Overview
overview
3Static
static
1canvas (1).png
windows7-x64
1canvas (1).png
windows10-2004-x64
3canvas (1).png
android-9-x86
canvas (1).png
android-10-x64
canvas (1).png
android-11-x64
canvas (1).png
macos-10.15-amd64
1canvas (1).png
ubuntu-18.04-amd64
canvas (1).png
debian-9-armhf
canvas (1).png
debian-9-mips
canvas (1).png
debian-9-mipsel
Analysis
-
max time kernel
285s -
max time network
1775s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
24/04/2023, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
canvas (1).png
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
canvas (1).png
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
canvas (1).png
Resource
android-x86-arm-20220823-en
Behavioral task
behavioral4
Sample
canvas (1).png
Resource
android-x64-20220823-en
Behavioral task
behavioral5
Sample
canvas (1).png
Resource
android-x64-arm64-20220823-en
Behavioral task
behavioral6
Sample
canvas (1).png
Resource
macos-20220504-en
Behavioral task
behavioral7
Sample
canvas (1).png
Resource
ubuntu1804-amd64-en-20211208
Behavioral task
behavioral8
Sample
canvas (1).png
Resource
debian9-armhf-20221111-en
Behavioral task
behavioral9
Sample
canvas (1).png
Resource
debian9-mipsbe-en-20211208
Behavioral task
behavioral10
Sample
canvas (1).png
Resource
debian9-mipsel-en-20211208
General
-
Target
canvas (1).png
-
Size
150KB
-
MD5
3a56a6918118df37bac2b938a00deb56
-
SHA1
053e857eb2c6be7860442e32fad0218804bd70b1
-
SHA256
49a9dec5beeac0b64d70f558e84594aea2fbcec452d84ba69a2c78d3fdac7465
-
SHA512
bd5e35690d481864b27c6c1ed1d715e29a4b4772ac17befc6d7f71102c33e66609c5e0b867c4ad33e39b1bbd2050d652393517fd93d2db10d52a45cc8d9e2315
-
SSDEEP
3072:Blu1ilLZDWi33OUqjX58c1L4+pHjS8b8j8pRiiKVw7o:Hu16LZDWi33vvSD38j87Lvo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe Token: SeShutdownPrivilege 2012 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe 2012 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1324 2012 chrome.exe 28 PID 2012 wrote to memory of 1324 2012 chrome.exe 28 PID 2012 wrote to memory of 1324 2012 chrome.exe 28 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1380 2012 chrome.exe 30 PID 2012 wrote to memory of 1336 2012 chrome.exe 32 PID 2012 wrote to memory of 1336 2012 chrome.exe 32 PID 2012 wrote to memory of 1336 2012 chrome.exe 32 PID 2012 wrote to memory of 1556 2012 chrome.exe 31 PID 2012 wrote to memory of 1556 2012 chrome.exe 31 PID 2012 wrote to memory of 1556 2012 chrome.exe 31 PID 2012 wrote to memory of 1556 2012 chrome.exe 31 PID 2012 wrote to memory of 1556 2012 chrome.exe 31 PID 2012 wrote to memory of 1556 2012 chrome.exe 31 PID 2012 wrote to memory of 1556 2012 chrome.exe 31 PID 2012 wrote to memory of 1556 2012 chrome.exe 31 PID 2012 wrote to memory of 1556 2012 chrome.exe 31 PID 2012 wrote to memory of 1556 2012 chrome.exe 31 PID 2012 wrote to memory of 1556 2012 chrome.exe 31 PID 2012 wrote to memory of 1556 2012 chrome.exe 31 PID 2012 wrote to memory of 1556 2012 chrome.exe 31 PID 2012 wrote to memory of 1556 2012 chrome.exe 31 PID 2012 wrote to memory of 1556 2012 chrome.exe 31 PID 2012 wrote to memory of 1556 2012 chrome.exe 31 PID 2012 wrote to memory of 1556 2012 chrome.exe 31 PID 2012 wrote to memory of 1556 2012 chrome.exe 31 PID 2012 wrote to memory of 1556 2012 chrome.exe 31
Processes
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen "C:\Users\Admin\AppData\Local\Temp\canvas (1).png"1⤵PID:2016
