Analysis
-
max time kernel
1288s -
max time network
1652s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
25-10-2022 09:49
Static task
static1
General
-
Target
GXPhmnNRPG_wynmove.js
-
Size
38KB
-
MD5
3dff90e5de574801e0a812ed337429eb
-
SHA1
1e0187f461e12cdc313640af5d5a82402f1fc121
-
SHA256
869125ed76969ba80597b88176721fe581d331a114f94e9906c8d152f7388ee3
-
SHA512
b77867ed63406be2a6c084141062bec420e37ea3862efa363cd460f098cb7a7faf83bf3d76a3abb9fbd7a595bf4a5b45913d0774d6cb982af60db713c25e42fb
-
SSDEEP
768:j3hbrMfo56OPGgF7aM4gF8wsZ1va/a9zcHEdYHzePb:7tRsS7aMPCwsZ14a9zcH+IzePb
Malware Config
Extracted
C:\Users\Admin\Desktop\@Please_Read_Me@.txt
wannacry
13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Extracted
redline
Test123ND
0.tcp.ngrok.io:11252
Extracted
darkcomet
Guest16
gameservice.ddns.net:4320
DC_MUTEX-WBUNVXD
-
InstallPath
AudioDriver\taskhost.exe
-
gencode
EWSsWwgyJrUD
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
AudioDriver
Extracted
wshrat
http://45.139.105.174:7670
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
upx_compresser.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\AudioDriver\\taskhost.exe" upx_compresser.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 11 IoCs
Processes:
resource yara_rule behavioral1/memory/6036-163-0x0000000000190000-0x00000000009AC000-memory.dmp family_redline behavioral1/memory/6036-164-0x0000000000190000-0x00000000009AC000-memory.dmp family_redline behavioral1/memory/4824-172-0x0000000000030000-0x000000000084C000-memory.dmp family_redline behavioral1/memory/4824-173-0x0000000000030000-0x000000000084C000-memory.dmp family_redline behavioral1/memory/2808-180-0x00000000005E0000-0x0000000000DFC000-memory.dmp family_redline behavioral1/memory/2808-181-0x00000000005E0000-0x0000000000DFC000-memory.dmp family_redline behavioral1/memory/4932-187-0x0000000000190000-0x00000000009AC000-memory.dmp family_redline behavioral1/memory/4932-189-0x0000000000190000-0x00000000009AC000-memory.dmp family_redline behavioral1/memory/3904-193-0x00000000005E0000-0x0000000000DFC000-memory.dmp family_redline behavioral1/memory/3904-196-0x00000000005E0000-0x0000000000DFC000-memory.dmp family_redline behavioral1/memory/3904-197-0x00000000005E0000-0x0000000000DFC000-memory.dmp family_redline -
Wannacry
WannaCry is a ransomware cryptoworm.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
Processes:
Kurome.Builder.exeKurome.Host.exeKurome.Loader.exePanel.exeKurome.Loader.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Kurome.Builder.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Kurome.Host.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Kurome.Loader.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Panel.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Kurome.Loader.exe -
Blocklisted process makes network request 64 IoCs
Processes:
wscript.exewscript.exewscript.exeflow pid process 7 4880 wscript.exe 8 1332 wscript.exe 9 4764 wscript.exe 15 4764 wscript.exe 25 4764 wscript.exe 28 4764 wscript.exe 51 4764 wscript.exe 70 4764 wscript.exe 80 1332 wscript.exe 81 4880 wscript.exe 87 4764 wscript.exe 96 4764 wscript.exe 98 4764 wscript.exe 103 4764 wscript.exe 107 4764 wscript.exe 108 4880 wscript.exe 109 1332 wscript.exe 110 4764 wscript.exe 113 4764 wscript.exe 114 4764 wscript.exe 116 4764 wscript.exe 124 4764 wscript.exe 130 4764 wscript.exe 134 1332 wscript.exe 135 4880 wscript.exe 140 4764 wscript.exe 152 4764 wscript.exe 156 4764 wscript.exe 165 4764 wscript.exe 166 4764 wscript.exe 170 4764 wscript.exe 171 1332 wscript.exe 172 4880 wscript.exe 173 4764 wscript.exe 174 4764 wscript.exe 175 4764 wscript.exe 176 4764 wscript.exe 178 4764 wscript.exe 179 1332 wscript.exe 180 4880 wscript.exe 181 4764 wscript.exe 182 4764 wscript.exe 183 4764 wscript.exe 191 4764 wscript.exe 198 4764 wscript.exe 200 4764 wscript.exe 201 1332 wscript.exe 202 4880 wscript.exe 203 4764 wscript.exe 204 4764 wscript.exe 205 4764 wscript.exe 209 4764 wscript.exe 211 4764 wscript.exe 213 4880 wscript.exe 214 1332 wscript.exe 216 4764 wscript.exe 217 4764 wscript.exe 218 4764 wscript.exe 221 4764 wscript.exe 222 4764 wscript.exe 223 4764 wscript.exe 224 4880 wscript.exe 225 1332 wscript.exe 226 4764 wscript.exe -
Executes dropped EXE 44 IoCs
Processes:
ChromeRecovery.exetaskdl.exe@WanaDecryptor@.exe@WanaDecryptor@.exetaskhsvc.exetaskdl.exetaskse.exe@WanaDecryptor@.exetaskdl.exetaskse.exe@WanaDecryptor@.exetaskdl.exetaskse.exe@WanaDecryptor@.exetaskse.exe@WanaDecryptor@.exetaskdl.exetaskse.exe@WanaDecryptor@.exetaskdl.exetaskse.exe@WanaDecryptor@.exetaskdl.exetaskse.exe@WanaDecryptor@.exetaskdl.exetaskse.exe@WanaDecryptor@.exetaskdl.exetaskse.exe@WanaDecryptor@.exetaskdl.exesvshost.exejusched.exeWinlockerBuilderv5.exeupx_compresser.exeupx_compresser.exetaskse.exetaskmgr.exetaskdl.exetaskhost.exetaskhost.exesvshost.exeWinlockerBuilderv5.exepid process 4164 ChromeRecovery.exe 396 taskdl.exe 4148 @WanaDecryptor@.exe 4532 @WanaDecryptor@.exe 2196 taskhsvc.exe 4556 taskdl.exe 4576 taskse.exe 3424 @WanaDecryptor@.exe 1828 taskdl.exe 1080 taskse.exe 5208 @WanaDecryptor@.exe 368 taskdl.exe 5192 taskse.exe 5832 @WanaDecryptor@.exe 1512 taskse.exe 3432 @WanaDecryptor@.exe 4284 taskdl.exe 5716 taskse.exe 972 @WanaDecryptor@.exe 5960 taskdl.exe 3128 taskse.exe 476 @WanaDecryptor@.exe 4452 taskdl.exe 5196 taskse.exe 4844 @WanaDecryptor@.exe 3952 taskdl.exe 1664 taskse.exe 2392 @WanaDecryptor@.exe 4144 taskdl.exe 5324 taskse.exe 3180 @WanaDecryptor@.exe 4508 taskdl.exe 3100 svshost.exe 5612 jusched.exe 2788 WinlockerBuilderv5.exe 5260 upx_compresser.exe 3876 upx_compresser.exe 5664 taskse.exe 5844 taskmgr.exe 824 taskdl.exe 4092 taskhost.exe 3960 taskhost.exe 1940 svshost.exe 4836 WinlockerBuilderv5.exe -
Processes:
resource yara_rule behavioral1/memory/2788-303-0x0000000000400000-0x0000000000C89000-memory.dmp upx behavioral1/memory/4836-309-0x0000000000400000-0x0000000000C89000-memory.dmp upx behavioral1/memory/2788-310-0x0000000000400000-0x0000000000C89000-memory.dmp upx behavioral1/memory/4836-313-0x0000000000400000-0x0000000000C89000-memory.dmp upx behavioral1/memory/2788-314-0x0000000000400000-0x0000000000C89000-memory.dmp upx behavioral1/memory/4836-315-0x0000000000400000-0x0000000000C89000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Kurome.Builder.exeKurome.Loader.exePanel.exeKurome.Host.exeKurome.Loader.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Kurome.Builder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Kurome.Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Panel.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Panel.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Kurome.Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Kurome.Builder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Kurome.Host.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Kurome.Host.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Kurome.Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Kurome.Loader.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exesvshost.exeupx_compresser.exejusched.exesvshost.exewscript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation svshost.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation upx_compresser.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation jusched.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation svshost.exe Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation wscript.exe -
Drops startup file 19 IoCs
Processes:
