Overview
overview
6Static
static
3redist/dir...32.dll
windows7-x64
6redist/dir...32.dll
windows10-2004-x64
3setup/3dfx/_isdel.exe
windows7-x64
setup/3dfx/_isdel.exe
windows10-2004-x64
setup/3dfx/_setup.dll
windows7-x64
1setup/3dfx/_setup.dll
windows10-2004-x64
1setup/3dfx...rt.sys
windows7-x64
1setup/3dfx...rt.sys
windows10-2004-x64
1setup/3dfx...em.sys
windows7-x64
1setup/3dfx...em.sys
windows10-2004-x64
1setup/3dfx...ap.sys
windows7-x64
1setup/3dfx...ap.sys
windows10-2004-x64
1setup/3dfx...2x.dll
windows7-x64
3setup/3dfx...2x.dll
windows10-2004-x64
3setup/3dfx...2x.dll
windows7-x64
3setup/3dfx...2x.dll
windows10-2004-x64
3setup/3dfx...2x.dll
windows7-x64
3setup/3dfx...2x.dll
windows10-2004-x64
3setup/3dfx...ll.dll
windows7-x64
3setup/3dfx...ll.dll
windows10-2004-x64
3setup/3dfx...ll.dll
windows7-x64
3setup/3dfx...ll.dll
windows10-2004-x64
3setup/3dfx/setup.exe
windows7-x64
setup/3dfx/setup.exe
windows10-2004-x64
setup/3dfx/uninst.exe
windows7-x64
4setup/3dfx/uninst.exe
windows10-2004-x64
4setup/3dse...ta.exe
windows7-x64
1setup/3dse...ta.exe
windows10-2004-x64
3setup/3dse...up.exe
windows7-x64
3setup/3dse...up.exe
windows10-2004-x64
3setup/3dse...pm.exe
windows7-x64
3setup/3dse...pm.exe
windows10-2004-x64
3Analysis
-
max time kernel
140s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 19:07
Behavioral task
behavioral1
Sample
redist/directx5/dsetup32.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
redist/directx5/dsetup32.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral3
Sample
setup/3dfx/_isdel.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
setup/3dfx/_isdel.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
setup/3dfx/_setup.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
setup/3dfx/_setup.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral7
Sample
setup/3dfx/glide/drivers/voodoo/ntsys/genport.sys
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
setup/3dfx/glide/drivers/voodoo/ntsys/genport.sys
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
setup/3dfx/glide/drivers/voodoo/ntsys/mapmem.sys
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
setup/3dfx/glide/drivers/voodoo/ntsys/mapmem.sys
Resource
win10v2004-20250313-en
Behavioral task
behavioral11
Sample
setup/3dfx/glide/drivers/voodoo/ntsys/ntremap.sys
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
setup/3dfx/glide/drivers/voodoo/ntsys/ntremap.sys
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
setup/3dfx/glide/drivers/voodoo/win95/glide2x.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
setup/3dfx/glide/drivers/voodoo/win95/glide2x.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
setup/3dfx/glide/drivers/voodoo/winnt/glide2x.dll
Resource
win7-20241023-en
Behavioral task
behavioral16
Sample
setup/3dfx/glide/drivers/voodoo/winnt/glide2x.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
setup/3dfx/glide/drivers/vrush/win95/glide2x.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
setup/3dfx/glide/drivers/vrush/win95/glide2x.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
setup/3dfx/is95/shell.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
setup/3dfx/is95/shell.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
setup/3dfx/isnt/shell.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
setup/3dfx/isnt/shell.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
setup/3dfx/setup.exe
Resource
win7-20241023-en
Behavioral task
behavioral24
Sample
setup/3dfx/setup.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
setup/3dfx/uninst.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
setup/3dfx/uninst.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
setup/3dsetup/3ddata.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
setup/3dsetup/3ddata.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
setup/3dsetup/3dsetup.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
setup/3dsetup/3dsetup.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral31
Sample
setup/3dsetup/3dsetupm.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
setup/3dsetup/3dsetupm.exe
Resource
win10v2004-20250314-en
