Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
10/01/2023, 20:41
230110-zgh87she82 1009/01/2023, 13:23
230109-qmzcyahg5z 830/12/2022, 04:52
221230-fhnqjafa36 729/12/2022, 23:57
221229-3z3x4shg5y 829/12/2022, 09:56
221229-lyp67afh7x 429/12/2022, 09:28
221229-lfpspsfh5s 1029/12/2022, 04:18
221229-exfssscc88 129/12/2022, 04:12
221229-esw9zsfd3z 818/12/2022, 12:11
221218-pcmqqabh42 804/12/2022, 12:48
221204-p157zaec6t 10Analysis
-
max time kernel
607s -
max time network
609s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2023, 13:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://google.com
Resource
win10v2004-20220812-en
General
-
Target
https://google.com
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
pid Process 5224 BossLoader.exe 5468 BossLoader.tmp 5788 BossLoader.exe 3204 ChromeRecovery.exe 2028 BossLoader.exe 5220 BossLoader.exe 5684 CouLoader.exe -
Registers COM server for autorun 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}\LocalServer32 BossLoader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}\LocalServer32\ = "\"C:\\Program Files (x86)\\BossLoader\\BossLoader.exe\" -ToastActivated" BossLoader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}\LocalServer32\ = "\"C:\\Program Files (x86)\\BossLoader\\BossLoader.exe\" -ToastActivated" BossLoader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}\LocalServer32\ = "\"C:\\Program Files (x86)\\BossLoader\\BossLoader.exe\" -ToastActivated" BossLoader.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation BossLoader.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation BossLoader.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation BossLoader.exe -
Loads dropped DLL 64 IoCs
pid Process 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe 5788 BossLoader.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\BossLoader\api-ms-win-core-libraryloader-l1-1-0.dll BossLoader.tmp File opened for modification C:\Program Files (x86)\BossLoader\MRM.dll BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-VECG6.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-OHGHL.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-CURH3.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-MGJAM.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\Assets\is-MRG7R.tmp BossLoader.tmp File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\55ecc3da-5bee-4ad0-9add-266a3ff1ec55.tmp setup.exe File opened for modification C:\Program Files (x86)\BossLoader\api-ms-win-core-handle-l1-1-0.dll BossLoader.tmp File opened for modification C:\Program Files (x86)\BossLoader\System.Globalization.Calendars.dll BossLoader.tmp File opened for modification C:\Program Files (x86)\BossLoader\PushNotificationsLongRunningTask.ProxyStub.dll BossLoader.tmp File opened for modification C:\Program Files (x86)\BossLoader\System.Net.NetworkInformation.dll BossLoader.tmp File opened for modification C:\Program Files (x86)\BossLoader\System.Runtime.Serialization.dll BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-MM814.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-BGBMR.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-NERHV.tmp BossLoader.tmp File opened for modification C:\Program Files (x86)\BossLoader\System.ComponentModel.TypeConverter.dll BossLoader.tmp File opened for modification C:\Program Files (x86)\BossLoader\System.Reflection.Primitives.dll BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-AUMSL.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-1TN1F.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-N7ERC.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-PIT24.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-JOVDP.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\Assets\is-RE0C3.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\de-DE\is-45ME8.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\uk-UA\is-1D265.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-GDI5R.tmp BossLoader.tmp File opened for modification C:\Program Files (x86)\BossLoader\CommunityToolkit.Common.dll BossLoader.tmp File opened for modification C:\Program Files (x86)\BossLoader\PInvoke.User32.dll BossLoader.tmp File opened for modification C:\Program Files (x86)\BossLoader\System.IO.FileSystem.Watcher.dll BossLoader.tmp File opened for modification C:\Program Files (x86)\BossLoader\System.Net.WebProxy.dll BossLoader.tmp File opened for modification C:\Program Files (x86)\BossLoader\System.Security.AccessControl.dll BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-0K18J.