Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
8announce.exe
windows10-2004-x64
1filterscri...se.vbs
windows10-2004-x64
1filterscri...ip.vbs
windows10-2004-x64
1filterscri...as.vbs
windows10-2004-x64
1filterscri...el.vbs
windows10-2004-x64
1filterscri...ug.vbs
windows10-2004-x64
1filterscri...rn.vbs
windows10-2004-x64
1filterscri...s1.vbs
windows10-2004-x64
1filterscri...de.vbs
windows10-2004-x64
1filterscri...or.vbs
windows10-2004-x64
1filterscri...ll.vbs
windows10-2004-x64
1filterscri...ls.vbs
windows10-2004-x64
1filterscri...go.vbs
windows10-2004-x64
1filterscri...er.vbs
windows10-2004-x64
1filterscri...ip.vbs
windows10-2004-x64
1filterscri...ed.vbs
windows10-2004-x64
1filterscri...g1.vbs
windows10-2004-x64
1filterscri...ch.vbs
windows10-2004-x64
1filterscri...ds.vbs
windows10-2004-x64
1gamemodes/...ll.vbs
windows10-2004-x64
1pawno/incl...ts.vbs
windows10-2004-x64
1pawno/libpawnc.dll
windows10-2004-x64
1pawno/pawnc.dll
windows10-2004-x64
1pawno/pawncc.exe
windows10-2004-x64
1pawno/pawno.exe
windows10-2004-x64
8samp-npc.exe
windows10-2004-x64
1samp-server.exe
windows10-2004-x64
1Resubmissions
29/12/2022, 21:53
221229-1rvknaec49 8Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2022, 21:53
Behavioral task
behavioral1
Sample
announce.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral2
Sample
filterscripts/a51_base.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
filterscripts/cargoship.vbs
Resource
win10v2004-20221111-en
Behavioral task
behavioral4
Sample
filterscripts/dillimore_gas.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
filterscripts/ferriswheel.vbs
Resource
win10v2004-20221111-en
Behavioral task
behavioral6
Sample
filterscripts/fsdebug.vbs
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
filterscripts/kylies_barn.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral8
Sample
filterscripts/ls_apartments1.vbs
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
filterscripts/ls_beachside.vbs
Resource
win10v2004-20220901-en
Behavioral task
behavioral10
Sample
filterscripts/ls_elevator.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
filterscripts/ls_mall.vbs
Resource
win10v2004-20221111-en
Behavioral task
behavioral12
Sample
filterscripts/ls_prisonwalls.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
filterscripts/ls_wellsfargo.vbs
Resource
win10v2004-20221111-en
Behavioral task
behavioral14
Sample
filterscripts/ospawner.vbs
Resource
win10v2004-20221111-en
Behavioral task
behavioral15
Sample
filterscripts/pirateship.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral16
Sample
filterscripts/safe_animated.vbs
Resource
win10v2004-20220901-en
Behavioral task
behavioral17
Sample
filterscripts/sf_building1.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral18
Sample
filterscripts/sf_zombotech.vbs
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
filterscripts/test_cmds.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral20
Sample
gamemodes/rivershell.vbs
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
pawno/include/a_objects.vbs
Resource
win10v2004-20221111-en
Behavioral task
behavioral22
Sample
pawno/libpawnc.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral23
Sample
pawno/pawnc.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral24
Sample
pawno/pawncc.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
pawno/pawno.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral26
Sample
samp-npc.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral27
Sample
samp-server.exe
Resource
win10v2004-20220812-en
General
-
Target
announce.exe
-
Size
40KB
-
MD5
b4fcc1c57c10b87427fa1ae3e02b70c6
-
SHA1
46f4c41bf2f6aa2e7e9871e733f632b4aa73213b
-
SHA256
2a0270ee3766ff09dfcb2aa70316c4076c6c713154784c9b324509d66c019a26
-
SHA512
f769a656a69ab6b5ba2313c60949aaaedc33a4934b821102a584d85942d096267cb01abc8b0f1abd898c5b5f2d199559c669df4f430e93a42bb47a92ac4626e9
-
SSDEEP
