Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
11/07/2024, 05:49
240711-gh3ecsvala 511/07/2024, 05:46
240711-gggfhasakr 311/07/2024, 05:43
240711-geqama1hmn 5Analysis
-
max time kernel
47s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11/07/2024, 05:46
Static task
static1
Behavioral task
behavioral1
Sample
lxgs_destroyer_9000_️_🔥.py
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
lxgs_destroyer_9000_️_🔥.py
Resource
win10v2004-20240709-en
General
-
Target
lxgs_destroyer_9000_️_🔥.py
-
Size
7KB
-
MD5
7f392adfa9733c8d7011f625d442ffaf
-
SHA1
80a85a1ff51608abc3b3f9ea65b0a2e09503f8c9
-
SHA256
dafcf2e5192082a3dc33b2c82fa70b62c661a5fc548c6494ec590a97ff53e702
-
SHA512
d7d06a22c8e5585ea2a641c349d6dfcd72e828e88824500a4c2ef82153161e1f044f208c304f7a70965b96d3ad142903fca1933669671d384eab0763164f088b
-
SSDEEP
96:M4wzpIKNcDOjmiDxYhkAevEYGdPiAQmPyFVGDeCae+M4KUOhPKM8S4V:KpIKNIMfBvvEYgaGyIqowKTT8S4V
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2536 chrome.exe 2536 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe Token: SeShutdownPrivilege 2536 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe 2536 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2840 2688 cmd.exe 31 PID 2688 wrote to memory of 2840 2688 cmd.exe 31 PID 2688 wrote to memory of 2840 2688 cmd.exe 31 PID 2536 wrote to memory of 2548 2536 chrome.exe 33 PID 2536 wrote to memory of 2548 2536 chrome.exe 33 PID 2536 wrote to memory of 2548 2536 chrome.exe 33 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 2164 2536 chrome.exe 35 PID 2536 wrote to memory of 788 2536 chrome.exe 36 PID 2536 wrote to memory of 788 2536 chrome.exe 36 PID 2536 wrote to memory of 788 2536 chrome.exe 36 PID 2536 wrote to memory of 1312 2536 chrome.exe 37 PID 2536 wrote to memory of 1312 2536 chrome.exe 37 PID 2536 wrote to memory of 1312 2536 chrome.exe 37 PID 2536 wrote to memory of 1312 2536 chrome.exe 37 PID 2536 wrote to memory of 1312 2536 chrome.exe 37 PID 2536 wrote to memory of 1312 2536 chrome.exe 37 PID 2536 wrote to memory of 1312 2536 chrome.exe 37 PID 2536 wrote to memory of 1312 2536 chrome.exe 37 PID 2536 wrote to memory of 1312 2536 chrome.exe 37 PID 2536 wrote to memory of 1312 2536 chrome.exe 37 PID 2536 wrote to memory of 1312 2536 chrome.exe 37 PID 2536 wrote to memory of 1312 2536 chrome.exe 37 PID 2536 wrote to memory of 1312 2536 chrome.exe 37 PID 2536 wrote to memory of 1312 2536 chrome.exe 37 PID 2536 wrote to memory of 1312 2536 chrome.exe 37 PID 2536 wrote to memory of 1312 2536 chrome.exe 37
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\lxgs_destroyer_9000_️_🔥.py1⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\lxgs_destroyer_9000_️_🔥.py2⤵
- Modifies registry class
PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef78f9758,0x7fef78f9768,0x7fef78f97782⤵PID:2548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1096 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:22⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:82⤵PID:788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1588 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:82⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2268 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:12⤵PID:2608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2300 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:12⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1376 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:22⤵PID:344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1316 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:12⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:284