General
-
Target
redist/directx5/dsetup32.dll
-
Size
41KB
-
MD5
3d98c98e3a859bb26aca297b6fff3cde
-
SHA1
e3c0fc9afd704e22e12e5698ec076d634895b0fa
-
SHA256
cdfeaf5ff77f4f0fa7460614e4fa6e74ab201694570f92fd7c20d3b155093895
-
SHA512
adda54154a5c165d62bf76a1deced663abed061ffe58137a9dd47dca0fe49db9e6766806f88841c87806427c15dfdf24e3440474b8712415c0922a8baff19888
-
SSDEEP
768:CXIWGknr/2BPOCPEG4RMKHSzdwnuJvkQrz:CX5Gcr+5XKAwnuJMQr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876629387778712" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2024 chrome.exe 2024 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe Token: SeShutdownPrivilege 2024 chrome.exe Token: SeCreatePagefilePrivilege 2024 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe 2024 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3660 wrote to memory of 316 3660 rundll32.exe 94 PID 3660 wrote to memory of 316 3660 rundll32.exe 94 PID 3660 wrote to memory of 316 3660 rundll32.exe 94 PID 2024 wrote to memory of 3736 2024 chrome.exe 99 PID 2024 wrote to memory of 3736 2024 chrome.exe 99 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 5788 2024 chrome.exe 101 PID 2024 wrote to memory of 5788 2024 chrome.exe 101 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 2084 2024 chrome.exe 100 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102 PID 2024 wrote to memory of 5884 2024 chrome.exe 102
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\redist\directx5\dsetup32.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\redist\directx5\dsetup32.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffbe072dcf8,0x7ffbe072dd04,0x7ffbe072dd102⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2032,i,9387184828569366721,14202052820414334537,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2020 /prefetch:22⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1640,i,9387184828569366721,14202052820414334537,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2132 /prefetch:32⤵PID:5788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2436,i,9387184828569366721,14202052820414334537,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2600 /prefetch:82⤵PID:5884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3236,i,9387184828569366721,14202052820414334537,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2440,i,9387184828569366721,14202052820414334537,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4460,i,9387184828569366721,14202052820414334537,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4516 /prefetch:22⤵PID:5740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4792,i,9387184828569366721,14202052820414334537,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:5392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5372,i,9387184828569366721,14202052820414334537,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5344 /prefetch:82⤵PID:1960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5564,i,9387184828569366721,14202052820414334537,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5580 /prefetch:82⤵PID:5988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=5664,i,9387184828569366721,14202052820414334537,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:5436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5972,i,9387184828569366721,14202052820414334537,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5968 /prefetch:82⤵PID:5228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5428,i,9387184828569366721,14202052820414334537,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5832 /prefetch:82⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5412,i,9387184828569366721,14202052820414334537,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5468 /prefetch:82⤵PID:2980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6136,i,9387184828569366721,14202052820414334537,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:4856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5436,i,9387184828569366721,14202052820414334537,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:5692