taskmgr.exeed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exetaskmgr.exetaskmgr.exewscript.exewscript.exewscript.exewscript.exedescription ioc process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\gxphmnnrpg_wynmove.js taskmgr.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\~SD96B2.tmp ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GXPhmnNRPG_wynmove.js.WNCRYT ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nYnEJuzswi.js ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\nynejuzswi.js.wncry taskmgr.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\gxphmnnrpg_wynmove.js taskmgr.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\nynejuzswi.js taskmgr.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\nynejuzswi.js taskmgr.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nYnEJuzswi.js.WNCRYT ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nYnEJuzswi.js.WNCRY ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GXPhmnNRPG_wynmove.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GXPhmnNRPG_wynmove.js ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GXPhmnNRPG_wynmove.js.WNCRY ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\gxphmnnrpg_wynmove.js.wncry taskmgr.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GXPhmnNRPG_wynmove.js wscript.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nYnEJuzswi.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nYnEJuzswi.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nYnEJuzswi.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\~SD96C8.tmp ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe -
Loads dropped DLL 35 IoCs
Processes:
configuretion.exeBuilder.exetaskhsvc.exepid process 5940 configuretion.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 4892 Builder.exe 2196 taskhsvc.exe 2196 taskhsvc.exe 2196 taskhsvc.exe 2196 taskhsvc.exe 2196 taskhsvc.exe 2196 taskhsvc.exe 2196 taskhsvc.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Processes:
resource yara_rule behavioral1/memory/6036-163-0x0000000000190000-0x00000000009AC000-memory.dmp themida behavioral1/memory/6036-164-0x0000000000190000-0x00000000009AC000-memory.dmp themida behavioral1/memory/4824-172-0x0000000000030000-0x000000000084C000-memory.dmp themida behavioral1/memory/4824-173-0x0000000000030000-0x000000000084C000-memory.dmp themida behavioral1/memory/2808-180-0x00000000005E0000-0x0000000000DFC000-memory.dmp themida behavioral1/memory/2808-181-0x00000000005E0000-0x0000000000DFC000-memory.dmp themida behavioral1/memory/4932-187-0x0000000000190000-0x00000000009AC000-memory.dmp themida behavioral1/memory/4932-189-0x0000000000190000-0x00000000009AC000-memory.dmp themida behavioral1/memory/3904-196-0x00000000005E0000-0x0000000000DFC000-memory.dmp themida behavioral1/memory/3904-197-0x00000000005E0000-0x0000000000DFC000-memory.dmp themida -
Adds Run key to start application 2 TTPs 16 IoCs
Processes:
wscript.exewscript.exeSearchApp.exeWinlockerBuilderv5.exeupx_compresser.exejusched.exereg.exemsedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GXPhmnNRPG_wynmove = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\GXPhmnNRPG_wynmove.js\"" wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a5b002eacf54590ec8401ff6d3f920ee = "C:\\Users\\Admin\\Desktop\\WinlockerBuilderv5.exe" SearchApp.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a5b002eacf54590ec8401ff6d3f920ee = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\MyClient\\jusched.exe" WinlockerBuilderv5.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AudioDriver = "C:\\Users\\Admin\\Documents\\AudioDriver\\taskhost.exe" upx_compresser.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a5b002eacf54590ec8401ff6d3f920ee = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Microsoft\\MyClient\\jusched.exe" jusched.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\software\microsoft\windows\currentversion\run wscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\zywnfqwizjcp627 = "\"C:\\Users\\Admin\\Desktop\\tasksche.exe\"" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GXPhmnNRPG_wynmove = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\GXPhmnNRPG_wynmove.js\"" wscript.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a5b002eacf54590ec8401ff6d3f920ee = "C:\\Users\\Admin\\Desktop\\WinlockerBuilderv5.exe" WinlockerBuilderv5.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GXPhmnNRPG_wynmove = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\GXPhmnNRPG_wynmove.js\"" wscript.exe Key created \REGISTRY\MACHINE\software\microsoft\windows\currentversion\run wscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GXPhmnNRPG_wynmove = "wscript.exe //B \"C:\\Users\\Admin\\AppData\\Roaming\\GXPhmnNRPG_wynmove.js\"" wscript.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
Processes:
ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe@WanaDecryptor@.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@WanaDecryptor@.bmp" ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Desktop\\@WanaDecryptor@.bmp" @WanaDecryptor@.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
Kurome.Builder.exeKurome.Host.exeKurome.Loader.exePanel.exeKurome.Loader.exepid process 6036 Kurome.Builder.exe 4824 Kurome.Host.exe 2808 Kurome.Loader.exe 4932 Panel.exe 3904 Kurome.Loader.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
upx_compresser.exetaskhost.exedescription pid process target process PID 5260 set thread context of 3876 5260 upx_compresser.exe upx_compresser.exe PID 4092 set thread context of 3960 4092 taskhost.exe taskhost.exe -
Drops file in Program Files directory 7 IoCs
Processes:
elevation_service.exedescription ioc process File created C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4684_1420665804\_metadata\verified_contents.json elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4684_1420665804\_metadata\verified_contents.json elevation_service.exe File created C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4684_1420665804\ChromeRecoveryCRX.crx elevation_service.exe File created C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4684_1420665804\ChromeRecovery.exe elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4684_1420665804\ChromeRecovery.exe elevation_service.exe File created C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4684_1420665804\manifest.json elevation_service.exe File opened for modification C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4684_1420665804\manifest.json elevation_service.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3236 1748 WerFault.exe SearchApp.exe 1460 3236 WerFault.exe WerFault.exe 5016 440 WerFault.exe SearchApp.exe 3152 2476 WerFault.exe dwm.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exetaskmgr.exetaskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exetaskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
msedge.exechrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies registry class 4 IoCs
Processes:
taskmgr.exechrome.exemsedge.exeupx_compresser.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ upx_compresser.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Script User-Agent 64 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 988 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1624 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1505 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 2002 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1877 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 2032 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 2144 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 443 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 633 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 882 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 842 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1321 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1602 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 398 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 627 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 680 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1079 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1097 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 405 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 807 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1001 