Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3Lethal-Com...om.rar
windows7-x64
3Lethal-Com...om.rar
windows10-2004-x64
3Lethal Com...ne.xml
windows7-x64
1Lethal Com...ne.xml
windows10-2004-x64
1Lethal Com...gs.xml
windows7-x64
1Lethal Com...gs.xml
windows10-2004-x64
1Lethal Com...eb.xml
windows7-x64
1Lethal Com...eb.xml
windows10-2004-x64
1Lethal Com...rowser
windows7-x64
3Lethal Com...rowser
windows10-2004-x64
3Lethal Com...tor.js
windows7-x64
1Lethal Com...tor.js
windows10-2004-x64
1Lethal Com...ne.xml
windows7-x64
1Lethal Com...ne.xml
windows10-2004-x64
1Lethal Com...gs.xml
windows7-x64
1Lethal Com...gs.xml
windows10-2004-x64
1Lethal Com...eb.xml
windows7-x64
1Lethal Com...eb.xml
windows10-2004-x64
1Lethal Com...ap.ini
windows7-x64
1Lethal Com...ap.ini
windows10-2004-x64
1Lethal Com...config
windows7-x64
1Lethal Com...config
windows10-2004-x64
1Lethal Com...ig.xml
windows7-x64
1Lethal Com...ig.xml
windows10-2004-x64
1Lethal Com...in.dll
windows7-x64
1Lethal Com...in.dll
windows10-2004-x64
1Lethal Com...ix.ini
windows7-x64
1Lethal Com...ix.ini
windows10-2004-x64
1Lethal Com...ix.url
windows7-x64
1Lethal Com...ix.url
windows10-2004-x64
1Lethal Com...64.dll
windows7-x64
1Lethal Com...64.dll
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
294s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
26/11/2023, 16:38
Static task
static1
Behavioral task
behavioral1
Sample
Lethal-Company-SteamRIP.com.rar
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
Lethal-Company-SteamRIP.com.rar
Resource
win10v2004-20231020-en
Behavioral task
behavioral3
Sample
Lethal Company/MonoBleedingEdge/etc/mono/4.0/machine.xml
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
Lethal Company/MonoBleedingEdge/etc/mono/4.0/machine.xml
Resource
win10v2004-20231025-en
Behavioral task
behavioral5
Sample
Lethal Company/MonoBleedingEdge/etc/mono/4.0/settings.xml
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
Lethal Company/MonoBleedingEdge/etc/mono/4.0/settings.xml
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
Lethal Company/MonoBleedingEdge/etc/mono/4.0/web.xml
Resource
win7-20231023-en
Behavioral task
behavioral8
Sample
Lethal Company/MonoBleedingEdge/etc/mono/4.0/web.xml
Resource
win10v2004-20231020-en
Behavioral task
behavioral9
Sample
Lethal Company/MonoBleedingEdge/etc/mono/4.5/Browsers/Compat.browser
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
Lethal Company/MonoBleedingEdge/etc/mono/4.5/Browsers/Compat.browser
Resource
win10v2004-20231023-en
Behavioral task
behavioral11
Sample
Lethal Company/MonoBleedingEdge/etc/mono/4.5/DefaultWsdlHelpGenerator.js
Resource
win7-20231025-en
Behavioral task
behavioral12
Sample
Lethal Company/MonoBleedingEdge/etc/mono/4.5/DefaultWsdlHelpGenerator.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral13
Sample
Lethal Company/MonoBleedingEdge/etc/mono/4.5/machine.xml
Resource
win7-20231023-en
Behavioral task
behavioral14
Sample
Lethal Company/MonoBleedingEdge/etc/mono/4.5/machine.xml
Resource
win10v2004-20231023-en
Behavioral task
behavioral15
Sample
Lethal Company/MonoBleedingEdge/etc/mono/4.5/settings.xml
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
Lethal Company/MonoBleedingEdge/etc/mono/4.5/settings.xml
Resource
win10v2004-20231023-en
Behavioral task
behavioral17
Sample
Lethal Company/MonoBleedingEdge/etc/mono/4.5/web.xml
Resource
win7-20231020-en
