Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
3Lethal Com...ny.exe
windows7-x64
1Lethal Com...ny.exe
windows10-2004-x64
1Lethal Com...sh.dll
windows7-x64
1Lethal Com...sh.dll
windows10-2004-x64
1Lethal Com...ss.dll
windows7-x64
1Lethal Com...ss.dll
windows10-2004-x64
1Lethal Com...rp.dll
windows7-x64
1Lethal Com...rp.dll
windows10-2004-x64
1Lethal Com...rm.dll
windows7-x64
1Lethal Com...rm.dll
windows10-2004-x64
1Lethal Com...ip.dll
windows7-x64
1Lethal Com...ip.dll
windows10-2004-x64
1Lethal Com...ts.dll
windows7-x64
1Lethal Com...ts.dll
windows10-2004-x64
1Lethal Com...64.dll
windows7-x64
1Lethal Com...64.dll
windows10-2004-x64
1Lethal Com...ty.dll
windows7-x64
1Lethal Com...ty.dll
windows10-2004-x64
1Lethal Com...on.dll
windows7-x64
1Lethal Com...on.dll
windows10-2004-x64
1Lethal Com...on.dll
windows7-x64
1Lethal Com...on.dll
windows10-2004-x64
1Lethal Com...on.dll
windows7-x64
1Lethal Com...on.dll
windows10-2004-x64
1Lethal Com...re.dll
windows7-x64
1Lethal Com...re.dll
windows10-2004-x64
1Lethal Com...ns.dll
windows7-x64
1Lethal Com...ns.dll
windows10-2004-x64
1Lethal Com...ta.dll
windows7-x64
1Lethal Com...ta.dll
windows10-2004-x64
1Lethal Com...ng.dll
windows7-x64
1Lethal Com...ng.dll
windows10-2004-x64
1Analysis
-
max time kernel
127s -
max time network
198s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 00:27
Static task
static1
Behavioral task
behavioral1
Sample
Lethal Company/Lethal Company.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Lethal Company/Lethal Company.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
Lethal Company/Lethal Company_Data/Managed/AmazingAssets.TerrainToMesh.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Lethal Company/Lethal Company_Data/Managed/AmazingAssets.TerrainToMesh.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Lethal Company/Lethal Company_Data/Managed/Assembly-CSharp-firstpass.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Lethal Company/Lethal Company_Data/Managed/Assembly-CSharp-firstpass.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
Lethal Company/Lethal Company_Data/Managed/Assembly-CSharp.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Lethal Company/Lethal Company_Data/Managed/Assembly-CSharp.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
Lethal Company/Lethal Company_Data/Managed/ClientNetworkTransform.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
Lethal Company/Lethal Company_Data/Managed/ClientNetworkTransform.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
Lethal Company/Lethal Company_Data/Managed/DissonanceVoip.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Lethal Company/Lethal Company_Data/Managed/DissonanceVoip.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
Lethal Company/Lethal Company_Data/Managed/Facepunch Transport for Netcode for GameObjects.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
Lethal Company/Lethal Company_Data/Managed/Facepunch Transport for Netcode for GameObjects.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
Lethal Company/Lethal Company_Data/Managed/Facepunch.Steamworks.Win64.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
Lethal Company/Lethal Company_Data/Managed/Facepunch.Steamworks.Win64.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
Lethal Company/Lethal Company_Data/Managed/Mono.Security.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Lethal Company/Lethal Company_Data/Managed/Mono.Security.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
