Overview
overview
3Static
static
1Portfolio.rar
windows11-21h2-x64
3Portfolio/...in.css
windows11-21h2-x64
3Portfolio/...in.css
windows11-21h2-x64
3Portfolio/...in.css
windows11-21h2-x64
3Portfolio/...min.js
windows11-21h2-x64
1Portfolio/...le.css
windows11-21h2-x64
3Portfolio/...own.js
windows11-21h2-x64
1Portfolio/...28.png
windows11-21h2-x64
3Portfolio/...40.png
windows11-21h2-x64
3Portfolio/...60.png
windows11-21h2-x64
3Portfolio/...s.json
windows11-21h2-x64
3Portfolio/...00.png
windows11-21h2-x64
3Portfolio/...00.png
windows11-21h2-x64
3Portfolio/...00.png
windows11-21h2-x64
3Portfolio/...20.png
windows11-21h2-x64
3Portfolio/...al.css
windows11-21h2-x64
3Portfolio/...oll.js
windows11-21h2-x64
1Portfolio/...es.css
windows11-21h2-x64
3Portfolio/...on.eot
windows11-21h2-x64
3Portfolio/...on.xml
windows11-21h2-x64
1Portfolio/...on.ttf
windows11-21h2-x64
3Portfolio/...n.woff
windows11-21h2-x64
3Portfolio/....woff2
windows11-21h2-x64
3Portfolio/...le.css
windows11-21h2-x64
3Portfolio/...ipt.js
windows11-21h2-x64
1Portfolio/...e2.css
windows11-21h2-x64
3Portfolio/...e2.eot
windows11-21h2-x64
3Portfolio/...e2.xml
windows11-21h2-x64
1Portfolio/...e2.ttf
windows11-21h2-x64
3Portfolio/...2.woff
windows11-21h2-x64
3Portfolio/...dex.js
windows11-21h2-x64
1Portfolio/index.html
windows11-21h2-x64
1Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows11-21h2_x64 -
resource
win11-20231222-en -
resource tags
arch:x64arch:x86image:win11-20231222-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-02-2024 18:05
Static task
static1
Behavioral task
behavioral1
Sample
Portfolio.rar
Resource
win11-20231222-en
Behavioral task
behavioral2
Sample
Portfolio/assets/bootstrap/css/bootstrap-grid.min.css
Resource
win11-20231215-en
Behavioral task
behavioral3
Sample
Portfolio/assets/bootstrap/css/bootstrap-reboot.min.css
Resource
win11-20231215-en
Behavioral task
behavioral4
Sample
Portfolio/assets/bootstrap/css/bootstrap.min.css
Resource
win11-20231215-en
Behavioral task
behavioral5
Sample
Portfolio/assets/bootstrap/js/bootstrap.bundle.min.js
Resource
win11-20231215-en
Behavioral task
behavioral6
Sample
Portfolio/assets/dropdown/css/style.css
Resource
win11-20231215-en
Behavioral task
behavioral7
Sample
Portfolio/assets/dropdown/js/navbar-dropdown.js
Resource
win11-20231215-en
Behavioral task
behavioral8
Sample
Portfolio/assets/images/cuziamnoah-pb-fd-3-128x128.png
Resource
win11-20231215-en
Behavioral task
behavioral9
Sample
Portfolio/assets/images/cuziamnoah-pb-fd-3-140x140.png
Resource
win11-20231222-en
Behavioral task
behavioral10
Sample
Portfolio/assets/images/cuziamnoah-pb-fd-7-960x960.png
Resource
win11-20231215-en
Behavioral task
behavioral11
Sample
Portfolio/assets/images/hashes.json
Resource
win11-20231215-en
Behavioral task
behavioral12
Sample
Portfolio/assets/images/mcpfp-craftingbenny-300x300.png
Resource
win11-20231222-en
Behavioral task
behavioral13
Sample
Portfolio/assets/images/mcpfp-friendlymoritz-300x300.png
Resource
win11-20231215-en
Behavioral task
behavioral14
Sample
Portfolio/assets/images/mcpfp-m-fynn-s03-300x300.png
Resource
win11-20231215-en
Behavioral task
behavioral15
Sample
Portfolio/assets/images/styydevbg-1320x1320.png
Resource
win11-20231215-en
Behavioral task
behavioral16
Sample
Portfolio/assets/mobirise/css/mbr-additional.css
Resource
win11-20231215-en
Behavioral task
behavioral17
Sample
Portfolio/assets/smoothscroll/smooth-scroll.js
Resource
win11-20231215-en
Behavioral task
behavioral18
Sample
Portfolio/assets/socicon/css/styles.css
Resource
win11-20231215-en
Behavioral task
behavioral19
Sample
Portfolio/assets/socicon/fonts/socicon.eot
Resource
win11-20231222-en
Behavioral task
behavioral20
Sample
Portfolio/assets/socicon/fonts/socicon.xml
Resource
win11-20231222-en
Behavioral task
behavioral21
Sample
Portfolio/assets/socicon/fonts/socicon.ttf
Resource
win11-20231215-en
Behavioral task
behavioral22
Sample
Portfolio/assets/socicon/fonts/socicon.woff
Resource
win11-20231215-en
Behavioral task
behavioral23
Sample
Portfolio/assets/socicon/fonts/socicon.woff2
Resource
win11-20231215-en
Behavioral task
behavioral24
Sample
Portfolio/assets/theme/css/style.css
Resource
win11-20231215-en
Behavioral task
behavioral25
Sample
Portfolio/assets/theme/js/script.js
Resource
win11-20231215-en
Behavioral task
behavioral26
Sample
Portfolio/assets/web/assets/mobirise-icons2/mobirise2.css
Resource
win11-20231215-en
Behavioral task
behavioral27
Sample
Portfolio/assets/web/assets/mobirise-icons2/mobirise2.eot
Resource
win11-20231215-en
Behavioral task
behavioral28
Sample
Portfolio/assets/web/assets/mobirise-icons2/mobirise2.xml
Resource
win11-20231215-en
Behavioral task
behavioral29
Sample
Portfolio/assets/web/assets/mobirise-icons2/mobirise2.ttf
Resource
win11-20231215-en
Behavioral task
behavioral30
Sample
Portfolio/assets/web/assets/mobirise-icons2/mobirise2.woff
Resource
win11-20231215-en
Behavioral task
behavioral31
Sample
Portfolio/assets/ytplayer/index.js
Resource
win11-20231215-en
Behavioral task
behavioral32
Sample
Portfolio/index.html
Resource
win11-20231222-en
General
-
Target
Portfolio/index.html
-
Size
35KB
-
MD5
1114d7201f5f9b8e3399634edc2b1226
-
SHA1
eb4005044979bdb818ab889504f47f1c7448f633
-
SHA256
0e7fc29bdb9d43a05cd6c0e9b490295fbb1584a4168769d27be3da6c31f33b81
-
SHA512