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1665 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1698 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1841 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 382 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1138 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1407 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 166 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 960 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 574 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 623 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 856 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1542 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1584 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 103 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 152 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 281 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1996 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 2193 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 2207 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 2017 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 2123 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 173 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 684 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1068 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1850 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1386 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1445 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1535 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1192 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1418 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1711 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1762 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1797 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 289 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 588 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 995 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 2076 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1820 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 2222 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1358 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 1460 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 2107 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript HTTP User-Agent header 15 WSHRAT|36F4858E|IYMUGYHL|Admin|Microsoft Windows 10 Pro|plus|nan-av|false - 25/10/2022|JavaScript -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Builder.exepid process 4892 Builder.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exechrome.exechrome.exechrome.exechrome.exechrome.exepid process 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 5076 chrome.exe 5076 chrome.exe 3556 taskmgr.exe 3556 taskmgr.exe 4212 chrome.exe 4212 chrome.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 5092 chrome.exe 5092 chrome.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 5508 chrome.exe 5508 chrome.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 5864 chrome.exe 5864 chrome.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
Processes:
taskmgr.exeBuilder.exechrome.exepid process 2796 taskmgr.exe 4892 Builder.exe 4212 chrome.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 660 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
upx_compresser.exetaskhost.exepid process 5260 upx_compresser.exe 4092 taskhost.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 62 IoCs
Processes:
chrome.exemsedge.exepid process 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4508 msedge.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
taskmgr.exeKurome.Builder.exeKurome.Host.exeKurome.Loader.exePanel.exeKurome.Loader.exetaskmgr.exexmrig.exeBuilder.exetaskse.exeWMIC.exevssvc.exedescription pid process Token: SeDebugPrivilege 3556 taskmgr.exe Token: SeSystemProfilePrivilege 3556 taskmgr.exe Token: SeCreateGlobalPrivilege 3556 taskmgr.exe Token: 33 3556 taskmgr.exe Token: SeIncBasePriorityPrivilege 3556 taskmgr.exe Token: SeDebugPrivilege 6036 Kurome.Builder.exe Token: SeDebugPrivilege 4824 Kurome.Host.exe Token: SeDebugPrivilege 2808 Kurome.Loader.exe Token: SeDebugPrivilege 4932 Panel.exe Token: SeDebugPrivilege 3904 Kurome.Loader.exe Token: SeDebugPrivilege 2796 taskmgr.exe Token: SeSystemProfilePrivilege 2796 taskmgr.exe Token: SeCreateGlobalPrivilege 2796 taskmgr.exe Token: SeLockMemoryPrivilege 5580 xmrig.exe Token: SeLockMemoryPrivilege 5580 xmrig.exe Token: 33 2796 taskmgr.exe Token: SeIncBasePriorityPrivilege 2796 taskmgr.exe Token: 35 4892 Builder.exe Token: SeTcbPrivilege 4576 taskse.exe Token: SeTcbPrivilege 4576 taskse.exe Token: SeIncreaseQuotaPrivilege 476 WMIC.exe Token: SeSecurityPrivilege 476 WMIC.exe Token: SeTakeOwnershipPrivilege 476 WMIC.exe Token: SeLoadDriverPrivilege 476 WMIC.exe Token: SeSystemProfilePrivilege 476 WMIC.exe Token: SeSystemtimePrivilege 476 WMIC.exe Token: SeProfSingleProcessPrivilege 476 WMIC.exe Token: SeIncBasePriorityPrivilege 476 WMIC.exe Token: SeCreatePagefilePrivilege 476 WMIC.exe Token: SeBackupPrivilege 476 WMIC.exe Token: SeRestorePrivilege 476 WMIC.exe Token: SeShutdownPrivilege 476 WMIC.exe Token: SeDebugPrivilege 476 WMIC.exe Token: SeSystemEnvironmentPrivilege 476 WMIC.exe Token: SeRemoteShutdownPrivilege 476 WMIC.exe Token: SeUndockPrivilege 476 WMIC.exe Token: SeManageVolumePrivilege 476 WMIC.exe Token: 33 476 WMIC.exe Token: 34 476 WMIC.exe Token: 35 476 WMIC.exe Token: 36 476 WMIC.exe Token: SeIncreaseQuotaPrivilege 476 WMIC.exe Token: SeSecurityPrivilege 476 WMIC.exe Token: SeTakeOwnershipPrivilege 476 WMIC.exe Token: SeLoadDriverPrivilege 476 WMIC.exe Token: SeSystemProfilePrivilege 476 WMIC.exe Token: SeSystemtimePrivilege 476 WMIC.exe Token: SeProfSingleProcessPrivilege 476 WMIC.exe Token: SeIncBasePriorityPrivilege 476 WMIC.exe Token: SeCreatePagefilePrivilege 476 WMIC.exe Token: SeBackupPrivilege 476 WMIC.exe Token: SeRestorePrivilege 476 WMIC.exe Token: SeShutdownPrivilege 476 WMIC.exe Token: SeDebugPrivilege 476 WMIC.exe Token: SeSystemEnvironmentPrivilege 476 WMIC.exe Token: SeRemoteShutdownPrivilege 476 WMIC.exe Token: SeUndockPrivilege 476 WMIC.exe Token: SeManageVolumePrivilege 476 WMIC.exe Token: 33 476 WMIC.exe Token: 34 476 WMIC.exe Token: 35 476 WMIC.exe Token: 36 476 WMIC.exe Token: SeBackupPrivilege 5172 vssvc.exe Token: SeRestorePrivilege 5172 vssvc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exechrome.exepid process 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 3556 taskmgr.exe 4212 chrome.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exechrome.exepid process 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 4212 chrome.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe 3556 taskmgr.exe -
Suspicious use of SetWindowsHookEx 22 IoCs
Processes:
Builder.exe@WanaDecryptor@.exe@WanaDecryptor@.exe@WanaDecryptor@.exe@WanaDecryptor@.exe@WanaDecryptor@.exe@WanaDecryptor@.exe@WanaDecryptor@.exe@WanaDecryptor@.exe@WanaDecryptor@.exe@WanaDecryptor@.exe@WanaDecryptor@.exeWinlockerBuilderv5.exeWinlockerBuilderv5.exetaskmgr.exejusched.exetaskhost.exepid process 4892 Builder.exe 4532 @WanaDecryptor@.exe 4148 @WanaDecryptor@.exe 4148 @WanaDecryptor@.exe 4532 @WanaDecryptor@.exe 3424 @WanaDecryptor@.exe 3424 @WanaDecryptor@.exe 5208 @WanaDecryptor@.exe 5832 @WanaDecryptor@.exe 3432 @WanaDecryptor@.exe 972 @WanaDecryptor@.exe 476 @WanaDecryptor@.exe 4844 @WanaDecryptor@.exe 2392 @WanaDecryptor@.exe 3180 @WanaDecryptor@.exe 3448 WinlockerBuilderv5.exe 3448 WinlockerBuilderv5.exe 2788 WinlockerBuilderv5.exe 5844 taskmgr.exe 5612 jusched.exe 5612 jusched.exe 3960 taskhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
