Analysis
-
max time kernel
584s -
max time network
587s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2023 08:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://q.gs/FVD7O
Resource
win10v2004-20230220-en
General
-
Target
http://q.gs/FVD7O
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133298287706330361" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3372 chrome.exe 3372 chrome.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 660 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
pid Process 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe Token: SeShutdownPrivilege 3032 chrome.exe Token: SeCreatePagefilePrivilege 3032 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe 3032 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3032 wrote to memory of 1692 3032 chrome.exe 84 PID 3032 wrote to memory of 1692 3032 chrome.exe 84 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 372 3032 chrome.exe 86 PID 3032 wrote to memory of 4040 3032 chrome.exe 87 PID 3032 wrote to memory of 4040 3032 chrome.exe 87 PID 3032 wrote to memory of 4740 3032 chrome.exe 88 PID 3032 wrote to memory of 4740 3032 chrome.exe 88 PID 3032 wrote to memory of 4740 3032 chrome.exe 88 PID 3032 wrote to memory of 4740 3032 chrome.exe 88 PID 3032 wrote to memory of 4740 3032 chrome.exe 88 PID 3032 wrote to memory of 4740 3032 chrome.exe 88 PID 3032 wrote to memory of 4740 3032 chrome.exe 88 PID 3032 wrote to memory of 4740 3032 chrome.exe 88 PID 3032 wrote to memory of 4740 3032 chrome.exe 88 PID 3032 wrote to memory of 4740 3032 chrome.exe 88 PID 3032 wrote to memory of 4740 3032 chrome.exe 88 PID 3032 wrote to memory of 4740 3032 chrome.exe 88 PID 3032 wrote to memory of 4740 3032 chrome.exe 88 PID 3032 wrote to memory of 4740 3032 chrome.exe 88 PID 3032 wrote to memory of 4740 3032 chrome.exe 88 PID 3032 wrote to memory of 4740 3032 chrome.exe 88 PID 3032 wrote to memory of 4740 3032 chrome.exe 88 PID 3032 wrote to memory of 4740 3032 chrome.exe 88 PID 3032 wrote to memory of 4740 3032 chrome.exe 88 PID 3032 wrote to memory of 4740 3032 chrome.exe 88 PID 3032 wrote to memory of 4740 3032 chrome.exe 88 PID 3032 wrote to memory of 4740 3032 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" "--simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT'" http://q.gs/FVD7O1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe13009758,0x7ffe13009768,0x7ffe130097782⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:22⤵PID:372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:82⤵PID:4040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2232 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:82⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3048 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:12⤵PID:3400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3152 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:12⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4484 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:12⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4640 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:12⤵PID:3508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=5280 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:12⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5880 