Overview
overview
3Static
static
3Lethal Com...ny.exe
windows7-x64
1Lethal Com...ny.exe
windows10-2004-x64
1Lethal Com...sh.dll
windows7-x64
1Lethal Com...sh.dll
windows10-2004-x64
1Lethal Com...ss.dll
windows7-x64
1Lethal Com...ss.dll
windows10-2004-x64
1Lethal Com...rp.dll
windows7-x64
1Lethal Com...rp.dll
windows10-2004-x64
1Lethal Com...rm.dll
windows7-x64
1Lethal Com...rm.dll
windows10-2004-x64
1Lethal Com...ip.dll
windows7-x64
1Lethal Com...ip.dll
windows10-2004-x64
1Lethal Com...ts.dll
windows7-x64
1Lethal Com...ts.dll
windows10-2004-x64
1Lethal Com...64.dll
windows7-x64
1Lethal Com...64.dll
windows10-2004-x64
1Lethal Com...ty.dll
windows7-x64
1Lethal Com...ty.dll
windows10-2004-x64
1Lethal Com...on.dll
windows7-x64
1Lethal Com...on.dll
windows10-2004-x64
1Lethal Com...on.dll
windows7-x64
1Lethal Com...on.dll
windows10-2004-x64
1Lethal Com...on.dll
windows7-x64
1Lethal Com...on.dll
windows10-2004-x64
1Lethal Com...re.dll
windows7-x64
1Lethal Com...re.dll
windows10-2004-x64
1Lethal Com...ns.dll
windows7-x64
1Lethal Com...ns.dll
windows10-2004-x64
1Lethal Com...ta.dll
windows7-x64
1Lethal Com...ta.dll
windows10-2004-x64
1Lethal Com...ng.dll
windows7-x64
1Lethal Com...ng.dll
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
305s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 00:27
Static task
static1
Behavioral task
behavioral1
Sample
Lethal Company/Lethal Company.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Lethal Company/Lethal Company.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
Lethal Company/Lethal Company_Data/Managed/AmazingAssets.TerrainToMesh.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Lethal Company/Lethal Company_Data/Managed/AmazingAssets.TerrainToMesh.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Lethal Company/Lethal Company_Data/Managed/Assembly-CSharp-firstpass.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Lethal Company/Lethal Company_Data/Managed/Assembly-CSharp-firstpass.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
Lethal Company/Lethal Company_Data/Managed/Assembly-CSharp.dll
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Lethal Company/Lethal Company_Data/Managed/Assembly-CSharp.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral9
Sample
Lethal Company/Lethal Company_Data/Managed/ClientNetworkTransform.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
Lethal Company/Lethal Company_Data/Managed/ClientNetworkTransform.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
Lethal Company/Lethal Company_Data/Managed/DissonanceVoip.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Lethal Company/Lethal Company_Data/Managed/DissonanceVoip.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
Lethal Company/Lethal Company_Data/Managed/Facepunch Transport for Netcode for GameObjects.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
Lethal Company/Lethal Company_Data/Managed/Facepunch Transport for Netcode for GameObjects.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
Lethal Company/Lethal Company_Data/Managed/Facepunch.Steamworks.Win64.dll
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
Lethal Company/Lethal Company_Data/Managed/Facepunch.Steamworks.Win64.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
