Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

03/02/2023, 14:23

230203-rqfknsbc3v 1

03/02/2023, 13:59

230203-rae9zaff25 10

Analysis

  • max time kernel
    344s
  • max time network
    358s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03/02/2023, 13:59

General

  • Target

    https://www.mediafire.com/file/oa94zf87j2213b1/Valorant.rar/file

Malware Config

Extracted

Family

vidar

Version

2.3

Botnet

408

C2

https://t.me/mantarlars

https://steamcommunity.com/profiles/76561199474840123

Attributes
  • profile_id

    408

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.mediafire.com/file/oa94zf87j2213b1/Valorant.rar/file
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefad94f50,0x7fefad94f60,0x7fefad94f70
      2⤵
        PID:1880
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1048 /prefetch:2
        2⤵
          PID:2024
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1308 /prefetch:8
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1968
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1760 /prefetch:8
          2⤵
            PID:1060
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2008 /prefetch:1
            2⤵
              PID:1188
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2020 /prefetch:1
              2⤵
                PID:1320
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:8
                2⤵
                  PID:1192
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3148 /prefetch:1
                  2⤵
                    PID:696
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3376 /prefetch:2
                    2⤵
                      PID:1172
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2668 /prefetch:1
                      2⤵
                        PID:472
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3792 /prefetch:1
                        2⤵
                          PID:1892
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3908 /prefetch:1
                          2⤵
                            PID:2084
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2140 /prefetch:1
                            2⤵
                              PID:2148
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:1
                              2⤵
                                PID:2232
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:1
                                2⤵
                                  PID:2296
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4532 /prefetch:1
                                  2⤵
                                    PID:2356
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:1
                                    2⤵
                                      PID:2416
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:1
                                      2⤵
                                        PID:2424
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:1
                                        2⤵
                                          PID:2432
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:1
                                          2⤵
                                            PID:2444
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:1
                                            2⤵
                                              PID:2480
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:1
                                              2⤵
                                                PID:2740
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5244 /prefetch:8
                                                2⤵
                                                  PID:2856
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=108 /prefetch:8
                                                  2⤵
                                                    PID:2904
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2776 /prefetch:1
                                                    2⤵
                                                      PID:2944
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6356 /prefetch:1
                                                      2⤵
                                                        PID:2952
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6452 /prefetch:1
                                                        2⤵
                                                          PID:2988
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3704 /prefetch:1
                                                          2⤵
                                                            PID:3016
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7024 /prefetch:8
                                                            2⤵
                                                              PID:2716
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3996 /prefetch:1
                                                              2⤵
                                                                PID:2208
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:1
                                                                2⤵
                                                                  PID:2332
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6528 /prefetch:1
                                                                  2⤵
                                                                    PID:2724
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6532 /prefetch:1
                                                                    2⤵
                                                                      PID:2732
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5712 /prefetch:1
                                                                      2⤵
                                                                        PID:2916
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:1
                                                                        2⤵
                                                                          PID:2920
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:1
                                                                          2⤵
                                                                            PID:1376
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:1
                                                                            2⤵
                                                                              PID:1260
                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6728 /prefetch:1
                                                                              2⤵
                                                                                PID:1828
                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:1
                                                                                2⤵
                                                                                  PID:2976
                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:1
                                                                                  2⤵
                                                                                    PID:2984
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:1
                                                                                    2⤵
                                                                                      PID:2408
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7396 /prefetch:1
                                                                                      2⤵
                                                                                        PID:1528
                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:1
                                                                                        2⤵
                                                                                          PID:2760
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2240 /prefetch:1
                                                                                          2⤵
                                                                                            PID:2744
                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7544 /prefetch:8
                                                                                            2⤵
                                                                                              PID:2764
                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:1
                                                                                              2⤵
                                                                                                PID:3056
                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8676 /prefetch:8
                                                                                                2⤵
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                PID:1572
                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1020,10596184412539371701,13608093783149188533,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5672 /prefetch:8
                                                                                                2⤵
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                PID:1324
                                                                                            • C:\Program Files\7-Zip\7zG.exe
                                                                                              "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Valorant\" -spe -an -ai#7zMap27865:74:7zEvent16247
                                                                                              1⤵
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:2160
                                                                                            • C:\Users\Admin\Desktop\Valorant\Valorant.exe
                                                                                              "C:\Users\Admin\Desktop\Valorant\Valorant.exe"
                                                                                              1⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of SetThreadContext
                                                                                              PID:2836
                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                                                                                2⤵
                                                                                                • Loads dropped DLL
                                                                                                • Checks processor information in registry
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                PID:1496
                                                                                            • C:\Windows\system32\NOTEPAD.EXE
                                                                                              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Valorant\New Text Document.txt
                                                                                              1⤵
                                                                                                PID:2608
                                                                                              • C:\Windows\system32\AUDIODG.EXE
                                                                                                C:\Windows\system32\AUDIODG.EXE 0x474
                                                                                                1⤵
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:1672
                                                                                              • C:\Users\Admin\Desktop\Valorant\Valorant.exe
                                                                                                "C:\Users\Admin\Desktop\Valorant\Valorant.exe"
                                                                                                1⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of SetThreadContext
                                                                                                PID:2316
                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                                                                                  2⤵
                                                                                                  • Loads dropped DLL
                                                                                                  • Checks processor information in registry
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  PID:2656