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fa37688,0x13fa37698,0x13fa376a83⤵PID:1056
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3648 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:82⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3720 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:12⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3664 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:82⤵PID:956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4008 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:82⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2700 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:82⤵PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4000 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:82⤵PID:2520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2056 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:12⤵PID:2456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=1040 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:12⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=4032 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:12⤵PID:2184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=852 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:82⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=2808 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:12⤵PID:2488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=2776 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:12⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=3692 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:12⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --mojo-platform-channel-handle=4136 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:12⤵PID:772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --mojo-platform-channel-handle=4128 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:12⤵PID:2528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --mojo-platform-channel-handle=3904 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:12⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --mojo-platform-channel-handle=4060 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:12⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --mojo-platform-channel-handle=4100 --field-trial-handle=1368,i,12565167316178304211,13216452370712295684,131072 /prefetch:12⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582d7915137de0e441c98bfffe81a249b
SHA145e0e3c2db7b76d8642a0e0f9c38c17d67d8cac1
SHA256e1576b7e65a241e8ed62cfc97e95a389d724d3625c032a4c7e34d197bfe69f71
SHA5123783433a6117d349b275b6add3945d69bf9efa3e8c33131f12bf1577f970c6b00b70260dad0adf4fe33982328964fba17da444c08f44943239b2295acbb9c211
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD522245aad4fce7c493421f38e6fb0a486
SHA117a9816ea8bfa478fe45b8626295e0f2a1ada2da
SHA2567cde8b6e85e07fc69e623604e50bb1dc957e363a1b1426c8630ac50f886f6ce1
SHA512e13fa0493932ba18f27f63c57c6427ea53dbd229b45e40874825e251815a4476ea21f14f846253536e2d63b0cefa5c97277b8456749d34c288b3936ffb1d73d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52891639bedc06d72fc52874acb0322ac
SHA1f47e42f987c44d5680579e19f14acd2119d548e2
SHA256d861bbec84a59619678a247cfda2e00a5e3c24824c5f098c26625c98dee5065e
SHA5127a38a73252446ceadf97ecaae71bdfcc53913013932d3606850ec49be146845c6872a1691eb8a13a5e50e3e7ae752082f8c273ebb1c4fc6531774aba96d2972f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58e127e1d3ca0eaaf169d335d413a83e0
SHA16014646645e12ed8176147ec12e0108c870a8664
