Overview
overview
10Static
static
1merge-force-ww.zip
windows7-x64
3merge-force-ww.zip
windows10-2004-x64
1PA$$W0RD 1212
windows7-x64
1PA$$W0RD 1212
windows10-2004-x64
1merge-force-ww.rar
windows7-x64
10merge-force-ww.rar
windows10-2004-x64
17zxa.dll
windows7-x64
17zxa.dll
windows10-2004-x64
1AdTree.dll
windows7-x64
1AdTree.dll
windows10-2004-x64
1NAudio.dll
windows7-x64
1NAudio.dll
windows10-2004-x64
1merge-force-ww.exe
windows7-x64
10merge-force-ww.exe
windows10-2004-x64
10x64/trading_api64.dll
windows7-x64
1x64/trading_api64.dll
windows10-2004-x64
1x64/tradin...ts.dll
windows7-x64
1x64/tradin...ts.dll
windows10-2004-x64
1x86/api-ms...-1.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1x86/api-ms...-0.dll
windows10-2004-x64
1Analysis
-
max time kernel
136s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30/01/2025, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
merge-force-ww.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
merge-force-ww.zip
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
PA$$W0RD 1212
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
PA$$W0RD 1212
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
merge-force-ww.rar
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
merge-force-ww.rar
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
7zxa.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
7zxa.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
AdTree.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
AdTree.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral11
Sample
NAudio.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
NAudio.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
merge-force-ww.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
merge-force-ww.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral15
Sample
x64/trading_api64.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
x64/trading_api64.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral17
Sample
x64/tradingnetworkingsockets.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
x64/tradingnetworkingsockets.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral19
Sample
x86/api-ms-win-core-processthreads-l1-1-1.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
x86/api-ms-win-core-profile-l1-1-0.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral21
Sample
x86/api-ms-win-core-rtlsupport-l1-1-0.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral22
Sample
x86/api-ms-win-core-string-l1-1-0.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral23
Sample
x86/api-ms-win-core-synch-l1-1-0.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral24
Sample
x86/api-ms-win-core-synch-l1-2-0.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
x86/api-ms-win-core-sysinfo-l1-1-0.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral26
Sample
x86/api-ms-win-core-timezone-l1-1-0.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral27
Sample
x86/api-ms-win-core-util-l1-1-0.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral28
Sample
x86/api-ms-win-crt-conio-l1-1-0.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral29
Sample
x86/api-ms-win-crt-convert-l1-1-0.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral30
Sample
x86/api-ms-win-crt-environment-l1-1-0.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral31
Sample
x86/api-ms-win-crt-filesystem-l1-1-0.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral32
Sample
x86/api-ms-win-crt-heap-l1-1-0.dll
Resource
win10v2004-20250129-en
General
-
Target
merge-force-ww.rar
-
Size
7.3MB
-
MD5
27b3c32f2943d6dde38ca24ba9410f4e
-
SHA1
adf69759376a7207d9424e5b7a4bb59a9bcf1af0
-
SHA256
7b2e9d3a99871c7c8cd0ce29f13caa85b04d6728b4edfac014d8cc6689f9c6ec
-
SHA512
3f25e06e71e5feca1c26fa9de2df1d369250a0c35cbcf888b723522dd7a3efa728adbba799d7cbb39f97eb50e11a62f788dec47d17858ed56a1709f6ea85e514
-
SSDEEP
196608:vv5NUyjdwGgKiqcYK0mWIQZfbUufzHlLFJIsI:7UGwxKHH+ZQJpJOR
Malware Config
Extracted
lumma
https://wellnesscoaching.biz/api
https://toppyneedus.biz/api
Signatures
-
Lumma family
-
Executes dropped EXE 2 IoCs
pid Process 2648 merge-force-ww.exe 1904 merge-force-ww.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2648 set thread context of 2560 2648 merge-force-ww.exe 31 PID 2560 set thread context of 1676 2560 more.com 33 PID 1904 set thread context of 2484 1904 merge-force-ww.exe 35 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language merge-force-ww.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language merge-force-ww.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2648 merge-force-ww.exe 2648 merge-force-ww.exe 2736 7zFM.exe 2560 more.com 2560 more.com 2736 7zFM.exe 2736 7zFM.exe 1904 merge-force-ww.exe 1904 merge-force-ww.exe 2736 7zFM.exe 2484 more.com 2484 more.com 1400 chrome.exe 1400 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2736 7zFM.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2648 merge-force-ww.exe 2560 more.com 2560 more.com 1904 merge-force-ww.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeRestorePrivilege 2736 7zFM.exe Token: 35 2736 7zFM.exe Token: SeSecurityPrivilege 2736 7zFM.exe Token: SeSecurityPrivilege 2736 7zFM.exe Token: SeSecurityPrivilege 2736 7zFM.