Analysis
-
max time kernel
1658s -
max time network
1791s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
03-04-2021 07:46
Static task
static1
Behavioral task
behavioral1
Sample
Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe
Resource
win10v20201028
Behavioral task
behavioral2
Sample
Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe
Resource
win10v20201028
Behavioral task
behavioral4
Sample
Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe
Resource
win10v20201028
General
Malware Config
Extracted
azorult
http://kvaka.li/1210776429.php
Extracted
pony
http://www.oldhorse.info
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Downloads MZ/PE file
-
Executes dropped EXE 10 IoCs
pid Process 1660 keygen-pr.exe 348 keygen-step-1.exe 1124 keygen-step-3.exe 776 keygen-step-4.exe 1084 Setup.exe 820 key.exe 1380 key.exe 2952 multitimer.exe 2644 askinstall20.exe 2580 multitimer.exe -
Loads dropped DLL 23 IoCs
pid Process 684 cmd.exe 684 cmd.exe 684 cmd.exe 684 cmd.exe 684 cmd.exe 776 keygen-step-4.exe 776 keygen-step-4.exe 776 keygen-step-4.exe 776 keygen-step-4.exe 1660 keygen-pr.exe 1660 keygen-pr.exe 1660 keygen-pr.exe 1660 keygen-pr.exe 820 key.exe 776 keygen-step-4.exe 776 keygen-step-4.exe 776 keygen-step-4.exe 776 keygen-step-4.exe 2348 WerFault.exe 2348 WerFault.exe 2348 WerFault.exe 2348 WerFault.exe 2348 WerFault.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 820 set thread context of 1380 820 key.exe 43 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new multitimer.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new multitimer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2348 2644 WerFault.exe 63 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 Setup.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1296 PING.EXE -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1760 chrome.exe 1844 chrome.exe 1844 chrome.exe 820 key.exe 820 key.exe 1540 chrome.exe 2348 WerFault.exe 2348 WerFault.exe 2348 WerFault.exe 2348 WerFault.exe 2348 WerFault.exe 2348 WerFault.exe 2348 WerFault.exe 1844 chrome.exe 1844 chrome.exe 2192 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2348 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1084 Setup.exe Token: SeCreateTokenPrivilege 2644 askinstall20.exe Token: SeAssignPrimaryTokenPrivilege 2644 askinstall20.exe Token: SeLockMemoryPrivilege 2644 askinstall20.exe Token: SeIncreaseQuotaPrivilege 2644 askinstall20.exe Token: SeMachineAccountPrivilege 2644 askinstall20.exe Token: SeTcbPrivilege 2644 askinstall20.exe Token: SeSecurityPrivilege 2644 askinstall20.exe Token: SeTakeOwnershipPrivilege 2644 askinstall20.exe Token: SeLoadDriverPrivilege 2644 askinstall20.exe Token: SeSystemProfilePrivilege 2644 askinstall20.exe Token: SeSystemtimePrivilege 2644 askinstall20.exe Token: SeProfSingleProcessPrivilege 2644 askinstall20.exe Token: SeIncBasePriorityPrivilege 2644 askinstall20.exe Token: SeCreatePagefilePrivilege 2644 askinstall20.exe Token: SeCreatePermanentPrivilege 2644 askinstall20.exe Token: SeBackupPrivilege 2644 askinstall20.exe Token: SeRestorePrivilege 2644 askinstall20.exe Token: SeShutdownPrivilege 2644 askinstall20.exe Token: SeDebugPrivilege 2644 askinstall20.exe Token: SeAuditPrivilege 2644 askinstall20.exe Token: SeSystemEnvironmentPrivilege 2644 askinstall20.exe Token: SeChangeNotifyPrivilege 2644 askinstall20.exe Token: SeRemoteShutdownPrivilege 2644 askinstall20.exe Token: SeUndockPrivilege 2644 askinstall20.exe Token: SeSyncAgentPrivilege 2644 askinstall20.exe Token: SeEnableDelegationPrivilege 2644 askinstall20.exe Token: SeManageVolumePrivilege 2644 askinstall20.exe Token: SeImpersonatePrivilege 2644 askinstall20.exe Token: SeCreateGlobalPrivilege 2644 askinstall20.exe Token: 31 2644 askinstall20.exe Token: 32 2644 askinstall20.exe Token: 33 2644 askinstall20.exe Token: 34 2644 askinstall20.exe Token: 35 2644 askinstall20.exe Token: SeDebugPrivilege 2348 WerFault.exe Token: SeImpersonatePrivilege 820 key.exe Token: SeTcbPrivilege 820 key.exe Token: SeChangeNotifyPrivilege 820 key.exe Token: SeCreateTokenPrivilege 