wscript.exewscript.exechrome.exedescription pid process target process PID 1652 wrote to memory of 4880 1652 wscript.exe wscript.exe PID 1652 wrote to memory of 4880 1652 wscript.exe wscript.exe PID 1652 wrote to memory of 4764 1652 wscript.exe wscript.exe PID 1652 wrote to memory of 4764 1652 wscript.exe wscript.exe PID 4764 wrote to memory of 1332 4764 wscript.exe wscript.exe PID 4764 wrote to memory of 1332 4764 wscript.exe wscript.exe PID 4212 wrote to memory of 3784 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 3784 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 2176 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 5076 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 5076 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 4888 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 4888 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 4888 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 4888 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 4888 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 4888 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 4888 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 4888 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 4888 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 4888 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 4888 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 4888 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 4888 4212 chrome.exe chrome.exe PID 4212 wrote to memory of 4888 4212 chrome.exe chrome.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\GXPhmnNRPG_wynmove.js1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\nYnEJuzswi.js"2⤵
- Blocklisted process makes network request
- Drops startup file
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\GXPhmnNRPG_wynmove.js"2⤵
- Blocklisted process makes network request
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\nYnEJuzswi.js"3⤵
- Blocklisted process makes network request
- Drops startup file
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops startup file
- Checks SCSI registry key(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb5e24f50,0x7ffdb5e24f60,0x7ffdb5e24f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1656 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1952 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2220 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2968 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3664 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4312 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4492 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4500 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4448 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5204 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4676 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3480 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4320 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5000 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1472 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2756 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1460 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2112 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3356 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1540 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3148 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2588 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4460 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4748 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5248 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5356 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1556 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=996 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=840 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3056 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2092 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5828 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2344 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5880 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5948 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3092 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4348 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6236 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6364 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6444 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=56 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3608 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5188 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=58 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3684 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6700 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4672 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5804 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=62 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=63 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4392 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5740 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6260 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6276 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6208 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1548 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=69 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=70 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3848 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=71 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6544 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=72 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3152 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6068 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=74 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3232 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3176 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5692 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6732 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6252 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1028 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5196 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5712 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=83 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=84 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3136 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6328 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3012 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6236 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6340 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3108 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=90 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=91 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6476 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3232 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6888 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=94 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6988 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=96 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6592 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2416 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6476 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7144 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3504 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7024 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6480 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5800 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1388 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=105 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7048 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=106 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=107 