Overview
overview
10Static
static
3D3dx9.dll
windows7-x64
D3dx9.dll
windows10-2004-x64
1Launcher.exe
windows7-x64
7Launcher.exe
windows10-2004-x64
10conf/remar...nt.dll
windows7-x64
1conf/remar...nt.dll
windows10-2004-x64
1conf/remar...L3.dll
windows7-x64
1conf/remar...L3.dll
windows10-2004-x64
1conf/remar...-5.dll
windows7-x64
1conf/remar...-5.dll
windows10-2004-x64
1conf/remar...ze.dll
windows7-x64
1conf/remar...ze.dll
windows10-2004-x64
3conf/remar...m2.dll
windows7-x64
1conf/remar...m2.dll
windows10-2004-x64
1conf/remar...em.dll
windows7-x64
1conf/remar...em.dll
windows10-2004-x64
1conf/remar...em.dll
windows7-x64
1conf/remar...em.dll
windows10-2004-x64
1conf/remar...em.dll
windows7-x64
1conf/remar...em.dll
windows10-2004-x64
1conf/remar...ib.dll
windows7-x64
1conf/remar...ib.dll
windows10-2004-x64
1conf/remar...go.dll
windows7-x64
1conf/remar...go.dll
windows10-2004-x64
1conf/remar...n4.dll
windows7-x64
1conf/remar...n4.dll
windows10-2004-x64
1conf/remar...or.dll
windows7-x64
1conf/remar...or.dll
windows10-2004-x64
1conf/remar...em.dll
windows7-x64
1conf/remar...em.dll
windows10-2004-x64
1conf/remar...ty.dll
windows7-x64
1conf/remar...ty.dll
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 18:46
Static task
static1
Behavioral task
behavioral1
Sample
D3dx9.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
D3dx9.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Launcher.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Launcher.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
conf/remarksGhessWedelns/quinateTelangTawa/Qt5Concurrent.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
conf/remarksGhessWedelns/quinateTelangTawa/Qt5Concurrent.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
conf/remarksGhessWedelns/quinateTelangTawa/SDL3.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
conf/remarksGhessWedelns/quinateTelangTawa/SDL3.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
conf/remarksGhessWedelns/quinateTelangTawa/libswscale-5.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
conf/remarksGhessWedelns/quinateTelangTawa/libswscale-5.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
conf/remarksGhessWedelns/quinateTelangTawa/localize.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
conf/remarksGhessWedelns/quinateTelangTawa/localize.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
conf/remarksGhessWedelns/quinateTelangTawa/materialsystem2.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
conf/remarksGhessWedelns/quinateTelangTawa/materialsystem2.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
conf/remarksGhessWedelns/quinateTelangTawa/meshsystem.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
conf/remarksGhessWedelns/quinateTelangTawa/meshsystem.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
conf/remarksGhessWedelns/quinateTelangTawa/navsystem.dll
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
conf/remarksGhessWedelns/quinateTelangTawa/navsystem.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
conf/remarksGhessWedelns/quinateTelangTawa/networksystem.dll
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
conf/remarksGhessWedelns/quinateTelangTawa/networksystem.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
conf/remarksGhessWedelns/quinateTelangTawa/p4lib.dll
Resource
win7-20240705-en
Behavioral task
behavioral22
Sample
conf/remarksGhessWedelns/quinateTelangTawa/p4lib.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
conf/remarksGhessWedelns/quinateTelangTawa/panorama_text_pango.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
conf/remarksGhessWedelns/quinateTelangTawa/panorama_text_pango.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
conf/remarksGhessWedelns/quinateTelangTawa/phonon4.dll
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
conf/remarksGhessWedelns/quinateTelangTawa/phonon4.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
conf/remarksGhessWedelns/quinateTelangTawa/propertyeditor.dll
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
conf/remarksGhessWedelns/quinateTelangTawa/propertyeditor.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
conf/remarksGhessWedelns/quinateTelangTawa/pulse_system.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
conf/remarksGhessWedelns/quinateTelangTawa/pulse_system.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
conf/remarksGhessWedelns/quinateTelangTawa/rendersystemempty.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
conf/remarksGhessWedelns/quinateTelangTawa/rendersystemempty.dll
Resource
win10v2004-20240709-en
General
-
Target
conf/remarksGhessWedelns/quinateTelangTawa/localize.dll
-
Size
251KB
-
MD5
a4260f8fa1a7cad0f5125a9ac2682386
-
SHA1
51aaa7f7384c0c8520a06b043e50a16ca78fa54e
-
SHA256
6768b6d80749de6e239831c59d53b9d73fc85d5354a885a21cf30a052966f99c
-
SHA512
9e863641994c8ef40adafb37cbb05339df8b27cfa18a9b0cac6e2d4edda8070913a14e3b1467961ecbd84030cbe0e013d24acc0f2aca8acd3ad4ceabc5f2c60d
-
SSDEEP
6144:q14xt+lwaHnXaWXeezAE+o1YJ+6AuLre7UzXQJksPOqySstn5:q14j+lwaHn55+o+FAmreALyksan5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133664933573654694" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 760 chrome.exe 760 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe Token: SeShutdownPrivilege 760 chrome.exe Token: SeCreatePagefilePrivilege 760 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe 760 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 760 wrote to memory of 2084 760 chrome.exe chrome.exe PID 760 wrote to memory of 2084 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1440 760 chrome.exe chrome.exe PID 760 wrote to memory of 1260 760 chrome.exe chrome.exe PID 760 wrote to memory of 1260 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe PID 760 wrote to memory of 3536 760 chrome.exe chrome.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\conf\remarksGhessWedelns\quinateTelangTawa\localize.dll,#11⤵PID:2708
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffb83eccc40,0x7ffb83eccc4c,0x7ffb83eccc582⤵PID:2084
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1832,i,10081535587956881539,13347411399776344534,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=1828 /prefetch:22⤵PID:1440
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2172,i,10081535587956881539,13347411399776344534,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2188 /prefetch:32⤵PID:1260
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2288,i,10081535587956881539,13347411399776344534,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=2476 /prefetch:82⤵PID:3536