820 key.exe Token: SeBackupPrivilege 820 key.exe Token: SeRestorePrivilege 820 key.exe Token: SeIncreaseQuotaPrivilege 820 key.exe Token: SeAssignPrimaryTokenPrivilege 820 key.exe Token: SeImpersonatePrivilege 820 key.exe Token: SeTcbPrivilege 820 key.exe Token: SeChangeNotifyPrivilege 820 key.exe Token: SeCreateTokenPrivilege 820 key.exe Token: SeBackupPrivilege 820 key.exe Token: SeRestorePrivilege 820 key.exe Token: SeIncreaseQuotaPrivilege 820 key.exe Token: SeAssignPrimaryTokenPrivilege 820 key.exe Token: SeImpersonatePrivilege 820 key.exe Token: SeTcbPrivilege 820 key.exe Token: SeChangeNotifyPrivilege 820 key.exe Token: SeCreateTokenPrivilege 820 key.exe Token: SeBackupPrivilege 820 key.exe Token: SeRestorePrivilege 820 key.exe Token: SeIncreaseQuotaPrivilege 820 key.exe Token: SeAssignPrimaryTokenPrivilege 820 key.exe Token: SeImpersonatePrivilege 820 key.exe Token: SeTcbPrivilege 820 key.exe Token: SeChangeNotifyPrivilege 820 key.exe Token: SeCreateTokenPrivilege 820 key.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1844 chrome.exe 1844 chrome.exe 1844 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1932 wrote to memory of 684 1932 Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe 29 PID 1932 wrote to memory of 684 1932 Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe 29 PID 1932 wrote to memory of 684 1932 Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe 29 PID 1932 wrote to memory of 684 1932 Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe 29 PID 684 wrote to memory of 1660 684 cmd.exe 32 PID 684 wrote to memory of 1660 684 cmd.exe 32 PID 684 wrote to memory of 1660 684 cmd.exe 32 PID 684 wrote to memory of 1660 684 cmd.exe 32 PID 684 wrote to memory of 1660 684 cmd.exe 32 PID 684 wrote to memory of 1660 684 cmd.exe 32 PID 684 wrote to memory of 1660 684 cmd.exe 32 PID 684 wrote to memory of 348 684 cmd.exe 36 PID 684 wrote to memory of 348 684 cmd.exe 36 PID 684 wrote to memory of 348 684 cmd.exe 36 PID 684 wrote to memory of 348 684 cmd.exe 36 PID 684 wrote to memory of 1124 684 cmd.exe 35 PID 684 wrote to memory of 1124 684 cmd.exe 35 PID 684 wrote to memory of 1124 684 cmd.exe 35 PID 684 wrote to memory of 1124 684 cmd.exe 35 PID 684 wrote to memory of 776 684 cmd.exe 34 PID 684 wrote to memory of 776 684 cmd.exe 34 PID 684 wrote to memory of 776 684 cmd.exe 34 PID 684 wrote to memory of 776 684 cmd.exe 34 PID 1844 wrote to memory of 1516 1844 chrome.exe 33 PID 1844 wrote to memory of 1516 1844 chrome.exe 33 PID 1844 wrote to memory of 1516 1844 chrome.exe 33 PID 776 wrote to memory of 1084 776 keygen-step-4.exe 38 PID 776 wrote to memory of 1084 776 keygen-step-4.exe 38 PID 776 wrote to memory of 1084 776 keygen-step-4.exe 38 PID 776 wrote to memory of 1084 776 keygen-step-4.exe 38 PID 1660 wrote to memory of 820 1660 keygen-pr.exe 39 PID 1660 wrote to memory of 820 1660 keygen-pr.exe 39 PID 1660 wrote to memory of 820 1660 keygen-pr.exe 39 PID 1660 wrote to memory of 820 1660 keygen-pr.exe 39 PID 1660 wrote to memory of 820 1660 keygen-pr.exe 39 PID 1660 wrote to memory of 820 1660 keygen-pr.exe 39 PID 1660 wrote to memory of 820 1660 keygen-pr.exe 39 PID 1124 wrote to memory of 336 1124 keygen-step-3.exe 48 PID 1124 wrote to memory of 336 1124 keygen-step-3.exe 48 PID 1124 wrote to memory of 336 1124 keygen-step-3.exe 48 PID 1124 wrote to memory of 336 1124 keygen-step-3.exe 48 PID 336 wrote to memory of 1296 336 chrome.exe 41 PID 336 wrote to memory of 1296 336 chrome.exe 41 PID 336 wrote to memory of 1296 336 chrome.exe 41 PID 336 wrote to memory of 1296 336 chrome.exe 41 PID 820 wrote to memory of 1380 820 key.exe 43 PID 820 wrote to memory of 1380 820 key.exe 43 PID 820 wrote to memory of 1380 820 key.exe 43 PID 820 wrote to memory of 1380 820 key.exe 43 PID 820 wrote to memory of 1380 820 key.exe 43 PID 820 wrote to memory of 1380 820 key.exe 43 PID 820 wrote to memory of 1380 820 key.exe 43 PID 820 wrote to memory of 1380 820 key.exe 43 PID 820 wrote to memory of 1380 820 key.exe 43 PID 820 wrote to memory of 1380 820 key.exe 43 PID 820 wrote to memory of 1380 820 key.exe 43 PID 820 wrote to memory of 1380 820 key.exe 43 PID 820 wrote to memory of 1380 820 key.exe 43 PID 820 wrote to memory of 1380 820 key.exe 43 PID 820 wrote to memory of 1380 820 key.exe 43 PID 820 wrote to memory of 1380 820 key.exe 43 PID 820 wrote to memory of 1380 820 key.exe 43 PID 1844 wrote to memory of 332 1844 chrome.exe 45 PID 1844 wrote to memory of 332 1844 chrome.