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-UK5AV.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-BV91I.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-FCREL.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-9AAOV.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-IL1K6.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\Assets\is-QT0UI.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\ms-MY\is-9T29L.tmp BossLoader.tmp File opened for modification C:\Program Files (x86)\BossLoader\api-ms-win-crt-utility-l1-1-0.dll BossLoader.tmp File opened for modification C:\Program Files (x86)\BossLoader\Microsoft.Extensions.DependencyInjection.dll BossLoader.tmp File opened for modification C:\Program Files (x86)\BossLoader\System.IO.FileSystem.Primitives.dll BossLoader.tmp File opened for modification C:\Program Files (x86)\BossLoader\System.Resources.Reader.dll BossLoader.tmp File opened for modification C:\Program Files (x86)\BossLoader\System.Transactions.dll BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-LV4VO.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-4CH4H.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\Assets\is-C6DHM.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\he-IL\is-8O1L2.tmp BossLoader.tmp File opened for modification C:\Program Files (x86)\BossLoader\api-ms-win-core-timezone-l1-1-0.dll BossLoader.tmp File opened for modification C:\Program Files (x86)\BossLoader\CommunityToolkit.WinUI.UI.Behaviors.dll BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-DFOPI.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-CK9HF.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\cy-GB\is-MOU3M.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\sv-SE\is-9TA15.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\th-TH\is-500I6.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-OCS8R.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-AB1HT.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-2MUE5.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-CBV2S.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\is-FAT56.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\Assets\is-JNRPQ.tmp BossLoader.tmp File created C:\Program Files (x86)\BossLoader\Assets\is-JHLAG.tmp BossLoader.tmp File opened for modification C:\Program Files (x86)\BossLoader\API-MS-Win-core-xstate-l2-1-0.dll BossLoader.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
pid pid_target Process procid_target 3788 5788 WerFault.exe 156 5192 2028 WerFault.exe 164 5512 5220 WerFault.exe 167 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies Control Panel 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Colors BossLoader.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Colors BossLoader.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Colors BossLoader.exe -
Modifies registry class 44 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppUserModelId\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}/BossLoader/BossLoader.exe\Has7.0.1Fix = "1" BossLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}\AppId = "{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}" BossLoader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppUserModelId\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}/BossLoader/BossLoader.exe\IconUri = "C:\\Users\\Admin\\AppData\\Local\\ToastNotificationManagerCompat\\Apps\\444E5A1B-F44C-A742-5F3A-106E50EBDCBF\\Icon.png" BossLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}\AppId = "{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}" BossLoader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppUserModelId\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}/BossLoader/BossLoader.exe\DisplayName = "BossLoader" BossLoader.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node BossLoader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}\LocalServer32\ = "\"C:\\Program Files (x86)\\BossLoader\\BossLoader.exe\" -ToastActivated" BossLoader.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppUserModelId\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}/BossLoader/BossLoader.exe BossLoader.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage msedge.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe\Children msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}\AppId = "{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}" BossLoader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppUserModelId\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}/BossLoader/BossLoader.exe\DisplayName = "BossLoader" BossLoader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}\LocalServer32\ = "\"C:\\Program Files (x86)\\BossLoader\\BossLoader.exe\" -ToastActivated" BossLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}\LocalServer32\ = "\"C:\\Program Files (x86)\\BossLoader\\BossLoader.exe\" -ToastActivated" BossLoader.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings CouLoader.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}\LocalServer32 BossLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}\RunAs = "Interactive User" BossLoader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppUserModelId\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}/BossLoader/BossLoader.exe\CustomActivator = "{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}" BossLoader.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppUserModelId BossLoader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppUserModelId\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}/BossLoader/BossLoader.exe\DisplayName = "BossLoader" BossLoader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppUserModelId\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}/BossLoader/BossLoader.exe\CustomActivator = "{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}" BossLoader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppUserModelId\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}/BossLoader/BossLoader.exe\IconUri = "C:\\Users\\Admin\\AppData\\Local\\ToastNotificationManagerCompat\\Apps\\444E5A1B-F44C-A742-5F3A-106E50EBDCBF\\Icon.png" BossLoader.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{444e5a1b-f44c-a742-5f3a-106e50ebdcbf} BossLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}\LocalServer32 BossLoader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppUserModelId\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}/BossLoader/BossLoader.exe\IconUri = "C:\\Users\\Admin\\AppData\\Local\\ToastNotificationManagerCompat\\Apps\\444E5A1B-F44C-A742-5F3A-106E50EBDCBF\\Icon.png" BossLoader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppUserModelId\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}/BossLoader/BossLoader.exe\IconBackgroundColor = "FFDDDDDD" BossLoader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppUserModelId\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}/BossLoader/BossLoader.exe\IconBackgroundColor = "FFDDDDDD" BossLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Children msedge.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{444e5a1b-f44c-a742-5f3a-106e50ebdcbf} BossLoader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{444e5a1b-f44c-a742-5f3a-106e50ebdcbf} BossLoader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppUserModelId\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}/BossLoader/BossLoader.exe\IconBackgroundColor = "FFDDDDDD" BossLoader.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2295526160-1155304984-640977766-1000\{263C7A53-D1DB-4C94-98F4-847C51FA2B8E} msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\AppUserModelId\{7C5A40EF-A0FB-4BFC-874A-C0F2E0B9FA8E}/BossLoader/BossLoader.exe\CustomActivator = "{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}" BossLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}\RunAs = "Interactive User" BossLoader.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949 msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\DisplayName = "Chrome Sandbox" msedge.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}\LocalServer32\ = "\"C:\\Program Files (x86)\\BossLoader\\BossLoader.exe\" -ToastActivated" BossLoader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID\{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}\LocalServer32\ = "\"C:\\Program Files (x86)\\BossLoader\\BossLoader.exe\" -ToastActivated" BossLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}\RunAs = "Interactive User" BossLoader.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\WOW6432Node\CLSID BossLoader.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{444e5a1b-f44c-a742-5f3a-106e50ebdcbf}\LocalServer32\ = "\"C:\\Program Files (x86)\\BossLoader\\BossLoader.exe\" -ToastActivated" BossLoader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-993994543-2095643028-780254397-2751782349-1045596949-3142982554-3368930949\Moniker = "cr.sb.cdmf5200eafd3ad904629cbb0f87a78a3c7211081fe" msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4776 chrome.exe 4776 chrome.exe 5068 chrome.exe 5068 chrome.exe 3232 chrome.exe 3232 chrome.exe 928 chrome.exe 928 chrome.exe 5076 chrome.exe 5076 chrome.exe 3128 chrome.exe 3128 chrome.exe 2268 chrome.exe 2268 chrome.exe 3164 chrome.exe 3164 chrome.exe 3396 chrome.exe 3396 chrome.exe 3008 chrome.exe 3008 chrome.exe 424 chrome.exe 424 chrome.exe 424 chrome.exe 424 chrome.exe 5468 BossLoader.tmp 5468 BossLoader.tmp 3240 chrome.exe 3240 chrome.exe 5448 chrome.exe 5448 chrome.exe 5552 chrome.exe 5552 chrome.exe 64 chrome.exe 64 chrome.exe 5672 chrome.exe 5672 chrome.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1868 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 64 IoCs
pid Process 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1780 BossLoader.exe Token: SeManageVolumePrivilege 5172 svchost.exe Token: SeDebugPrivilege 5788 BossLoader.exe Token: SeDebugPrivilege 2028 BossLoader.exe Token: SeDebugPrivilege 5220 BossLoader.exe Token: SeDebugPrivilege 1868 taskmgr.exe Token: SeSystemProfilePrivilege 1868 taskmgr.exe Token: SeCreateGlobalPrivilege 1868 taskmgr.exe Token: SeDebugPrivilege 5684 CouLoader.exe Token: 33 6248 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 6248 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5468 BossLoader.tmp 5468 BossLoader.tmp 5468 BossLoader.tmp 5468 BossLoader.tmp 5468 BossLoader.tmp 5468 BossLoader.tmp 5468 BossLoader.tmp 5468 BossLoader.tmp 5468 BossLoader.tmp 5468 BossLoader.tmp 5468 BossLoader.tmp 5468 BossLoader.tmp 5468 BossLoader.tmp 5468 BossLoader.tmp 5468 BossLoader.tmp 5468 BossLoader.tmp 5468 BossLoader.tmp -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 5068 chrome.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe 1868 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1780 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5068 wrote to memory of 1980 5068 chrome.exe 82 PID 5068 wrote to memory of 1980 5068 chrome.exe 82 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4892 5068 chrome.exe 85 PID 5068 wrote to memory of 4776 5068 chrome.exe 86 PID 5068 wrote to memory of 4776 5068 chrome.exe 86 PID 5068 wrote to memory of 2072 5068 chrome.exe 89 PID 5068 wrote to memory of 2072 5068 chrome.exe 89 PID 5068 wrote to memory of 2072 5068 chrome.exe 89 PID 5068 wrote to memory of 2072 5068 chrome.exe 89 PID 5068 wrote to memory of 2072 5068 chrome.exe 89 PID 5068 wrote to memory of 2072 5068 chrome.exe 89 PID 5068 wrote to memory of 2072 5068 chrome.exe 89 PID 5068 wrote to memory of 2072 5068 chrome.exe 89 PID 5068 wrote to memory of 2072 5068 chrome.exe 89 PID 5068 wrote to memory of 2072 5068 chrome.exe 89 PID 5068 wrote to memory of 2072 5068 chrome.exe 89 PID 5068 wrote to memory of 2072 5068 chrome.exe 89 PID 5068 wrote to memory of 2072 5068 chrome.exe 89 PID 5068 wrote to memory of 2072 5068 chrome.exe 89 PID 5068 wrote to memory of 2072 5068 chrome.exe 89 PID 5068 wrote to memory of 2072 5068 chrome.exe 89 PID 5068 wrote to memory of 2072 5068 chrome.exe 89 PID 5068 wrote to memory of 2072 5068 chrome.exe 89 PID 5068 wrote to memory of 2072 5068 chrome.exe 89 PID 5068 wrote to memory of 2072 5068 chrome.exe 89
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://google.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc66e64f50,0x7ffc66e64f60,0x7ffc66e64f702⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1676 /prefetch:22⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2308 /prefetch:82⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3056 /prefetch:12⤵PID:1188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3048 /prefetch:12⤵PID:220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4324 /prefetch:82⤵PID:692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4684 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5020 /prefetch:82⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5096 /prefetch:82⤵PID:3492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5012 /prefetch:82⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5060 /prefetch:82⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1604 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2852 /prefetch:12⤵PID:1324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=812 /prefetch:12⤵PID:3208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:3592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:3712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:3856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:3868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:4500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5264 /prefetch:82⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5844 /prefetch:12⤵PID:1656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3780 /prefetch:12⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6192 /prefetch:82⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:12⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:2932
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5580 /prefetch:82⤵PID:4112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6488 /prefetch:82⤵PID:1188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6500 /prefetch:12⤵PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6760 /prefetch:82⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6248 /prefetch:82⤵PID:592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6864 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6568 /prefetch:12⤵PID:3600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7004 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6968 /prefetch:82⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6928 /prefetch:82⤵PID:1188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6308 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5400 /prefetch:82⤵PID:5472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:5992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6796 /prefetch:82⤵PID:6012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6544 /prefetch:82⤵PID:6000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5300 /prefetch:82⤵PID:5108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4764 /prefetch:82⤵PID:6072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6880 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1560 /prefetch:12⤵PID:5360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:2816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:1568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1248 /prefetch:12⤵PID:4012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5316 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6944 /prefetch:12⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=56 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7320 /prefetch:12⤵PID:5504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=57 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7368 /prefetch:12⤵PID:4172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=58 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7532 /prefetch:12⤵PID:5884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=59 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7164 /prefetch:12⤵PID:5912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=60 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7200 /prefetch:12⤵PID:4704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=61 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6776 /prefetch:12⤵PID:880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=62 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7216 /prefetch:12⤵PID:5896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=63 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7524 /prefetch:12⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=64 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7512 /prefetch:12⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=65 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7492 /prefetch:12⤵PID:5780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=66 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7204 /prefetch:12⤵PID:5140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=67 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7988 /prefetch:12⤵PID:5128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=68 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7952 /prefetch:12⤵PID:5952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6848 /prefetch:82⤵PID:1176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=71 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8100 /prefetch:12⤵PID:5740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=72 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6984 /prefetch:12⤵PID:848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=73 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2756 /prefetch:12⤵PID:6108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=74 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2512 /prefetch:12⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7408 /prefetch:82⤵PID:444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7788 /prefetch:82⤵PID:3700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1620 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:64
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7252 /prefetch:82⤵PID:5720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4520 /prefetch:82⤵PID:5648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8272 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5672
-
-
C:\Users\Admin\Downloads\CouLoader.exe"C:\Users\Admin\Downloads\CouLoader.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5684 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://bymynix.de/projects/RedirectLicense9137831.html3⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
PID:2720 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc7e3946f8,0x7ffc7e394708,0x7ffc7e3947184⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:24⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:34⤵PID:520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:84⤵PID:6112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:14⤵PID:5692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:14⤵PID:5436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5332 /prefetch:84⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:14⤵PID:6004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4356 /prefetch:14⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:14⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:14⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:14⤵PID:5316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:14⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6428 /prefetch:84⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6460 /prefetch:84⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings4⤵
- Drops file in Program Files directory
PID:2548 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff722805460,0x7ff722805470,0x7ff7228054805⤵PID:4532
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6460 /prefetch:84⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=media.mojom.MediaFoundationService --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --lang=en-US --service-sandbox-type=mf_cdm --mojo-platform-channel-handle=6768 /prefetch:84⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6600 /prefetch:14⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6808 /prefetch:14⤵PID:5676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6820 /prefetch:14⤵PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7144 /prefetch:14⤵PID:5296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6912 /prefetch:14⤵PID:5544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=6944 /prefetch:84⤵PID:6196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6672 /prefetch:14⤵PID:6340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:14⤵PID:6428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6168 /prefetch:14⤵PID:6512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1380 /prefetch:14⤵PID:6592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6004 /prefetch:84⤵PID:6696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:14⤵PID:6948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:14⤵PID:6976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6736 /prefetch:14⤵PID:7144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7460 /prefetch:14⤵PID:5912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1776 /prefetch:14⤵PID:5816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7444 /prefetch:14⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=7852 /prefetch:84⤵
- Modifies registry class
PID:5584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6996 /prefetch:14⤵PID:5368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7384 /prefetch:14⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8168 /prefetch:84⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6900 /prefetch:84⤵PID:6892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7196 /prefetch:14⤵PID:7128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7832 /prefetch:14⤵PID:5480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9242394068382099968,8241744390154409205,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1844 /prefetch:14⤵PID:3440
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://bymynix.de/discord/3⤵PID:6808
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc7e3946f8,0x7ffc7e394708,0x7ffc7e3947184⤵PID:6832
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://bymynix.de/projects/3⤵PID:6844
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffc7e3946f8,0x7ffc7e394708,0x7ffc7e3947184⤵PID:6904
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://bymynix.de/couloader/3⤵PID:524
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc7e3946f8,0x7ffc7e394708,0x7ffc7e3947184⤵PID:6300
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7016 /prefetch:82⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1644,16863803740722434431,13135334637408105729,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:6944
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:768
-
C:\Users\Admin\Desktop\BossLoader.exe"C:\Users\Admin\Desktop\BossLoader.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\BossLoader.exe"C:\Users\Admin\AppData\Local\Temp\BossLoader.exe"2⤵
- Executes dropped EXE
PID:5224 -
C:\Users\Admin\AppData\Local\Temp\is-17UA6.tmp\BossLoader.tmp"C:\Users\Admin\AppData\Local\Temp\is-17UA6.tmp\BossLoader.tmp" /SL5="$602C8,164018119,956416,C:\Users\Admin\AppData\Local\Temp\BossLoader.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:5468 -
C:\Program Files (x86)\BossLoader\BossLoader.exe"C:\Program Files (x86)\BossLoader\BossLoader.exe"4⤵
- Executes dropped EXE
- Registers COM server for autorun
- Checks computer location settings
- Loads dropped DLL
- Modifies Control Panel
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5788 -s 31085⤵
- Program crash
PID:3788
-
-
-
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2296
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5172
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5788 -ip 57881⤵PID:4552
-
C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"1⤵PID:6020
-
C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir6020_1062426669\ChromeRecovery.exe"C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir6020_1062426669\ChromeRecovery.exe" --appguid={8A69D345-D564-463c-AFF1-A69D9E530F96} --browser-version=89.0.4389.114 --sessionid={3c99ef94-f1f1-471c-98b1-6d025492359b} --system2⤵
- Executes dropped EXE
PID:3204
-
-
C:\Program Files (x86)\BossLoader\BossLoader.exe"C:\Program Files (x86)\BossLoader\BossLoader.exe"1⤵
- Executes dropped EXE
- Registers COM server for autorun
- Checks computer location settings
- Modifies Control Panel
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 31242⤵
- Program crash
PID:5192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2028 -ip 20281⤵PID:5380
-
C:\Program Files (x86)\BossLoader\BossLoader.exe"C:\Program Files (x86)\BossLoader\BossLoader.exe"1⤵
- Executes dropped EXE
- Registers COM server for autorun
- Checks computer location settings
- Modifies Control Panel
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5220 -s 30842⤵
- Program crash
PID:5512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5220 -ip 52201⤵PID:4344
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SendNotifyMessage
PID:1868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2156
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3f8 0x33c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:6248
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1780
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79KB
MD5625dae1cb06e45fd74eba5b0f8b36eeb
SHA1dee6f73ce2c39ce02e72b7a3f439d66be6f51c8a
SHA256a561718dd1fe2c9ce8aba448e8bdad169ccae8d318055d4f2812dcc0a1b942d5
SHA512f003ca4b58b796c3d5e35e389da4a9630a4b1ea23f6e4ec6d51bbd4e7d4cd8932b780c6fbac451aa98f9fa5eaf8c7b890e0d692b295e89281e0b1f43daed03cb
-
Filesize
441KB
MD51a79cf84587c345bc0dbfce98684f46e
SHA1c2e97aa0ffabba435af0367c4e452ffa039c3017
SHA256fd1486573c5017eb5e0316fc5a880e1bd6ed3a19b76f52919c8ba76d96fc65e4
SHA51247ef439d61128683280223e67a448d1ef2bd799184bd232a59b9dda46f50a9891fc8692caa2d6227e9bf788e2531f85f1f5b927bf7bffa4bab1fa7bbcf997d45
-
Filesize
441KB
MD51a79cf84587c345bc0dbfce98684f46e
SHA1c2e97aa0ffabba435af0367c4e452ffa039c3017
SHA256fd1486573c5017eb5e0316fc5a880e1bd6ed3a19b76f52919c8ba76d96fc65e4
SHA51247ef439d61128683280223e67a448d1ef2bd799184bd232a59b9dda46f50a9891fc8692caa2d6227e9bf788e2531f85f1f5b927bf7bffa4bab1fa7bbcf997d45
-
Filesize
372B
MD549d47783542fb97d73276eb568952d95
SHA1e2ec5d687ae324a1e1ec6055e85bcea9b1c12e9f
SHA2568bb28ba0929fbb12fb59d97a289cc1d9ab7991bd2e4a3bf73323589c5ca6516a
SHA512e838d534e230fb7a6dbd512f83ccd34b9e5a73cde8c24ebd701911ed418e3342547ca2d17c85e40b885b1d6884585d09c93e25b56f7ad4ccb0976d0d365304ce
-
Filesize
9.5MB
MD51e537eb4a4e15d6c9574594c65f04535
SHA135f86385897055f0663b2643fe919e2de2480230
SHA256c24c09dd8b230d7aa5649c7244c94b2b832e464aeff430266c2b1e3703b4fa40
SHA51262f1d1437e5db9fb2840bb404caeda3bb79465855cd03656416f886290570a9cb20f113f600d7b5da6378fae3fb2d80c4d248161730ae7f8c867280e8515ddde
-
Filesize
9.5MB
MD51e537eb4a4e15d6c9574594c65f04535
SHA135f86385897055f0663b2643fe919e2de2480230
SHA256c24c09dd8b230d7aa5649c7244c94b2b832e464aeff430266c2b1e3703b4fa40
SHA51262f1d1437e5db9fb2840bb404caeda3bb79465855cd03656416f886290570a9cb20f113f600d7b5da6378fae3fb2d80c4d248161730ae7f8c867280e8515ddde
-
Filesize
1.2MB
MD56c3f3cce4514027f0e07ace6881f586b
SHA1f847912a2863ccb446d8298e3bcc73eaad1791c8
SHA25617b8efee641ff1f2c71f2cd1a81d49147b21024da37cbc4ac4d73f4d87565376
SHA5126cf9f85b2fab40d6b7062a352e02914d8ab153c695992ffc615946aa2580e3250a183ae2e8e1f3fb954c7e34f6652039b11727a949b45677a67e5fec3fedab43
-
Filesize
4.1MB
MD586a4baaa86b9f2623708c19a0001f405
SHA1caabece66548b6ddef4b1e711d048fabbe1e8b82
SHA25632e3f03637d69eb9c7510191de1331a592d6e1b82e847090aa19c55bf9f85ebf
SHA51259ad38d814104c91e71994b4f8a2112e77910febf045211c1959bcbd812b67d1d006bc6809dfe7fe3f046bdb5bed2a39b75959e9411faa7404ba34bec3287173
-
Filesize
4.1MB
MD586a4baaa86b9f2623708c19a0001f405
SHA1caabece66548b6ddef4b1e711d048fabbe1e8b82
SHA25632e3f03637d69eb9c7510191de1331a592d6e1b82e847090aa19c55bf9f85ebf
SHA51259ad38d814104c91e71994b4f8a2112e77910febf045211c1959bcbd812b67d1d006bc6809dfe7fe3f046bdb5bed2a39b75959e9411faa7404ba34bec3287173
-
Filesize
303KB
MD509f93fa599e90a8a97b5a44a89fb2095
SHA1cc98292020e3cffad5f2b2c9cd05a0d21e14e172
SHA25680aa067a03ed0c38788ed9693d654a5b6f9a4d6e85136d2f68104a48d9530cd6
SHA5124f3fcfb8cfc507adc30c697134c3d6817ae5b4a5ae78378cff195f80970bbe937b0463da5a4ac0fa4dc87c33344c1fe1b9eab9b7b3ff3c875c60ba18f71c0bf8
-
Filesize
303KB
MD509f93fa599e90a8a97b5a44a89fb2095
SHA1cc98292020e3cffad5f2b2c9cd05a0d21e14e172
SHA25680aa067a03ed0c38788ed9693d654a5b6f9a4d6e85136d2f68104a48d9530cd6
SHA5124f3fcfb8cfc507adc30c697134c3d6817ae5b4a5ae78378cff195f80970bbe937b0463da5a4ac0fa4dc87c33344c1fe1b9eab9b7b3ff3c875c60ba18f71c0bf8
-
Filesize
319KB
MD5863780ab69fce0c619eb82301fce1a20
SHA11a3cb2f0ca0a8e8a3665b7e2d5886077506b2cf0
SHA256794448915c3f47f55cd11d0d9dc34fc505eec16714c398b5896e0f50576a66a9
SHA512181f3ce2d817b46cb4d779dc245b85967ad2218d41047f2977dab9750ff909395ea84e20a2cc84b06b8caac823ddaf97cee5affa8073ec88435f1af0b873ae2d
-
Filesize
319KB
MD5863780ab69fce0c619eb82301fce1a20
SHA11a3cb2f0ca0a8e8a3665b7e2d5886077506b2cf0
SHA256794448915c3f47f55cd11d0d9dc34fc505eec16714c398b5896e0f50576a66a9
SHA512181f3ce2d817b46cb4d779dc245b85967ad2218d41047f2977dab9750ff909395ea84e20a2cc84b06b8caac823ddaf97cee5affa8073ec88435f1af0b873ae2d
-
Filesize
143KB
MD537d739af3ec7aef28b01c7a6f8b3ec0e
SHA1268442a2176d93c2d15886786a08ad2a23936dfa
SHA2561b7424faa6fa4209d196adda46c92d2c32359e329f0c3f643aa082ace2c14979
SHA51264d316ed63cbffc35ff344c081c357cab48e6bccf09c6a906478ce97b997856d2a1821ca24cc185a036f853665fd029cf8c481c4e7213c147f16d1e4837c0152
-
Filesize
157.3MB
MD5a73a81505f9ec334fe0489627f251780
SHA1f345d0b1ef417622c928b378926093b84257fd1e
SHA256b5f21be8d604599edabbb2df56dd68ffbea1a8f2d5f9c1a02d98af2bea971447
SHA512f674ed90e61f82c972b4a7344224adc607d57ccf96b2fa2e024724f8161dbc5a50d3564648a70680fdf70f5adf49cfb994963e00d528fdd754fad96dc2f3be5d
-
Filesize
157.3MB
MD5a73a81505f9ec334fe0489627f251780
SHA1f345d0b1ef417622c928b378926093b84257fd1e
SHA256b5f21be8d604599edabbb2df56dd68ffbea1a8f2d5f9c1a02d98af2bea971447
SHA512f674ed90e61f82c972b4a7344224adc607d57ccf96b2fa2e024724f8161dbc5a50d3564648a70680fdf70f5adf49cfb994963e00d528fdd754fad96dc2f3be5d
-
Filesize
3.1MB
MD5213f0c4cfd9221fe1040ccce368446ba
SHA1ad741cb62a8b8d0a550d652795a716011002a097
SHA256e8130a85fe6041cff7d350ba62cecb84550431d263da38aa6f4075f7a65ec306
SHA5124d0071a4beaf8f0b1c8e5dc2efeca40d2503e8464240893ebb15d96d30bea2e3082aa060d1623438fb9a643300b8ca664c73a9fee1755bb9b90e74bdf44937d0
-
Filesize
3.1MB
MD5213f0c4cfd9221fe1040ccce368446ba
SHA1ad741cb62a8b8d0a550d652795a716011002a097
SHA256e8130a85fe6041cff7d350ba62cecb84550431d263da38aa6f4075f7a65ec306
SHA5124d0071a4beaf8f0b1c8e5dc2efeca40d2503e8464240893ebb15d96d30bea2e3082aa060d1623438fb9a643300b8ca664c73a9fee1755bb9b90e74bdf44937d0