Analysis
-
max time kernel
110s -
max time network
96s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/03/2024, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
elmapa_backup.psd
Resource
win11-20240221-en
General
-
Target
elmapa_backup.psd
-
Size
269KB
-
MD5
52e08e1f4f5ed9cb37efe8a01337fe2a
-
SHA1
ef5c89ecc804e46e3b56218720dd335119853889
-
SHA256
18e024be03d27f7e1f1fa9d2aa93b050c8eac40a78728e56cd697dd895ecc969
-
SHA512
488dc7383381f7621afa7cd477d95354207ac1175cb97c2dd6ab18fc20480f96ca9524ad32f121867ba95dec97c93983ba2732931da28d100e9b6347c0f3a1ee
-
SSDEEP
6144:ghfurSLsR4BF4FEF4FEF4Fn0I1ZXmN/wHmN/wHmN/wwhC+SXP:gh2GLsR4BBBo01hCL
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133560239118651423" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2930051783-2551506282-3430162621-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2930051783-2551506282-3430162621-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1856 chrome.exe 1856 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 18 IoCs
pid Process 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe Token: SeShutdownPrivilege 1856 chrome.exe Token: SeCreatePagefilePrivilege 1856 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe 1856 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5016 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1856 wrote to memory of 1396 1856 chrome.exe 82 PID 1856 wrote to memory of 1396 1856 chrome.exe 82 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4696 1856 chrome.exe 84 PID 1856 wrote to memory of 4016 1856 chrome.exe 85 PID 1856 wrote to memory of 4016 1856 chrome.exe 85 PID 1856 wrote to memory of 1524 1856 chrome.exe 86 PID 1856 wrote to memory of 1524 1856 chrome.exe 86 PID 1856 wrote to memory of 1524 1856 chrome.exe 86 PID 1856 wrote to memory of 1524 1856 chrome.exe 86 PID 1856 wrote to memory of 1524 1856 chrome.exe 86 PID 1856 wrote to memory of 1524 1856 chrome.exe 86 PID 1856 wrote to memory of 1524 1856 chrome.exe 86 PID 1856 wrote to memory of 1524 1856 chrome.exe 86 PID 1856 wrote to memory of 1524 1856 chrome.exe 86 PID 1856 wrote to memory of 1524 1856 chrome.exe 86 PID 1856 wrote to memory of 1524 1856 chrome.exe 86 PID 1856 wrote to memory of 1524 1856 chrome.exe 86 PID 1856 wrote to memory of 1524 1856 chrome.exe 86 PID 1856 wrote to memory of 1524 1856 chrome.exe 86 PID 1856 wrote to memory of 1524 1856 chrome.exe 86 PID 1856 wrote to memory of 1524 1856 chrome.exe 86 PID 1856 wrote to memory of 1524 1856 chrome.exe 86 PID 1856 wrote to memory of 1524 1856 chrome.exe 86 PID 1856 wrote to memory of 1524 1856 chrome.exe 86 PID 1856 wrote to memory of 1524 1856 chrome.exe 86 PID 1856 wrote to memory of 1524 1856 chrome.exe 86 PID 1856 wrote to memory of 1524 1856 chrome.exe 86
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\elmapa_backup.psd1⤵
- Modifies registry class
PID:4280
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5016
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffce26d9758,0x7ffce26d9768,0x7ffce26d97782⤵PID:1396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:22⤵PID:4696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2112 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:82⤵PID:4016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2180 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:82⤵PID:1524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3196 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:12⤵PID:4676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3212 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:12⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3664 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:12⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4956 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:82⤵PID:904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:82⤵PID:936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5124 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:82⤵PID:1784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3612 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:12⤵PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=5296 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:12⤵PID:1820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=5304 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:12⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=5708 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:12⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4588 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:12⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4676 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:12⤵PID:1888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=3664 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:12⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6320 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:82⤵PID:2104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=6704 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:12⤵PID:672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=5708 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:12⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5680 