Behavioral task
behavioral18
Sample
Lethal Company/MonoBleedingEdge/etc/mono/4.5/web.xml
Resource
win10v2004-20231020-en
Behavioral task
behavioral19
Sample
Lethal Company/MonoBleedingEdge/etc/mono/browscap.ini
Resource
win7-20231020-en
Behavioral task
behavioral20
Sample
Lethal Company/MonoBleedingEdge/etc/mono/browscap.ini
Resource
win10v2004-20231025-en
Behavioral task
behavioral21
Sample
Lethal Company/MonoBleedingEdge/etc/mono/config
Resource
win7-20231023-en
Behavioral task
behavioral22
Sample
Lethal Company/MonoBleedingEdge/etc/mono/config
Resource
win10v2004-20231023-en
Behavioral task
behavioral23
Sample
Lethal Company/MonoBleedingEdge/etc/mono/mconfig/config.xml
Resource
win7-20231023-en
Behavioral task
behavioral24
Sample
Lethal Company/MonoBleedingEdge/etc/mono/mconfig/config.xml
Resource
win10v2004-20231020-en
Behavioral task
behavioral25
Sample
Lethal Company/NVUnityPlugin.dll
Resource
win7-20231025-en
Behavioral task
behavioral26
Sample
Lethal Company/NVUnityPlugin.dll
Resource
win10v2004-20231023-en
Behavioral task
behavioral27
Sample
Lethal Company/OnlineFix.ini
Resource
win7-20231020-en
Behavioral task
behavioral28
Sample
Lethal Company/OnlineFix.ini
Resource
win10v2004-20231020-en
Behavioral task
behavioral29
Sample
Lethal Company/OnlineFix.url
Resource
win7-20231023-en
Behavioral task
behavioral30
Sample
Lethal Company/OnlineFix.url
Resource
win10v2004-20231020-en
Behavioral task
behavioral31
Sample
Lethal Company/OnlineFix64.dll
Resource
win7-20231025-en
Behavioral task
behavioral32
Sample
Lethal Company/OnlineFix64.dll
Resource
win10v2004-20231020-en
General
-
Target
Lethal-Company-SteamRIP.com.rar
-
Size
368.5MB
-
MD5
7b07f4b64c2a34e16118357bc6e7e544
-
SHA1
bfc3558c1079118c41399dd73ebf3de5c082b07c
-
SHA256
c8ed4ce42d2f0ccc51b3e9f8f2a329d3e4f71350c80a70c786dc9eea8a7d18c5
-
SHA512
d52a3d4059353f7d8e9f8e023cb186b6255d50dd3fb523df853ff7f063e9d005b359f5e0b92174e06ab925407b0ae8b6928326ede95a9bc0d17a2de234fae891
-
SSDEEP
6291456:GvGB2/3Exmu/J736BQZ3oRWMiZPfMsfkmS1rmyZo1Al6b+vMXyRXyg5aXPzODlnS:GecExmw7ZuwPfMsF2rr+1BY9MRLODlnS
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1861898231-3446828954-4278112889-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2640 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2252 chrome.exe 2252 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2640 vlc.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
description pid Process Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe Token: SeShutdownPrivilege 2252 chrome.exe -
Suspicious use of FindShellTrayWindow 61 IoCs
pid Process 2640 vlc.exe 2640 vlc.exe 2640 vlc.exe 2640 vlc.exe 2640 vlc.exe 2640 vlc.exe 2640 vlc.exe 2640 vlc.exe 2640 vlc.exe 2640 vlc.exe 2640 vlc.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe -
Suspicious use of SendNotifyMessage 57 IoCs
pid Process 2640 vlc.exe 2640 vlc.exe 2640 vlc.exe 2640 vlc.exe 2640 vlc.exe 2640 vlc.exe 2640 vlc.exe 2640 vlc.exe 2640 vlc.