Lethal Company/Lethal Company_Data/Managed/Mono.Security.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Lethal Company/Lethal Company_Data/Managed/Mono.Security.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
Lethal Company/Lethal Company_Data/Managed/Newtonsoft.Json.dll
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
Lethal Company/Lethal Company_Data/Managed/Newtonsoft.Json.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral21
Sample
Lethal Company/Lethal Company_Data/Managed/System.ComponentModel.Composition.dll
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
Lethal Company/Lethal Company_Data/Managed/System.ComponentModel.Composition.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
Lethal Company/Lethal Company_Data/Managed/System.Configuration.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
Lethal Company/Lethal Company_Data/Managed/System.Configuration.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral25
Sample
Lethal Company/Lethal Company_Data/Managed/System.Core.dll
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
Lethal Company/Lethal Company_Data/Managed/System.Core.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral27
Sample
Lethal Company/Lethal Company_Data/Managed/System.Data.DataSetExtensions.dll
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
Lethal Company/Lethal Company_Data/Managed/System.Data.DataSetExtensions.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral29
Sample
Lethal Company/Lethal Company_Data/Managed/System.Data.dll
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
Lethal Company/Lethal Company_Data/Managed/System.Data.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral31
Sample
Lethal Company/Lethal Company_Data/Managed/System.Drawing.dll
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
Lethal Company/Lethal Company_Data/Managed/System.Drawing.dll
Resource
win10v2004-20240704-en
General
-
Target
Lethal Company/Lethal Company_Data/Managed/ClientNetworkTransform.dll
-
Size
6KB
-
MD5
3c01e13d12657868f1431949fa97c3e9
-
SHA1
a95c1f90e2de13d33e294b693bbc031e9621733b
-
SHA256
c1eb7876a41815eb52229e79d0c1b122f12f722d94967b90f67ef35d0bf7c522
-
SHA512
6648a32a37c864c0d9fe72090c775d29607160d85e2e9e88db0cbcde5ddbe47e47e5336f19f14c5189fbe8c3f2551f35e4285de4995b644e0188b0833a9bb915
-
SSDEEP
96:jxsgyWasOzs2rIvXhls94SfyamE5evAkxk7PgWU3m:QWahBcvXhBxamE5eVu7PJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 464 chrome.exe 464 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 464 wrote to memory of 3524 464 chrome.exe 91 PID 464 wrote to memory of 3524 464 chrome.exe 91 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 4664 464 chrome.exe 92 PID 464 wrote to memory of 2304 464 chrome.exe 93 PID 464 wrote to memory of 2304 464 chrome.exe 93 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94 PID 464 wrote to memory of 3580 464 chrome.exe 94
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Lethal Company\Lethal Company_Data\Managed\ClientNetworkTransform.dll",#11⤵PID:1816
