Threat Database Trojans Fake Google Chrome Processes

Fake Google Chrome Processes

By GoldSparrow in Trojans

PC security analysts have received reports from computer users indicating Fake Google Chrome Processes present on their computer. According to these reports, computers with threat problems may contain additional Fake Google Chrome Processes, which are fake instances of the Google Chrome browser used to disguise the activities of a Trojan or other threat infection. Google Chrome runs as a memory file process which may be mimicked by the Poweliks Trojan and other threat infections. Using the Fake Google Chrome Processes, third parties may disguise their threats, allowing it to run in the background without the computer user knowing of its presence.

PC security researchers have observed that computers plagued by the Fake Google Chrome Processes may run slower than normal, crashing frequently and presenting other problems. Apart from the Fake Google Chrome Processes, other fake memory processes associated with the Fake Google Chrome Processes may include dllhost.exe and cmmon32.exe, which can be observed in the Windows Task Manager. The presence of them may be a symptom of the Poweliks Trojan, a known threat. At least six different Fake Google Chrome Processes may be running at once as soon as the infected computer starts up. This may result in very high processing power being used as well as other system resources being consumed. The Fake Google Chrome Processes are particularly effective because Google Chrome, unlike other Web browsers, may create a new memory process for each open tab or window, meaning that it is not uncommon for multiple memory processes associated with Google Chrome to run simultaneously.

Threats Linked to the Fake Google Chrome Processes

The Poweliks Trojan resides in memory rather than storing its data on a file on the infected hard drive. This may make this threat infection more difficult to detect than other threats. As soon as this Trojan infects a computer, it creates harmful entries in the infected computer's registry to confirm that the Poweliks Trojan can indeed carry out its infection. Once this Trojan has been installed, hidden behind the Fake Google Chrome Processes, it may be associated with adware and other PUPs (Potentially Unwanted Programs) used to deliver advertising content to the infected computer. The Poweliks Trojan infection process involves a connection to a remote server. It does this to carry out the following tasks:

  1. Threats linked to the Fake Google Chrome Processes may report new infections to a third-party.
  2. Threats linked to the Fake Google Chrome Processes may receive data and configuration instructions from a remote server.
  3. Threats linked to the Fake Google Chrome Processes may download and execute other threats, often in the form of adware or other PUPs.
  4. Threats associated with the Fake Google Chrome Processes may compromise data, collect information and upload it to a remote server.

The presence of the Fake Google Chrome Processes along with high CPU activity as soon as the infected computer starts up is a determining factor in ascertaining whether a computer is infected with threats. While Google Chrome may use more than one Chrome.exe memory process, multiple Fake Google Chrome Processes will start up with Windows immediately and may consume abnormally high resources compared to legitimate applications and memory processes. One simple way to differentiate the Fake Google Chrome Processes from the real Google Chrome memory processes is clicking on them on the Task Manager and choosing 'Open file location.' If the process takes the computer user to a folder that is not the Google Chrome application folder located in the Program Files folder, then it may be regarded as suspicious.

To stop the Fake Google Chrome Processes from freezing your computer entirely, the use of an updated security application is strongly recommended. Prevention of any kind of threat can be carried out with a combination of using appropriate security software and knowing how to identify tactics and suspicious content online.

Trending

Most Viewed

Loading...