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:82⤵PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:82⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5928 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:82⤵PID:4960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6092 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:82⤵PID:3796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6080 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:82⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4432 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:12⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=6040 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:12⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5172 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:82⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5176 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:82⤵PID:2088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5868 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:82⤵PID:3372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6296 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:82⤵PID:1284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=6152 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:12⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=4720 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:12⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=5944 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:12⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=1700 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:12⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3660 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:82⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=4728 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:12⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=6520 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:12⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5808 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=1780 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:12⤵PID:1728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:82⤵PID:3516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=31 --mojo-platform-channel-handle=4432 --field-trial-handle=1768,i,16310300956008829889,3560465007555629518,131072 /prefetch:12⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:744
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
162KB
MD544ec03cb3248c903b67751ea27df310a
SHA1c57e9cf90caf30457e9d57db750b8a0eb8856770
SHA256d4de4a836d11828dd561db1eb8d7fd48a7e0ce9afd8645e2eabb19a1267b6894
SHA512657e8958d97eab524224bbd8903e0bd7d0c2640805f77da7546060164fe03f7b6ece99a005ef44e41b7233a2e24ffc63430b2fe3c87f61a1b26e0d7c7e52c365
-
Filesize
24KB
MD5a42c6333a13e5376af95f46fd9c7b627
SHA157a98e519a44915e39a0cb6f23812adfa6611e67
SHA25662bff9dd0379da44f9d7f739af671bb6b243c016b49c7146b431ae9e6b9cb41b
SHA51268e511708465c75662845c55169de20572adfb359e1f4fd037c169bda44d853fdc622794912406b1908b585c3965d4a8612c007af9ca2601dacd4a14283fc894
-
Filesize
648B
MD5ea013684157454974200d1cdcef1c4ad
SHA152f6f27e7c5965c2482e5b662ffa5c9af1ef1b6e
