Overview
overview
7Static
static
3DDLC_russi....2.exe
windows7-x64
7DDLC_russi....2.exe
windows10-2004-x64
7$PLUGINSDI...al.ini
windows7-x64
1$PLUGINSDI...al.ini
windows10-2004-x64
1$PLUGINSDI...er.bmp
windows7-x64
3$PLUGINSDI...er.bmp
windows10-2004-x64
7$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7characters/monika.png
windows7-x64
3characters/monika.png
windows10-2004-x64
3characters...ki.jpg
windows7-x64
3characters...ki.jpg
windows10-2004-x64
3characters/sayori.png
windows7-x64
3characters/sayori.png
windows10-2004-x64
3characters/yuri.chr
windows7-x64
3characters/yuri.chr
windows10-2004-x64
3game/bgm/c...ru.ogg
windows7-x64
1game/bgm/c...ru.ogg
windows10-2004-x64
7game/bgm/e...ru.ogg
windows7-x64
1game/bgm/e...ru.ogg
windows10-2004-x64
7game/fonts.rpa
windows7-x64
3game/fonts.rpa
windows10-2004-x64
3game/gui/end_ru.png
windows7-x64
3game/gui/end_ru.png
windows10-2004-x64
3game/gui/i...ru.png
windows7-x64
3game/gui/i...ru.png
windows10-2004-x64
3game/gui/i...ru.png
windows7-x64
3game/gui/i...ru.png
windows10-2004-x64
3game/gui/logo_ru.png
windows7-x64
3game/gui/logo_ru.png
windows10-2004-x64
3game/gui/n...ru.png
windows7-x64
3game/gui/n...ru.png
windows10-2004-x64
3Analysis
-
max time kernel
84s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 11:49
Behavioral task
behavioral1
Sample
DDLC_russian_patch_3.2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DDLC_russian_patch_3.2.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/modern-header.bmp
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/modern-header.bmp
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
characters/monika.png
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
characters/monika.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
characters/natsuki.jpg
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
characters/natsuki.jpg
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
characters/sayori.png
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
characters/sayori.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
characters/yuri.chr
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
characters/yuri.chr
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
game/bgm/credits_ru.ogg
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
game/bgm/credits_ru.ogg
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
game/bgm/end-voice_ru.ogg
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
game/bgm/end-voice_ru.ogg
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
game/fonts.rpa
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
game/fonts.rpa
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
game/gui/end_ru.png
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
game/gui/end_ru.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
game/gui/icon_mac_ru.png
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
game/gui/icon_mac_ru.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
game/gui/icon_win_ru.png
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
game/gui/icon_win_ru.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
game/gui/logo_ru.png
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
game/gui/logo_ru.png
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
game/gui/namebox_big_ru.png
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
game/gui/namebox_big_ru.png
Resource
win10v2004-20241007-en
General
-
Target
characters/natsuki.jpg
-
Size
21KB
-
MD5
67cb78a5697a268ba5a045def8cd3654
-
SHA1
6e017db8521141bb126cb0797e4fcbad111b310f
-
SHA256
eeca05e8f7bcc7a04953cfb923490849200f53574b3ec0d14b44fd1a5be47672
-
SHA512
99c8ac355a5fa59d63e11e12d0515cd566ef74f2987e99ee6aebbace00b473541c122b9741a49b3b8e230964ef25fc23b569aa7b878fb17ecc3f08331897dad2
-
SSDEEP
384:7Ay32katHiSapDAhzrRwlP/agtrzGC1J4ehaIXLVPBwM7y9J9:kyYCSapDAhM/dNzGA3ha2iMup
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2740 chrome.exe 2740 chrome.exe -
Suspicious use of AdjustPrivilegeToken 26 IoCs
