Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10ChrisTitus...rch.sh
ubuntu-18.04-amd64
8ChrisTitus...rch.sh
debian-9-armhf
8ChrisTitus...rch.sh
debian-9-mips
8ChrisTitus...rch.sh
debian-9-mipsel
8ChrisTitus...deb.sh
ubuntu-18.04-amd64
7ChrisTitus...deb.sh
debian-9-armhf
5ChrisTitus...deb.sh
debian-9-mips
5ChrisTitus...deb.sh
debian-9-mipsel
5ChrisTitus...it.ps1
windows7-x64
1ChrisTitus...it.ps1
windows10-2004-x64
1ChrisTitus...on.ps1
windows7-x64
1ChrisTitus...on.ps1
windows10-2004-x64
1ChrisTitus...ds.ps1
windows7-x64
8ChrisTitus...ds.ps1
windows10-2004-x64
8ChrisTitus...os.ps1
windows7-x64
8ChrisTitus...os.ps1
windows10-2004-x64
8ChrisTitus...py.ps1
windows7-x64
1ChrisTitus...py.ps1
windows10-2004-x64
1ChrisTitus...or.cmd
windows7-x64
1ChrisTitus...or.cmd
windows10-2004-x64
1ChrisTitus...at.ps1
windows7-x64
10ChrisTitus...at.ps1
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2022, 14:33
Static task
static1
Behavioral task
behavioral1
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/arch.sh
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral2
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/arch.sh
Resource
debian9-armhf-20221111-en
Behavioral task
behavioral3
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/arch.sh
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral4
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/arch.sh
Resource
debian9-mipsel-20221111-en
Behavioral task
behavioral5
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/deb.sh
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral6
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/deb.sh
Resource
debian9-armhf-20221111-en
Behavioral task
behavioral7
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/deb.sh
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral8
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/deb.sh
Resource
debian9-mipsel-20221111-en
Behavioral task
behavioral9
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/vm-gpusplit.ps1
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/vm-gpusplit.ps1
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/vm-setresolution.ps1
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/vm-setresolution.ps1
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/Individual Scripts/block-ads.ps1
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/Individual Scripts/block-ads.ps1
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/Individual Scripts/block-eos.ps1
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/Individual Scripts/block-eos.ps1
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/Individual Scripts/robocopy.ps1
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/Individual Scripts/robocopy.ps1
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/Individual Scripts/spotlightimageextractor.cmd
Resource
win7-20221111-en
Behavioral task
behavioral20
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/Individual Scripts/spotlightimageextractor.cmd
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/old-win10debloat.ps1
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/old-win10debloat.ps1
Resource
win10v2004-20220812-en
General
-
Target
ChrisTitusTech_debloatWin10_elQueAnda/cttscript/HyperV Tools/vm-setresolution.ps1
-
Size
109B
-
MD5
48da8e2b47c2671912094103a3379b9a
-
SHA1
b1d19a1495160b2414d4e147220eea9304fd0a58
-
SHA256
d4c5631781e167b80fc6707e655bfa5f8f1bc6088788a68f6e928b533904ab86
-
SHA512
48d4e90143fdd6b2bc349b9f956f4f0159f90978efbad225602732d37164b24cb726a8bebc3e71264a020dc0d1b7a690758be3e1d3b1498aedad1ec246198947
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 5048 powershell.exe 5048 powershell.exe 2900 chrome.exe 2900 chrome.exe 4232 chrome.exe 4232 chrome.exe 4640 chrome.exe 4640 chrome.exe 1244 chrome.exe 1244 chrome.exe 1140 chrome.exe 1140 chrome.exe 204 chrome.exe 204 chrome.exe 4836 chrome.exe 4836 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5048 powershell.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe 4232 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4232 wrote to memory of 3600 4232 chrome.exe 90 PID 4232 wrote to memory of 3600 4232 chrome.exe 90 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2444 4232 chrome.exe 93 PID 4232 wrote to memory of 2900 4232 chrome.exe 94 PID 4232 wrote to memory of 2900 4232 chrome.exe 94 PID 4232 wrote to memory of 2300 4232 chrome.exe 96 PID 4232 wrote to memory of 2300 4232 chrome.exe 96 PID 4232 wrote to memory of 2300 4232 chrome.exe 96 PID 4232 wrote to memory of 2300 4232 chrome.exe 96 PID 4232 wrote to memory of 2300 4232 chrome.exe 96 PID 4232 wrote to memory of 2300 4232 chrome.exe 96 PID 4232 wrote to memory of 2300 4232 chrome.exe 96 PID 4232 wrote to memory of 2300 4232 chrome.exe 96 PID 4232 wrote to memory of 2300 4232 chrome.exe 96 PID 4232 wrote to memory of 2300 4232 chrome.exe 96 PID 4232 wrote to memory of 2300 4232 chrome.exe 96 PID 4232 wrote to memory of 2300 4232 chrome.exe 96 PID 4232 wrote to memory of 2300 4232 chrome.exe 96 PID 4232 wrote to memory of 2300 4232 chrome.exe 96 PID 4232 wrote to memory of 2300 4232 chrome.exe 96 PID 4232 wrote to memory of 2300 4232 chrome.exe 96 PID 4232 wrote to memory of 2300 4232 chrome.exe 96 PID 4232 wrote to memory of 2300 4232 chrome.exe 96 PID 4232 wrote to memory of 2300 4232 chrome.exe 96 PID 4232 wrote to memory of 2300 4232 chrome.exe 96
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\ChrisTitusTech_debloatWin10_elQueAnda\cttscript\HyperV Tools\vm-setresolution.ps1"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa67744f50,0x7ffa67744f60,0x7ffa67744f702⤵PID:3600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1680 /prefetch:22⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2292 /prefetch:82⤵PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2964 /prefetch:12⤵PID:2712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3760 /prefetch:12⤵PID:3124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4460 /prefetch:82⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4624 /prefetch:82⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4756 /prefetch:82⤵PID:2452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4652 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5284 /prefetch:82⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2528 /prefetch:82⤵PID:3416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2528 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2144 /prefetch:82⤵PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:4152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1632,5211953595768786160,193696319271052315,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3684
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3892