523b
SHA2567338d9986f43dc00642dded7b657429c5bf4ade4b5cd71f97e9d49cb45edbc11
SHA512691ce3644d4ef3d33ecade3a9e0a955197688a7391f940284e41b3ff44ea43e014b3256ce8786c6fe74cd670d2ed9c1945e0a9863eea84a6bf691981c26c0e05
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57c4f6.TMP
Filesize48B
MD5e5d47151ebae7fe03c3f72bb6706daf4
SHA13e62c3d4393b385c3be297798657af88900206fb
SHA25617de95a9b78374567d782bfe57211fee877bd7d93ad4ffd15b9246056ecbccd8
SHA5121bcb5f4395765edbb496dae0b7637cd73b67a0d3e17be9140ed095d484fdecfe91fd6ed6a9e38dd899e281494cedf37f4f86a2eca09a88f1f176534cb0115d42
-
Filesize
80KB
MD5b54228e55d39a66e34b6ab5c5e7e4942
SHA15bf8112c1bafbe894fd4f94bc78abd7be4bb73cb
SHA256a5b19cd0bf683f559e7ea295d9b1527d72b1e4affd0906ccc5b32302b0941f06
SHA5120c23bb4a2b941b9e6e4499a46d430c180bd75058940ff1d29ce5ffb72a916b1f795ce844ff9e2aba01828dd7599a62cf4072c397b136889f2536ac8d233da8c7
-
Filesize
81KB
MD556d08e3336381de5f01d5fb61ba7d318
SHA1850db8c1042e1624d29fab44567d667f8dffe384
SHA25682a92d89b690f04755d402f513a42a7a0e5a0d69dc8982b465533c3c3f12cba1
SHA5121998739f5b0cb9ce68a1f0d877fbaeecc65dc460cf0c98fae296fe93f47d44ea15d2dbfb510fb4ca8835fbdded653dbf54ad6b77b701862d0bae716b0dfc63ae
-
Filesize
81KB
MD58827b3d8621f9c5c6c7251b2b88138c7
SHA1daec56da9daaba75ff07a4fa6a8c36708c0462df
SHA2561bdcfbc2ba3e9113f8c8cdcd4635b182678fe787265d52a76d18a5b3906a74cd
SHA512b5a22ebbf2083932634c716370770956d523d6beb5088e44eea8ca9c7007ac42ad2eecbac097275365b9c4d1e2d52456afbf7ada7a9bf687af2641cb6a059e3d
-
Filesize
98B
MD598fbd33e76de25a0d0889f0001a2f8d7
SHA1cb433f26fd18b6dab9c34021ab8ec6946ab3d9ea
SHA256742fb116d21d1bfc11cc1caf02019aae43e86604a193928b6c7bb4a612314cdc
SHA51228e17a93e22d1b3d2c8650fdb12f93fa7179dfd6bdfd382c18620827cd1461497c667683b32b368f298f5573c22ad94f84f0b46fa14c25a6c962002062d07a3a
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
8.3MB
MD5422892e2e35043cc2219606f9fa3d855
SHA12fb4970f33e55df52aedeadf48cdc896e9589b0e
SHA2564da86b047e5f05accd66484032b6eab439a359ea6be0560f538843620c338ce7
SHA51272a82725df275d3cc59c42af1e5ef94fcffa0e819e4eb9b93cb7317ee96449a8fbda09935435c718e4e8166cc0276075c5a2f8effc17d770f4e2ddd24ad7511c