Analysis
-
max time kernel
1797s -
max time network
1799s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
28-02-2021 15:49
Static task
static1
Behavioral task
behavioral1
Sample
[CRACKHEAP.NET]PW12345IObit_Advanced_SystemCare_Pro_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
[CRACKHEAP.NET]PW12345IObit_Advanced_SystemCare_Pro_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
[CRACKHEAP.NET]PW12345IObit_Advanced_SystemCare_Pro_keygen_by_KeygenNinja.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
[CRACKHEAP.NET]PW12345IObit_Advanced_SystemCare_Pro_keygen_by_KeygenNinja.exe
Resource
win10v20201028
General
-
Target
[CRACKHEAP.NET]PW12345IObit_Advanced_SystemCare_Pro_keygen_by_KeygenNinja.exe
-
Size
9.2MB
-
MD5
003580bd9a88bacfffcacc6489bb158e
-
SHA1
1f02d19c11cce647bafd8a7793a69fe2ba910375
-
SHA256
a75c1b1675c426036ddc8e25884f8c14a0d38ad95978a4f13364e46c58e24b36
-
SHA512
e76494090eb5484076a742d91ef283e2e5c4cec816f3290474ac230460c200f53b19180609afe0cedccb474a53e09d8554aafafafcd9469eeb5d0369b5f58690
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Executes dropped EXE 7 IoCs
pid Process 2532 keygen-pr.exe 2552 keygen-step-1.exe 2592 keygen-step-3.exe 2612 keygen-step-4.exe 2728 Setup.exe 2272 key.exe 2472 key.exe -
Loads dropped DLL 14 IoCs
pid Process 2388 PING.EXE 2388 PING.EXE 2388 PING.EXE 2388 PING.EXE 2388 PING.EXE 2612 keygen-step-4.exe 2612 keygen-step-4.exe 2612 keygen-step-4.exe 2612 keygen-step-4.exe 2532 keygen-pr.exe 2532 keygen-pr.exe 2532 keygen-pr.exe 2532 keygen-pr.exe 2272 key.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2272 set thread context of 2472 2272 key.exe 53 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2388 PING.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 964 chrome.exe 1652 chrome.exe 1652 chrome.exe 2272 key.exe 2272 key.exe 2572 chrome.exe 1652 chrome.exe 1652 chrome.exe 1244 chrome.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeImpersonatePrivilege 2272 key.exe Token: SeTcbPrivilege 2272 key.exe Token: SeChangeNotifyPrivilege 2272 key.exe Token: SeCreateTokenPrivilege 2272 key.exe Token: SeBackupPrivilege 2272 key.exe Token: SeRestorePrivilege 2272 key.exe Token: SeIncreaseQuotaPrivilege 2272 key.exe Token: SeAssignPrimaryTokenPrivilege 2272 key.exe Token: SeImpersonatePrivilege 2272 key.exe Token: SeTcbPrivilege 2272 key.exe Token: SeChangeNotifyPrivilege 2272 key.exe Token: SeCreateTokenPrivilege 2272 key.exe Token: SeBackupPrivilege 2272 key.exe Token: SeRestorePrivilege 2272 key.exe Token: SeIncreaseQuotaPrivilege 2272 key.exe Token: SeAssignPrimaryTokenPrivilege 2272 key.exe Token: SeImpersonatePrivilege 2272 key.exe Token: SeTcbPrivilege 2272 key.exe Token: SeChangeNotifyPrivilege 2272 key.exe Token: SeCreateTokenPrivilege 2272 key.exe Token: SeBackupPrivilege 2272 key.exe Token: SeRestorePrivilege 2272 key.exe Token: SeIncreaseQuotaPrivilege 2272 key.exe Token: SeAssignPrimaryTokenPrivilege 2272 key.exe Token: SeImpersonatePrivilege 2272 key.exe Token: SeTcbPrivilege 2272 key.exe Token: SeChangeNotifyPrivilege 2272 key.exe Token: SeCreateTokenPrivilege 2272 key.exe Token: SeBackupPrivilege 2272 key.exe Token: SeRestorePrivilege 2272 key.exe Token: SeIncreaseQuotaPrivilege 2272 key.exe Token: SeAssignPrimaryTokenPrivilege 2272 key.