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,10081535587956881539,13347411399776344534,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:4584
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3316,i,10081535587956881539,13347411399776344534,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2828
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4500,i,10081535587956881539,13347411399776344534,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4560 /prefetch:12⤵PID:3216
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4880,i,10081535587956881539,13347411399776344534,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=4800 /prefetch:82⤵PID:4544
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5004,i,10081535587956881539,13347411399776344534,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5012 /prefetch:82⤵PID:4676
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5048,i,10081535587956881539,13347411399776344534,262144 --variations-seed-version=20240708-180128.343000 --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:2028
-
C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"1⤵PID:4456
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD571b5fb5fa8d6bbf5c319ccc2ec46872e
SHA1edb4b9a52b3505f2093d1a5b368ae7208dff26ac
SHA25619dce800542e45ff83f00e381307b2f6099b944c16cbd1d59b49a7a66eb7a8a1
SHA512ac523d29c36cdba8a462a44bd5fb2b5a1a739f09508f98146aecb7e1cb1413fbe2194c2cd919043042f7348f096cb9145d0f6f6ffb89bf4c68821bb4726ee296
-
Filesize
210KB
MD55ac828ee8e3812a5b225161caf6c61da
SHA186e65f22356c55c21147ce97903f5dbdf363649f
SHA256b70465f707e42b41529b4e6d592f136d9eb307c39d040d147ad3c42842b723e7
SHA51287472912277ae0201c2a41edc228720809b8a94599c54b06a9c509ff3b4a616fcdd10484b679fa0d436e472a8fc062f4b9cf7f4fa274dde6d10f77d378c06aa6
-
Filesize
216B
MD58120bcbf6af4019ec03107330521bf56
SHA16fb86bf463feda3bb690354d52446bbfe8408bc2
SHA256a0216c5b690ee3c287b7f4cddef3f261f305cb19cea815fab37e4aa125f3cafc
SHA5121cdf64fa156558244e3e804dae436ca863495b9d5d27495b8c13f4f85265fce4759804d50517ccd8dc1d8c1f4610def671fbd60f60c5ceb866d7cc19c0b748eb
-
Filesize
216B
MD584a1b0fa6147635d0b4bc1e0c3c64fa3
SHA1b37e4f2748210a87c1316a5a34582adc447f28c8
SHA256e17d3885dfa3112edaec8d0d3e7f060c62618f61c516149a55578eee37c71619
SHA512c0c13abd6a0d2d63745f6be322ce65d091f604f39a878d82c6ce75959bf96d7365d2a17888a1b706415a852a51800c5e78898a04a268eb3d032eb3142c5330de
-
Filesize
216B
MD50c2d6a0918b49634331d595c329efdd1
SHA10c5858c9b147a5e711e032d6d5b052685b1a6b3e
SHA256807492cab679b748138056a7d554669963024377bd286e1bcc739139bef7a038
SHA5126e4aa4422be7304150f8f46f2850068da5eaaf95280043a97ee1ba8683ddfbf031a87f9a59e19975297ffe00a60f2fb6e839e948c0b72226e9217de6c55c5bca
-
Filesize
2KB
MD57871e1647d7899e7ca782a49dba3188e
SHA113f4e5cc926b5cdb2c4f316bc4efea041d4f4a37
SHA2560c462fe154730aeba758916ceca302536d37542fd334602b27ae2808a528109e
SHA512f604c3ede983fed4e113ee5b53031e9e68de7973da2bd0327928ef2dd77bff4d6c560e5f5013ba86d48480dd8f4601b2ee9171039d07c7c8cbe881d7c2ade746
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5d14f5c219266985468d2ab204143e4a2
SHA187cc90f127feb7d0cedb1a726f8b3e4ca2c6cf5b
SHA25674cff0fb8b04f0ae6a748461b5c53e3b53422266138f60bc05a90369d1a19952
SHA51216e5a07e4cbc6acb38617393aa5c447460a7318a5d6ca8aab96e36e4d408b76cb1449e0753376c7daf3e5d11138a7d6f73ddc253a5b957c2d45b480c377c88ed
-
Filesize
356B
MD5b9bbce57839ce02fcffc9490a80eca9c
SHA112b1cc93f9397e234f8ece470781df8c34463c54
SHA256f2ed33e1e0b2a517a963c28d5c3fc9ed229f0a83eeafcf5f7c70cd0ed4ed81d8
SHA512e278fc3dc295048091ad242eaacf5199cdacfc14d5c057484198c8aacdb2fdff12e379ef29d169cd9c003af1d90e2811bad715b8fb4394fee0f6c78a6615361e
-
Filesize
9KB
MD5283a56f6eb06c9179e7f8155ec7e9603
SHA1dad547fcec7b05255f164eee5d555e3a55955814
SHA25630a74a6162406eb8fecc8d8e08fe48b9d1e235bd7781078bd0373184de69fd4f
SHA512d6086a1793f3648ac7d4027882098d594e833e1a2d96a38b12a61b95f8ef421063ac7543737799dd2962204cae533c901ed6f81515fbd2ee528d3dc7cb581e9b
-
Filesize
9KB
MD5d8a5ff4119b2dededa17d19f4540cbb4
SHA15deb6b2b49796c83294632dc2df2d8654c14d4d1
SHA256aeaa1ae04b993f621e166a2ec6202e4a2452f795439b352f9563025c3ee1f456
SHA512ee836f28cf119ab8d1426b43a9b9e7d3f1a45c4bdce9e478481a6fe2909f7539d9063c685ccaecadc6424b4091fc9840e6122a33984af3792cda40993d685e1c
-
Filesize
9KB
MD5fd011b51c8a5d2981ce856842124c5f1
SHA1bec713d8291e4adf85f68653949a6e921a7c5a95
SHA25631f898b0410a1798cfbe813e58feff7ca060ef76f4be82883b8eefb7eef3a60c
SHA5125961aee8a47552fdd284fd563f31b8b53861739d7acdb0902c04b4f2c7dc25cc135c48ac8440944ede71a6f5626602564bcd3563d691a20d57b95d04dcee6fca
-
Filesize
9KB
MD5fa5ec88d6961b31cf6c2f3753c00191b
SHA1ece42fe53845ee6ff60c58ff1bfede2525d35efd
SHA2566980d3c2fb7e9e32766a90a9063ba21f667f6eae2bff8a93e7f213b4dab75aea
SHA51200a96ccbc7b42f67f932125dc5a31fd04d2d41d0232faeffedc6c4f437764487b341e77513698fac6b524742d1bac2fd8f8706c85c47c453a787d1772c81f6ac
-
Filesize
9KB
MD521fc5764611e3a5c17c63e09d60eb831
SHA1c0fe985f7a1de22476eb001b1cbabf6d7b9b688c
SHA256a0d7ebc5fde8b9578c295a6f2718933fcf9275e217824bfb783fa5c61db841e3
SHA512406b1eda24902501af0f2df14c0de85d21b96d4f89f4741ec4748494d7e80cedfa9b7711f38af0518790721ea115196628a66297d8a0e930512f699c7ab59b08
-
Filesize
9KB
MD5619678362b011005cbf71b713b6b5a06
SHA1f313e0496e04072ac376a0e111aff5a251d022aa
SHA2565a5020a2fa6010118c5535efcf618c9f31839c1ff3565d99ecb365e39a885cd6
SHA512906867c3dc8f9982b169f0bf07c58595db19b17348680a7be4ac5dba2fa650981fbf9e07caa2e471fd5c5177ecd1c060a6c037449c149a2eccf2f9e31258c02b
-
Filesize
9KB
MD5666c622522b7b3bfd8f3543a03f8ca86
SHA15aa583571133f47387850a1493aade9963fb483d
SHA2565b591dcfa72b85a4df8e68aa37e43431ac2e9ffd2111933e6ab82fc6adf3cf12
SHA512d4ade817614e101d6008247f79d73e55a6bf1e32093d91679d6ae4dd470a78f49fc51f86a96abf14832e5b0185da78f4628e50a1ff9d61b959449df047f390f6
-
Filesize
15KB
MD515253ea9a339867603198abdf450d409
SHA126642d561c296a22a5d980f8099e3eca09a1b48f
SHA2569e7ce83daefcdcb09276fef2ddecc4b10b33dbeb0ea3fcd1c5b7243f719e4b32
SHA5123afe010fe21d6575541a3602ed7c29c6d2ed62413369a2e2a094b0efd4954d67956602558e34a18a75f97257e55f471ed928f75059bb9cbf26f4624b4a023099
-
Filesize
188KB
MD55b32de22cf156d158a56d84ea137a55f
SHA1c5865084acdf27a0294aeda9072d20c243b4f7dc
SHA256d3c2a1e68e2b8f49bcc72b130d91028ed4a60e6b21cd107b56aedae98ea1b1cc
SHA5125bb352a737f667a461966b24f820ced74588b6cd13d624e7c9f68b009e56948454946318f61648f24acc3dc1a1c44e162e7416ce33e20fae754ac59e4f2564dc
-
Filesize
188KB
MD55ecdbb792fb69ae647a6031d942c6f1e
SHA1237df3cdd878a9db0b003ad1b70ab13a8643514b
SHA256bd3bb7ef28adebb4a41c14eee8ae5fbc4927e96e6fcd84f33a3baf449b2846aa
SHA5123cb6b019904b75aa9c1cf160a99ae6be792ea264597c38cead913430a947482fa80a2bf5da96bd529759aaa5519552d67096b5085cde60ac6eda852d446b9d2a
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e