Analysis
-
max time kernel
147s -
max time network
195s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
26-06-2021 18:29
Static task
static1
Behavioral task
behavioral1
Sample
kronos.exe
Resource
win7v20210410
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
kronos.exe
Resource
win10v20210408
0 signatures
0 seconds
General
-
Target
kronos.exe
-
Size
429KB
-
MD5
de9ab737905e09b69b28dc0999d08894
-
SHA1
9278a2cf97b5bd635d9950cab38afc3f82558506
-
SHA256
ffc1cfe4cfa36477ead629bd1a2c6ffb266502c3261b85de431137da411320a8
-
SHA512
698c4d119dd35fe3dc62e824d175374f9eb41925df7931b78cd33b96137b7d99f76f19889f4ca716bc3719b77d089b1772001028410473fb09d64462c08c680e
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\f5ea51da = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{521C178E-DFBB-4890-B9B7-D7ED4A76D280}\\f5ea51da.exe" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\f5ea51da = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\{521C178E-DFBB-4890-B9B7-D7ED4A76D280}\\f5ea51da.exe" svchost.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1668 set thread context of 1680 1668 kronos.exe 29 PID 580 set thread context of 1924 580 Process not Found 31 PID 580 set thread context of 2304 580 Process not Found 42 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\SoftwareProtectionPlatform\Cache\cache.dat Process not Found File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\~FontCache-S-1-5-21-2513283230-931923277-594887482-1000.dat Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 43 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA\Certificates Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Disallowed\CTLs Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Disallowed\Certificates Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Root\Certificates Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\CA Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\CA\CTLs Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Disallowed Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust\Certificates Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Root\CTLs Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust\Certificates Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust\CTLs Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust\CTLs Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\CA\Certificates Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\CA\CRLs Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache\25\52C64B7E Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\trust\CRLs Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Root\CRLs Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Policies\Microsoft\SystemCertificates\TrustedPeople Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\My Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Disallowed\CRLs Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\Root Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\trust\CRLs Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Classes\Local Settings\MuiCache Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA\CRLs Process not Found Key created \REGISTRY\USER\S-1-5-20\Software\Microsoft\SystemCertificates\CA\CTLs Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe -
Suspicious behavior: MapViewOfSection 28 IoCs
pid Process 1680 kronos.exe 1680 kronos.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 684 svchost.exe 580 Process not Found 580 Process not Found -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeDebugPrivilege 684 svchost.exe Token: SeAuditPrivilege 112 Process not Found Token: SeAuditPrivilege 112 Process not Found Token: SeAuditPrivilege 112 Process not Found Token: SeAuditPrivilege 112 Process not Found Token: SeAuditPrivilege 112 Process not Found Token: SeAuditPrivilege 864 Process not Found Token: SeAuditPrivilege 864 Process not Found Token: SeAuditPrivilege 864 Process not Found Token: SeAuditPrivilege 864 Process not Found Token: SeAuditPrivilege 864 Process not Found Token: SeAuditPrivilege 864 Process not Found Token: SeAuditPrivilege 864 Process not Found Token: SeAuditPrivilege 112 Process not Found -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1680 kronos.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe 1944 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1668 wrote to memory of 1680 1668 kronos.exe 29 PID 1668 wrote to memory of 1680 1668 kronos.exe 29 PID 1668 wrote to memory of 1680 1668 kronos.exe 29 PID 1668 wrote to memory of 1680 1668 kronos.exe 29 PID 1668 wrote to memory of 1680 1668 kronos.exe 29 PID 1668 wrote to memory of 1680 1668 kronos.exe 29 PID 1668 wrote to memory of 1680 1668 kronos.exe 29 PID 1668 wrote to memory of 1680 1668 kronos.exe 29 PID 1668 wrote to memory of 1680 1668 kronos.exe 29 PID 1668 wrote to memory of 1680 1668 kronos.exe 29 PID 1668 wrote to memory of 1680 1668 kronos.exe 29 PID 1680 wrote to memory of 684 1680 kronos.exe 30 PID 1680 wrote to memory of 684 1680 kronos.exe 30 PID 1680 wrote to memory of 684 1680 kronos.exe 30 PID 1680 wrote to memory of 684 1680 kronos.exe 30 PID 380 wrote to memory of 1264 380 Process not Found 11 PID 336 wrote to memory of 1924 336 Process not Found 31 PID 580 wrote to memory of 1924 580 Process not Found 31 PID 580 wrote to memory of 1924 