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe Token: SeShutdownPrivilege 1400 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2736 7zFM.exe 2736 7zFM.exe 2736 7zFM.exe 2736 7zFM.exe 2736 7zFM.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe 1400 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2648 2736 7zFM.exe 30 PID 2736 wrote to memory of 2648 2736 7zFM.exe 30 PID 2736 wrote to memory of 2648 2736 7zFM.exe 30 PID 2736 wrote to memory of 2648 2736 7zFM.exe 30 PID 2648 wrote to memory of 2560 2648 merge-force-ww.exe 31 PID 2648 wrote to memory of 2560 2648 merge-force-ww.exe 31 PID 2648 wrote to memory of 2560 2648 merge-force-ww.exe 31 PID 2648 wrote to memory of 2560 2648 merge-force-ww.exe 31 PID 2648 wrote to memory of 2560 2648 merge-force-ww.exe 31 PID 2560 wrote to memory of 1676 2560 more.com 33 PID 2560 wrote to memory of 1676 2560 more.com 33 PID 2560 wrote to memory of 1676 2560 more.com 33 PID 2560 wrote to memory of 1676 2560 more.com 33 PID 2560 wrote to memory of 1676 2560 more.com 33 PID 2560 wrote to memory of 1676 2560 more.com 33 PID 2736 wrote to memory of 1904 2736 7zFM.exe 34 PID 2736 wrote to memory of 1904 2736 7zFM.exe 34 PID 2736 wrote to memory of 1904 2736 7zFM.exe 34 PID 2736 wrote to memory of 1904 2736 7zFM.exe 34 PID 1904 wrote to memory of 2484 1904 merge-force-ww.exe 35 PID 1904 wrote to memory of 2484 1904 merge-force-ww.exe 35 PID 1904 wrote to memory of 2484 1904 merge-force-ww.exe 35 PID 1904 wrote to memory of 2484 1904 merge-force-ww.exe 35 PID 1400 wrote to memory of 1804 1400 chrome.exe 38 PID 1400 wrote to memory of 1804 1400 chrome.exe 38 PID 1400 wrote to memory of 1804 1400 chrome.exe 38 PID 1904 wrote to memory of 2484 1904 merge-force-ww.exe 35 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40 PID 1400 wrote to memory of 1668 1400 chrome.exe 40
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\merge-force-ww.rar"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\7zO0BA63E78\merge-force-ww.exe"C:\Users\Admin\AppData\Local\Temp\7zO0BA63E78\merge-force-ww.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe4⤵
- System Location Discovery: System Language Discovery
PID:1676
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0BAB1279\merge-force-ww.exe"C:\Users\Admin\AppData\Local\Temp\7zO0BAB1279\merge-force-ww.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2484 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe4⤵PID:1908
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO0BAD0DB9\merge-force-ww.exe"C:\Users\Admin\AppData\Local\Temp\7zO0BAD0DB9\merge-force-ww.exe"2⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefb389758,0x7fefb389768,0x7fefb3897782⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1196 --field-trial-handle=1260,i,12340739813127576141,4114031550642566895,131072 /prefetch:22⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1572 --field-trial-handle=1260,i,12340739813127576141,4114031550642566895,131072 /prefetch:82⤵PID:852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1260,i,12340739813127576141,4114031550642566895,131072 /prefetch:82⤵PID:1884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2192 --field-trial-handle=1260,i,12340739813127576141,4114031550642566895,131072 /prefetch:12⤵PID:1856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2224 --field-trial-handle=1260,i,12340739813127576141,4114031550642566895,131072 /prefetch:12⤵PID:2864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1380 --field-trial-handle=1260,i,12340739813127576141,4114031550642566895,131072 /prefetch:22⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3180 --field-trial-handle=1260,i,12340739813127576141,4114031550642566895,131072 /prefetch:12⤵PID:1004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵PID:2780
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefb389758,0x7fefb389768,0x7fefb3897782⤵PID:2776
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD59b1c99d5245940563e9e81e95c4832ec
SHA11bc5970a797d7160879f1ab93559a23b736a2ce7
SHA2565e5e2d6ab15529a13c5f6fddf4908f82199df64cd0fff65ec624e324f6f20a45
SHA5126d270d67927d391ddb39f5f2c3bbcbe36add45dc5cbf35099b0876b1b1c91f7ff23389e564bdf583fb4245984cd0a8af8f75ef87695296a8dc1d91269763b957
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1.2MB
MD596f338933d2dab49fdeb6435fe8f1020
SHA12c8967ac3500328abeb3493e4ddc9e7bb8beb094
SHA256eaec967c02fe41764b1891561650953d0d890d75364ae378efa756d731d2e7dc
SHA512bca1f75096530d9c723b143e73409cfc073aeec81be94bf13d52367d248407036e14020294073d395814b38b7bfc038bb92180fbe4aca91b0e76f294172ca882
-
Filesize
1.0MB
MD55504c7519d737aa47aae71a4049ef315
SHA14c7f21400791e4931f901067aeb0574217b63df9
SHA256b99c887f2f593ae44bb2f5d9a86acc57df9c7ae24b74048418b0dbc7ac76a3d0
SHA512bd37f3bee43aae05725f04822e7d8f61fb708720ce9c84b851a219a468aaf079242d62a21555c570fcd6e4299c2acf94752aa48740c9ca2198dd92380501b13a
-
Filesize
1.0MB
MD5f68f98d52e9749ff93fd4678bae0ab70
SHA131673831ada1781261cde77425085a20483955ae
SHA2564411fad313c9e8c6403cc8d90134bd7f35897f775214ab1b2e040cfcf43823b4
SHA5122f763ac496c624853b827d1051a1980acff594b5b57a827c1e64d107b567b2729e0ea93fac76e6dfe586e6a0e17ff3948d92f6520d46a6b00c92389db0e756f3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b