                                                                                              Network

                                                                                              MITRE ATT&CK Enterprise v6

                                                                                              Replay Monitor

                                                                                              Loading Replay Monitor...

                                                                                              Downloads

                                                                                              • C:\ProgramData\msvcp140.dll

                                                                                                Filesize

                                                                                                439KB

                                                                                                MD5

                                                                                                5ff1fca37c466d6723ec67be93b51442

                                                                                                SHA1

                                                                                                34cc4e158092083b13d67d6d2bc9e57b798a303b

                                                                                                SHA256

                                                                                                5136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062

                                                                                                SHA512

                                                                                                4802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546

                                                                                              • C:\ProgramData\nss3.dll

                                                                                                Filesize

                                                                                                2.0MB

                                                                                                MD5

                                                                                                1cc453cdf74f31e4d913ff9c10acdde2

                                                                                                SHA1

                                                                                                6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                                SHA256

                                                                                                ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                                SHA512

                                                                                                dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                              • C:\ProgramData\softokn3.dll

                                                                                                Filesize

                                                                                                251KB

                                                                                                MD5

                                                                                                4e52d739c324db8225bd9ab2695f262f

                                                                                                SHA1

                                                                                                71c3da43dc5a0d2a1941e874a6d015a071783889

                                                                                                SHA256

                                                                                                74ebbac956e519e16923abdc5ab8912098a4f64e38ddcb2eae23969f306afe5a

                                                                                                SHA512

                                                                                                2d4168a69082a9192b9248f7331bd806c260478ff817567df54f997d7c3c7d640776131355401e4bdb9744e246c36d658cb24b18de67d8f23f10066e5fe445f6

                                                                                              • C:\ProgramData\vcruntime140.dll

                                                                                                Filesize

                                                                                                78KB

                                                                                                MD5

                                                                                                a37ee36b536409056a86f50e67777dd7

                                                                                                SHA1

                                                                                                1cafa159292aa736fc595fc04e16325b27cd6750

                                                                                                SHA256

                                                                                                8934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825

                                                                                                SHA512

                                                                                                3a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356

                                                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                                                                                                Filesize

                                                                                                61KB

                                                                                                MD5

                                                                                                fc4666cbca561e864e7fdf883a9e6661

                                                                                                SHA1

                                                                                                2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

                                                                                                SHA256

                                                                                                10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

                                                                                                SHA512

                                                                                                c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

                                                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

                                                                                                Filesize

                                                                                                471B

                                                                                                MD5

                                                                                                14ce1585885d0111913e10c5e4233619

                                                                                                SHA1

                                                                                                0900480e0ed0800299b75ae5c375f786100c2017

                                                                                                SHA256

                                                                                                b18f72471c58a32bbe1e67b247615e3bc6d583e70c7e47d88f7b84ecc318df4e

                                                                                                SHA512

                                                                                                03a55b180f0b40eebb6d25439ba1d9b647d424b5d73a367ddfdb94b72a40d2479d2e40b7bbb06d63f7c575e53e85b1449e779df21e1bd9325dd928927fab1e88