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ff9e626ab58,0x7ff9e626ab68,0x7ff9e626ab782⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1704 --field-trial-handle=1920,i,6341332445081620811,367278844496147275,131072 /prefetch:22⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1928 --field-trial-handle=1920,i,6341332445081620811,367278844496147275,131072 /prefetch:82⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2208 --field-trial-handle=1920,i,6341332445081620811,367278844496147275,131072 /prefetch:82⤵PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3008 --field-trial-handle=1920,i,6341332445081620811,367278844496147275,131072 /prefetch:12⤵PID:1152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3028 --field-trial-handle=1920,i,6341332445081620811,367278844496147275,131072 /prefetch:12⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4260 --field-trial-handle=1920,i,6341332445081620811,367278844496147275,131072 /prefetch:12⤵PID:4060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4192 --field-trial-handle=1920,i,6341332445081620811,367278844496147275,131072 /prefetch:12⤵PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3288 --field-trial-handle=1920,i,6341332445081620811,367278844496147275,131072 /prefetch:12⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=5148 --field-trial-handle=1920,i,6341332445081620811,367278844496147275,131072 /prefetch:12⤵PID:880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4884 --field-trial-handle=1920,i,6341332445081620811,367278844496147275,131072 /prefetch:12⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5752 --field-trial-handle=1920,i,6341332445081620811,367278844496147275,131072 /prefetch:82⤵PID:3444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5580 --field-trial-handle=1920,i,6341332445081620811,367278844496147275,131072 /prefetch:82⤵PID:2564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=876 --field-trial-handle=1920,i,6341332445081620811,367278844496147275,131072 /prefetch:82⤵PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6628 --field-trial-handle=1920,i,6341332445081620811,367278844496147275,131072 /prefetch:82⤵PID:1772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3468 --field-trial-handle=1920,i,6341332445081620811,367278844496147275,131072 /prefetch:82⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=5004 --field-trial-handle=1920,i,6341332445081620811,367278844496147275,131072 /prefetch:12⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=6456 --field-trial-handle=1920,i,6341332445081620811,367278844496147275,131072 /prefetch:12⤵PID:1344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=7012 --field-trial-handle=1920,i,6341332445081620811,367278844496147275,131072 /prefetch:12⤵PID:2012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=6648 --field-trial-handle=1920,i,6341332445081620811,367278844496147275,131072 /prefetch:82⤵PID:2524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=6800 --field-trial-handle=1920,i,6341332445081620811,367278844496147275,131072 /prefetch:12⤵PID:1120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=5700 --field-trial-handle=1920,i,6341332445081620811,367278844496147275,131072 /prefetch:12⤵PID:1148
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:1788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD5a2951965e202bf00eeb9260431e5cc59
SHA1fa689260c9594c1c2a280eeb3fc11488612efa76
SHA25667438681e729025404ba0cb1153d82f3443e36e1cf8a95c6cb47ecb51f13789c
SHA5125d50c18a38cfa5c9b1d9c9ff350b8b0e901138a521cd888530a576deace222e203e58d34624268b2ba498e9068a6739cbddeb1808a7a4558235801813eecd442
