Analysis
-
max time kernel
2639s -
max time network
2669s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
24/03/2022, 13:27
Static task
static1
Behavioral task
behavioral1
Sample
Win32/Backdoor.Win32.APT34.PoisonFrogC2.7z
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
Win32/Backdoor.Win32.APT34.PoisonFrogC2.7z
Resource
win10v2004-en-20220113
General
-
Target
Win32/Backdoor.Win32.APT34.PoisonFrogC2.7z
-
Size
8.8MB
-
MD5
3b6d4a4934ede73be196aa8a9bd83dc7
-
SHA1
6b91821f2be5586d6e10036d8fb6d52ad710124e
-
SHA256
00d7aa1301eb8fd81297223562b2bdcaaad25413698295cf189508f7be8e5e25
-
SHA512
9e0dad6f810b420f3247a631d101359c0e2217a744fad6c1e92967fbdf1a8f4638f8a4818723def3f96a116ae8fd0fcecd8e035b2ddbeeab11e15c793559f069
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 4856 7z2107-x64.exe 4504 7z2107-x64.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\sk.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kk.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tk.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\af.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ps.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\License.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sl.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\History.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\tg.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt 7z2107-x64.exe File created C:\Program Files\7-Zip\Lang\tg.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\7z.dll 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\7z.exe 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\en.ttt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\io.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\7-zip32.dll 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt 7z2107-x64.exe File created C:\Program Files\7-Zip\Lang\tk.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt 7z2107-x64.exe File opened for modification C:\Program Files\7-Zip\Lang\sw.txt 7z2107-x64.exe File created C:\Program Files\7-Zip\Lang\uz-cyrl.txt 7z2107-x64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies registry class 23 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2107-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip 7z2107-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2107-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2107-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2107-x64.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2107-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2107-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32 7z2107-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\DragDropHandlers\7-Zip 7z2107-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip32.dll" 7z2107-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ = "C:\\Program Files\\7-Zip\\7-zip.dll" 7z2107-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2107-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2107-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32\ThreadingModel = "Apartment" 7z2107-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\7-Zip\ = "{23170F69-40C1-278A-1000-000100020000}" 7z2107-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\7-Zip 7z2107-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\7-Zip 7z2107-x64.exe Key created \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000} 7z2107-x64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{23170F69-40C1-278A-1000-000100020000}\ = "7-Zip Shell Extension" 7z2107-x64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\7-Zip 7z2107-x64.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1284 chrome.exe 1284 chrome.exe 3688 chrome.exe 3688 chrome.exe 3228 chrome.exe 3228 chrome.exe 4400 chrome.exe 4400 chrome.exe 4504 chrome.exe 4504 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 2180 chrome.exe 1872 chrome.exe 1872 chrome.exe 1524 chrome.exe 1524 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe 3228 chrome.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3116 OpenWith.exe 4856 7z2107-x64.exe 4504 7z2107-x64.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3228 wrote to memory of 4368 3228 chrome.exe 98 PID 3228 wrote to memory of 4368 3228 chrome.exe 98 PID 4072 wrote to memory of 4232 4072 chrome.exe 97 PID 4072 wrote to memory of 4232 4072 chrome.exe 97 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 3228 wrote to memory of 1420 3228 chrome.exe 103 PID 4072 wrote to memory of 4136 4072 chrome.exe 102 PID 4072 wrote to memory of 4136 4072 chrome.exe 102 PID 4072 wrote to memory of 4136 4072 chrome.exe 102 PID 4072 wrote to memory of 4136 4072 chrome.exe 102 PID 4072 wrote to memory of 4136 4072 chrome.exe 102 PID 4072 wrote to memory of 4136 4072 chrome.exe 102 PID 4072 wrote to memory of 4136 4072 chrome.exe 102 PID 4072 wrote to memory of 4136 4072 chrome.exe 102 PID 4072 wrote to memory of 4136 4072 chrome.exe 102 PID 4072 wrote to memory of 4136 4072 chrome.exe 102 PID 4072 wrote to memory of 4136 4072 chrome.exe 102 PID 4072 wrote to memory of 4136 4072 chrome.exe 102 PID 4072 wrote to memory of 4136 4072 chrome.exe 102 PID 4072 wrote to memory of 4136 4072 chrome.exe 102 PID 4072 wrote to memory of 4136 4072 chrome.exe 102 PID 4072 wrote to memory of 4136 4072 chrome.exe 102 PID 4072 wrote to memory of 4136 4072 chrome.exe 102 PID 4072 wrote to memory of 4136 4072 chrome.exe 102 PID 4072 wrote to memory of 4136 4072 chrome.exe 102 PID 4072 wrote to memory of 4136 4072 chrome.exe 102
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Win32\Backdoor.Win32.APT34.PoisonFrogC2.7z1⤵
- Modifies registry class
PID:4036
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3116
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:3856
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc82aa4f50,0x7ffc82aa4f60,0x7ffc82aa4f702⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1624,1521678806352944995,4777820227792589599,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1640 /prefetch:22⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1624,1521678806352944995,4777820227792589599,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc82aa4f50,0x7ffc82aa4f60,0x7ffc82aa4f702⤵PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1640 /prefetch:22⤵PID:1420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2428 /prefetch:82⤵PID:2368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2948 /prefetch:12⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2912 /prefetch:12⤵PID:740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4252 /prefetch:12⤵PID:5116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4180 /prefetch:82⤵PID:1640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5276 /prefetch:82⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5276 /prefetch:82⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1684 /prefetch:82⤵PID:4108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1544 /prefetch:12⤵PID:3120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:12⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4516 /prefetch:82⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4508 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2384 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4500 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5788 /prefetch:82⤵PID:4636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4804 /prefetch:82⤵PID:3344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5824 /prefetch:82⤵PID:3740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5324 /prefetch:82⤵PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2348 /prefetch:82⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:12⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5492 /prefetch:82⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6136 /prefetch:82⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4928 /prefetch:82⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4956 /prefetch:82⤵PID:1056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4944 /prefetch:82⤵PID:508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4828 /prefetch:82⤵PID:4236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4980 /prefetch:82⤵PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4656 /prefetch:82⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4640 /prefetch:82⤵PID:180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6316 /prefetch:82⤵PID:816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:2784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:1428
-
-
C:\Users\Admin\Downloads\7z2107-x64.exe"C:\Users\Admin\Downloads\7z2107-x64.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5276 /prefetch:82⤵PID:1364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4712 /prefetch:82⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4356 /prefetch:82⤵PID:4008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4960 /prefetch:82⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1076 /prefetch:82⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4968 /prefetch:82⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4304 /prefetch:82⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5888 /prefetch:82⤵PID:2904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4400 /prefetch:82⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3128 /prefetch:82⤵PID:3832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3372 /prefetch:82⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3320 /prefetch:82⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6116 /prefetch:82⤵PID:2560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1628,14119137766818691516,9107991870973119008,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2380 /prefetch:82⤵PID:1604
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1184
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4364
-
C:\Users\Admin\Downloads\7z2107-x64.exe"C:\Users\Admin\Downloads\7z2107-x64.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4504
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:668
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,Control_RunDLL C:\Windows\System32\srchadmin.dll ,1⤵PID:1216