                                                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                Filesize

                                                                                                342B

                                                                                                MD5

                                                                                                eb8380f2affe73ce52770380fd8112eb

                                                                                                SHA1

                                                                                                b3329538f41be1ecfdd4be35566279ebda172ece

                                                                                                SHA256

                                                                                                7f4428823da39ca393b748a16d5bc31014ff6a42d966c381e9276edfb5d86092

                                                                                                SHA512

                                                                                                b712ce5d91c5e7b116e8e5f7c274dccbc461c7f19c23e09842fade963c606fd81a4698c41c791dbe60f0f4c987343d55d05bff40598baad826770060ad174332

                                                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                                                Filesize

                                                                                                342B

                                                                                                MD5

                                                                                                f25fc4209de98fe9655ac641011695c3

                                                                                                SHA1

                                                                                                ca9445bcc648ee93bf9fcdc2b50348fb5ac17802

                                                                                                SHA256

                                                                                                d6c06e2261053b559af0c086244f832982965ba97c2d6b170fe040a449a09a5c

                                                                                                SHA512

                                                                                                b02333e81e07b2f866dca05701a1ef0eff7c37fad90454fb7abd7cfa4edc569169c069213d5f81edb34c8d119e0f4aaa71f0d57e31261f779b75610980f565a9

                                                                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619

                                                                                                Filesize

                                                                                                430B

                                                                                                MD5

                                                                                                3478a02933e551bd3e63241d9904a976

                                                                                                SHA1

                                                                                                23485c38b01d4becf8e9e1f48bc66274b4cf73bd

                                                                                                SHA256

                                                                                                d1c89527b2b03ce08f5ca96c9898c2a8a60c7c1da61932ed3767d32b8c3d2b5b

                                                                                                SHA512

                                                                                                5856bea358d794e45129207289467e265919dd056ef9013b9ac37f1141c27388655ec0e4e427b0b98ea7ba1f4772755483f0b84bb41842f5122920dec615e2bf

                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cookies

                                                                                                Filesize

                                                                                                44KB

                                                                                                MD5

                                                                                                df1cf0aea369f1bf45615af0cd8cefdf

                                                                                                SHA1

                                                                                                d371b9d672019558ed2221683192c6818d5c34d9

                                                                                                SHA256

                                                                                                9aa51109785b8f43fac05ca966fc0b54e37181180c98f72e57db3aaa332dc7e7

                                                                                                SHA512

                                                                                                dd760ea12bf45e6a4800344c537abc3edfe3eb08d54aa51ce5f504f7927b914f2e0eab466100ecd499f175ffce81849a3b5810ee8a7e2905271e0e6618e9cfa9

                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\History

                                                                                                Filesize

                                                                                                124KB

                                                                                                MD5

                                                                                                16e7eaf435d0ae783c93eff3c1c928aa

                                                                                                SHA1

                                                                                                82088066277016c6f6132f2e89012205fb08036b

                                                                                                SHA256

                                                                                                26651fd8e02411a9582acf0e236a7d7a1768f7bd6d90e139ef1ce0617cb87d98

                                                                                                SHA512

                                                                                                a698131fee949b7514f019aa673b5e7365c492d7d276f897bfa8d1bf0a7d33879dc2eed0f9b51850ac815fc0a0dc120bf34a6acc6eeb26e583c1064683dd25d9

                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                Filesize

                                                                                                111KB

                                                                                                MD5

                                                                                                ca7f969f02793964c9217b777227c4ee

                                                                                                SHA1

                                                                                                27928266d0b2f2f737efdd0046f28923d9c975c3

                                                                                                SHA256

                                                                                                dbf1c8d84505f43985b6b5180a21582afddecc6dd014a3cb68610369c1e1b8b6

                                                                                                SHA512

                                                                                                40ee17ba82e42d30fecb310f774485e91e0a12b5cfba25a65d3caa71dcb1173cdbe9ed1686e8f9d575bf4c9cfc07edfe8f9fb6c6c9412552faae1a63b1db6c71

                                                                                              • C:\Users\Admin\Desktop\Valorant\New Text Document.txt

                                                                                                Filesize

                                                                                                68B

                                                                                                MD5

                                                                                                50c890d529b836e3a4797c21331c3804

                                                                                                SHA1

                                                                                                cbeb047d46237d0ec2b92d7493703ed1d875b4e7

                                                                                                SHA256

                                                                                                51b669fc4d2c23b21ffe6af13c423b7233a56cad5a57d403e1276ee2f399d292

                                                                                                SHA512

                                                                                                1749b51ddbbb7022f339c7c7304086c1c1977ed23bc1546d2a8a94fa9af9ee0e68d8c603817d6cfdc98b7969891cbcba601f392a7a2d83e38df980d6885615ba

