Overview
overview
10Static
static
1GodMode9-v...59.zip
windows7-x64
1GodMode9-v...59.zip
windows10-2004-x64
GodMode9.firm
windows7-x64
3GodMode9.firm
windows10-2004-x64
3GodMode9.firm.sha
windows7-x64
3GodMode9.firm.sha
windows10-2004-x64
8GodMode9_dev.firm
windows7-x64
3GodMode9_dev.firm
windows10-2004-x64
3GodMode9_dev.firm.sha
windows7-x64
3GodMode9_dev.firm.sha
windows10-2004-x64
3README.md
windows7-x64
3README.md
windows10-2004-x64
3gm9/script...pt.ps1
windows7-x64
1gm9/script...pt.ps1
windows10-2004-x64
1gm9/script...er.gm9
windows7-x64
3gm9/script...er.gm9
windows10-2004-x64
3ntrboot/Go...r.firm
windows7-x64
3ntrboot/Go...r.firm
windows10-2004-x64
3ntrboot/Go...rm.sha
windows7-x64
3ntrboot/Go...rm.sha
windows10-2004-x64
3ntrboot/Go...v.firm
windows7-x64
3ntrboot/Go...v.firm
windows10-2004-x64
3ntrboot/Go...rm.sha
windows7-x64
3ntrboot/Go...rm.sha
windows10-2004-x64
3sample/Hel...ng.vbs
windows7-x64
1sample/Hel...ng.vbs
windows10-2004-x64
1sample/Hel...pt.vbs
windows7-x64
1sample/Hel...pt.vbs
windows10-2004-x64
1sample/Hel...ti.vbs
windows7-x64
1sample/Hel...ti.vbs
windows10-2004-x64
1Analysis
-
max time kernel
1799s -
max time network
1788s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-04-2023 15:49
Static task
static1
Behavioral task
behavioral1
Sample
GodMode9-v2.1.1-20220322194259.zip
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
GodMode9-v2.1.1-20220322194259.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
GodMode9.firm
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
GodMode9.firm
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
GodMode9.firm.sha
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
GodMode9.firm.sha
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
GodMode9_dev.firm
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
GodMode9_dev.firm
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
GodMode9_dev.firm.sha
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
GodMode9_dev.firm.sha
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
README.md
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
README.md
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
gm9/scripts/GM9Megascript.ps1
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
gm9/scripts/GM9Megascript.ps1
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
gm9/scripts/NANDManager.gm9
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
gm9/scripts/NANDManager.gm9
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
ntrboot/GodMode9_ntr.firm
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
ntrboot/GodMode9_ntr.firm
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
ntrboot/GodMode9_ntr.firm.sha
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
ntrboot/GodMode9_ntr.firm.sha
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
ntrboot/GodMode9_ntr_dev.firm
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
ntrboot/GodMode9_ntr_dev.firm
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
ntrboot/GodMode9_ntr_dev.firm.sha
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
ntrboot/GodMode9_ntr_dev.firm.sha
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
sample/HelloBranching.vbs
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
sample/HelloBranching.vbs
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
sample/HelloScript.vbs
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
sample/HelloScript.vbs
Resource
win10v2004-20230220-en
Behavioral task
behavioral29
Sample
sample/HelloSpaghetti.vbs
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
sample/HelloSpaghetti.vbs
Resource
win10v2004-20230220-en
General
-
Target
GodMode9.firm
-
Size
448KB
-
MD5
e178318d5cf7ca96edcff7fa9b0b9936
-
SHA1
e0c61084a8aa421dee81f4e815f3d414fbaf67da
-
SHA256
e398dfa929582e12861a3e90d8e8f435e5deb1d7d27a4cd9dc13057f3a9173ec
-
SHA512
98a494da7da4bf8a487c640cf4fbb5b27f03bc0302becfd69431d1adedcd263552e86108fd6f1836e9a8af678de501ff3a9a7eb944b102f6436a677fb465aaa5
-
SSDEEP
12288:AiB7SvN1M/euF4c35pjRm1C3xKobiFqxPP1wpTpKSI:XBUv0b35kkK3FqxPP1K7
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133248458435050042" chrome.exe -
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 3812 chrome.exe 3812 chrome.exe 1836 chrome.exe 1836 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe Token: SeShutdownPrivilege 3812 chrome.exe Token: SeCreatePagefilePrivilege 3812 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 4704 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3812 wrote to memory of 1796 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 1796 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 4480 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 1716 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 1716 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2632 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2632 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2632 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2632 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2632 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2632 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2632 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2632 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2632 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2632 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2632 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2632 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2632 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2632 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2632 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2632 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2632 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2632 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2632 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2632 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2632 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2632 3812 chrome.exe chrome.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\GodMode9.firm1⤵