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6312 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2416 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6900 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=110 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2676 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=111 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6692 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6892 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=114 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6004 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=115 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=116 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6480 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=117 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=118 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6700 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6344 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5220 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2092 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4420 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6396 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5892 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=126 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7116 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=127 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6508 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=128 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1540 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=129 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=130 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7144 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5972 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6840 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2104 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6592 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4424 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4920 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5908 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=139 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3760 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=140 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=141 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3056 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2172 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6580 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5204 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=145 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6360 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=147 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6696 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4428 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=150 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=151 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6916 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1652,16174682339227237417,16815217668195203039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6376 /prefetch:82⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\Desktop\Redline_2021_stealer\Kurome.Builder\Kurome.Builder.exe"C:\Users\Admin\Desktop\Redline_2021_stealer\Kurome.Builder\Kurome.Builder.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Desktop\Redline_2021_stealer\Kurome.Host\Kurome.Host.exe"C:\Users\Admin\Desktop\Redline_2021_stealer\Kurome.Host\Kurome.Host.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Desktop\Redline_2021_stealer\Kurome.Loader\Kurome.Loader.exe"C:\Users\Admin\Desktop\Redline_2021_stealer\Kurome.Loader\Kurome.Loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Desktop\Redline_2021_stealer\Panel\RedLine_20_2\Panel\Panel.exe"C:\Users\Admin\Desktop\Redline_2021_stealer\Panel\RedLine_20_2\Panel\Panel.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Desktop\Redline_2021_stealer\Kurome.Loader\Kurome.Loader.exe"C:\Users\Admin\Desktop\Redline_2021_stealer\Kurome.Loader\Kurome.Loader.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"1⤵
- Drops file in Program Files directory
-
C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4684_1420665804\ChromeRecovery.exe"C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir4684_1420665804\ChromeRecovery.exe" --appguid={8A69D345-D564-463c-AFF1-A69D9E530F96} --browser-version=89.0.4389.114 --sessionid={da9457bf-6099-4d80-a2a4-ec1a30e4f499} --system2⤵
- Executes dropped EXE
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops startup file
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Desktop\xmrig.exe"C:\Users\Admin\Desktop\xmrig.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Desktop\configuretion.exe"C:\Users\Admin\Desktop\configuretion.exe"1⤵
-
C:\Users\Admin\Desktop\configuretion.exe"C:\Users\Admin\Desktop\configuretion.exe"2⤵
- Loads dropped DLL
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.microsoft.com/en-in/download/details.aspx?id=442663⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x114,0x118,0x11c,0xf4,0x120,0x7ffdc61146f8,0x7ffdc6114708,0x7ffdc61147184⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,20861046239055191,15255243136204819742,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:24⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,20861046239055191,15255243136204819742,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:34⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,20861046239055191,15255243136204819742,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2248 /prefetch:84⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,20861046239055191,15255243136204819742,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,20861046239055191,15255243136204819742,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2176,20861046239055191,15255243136204819742,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4808 /prefetch:84⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,20861046239055191,15255243136204819742,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:14⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,20861046239055191,15255243136204819742,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:14⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Python27\Scripts\pip.exe install pycrypto3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Python27\Scripts\pip.exe install pyinstaller3⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Users\Admin\Desktop\Builder.exe"C:\Users\Admin\Desktop\Builder.exe"1⤵
-
C:\Users\Admin\Desktop\Builder.exe"C:\Users\Admin\Desktop\Builder.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"C:\Users\Admin\Desktop\ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa.exe"1⤵
- Drops startup file
- Sets desktop wallpaper using registry
-
C:\Windows\SysWOW64\attrib.exeattrib +h .2⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\icacls.exeicacls . /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c 209041666692377.bat2⤵
-
C:\Users\Admin\Desktop\@WanaDecryptor@.exe@WanaDecryptor@.exe co2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Desktop\TaskData\Tor\taskhsvc.exeTaskData\Tor\taskhsvc.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.execmd.exe /c start /b @WanaDecryptor@.exe vs2⤵
-
C:\Users\Admin\Desktop\@WanaDecryptor@.exe@WanaDecryptor@.exe vs3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet4⤵
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@WanaDecryptor@.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Desktop\@WanaDecryptor@.exe@WanaDecryptor@.exe2⤵
- Executes dropped EXE
- Sets desktop wallpaper using registry
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "zywnfqwizjcp627" /t REG_SZ /d "\"C:\Users\Admin\Desktop\tasksche.exe\"" /f2⤵
-