                                                                                              • C:\Users\Admin\Desktop\Valorant\Valorant.exe

                                                                                                Filesize

                                                                                                761.7MB

                                                                                                MD5

                                                                                                7dbbd9cb789eef6634df521458707a8e

                                                                                                SHA1

                                                                                                8b145b3a1b8fa985c5951b05a4ea23282e462d6e

                                                                                                SHA256

                                                                                                2ddfeb81cc6f577c6a572d95a9c901f5267df76f102de15570d29766cfe0e469

                                                                                                SHA512

                                                                                                700e0455c0cd79aebd110348706f81c19b43c16c8813009a484e108d99c5f9b2cb94bce93a9c3e73848951eeb39619bd306c24f4ac03f960dee80749e7af1dc3

                                                                                              • C:\Users\Admin\Desktop\Valorant\Valorant.exe

                                                                                                Filesize

                                                                                                761.7MB

                                                                                                MD5

                                                                                                7dbbd9cb789eef6634df521458707a8e

                                                                                                SHA1

                                                                                                8b145b3a1b8fa985c5951b05a4ea23282e462d6e

                                                                                                SHA256

                                                                                                2ddfeb81cc6f577c6a572d95a9c901f5267df76f102de15570d29766cfe0e469

                                                                                                SHA512

                                                                                                700e0455c0cd79aebd110348706f81c19b43c16c8813009a484e108d99c5f9b2cb94bce93a9c3e73848951eeb39619bd306c24f4ac03f960dee80749e7af1dc3

                                                                                              • \ProgramData\mozglue.dll

                                                                                                Filesize

                                                                                                593KB

                                                                                                MD5

                                                                                                c8fd9be83bc728cc04beffafc2907fe9

                                                                                                SHA1

                                                                                                95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                SHA256

                                                                                                ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                SHA512

                                                                                                fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                              • \ProgramData\nss3.dll

                                                                                                Filesize

                                                                                                2.0MB

                                                                                                MD5

                                                                                                1cc453cdf74f31e4d913ff9c10acdde2

                                                                                                SHA1

                                                                                                6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                                SHA256

                                                                                                ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                                SHA512

                                                                                                dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                              • memory/1496-68-0x0000000076201000-0x0000000076203000-memory.dmp

                                                                                                Filesize

                                                                                                8KB

                                                                                              • memory/1496-72-0x0000000051040000-0x0000000051133000-memory.dmp

                                                                                                Filesize

                                                                                                972KB

                                                                                              • memory/1496-58-0x0000000000090000-0x0000000000101000-memory.dmp

                                                                                                Filesize

                                                                                                452KB

                                                                                              • memory/1496-60-0x0000000000090000-0x0000000000101000-memory.dmp

                                                                                                Filesize

                                                                                                452KB

                                                                                              • memory/1496-69-0x0000000000090000-0x0000000000101000-memory.dmp

                                                                                                Filesize

                                                                                                452KB

                                                                                              • memory/1496-67-0x0000000000090000-0x0000000000101000-memory.dmp

                                                                                                Filesize

                                                                                                452KB

                                                                                              • memory/2160-55-0x000007FEFB991000-0x000007FEFB993000-memory.dmp

                                                                                                Filesize

                                                                                                8KB

                                                                                              • memory/2316-98-0x0000000000400000-0x00000000009DC000-memory.dmp

                                                                                                Filesize

                                                                                                5.9MB

                                                                                              • memory/2656-114-0x00000000510A0000-0x0000000051193000-memory.dmp

                                                                                                Filesize

                                                                                                972KB

                                                                                              • memory/2656-110-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                Filesize

                                                                                                452KB

                                                                                              • memory/2656-108-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                Filesize

                                                                                                452KB

                                                                                              • memory/2656-101-0x0000000000400000-0x0000000000471000-memory.dmp

                                                                                                Filesize

                                                                                                452KB

                                                                                              • memory/2836-57-0x0000000000400000-0x00000000009DC000-memory.dmp

                                                                                                Filesize

                                                                                                5.9MB