description pid Process Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe Token: SeShutdownPrivilege 2740 chrome.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 2368 rundll32.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe 2740 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2368 rundll32.exe 2368 rundll32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2680 2740 chrome.exe 32 PID 2740 wrote to memory of 2680 2740 chrome.exe 32 PID 2740 wrote to memory of 2680 2740 chrome.exe 32 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1352 2740 chrome.exe 34 PID 2740 wrote to memory of 1140 2740 chrome.exe 35 PID 2740 wrote to memory of 1140 2740 chrome.exe 35 PID 2740 wrote to memory of 1140 2740 chrome.exe 35 PID 2740 wrote to memory of 564 2740 chrome.exe 36 PID 2740 wrote to memory of 564 2740 chrome.exe 36 PID 2740 wrote to memory of 564 2740 chrome.exe 36 PID 2740 wrote to memory of 564 2740 chrome.exe 36 PID 2740 wrote to memory of 564 2740 chrome.exe 36 PID 2740 wrote to memory of 564 2740 chrome.exe 36 PID 2740 wrote to memory of 564 2740 chrome.exe 36 PID 2740 wrote to memory of 564 2740 chrome.exe 36 PID 2740 wrote to memory of 564 2740 chrome.exe 36 PID 2740 wrote to memory of 564 2740 chrome.exe 36 PID 2740 wrote to memory of 564 2740 chrome.exe 36 PID 2740 wrote to memory of 564 2740 chrome.exe 36 PID 2740 wrote to memory of 564 2740 chrome.exe 36 PID 2740 wrote to memory of 564 2740 chrome.exe 36 PID 2740 wrote to memory of 564 2740 chrome.exe 36 PID 2740 wrote to memory of 564 2740 chrome.exe 36 PID 2740 wrote to memory of 564 2740 chrome.exe 36 PID 2740 wrote to memory of 564 2740 chrome.exe 36 PID 2740 wrote to memory of 564 2740 chrome.exe 36
Processes
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe "C:\Program Files\Windows Photo Viewer\PhotoViewer.dll", ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\characters\natsuki.jpg1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2368
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6229758,0x7fef6229768,0x7fef62297782⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1344,i,15116065161445300000,2635236090454078439,131072 /prefetch:22⤵PID:1352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 --field-trial-handle=1344,i,15116065161445300000,2635236090454078439,131072 /prefetch:82⤵PID:1140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1532 --field-trial-handle=1344,i,15116065161445300000,2635236090454078439,131072 /prefetch:82⤵PID:564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2244 --field-trial-handle=1344,i,15116065161445300000,2635236090454078439,131072 /prefetch:12⤵PID:1148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2260 --field-trial-handle=1344,i,15116065161445300000,2635236090454078439,131072 /prefetch:12⤵PID:1940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1144 --field-trial-handle=1344,i,15116065161445300000,2635236090454078439,131072 /prefetch:22⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2976 --field-trial-handle=1344,i,15116065161445300000,2635236090454078439,131072 /prefetch:12⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3460 --field-trial-handle=1344,i,15116065161445300000,2635236090454078439,131072 /prefetch:82⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3512 --field-trial-handle=1344,i,15116065161445300000,2635236090454078439,131072 /prefetch:82⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3876 --field-trial-handle=1344,i,15116065161445300000,2635236090454078439,131072 /prefetch:82⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3884 --field-trial-handle=1344,i,15116065161445300000,2635236090454078439,131072 /prefetch:12⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2444 --field-trial-handle=1344,i,15116065161445300000,2635236090454078439,131072 /prefetch:12⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 --field-trial-handle=1344,i,15116065161445300000,2635236090454078439,131072 /prefetch:82⤵PID:1704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2820 --field-trial-handle=1344,i,15116065161445300000,2635236090454078439,131072 /prefetch:12⤵PID:1832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2748 --field-trial-handle=1344,i,15116065161445300000,2635236090454078439,131072 /prefetch:12⤵PID:1796
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD579d16feeee85d0aa3a48a8de2023bd66
SHA1e978b5647c142c42711d776a9f8a7e4dbbae95d4
SHA256862bdc304211c7597a255f22a413cf66f83dfa225dc6e4be7823fcf15742d536
SHA512e7d95539af996e638da2a33f1033d9cd22e1f8498bdf0491a88949bb8225b14de593b9ccb1d47ecdbe512264eda599fab02c7bc269d4265610a8c37795c70a5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c00f459bde64ec12819bb045f6e2212
SHA1964e0cd787e58998ef53f4409574f7b411c5e89d
SHA256825fecb54b683a78fb8c91094118ef96e9c0e6572ffe067d288cb1e099ce1aa5
SHA5125ca71da4af6b9f726d277caee72f2a06da8d8d45e64366c839fa1f7ce71df8917a3d931e368e01e4ccf4fa76813934ac34bb7a588df79376c9643dfd75df9207
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5daf2a06bb5d122f82501b26a44bc3176
SHA1799ee691822e84df1b529e907f483fca5701c0e2
SHA25673f2162f430522bea83955ca5c1d3fd4bcae8f713d4a7c0557013e14cdc51786
SHA512ef88afb8c8ed5ceb19f235984f0e8863b113b4b6c6eee7e4ad73868aafd83fde83e3d1ca280bb766a9d0c8c0adb29a1369a3ef69f8eb3afe07dec93ef18c060a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52bfd0da9f7dbb39b0f50acb51161fd63
SHA1da2318acbbd5eb881c299164edbf76c6cb8c7213
SHA256dea217f7c18ea6e2cd9ff473b1fc275c7505437a6c33e0e7b596033e8df23009
SHA51218073306d3898c17512973472410b9166722fffa264919e9d07791d4eaf49dc7150d879d142529000c24b24afa5d8b6d78aa35b6f62f1b716a1c3143f7cedbad
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb59c8bedb8fac37f269b02f8f6c540a
SHA17bf5380072c6587612f6b00ff88f1e04208479bd
SHA2565e7f1d6bb74824ead85e1692ee130995b4cf987ec2adaf60b958447791a2f73d
SHA512447096be0ac5e8877173b6859cc68d34a00b434a8b6130434504de3435a18e4c279387b780d61590ba42f4f2c418fb1b40d13125bff88ff5db592c2842e9e6fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5df705a9e1db3e7356b8a8a34371db7f6
SHA1eccf74e7e56c99f8ed5c0df476e53b8b8b2f36d0
SHA2560b090f81e11a3ddcd8dfce04e08767a05297cd59d3e2ab7fc22a1eda151084f4
SHA51296da893abdb68d8805a1cdf855ac1db57bfa623e3f07e2cfcc61c4aa5002d0f7fb02b819570a6e5a3afe64e22dda76f03a449a654daca03b4e09ced8b952a2e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dfc87b7694efa774c1e6352e71e32587
SHA108cb5031076af2ad886a03f7116c402a967e15f5
SHA2563c04cda1e3d72b50af6606caf1ded3a42b361499bb0a18aeb053d77976eded02
SHA5128c9ad8cbf924c26899fbb29532ba1e4efe8690fb224418b6e1ff38500255d02b9c12aa75e1f9f786af90e09a42d4c6f52c260ab822e0f01d90dd486f98bbc8e2
-
Filesize
348KB
MD551c2ce000fa1d561b608b21bee6372ab
SHA11d77d4db9a60b16f6010c48cd6bc8ce954dd7428
SHA256b580896203d3582c44c4c5617da63cda6a564c91ccee146a527b1a6ef940f001
SHA512d4f8b10e5092bb734dc04cd3c182cd5257db8db403bfb4fbb4457dd085437037be232ee0825eab9c9a4e8fe76e74a56e4bef0d56d91cd0dfc45d32e263388bbe
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
359B
MD59f509fbb42b9fa48aeecd64da85c1c7f
SHA1b20d64dc9f7627518dcf6fd77fdd2a7e9eddd046
SHA256141c8225acd13f2ab2f64367a8bdb12ad61bc81ba4ab772fcc6b2fc71cc2192d
SHA512a584b4192793f3d93e49d3cb90fea39a77f103931bc8d7cdec1010e8496cc3c9bd3bec49e7970f5f107362c6da630358346e514ac99ee246e5b7192aebe1a341
-
Filesize
359B
MD5e0336f675977b641e0b1c5abd2f6964c
SHA1efe0fc39479df2dd481151de7972d1c961f8fa20
SHA256d39dfbbab3d87202f0cd7a1d74f827878f1ba74f85d702bca8d252220580136e
SHA5126166c6aa985a127eabcfd065e107613aa9d4fbade4283dd96a457fb760d3a4d495aa770a970160e95c0fde7bb03e59ef5c41806ad362d7fdda5236113610396a
-
Filesize
4KB
MD591d8d012f7374a7a38e0f2439f9dc4f2
SHA126dc2f76ac8e221098d0c2b4b0f4fa13990793b7
SHA256512a48bb18a7e0d776f2a3f0bdc42df9d0ad7edaa3ce85f5174e362f778af29c
SHA512817b69577eda20474a126734d16803eae36eda9c3aa6ef4d52a4f08d1c1ca3a91eee5442a766fed4e274c972e8fa4dea60a816c30b360bfd38995dd3f9cdbf43
-
Filesize
5KB
MD5bed42d2b4e9d31b8bd2a2061046e523c
SHA174ff0d88c4c1d94e7ef5863ab69e893c3ea06a3d
SHA25602c044d7dbf5f948f61d8facebab38358e06173773f55f651f13b29285c01d19
SHA51291197c2d4ed8deff8b2a20989941a0fa249e9801cc1e424d8c9f2eb85d09edb50529f9a605c1203364b69702d9e8f6b992ead6984cd2ad594c7077f77268b457
-
Filesize
5KB
MD532cd62714d6257877d7b74a2eb40b25c
SHA132b746287c0846624a86a1cfc8f443b55a93a94c
SHA256554fbd78073612bebea1f7f6488738a8833e95eea767983142b472ebaac8c018
SHA512166302244282713d688e95bf38326472fdda7ec472c8f171e2af82b44bee24e612221b9445bd9ee23578a3b13b34ce7eb3bcca3fe1e9cc63e115cf63055ded11
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
348KB
MD5bc689be729a88a58198ef9b5f04df5d0
SHA19799b4057b1166057bfb116e51a8099d3f7f6ee8
SHA25630db69f7baadae76001567972dec11859ba9db5f544362ca3aa9fe050cfcceb6
SHA51221f0e809f579bd85858b4c81b21d3226ea1390dbf5bae6c263307af1d52100283a0d91536e5241929a076166dcfb56d98ceec25b3356dc9ba73527faecbab4ba
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b