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7029758,0x7fef7029768,0x7fef70297782⤵PID:1324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1160 --field-trial-handle=1308,i,15728070011602404471,15477410993851431725,131072 /prefetch:22⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1308,i,15728070011602404471,15477410993851431725,131072 /prefetch:82⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1308,i,15728070011602404471,15477410993851431725,131072 /prefetch:82⤵PID:1336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2380 --field-trial-handle=1308,i,15728070011602404471,15477410993851431725,131072 /prefetch:12⤵PID:1052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2244 --field-trial-handle=1308,i,15728070011602404471,15477410993851431725,131072 /prefetch:12⤵PID:1764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1452 --field-trial-handle=1308,i,15728070011602404471,15477410993851431725,131072 /prefetch:22⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1476 --field-trial-handle=1308,i,15728070011602404471,15477410993851431725,131072 /prefetch:12⤵PID:2040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3560 --field-trial-handle=1308,i,15728070011602404471,15477410993851431725,131072 /prefetch:82⤵PID:1788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3584 --field-trial-handle=1308,i,15728070011602404471,15477410993851431725,131072 /prefetch:82⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4100 --field-trial-handle=1308,i,15728070011602404471,15477410993851431725,131072 /prefetch:12⤵PID:2288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2408 --field-trial-handle=1308,i,15728070011602404471,15477410993851431725,131072 /prefetch:12⤵PID:2484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4308 --field-trial-handle=1308,i,15728070011602404471,15477410993851431725,131072 /prefetch:12⤵PID:2504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=1488 --field-trial-handle=1308,i,15728070011602404471,15477410993851431725,131072 /prefetch:12⤵PID:2836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4208 --field-trial-handle=1308,i,15728070011602404471,15477410993851431725,131072 /prefetch:12⤵PID:2852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=1488 --field-trial-handle=1308,i,15728070011602404471,15477410993851431725,131072 /prefetch:12⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2292 --field-trial-handle=1308,i,15728070011602404471,15477410993851431725,131072 /prefetch:12⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3672 --field-trial-handle=1308,i,15728070011602404471,15477410993851431725,131072 /prefetch:82⤵PID:752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 --field-trial-handle=1308,i,15728070011602404471,15477410993851431725,131072 /prefetch:82⤵PID:2224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=3776 --field-trial-handle=1308,i,15728070011602404471,15477410993851431725,131072 /prefetch:12⤵PID:2228
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1108
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5201⤵PID:2496
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5057eef4d7a062ad211b74b3f2da63b0c
SHA1ad7aa6197d358ebf85150c5d51dd4645564a83d5
SHA25658bb5492885c819eaed5eeeded59fb057dd66abec519a3e2db4c34885d16d117