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe 1652 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1652 wrote to memory of 1604 1652 chrome.exe 30 PID 1652 wrote to memory of 1604 1652 chrome.exe 30 PID 1652 wrote to memory of 1604 1652 chrome.exe 30 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 1044 1652 chrome.exe 31 PID 1652 wrote to memory of 964 1652 chrome.exe 32 PID 1652 wrote to memory of 964 1652 chrome.exe 32 PID 1652 wrote to memory of 964 1652 chrome.exe 32 PID 1652 wrote to memory of 1744 1652 chrome.exe 33 PID 1652 wrote to memory of 1744 1652 chrome.exe 33 PID 1652 wrote to memory of 1744 1652 chrome.exe 33 PID 1652 wrote to memory of 1744 1652 chrome.exe 33 PID 1652 wrote to memory of 1744 1652 chrome.exe 33 PID 1652 wrote to memory of 1744 1652 chrome.exe 33 PID 1652 wrote to memory of 1744 1652 chrome.exe 33 PID 1652 wrote to memory of 1744 1652 chrome.exe 33 PID 1652 wrote to memory of 1744 1652 chrome.exe 33 PID 1652 wrote to memory of 1744 1652 chrome.exe 33 PID 1652 wrote to memory of 1744 1652 chrome.exe 33 PID 1652 wrote to memory of 1744 1652 chrome.exe 33 PID 1652 wrote to memory of 1744 1652 chrome.exe 33 PID 1652 wrote to memory of 1744 1652 chrome.exe 33 PID 1652 wrote to memory of 1744 1652 chrome.exe 33 PID 1652 wrote to memory of 1744 1652 chrome.exe 33 PID 1652 wrote to memory of 1744 1652 chrome.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\[CRACKHEAP.NET]PW12345IObit_Advanced_SystemCare_Pro_keygen_by_KeygenNinja.exe"C:\Users\Admin\AppData\Local\Temp\[CRACKHEAP.NET]PW12345IObit_Advanced_SystemCare_Pro_keygen_by_KeygenNinja.exe"1⤵PID:1856
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe -txt -scanlocal -file:potato.dat5⤵
- Executes dropped EXE
PID:2472
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
PID:2592 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵PID:2448
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
PID:2728
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:2552
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xbc,0xc0,0xc4,0x90,0xc8,0x7fef6df6e00,0x7fef6df6e10,0x7fef6df6e202⤵
- Drops file in Program Files directory
PID:1604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1096 /prefetch:22⤵PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1720 /prefetch:82⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2020 /prefetch:12⤵PID:1256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2120 /prefetch:12⤵PID:736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2480 /prefetch:12⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2536 /prefetch:12⤵PID:1324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2552 /prefetch:12⤵PID:1368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2560 /prefetch:12⤵PID:552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3144 /prefetch:82⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3428 /prefetch:22⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3376 /prefetch:82⤵PID:2112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=528 /prefetch:82⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3508 /prefetch:82⤵PID:2708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3616 /prefetch:82⤵PID:2856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3640 /prefetch:82⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings2⤵PID:2628
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0x13c,0x140,0x144,0x110,0x148,0x13fbf7740,0x13fbf7750,0x13fbf77603⤵PID:1620
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3472 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3592 /prefetch:82⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3744 /prefetch:82⤵PID:2528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3472 /prefetch:82⤵PID:2816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3816 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3852 /prefetch:82⤵PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3432 /prefetch:82⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1016,15801915288616736400,1114045569702260690,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3744 /prefetch:82⤵PID:1512
-
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30001⤵
- Loads dropped DLL
- Runs ping.exe
PID:2388