384:VzIa1qY2wCLK5LkyAZAhmjaJ5iXwCI6RUbiBkOTeZpPxyjO9viZAeouqEolmoLJ9:ya1qGZIyiZjaflAkOCpwjWviZKB7JD6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 3796 chrome.exe 3796 chrome.exe 3224 chrome.exe 3224 chrome.exe 388 chrome.exe 388 chrome.exe 1920 chrome.exe 1920 chrome.exe 1804 chrome.exe 1804 chrome.exe 972 chrome.exe 972 chrome.exe 404 chrome.exe 404 chrome.exe 3800 chrome.exe 3800 chrome.exe 3936 chrome.exe 3936 chrome.exe 2532 chrome.exe 2532 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe 3224 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3224 wrote to memory of 1180 3224 chrome.exe 90 PID 3224 wrote to memory of 1180 3224 chrome.exe 90 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 2868 3224 chrome.exe 93 PID 3224 wrote to memory of 3796 3224 chrome.exe 94 PID 3224 wrote to memory of 3796 3224 chrome.exe 94 PID 3224 wrote to memory of 2500 3224 chrome.exe 95 PID 3224 wrote to memory of 2500 3224 chrome.exe 95 PID 3224 wrote to memory of 2500 3224 chrome.exe 95 PID 3224 wrote to memory of 2500 3224 chrome.exe 95 PID 3224 wrote to memory of 2500 3224 chrome.exe 95 PID 3224 wrote to memory of 2500 3224 chrome.exe 95 PID 3224 wrote to memory of 2500 3224 chrome.exe 95 PID 3224 wrote to memory of 2500 3224 chrome.exe 95 PID 3224 wrote to memory of 2500 3224 chrome.exe 95 PID 3224 wrote to memory of 2500 3224 chrome.exe 95 PID 3224 wrote to memory of 2500 3224 chrome.exe 95 PID 3224 wrote to memory of 2500 3224 chrome.exe 95 PID 3224 wrote to memory of 2500 3224 chrome.exe 95 PID 3224 wrote to memory of 2500 3224 chrome.exe 95 PID 3224 wrote to memory of 2500 3224 chrome.exe 95 PID 3224 wrote to memory of 2500 3224 chrome.exe 95 PID 3224 wrote to memory of 2500 3224 chrome.exe 95 PID 3224 wrote to memory of 2500 3224 chrome.exe 95 PID 3224 wrote to memory of 2500 3224 chrome.exe 95 PID 3224 wrote to memory of 2500 3224 chrome.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\announce.exe"C:\Users\Admin\AppData\Local\Temp\announce.exe"1⤵PID:4216
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffc93894f50,0x7ffc93894f60,0x7ffc93894f702⤵PID:1180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1664 /prefetch:22⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2016 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2320 /prefetch:82⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2976 /prefetch:12⤵PID:1040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3880 /prefetch:12⤵PID:4440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4072 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4760 /prefetch:82⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4940 /prefetch:82⤵PID:3960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4796 /prefetch:82⤵PID:1252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5004 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4816 /prefetch:82⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:1768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5420 /prefetch:82⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:2544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5416 /prefetch:82⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4844 /prefetch:82⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5128 /prefetch:82⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5468 /prefetch:82⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5480 /prefetch:82⤵PID:1808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5788 /prefetch:82⤵PID:432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5432 /prefetch:82⤵PID:4204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5380 /prefetch:82⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5716 /prefetch:82⤵PID:3552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5376 /prefetch:82⤵PID:4624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2996 /prefetch:12⤵PID:1452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3128 /prefetch:12⤵PID:3112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:2248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1588 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2828 /prefetch:12⤵PID:1236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 /prefetch:82⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5532 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5084 /prefetch:82⤵PID:3708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5952 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5888 /prefetch:82⤵PID:3180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1624,3782342998520472672,14245268889379694496,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:4440
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:432
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3868