C:\Windows\SysWOW64\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "zywnfqwizjcp627" /t REG_SZ /d "\"C:\Users\Admin\Desktop\tasksche.exe\"" /f3⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@WanaDecryptor@.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\@WanaDecryptor@.exe@WanaDecryptor@.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@WanaDecryptor@.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\@WanaDecryptor@.exe@WanaDecryptor@.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@WanaDecryptor@.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\@WanaDecryptor@.exe@WanaDecryptor@.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@WanaDecryptor@.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\@WanaDecryptor@.exe@WanaDecryptor@.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@WanaDecryptor@.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\@WanaDecryptor@.exe@WanaDecryptor@.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@WanaDecryptor@.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\@WanaDecryptor@.exe@WanaDecryptor@.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@WanaDecryptor@.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\@WanaDecryptor@.exe@WanaDecryptor@.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@WanaDecryptor@.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\@WanaDecryptor@.exe@WanaDecryptor@.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@WanaDecryptor@.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\Desktop\@WanaDecryptor@.exe@WanaDecryptor@.exe2⤵
-
C:\Users\Admin\Desktop\@WanaDecryptor@.exe@WanaDecryptor@.exe2⤵
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@WanaDecryptor@.exe2⤵
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
-
C:\Users\Admin\Desktop\@WanaDecryptor@.exe@WanaDecryptor@.exe2⤵
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@WanaDecryptor@.exe2⤵
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@WanaDecryptor@.exe2⤵
-
C:\Users\Admin\Desktop\@WanaDecryptor@.exe@WanaDecryptor@.exe2⤵
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
-
C:\Users\Admin\Desktop\@WanaDecryptor@.exe@WanaDecryptor@.exe2⤵
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@WanaDecryptor@.exe2⤵
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
-
C:\Users\Admin\Desktop\@WanaDecryptor@.exe@WanaDecryptor@.exe2⤵
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@WanaDecryptor@.exe2⤵
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@WanaDecryptor@.exe2⤵
-
C:\Users\Admin\Desktop\@WanaDecryptor@.exe@WanaDecryptor@.exe2⤵
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
-
C:\Users\Admin\Desktop\@WanaDecryptor@.exe@WanaDecryptor@.exe2⤵
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@WanaDecryptor@.exe2⤵
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
-
C:\Users\Admin\Desktop\@WanaDecryptor@.exe@WanaDecryptor@.exe2⤵
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@WanaDecryptor@.exe2⤵
-
C:\Users\Admin\Desktop\taskdl.exetaskdl.exe2⤵
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@WanaDecryptor@.exe2⤵
-
C:\Users\Admin\Desktop\@WanaDecryptor@.exe@WanaDecryptor@.exe2⤵
-
C:\Users\Admin\Desktop\taskse.exetaskse.exe C:\Users\Admin\Desktop\@WanaDecryptor@.exe2⤵
-
C:\Users\Admin\Desktop\@WanaDecryptor@.exe@WanaDecryptor@.exe2⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops startup file
- Checks SCSI registry key(s)
-
C:\Users\Admin\Desktop\WinlockerBuilderv5.exe"C:\Users\Admin\Desktop\WinlockerBuilderv5.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\svshost.exe"C:\Users\Admin\AppData\Local\Temp\svshost.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\WinlockerBuilderv5.exe"C:\Users\Admin\AppData\Local\Temp\WinlockerBuilderv5.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\upx_compresser.exe"C:\Users\Admin\AppData\Local\Temp\upx_compresser.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\upx_compresser.exe"C:\Users\Admin\AppData\Local\Temp\upx_compresser.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
-
C:\Users\Admin\Documents\AudioDriver\taskhost.exe"C:\Users\Admin\Documents\AudioDriver\taskhost.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\Documents\AudioDriver\taskhost.exe"C:\Users\Admin\Documents\AudioDriver\taskhost.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\jusched.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft\MyClient\jusched.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\svshost.exe"C:\Users\Admin\AppData\Local\Temp\svshost.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Users\Admin\AppData\Local\Temp\WinlockerBuilderv5.exe"C:\Users\Admin\AppData\Local\Temp\WinlockerBuilderv5.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\upx_compresser.exe"C:\Users\Admin\AppData\Local\Temp\upx_compresser.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\upx_compresser.exe"C:\Users\Admin\AppData\Local\Temp\upx_compresser.exe"5⤵
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
-
C:\Users\Admin\Desktop\Build.exe"C:\Users\Admin\Desktop\Build.exe"1⤵
-
C:\Windows\SysWOW64\Explorer.exeExplorer.exe2⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
-
C:\Users\Admin\Desktop\Build.exe"C:\Users\Admin\Desktop\Build.exe"2⤵
-
C:\Windows\SysWOW64\Explorer.exeExplorer.exe3⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Adds Run key to start application
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1748 -s 39962⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3236 -s 5403⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 1748 -ip 17481⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 472 -p 3412 -ip 34121⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 556 -p 3412 -ip 34121⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 584 -p 3412 -ip 34121⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 440 -s 24202⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 588 -p 440 -ip 4401⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\explorer.exeexplorer.exe /LOADSAVEDWINDOWS2⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 184 -p 4964 -ip 49641⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2476 -s 6642⤵
- Program crash
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 532 -p 2476 -ip 24761⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
Winlogon Helper DLL
1Registry Run Keys / Startup Folder
1Hidden Files and Directories
1Defense Evasion
Modify Registry
4File Deletion
1Virtualization/Sandbox Evasion
1File Permissions Modification
1Hidden Files and Directories
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\CachesMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\GXPhmnNRPG_wynmove.jsFilesize
38KB
MD53dff90e5de574801e0a812ed337429eb
SHA11e0187f461e12cdc313640af5d5a82402f1fc121
SHA256869125ed76969ba80597b88176721fe581d331a114f94e9906c8d152f7388ee3
SHA512b77867ed63406be2a6c084141062bec420e37ea3862efa363cd460f098cb7a7faf83bf3d76a3abb9fbd7a595bf4a5b45913d0774d6cb982af60db713c25e42fb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GXPhmnNRPG_wynmove.jsFilesize
38KB
MD53dff90e5de574801e0a812ed337429eb
SHA11e0187f461e12cdc313640af5d5a82402f1fc121
SHA256869125ed76969ba80597b88176721fe581d331a114f94e9906c8d152f7388ee3
SHA512b77867ed63406be2a6c084141062bec420e37ea3862efa363cd460f098cb7a7faf83bf3d76a3abb9fbd7a595bf4a5b45913d0774d6cb982af60db713c25e42fb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GXPhmnNRPG_wynmove.jsFilesize
38KB
MD53dff90e5de574801e0a812ed337429eb
SHA11e0187f461e12cdc313640af5d5a82402f1fc121
SHA256869125ed76969ba80597b88176721fe581d331a114f94e9906c8d152f7388ee3
SHA512b77867ed63406be2a6c084141062bec420e37ea3862efa363cd460f098cb7a7faf83bf3d76a3abb9fbd7a595bf4a5b45913d0774d6cb982af60db713c25e42fb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GXPhmnNRPG_wynmove.jsFilesize
38KB
MD53dff90e5de574801e0a812ed337429eb
SHA11e0187f461e12cdc313640af5d5a82402f1fc121
SHA256869125ed76969ba80597b88176721fe581d331a114f94e9906c8d152f7388ee3