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe"C:\Users\Admin\AppData\Local\Temp\Paypal_Money_Adder_serial_keygen_by_FUTURiTY.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe -txt -scanlocal -file:potato.dat5⤵
- Executes dropped EXE
PID:1380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\EVG7RUBF0H\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\EVG7RUBF0H\multitimer.exe" 0 3060197d33d91c80.94013368 0 1015⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\EVG7RUBF0H\multitimer.exe"C:\Users\Admin\AppData\Local\Temp\EVG7RUBF0H\multitimer.exe" 1 1016⤵
- Executes dropped EXE
PID:2580
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\askinstall20.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 13685⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵PID:336
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
PID:1296
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
PID:348
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xbc,0xc0,0xc4,0x90,0xc8,0x7fef6166e00,0x7fef6166e10,0x7fef6166e202⤵
- Drops file in Program Files directory
PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1088 /prefetch:22⤵PID:332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1564 /prefetch:82⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1524 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1968 /prefetch:12⤵
- Suspicious use of WriteProcessMemory
PID:336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2008 /prefetch:12⤵PID:1220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2408 /prefetch:12⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2516 /prefetch:12⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2652 /prefetch:12⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2692 /prefetch:12⤵PID:2224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3112 /prefetch:82⤵PID:2436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3312 /prefetch:22⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3924 /prefetch:82⤵PID:2480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1016 /prefetch:82⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings2⤵PID:1172
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0x13c,0x140,0x144,0x110,0x148,0x13f467740,0x13f467750,0x13f4677603⤵PID:2960
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3856 /prefetch:82⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3824 /prefetch:82⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3616 /prefetch:82⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4100 /prefetch:82⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3844 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3836 /prefetch:82⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4088 /prefetch:82⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=532 /prefetch:82⤵PID:2636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3836 /prefetch:82⤵PID:1388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=492 /prefetch:82⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4084 /prefetch:82⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1240 /prefetch:82⤵PID:820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3624 /prefetch:82⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3788 /prefetch:82⤵PID:372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3840 /prefetch:82⤵PID:2596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1264 /prefetch:12⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4056 /prefetch:82⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1076,8147208338464969422,1357008398279230016,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2564 /prefetch:82⤵PID:3016
-