08fb0848efd1caeb2f40b62785e6380abac67aa8e525f11bb3bcfddc9f686dee7750e512667e5c1b841d7de4741d157ce342f15bf573dcf907796bde1ee673cd
-
SSDEEP
384:6g9tUOOOncOOOgWGO5X7QlhPCog1BfbEZrpS7LiUiOi+9e:6g9tUOOOncOOOx+rgiUiOi+9e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133512843948965570" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 2924 chrome.exe 2924 chrome.exe 2604 chrome.exe 2604 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 2924 chrome.exe 2924 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe Token: SeShutdownPrivilege 2924 chrome.exe Token: SeCreatePagefilePrivilege 2924 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe 2924 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2924 wrote to memory of 4828 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4828 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4072 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4636 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 4636 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 3112 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 3112 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 3112 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 3112 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 3112 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 3112 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 3112 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 3112 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 3112 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 3112 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 3112 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 3112 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 3112 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 3112 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 3112 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 3112 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 3112 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 3112 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 3112 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 3112 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 3112 2924 chrome.exe chrome.exe PID 2924 wrote to memory of 3112 2924 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\Portfolio\index.html1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0x7c,0x10c,0x7ffc30ad9758,0x7ffc30ad9768,0x7ffc30ad97782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1476 --field-trial-handle=1796,i,17239753011727828831,18171435195357189169,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2148 --field-trial-handle=1796,i,17239753011727828831,18171435195357189169,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2960 --field-trial-handle=1796,i,17239753011727828831,18171435195357189169,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2948 --field-trial-handle=1796,i,17239753011727828831,18171435195357189169,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1796,i,17239753011727828831,18171435195357189169,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4680 --field-trial-handle=1796,i,17239753011727828831,18171435195357189169,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 --field-trial-handle=1796,i,17239753011727828831,18171435195357189169,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1568 --field-trial-handle=1796,i,17239753011727828831,18171435195357189169,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD5b6c7d38f42f080c4d05c7901368577bc
SHA1cc0a1df1f0732e2363eeee07028bea6fe7338eda
SHA256399b08d275694351c6376d18018ee98d709f181ed5b4f72163623e4cc0923be0
SHA51270b3b389ab821aca6cc5ad4e7ef12bde496398b357f20e88783eb5af14f9d99b04be32adba3b62dd6d55cdbe7367690d8a84f200050ad6095932feadfb5fb836
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
537B
MD5987a0e368528b22840017eaa4918333b
SHA10b4244e580dac591fe1f1185dfd8ce1713a6b344
SHA2562706ee567873f269537b39147f1aab9c855ea6683e4177c48b06ffe36f63da71
SHA512ca8ab9e90998a2d2485d2feed825c4ea92a50caa2a6069793dcbe6bf93c6b83a7924a8420da8f913f7cf73ee79f2952f901fe28baabb3e7d70519a15289ed8ac
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5219546bbab7639e3d7ae857e22482f75
SHA10f6856d19379c85397504c3fabf28d916fb02b33
SHA256930b4e610ba7d256f4e94f582a2ba0170b087b3c977f37085072f97e9e1f65d8
SHA512683bec443c21055b0bec9e4f79738f8650793f421e5ca3af9b63797d47958f589338beec2628f12b7293bf55aa78f539a0abb46ba5140aa2308ec16a8299f9ff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD594a52e82ccb8a744328a8b1c51860da3
SHA1b466d3b4726f8ea68d8a222866ce9b44f1753909
SHA256ea684102b95ba7855acee1f6b8d4a5c8831d69dee86c7867e3a737b468f98406
SHA512e73133c109314434de1856ecdeadaf95e37c1a24d12260906950f6e8b318f329a50f6714671db90b8fe809a1d1fc3a2c5134f0929dc385bc0bb39ea414ca077d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
114KB
MD5a0e5232c3b3b6bb834b5140d56a5b207
SHA14b1e1439da6b352e06b1c65382de2bfc7e72445f
SHA256cf1275edda8e774199d1624bdc6c07b9cb2e312fe233ed5dc0fb1c10b114fedc
SHA512ba69b62e95e0a0db981110c6d367c6794e6d3ab3a2d98cdf573dab592c4861b5fdf3cc02a2052ffd8934bb2d8375bd453074270abb9b8325a4819d2d147052da
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
\??\pipe\crashpad_2924_LMNSCPGJNVFDHUZJMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e