Overview
overview
3Static
static
1MEMZ-maste...ignore
windows10-1703-x64
3MEMZ-maste...bin.py
windows10-1703-x64
3MEMZ-maste...bin.py
windows10-1703-x64
3MEMZ-maste...ss.asm
windows10-1703-x64
3MEMZ-maste...in.asm
windows10-1703-x64
3MEMZ-maste...me.asm
windows10-1703-x64
3MEMZ-maste...me.asm
windows10-1703-x64
3MEMZ-maste...ng.asm
windows10-1703-x64
3MEMZ-maste...an.asm
windows10-1703-x64
3MEMZ-maste...me.asm
windows10-1703-x64
3MEMZ-maste...te.asm
windows10-1703-x64
3MEMZ-maste...er.asm
windows10-1703-x64
3MEMZ-maste...er.asm
windows10-1703-x64
3MEMZ-maste...up.asm
windows10-1703-x64
3MEMZ-maste...ts.asm
windows10-1703-x64
3MEMZ-maste...er.asm
windows10-1703-x64
3MEMZ-maste...er.asm
windows10-1703-x64
3MEMZ-maste...os.asm
windows10-1703-x64
3MEMZ-maste...er.asm
windows10-1703-x64
3MEMZ-maste...in.asm
windows10-1703-x64
3MEMZ-master/README.md
windows10-1703-x64
3MEMZ-maste...es.txt
windows10-1703-x64
1MEMZ-maste...te.txt
windows10-1703-x64
1MEMZ-maste...es.txt
windows10-1703-x64
1MEMZ-maste...ata.py
windows10-1703-x64
3MEMZ-maste...bat.py
windows10-1703-x64
3Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
16-02-2023 20:43
Static task
static1
Behavioral task
behavioral1
Sample
MEMZ-master/.gitignore
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
MEMZ-master/NyanMBR/Data/Image/png2bin.py
Resource
win10-20220901-en
Behavioral task
behavioral3
Sample
MEMZ-master/NyanMBR/Data/Song/midi2bin.py
Resource
win10-20220812-en
Behavioral task
behavioral4
Sample
MEMZ-master/NyanMBR/Source/Stage1/decompress.asm
Resource
win10-20220812-en
Behavioral task
behavioral5
Sample
MEMZ-master/NyanMBR/Source/Stage1/main.asm
Resource
win10-20220901-en
Behavioral task
behavioral6
Sample
MEMZ-master/NyanMBR/Source/Stage2/Animation/Image/drawIntroFrame.asm
Resource
win10-20220812-en
Behavioral task
behavioral7
Sample
MEMZ-master/NyanMBR/Source/Stage2/Animation/Image/drawNormalFrame.asm
Resource
win10-20220812-en
Behavioral task
behavioral8
Sample
MEMZ-master/NyanMBR/Source/Stage2/Animation/Image/initDrawing.asm
Resource
win10-20220812-en
Behavioral task
behavioral9
Sample
MEMZ-master/NyanMBR/Source/Stage2/Animation/countNyan.asm
Resource
win10-20220812-en
Behavioral task
behavioral10
Sample
MEMZ-master/NyanMBR/Source/Stage2/Animation/displayFrame.asm
Resource
win10-20220901-en
Behavioral task
behavioral11
Sample
MEMZ-master/NyanMBR/Source/Stage2/Animation/playNote.asm
Resource
win10-20220812-en
Behavioral task
behavioral12
Sample
MEMZ-master/NyanMBR/Source/Stage2/Interrupts/keyboardHandler.asm
Resource
win10-20220812-en
Behavioral task
behavioral13
Sample
MEMZ-master/NyanMBR/Source/Stage2/Interrupts/timerHandler.asm
Resource
win10-20220812-en
Behavioral task
behavioral14
Sample
MEMZ-master/NyanMBR/Source/Stage2/Setup/setup.asm
Resource
win10-20220812-en
Behavioral task
behavioral15
Sample
MEMZ-master/NyanMBR/Source/Stage2/Setup/setupInterrupts.asm
Resource
win10-20220901-en
Behavioral task
behavioral16
Sample
MEMZ-master/NyanMBR/Source/Stage2/Setup/setupSpeaker.asm
Resource
win10-20220812-en
Behavioral task
behavioral17
Sample
MEMZ-master/NyanMBR/Source/Stage2/Setup/setupTimer.asm
Resource
win10-20220812-en
Behavioral task
behavioral18
Sample
MEMZ-master/NyanMBR/Source/Stage2/Utils/macros.asm
Resource
win10-20220812-en
Behavioral task
behavioral19
Sample
MEMZ-master/NyanMBR/Source/Stage2/Utils/timer.asm
Resource
win10-20220901-en
Behavioral task
behavioral20
Sample
MEMZ-master/NyanMBR/Source/Stage2/main.asm
Resource
win10-20220812-en
Behavioral task
behavioral21
Sample
MEMZ-master/README.md
Resource
win10-20220812-en
Behavioral task
behavioral22
Sample
MEMZ-master/WindowsTrojan/Data/KillMessages.txt
Resource
win10-20220901-en
Behavioral task
behavioral23
Sample
MEMZ-master/WindowsTrojan/Data/Note.txt
Resource
win10-20220812-en
Behavioral task
behavioral24
Sample
MEMZ-master/WindowsTrojan/Data/Sites.txt
Resource