SHA256c1096870d2140e7572fa38f5051f0465b3d8ed0ac6cd210da2a8c4d033ef8778
SHA51248d1bf2990d6bb88d9c48581c119bf432b51fe716c8feb2a8b8ddcf3cb8b74f42b77de292f855933bfadfe0fc4d54118d614c20e27e01085a63b17156f248926
-
Filesize
1KB
MD5980509ba51f3080e6bc556e5744146fa
SHA1bcb666bb4c1e0f8f37d1a743f4115852cdd651b8
SHA2565c3c71ca625b59efab119b830d4960acc1ae1286fbb65642c9f3653792c3cc9d
SHA512b7ebf4148046c4a5ab6a902237dce746cec57329d6037c0be0062260b274b8b2f82cccbf7420c3280a6eb28a401db9dc0c93ba640a2f19adeb9b5bfbe917b051
-
Filesize
1KB
MD5a94a8edaa990815d31b954ed3c5c3a58
SHA11589cb9c8da17d72aa68d0542c540988d2277bae
SHA256bb7a0b7a473254ba5de7e0c5423ed5ed8cb5d5989b4d8718dc2598915696d806
SHA512e5e97428f8fd16c611cfd1faf406667a32b2ed9bd6ac3a5adf6ecc12c041f370dd9663d5e223f5dd4cf57bd295638cb33cd91cf0438c2789709bcd240b460e5c
-
Filesize
1KB
MD536375eee8949a2d936f1763cbb7a1be4
SHA184b1beafe95371a02a45e0ff7a451026968ec59b
SHA2569e476d2af92624176b74168efd9437a41745f69f5cbd20422ba57e22df3371c7
SHA51266e8fe5dbb7b1fd6c446bcf77cb8673803273a22d7e5c9c60a2342b8db7dfb4822356e136ad733bb109b77672553928a969227ac8e9e7e2e4e27fd61aed081eb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_usersdrive.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
6KB
MD523ae4a5fc41a6c5b55ba8def2b2c2113
SHA15968a6b2c726a95c38395f5ef9f79e8c9c0a36cc
SHA25689741b50c077a73ee5e33ed98c7646ad3713f2c6771b5aafe489cb91e76b1b8f
SHA512e01c27c36e3746e57194fb5d874e3d75e3b249930fe85aa025e748e1ac625b51006a7d6ac810456264ba929c75d8e67d736ea373b7af6d1694eea9446545850e
-
Filesize
7KB
MD5755c5c9db15fecddb3c7fb8c4cb3807a
SHA1823ffe28f024e58b783bb64a002127e84a73165c
SHA256d5257f2dffad8c719c065c571bf0288f096a5bdae839d04e2cca8079aebba89c
SHA512dd27480d73696f1fc8247759c7c4450db71e3b6a6b531a2429f613ee6252036b76205fcd5e954603eef7d199daf307760a63d3fd992bbe50618ababee8f8d39d
-
Filesize
1KB
MD5b53a7f49461a18d88fa986e56171c41b
SHA18cf2b31de26a062af872f72996bbe330d78f6e31
SHA256d0c11b3db9b5591e603ac73d368137d631b4404f1c78a180f9396d7b76bac1a0
SHA512abb65cc7f0d0e82d7ffd968b682ff688e82ffcbd33509ddf967847dc5b27d732889491f87495d382c4459f95fd94fa3cb86772584026086b7b30c913a6cd3fe8
-
Filesize
3KB
MD55a01ba4e9946fad13dacc10e3f367d74
SHA158fd92b721132221dc91eadd3b6c98fe62a2dbeb
SHA25683d287cc7649875604bba565db9c81759bbf0d12bd04febd43e59e7a74265564
SHA5123a02cc0dc5681555d34d81acb1a4fb47bde37145cb4c27e6f5c33d39dbc7c61c47102b032a81f9a785877b17846bd80bbe7a007ccdd89ee7f87cea2e93f67fae
-
Filesize
3KB
MD5da15cc6891c9503301308610d28bb095
SHA191d29a43b1537ea1d466210b8b206137738eb451
SHA2567d97f1ec54abed08a04f554156a128959420da8eed105d34898f74cc7f672c5d
SHA512fefc62e189978c2eafb6da8ddc2dade75439b744d823988ca50c29511340b71d7fe3c6fc997a3f8e474d4a0040a288ff3943cf8d27f78e45f51b46511aceea30
-
Filesize
3KB
MD5a84269a591170a5a782a52573730f541
SHA1c2b758767027dc90db3744a455ecc2b463e9e3ed
SHA256db793a8a9ffdad54940818d8c1ecfe67e19a9733b9ca816714c65073028b9728
SHA512bd221bfeec5697b5a39bf63962225198a3767f2ba8c5847175f9f1443eea9226f4394b9ca30526fba7325fbf8785612359c6eb84d96cc9b9ee159e945f780101
-
Filesize
6KB
MD596ec2dd5cc0452e30d2b2c7249618817
SHA129515e15db182d90a3929658cd3a4d4032401b1d
SHA2562e3a8140166220a94bdebc78e80d398008ee34f539aac62f180e7d6a15c86443
SHA512ef0926cc82ceed8c62aa869bcf393f89e5b6fbd4b3b54089694dace6f944fb19bff9aa47eb1d450e3e26431a702879d7b25feb48301ef698eca1358661ae32c8
-
Filesize
6KB
MD59781640bdeec5507eff0d2d7dd613b56
SHA16a78e0873e8cf29f4130ac2e9f06d03089b9fa5d
SHA256faf8f671996730f61d94505d0c0f70e0f8f847d0ad861764da3325ab0f63b3d8
SHA512721b53e15a66d96092ac429721ac6ccdc53325393e6de65709c931c11e7c5ffddd4a1d2dfcea3ae89ade85c744c34264ad5020338797f1b2113f5ddb03f1a53d
-
Filesize
6KB
MD5f00612339416c0afff4214300cb658e6
SHA1d178f4068ffc48371b91b48f681224518916de73
SHA2565261d0321fbb5b151100a3afb1fc166307c8e512cd9a3ef15a4496537defa77c
SHA51249fcc5f93bb4870d88c32a22d40b410f027c9ae4c0dcf18cf28ceeb20993fd8715f903904f4ec01fcfb07963ec1897b459f9c77fcdca79c8d21a46d4a6806a7c
-
Filesize
7KB
MD57dd0a496857657da460d435628fadb55
SHA1c39b4e88581a4402a234f610fe0cc7af863a1bd3
SHA25692db6907d1a72b5b903ce3629410342fd245a6e99b8431f4112b72ac8fc80087
SHA5124a146209b247cae7ebce022be5f2c953598e51d957d65da80f839af28b661688041dcab23ed0bdbefd053e986a7db8014b1b90f355341499545ce112e577a3af
-
Filesize
7KB
MD5c60bb19195244b994e46d2679e10198a
SHA1bccf6c994aaad5dab695172bee4d68451405d7b6
SHA25697f2f729fd12eac290481d54f8c9c3c59da89759063884b00d51b6d338383422
SHA512b93357097bce8f7dcf4c42cad7049f759b71d7ea16414a406cd6a4e954627b2777cde1e9794a9246b199ce5369dfcebd4f21142e25fa770e3c74b08f521a788e
-
Filesize
7KB
MD578ca7f479ecb3bc62cd3cfa70037b16e
SHA1397cd05936f1416061c899ae39bf9e46db1b4de7
SHA2567ae0d26da9ad0ef7d33f85abe285df692265338b6f9c0c10ecdd6589f76b4da9
SHA512a76a31939eebe62b2dde29f82f60d6d7cbc9961b778e0388f841e44e9cab5847c0f9f2d78ac97ee4498f9ceb3cada2eed4424d3acd9032e3a83d9bbcea8355aa
-
Filesize
6KB
MD545d89827d0caa4951b2ccc84a7de5610
SHA19c76b1e7604ceba1475cb53ad28472ec178b3555
SHA2563fb431f81d976b448a4ddad549cf91060aabe2d7868aa2f821242eac0a12e7b3
SHA512d3274e1da1c49508ba5089500f035b0b941fc386105c689eb412d44d3253e74ef076229cc4c0645837a9fc837e29f5537ff86800f687e0b5839d60002c056b4b
-
Filesize
15KB
MD55e5a063fdb139c7d3f3762df2207d4ba
SHA1b6c33fbcca96ee6ca29cc4c0093b0cd9e2f06283
SHA2563b965fcfdad97388c5cd15379bbdfbc20b8f28fe2ff52b350aaa8e77191bfe3d
SHA512a702d2acde2e2bbdc5fc56c725897d5a934f41d8348b2e394aeb8dfebaab88ce0dc3b679896858ae7ffd7c7983049e605856cef3ab4d2139830045b76e13af98
-
Filesize
72KB
MD5c86a52c55236cc36a063bc52491907a7
SHA1ad990ab0e93ae665fd62833bcab27585bdf1ab32
SHA256b296d6a42749cf40efcb7dc58520d4b34c8fe2bf5788b5f546244b0dfa421062
SHA5125368d69ae0b4399d25047c17a8d2bf86f9a2d73e4e514e0c88635256ae36891a68ab0a0d29f09cbc2e8d8c810636ff59bafb078c9973ec2354c948c4a8967316
-
Filesize
176KB
MD56d6e815cc36b231df52a54b6c8dc37c0
SHA105b2150250aa4e810f022cc43fe207d1f159e4b6
SHA2563b214a6eebde7f1d43ff6a0f7f14ca447b0b37d4de1edaa1c95184af4b082543
SHA512f816c89aebf453d8e68eabe711fdd0dadd7aacb4da78b95efe605ba17c85b21a1f0cf70f141f1386c9791cd1a95ecf57f41d733b6487cb5ba97e865c043b4cae
-
Filesize
156KB
MD5cf7c30c7ce02e2437d81bbb74719254b
SHA11c8f8719c50c947a859badb21b7a8dc104e0a501
SHA2560480cd58666aad234f85983d7643bc300dfc790c464f2ace73bc54e9c43d98be
SHA512f69f87c648032aa2ac354cb58e6d70e50758f752cc072eb9e4fb9ec26efbfe16b7a98efd26fec72c6b8b8a6a43ce544c1b09c9f3427d3f00267a531797d7d87e
-
Filesize
156KB
MD523738463ca82197a98e8cf8597a28657
SHA19f2a04a71c9c4e90fa88f158b426772a3efabb14
SHA2562a996b01edef8ee24b63f5ab6bcefe0f9fd3acbfe3db30d12532a5194ecbffb6