SHA512b77867ed63406be2a6c084141062bec420e37ea3862efa363cd460f098cb7a7faf83bf3d76a3abb9fbd7a595bf4a5b45913d0774d6cb982af60db713c25e42fb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GXPhmnNRPG_wynmove.jsFilesize
38KB
MD53dff90e5de574801e0a812ed337429eb
SHA11e0187f461e12cdc313640af5d5a82402f1fc121
SHA256869125ed76969ba80597b88176721fe581d331a114f94e9906c8d152f7388ee3
SHA512b77867ed63406be2a6c084141062bec420e37ea3862efa363cd460f098cb7a7faf83bf3d76a3abb9fbd7a595bf4a5b45913d0774d6cb982af60db713c25e42fb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GXPhmnNRPG_wynmove.jsFilesize
38KB
MD53dff90e5de574801e0a812ed337429eb
SHA11e0187f461e12cdc313640af5d5a82402f1fc121
SHA256869125ed76969ba80597b88176721fe581d331a114f94e9906c8d152f7388ee3
SHA512b77867ed63406be2a6c084141062bec420e37ea3862efa363cd460f098cb7a7faf83bf3d76a3abb9fbd7a595bf4a5b45913d0774d6cb982af60db713c25e42fb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GXPhmnNRPG_wynmove.jsFilesize
38KB
MD53dff90e5de574801e0a812ed337429eb
SHA11e0187f461e12cdc313640af5d5a82402f1fc121
SHA256869125ed76969ba80597b88176721fe581d331a114f94e9906c8d152f7388ee3
SHA512b77867ed63406be2a6c084141062bec420e37ea3862efa363cd460f098cb7a7faf83bf3d76a3abb9fbd7a595bf4a5b45913d0774d6cb982af60db713c25e42fb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GXPhmnNRPG_wynmove.jsFilesize
38KB
MD53dff90e5de574801e0a812ed337429eb
SHA11e0187f461e12cdc313640af5d5a82402f1fc121
SHA256869125ed76969ba80597b88176721fe581d331a114f94e9906c8d152f7388ee3
SHA512b77867ed63406be2a6c084141062bec420e37ea3862efa363cd460f098cb7a7faf83bf3d76a3abb9fbd7a595bf4a5b45913d0774d6cb982af60db713c25e42fb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GXPhmnNRPG_wynmove.jsFilesize
38KB
MD53dff90e5de574801e0a812ed337429eb
SHA11e0187f461e12cdc313640af5d5a82402f1fc121
SHA256869125ed76969ba80597b88176721fe581d331a114f94e9906c8d152f7388ee3
SHA512b77867ed63406be2a6c084141062bec420e37ea3862efa363cd460f098cb7a7faf83bf3d76a3abb9fbd7a595bf4a5b45913d0774d6cb982af60db713c25e42fb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GXPhmnNRPG_wynmove.jsFilesize
38KB
MD53dff90e5de574801e0a812ed337429eb
SHA11e0187f461e12cdc313640af5d5a82402f1fc121
SHA256869125ed76969ba80597b88176721fe581d331a114f94e9906c8d152f7388ee3
SHA512b77867ed63406be2a6c084141062bec420e37ea3862efa363cd460f098cb7a7faf83bf3d76a3abb9fbd7a595bf4a5b45913d0774d6cb982af60db713c25e42fb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GXPhmnNRPG_wynmove.jsFilesize
38KB
MD53dff90e5de574801e0a812ed337429eb
SHA11e0187f461e12cdc313640af5d5a82402f1fc121
SHA256869125ed76969ba80597b88176721fe581d331a114f94e9906c8d152f7388ee3
SHA512b77867ed63406be2a6c084141062bec420e37ea3862efa363cd460f098cb7a7faf83bf3d76a3abb9fbd7a595bf4a5b45913d0774d6cb982af60db713c25e42fb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GXPhmnNRPG_wynmove.jsFilesize
38KB
MD53dff90e5de574801e0a812ed337429eb
SHA11e0187f461e12cdc313640af5d5a82402f1fc121
SHA256869125ed76969ba80597b88176721fe581d331a114f94e9906c8d152f7388ee3
SHA512b77867ed63406be2a6c084141062bec420e37ea3862efa363cd460f098cb7a7faf83bf3d76a3abb9fbd7a595bf4a5b45913d0774d6cb982af60db713c25e42fb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GXPhmnNRPG_wynmove.jsFilesize
38KB
MD53dff90e5de574801e0a812ed337429eb
SHA11e0187f461e12cdc313640af5d5a82402f1fc121
SHA256869125ed76969ba80597b88176721fe581d331a114f94e9906c8d152f7388ee3
SHA512b77867ed63406be2a6c084141062bec420e37ea3862efa363cd460f098cb7a7faf83bf3d76a3abb9fbd7a595bf4a5b45913d0774d6cb982af60db713c25e42fb
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nYnEJuzswi.jsFilesize
5KB
MD5a1c9765b82aec34aadfac64fd041426c
SHA1207a2478619ae17604d2cc89b937cbc5ef675da4
SHA256782b53672ce1b386495b72e450c25b5b7cbe010aef5423ae494d9a242163bcd2
SHA512f91eec97dec770852a1f29a71a51f7b60e4212207a453b4d719829dfe63830283e8f91481124a4b2b92e6e1966d484c1ee41a2ac5742936d4d1d056382f33eb8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\nYnEJuzswi.jsFilesize
5KB
MD5a1c9765b82aec34aadfac64fd041426c
SHA1207a2478619ae17604d2cc89b937cbc5ef675da4
SHA256782b53672ce1b386495b72e450c25b5b7cbe010aef5423ae494d9a242163bcd2
SHA512f91eec97dec770852a1f29a71a51f7b60e4212207a453b4d719829dfe63830283e8f91481124a4b2b92e6e1966d484c1ee41a2ac5742936d4d1d056382f33eb8
-
C:\Users\Admin\AppData\Roaming\nYnEJuzswi.jsFilesize
5KB
MD5a1c9765b82aec34aadfac64fd041426c
SHA1207a2478619ae17604d2cc89b937cbc5ef675da4
SHA256782b53672ce1b386495b72e450c25b5b7cbe010aef5423ae494d9a242163bcd2
SHA512f91eec97dec770852a1f29a71a51f7b60e4212207a453b4d719829dfe63830283e8f91481124a4b2b92e6e1966d484c1ee41a2ac5742936d4d1d056382f33eb8
-
C:\Users\Admin\AppData\Roaming\nYnEJuzswi.jsFilesize
5KB
MD5a1c9765b82aec34aadfac64fd041426c
SHA1207a2478619ae17604d2cc89b937cbc5ef675da4
SHA256782b53672ce1b386495b72e450c25b5b7cbe010aef5423ae494d9a242163bcd2
SHA512f91eec97dec770852a1f29a71a51f7b60e4212207a453b4d719829dfe63830283e8f91481124a4b2b92e6e1966d484c1ee41a2ac5742936d4d1d056382f33eb8
-
C:\Users\Admin\Desktop\Microsoft Edge.lnkFilesize
2KB
MD5c59499d5cc30b661c52b91975e5de7c7
SHA1d7e4c4e3f4389f5e407b94fa587c16110820b6e8
SHA25660d3a963843f0dd655ac85d515f7b32b26ca81524811e86f225b6bf41bd412b5
SHA512cde1e2d48a04470f172cf51bf5839b9a054534dc61ea1866d564061d4eed84a2670dbd55d222e28f1a9b0a470fc05fc7e6d19edd1b9d7f0c5931a7e42557d3a0
-
C:\Users\Public\Desktop\Acrobat Reader DC.lnkFilesize
2KB
MD527f5421315bac31c8ddf3017a5d235ae
SHA1dcd289ba8f65935b0ad4610b8a816213adf0401c
SHA25666e571fbc441d2d6fd5eb352eba7b4356c4e38e12b917ce0dff3dd82f2170766
SHA5123579c1a1661b0ca844c0ad4d896727d682390cbc63fafb660faff00a011a0ae3cf7e53b5ac4f94cd3bddb644934fd42e7a89780836419675a8a1329a2dd5bb89
-
C:\Users\Public\Desktop\Firefox.lnkFilesize
1000B
MD5eab9caf1c5b621c64970aaf4919ad70c
SHA198a09e9ee47955f87294fc8c1dcbd535bfb12670
SHA25657ab4457a679178306c919ec18b6494f0354d4d94e0f4c518dd454d161ae8ee5
SHA512cc2079ffc102e58180c472198fc83f2cb85efb67e2655d4c36560bb9360c9b5447f8428900ee3881a782b3445839b76f93daf9c257a109a0ead2a78bf3bf8de9
-
C:\Users\Public\Desktop\Google Chrome.lnkFilesize
2KB
MD509b7fb52d3a15ab23f554e081f426244
SHA1b8ebf9bf5d2fe80ae1fc6fb818171226e3936618
SHA256c7644997fb23f7d94b48de4fc12b02f15372fb1c65c39a9d597a636e6592b16e
SHA512abf25107bb4ae403204f043db23c5833afd55ff4285aa092262a07c5a83909cd91f13570af6f4b817a35acdb14e662483aa25086e6d7166bc0e030b7edbb3a98
-
C:\Users\Public\Desktop\VLC media player.lnkFilesize
923B
MD53921629f83a04ffb159a1824c3a8594c
SHA1c475485d6da080e0cf960d0fb21fc7c36cdb9e2a
SHA2565a92af810d5393bd9777a459f8c6e545364c98b07bba27509a182cb0f83064fa
SHA5123894ddefcbccc3ab93796d5852fe8ed1a775a7594fbee8680ce88a666349332081d52a7f7a1483a5cd0e18e69b1b36f6cfa227c4e24237287105f2b7ec460594
-
\??\pipe\crashpad_4212_SRUGMKCDAKQZCECKMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/368-271-0x0000000000000000-mapping.dmp
-
memory/396-229-0x0000000000000000-mapping.dmp
-
memory/396-241-0x0000000000000000-mapping.dmp
-
memory/476-281-0x0000000000000000-mapping.dmp
-
memory/476-263-0x0000000000000000-mapping.dmp
-
memory/972-278-0x0000000000000000-mapping.dmp
-
memory/1080-269-0x0000000000000000-mapping.dmp
-
memory/1332-137-0x0000000000000000-mapping.dmp
-
memory/1512-274-0x0000000000000000-mapping.dmp
-
memory/1640-221-0x0000000000000000-mapping.dmp
-
memory/1664-286-0x0000000000000000-mapping.dmp
-
memory/1716-212-0x0000000000000000-mapping.dmp
-
memory/1828-268-0x0000000000000000-mapping.dmp
-
memory/2196-252-0x0000000070050000-0x00000000700D2000-memory.dmpFilesize
520KB
-
memory/2196-266-0x000000006FF10000-0x000000006FF92000-memory.dmpFilesize
520KB
-
memory/2196-253-0x00000000700E0000-0x00000000702FC000-memory.dmpFilesize
2.1MB
-
memory/2196-250-0x0000000070020000-0x0000000070042000-memory.dmpFilesize
136KB
-
memory/2196-255-0x0000000070020000-0x0000000070042000-memory.dmpFilesize
136KB
-
memory/2196-246-0x0000000000000000-mapping.dmp
-
memory/2196-249-0x000000006FF10000-0x000000006FF92000-memory.dmpFilesize
520KB
-
memory/2196-247-0x0000000070050000-0x00000000700D2000-memory.dmpFilesize
