Analysis
-
max time kernel
1683s -
max time network
1743s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
12-03-2022 20:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://discord.com/api/webhooks/951565322840862730/4aE4j6x4YXP3eBMbzUkURTY1g4UU99pU7a5DSU5qjg8GlmmffMOrYrR7kIL2_UkoKXuM
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
https://discord.com/api/webhooks/951565322840862730/4aE4j6x4YXP3eBMbzUkURTY1g4UU99pU7a5DSU5qjg8GlmmffMOrYrR7kIL2_UkoKXuM
Resource
win10-20220223-en
Behavioral task
behavioral3
Sample
https://discord.com/api/webhooks/951565322840862730/4aE4j6x4YXP3eBMbzUkURTY1g4UU99pU7a5DSU5qjg8GlmmffMOrYrR7kIL2_UkoKXuM
Resource
win10v2004-en-20220113
Behavioral task
behavioral4
Sample
https://discord.com/api/webhooks/951565322840862730/4aE4j6x4YXP3eBMbzUkURTY1g4UU99pU7a5DSU5qjg8GlmmffMOrYrR7kIL2_UkoKXuM
Resource
win11-20220223-en
General
-
Target
https://discord.com/api/webhooks/951565322840862730/4aE4j6x4YXP3eBMbzUkURTY1g4UU99pU7a5DSU5qjg8GlmmffMOrYrR7kIL2_UkoKXuM
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 1496 chrome.exe 1496 chrome.exe 1512 chrome.exe 1512 chrome.exe 2764 chrome.exe 2764 chrome.exe 3920 chrome.exe 3920 chrome.exe 4788 chrome.exe 4788 chrome.exe 2828 chrome.exe 2828 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe 1512 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1512 wrote to memory of 1860 1512 chrome.exe 79 PID 1512 wrote to memory of 1860 1512 chrome.exe 79 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 4560 1512 chrome.exe 80 PID 1512 wrote to memory of 1496 1512 chrome.exe 81 PID 1512 wrote to memory of 1496 1512 chrome.exe 81 PID 1512 wrote to memory of 552 1512 chrome.exe 83 PID 1512 wrote to memory of 552 1512 chrome.exe 83 PID 1512 wrote to memory of 552 1512 chrome.exe 83 PID 1512 wrote to memory of 552 1512 chrome.exe 83 PID 1512 wrote to memory of 552 1512 chrome.exe 83 PID 1512 wrote to memory of 552 1512 chrome.exe 83 PID 1512 wrote to memory of 552 1512 chrome.exe 83 PID 1512 wrote to memory of 552 1512 chrome.exe 83 PID 1512 wrote to memory of 552 1512 chrome.exe 83 PID 1512 wrote to memory of 552 1512 chrome.exe 83 PID 1512 wrote to memory of 552 1512 chrome.exe 83 PID 1512 wrote to memory of 552 1512 chrome.exe 83 PID 1512 wrote to memory of 552 1512 chrome.exe 83 PID 1512 wrote to memory of 552 1512 chrome.exe 83 PID 1512 wrote to memory of 552 1512 chrome.exe 83 PID 1512 wrote to memory of 552 1512 chrome.exe 83 PID 1512 wrote to memory of 552 1512 chrome.exe 83 PID 1512 wrote to memory of 552 1512 chrome.exe 83 PID 1512 wrote to memory of 552 1512 chrome.exe 83 PID 1512 wrote to memory of 552 1512 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://discord.com/api/webhooks/951565322840862730/4aE4j6x4YXP3eBMbzUkURTY1g4UU99pU7a5DSU5qjg8GlmmffMOrYrR7kIL2_UkoKXuM1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc2e404f50,0x7ffc2e404f60,0x7ffc2e404f702⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1660 /prefetch:22⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2024 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2332 /prefetch:82⤵PID:552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3052 /prefetch:12⤵PID:4536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3044 /prefetch:12⤵PID:1208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4292 /prefetch:82⤵PID:392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:1744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4956 /prefetch:82⤵PID:2956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4872 /prefetch:82⤵PID:680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4340 /prefetch:82⤵PID:3136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4976 /prefetch:82⤵PID:4612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4860 /prefetch:82⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4416 /prefetch:12⤵PID:4016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=896 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4624 /prefetch:82⤵PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2568 /prefetch:82⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:3452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5364 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:4012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5604 /prefetch:82⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=996 /prefetch:82⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1036 /prefetch:82⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4764 /prefetch:82⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:1168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5536 /prefetch:82⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5380 /prefetch:82⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4524 /prefetch:82⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5568 /prefetch:82⤵PID:3464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5372 /prefetch:82⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5232 /prefetch:82⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,7555133660085358254,5375925884126178329,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4364 /prefetch:82⤵PID:812
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4856