SHA512cd482e3d6d9d6972fc988b783bb5518457c5137f0236ba7f6e99400f98beafcc8a1dd92af36336fe7c39afa93d51db73a63b62b3a81134fe8ef0af9e780246cd
-
Filesize
156KB
MD5e53fda870778bffcdcb8ef386d34c1b6
SHA1f5850e110c059123a03d6c7fa45adde32f0c427a
SHA25679f7e02d713d3b5b585eb4d68e8964ff52e4b82c253ede9fad22dac151599ddf
SHA51268740cab71f445e4e65e394b62827b4181d9f82c3580e5addf0b4d2d100bf2b53c935c8547c328e72939d8a83f759212132552ce1b4f0ead2003c72b68281662
-
Filesize
156KB
MD54a260c7a4e349eb5d8e17e4059c18bcd
SHA1879e1a626f1813ba2a74290bfb77dd1f888677b7
SHA2565a07be8b7e4985c8901872ea5546b9fbfcb6233e53b34beb2258eddabcd1994a
SHA5127eada7a06d4dcf8db508c9f0099fc05b9e7019eeafc22c20156da5daf245678b97aa589140e15cd114fb06f3bb53680fc3c4d30199f3e6e57b7ffce06089ee8d
-
Filesize
156KB
MD529ddd418336087785078bc75bf5cd13d
SHA1230042d67c2c6659a4dd89ee3cfb4a89af6d8740
SHA2563b8eaad4eefaf9245d906b4a98edd7470ee39b51e7cde19578271e3ec87049c9
SHA512f5809c292d351ce62a0786acee74311c41a02e18461f444808f240f260dc5417ec7133d384bcd29f3604819ce28ce3e36846d260c19ee39b959a5c7842884ab2
-
Filesize
156KB
MD5ed312c86191be94f71213c3eabb3d4d3
SHA1b676cf8f2b363216e32b23d25fae919bb5ae4f9e
SHA256c97004a19faedea353844cc527e27d1b3c3ec946a9d6391272e175e89132b20e
SHA512d5435ec9bc1d8ec0eb5b3b4067132ec3cf87f9f9593709536ef1cbb08d31932d2ad3f65c3db49b6e8e17f5d1ccdbff0923575b70702df93a33770328dc50214f
-
Filesize
156KB
MD515082958a2fff2766db9be3afcc767eb
SHA1369cd3062cf0e5ec2a3a3e0487ec6a17911c384e
SHA256cf3942c69593f5daded6ab2e558a6b07c8b353b56392601e3c87aeefcc9d6b41
SHA51261c3cd1fbe9a8c07541c123a310250acaffe058f462646edf84b9382ae81e7fe016b81752e981d626aa578e508af8e00fd8c068ce094d0adfc73d5e13bb5e767
-
Filesize
109KB
MD52b529895070ef3a9cedfa2e018809a3c
SHA1e57a37c20312dc84f31a48ef64d999bcaffe7177
SHA2568a2a38c6efb9bd60d4fed35de19f75f5777364ab7d8590848f14beb04cc9e3c8
SHA5127c6b84fa5cbb5ceff5e2ccda6db909f3706d9c76be7694889a3e16da77c06004b256a90d79f41b27497116a80bc47bd1bd67708d7260dc62f2b1b1f40a9b7504
-
Filesize
114KB
MD5f74f3bec1397f71d6efef203b894a17c
SHA1af5c9574a68c4ba5557fcb8487827bcec53acd59
SHA2560fbe50e339b8006531e55be2ea0346092c8d0a36fe31801000c756d7e9d0a92e
SHA512b68bedbb9fa6d470235bbe12b140fcf75378f8f8073c4de6a793726e000795fc069d03bacc79a7c29da6d2111b0278fa9d8856c036f7da0fa1c32f11fe7759cf
-
Filesize
103KB
MD528148c571f4718b1ccbd031a213a0256
SHA1ff7b61a0a40c5e69106383ad2e8791dfb3a82a81
SHA25687d4bd2464dabf16230523de9c6a04dcb26de0b4c556bb242ea2c144b383af8a
SHA51207eca02a98c5cb21545adb35a5158a3b93fc035ef596b36137e088c3945cd1b81920e087c4ec6c3778ba5bb3e8d12f868c97b163791dc470338e65bcbd4fbb19
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize8KB
MD542b9b07f828a759649a524d46fc725ed
SHA14e90b303120397ab974deb5aa17067dd1f2ea768
SHA2563a8406e70df9b5097967495a3b97b1e75ff1f6995eb8175605f61fff2cc0257b
SHA51284f789a50f3c2e4dcd26d961a5840bb41b76948f451a563dd7d8afe81fda08ae72dd29a0eca3b43a94d8ccce9d2c54ff26999a74d854bf795e41ac3e932dd34b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize9KB
MD50c5f54bd3f088dc50e13a41713a70ff0
SHA1d9848525c49f52ee862c8e08d1efcae95883679d
SHA256973f6ca55da9a49b4dda77171d2191cb44a20a18f0455b4af322071732486e26
SHA51230f8a8956d1f54dfa23d4f1002113fa33fe23bb0f1c2de88aa28b3579d538cbef420492ece19788f5494c1441b90d5889eb12c9132ada564e5b95cdb147647e9