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:82⤵PID:1772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6324 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:82⤵PID:1512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4616 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:82⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6336 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:82⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6936 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:82⤵PID:1820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --mojo-platform-channel-handle=7128 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:12⤵PID:3984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --mojo-platform-channel-handle=6944 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:12⤵PID:1172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --mojo-platform-channel-handle=7008 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:12⤵PID:5060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --mojo-platform-channel-handle=7092 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:12⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --mojo-platform-channel-handle=6136 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:12⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --mojo-platform-channel-handle=5952 --field-trial-handle=1824,i,6752170374676913597,17870334294450727866,131072 /prefetch:12⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
189KB
MD5642fd86a2fafcff5f5575c214d75d95a
SHA17b4894f7e5b816b002083da02e4b9f9a2a0ef180
SHA256d6b495913af668fa76dc01186563b6a7d0bac6ce5995775c861796056f97cdaf
SHA5129a71499af6760a3de3963c49d787e6f0cbddb237a947c6e57b4231338446864e3b3b2c83cd306097096e30a67b8c192475cfd447cb45c5bdf547a816619672e8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\02546c15-32da-4cc3-8f6e-1cd9015cb08b.tmp
Filesize943B
MD5bd67927edcc7b37c3712a3ce9b38330c
SHA18e663c96f0b603aab50ffa42abd014ec67b1e4e5
SHA256b0f15e66102b889daf83d07d1061f1457f73cd577d49d61ff56e732b39facc2b
SHA512574840b4c1f22c2dd56db09f0d9fb258434b1b238a867bdceedbc8a12a7b35915bf69110fb155a1196adfa8e4c0ef97ba6fad2e73e07e5c78a705212ad88609a
-
Filesize
371B
MD507f13a159ed68082fe1d91a052170ba5
SHA113a73c5efd801e22ec3eeb18f5664c99bf0e7287
SHA256cd0f0f0fc5a6197b5ab600b6133629bbaab399452d2e5c4d17c96c00f38cf367
SHA512e4952729d463d98b3c7ca44456b9e6d6ac17eaccacd335247153ecb7c3599c2c659fc5cb1639ac8d04873db75ab1464389baba17ce9539ba0f72ede7556458fb
-
Filesize
6KB
MD55e55e5f440696f76a90988cb9b71f1d7
SHA139b7145538becdf2dcddb2cf8ae9459145d7ea59
SHA25609352fc840615a0d46ab8e857fe64c2564a35e8e813a116d7f9f44e4edb121d3
SHA5122def269afef54bbf7d114099a6e5a9ded235ff5b9734e833ff7f93762e21a538b55c1e82acfcae1b7ced72242c82461dc954f6cc3806ebc305ce63af8303a6df
-
Filesize
6KB
MD5afe62b4b8c09702f37bd3834cbea3a3a
SHA1534c92e0d7e8a55eb91f08f4b735c71fee92484a
SHA25609cc76003d2e6d526d1b54c34303f40db6475a03117675cfb0646060a11f9582
SHA512dbefa0ed16bbdc2df672d10c3fb42b39837d7d184a9bbbc5bce0a1c1f35c825c77b15c8131476b026f1674e3253358e3e11d8cc5a43d7408a8e30665048949fd
-
Filesize
15KB
MD504bf78ca11fab35c8f40494b5b29d0b7
SHA1519c86868a32d2ca55139dde7fb9767e3f52e0f7
SHA256d5f1673f66195a064ac044f765e5f5517d515160f70b91d64a71bbfa72ce9ec6
SHA512b46f42809744d5ef4fb9c418039e4454a87cac3c2278989cab95af0a04ae3830bd5d904140db4c076523a62ed5687ff39a9290df2d1ad6a2d5b8ce58ac1dcb84
-
Filesize
146KB
MD57598f18af244201ec8e886887e6b7588
SHA13768ac790bad9c77266e71b7d9c2cb5edc692d45
SHA25660d6db08ab7a26ef92f643ad375378afac4c135940300d3a8c4e3aaab473dbb3
SHA51210e6e1692256982223143124fa14668957a7f2b889bb4e8d488fcaeb958574c8594e1461db0f35f07d15a0f536cc40c5e849059f0775998afa32ed6edf94ebb8
-
Filesize
261KB
MD5d195c21e7ff2b67177ec2fa89f7689c5
SHA193fca89d09e805a019ba02efe5cf8151e07d38fd
SHA2562f7a584f57982d96bee41e939773852e2acda28e7990814a6302c883c28c6be8
SHA5127418e0ec40086417d4cf130951dd10069df20849e9808a10846aebd304341f9e06bb960c383fda2f3ab74b026e58355fcfdbc2951e351f251a21b5bc4d965e13
-
Filesize
261KB
MD5333e0e282ba3e740bb0561734884d1d7
SHA12e1a4cc590980275a5cce76db4ed51968bc3255b
SHA256202777a5e9d1320a615cd6e5939ff5c7c0dd18476d33cf2fe15e1de3cc0d2388
SHA512b9ef15fde0c0e91e83790bcf7e22df698e6a968eb3f1be00a1d4ed0ae1e34912c1fc64e2d88b7d9da04cf4214f495e47ec6fca7a79447f9f2a729835bc90a855
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 1\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Profile 1\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.62.0_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
88KB
MD52cc86b681f2cd1d9f095584fd3153a61
SHA12a0ac7262fb88908a453bc125c5c3fc72b8d490e
SHA256d412fbbeb84e2a6882b2f0267b058f2ceb97f501e440fe3f9f70fac5c2277b9c
SHA51214ba32c3cd5b1faf100d06f78981deebbbb673299a355b6eaec88e6cb5543725242c850235a541afa8abba4a609bb2ec26e4a0526c6b198016b08d8af868b986
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
2KB
MD5a61e130824723561d705b61be064afbf
SHA1c22faa4fbf041ca192b4a517f834d1661aa9d488
SHA2561def505cd797b45bb6c1eae60a3f4ff5b505bd63623653fc1b05fc7e1ba19663
SHA51265074fc23ff046454233cdedabedb355e5bf969520f1e2ebb0d889066b446da9ad51cb411d41524d4671a72c52967fba00f94c3fbb80e228a3589b6735602632