SHA25637ac3d99c5ece09e05f8440f980afe380976f2d22ceb6af4a9434e42678055e5
SHA5120af8396730416e7f114b7beb87c33dfb17021529e32aa2e835012128921eb5673434dae3f5366cbb4f2e8a19f050775b3076c86ed0adf97505a63dfc045a8300
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e3e0f96e50c77fdaece845b5a50c12d4
SHA13a51f012af6c26e66462b0a490d5e8f7592becf6
SHA256b67cfaee6f07021019d8a2e931b31480b59855d3a8b8873e6e121ed843b95172
SHA512ba0d752d1f4698ab84733bf3a889f903f8a403387b05d8536c94327ba9add6dff4a77ee78c64ba6c4f7103edc5b54c24d523c5e6353a758372fa48e77de5148c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ad0d6eccc23ce06838b52c3e237baef
SHA1d490741c2f8694f9f4d1d39820fc407a8ed7a5fe
SHA256958f6c4f7700e4f61a9cb1ed8f66a9ff44775f2879b578be3159d53dc339c1ea
SHA5128a41e8440f275db2cee987a8a1d1c09f56e67279a4969cd05afa866c3d56fc13cd76ea95132b17ce78843bd780c9a4b2e0169505922a473e1235ef81930b1045
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD548c429cd2056697ffe0a320e44005269
SHA1696b0608617ac0329a6b1af87e1d5b54aa1c8ca4
SHA256a1ed797cf71a5aac8c9cffd3835322c6f0cd9edad3a4745f2eb0c2ed3bfb5737
SHA512ed0f658cc07e92c33e897a27d0e7b245ae638fcd032ea14d18745169f228e4bff2332c7838f10bae7636ff510b6af192148a62976c410cb7952721264c9668d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c8726bd06ffa0939b6252180b3b45052
SHA15e5483d77b6b4b6160b20bd8fd7bf1a0060c02f1
SHA2562efa0355bee3e971b7b79749cc2717b52a033c0775de07f9bd82fc93401d9561
SHA512701ff6e1c469f25909aef65f8c0f8997e1114bc3dd8e1dc4ea737d5ba52af64dbe4bcae6196a371753dc42bad2cbf2ca499bc45c5b6ab78485fa276c117949d5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c9bd7365ce679e230be475d1ed5de52
SHA1705c1d9dc44cf6efb2602074d8b0e922f6eacbb0
SHA25606e4a4cfd83a01ffd3a1aa5eec6afe0b8037eb68890c0819f9c1548f5eb3cefd
SHA51248e403cb3f615a62e3fc4f5796895f47bb1452788eec8ce86038276ece0eb9e302eceb12bbb96bdee7534042f6a8fb7c8aa6afc3e39f36d02ac3a9422ae705a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575a6f2c30a4e6a3d60d244efbb2ab65f
SHA1f7dc8d714e6a45ce0cc51bbdff5dae085d0cec7e
SHA2564fb6ba7c0bad1b2eec7644715e5859befd373c9897551fff853f10e6fea7c5cd
SHA512f604c478911f3839e8dac707a1870373eba626237f66affa84eeb5d52f66ef6e883da9127091e3e131d7fdf7976639f426495ec09b74fa9d09d5e98435d2e842
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD557d756def0d54d9296d4bc322d26361a
SHA1b0c656869f7858e4bfde04b558ea0d6b1a58fbae
SHA256c87315b96a6fc4d5d304940953b808d59152983a5273d6456f6e6f32fe665a13
SHA512e446b74782ea01beb5dda807f5c3d9492a004be421a8c37be51600791cdfad81444e67c1f2b223a90e86ffab8bc280b888ea88d41f94db9751639529ca283db1
-
Filesize
31KB
MD51a73b51620eb495d413412a2a0aaf61d
SHA102ac8527c2bd3171f071e34f95c7e1c10c0c4c1c
SHA25699393fecb38b8f64a6296d1fea8e7db57c9b51c0337b85da08dbcdd6c3e75b31
SHA5122d4f51709ebf2c5247b35bdf56bd15675832c187a3e7c4e5a27e73c85f15cc2f0bd9352881bbd5c3ba2b7a8ab5fac3c6a36d27092c64ffbefef4bdcdbe0be461
-
Filesize
211KB
MD5151fb811968eaf8efb840908b89dc9d4
SHA17ec811009fd9b0e6d92d12d78b002275f2f1bee1
SHA256043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed
SHA51283aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674
-
Filesize
24KB
MD5c594a826934b9505d591d0f7a7df80b7
SHA1c04b8637e686f71f3fc46a29a86346ba9b04ae18
SHA256e664eef3d68ac6336a28be033165d4780e8a5ab28f0d90df1b148ef86babb610
SHA51204a1dfdb8ee2f5fefa101d5e3ff36e87659fd774e96aa8c5941d3353ccc268a125822cf01533c74839e5f1c54725da9cc437d3d69b88e5bf3f99caccd4d75961
-
Filesize
1KB
MD5ecff02a771c08fc865761da8f9c57ca8
SHA172de6869799d14a605ea7dcc25ad4cfce3b17aa9
SHA2569166ff713170f6f4d9acf11e9361571f7bec213e9efbe7c2ce0b00ffb9d2d7f4