-
Filesize
85KB
MD5008d0ae10f41631bb124d78799baf5bb
SHA1cd5956db2574b3e718d8e87f3e4af79e2a3b5e0b
SHA256a0aee1664677fce87357ff299c236f12803be313c1838a312d779ccf1ce0e590
SHA512e4c1c5a8d88b6e0caa60b3c6ce02c05b0b2653c478a788d9d6c330d34439a5f91acecd67dc6baa4f40cf8f4cf21a684a13162562df8e2406cd06ac3145c6216e
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
Filesize
4KB
MD588f4e659c02aaa582cb7c4c58134ec21
SHA145057e95bdcde3a10ed43c5d308c658ca93015aa
SHA256aedabad6fdcc9de6f43e2568ce5d68a670a39ab217eea48c9f8c34c9571ccba0
SHA51241d340b27c4afef86c8acd673126bc0b11a773df7df6a9aca55ac3bd3412173199dca79c4ca821ca69a672f80ad9bc6ac94a7ee8c434bd334709cdefe740906c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
3KB
MD57f96ae421eeacc8024e16f1cb6b8d8b9
SHA17a08ec13123ffc5f573cac348db8832bd60632d3
SHA2561331f0b3d24f8f455c6ebe07a8994d4bd7794e95a147bc824c440b5669d4ccb8
SHA512cc1d62c4174c9558c453371df049d24ca3f3bc818eaa1d0ce8dc37b6a85d097258d23727dbc466bfe8f90e462210b267b1ace11ed37dc18e72226fd862434d8b
-
Filesize
859B
MD59763ff67b2877db1a6a2d45df7d492c4
SHA12872fa8ea8a4f16ecf02ee8aad058355fa29c5ba
SHA25631bfe14de35435353741bd720a53a0b0c071f41960fee814326032fa0ed98f02
SHA512da8fdea1cc86c71485f792d8e6dfa11da1990b75192eefb19ba434c6631cdfcb8c425d43774b22de0c33138fb0dd068046342e84a72a1321221e1d29d93b750a
-
Filesize
1KB
MD535ab52b9adc0e1e5c31856f480c27342
SHA194dc0cb182940290aa85405b55b9a383ed7c4ee6
SHA256965786772bae959adedf0975f9c7101225bf0f9a984e192b16f37e56bea12080
SHA512b8ca50ec20a6bd1a013ae0fda180d78d55a0c87bddecd858604ae72bc17eefa029d4f7d2d494262f841c34a6c186061690ea9dc51416a5bb75e29433746c5ccc
-
Filesize
2KB
MD5ed42abee832ebebc64d6792a062abf86
SHA1d51feb5ea51a93a007c44427fccb9b8b66162bc8
SHA25635d035848d6fde2b33503ce58d3ceb303d1a65b8ae9b914f439a3b63bfe28353
SHA5121074bde3e1f728255c0a4944fe64d8e2a5cf1210743d461771d5d145476231578c37ef6801a195bd192b7e96eeda8c2fb7fb8a98a97c1561fcc02ac57fca4397
-
Filesize
3KB
MD5f1cd3049657ff03f4eedef315040f416
SHA1b296a832686a861a381e07309529fe63ada618b3
SHA2563a58e8e40f84aba329510c9fb22c5b879019a57da64fa476620068aa1fc8609b
SHA5124ecad5a07f413ee4d77e14a0819bf1eaa442816aec057c9e335eb9ed079d73d176cb1528524f9fa78b5cb1f6798333cd3d37ea995f6910ab1afad59900d6894f
-
Filesize
4KB
MD5b61cdac7add4a254486f0dfe1cd056b3
SHA16bb8891ef0a5e01447150dfe8cb8713d9f9ae966
SHA25635412ba16c2210341be286101efcc7ac1b4df1dbd8728a977ee9aaaab78c7b43
SHA5125e1c0784adcecbc5e9bea1869ebcdc18dca0ad57292f3905625b8d390962eeb16b23737d338f8893daf9aeda3965dffd9d8f3eea212b4f0e1d62dc1989d74096
-
Filesize
4KB
MD504d0001efa5cb58d79544a07efa604ed
SHA189e21ff90371fab8dc529e91086c358753174f9d
SHA256651ab91dc5cb8b81168bfea1b7de4f7aa344c3a904001fc80bba952e00f37353
SHA5128e8defbbcdf7f6af842f7f4766b80ca060b585df4f5c562e336774340947dc3e040fc8237a3d7896ee305b82f4111060ae766d0c7ecd843bf4052aa80c585db1
-
Filesize
2KB
MD5a8dd18431cd7103d4c69541c6326e533
SHA1facba63cee888e1adc19c63822f5a373cd23016a
SHA2564aedd86a9c5f0a53cd45ebdb802ebea48a71fa3ed78a290172dccc9aaf558bbf
SHA512aa81af2c63aa7e11260fecce97e8cc6be7388a0e6fa14014b83398a05be793105bfe2791ecda2490251af17cbe84f84bf278a8df740c413cff7cdcff3d08e039
-
Filesize
7KB
MD528c3db567154ed81bdd93df38fa48ba8
SHA1c1d8eea4f4d2275a2d851200fb1d1f80d16f8447
SHA2561b17c2d4bba75e15ba79e02376cafb37f2cc4837e803d545a7974967fe4c7a7e