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe 2252 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2640 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2624 2168 cmd.exe 29 PID 2168 wrote to memory of 2624 2168 cmd.exe 29 PID 2168 wrote to memory of 2624 2168 cmd.exe 29 PID 2624 wrote to memory of 2640 2624 rundll32.exe 30 PID 2624 wrote to memory of 2640 2624 rundll32.exe 30 PID 2624 wrote to memory of 2640 2624 rundll32.exe 30 PID 2252 wrote to memory of 2408 2252 chrome.exe 38 PID 2252 wrote to memory of 2408 2252 chrome.exe 38 PID 2252 wrote to memory of 2408 2252 chrome.exe 38 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1924 2252 chrome.exe 40 PID 2252 wrote to memory of 1532 2252 chrome.exe 41 PID 2252 wrote to memory of 1532 2252 chrome.exe 41 PID 2252 wrote to memory of 1532 2252 chrome.exe 41 PID 2252 wrote to memory of 2336 2252 chrome.exe 42 PID 2252 wrote to memory of 2336 2252 chrome.exe 42 PID 2252 wrote to memory of 2336 2252 chrome.exe 42 PID 2252 wrote to memory of 2336 2252 chrome.exe 42 PID 2252 wrote to memory of 2336 2252 chrome.exe 42 PID 2252 wrote to memory of 2336 2252 chrome.exe 42 PID 2252 wrote to memory of 2336 2252 chrome.exe 42 PID 2252 wrote to memory of 2336 2252 chrome.exe 42 PID 2252 wrote to memory of 2336 2252 chrome.exe 42 PID 2252 wrote to memory of 2336 2252 chrome.exe 42 PID 2252 wrote to memory of 2336 2252 chrome.exe 42 PID 2252 wrote to memory of 2336 2252 chrome.exe 42 PID 2252 wrote to memory of 2336 2252 chrome.exe 42
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Lethal-Company-SteamRIP.com.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Lethal-Company-SteamRIP.com.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Lethal-Company-SteamRIP.com.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2640
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5b59758,0x7fef5b59768,0x7fef5b597782⤵PID:2408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1132 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:22⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1480 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:82⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:82⤵PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2296 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:12⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2308 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:12⤵PID:1060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2524 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:22⤵PID:2940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3216 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:12⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3220 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:82⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3560 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:82⤵PID:628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3808 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:82⤵PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3732 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:12⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2520 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:12⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:82⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=4004 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:12⤵PID:268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=1156 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:12⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=1148 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:12⤵PID:320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4380 