Lethal Company/Lethal Company_Data/Managed/Newtonsoft.Json.dll
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
Lethal Company/Lethal Company_Data/Managed/Newtonsoft.Json.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral21
Sample
Lethal Company/Lethal Company_Data/Managed/System.ComponentModel.Composition.dll
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
Lethal Company/Lethal Company_Data/Managed/System.ComponentModel.Composition.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
Lethal Company/Lethal Company_Data/Managed/System.Configuration.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
Lethal Company/Lethal Company_Data/Managed/System.Configuration.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral25
Sample
Lethal Company/Lethal Company_Data/Managed/System.Core.dll
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
Lethal Company/Lethal Company_Data/Managed/System.Core.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral27
Sample
Lethal Company/Lethal Company_Data/Managed/System.Data.DataSetExtensions.dll
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
Lethal Company/Lethal Company_Data/Managed/System.Data.DataSetExtensions.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral29
Sample
Lethal Company/Lethal Company_Data/Managed/System.Data.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
Lethal Company/Lethal Company_Data/Managed/System.Data.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral31
Sample
Lethal Company/Lethal Company_Data/Managed/System.Drawing.dll
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
Lethal Company/Lethal Company_Data/Managed/System.Drawing.dll
Resource
win10v2004-20240704-en
General
-
Target
Lethal Company/Lethal Company.exe
-
Size
651KB
-
MD5
a5721809407229d21ea49a2eb5d8e962
-
SHA1
1456ec35a2d975ec9d5e732c1fb27987c4184697
-
SHA256
469f208de455fcb6d334b6ec3655102ae6893de374f890961ab9f317bdfb2c8c
-
SHA512
f2d5dfb53b790f65987cba5340a3983f03eb23416dc8eb1a1d768a109d845191c48a445f54783b16ed4e089086d2f2815f91582a0f2a547d959a74c5a2f4064a
-
SSDEEP
12288:p/744aOD8q/jZe+uMPnH8ENDk1sqhtNswxLwNfZI9MFwKF9qlfLCkG:x9aOSMPnH8ENDk1sqhtNswxLwNfZI9MD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1504 chrome.exe 1504 chrome.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe Token: SeShutdownPrivilege 1504 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe 1504 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2020 1504 chrome.exe 31 PID 1504 wrote to memory of 2020 1504 chrome.exe 31 PID 1504 wrote to memory of 2020 1504 chrome.exe 31 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2016 1504 chrome.exe 33 PID 1504 wrote to memory of 2552 1504 chrome.exe 34 PID 1504 wrote to memory of 2552 1504 chrome.exe 34 PID 1504 wrote to memory of 2552 1504 chrome.exe 34 PID 1504 wrote to memory of 2924 1504 chrome.exe 35 PID 1504 wrote to memory of 2924 1504 chrome.exe 35 PID 1504 wrote to memory of 2924 1504 chrome.exe 35 PID 1504 wrote to memory of 2924 1504 chrome.exe 35 PID 1504 wrote to memory of 2924 1504 chrome.exe 35 PID 1504 wrote to memory of 2924 1504 chrome.exe 35 PID 1504 wrote to memory of 2924 1504 chrome.exe 35 PID 1504 wrote to memory of 2924 1504 chrome.exe 35 PID 1504 wrote to memory of 2924 1504 chrome.exe 35 PID 1504 wrote to memory of 2924 1504 chrome.exe 35 PID 1504 wrote to memory of 2924 1504 chrome.exe 35 PID 1504 wrote to memory of 2924 1504 chrome.exe 35 PID 1504 wrote to memory of 2924 1504 chrome.exe 35 PID 1504 wrote to memory of 2924 1504 chrome.exe 35 PID 1504 wrote to memory of 2924 1504 chrome.exe 35 PID 1504 wrote to memory of 2924 1504 chrome.exe 35 PID 1504 wrote to memory of 2924 1504 chrome.exe 35 PID 1504 wrote to memory of 2924 1504 chrome.exe 35 PID 1504 wrote to memory of 2924 1504 chrome.