580 Process not Found 31 PID 580 wrote to memory of 1924 580 Process not Found 31 PID 380 wrote to memory of 684 380 Process not Found 30 PID 380 wrote to memory of 684 380 Process not Found 30 PID 380 wrote to memory of 1944 380 Process not Found 32 PID 380 wrote to memory of 1944 380 Process not Found 32 PID 684 wrote to memory of 1944 684 svchost.exe 32 PID 380 wrote to memory of 1944 380 Process not Found 32 PID 380 wrote to memory of 1080 380 Process not Found 33 PID 380 wrote to memory of 1080 380 Process not Found 33 PID 1944 wrote to memory of 1080 1944 chrome.exe 33 PID 1944 wrote to memory of 1080 1944 chrome.exe 33 PID 1944 wrote to memory of 1080 1944 chrome.exe 33 PID 380 wrote to memory of 1080 380 Process not Found 33 PID 684 wrote to memory of 1080 684 svchost.exe 33 PID 380 wrote to memory of 1944 380 Process not Found 32 PID 380 wrote to memory of 1944 380 Process not Found 32 PID 480 wrote to memory of 1944 480 Process not Found 32 PID 480 wrote to memory of 1944 480 Process not Found 32 PID 480 wrote to memory of 1944 480 Process not Found 32 PID 480 wrote to memory of 1944 480 Process not Found 32 PID 480 wrote to memory of 1944 480 Process not Found 32 PID 480 wrote to memory of 1944 480 Process not Found 32 PID 480 wrote to memory of 1944 480 Process not Found 32 PID 480 wrote to memory of 1944 480 Process not Found 32 PID 480 wrote to memory of 1944 480 Process not Found 32 PID 380 wrote to memory of 1696 380 Process not Found 34 PID 380 wrote to memory of 1696 380 Process not Found 34 PID 1944 wrote to memory of 1696 1944 chrome.exe 34 PID 1944 wrote to memory of 1696 1944 chrome.exe 34 PID 1944 wrote to memory of 1696 1944 chrome.exe 34 PID 1944 wrote to memory of 1696 1944 chrome.exe 34 PID 1944 wrote to memory of 1696 1944 chrome.exe 34 PID 1944 wrote to memory of 1696 1944 chrome.exe 34 PID 1944 wrote to memory of 1696 1944 chrome.exe 34 PID 1944 wrote to memory of 1696 1944 chrome.exe 34 PID 1944 wrote to memory of 1696 1944 chrome.exe 34 PID 1944 wrote to memory of 1696 1944 chrome.exe 34 PID 1944 wrote to memory of 1696 1944 chrome.exe 34 PID 1944 wrote to memory of 1696 1944 chrome.exe 34 PID 1944 wrote to memory of 1696 1944 chrome.exe 34 PID 1944 wrote to memory of 1696 1944 chrome.exe 34 PID 1944 wrote to memory of 1696 1944 chrome.exe 34 PID 1944 wrote to memory of 1696 1944 chrome.exe 34 PID 1944 wrote to memory of 1696 1944 chrome.exe 34 PID 1944 wrote to memory of 1696 1944 chrome.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\kronos.exe"C:\Users\Admin\AppData\Local\Temp\kronos.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\kronos.exe"C:\Users\Admin\AppData\Local\Temp\kronos.exe"3⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:684
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-http22⤵
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x108,0x10c,0x110,0xdc,0x114,0x7fef6394f50,0x7fef6394f60,0x7fef6394f703⤵PID:1080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1124,10101104992218713556,7661174643477278575,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1136 /prefetch:23⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1124,10101104992218713556,7661174643477278575,131072 --lang=en-US --service-sandbox-type=network --disable-http2 --mojo-platform-channel-handle=1264 /prefetch:83⤵PID:332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1124,10101104992218713556,7661174643477278575,131072 --lang=en-US --service-sandbox-type=utility --disable-http2 --mojo-platform-channel-handle=1576 /prefetch:83⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1124,10101104992218713556,7661174643477278575,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2040 /prefetch:13⤵PID:712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1124,10101104992218713556,7661174643477278575,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2052 /prefetch:13⤵PID:596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1124,10101104992218713556,7661174643477278575,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2424 /prefetch:13⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1124,10101104992218713556,7661174643477278575,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2584 /prefetch:13⤵PID:2108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1124,10101104992218713556,7661174643477278575,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2540 /prefetch:13⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1124,10101104992218713556,7661174643477278575,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2600 /prefetch:13⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1124,10101104992218713556,7661174643477278575,131072 --lang=en-US --service-sandbox-type=utility --disable-http2 --mojo-platform-channel-handle=3508 /prefetch:83⤵PID:2636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1124,10101104992218713556,7661174643477278575,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1152 /prefetch:23⤵PID:2816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1124,10101104992218713556,7661174643477278575,131072 --lang=en-US --service-sandbox-type=utility --disable-http2 --mojo-platform-channel-handle=3036 /prefetch:83⤵PID:2972
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:1924
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:2304