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:2720
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1760
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD55bfbb17b060922bb62c2303657a542cc
SHA12ef1911fe67ad893c8cc89b72db92ebe0b3b0b34
SHA2560248281cd65b60b35b7039346fe5cbf00e37058ae536d9b2c892fcd38335d4dd
SHA512645b9a4d4a3b20bff697c7093f98c462cd5ef1b47f21fdcaf90bc656e5a118c4704e469a38df591676c0fb9470a288a6f8db84c47050cfb8ba6906c79570193d
-
Filesize
240B
MD5b81520584741e314b5cdd2f41141513b
SHA1058c1726cfafe396760396d92902641aba367e31
SHA2565b144f23fb21b65a729c9486146c0ec304d02f19f4fc5aade5233dc6cf16eb05
SHA512ac7d1dc084e6ba50ecbf00ab9239eb858a26d8682e93de421fadd172118ce324ade2470f3f2f8cfd78157efb2b803b327dbf0ef9d295fe095ae8ad82db27842d
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD51a58f495420aa4f190b43780b53bceb9
SHA1717af4ce833aed72471f3cbf97ffe87ca59b1881
SHA2568f5f477bcbf779e58543025a4d17cb97853fac2b922ac27968ebc6d355566c2e
SHA5124264a1fae6686b461f35e6e56daf62b2b37df8a049af4f12f61c9e248bd8fb901b2c463b8bdf7a63d99c8a048e7167c168be9997a27b77c6242e2b91031d6ca0
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
691B
MD51bdb375eef084825e6edad17230a843e
SHA129d9257b6d04c80f7ced4aca5433eda06abbbf3b
SHA256b900dc3b6aa660ead86f8c7360d2a0cadaeeb2caa6b81abfb921969edf86e31c
SHA5121656dd2ec32dc70bd16338bb3acf62ca9ed134101e39e71360629e1387c3d1d5c5fb85deec5f8627820b84c9f58c2e3a9fd0c624df0ce03cde3dcb25fdfbb28f
-
Filesize
10KB
MD52c648af0e4038d59c0d35b2ce9caeb73
SHA1707b3d6f1e5fd702130d1c042dbf8164d1c25dc1
SHA256b56fbaf10a3cfa59bacba595511b8785aef708dba1d1d0cc1a47ffaf7f920a38
SHA512be86faa9fda1839d5c92caf056c3a95691033fbc08348093eeb016b8e11e07f7b22f27c8c715d28dc2c70ba14c512b952f7eae046074f0c38228473cfa32817d
-
Filesize
11KB
MD5f0950ec72e916fd5b63ac8996dcb23a0
SHA12b6997983fe7431c5fb3163708d75de2e91b9efe
SHA2568e0469df5a7163e9d679a75e55270a9d8bb1eab431cb7858d56090c3b4e1e95a
SHA5124d42ae273addaa4f0b86df86d58a724f0dfe0bc0e9f90a1ac2b763a0f8dee0dc1d386e344f7026fe8945989bef3336a09e3f2e099226f089aefdf8a09429fde0
-
Filesize
18KB
MD5c576aaf9ad10aa151764567aa6a61a95
SHA16ea79479410c0742949dd4ec8c1c2708c9ae3f92
SHA256fc7fb7960606d6baf438a767c543bc9a1871b92dacbdc9ee243375b08770d15f
SHA5124744c85077e42b528ab28da50bf6f28c4f44c773f9ebce97d2c6475615f1144e41805d9ee644488075f2312298e98ff811e8a23ad2c9ee8f5a9d027d6cb63fcf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD566045701e29e782a6d152b689fc6f0f0
SHA1277140a3c492e0c094cf578899af3d8502beaa3e
SHA256e5295f997ac514da083772af575d986c9d6206f947d01b11ac2c514e9ce1f891
SHA5121668d63dee0a8810bbf5951e74ebe56088923d4411a777fd5f15d28c33c7658a4f59aec208b4092bed77eb3d0e148a998d634e146ed3586829b66b268bc0beb6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe589bfd.TMP
Filesize48B
MD5653767c5654dba834ed74df7ec22684a
SHA1251e28a91f457e46d5cc96ab75b3051cd65db3df
SHA25623855260dfe2b3dc75a72c970294887d421b11dadb9cbba43831bd5340291d7b
SHA512d2780a4c04c2dede695390836b72fde96e8074e7e6b3b570e74adf4ec794f241b741c2c9c2b9df254d208317d62e81ebdbbc216ca6bc243fdbe1745c6d4b1403
-
Filesize
79KB
MD5170939b5d8a69c1c5117feacd3c2d2fc
SHA1b8d27ed28be6ba517be81207a7de451ab07d6f1b
SHA256f5d50261fc7bcb2fdfa3b0a8314b08c39702f723b602167e8fffeaa1a0b123e3
SHA512c5e424b9b7a49df6a874cea57ef5f5c3d441641695186d64874ceef5fdadbebdc8f7a53c7fbba5006e52e6fa10c231911f035f9c5e4f0c80ab51642ea044cdff
-
Filesize
155KB
MD55590599333aeb523ec5e79633e623d17
SHA11278ae31ba6ce32311fff91417df73a781163c45
SHA256bdadf480404df845c6ef1d5f6fa730a8ba4e1f9117b6360e0ddbebb6fc298ada
SHA512a714d5483b952104cdfb827f62c03a5b9b5c8418fa2ab1414d30700862dccfaed0c4d1d8bd339eb19a18ee33edad32d44f4a788198aed2033845566a1c521c8e
-
Filesize
155KB
MD549813f77fbaba808c5f248b899aadaf3
SHA1ef62f0c9827c1710d55cb6c2433225e650e0ee94
SHA2569c28179ebb468cd74714cc90d6cfb4d9ff66107d2bb89a0b9d25373adb29fedc
SHA5123dcba3803a2b9eb19ed11e21bdb261576f46050673d5de44a793bb77002c6467fc17b74941d3041115b90f7078ddf2777152b199eca7d1279325d52b2f24887a
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2024_1142558685\4ff99c4b-b926-4eaa-b94f-644f7e1b1264.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de