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Lethal Company\Lethal Company.exe"C:\Users\Admin\AppData\Local\Temp\Lethal Company\Lethal Company.exe"1⤵PID:3040
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7089758,0x7fef7089768,0x7fef70897782⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1200 --field-trial-handle=1128,i,9083912817281183626,13185325180639832783,131072 /prefetch:22⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1128,i,9083912817281183626,13185325180639832783,131072 /prefetch:82⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1612 --field-trial-handle=1128,i,9083912817281183626,13185325180639832783,131072 /prefetch:82⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2288 --field-trial-handle=1128,i,9083912817281183626,13185325180639832783,131072 /prefetch:12⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2388 --field-trial-handle=1128,i,9083912817281183626,13185325180639832783,131072 /prefetch:12⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1496 --field-trial-handle=1128,i,9083912817281183626,13185325180639832783,131072 /prefetch:22⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3048 --field-trial-handle=1128,i,9083912817281183626,13185325180639832783,131072 /prefetch:12⤵PID:1584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3820 --field-trial-handle=1128,i,9083912817281183626,13185325180639832783,131072 /prefetch:82⤵PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3900 --field-trial-handle=1128,i,9083912817281183626,13185325180639832783,131072 /prefetch:12⤵PID:1644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=2440 --field-trial-handle=1128,i,9083912817281183626,13185325180639832783,131072 /prefetch:12⤵PID:1220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3752 --field-trial-handle=1128,i,9083912817281183626,13185325180639832783,131072 /prefetch:12⤵PID:1700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3640 --field-trial-handle=1128,i,9083912817281183626,13185325180639832783,131072 /prefetch:12⤵PID:1896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=1060 --field-trial-handle=1128,i,9083912817281183626,13185325180639832783,131072 /prefetch:12⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=680 --field-trial-handle=1128,i,9083912817281183626,13185325180639832783,131072 /prefetch:82⤵PID:2236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3864 --field-trial-handle=1128,i,9083912817281183626,13185325180639832783,131072 /prefetch:12⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=2412 --field-trial-handle=1128,i,9083912817281183626,13185325180639832783,131072 /prefetch:12⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4076 --field-trial-handle=1128,i,9083912817281183626,13185325180639832783,131072 /prefetch:12⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=4080 --field-trial-handle=1128,i,9083912817281183626,13185325180639832783,131072 /prefetch:12⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=4212 --field-trial-handle=1128,i,9083912817281183626,13185325180639832783,131072 /prefetch:12⤵PID:2872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=4400 --field-trial-handle=1128,i,9083912817281183626,13185325180639832783,131072 /prefetch:12⤵PID:1852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=4388 --field-trial-handle=1128,i,9083912817281183626,13185325180639832783,131072 /prefetch:12⤵PID:1708