win10-20220812-en
Behavioral task
behavioral25
Sample
MEMZ-master/WindowsTrojan/Data/genData.py
Resource
win10-20220812-en
Behavioral task
behavioral26
Sample
MEMZ-master/WindowsTrojan/Source/exe2bat.py
Resource
win10-20220901-en
General
-
Target
MEMZ-master/NyanMBR/Data/Image/png2bin.py
-
Size
1KB
-
MD5
6d6d94f38626dd058abc46f146cb7688
-
SHA1
cf726d65e5946f1767c57a8861c9636cc7dccbbd
-
SHA256
400047a3ebd0fd331a6049bb6d44bce3479a4f4a6c1fad120defc2426a3556f9
-
SHA512
a184a26df513bc5ca215bc2084ad660eb94ff4a0dcf916e15477442e199999b25b05ea97c3ccb7d07812ecb8ac682054b99b6dbc204e1745a65d1150a18d695f
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 164 chrome.exe 164 chrome.exe 2528 chrome.exe 2528 chrome.exe 4432 chrome.exe 4432 chrome.exe 2236 chrome.exe 2236 chrome.exe 780 chrome.exe 780 chrome.exe 836 chrome.exe 836 chrome.exe 4004 chrome.exe 4004 chrome.exe 3160 chrome.exe 3160 chrome.exe 2528 chrome.exe 2528 chrome.exe 1468 chrome.exe 1468 chrome.exe 4552 chrome.exe 4552 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3880 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 31 IoCs
pid Process 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4264 firefox.exe Token: SeDebugPrivilege 4264 firefox.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe -
Suspicious use of SendNotifyMessage 27 IoCs
pid Process 4264 firefox.exe 4264 firefox.exe 4264 firefox.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe 2528 chrome.exe -
Suspicious use of SetWindowsHookEx 52 IoCs
pid Process 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 3880 OpenWith.exe 4264 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3880 wrote to memory of 1344 3880 OpenWith.exe 70 PID 3880 wrote to memory of 1344 3880 OpenWith.exe 70 PID 1344 wrote to memory of 4264 1344 firefox.exe 72 PID 1344 wrote to memory of 4264 1344 firefox.exe 72 PID 1344 wrote to memory of 4264 1344 firefox.exe 72 PID 1344 wrote to memory of 4264 1344 firefox.exe 72 PID 1344 wrote to memory of 4264 1344 firefox.exe 72 PID 1344 wrote to memory of 4264 1344 firefox.exe 72 PID 1344 wrote to memory of 4264 1344 firefox.exe 72 PID 1344 wrote to memory of 4264 1344 firefox.exe 72 PID 1344 wrote to memory of 4264 1344 firefox.exe 72 PID 4264 wrote to memory of 3024 4264 firefox.exe 74 PID 4264 wrote to memory of 3024 4264 firefox.exe 74 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4700 4264 firefox.exe 75 PID 4264 wrote to memory of 4828 4264 firefox.exe 76 PID 4264 wrote to memory of 4828 4264 firefox.exe 76 PID 4264 wrote to memory of 4828 4264 firefox.exe 76 PID 4264 wrote to memory of 4828 4264 firefox.exe 76 PID 4264 wrote to memory of 4828 4264 firefox.exe 76 PID 4264 wrote to memory of 4828 4264 firefox.exe 76 PID 4264 wrote to memory of 4828 4264 firefox.exe 76 PID 4264 wrote to memory of 4828 4264 firefox.exe 76
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\MEMZ-master\NyanMBR\Data\Image\png2bin.py1⤵
- Modifies registry class
PID:5052
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\AppData\Local\Temp\MEMZ-master\NyanMBR\Data\Image\png2bin.py"2⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -url C:\Users\Admin\AppData\Local\Temp\MEMZ-master\NyanMBR\Data\Image\png2bin.py3⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4264.0.1040450957\929192198" -parentBuildID 20200403170909 -prefsHandle 1544 -prefMapHandle 1536 -prefsLen 1 -prefMapSize 219987 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4264 "\\.\pipe\gecko-crash-server-pipe.4264" 1624 gpu4⤵PID:3024
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4264.3.1543576483\11163257" -childID 1 -isForBrowser -prefsHandle 2220 -prefMapHandle 2216 -prefsLen 156 -prefMapSize 219987 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4264 "\\.\pipe\gecko-crash-server-pipe.4264" 2228 tab4⤵PID:4700
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4264.13.1268893952\1923882224" -childID 2 -isForBrowser -prefsHandle 3464 -prefMapHandle 3460 -prefsLen 6938 -prefMapSize 219987 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4264 "\\.\pipe\gecko-crash-server-pipe.4264" 3480 tab4⤵PID:4828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4264.20.1035805868\1792928773" -childID 3 -isForBrowser -prefsHandle 3848 -prefMapHandle 3964 -prefsLen 7643 -prefMapSize 219987 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4264 "\\.\pipe\gecko-crash-server-pipe.4264" 4048 tab4⤵PID:936
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2528 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7fff0adc4f50,0x7fff0adc4f60,0x7fff0adc4f702⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1484 /prefetch:22⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1860 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2484 /prefetch:12⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2452 /prefetch:12⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2308 /prefetch:82⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:2864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4248 /prefetch:82⤵PID:3892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4436 /prefetch:82⤵PID:444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4300 /prefetch:82⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4412 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4680 /prefetch:82⤵PID:4024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5080 /prefetch:82⤵PID:1348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4560 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4712 /prefetch:82⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4796 /prefetch:82⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:1272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1596 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:3800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3612 /prefetch:12⤵PID:4900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4392 /prefetch:12⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:12⤵PID:4692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2528 /prefetch:12⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:4140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3704 /prefetch:12⤵PID:4144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:3648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6332 /prefetch:12⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6320 /prefetch:12⤵PID:4228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6192 /prefetch:12⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6968 /prefetch:12⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6816 /prefetch:12⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6600 /prefetch:12⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6580 /prefetch:12⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7592 /prefetch:12⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3616 /prefetch:12⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5544 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6256 /prefetch:82⤵PID:768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3332 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6172 /prefetch:82⤵PID:376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7344 /prefetch:12⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:12⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:3504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6840 /prefetch:82⤵PID:4556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3556 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2608 /prefetch:12⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,10412050284809347287,16733932904711049861,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:3740
-