SHA512bbbdbf3fb8cb5a50f53a6a459d71d81e530bc4da22b222ef42a3e6ac5eae9e56216ba9501bd82e8a2b7774f6a79b27b13047ca2bec0e31b420ce9bcc61e12cfc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53eea3432f59b552e5e559a5d6ca425f1
SHA15f80c79b0c0282300a66714ffca4efd783f59a05
SHA25666bf7a52587bcacf2c5834c1da9a1f0d76bbe870f80c3dd386cf265ef756a3a6
SHA512af7962d3767ba7b22e3392ed2d2e91377552e29a62bfd3bbf0ecf46ae54c9cc5656e3ad9ba3e580ba0ec2e4e85810fbacabf80eaed58f834417688bfbd8685bd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dcc52a88c7b8e47f64b1e2d3c2a90bd3
SHA14ba7bb7d462bceadecf6bf92b0e57ed0e6c9dead
SHA256bf8d87be14ba13814ab025f669cb193fd84f9cb8346203d40c74a556786627ea
SHA51252679f9e0192ef5e6718d0a8e89465f098762e97015e8662f01c15bf131b5571ab05afc90458101273006cb7b6d8fae28a32628df0157a20e46b36d66658f071
-
Filesize
696KB
MD5ca9ea95c6c40d86804238c5b6692311e
SHA1dd05a9762e8cbacd900f4509bc6bb215b40494c9
SHA25660048e8a8e8c4ee1b6fa6ae21f2ab0dc4ca4365e56ad545213a13b49c72942a8
SHA512f7441223a179c3db31b0a2e5de74bababf21cc312442c029dace7311974dbb9c1e5084273f289c299cc48293844d34aa440a474e8a26a2bd13e54befdabf55f4
-
Filesize
793KB
MD541ceeab3e687539fa5020ed1f58833f3
SHA129ba1af2cd08408123c9edc0e89b0f71d28648d5
SHA256878458275b5f171928f95f78d62befac0f8624ca237a1d59b63beff860b68f4c
SHA512c9b7c41265b22a7d2eaacad08eac82f0c1829b88227cb13f957c0531129706a2109bdd259c47f92682cbf7deefba65e7a00d64c74dd0c00dfa7c50f6760a531c
-
Filesize
596KB
MD5d2f6be3ee4c5a659eada1ba2dbd16604
SHA126d1ee54ca30c7a2f3bce58bcf8421650f2ada5b
SHA256316ab3824fc27977130bb2a7678ffd767f5465738f221aabc0a5bbe0af50e6f2
SHA5129f2153af86934be42ec4104f4bbcdd9ab015d714f34b48d6cb8710c018d58c23b1bb111932754a92e6df0158a2eeacc278b88280e5f3539ac03188c1e2eaa011
-
Filesize
984B
MD5e88a03bcaf4c27cc4e9452b628566bcc
SHA123c1abd0bfd1741fe6226f936820378ee1996840
SHA256053df2e344b8ca3090c723fc4f028021b418d615fa3991debe54fe9628f2520b
SHA512e8f2c9c2026134e996e8662f4c0e8f6a4b8b438c4223cdc5c8bc9e8d26d8149858877a1240628bccf40215824786b80d6be31d719458f63fadbd287900714eeb
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
4KB
MD5a63702292d10fbe99a6d28f3883eeadc
SHA1be7b6a2ff01393fb08bb323725971a406a332968
SHA256b6a2c3e63607a287e8be9f6d235ac23ddb1f12114cbd5d382ca74fd1e0976828
SHA51268567b589231d7148240381c6b4029988150791d2da14e287200c5bbd93ef5173e81ce6f9e9ae890ccd4a874853c9a4bcdba20c17379019ebba8bdcdd81755d1
-
Filesize
4KB
MD5f5956998123ebd4ad957e7943acfe7d7
SHA165155f6f4b22e4e313bb0d77799b30a260e26ead
SHA256b5fbbb5a5ffa206a74e72deac3ede753303013224688e1528c13b2767f4400d9
SHA51234a5af1568de19d321dfe955cca71ef79f22bb7eb0cdfe3c3d7146e038b64722ee5ae4da7e7012d08c9f7ae9566152fa1db2b6a44d127e7e06a19eb8634846bc
-
Filesize
4KB
MD50bc098253c5307be0fe13f28a82bb706
SHA1c659e11036a1fd4f13ef5a935fb18a3fe547b1da
SHA25609bc8e0618c4c46b36ce92f9009bda8f70d89ea83705d71040a249b475a78148
SHA51228ab87422f8e6e8acb1f9b375c518d395f69cba492ece44986ab76ee4103e8a4f4a598b5919aabb150d5dee8c0bab89eccdf2342de04f0a57978b12c78bbae5d
-
Filesize
3KB
MD5f6139c325dc2c8b356518c092962bc81
SHA1c89af655480320fb77932eee24defc392dd5feb3
SHA256db47609d830b2bf7c13c0b0bd5dc9d8b1702f16ed79544d69819f99f13f317b5
SHA512cc88e82da08ed2d5925660973b9970dee9ab51206d670ce4d8d6be5fbd115ef556be92372fc1296fd6467d00e294c03db72b31763be9b25f7b44ab2761339f3e
-
Filesize
3KB
MD569d71a503ba39c5c31cc1c0ce47ee808
SHA1111e84d53b8cdb180e0c82e325dab0964e842148
SHA2560c0e9609bf3a3b25312d4f5e2229f9e2f7315f80a692c96a154a839298bda707
SHA512f786152a05ac725f2a30a7881ac35091c7adfcc8190cc916b32135a484756aeffffe4da5dccfd3888128a858f07a4e6818c7429a24307d32714f2a3ce478a550
-
Filesize
1015B
MD5b6fbf7f92530f0763999c6b51787f0fd
SHA1008c7d706a3fef6a9b2c80591f57a1ca057a851b
SHA2561d812f9bdab37b80e580a1ad151293ceea7cc0735ef7eba612f2365741021b66
SHA5125139d3d10526cc93444dc26f7ae6674a0240a827130933e88eabf86236b42ba6a77e6d5d805ed03779bce04ebcad7214ae5e97d1a5c6ab2f3406e64c976f8722
-
Filesize
1015B
MD5579ac219700fd0bc59a8aa402f21a438
SHA110c1e1c67180e49d063ced5ec97abc28645559ed
SHA256512daf137b9a9e9925b4fd9cb4edc8041b3a6ded6159d1ba287a2abc5f7e7cd7
SHA512fc03749366b4e05ba1a3c65c72b9214d32c75b59d7906277aa248bb99a6f9517ba83166e6e04fe18890c382d9ec867f7530e63e433819446e711b1c7c5eb16fa
-
Filesize
1015B
MD5d16cd8d1d20228914be5922a26ec2d12
SHA1049303e37bb604e2ea695aa1781cccb27366004e
SHA256fe0c698901256d39c283f9b06c2010c1bd876680facdefa80877ce7d04ff7aea
SHA5123dab428f7fa22e1198e894cc38bdd3417f5d3111aee96f25fd8596ba6448fe85fb7dccc9954b8ab94e020f8ad41537ebff0e089c7508674463ad3976103c79c1
-
Filesize
1015B
MD543aa573e116bf64ef2d125e84e5edb0d
SHA16d940ca14dbda15635aee7d73cb0c32b4b2270e9
SHA25677516a801c95f2207a6d70af3517ea0ec7ae7b6ce3a6dd33c0d46e0cc92099dd
SHA512886c0ae576b6302381d1f37c8b8fbe888615293e72e7bb587ad0f81208d200437583e074c5cb3bd0aac53a2cca06b3fb58405986bda1356413f15a1e1c33dc00
-
Filesize
363B
MD59054ad6524eb7163b34a5c63f3e61fe2
SHA16e63c988c4d630b283c718ed82cb17afa4a7c7e5
SHA2569276897bc275464e1570fff0122b2952464ed1a806a4a6af25513d2b45d55fd2
SHA512f08a2524b9910d3c94c81af543d747012d7c8cf38aeea7776373bd9be8f4c726d6c91d56c78a7bd731878bbe0d2744dfd9bd98780dac1f0ff6d71ec66f1d3b6c
-
Filesize
5KB
MD5cbfa080cacea51dd8f2f0e7d581d2ad6
SHA1979fbee2f81fa630d70e9171eb022a691f75afe8
SHA256da3257ab338fbae17ec050dc27365aa2c001386f8922c9352448e589511e0240
SHA5125b3a9daf9adf4918240ae9c596b11b2db9da3e8aa6135913c5e3a163c16b14db9515ed2e3c8ea7f8b7db14bf5893415270d290b5cd1cd171446e66a4e8a84474
-
Filesize
4KB
MD5d5520b78a83708d32f69d34096fbf2f3
SHA16f76d92aa611bc9b30fa3dea0748201239e9cdf3
SHA2562c133b993526acc30044a9ebea55735a8bb4598f7fe99ada45de5dfb732fa8eb
SHA51219fb39d2baea0cb65ff0ee1ccd5fd36e490450ace321a22bf4ba9955cc0cfdb2e9b808413c3c4bde52d003f023109b9ad0bd7ca144246507c334332a8a4cb953
-
Filesize
5KB
MD559ded82f55ee2f740c316b63aca34694
SHA1a55e2990ed01b4522913772aefc8a80738dd6bf1
SHA25620a3098075188e2445c496b2c52389e7e1c1362dea61c80caffb76b8256bbdb2
SHA512b3918ab2658f071f55ba9fa29e89593d55fda26e3af97ff4dd010e3aa27ee8be24b02c42a94ccb2b2f84a12433deed071e3482f4051c268e9bdd67542eac2572
-
Filesize
4KB
MD5fa6a22bfa8d8742c088e2c6a2c02a587
SHA1f3df598c3463108227b0137702eca91f981bbe2c
SHA256618a25cd7439625da5b0dc3d1751b1bc6183dad31681d376d9d67607bd187182
SHA512b8c917abb71a9ded369c18cf54c21ba6cb31d0f31a2e34fe7085f7e5679895187cc97fcf6a94c32b46c07033b8c76ec479df56377c54bb19a0840df639daf9df
-
Filesize
4KB
MD577c8e43a95aefbdb192b5948ea0500d1
SHA1c23db406bec07dd472b13fcfcd0bbc2e0a083e3d
SHA2568fe66d6a99ea89ffc687e6c803ba614d569fca362c2e38a3b75cc4dfb43d5387
SHA5125bee92fd0be52c35273e93a85228467e758366f54421b950102f09f5197897d958d0b2396ce9d535785e6bca6555db95da9b46ad251fc06d975639214bbb498a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\CURRENT~RF6d1a07.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000004.dbtmp
Filesize16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff