Analysis
-
max time kernel
75s -
max time network
129s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
28/02/2021, 15:49
Static task
static1
Behavioral task
behavioral1
Sample
[CRACKHEAP.NET]PW12345IObit_Advanced_SystemCare_Pro_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
[CRACKHEAP.NET]PW12345IObit_Advanced_SystemCare_Pro_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
[CRACKHEAP.NET]PW12345IObit_Advanced_SystemCare_Pro_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
[CRACKHEAP.NET]PW12345IObit_Advanced_SystemCare_Pro_keygen_by_KeygenNinja.exe
Resource
win10v20201028
General
-
Target
[CRACKHEAP.NET]PW12345IObit_Advanced_SystemCare_Pro_keygen_by_KeygenNinja.exe
-
Size
9.2MB
-
MD5
003580bd9a88bacfffcacc6489bb158e
-
SHA1
1f02d19c11cce647bafd8a7793a69fe2ba910375
-
SHA256
a75c1b1675c426036ddc8e25884f8c14a0d38ad95978a4f13364e46c58e24b36
-
SHA512
e76494090eb5484076a742d91ef283e2e5c4cec816f3290474ac230460c200f53b19180609afe0cedccb474a53e09d8554aafafafcd9469eeb5d0369b5f58690
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Nirsoft 2 IoCs
resource yara_rule behavioral4/files/0x000200000001ac97-257.dat Nirsoft behavioral4/files/0x000200000001ac97-258.dat Nirsoft -
Executes dropped EXE 7 IoCs
pid Process 3764 keygen-pr.exe 1392 keygen-step-1.exe 2188 keygen-step-3.exe 1792 keygen-step-4.exe 648 key.exe 3428 Setup.exe 3124 key.exe -
resource yara_rule behavioral4/files/0x000100000001ac18-59.dat office_xlm_macros -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 92 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 648 set thread context of 3124 648 key.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 4516 taskkill.exe -
Runs ping.exe 1 TTPs 4 IoCs
pid Process 2384 PING.EXE 5300 PING.EXE 4480 PING.EXE 5856 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 492 chrome.exe 492 chrome.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2276 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3428 Setup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 580 wrote to memory of 4040 580 [CRACKHEAP.NET]PW12345IObit_Advanced_SystemCare_Pro_keygen_by_KeygenNinja.exe 79 PID 580 wrote to memory of 4040 580 [CRACKHEAP.NET]PW12345IObit_Advanced_SystemCare_Pro_keygen_by_KeygenNinja.exe 79 PID 580 wrote to memory of 4040 580 [CRACKHEAP.NET]PW12345IObit_Advanced_SystemCare_Pro_keygen_by_KeygenNinja.exe 79 PID 4040 wrote to memory of 3764 4040 cmd.exe 82 PID 4040 wrote to memory of 3764 4040 cmd.exe 82 PID 4040 wrote to memory of 3764 4040 cmd.exe 82 PID 4040 wrote to memory of 1392 4040 cmd.exe 83 PID 4040 wrote to memory of 1392 4040 cmd.exe 83 PID 4040 wrote to memory of 1392 4040 cmd.exe 83 PID 4040 wrote to memory of 2188 4040 cmd.exe 84 PID 4040 wrote to memory of 2188 4040 cmd.exe 84 PID 4040 wrote to memory of 2188 4040 cmd.exe 84 PID 4040 wrote to memory of 1792 4040 cmd.exe 85 PID 4040 wrote to memory of 1792 4040 cmd.exe 85 PID 4040 wrote to memory of 1792 4040 cmd.exe 85 PID 3764 wrote to memory of 648 3764 keygen-pr.exe 86 PID 3764 wrote to memory of 648 3764 keygen-pr.exe 86 PID 3764 wrote to memory of 648 3764 keygen-pr.exe 86 PID 2276 wrote to memory of 2288 2276 chrome.exe 88 PID 2276 wrote to memory of 2288 2276 chrome.exe 88 PID 1792 wrote to memory of 3428 1792 keygen-step-4.exe 89 PID 1792 wrote to memory of 3428 1792 keygen-step-4.exe 89 PID 1792 wrote to memory of 3428 1792 keygen-step-4.exe 89 PID 648 wrote to memory of 3124 648 key.exe 90 PID 648 wrote to memory of 3124 648 key.exe 90 PID 648 wrote to memory of 3124 648 key.exe 90 PID 2188 wrote to memory of 3128 2188 keygen-step-3.exe 91 PID 2188 wrote to memory of 3128 2188 keygen-step-3.exe 91 PID 2188 wrote to memory of 3128 2188 keygen-step-3.exe 91 PID 648 wrote to memory of 3124 648 key.exe 90 PID 648 wrote to memory of 3124 648 key.exe 90 PID 648 wrote to memory of 3124 648 key.exe 90 PID 648 wrote to memory of 3124 648 key.exe 90 PID 648 wrote to memory of 3124 648 key.exe 90 PID 648 wrote to memory of 3124 648 key.exe 90 PID 648 wrote to memory of 3124 648 key.exe 90 PID 648 wrote to memory of 3124 648 key.exe 90 PID 648 wrote to memory of 3124 648 key.exe 90 PID 648 wrote to memory of 3124 648 key.exe 90 PID 648 wrote to memory of 3124 648 key.exe 90 PID 648 wrote to memory of 3124 648 key.exe 90 PID 2276 wrote to memory of 3256 2276 chrome.exe 93 PID 2276 wrote to memory of 3256 2276 chrome.exe 93 PID 2276 wrote to memory of 3256 2276 chrome.exe 93 PID 2276 wrote to memory of 3256 2276 chrome.exe 93 PID 2276 wrote to memory of 3256 2276 chrome.exe 93 PID 2276 wrote to memory of 3256 2276 chrome.exe 93 PID 2276 wrote to memory of 3256 2276 chrome.exe 93 PID 2276 wrote to memory of 3256 2276 chrome.exe 93 PID 2276 wrote to memory of 3256 2276 chrome.exe 93 PID 2276 wrote to memory of 3256 2276 chrome.exe 93 PID 2276 wrote to memory of 3256 2276 chrome.exe 93 PID 2276 wrote to memory of 3256 2276 chrome.exe 93 PID 2276 wrote to memory of 3256 2276 chrome.exe 93 PID 2276 wrote to memory of 3256 2276 chrome.exe 93 PID 2276 wrote to memory of 3256 2276 chrome.exe 93 PID 2276 wrote to memory of 3256 2276 chrome.exe 93 PID 2276 wrote to memory of 3256 2276 chrome.exe 93 PID 2276 wrote to memory of 3256 2276 chrome.exe 93 PID 2276 wrote to memory of 3256 2276 chrome.exe 93 PID 2276 wrote to memory of 3256 2276 chrome.exe 93 PID 2276 wrote to memory of 3256 2276 chrome.exe 93 PID 2276 wrote to memory of 3256 2276 chrome.exe 93 PID 2276 wrote to memory of 3256 2276 chrome.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\[CRACKHEAP.NET]PW12345IObit_Advanced_SystemCare_Pro_keygen_by_KeygenNinja.exe"C:\Users\Admin\AppData\Local\Temp\[CRACKHEAP.NET]PW12345IObit_Advanced_SystemCare_Pro_keygen_by_KeygenNinja.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat5⤵
- Executes dropped EXE
PID:3124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:1392
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵PID:3128
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:4480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3428 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵PID:4796
-
-
C:\Users\Admin\AppData\Local\Temp\26FF190E7AE0F7C7.exeC:\Users\Admin\AppData\Local\Temp\26FF190E7AE0F7C7.exe 0011 installp15⤵PID:5364
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵PID:3980
-
-
C:\Users\Admin\AppData\Roaming\1614527665057.exe"C:\Users\Admin\AppData\Roaming\1614527665057.exe" /sjson "C:\Users\Admin\AppData\Roaming\1614527665057.txt"6⤵PID:4948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵PID:5696
-
-
C:\Users\Admin\AppData\Roaming\1614527671137.exe"C:\Users\Admin\AppData\Roaming\1614527671137.exe" /sjson "C:\Users\Admin\AppData\Roaming\1614527671137.txt"6⤵PID:5024
-
-
-
C:\Users\Admin\AppData\Local\Temp\26FF190E7AE0F7C7.exeC:\Users\Admin\AppData\Local\Temp\26FF190E7AE0F7C7.exe 200 installp15⤵PID:5380
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵PID:4476
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
PID:4516
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\26FF190E7AE0F7C7.exe"6⤵PID:4960
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 37⤵
- Runs ping.exe
PID:2384
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"5⤵PID:5560
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
PID:5856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\Install.exe"4⤵PID:5596
-
C:\Users\Admin\AppData\Local\Temp\ULB2ZJ72X8\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ULB2ZJ72X8\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵PID:5872
-
C:\Users\Admin\AppData\Local\Temp\ULB2ZJ72X8\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ULB2ZJ72X8\multitimer.exe" 1 3.1614527450.603bbbda947ef 1016⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\ULB2ZJ72X8\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\ULB2ZJ72X8\multitimer.exe" 2 3.1614527450.603bbbda947ef7⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\fz5hj23hll3\1h1n22gphrn.exe"C:\Users\Admin\AppData\Local\Temp\fz5hj23hll3\1h1n22gphrn.exe" /VERYSILENT8⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\is-40VN7.tmp\1h1n22gphrn.tmp"C:\Users\Admin\AppData\Local\Temp\is-40VN7.tmp\1h1n22gphrn.tmp" /SL5="$801E2,870426,780800,C:\Users\Admin\AppData\Local\Temp\fz5hj23hll3\1h1n22gphrn.exe" /VERYSILENT9⤵PID:5168
-
-
-
C:\Users\Admin\AppData\Local\Temp\a4lclwb15ye\safebits.exe"C:\Users\Admin\AppData\Local\Temp\a4lclwb15ye\safebits.exe" /S /pubid=1 /subid=4518⤵PID:4628
-
-
C:\Users\Admin\AppData\Local\Temp\ju1dnja50bh\y4pfbyv1agg.exe"C:\Users\Admin\AppData\Local\Temp\ju1dnja50bh\y4pfbyv1agg.exe" testparams8⤵PID:4648
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"4⤵PID:5964
-
C:\Users\Admin\AppData\Roaming\21C1.tmp.exe"C:\Users\Admin\AppData\Roaming\21C1.tmp.exe"5⤵PID:2284
-
C:\Users\Admin\AppData\Roaming\21C1.tmp.exe"C:\Users\Admin\AppData\Roaming\21C1.tmp.exe"6⤵PID:2880