520KB
-
memory/2196-267-0x0000000000CB0000-0x0000000000FAE000-memory.dmpFilesize
3.0MB
-
memory/2196-254-0x000000006FF10000-0x000000006FF92000-memory.dmpFilesize
520KB
-
memory/2196-265-0x00000000700E0000-0x00000000702FC000-memory.dmpFilesize
2.1MB
-
memory/2196-248-0x00000000700E0000-0x00000000702FC000-memory.dmpFilesize
2.1MB
-
memory/2196-264-0x0000000070050000-0x00000000700D2000-memory.dmpFilesize
520KB
-
memory/2196-256-0x0000000000CB0000-0x0000000000FAE000-memory.dmpFilesize
3.0MB
-
memory/2196-251-0x0000000000CB0000-0x0000000000FAE000-memory.dmpFilesize
3.0MB
-
memory/2264-227-0x0000000000000000-mapping.dmp
-
memory/2392-287-0x0000000000000000-mapping.dmp
-
memory/2608-262-0x0000000000000000-mapping.dmp
-
memory/2788-303-0x0000000000400000-0x0000000000C89000-memory.dmpFilesize
8.5MB
-
memory/2788-310-0x0000000000400000-0x0000000000C89000-memory.dmpFilesize
8.5MB
-
memory/2788-298-0x0000000000000000-mapping.dmp
-
memory/2788-314-0x0000000000400000-0x0000000000C89000-memory.dmpFilesize
8.5MB
-
memory/2808-181-0x00000000005E0000-0x0000000000DFC000-memory.dmpFilesize
8.1MB
-
memory/2808-177-0x00000000005E0000-0x0000000000DFC000-memory.dmpFilesize
8.1MB
-
memory/2808-192-0x0000000077BC0000-0x0000000077D63000-memory.dmpFilesize
1.6MB
-
memory/2808-188-0x00000000005E0000-0x0000000000DFC000-memory.dmpFilesize
8.1MB
-
memory/2808-182-0x0000000077BC0000-0x0000000077D63000-memory.dmpFilesize
1.6MB
-
memory/2808-180-0x00000000005E0000-0x0000000000DFC000-memory.dmpFilesize
8.1MB
-
memory/3100-294-0x0000000000000000-mapping.dmp
-
memory/3128-280-0x0000000000000000-mapping.dmp
-
memory/3164-242-0x0000000000000000-mapping.dmp
-
memory/3180-290-0x0000000000000000-mapping.dmp
-
memory/3208-214-0x0000000000000000-mapping.dmp
-
memory/3224-216-0x0000000000000000-mapping.dmp
-
memory/3384-213-0x0000000000000000-mapping.dmp
-
memory/3424-259-0x0000000000000000-mapping.dmp
-
memory/3432-275-0x0000000000000000-mapping.dmp
-
memory/3448-292-0x00007FFDAB7F0000-0x00007FFDAC226000-memory.dmpFilesize
10.2MB
-
memory/3448-297-0x000000000141A000-0x000000000141F000-memory.dmpFilesize
20KB
-
memory/3448-293-0x000000000141A000-0x000000000141F000-memory.dmpFilesize
20KB
-
memory/3508-219-0x0000000000000000-mapping.dmp
-
memory/3876-300-0x0000000000000000-mapping.dmp
-
memory/3876-305-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/3904-196-0x00000000005E0000-0x0000000000DFC000-memory.dmpFilesize
8.1MB
-
memory/3904-197-0x00000000005E0000-0x0000000000DFC000-memory.dmpFilesize
8.1MB
-
memory/3904-200-0x0000000077BC0000-0x0000000077D63000-memory.dmpFilesize
1.6MB
-
memory/3904-201-0x00000000005E0000-0x0000000000DFC000-memory.dmpFilesize
8.1MB
-
memory/3904-193-0x00000000005E0000-0x0000000000DFC000-memory.dmpFilesize
8.1MB
-
memory/3904-202-0x0000000077BC0000-0x0000000077D63000-memory.dmpFilesize
1.6MB
-
memory/3952-285-0x0000000000000000-mapping.dmp
-
memory/3960-312-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/3960-307-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/4144-288-0x0000000000000000-mapping.dmp
-
memory/4148-243-0x0000000000000000-mapping.dmp
-
memory/4164-203-0x0000000000000000-mapping.dmp
-
memory/4284-276-0x0000000000000000-mapping.dmp
-
memory/4452-282-0x0000000000000000-mapping.dmp
-
memory/4456-236-0x0000000000000000-mapping.dmp
-
memory/4508-211-0x0000000000000000-mapping.dmp
-
memory/4508-291-0x0000000000000000-mapping.dmp
-
memory/4532-245-0x0000000000000000-mapping.dmp
-
memory/4556-257-0x0000000000000000-mapping.dmp
-
memory/4576-258-0x0000000000000000-mapping.dmp
-
memory/4764-134-0x0000000000000000-mapping.dmp
-
memory/4824-183-0x0000000000030000-0x000000000084C000-memory.dmpFilesize
8.1MB
-
memory/4824-184-0x0000000077BC0000-0x0000000077D63000-memory.dmpFilesize
1.6MB
-
memory/4824-169-0x0000000000030000-0x000000000084C000-memory.dmpFilesize
8.1MB
-
memory/4824-172-0x0000000000030000-0x000000000084C000-memory.dmpFilesize
8.1MB
-
memory/4824-173-0x0000000000030000-0x000000000084C000-memory.dmpFilesize
8.1MB
-
memory/4824-174-0x0000000077BC0000-0x0000000077D63000-memory.dmpFilesize
1.6MB
-
memory/4836-309-0x0000000000400000-0x0000000000C89000-memory.dmpFilesize
8.5MB
-
memory/4836-313-0x0000000000400000-0x0000000000C89000-memory.dmpFilesize
8.5MB
-
memory/4836-315-0x0000000000400000-0x0000000000C89000-memory.dmpFilesize
8.5MB
-
memory/4844-284-0x0000000000000000-mapping.dmp
-
memory/4856-217-0x0000000000000000-mapping.dmp
-
memory/4880-132-0x0000000000000000-mapping.dmp
-
memory/4892-233-0x00007FFDB0DD0000-0x00007FFDB12A5000-memory.dmpFilesize
4.8MB
-
memory/4892-234-0x00007FFDAF1C0000-0x00007FFDAF70F000-memory.dmpFilesize
5.3MB
-
memory/4892-232-0x00007FFDB2590000-0x00007FFDB27D1000-memory.dmpFilesize
2.3MB
-
memory/4892-231-0x00007FFDB5520000-0x00007FFDB574C000-memory.dmpFilesize
2.2MB
-
memory/4892-230-0x0000000000000000-mapping.dmp
-
memory/4908-244-0x0000000000000000-mapping.dmp
-
memory/4932-199-0x0000000077BC0000-0x0000000077D63000-memory.dmpFilesize
1.6MB
-
memory/4932-191-0x0000000077BC0000-0x0000000077D63000-memory.dmpFilesize
1.6MB
-
memory/4932-187-0x0000000000190000-0x00000000009AC000-memory.dmpFilesize
8.1MB
-
memory/4932-190-0x0000000000190000-0x00000000009AC000-memory.dmpFilesize
8.1MB
-
memory/4932-189-0x0000000000190000-0x00000000009AC000-memory.dmpFilesize
8.1MB
-
memory/4932-198-0x0000000000190000-0x00000000009AC000-memory.dmpFilesize
8.1MB
-
memory/5028-225-0x0000000000000000-mapping.dmp
-
memory/5140-237-0x0000000010000000-0x0000000010010000-memory.dmpFilesize
64KB
-
memory/5180-223-0x0000000000000000-mapping.dmp
-
memory/5192-272-0x0000000000000000-mapping.dmp
-
memory/5196-283-0x0000000000000000-mapping.dmp
-
memory/5208-270-0x0000000000000000-mapping.dmp
-
memory/5244-261-0x0000000000000000-mapping.dmp
-
memory/5260-301-0x00000000006C0000-0x00000000006C9000-memory.dmpFilesize
36KB
-
memory/5260-299-0x0000000000000000-mapping.dmp
-
memory/5324-289-0x0000000000000000-mapping.dmp
-
memory/5536-308-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/5580-206-0x0000013121150000-0x0000013121170000-memory.dmpFilesize
128KB
-
memory/5580-204-0x0000013120E70000-0x0000013120E90000-memory.dmpFilesize
128KB
-
memory/5580-205-0x00000131228A0000-0x00000131228E0000-memory.dmpFilesize
256KB
-
memory/5580-209-0x00000131228E0000-0x0000013122900000-memory.dmpFilesize
128KB
-
memory/5580-207-0x00000131228E0000-0x0000013122900000-memory.dmpFilesize
128KB
-
memory/5580-208-0x0000013121150000-0x0000013121170000-memory.dmpFilesize
128KB
-
memory/5600-260-0x0000000000000000-mapping.dmp
-
memory/5612-296-0x00007FFDAB7F0000-0x00007FFDAC226000-memory.dmpFilesize
10.2MB
-
memory/5612-306-0x000000000163A000-0x000000000163F000-memory.dmpFilesize
20KB
-
memory/5612-311-0x000000000163A000-0x000000000163F000-memory.dmpFilesize
20KB
-
memory/5612-295-0x0000000000000000-mapping.dmp
-
memory/5664-302-0x0000000000000000-mapping.dmp
-
memory/5716-277-0x0000000000000000-mapping.dmp
-
memory/5832-273-0x0000000000000000-mapping.dmp
-
memory/5844-304-0x0000000000000000-mapping.dmp
-
memory/5940-210-0x0000000000000000-mapping.dmp
-
memory/5960-279-0x0000000000000000-mapping.dmp
-
memory/5988-235-0x0000000000000000-mapping.dmp
-
memory/6036-164-0x0000000000190000-0x00000000009AC000-memory.dmpFilesize
8.1MB
-
memory/6036-168-0x0000000005870000-0x000000000597A000-memory.dmpFilesize
1.0MB
-
memory/6036-162-0x0000000077BC0000-0x0000000077D63000-memory.dmpFilesize
1.6MB
-
memory/6036-167-0x00000000055C0000-0x00000000055FC000-memory.dmpFilesize
240KB
-
memory/6036-159-0x0000000000190000-0x00000000009AC000-memory.dmpFilesize
8.1MB
-
memory/6036-163-0x0000000000190000-0x00000000009AC000-memory.dmpFilesize
8.1MB
-
memory/6036-166-0x0000000005560000-0x0000000005572000-memory.dmpFilesize
72KB
-
memory/6036-176-0x0000000077BC0000-0x0000000077D63000-memory.dmpFilesize
1.6MB
-
memory/6036-175-0x0000000000190000-0x00000000009AC000-memory.dmpFilesize
8.1MB
-
memory/6036-165-0x0000000005CF0000-0x0000000006308000-memory.dmpFilesize
6.1MB