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:82⤵PID:1632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=676 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:12⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=3792 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:12⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=4100 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:12⤵PID:2536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=4460 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:12⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=4292 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:12⤵PID:2404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=4344 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:12⤵PID:1736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4388 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:82⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4520 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:82⤵PID:1804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4520 --field-trial-handle=1320,i,12242776148825634938,848685796133649168,131072 /prefetch:82⤵PID:1580
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2908
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5541⤵PID:1748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD566f4b8752074002932e6ea2e377a7009
SHA18f4ae976c57f08ba7b717fe3da7614fb56b156ec
SHA2562d0e77b95af04864555a052828feef17385df5e1bba407722fda0cd7d65072c4
SHA512e211893e7572676d20d76888752ea27f71c4686beb4c4193bebabcc8465548dbacd908f9e5ec3e7df5dc198b29ad91977858910eb7327e9ab3e6151319072421
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56c5dc614f1e25cf12aca20d3be8fa147
SHA1adbea977637a8fd404b48e489144499bb6d6da3a
SHA25617de05be1ead57e7d60b62ac1fcd438cfcaedb5c5fe94388dffaa30db12ea187
SHA5125ec72df36a57e6b61bf3a6c30b7c2b146e9072711d7870b9f40787d5d59f89b436e2807ab3b817ec05c22326f1d62f8e8a3f10744418fa60d9267ee51068233b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df7301b7407fa1f24e36b58649766289
SHA1b61a58e50cbcfdc3c2890875c963f16ab412630b
SHA2562b57e707b13f8965d88e83538205416a5daa94e533d95425bd8c738696a5147a
SHA512169bb4070bb755c3cb5d527c504ffb4ea1b83f84dc96a4440eeb8c32d48d5567c1107ef9148af94ca59b18d7a5a1fb68680477b8bed11d3a1e945e3bf2603d99
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d8a16edc283292b1fa7a2f4984e65a35
SHA15adb7e83d1517d0444c18535155a14612cecf9a5
SHA256b5983f1ddbf0c24ec2768b8f4c89a711cd60d7676d58ec7ea33116f4167110d6
SHA512da57e150c0588d4c2280bc64e387891b06f26ace83004c4222172bdb13de86e5498d3ea7927a13b990f967829478e4026f89b8f4e676623018ea6bb9cac062e6
-
Filesize
186KB
MD59f61d7b1098e9a21920cf7abd68ca471
SHA1c2a75ba9d5e426f34290ebda3e7b3874a4c26a50
SHA2562c209fbd64803b50d0275cfd977c57965ee91410ecf0cafa70d9f249d6357c71
SHA5123d4f945783809a88e717f583f8805da1786770d024897c8a21d758325bcd4743ff48e32a275fe2f04236248393e580d40ae5caf5d3258054ea94d20b65b2c029
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
363B
MD508d9b5f73e99990ce42c8552c32bbdec
SHA17f7b05b102ca14c53178e52787a32cc6797fce5a
SHA25612bd4a38ce4c272b189618b5094e4f08629ccff2f1bf589826f33caf2d74e412
SHA5123b1aeecbb5a493fc836d5beaf21b94a2bae6cbb3e8ad37f7396f18dfe508def7f197894fd5612061215a16d3db27ae73a49273060893355c04041b18764710d3
-
Filesize
690B
MD52d98cb89f13e6888585007d79b03565d
SHA1462bd2a6e1fb9b9bec45f2315466d006be30d51c