SHA51230c90438361f2ff1650c46e066441dd96ab5d3a9027f05f9bcda9ce0fa5551c6fedd7f1e8f7a03fd8be579f746633c69d8bb4ea62114ea97c1ed5342894de1c4
-
Filesize
7KB
MD554e7d0fc1e414986034493dfab701fe5
SHA1ef3d66d086f91d5bdb6d12ce9a0643f524a41c0f
SHA2565476b031f0b3011dabfc068cc56b8387da0e7816bf4d5558c294224dc27fc008
SHA5126084822e54ee8bd854b06d395a139ebf3d4eef71e26316d0c63daa3d860e181b14d1ed4061da248b2b01dbb316cf4fb84d27554be96c2d45a5e16fd68efc35d8
-
Filesize
8KB
MD58e8d47e83279019d315285c5090dc790
SHA18d3b82c88f75e1415a44c626c13d855294ec6f19
SHA256b952ec246b3373b544c17348bfa2c1b9bf06b0fdc000295b5bfcfe56fb13c34f
SHA512521d06b133013b5500b2d435ced7908ccdce1097bbe9223ca14ef9b83a4d3f0903ccf736712208cb6f28fffa0e1be7147f308a57f6e14cd9944c7d7994bc1579
-
Filesize
6KB
MD520d439d5aea37dd7b0eee1472a5ef141
SHA1086163076ae19a6cc43ba378dad6abde82775cdb
SHA256dbb224f310cdc0492247e1c93615ee44402c5170eae203f6b1fa1d8458d57994
SHA51226f092040463727f0bfaad06d09b22ebdaaddcfd01183dc1bec375d328f667e6370b967eda7eb9ac09186aed29eea27a5514f32395041199eda27b6b91ce2198
-
Filesize
16KB
MD58ff32eb6ab52b2a8ce40bc0ba7ac631b
SHA1559dc422b028fbf0b736d14406d94f25bd22c1cf
SHA2563a4be0926d42a634523d7b192b14d78b44d305146c544335d9fab1128cbd22fe
SHA512db56c165503c10d5d049840dd5323c55beac4e90785c2167f70598bf425ffe5c78693d052a4380483de6ee745d20caa3792a77c777026e99b3a57ebe012fb6cb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize264B
MD5c8af6a97c51208527e8ef1ba0820792a
SHA16ec506360f9af1ca6cd0326d0b5638f8e4fa642a
SHA256141493e2aff4c5934d068b84181563c26772501860a6a2f2d468d2fa5ae52641
SHA51271678579659085dcb3630842da623a9dcdd68c1a96e3ffd9bf8a581687f95dc879c5da7db121b5fef4d723940135df1abd1c8d334bb364762407c317c403f1ae
-
Filesize
285KB
MD55b3a8627a406a557fd924bc20136cde0
SHA154db676da1dab97b8d508f1f128da8806e90be70
SHA25638b13fce8a207ab8ff612aa711974bb291b491d6e6d2f24ebea09e5bf353847b
SHA51217296ceaccc7ab6f56bf8a069dc76065acada70e49d907a49c5322326d32748c8c0d13e4b1d12b1cbe7570de510350cd96df9a75b828c14aa4155bf01e6c60e3
-
Filesize
144KB
MD598d553472bfc06250bf4688a6a724970
SHA138a98de50e0384fa1589bd32e354e1b4d27c4e6e
SHA256e0bde5adf34c8ef98b7437251abaa229dd6aaaea90168dfa59e3d3269d9d77ff
SHA51283a388f8a6d20bdcebe1821d299c964840d96d98a4e081b1e713cb6fcdd58b1f6ecbd2fda2665121df10c616a47e03af8c46a736a1ce174f41a566eb51cc41f8
-
Filesize
144KB
MD5539e4e0b34b0aa43ea2540c8810f77df
SHA183808ca8577c6143bf8d0f7a6c76b133edfc7657
SHA256b274343ed6890cdbd7160fcb8d3653c3cc93f3f518ad1dc1fe776c0f3f7b7947
SHA512ab38d09bf94563b108ca95010cccbee527bc3f3a01fdea6fed5b58cae795be54917fb55ff6e29550419f75eab4fa9cf3ed5d105672d4beb101d50a3967496776
-
Filesize
285KB
MD5b2c0dc84a2da9e78f13999e1255699b3
SHA17ece36a05252de850725e7f448bb08e3adac7ba7
SHA2567585b6edd711f0fa3d2d4b7ec26abb9996bc172f118ce2af89d978c403aa507d
SHA5123d454fc550a6f0eff3e34f39f2394d42acd870ec3a6d6cde15ee67b8a38c404d8afe46fa27d827dd4a63accb56b285d7f4d737be775d42ee2e68520940ad0343
-
Filesize
285KB
MD5af713911b271f73d3df160d6fefc0f8f
SHA13bd2943d8de7d104eb5bc67f6b9db8adf5cbc00a
SHA256b41d9ecb04a2f2bb728d970169ebe24cc618bd3b74a87908f47e73062713954a
SHA51213c0d4cddc353b2b812ebd97f01be5acaa1aa7b0475277e85e97753b92280a907cc9ad375926059772367b40b4aa4e0d0a2936d6ea3f1b654843109709a37695
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84