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e7ab2965c12979a42667b0b79edc19c
SHA141b4b4c7105b98b93c8c3be0df717202e86d78c1
SHA25673a9aad34c34a72e7754abc9c20f7b92bb9a8f440cfb509e080bd1d4264ad087
SHA5123057fffad69f2878bbb0595f6309352c3b7f25e972d41d248c668c34a0c4bbf525dd5468ea4a110c60ff162be8b9996e21fab9d0d3f4e1dc988631c036959cf5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c723a295de22e78fbe81e50e49415de
SHA13d66ed369aef2932409df695b65a09827982959f
SHA256cd8046df2006eb0b1a359e457bbb5605af5cbea6412f5206dc46e80482bad464
SHA51261da6310a070aa948f80ef59a67a60c2145d4cfe434fc206d5edfea15c991481de68059492d6fe5f1ddc5dd3a8b8dca1953f27961d5779dcc549d235e8002855
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57389cc31a73a0d1005d01a768d4c88af
SHA1378a19c2b198c7ab67cfb945991888391618bdc7
SHA2560f278f188ad103d785769f18953e82a0b06c54a2e725e579bb78b3df951eadda
SHA51294a6f3eeb5d0e4145a08e23be27107d70167a987c0ccffd6a5e7f0e72cea83214b5815d93b38ae97ad25cbf95a24aaa86d11d561a9485ee1bc5a451db321d765
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
Filesize
24KB
MD5c594a826934b9505d591d0f7a7df80b7
SHA1c04b8637e686f71f3fc46a29a86346ba9b04ae18
SHA256e664eef3d68ac6336a28be033165d4780e8a5ab28f0d90df1b148ef86babb610
SHA51204a1dfdb8ee2f5fefa101d5e3ff36e87659fd774e96aa8c5941d3353ccc268a125822cf01533c74839e5f1c54725da9cc437d3d69b88e5bf3f99caccd4d75961
-
Filesize
26KB
MD5a2951965e202bf00eeb9260431e5cc59
SHA1fa689260c9594c1c2a280eeb3fc11488612efa76
SHA25667438681e729025404ba0cb1153d82f3443e36e1cf8a95c6cb47ecb51f13789c
SHA5125d50c18a38cfa5c9b1d9c9ff350b8b0e901138a521cd888530a576deace222e203e58d34624268b2ba498e9068a6739cbddeb1808a7a4558235801813eecd442
-
Filesize
339KB
MD5599c3ef665c037de2551556d50f9675d
SHA14948a1c29eda40fd9442e5db1239b11dd0b343cf
SHA25673ee45b885c17158f2c277a0021f2b2959845ec922d1336283624e68f5c2d1a5
SHA512b60ed1feeb39e7fc57baba6c1f43225ddee99f8c861808ef89415f9c664f0e457d9d3b1f0ad489f4445e066baaf8c9ff957ec31cf9f372d2749215a740000adf
-
Filesize
280B
MD513b16a738b13c2543693846ccb5b42fc
SHA121b9abf86692146942c976b9561b48372062e602
SHA256644501609904b59cc12d2579be0bd6428454da8c0185a3d5d857af704e08f4e2
SHA512d9474762a66fb4dc3507c006ee534ed86fc56a6ea58ecd36996561794a2268690d7d575b77769062cf6fda44ea787558285486aa7d0fc51192bcddb0b1e58101
-
Filesize
19KB
MD57bdc6cce353151c78af0f66d9dd4377b
SHA196449f1daf82287afb62b02e54f196c272f495b8
SHA256fccee478bf5551763e8d9957b640a9f3b4d00fcc46ec62af87ef2ae993701499
SHA5125a8da689fe623c6440165c6c21bbde2c4c441ce4e21f2a353060cd21e409d0a9b11f2ade4de898695dd599f1d48a87fd0202bc6e1124cbf270d6ae36c9537107
-
Filesize
289B
MD5571b15a0b3439513483d6a5e952adffe
SHA1cff6d74045495d1b78a30fe6d3980f403bf3007b
SHA25659b2535528fb9b0240808f14b8b9e6c0cae11f8c9cd281a69819c0e1d9de16f2
SHA512db19683fdad67990dc2b1c8b5f3d85ecc57beefa899d088c0c088920050add6b7ec2195895275924fd5f7e366a37a9c21615758cceb5792be30e16f77a643ec0
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5db7dbcb1c2937216090c6743b0a3a294
SHA1bb71fdceaeba53a53713a22a46d2afb1c9b13206
SHA25694ea71181e42e9682a67426debf9c16606c5d733b8801819591614ae5df15208
SHA512f9b4b29153c67dd6931c0f5807118bfbd54f7a10c137aa31484fe2541d782edad0bd640c40e929d523ab554cb11ee1189fbad90249a11e266f2d00d9cacb5142
-
Filesize
363B
MD50b14c018af666ed81fd4df31fe644bde
SHA1a9dbaab8a690801a5d7b99a2e71313d4c4f3b5fe
SHA25694c589d301d6f2e2de5fb066903dbf11f13af2c8c61467c81aa8e3fa66bccb3e
SHA51206130808cf6307c475e4726ab92bdb44b61ffa16e5b4c47872f1d2ba51ab8b16fc5eabfa983b97182c640846264fe2ed1f01791415e3f66d4bafdb4c270ecc57
-
Filesize
363B
MD593113c2d21d3862012ae2fa2f3467311
SHA1cc664c3a3d83ca8fba7377a1a42590264ee3ab3b
SHA256848f238ade17e0002bd012ceafa4f2797c0111780ea488d0c3354003945d81ca
SHA51220550779540200920a18b6b2a9e3001ec1384f0c47fbed800bbdecbd97b319786d1c3ea2fcc08e58bfe6e0c940873b1700d8bd890df8d52e2de2606425e8daa4
-
Filesize
6KB
MD560852234acba91f198b1f9405fcd8564
SHA14f91293c4d4acb2dcc98b0927772fc3df83471cf
SHA256dc5c1d0ac8f56c61e0c01f7b41f0c8a1a8b33ea611f1be91aa130aed0429c6d2
SHA5124e7eda1d6c2e7da36a472a98a9b1db6e13c23d04608d7e10e43e7a5be98a242a50453977cc0fc982c331a7a22efacff02d2d2a0a936b597da32689f470c3c15d
-
Filesize
5KB
MD571329a8d85949dda04df59016d97ebee
SHA114c0c95a8733e4c3f3c7bbdc13aae54ea85968a8
SHA256e3b340b22e0539a4b843fa0827a059c1616aafa0bcce67fa401682b663bcd0e9
SHA5124713900b31af1a5cca1fbd2b8460425faf141efa7589aad42138e2f4f4cd6c6fbd61ea8c16948964a4265deda627ba970fc35f889ae20faf5c4a87c6c17b5bf9
-
Filesize
5KB
MD5ca9d024b3cb386b092a10490785545db
SHA12f708762c136b6547574cd068730c4834d80a282
SHA25675b4c96f23363fb5e8cccab57d882e78bdac99a0127009ec01960ae8f624ec59
SHA5121afe20495cdf0d73c346e7619f2fcfd161750e7925af83914e4b1eddc23adfb840035b8a6162ada4ce235cf866078538fd95e9455e40b10cacdce6f79de01468
-
Filesize
5KB
MD543bbdcaa59ccf70826e97fe132240590
SHA172e9b2de906acc7b2b62647fe53c2f9eb212edfd
SHA256af34b7d72efe5f87ac3b1bc8e78ef05ba22655a39a65ba5c9867c2f09efd5342
SHA512ba5f17bee7f2d817065206acaa04c4084b1da8fc8fd83c5554da8cf88baf74c7fc2f4e919a42c00c41c4348d2d30ab40913a96dbdacb3a112f8b8c9fc2c17c74
-
Filesize
6KB
MD5a56897d06cb7f3111108a5ebf34a4509
SHA17bebb9f331e9205ec2ff1d4a62612a3640324965
SHA256dc2eb46a1c3312e0096330e3891b30ceda8bcd662841ce28587ad06e5d4d351d
SHA51225561a2e296da0bc51d28071ac7042de53d561fb3acfbd9ec07b0c6f5d00b9547ec6fd9626f972f218473bac644f8c9819033d524806d1f8f0896c5f81660af5
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
155KB
MD5ba046aafb4ec1d1325718ad4ae099748
SHA1fd99afde7e52b0f8e5e8050eb668dd59a21cce45
SHA256efe0f9cd22626acb18e30d83984a0810f1e1250243c0da74c20ded7870a52566
SHA512ce7de088498a47538610c259de945e6bb66b91ea06e7f8114d640469f2bf3ec84a2c7bb4070669f94fe7e03ccef345bcf221e0bcb16c6e6f345b5ca7ae6134dc
-
Filesize
155KB
MD5fcb3e5b96f4f6ea81bd875cae889298f
SHA1c27c2cd923fb3ca9b5b76b3906814c7ffdb88829
SHA256ecc3f6cb14fe1f1e359cdb694523998f23850bb27bb20c1bbcc906d14015dbd1
SHA5123b3371e2c1c4661e73e621b7b2a74baca747fc995312ad770f0dc6c771fd0496100a29fbe9b3324a234d761cca09368aae5c0af99b869c65c48cab09a5ad456c
-
Filesize
155KB
MD5d9bce28ca8352e3202d1614492de98fc
SHA19b0f01ef81205fba0c9dbf7e89001bd75ecec170
SHA256cb20a687d031d01afff67d3f798ab9fd2cfc3a18e06200f163d4f24c1ee40592
SHA51233b9fe3bb0a3ab836d84d0bfa6e94223bd974d4418b647db35b032f4bce200ba2cc67fe6b5a6a8007b3a315379c4d6b7553e33b3be9aa0e0fc7efa860fdafa34
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b