SHA25697fb3103a6783952b5365e30228e919d2813d531c3de8e8411b9dfe631651f52
SHA5126474f7ea2effa455d909094d78baf45ed95af4096a40fadf3d734d8743d24b618a2a6b4781f94d080316c544cbe0919928d478d61dc8c06c6573bd08be34e000
-
Filesize
1KB
MD52afea46192478dea58cc8fe270698143
SHA140cd28ee761e66ac52e0bbdeea14a21bb20608dd
SHA2566820da2a92123e4bbf1ac1009327ec9ac060db2a133af06559ae640cd548c916
SHA512ab8730c9f803759974678190fdcfb139747e68ceb1a0ffeec5a1e28f2b79db1705d1bdf6104f3ae9dd895256803db5876e1fb88b72911fc04e742b4fbb3a705a
-
Filesize
5KB
MD5e173dc97a628e290e86e3848aae2459f
SHA1b295dfd8d84a4e01dce5d5322b3f7621a5eb108d
SHA256d3676d9342b08edc8ae8c286cfa6f6f3e3cb6d146958f6a4dd319857fa2a707a
SHA512a80d2eb89c5d702da29a4827a83e393dbef58e9d56a7098436b4ea14bafd55721092f52cdbb0495de06543484767e523f0b98458be2b51159deb83de0ceb1f06
-
Filesize
6KB
MD5132c43e05f674ee492898e423c8556db
SHA15c704ce79afdf75db7ca7d70e964be60e052cc26
SHA256adfd0f313b52d754431307be9b1cc81c5efb3832c8a5a14ebedfd2b0cd83ce53
SHA512f541049770502c6a03667f54ab6419f9c8f3ba9c50c016a821616935d85c101fee9aa8546c8a0a918a20ca802c5c8b784cddc2ba44c93cb0c6bdd9c47652f99c
-
Filesize
4KB
MD5dc1be04377a392730721b9c748f5202f
SHA1d4abcdbb4f18df231896c6df01d0a44194d0d498
SHA256a4643d807ad72e5ad5ed3902a286c081c8c95fa7f82b64e4782feca1cb82bf2a
SHA512a7118fee1b8707752a66bc7dba6680135e6592fadf4138dcf1c6da4e87a25f94640df057aa3c4d816af26a47362de266c12a8be86f737f31145f4a9be36296ce
-
Filesize
6KB
MD59766202fa8d11c192c213e496bd7b2d6
SHA119af0aba3ecdb4db02dc62efb6a7c2b813ebb91c
SHA2566d44ab7cd5204c05eb76f5cc534f2d899ab5b398b8ee0cd8aa9fee2d1d858305
SHA5124df97b46c6c06b201a8c5edb78cb8978947d3134178bc62bae1aa69e07851fadd7612f8ff3c4f0a78b4da0a3844c83ccc2c2cb9283ead3bc704d6e5a0dc7f755
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\aeaec306-30ca-4f77-905c-5e701411262e.tmp
Filesize6KB
MD5a540d6fa256294954221dd78164a3e9a
SHA1c4e6c008cee29381404c26d8ec12e8bd5aa123fe
SHA2565bfc10aacccd9f6eb654cf856e4e630cc4a38984880222d3b57010cf8d4aa86a
SHA5126261fb0c626d2a504e2393b4d9fe9c9ab5f372973acda4c4b85602c5da11f39250298cac25d9741ed82dfc3284bca1eca53ebf1da740e8223a5f4b63fc0a2f6a
-
Filesize
221KB
MD5a68e6b848481c6560090adf2d559b23b
SHA1f1ee0b1565da0013a790e9ff608867a51ddca310
SHA2569b0ffd34b4df96f3c19ebee1a5c1716c1a351b676306f3ad54b5d16e67b4e115
SHA512e725e7f0d94e7a05ac2d9af2ed9b5119e8f38ce6649fb102fd7912c6a24ea7de55770db5fe9d3a39fb7f76e0db72f77798e9c9a4f1d5683e7d172b681f5c6e4a
-
Filesize
221KB
MD5544ba81ae34869486845463c63b33cf8
SHA1d4735a18eb0c01dd90e9dfa9aac5644d57af0817
SHA2566e9d5e2054084a0f962e57d6d614b4d4f7c0746f952e37980b6468ef93f95039
SHA512a2e5da4c7a9780269370e20093b53333e3f8a91bbf37034e2828bb0318628d43f8b01a3cf9b668dfc7f745aa96862ea957f54455173d18a914bf08f2a4e01dce
-
Filesize
77KB
MD58fdfa1258638f1c495da28e42b2a3a3a
SHA1b01e54b82154d7d86bc45f89ec3f81711b73cd05
SHA2563a407253bde9cf9f3c2276dc82bce5d8f8b985325d288a71a624be2511cde77c
SHA512a9486f3f3f6cdfd5df7f0147655c10db5cb0a3a23b26b3ba2c4907962b0db83feb0e0c3e59753cfefecf0b967b92b68eb6e9194046a800f3f81f45e84d3a754c
-
Filesize
79KB
MD58dc5f11173f6c6a8209751f1de597ed3
SHA1957b6a4d5d3e1fec97be30d1a86665449a06b94d
SHA256f77ed3bbdfa1664bbc07711df61802d50e3ba42a2454bac3a2f2e061ebfaac41
SHA512a8fdf1c1d56d270e72f5db0fc8b83313c6550881c5811ec5c5a338e6744f0e165bdfc7cfdd3461ca4dca9c028b499d05d806df9c79f27317c632d651ef7aff2b
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf