Overview
overview
10Static
static
3D3dx9.dll
windows7-x64
D3dx9.dll
windows10-2004-x64
1Launcher.exe
windows7-x64
7Launcher.exe
windows10-2004-x64
10conf/remar...nt.dll
windows7-x64
1conf/remar...nt.dll
windows10-2004-x64
1conf/remar...L3.dll
windows7-x64
1conf/remar...L3.dll
windows10-2004-x64
1conf/remar...-5.dll
windows7-x64
1conf/remar...-5.dll
windows10-2004-x64
1conf/remar...ze.dll
windows7-x64
1conf/remar...ze.dll
windows10-2004-x64
3conf/remar...m2.dll
windows7-x64
1conf/remar...m2.dll
windows10-2004-x64
1conf/remar...em.dll
windows7-x64
1conf/remar...em.dll
windows10-2004-x64
1conf/remar...em.dll
windows7-x64
1conf/remar...em.dll
windows10-2004-x64
1conf/remar...em.dll
windows7-x64
1conf/remar...em.dll
windows10-2004-x64
1conf/remar...ib.dll
windows7-x64
1conf/remar...ib.dll
windows10-2004-x64
1conf/remar...go.dll
windows7-x64
1conf/remar...go.dll
windows10-2004-x64
1conf/remar...n4.dll
windows7-x64
1conf/remar...n4.dll
windows10-2004-x64
1conf/remar...or.dll
windows7-x64
1conf/remar...or.dll
windows10-2004-x64
1conf/remar...em.dll
windows7-x64
1conf/remar...em.dll
windows10-2004-x64
1conf/remar...ty.dll
windows7-x64
1conf/remar...ty.dll
windows10-2004-x64
1Analysis
-
max time kernel
42s -
max time network
67s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 18:46
Static task
static1
Behavioral task
behavioral1
Sample
D3dx9.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
D3dx9.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Launcher.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Launcher.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
conf/remarksGhessWedelns/quinateTelangTawa/Qt5Concurrent.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
conf/remarksGhessWedelns/quinateTelangTawa/Qt5Concurrent.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
conf/remarksGhessWedelns/quinateTelangTawa/SDL3.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
conf/remarksGhessWedelns/quinateTelangTawa/SDL3.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
conf/remarksGhessWedelns/quinateTelangTawa/libswscale-5.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
conf/remarksGhessWedelns/quinateTelangTawa/libswscale-5.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
conf/remarksGhessWedelns/quinateTelangTawa/localize.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
conf/remarksGhessWedelns/quinateTelangTawa/localize.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
conf/remarksGhessWedelns/quinateTelangTawa/materialsystem2.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
conf/remarksGhessWedelns/quinateTelangTawa/materialsystem2.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
conf/remarksGhessWedelns/quinateTelangTawa/meshsystem.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
conf/remarksGhessWedelns/quinateTelangTawa/meshsystem.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
conf/remarksGhessWedelns/quinateTelangTawa/navsystem.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
conf/remarksGhessWedelns/quinateTelangTawa/navsystem.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
conf/remarksGhessWedelns/quinateTelangTawa/networksystem.dll
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
conf/remarksGhessWedelns/quinateTelangTawa/networksystem.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
conf/remarksGhessWedelns/quinateTelangTawa/p4lib.dll
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
conf/remarksGhessWedelns/quinateTelangTawa/p4lib.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
conf/remarksGhessWedelns/quinateTelangTawa/panorama_text_pango.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
conf/remarksGhessWedelns/quinateTelangTawa/panorama_text_pango.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
conf/remarksGhessWedelns/quinateTelangTawa/phonon4.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
conf/remarksGhessWedelns/quinateTelangTawa/phonon4.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
conf/remarksGhessWedelns/quinateTelangTawa/propertyeditor.dll
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
conf/remarksGhessWedelns/quinateTelangTawa/propertyeditor.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
conf/remarksGhessWedelns/quinateTelangTawa/pulse_system.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
conf/remarksGhessWedelns/quinateTelangTawa/pulse_system.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
conf/remarksGhessWedelns/quinateTelangTawa/rendersystemempty.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
conf/remarksGhessWedelns/quinateTelangTawa/rendersystemempty.dll
Resource
win10v2004-20240709-en
Errors
General
-
Target
D3dx9.dll
-
Size
4.7MB
-
MD5
397cb6132f9632189d6f2b3bc9bb2b04
-
SHA1
f7113885294e61f21e6021f6f3a50bb0eb60b0a6
-
SHA256
a34174c9e4bbeb8b8592221e4e0fbf273e008c475875b5a4af45f5266ed58373
-
SHA512
0e5bcf302a6dbb76cfb7e00476d41367851df9b42e2f9b0c821fd6db018fda30a2b405026d52a7677af65d35ddc4405260c1bd9eb47c22154b23f77be56dd336
-
SSDEEP
6144:jQfN8PRtFlJntIkeUXpWeqQ0c4nr+O12Agvtt1tG5P0M3eFBXUuZLf0W/vouIs3w:1LheqpwQZOqvM1TKPr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
IEXPLORE.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A37972F1-4B7F-11EF-845E-D61F2295B977} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 308 chrome.exe 308 chrome.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe Token: SeShutdownPrivilege 308 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
Processes:
iexplore.exechrome.exepid process 876 iexplore.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe 308 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 876 iexplore.exe 876 iexplore.exe 3024 IEXPLORE.EXE 3024 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
iexplore.exechrome.exedescription pid process target process PID 876 wrote to memory of 3024 876 iexplore.exe IEXPLORE.EXE PID 876 wrote to memory of 3024 876 iexplore.exe IEXPLORE.EXE PID 876 wrote to memory of 3024 876 iexplore.exe IEXPLORE.EXE PID 876 wrote to memory of 3024 876 iexplore.exe IEXPLORE.EXE PID 308 wrote to memory of 768 308 chrome.exe chrome.exe PID 308 wrote to memory of 768 308 chrome.exe chrome.exe PID 308 wrote to memory of 768 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 596 308 chrome.exe chrome.exe PID 308 wrote to memory of 1512 308 chrome.exe chrome.exe PID 308 wrote to memory of 1512 308 chrome.exe chrome.exe PID 308 wrote to memory of 1512 308 chrome.exe chrome.exe PID 308 wrote to memory of 2288 308 chrome.exe chrome.exe PID 308 wrote to memory of 2288 308 chrome.exe chrome.exe PID 308 wrote to memory of 2288 308 chrome.exe chrome.exe PID 308 wrote to memory of 2288 308 chrome.exe chrome.exe PID 308 wrote to memory of 2288 308 chrome.exe chrome.exe PID 308 wrote to memory of 2288 308 chrome.exe chrome.exe PID 308 wrote to memory of 2288 308 chrome.exe chrome.exe PID 308 wrote to memory of 2288 308 chrome.exe chrome.exe PID 308 wrote to memory of 2288 308 chrome.exe chrome.exe PID 308 wrote to memory of 2288 308 chrome.exe chrome.exe PID 308 wrote to memory of 2288 308 chrome.exe chrome.exe PID 308 wrote to memory of 2288 308 chrome.exe chrome.exe PID 308 wrote to memory of 2288 308 chrome.exe chrome.exe PID 308 wrote to memory of 2288 308 chrome.exe chrome.exe PID 308 wrote to memory of 2288 308 chrome.exe chrome.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\D3dx9.dll,#11⤵PID:2832
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2684
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:876 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3024
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5d59758,0x7fef5d59768,0x7fef5d597782⤵PID:768
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1180 --field-trial-handle=1380,i,15648854427308816502,2703270017794534134,131072 /prefetch:22⤵PID:596
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1380,i,15648854427308816502,2703270017794534134,131072 /prefetch:82⤵PID:1512
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1624 --field-trial-handle=1380,i,15648854427308816502,2703270017794534134,131072 /prefetch:82⤵PID:2288
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2172 --field-trial-handle=1380,i,15648854427308816502,2703270017794534134,131072 /prefetch:12⤵PID:904
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2140 --field-trial-handle=1380,i,15648854427308816502,2703270017794534134,131072 /prefetch:12⤵PID:340
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3276 --field-trial-handle=1380,i,15648854427308816502,2703270017794534134,131072 /prefetch:22⤵PID:2460
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1468 --field-trial-handle=1380,i,15648854427308816502,2703270017794534134,131072 /prefetch:12⤵PID:1436
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3688 --field-trial-handle=1380,i,15648854427308816502,2703270017794534134,131072 /prefetch:82⤵PID:2936
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3676 --field-trial-handle=1380,i,15648854427308816502,2703270017794534134,131072 /prefetch:12⤵PID:1492
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:952
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2964
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD55ac828ee8e3812a5b225161caf6c61da
SHA186e65f22356c55c21147ce97903f5dbdf363649f
SHA256b70465f707e42b41529b4e6d592f136d9eb307c39d040d147ad3c42842b723e7
SHA51287472912277ae0201c2a41edc228720809b8a94599c54b06a9c509ff3b4a616fcdd10484b679fa0d436e472a8fc062f4b9cf7f4fa274dde6d10f77d378c06aa6
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
363B
MD52c02cc1f0bb9942c77ee658bff48c624
SHA1bda9ece7187fefaed52dd10cec598d5c57f5fe54
SHA2565ba5d68a0f96df9d897f670faf3f1e87078401760e57d68bb1818998858d8869
SHA5120a04cb9049c41fe0011881f5958277cdd12a3754ed7f30758489c375a69f11fbd80d6379241e96fb8d6d7ef7339edd639ae915e18cc3f8a93e62494a70f7525b
-
Filesize
5KB
MD5abf9165fcd69032b7691285d9a1c8c78
SHA11a7641a4b3618a9653753138c1c48aef63d31793
SHA25672e959b8f05a274441d72c4cdacd0ead9a98512e17834a369f0f8dbcca0cf71e
SHA5125d8eb86f91fe32c6313dc463549df60fe9e6387527dd41ce44f78605ce3b0f2e32934140d6a23f34f8e6eadcd12b5f98f9fbf234bc78c78aa95d8208ee62f0c8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
312KB
MD56a45fba511f99849c613d02178e13e3a
SHA14ae93670a410907a8a170ec320228565e3694601
SHA2560eb9f91e269e2daae7445bb5b5b8d8412e1e794e97962d544c4fdce88cdff5d6
SHA512fdfe31e0855fc5e4adbc982aaf7b8bb974b76c15cd3a9b64d5ecbe99c50bc56a487a7cb844c9d1d7d80aa4ba92ae89d64c54368ee624bf5db1160deca0c4cb33
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
312KB
MD5a9116d7c21dd4bf7a86ad6f04e149bdd
SHA183381a692904f1e62d93f6c091c75a46f858585e
SHA25696cad83dd8579ea9a4e3b2d5a9cdfb85b435f6ce001aeede9115ac0e2ddaafa2
SHA512f08495850f4bf343b9d205ae0c03353c8a101a57283ab61c1be70d5f776bc3bdae79f671ca14d1f4a06d7ff9c2be58c4adc44a452178e3548f7e185879024f7d
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e