- Modifies registry class
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffea8719758,0x7ffea8719768,0x7ffea87197782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1824 --field-trial-handle=1844,i,14620390463014089020,4781491551930982818,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 --field-trial-handle=1844,i,14620390463014089020,4781491551930982818,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2252 --field-trial-handle=1844,i,14620390463014089020,4781491551930982818,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3236 --field-trial-handle=1844,i,14620390463014089020,4781491551930982818,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3372 --field-trial-handle=1844,i,14620390463014089020,4781491551930982818,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4540 --field-trial-handle=1844,i,14620390463014089020,4781491551930982818,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4680 --field-trial-handle=1844,i,14620390463014089020,4781491551930982818,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4828 --field-trial-handle=1844,i,14620390463014089020,4781491551930982818,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5180 --field-trial-handle=1844,i,14620390463014089020,4781491551930982818,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 --field-trial-handle=1844,i,14620390463014089020,4781491551930982818,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 --field-trial-handle=1844,i,14620390463014089020,4781491551930982818,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4544 --field-trial-handle=1844,i,14620390463014089020,4781491551930982818,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD53bad7403574f056c667f5058d8345004
SHA1aa443bedfcd08c7061944f8c5818870693fc729d
SHA2563779168b8eb717fc8ac4e57bcaec2063ad683da23f3ecfecf5d9666fdca4db7d
SHA5123e08d84418a901f305a6b2bd64bebd9bf5b65a8851cd4b970e5782a2b8b922487433aeeb7b02d8f874b217b8c913548f0ce5ce54e07419bc32747895379bcfda
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD5cbb7cead597df2716da9ca85f707f9ef
SHA1c567591e369b9d0d2fd2eaea7e1b5c68618662a0
SHA2569d35416abab3fa64bcf5374a0755f6c4bc470528a977a7d7c710da1ce2885896
SHA51238f6ed313bb58e2210896386d276d2d4d1b0be6236bfdd99de5844d2d105b08b5fb9f1fb37a90ef31e519f10357b6aca77ee83adc5a76aea3fed04006cf5eea6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD583b6ebfb444e5d53f12421805c5202dc
SHA12297b9a38fbb06050b58f6771f509a129350041e
SHA25638959e51131101568181d5c6f1fdc846ca19a205b025ba0a373ef4fd6fb4cdfa
SHA512e3d7a63e31f9ebb427323e6b05f15b94faa2709c8e4d842ab153ede21ab99cf3efc4aa0b8d9003cc81dc3cbe44349df398fe2cab3ddc292608137260a72cb903
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
371B
MD504ffa85d828cf234e9598fbcad0b44a0
SHA1f600cb300a25d4b8b08eaed3c485d62ac8b3d19c
SHA2564d8b5b65e04e9428a27c4962888fd0258e261d6b79c1aba10777d8b38734095a
SHA512b301054d2ba9a4fc88448136a2dbbd85f87ed1e2ad138b1ac4f8c8beefe57cc3ae8b5da4bb5c6fffdb31fbccb5594a83a214336bd978ecf44b1d165ccfcd3995
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5044f7420caa8ab1a75c4cc8786e8e3cf
SHA1e7ba1d44858fb9925d045a263d26864c86cf2904
SHA2564b843a7ba0708b5e2707aac8449880a5e15c181bfcb209d185a12f3aa4f7ab02
SHA512ac30c124f854d9ca62331dbf09977f5106330a9560d5c09ba2614a892d4dfbab810b07c76a868d2ee85547bf4de8676580ec675ecb6543371beee86e75f1bcb8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5230dc3e9c5b0b036d8ce299565accdfd
SHA1950462d2f751c7c33e7bddd165d66d0a206aafad
SHA256344c3d3e2fe2ca7488157ee706e5d0453db8d66b307b86645c1b643b811b76dd
SHA51206bf6d0644d8620664ee2038cd5b63dba61feea47dbb0bc8e71686aa6f848165dd1b7dae6b8fcb378ca552ec6bbcfc36c9cabb690c04eab3392215e38008f99f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD5f945b7acdcc14c6bd451b64800a5d973
SHA1f930101165c227758653c13be9fa8faa0d765a99
SHA256a4b4a9b2692ca153fd856e65e2bec6577059aa4d868a92ee825ace457d8b2fb3
SHA512f10fa181c345122af8af3bb1c15378d2cf818af44b9c9a1fe38db570e0480d895fcc1748303ca9027aaa0601f96588777fc95a669878d02b78cbd8a41c517596
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
15KB
MD507961430bf23f3762b38ac187e2bc207
SHA1896eb74425e30559963946b97912c3e80bea4a28
SHA256b7dc8e690ca18d5a49ecd72265d545c2c2968f24bcddbdef3c151564582ec23a
SHA51290c466e92d8afa462e4eeb7408b5f918f0eabcc568341c2f388651ea5564c1f2589d0d178a6b1b0f4a270092be870ab18fabf9daceee766c3ddbccc3b870dd19
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
173KB
MD5ea1b9e83b7224c1f4b15d191ced5c6b8
SHA14d2e384dc0c2d5af71e27685f5b6f0c182c3bc55
SHA256ccab1b5092f275bdde8bb3f44932a6a8dbd2a651eb2c60ba650ad689e285f023
SHA5125d992f4c0c069b024966bae44654294dd8bf6bc58b261a3e6a70b5b83623ab0d9e240f26cb5e49850dfe59ec39c70765f1fd0933a4761b2c619bbc06fc3bf37a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_3812_VJOBBKQZRHCCDKOIMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e