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX2\file.exe"5⤵PID:5284
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
PID:5300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\md2_2efs.exe"4⤵PID:4172
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xc8,0xcc,0xd0,0xa4,0xd4,0x7ffee7a06e00,0x7ffee7a06e10,0x7ffee7a06e202⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1668,5176861300180183836,12231015272069016502,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1676 /prefetch:22⤵PID:3256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1668,5176861300180183836,12231015272069016502,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1724 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1668,5176861300180183836,12231015272069016502,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2152 /prefetch:82⤵PID:652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1668,5176861300180183836,12231015272069016502,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2576 /prefetch:12⤵PID:376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1668,5176861300180183836,12231015272069016502,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2584 /prefetch:12⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1668,5176861300180183836,12231015272069016502,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1668,5176861300180183836,12231015272069016502,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3564 /prefetch:12⤵PID:4156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1668,5176861300180183836,12231015272069016502,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3724 /prefetch:12⤵PID:4180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1668,5176861300180183836,12231015272069016502,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3796 /prefetch:12⤵PID:4212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1668,5176861300180183836,12231015272069016502,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4172 /prefetch:82⤵PID:4468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1668,5176861300180183836,12231015272069016502,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4612 /prefetch:82⤵PID:4912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1668,5176861300180183836,12231015272069016502,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 /prefetch:82⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1668,5176861300180183836,12231015272069016502,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5064 /prefetch:82⤵PID:5256
-
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings2⤵PID:5244
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff769e37740,0x7ff769e37750,0x7ff769e377603⤵PID:5284
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1668,5176861300180183836,12231015272069016502,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4904 /prefetch:82⤵PID:5432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1668,5176861300180183836,12231015272069016502,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4908 /prefetch:82⤵PID:5320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1668,5176861300180183836,12231015272069016502,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4708 /prefetch:82⤵PID:5496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1668,5176861300180183836,12231015272069016502,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵PID:5724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1668,5176861300180183836,12231015272069016502,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5620 /prefetch:82⤵PID:5736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1668,5176861300180183836,12231015272069016502,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4900 /prefetch:82⤵PID:5840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1668,5176861300180183836,12231015272069016502,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4880 /prefetch:82⤵PID:5912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1668,5176861300180183836,12231015272069016502,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5028 /prefetch:82⤵PID:5192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1668,5176861300180183836,12231015272069016502,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2020 /prefetch:82⤵PID:5388
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:4900
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 8CF0249132EB578B3CABBD165FA313B8 C2⤵PID:5072
-