SHA5128e7c543e1dd219c5b799d19b6c2452a3dba3858b06dbc00a252fa37c870b80546999831341ae2d422d30f4f7e752ce897f92d237513841bb9b1affea8e61f807
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_uk.yahoo.com_0.indexeddb.leveldb\CURRENT~RFf773fed.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2KB
MD57652b0fd4543208054344f2210abb143
SHA1cabd06f143bce700d51d3060916c2a5584f493f8
SHA2561e649acd4155bb30dd1a5144d10f7bb1e34b2c7e0d833769c17445e4416ee1d3
SHA5121b43e750c2fa9a8945b794a730de89ae5e5fe7fbf120d9cdb1a8a4d6e238723093d5dab47691be2d856aa94029540943b6e48aa68c6391a4dcc1e8be1d9672b9
-
Filesize
2KB
MD596e5806c20e9bcedcfb0c3bc68e46f65
SHA14a58d11948c383582d4ae029e03aa4af5c837cfb
SHA2564a2711da5b631be95affe561d0327065283c225bd8444e68100d777acb168921
SHA51285b28513e44500302464d7273209383ce24814d254128ac2c4a8e76019466aa3032c4ac5d311198fe0cb43bf03666798da2296fbf2f32c293c4265cd38a92cf6
-
Filesize
2KB
MD5f8f03805eb2b45b9c33d5372e459b553
SHA1889783cec3b48b39f308471bfe2a2b77708d939b
SHA256b85f5efe1e7231d0c7e99b846544acb47c67e761c940ef8265453542e8289ea6
SHA51276c0ecde4ba5a055f903592a1346fd8c2ec94d2ac57b3ae64e29a24504b57897b4317f217f22fc955ff66bc60888909a9418aaeab56949a5a1b232c149b16de4
-
Filesize
1KB
MD5e4146f3e64f0d86e58cb52f0925452af
SHA133aff547f59faa6bd8d2ffcadffb913b7a3c5e5f
SHA256fbe87a6f8b0b434d9b2080041f75c1ee9da39f0f1604252b89b24bf8f16f61b8
SHA512df40f0979b3b6ee1928155ad81852dcc4e2029ddcb2425b1f81cb3387689fc8b2b2fa6f37308791f6224bc34424c2b6b91c5c38b01b1e4f47962034c6c344455
-
Filesize
2KB
MD5ca5f8908e526fab46f4a22ce96a7c316
SHA1438aaee69866f13cf580a68d1c469a1c06618979
SHA25671f45873df941d6cd580dffcb87179804f2d13b711ffed09e75d39be7bd7bfaa
SHA512cf53fcab93b7a12c54e54d39f2da48ec9cde8befe97e3b20639b9c7ccafe940603d60d623cf0f9415d62771dd18dd4c8c8acea4fddc74a2a4e34ccb47cedcbf4
-
Filesize
2KB
MD5403b1eb05db1345b231ebe1c5c8db702
SHA15c9f44efb45da246794df551d3ce1236c17d714c
SHA2568686afa6d0e073f30ccf571e8fff1bbced4323ee72291794a63f09367693f581
SHA51220bf118d2061fd7f30b4150ba968bfb6ec825155efcc1975564d308e7e4468863b8ad4d157fb305472ac4aee9018b9986debc60ea3be9fe82fc4f6063b8f7e89
-
Filesize
2KB
MD530e091bf3d6d59cb22fbe8603bb64a37
SHA1a570d9218b49eaa680d73efd05f27cd7f6a4ad5a
SHA256a335ef7cbc229109580632664f5c3e285ddd9a4805a8ab7b157f30a237dbb484
SHA51255d2b440e3db212f7d68a1e9a848e003989e65ee0974a63334a36c6b1fd9b9a254710413f24918eb63bf0e06a05fa198ad42d5ad6ccf2ebe927830900c7b4f5c
-
Filesize
7KB
MD517fb3e2e1f4e995ccd67832661d39dc7
SHA13c7861318f60c3110369bf2b2bd7787378add852
SHA256c10c1ac419a5285949ce3d69d6daf8915972446864b7b60edab0cfb67fd79aff
SHA51297f56d6eb9857233bf5e25fa6256ff1abbeb4cba1dd31a89f330ee5fb032091506d7e510500b76d6de503c1f8a6180bb238cad80e96aa113203ac19377dd3c8c
-
Filesize
6KB
MD5924b55c595f60e9f047c559c047f715b
SHA107df1430522242b4f82f1d775b8f8abfeead1b60
SHA2567439e5be10501eadd97f664203b9c7796dcf46f100645f4f1122fc8fae3e0a34
SHA512b6fe136c03326e7b02ae3e879595f28d1d4782eb9898f8daf776424b3a1887837b0e0b534463a4654311ad8339a973dc880552db016c1212ca8536fef381c3a6
-
Filesize
7KB
MD55d823ad1328aa830cbbcb3ec6302714a
SHA172f9a3a9cac6ca2a1c638a642f05f6cd84ffa373
SHA256d5a61528fce2ca031e7e8c3c66818b97d040dbe7beabbabf7ca086d833517e0e
SHA512cfad486e31787767b8585d630627e2c927274d8b13ca585339378699f532d1bd52072d84d27f01a93dc6a54669a7cdb3cae9d05bebf81a0b58f942d094add8b3
-
Filesize
5KB
MD5fea6dd840d15cef9d04ddc34edcc306e
SHA1f9be0b6f1cb6753023ca269b5e4d262bb348665e
SHA25675bcf9797dc38b55a3b95116e7aa14e789f4a077ec2749456b9a08c77ef5f1d7
SHA512fb4031fef6958dc188db9c99c35901bc9b852b3a9c517d87cd74212bcc1a3df9f2dbb7db5ccaaab572056b80b59bbb5b35ea52027ba79ee183a19159f4895a97
-
Filesize
7KB
MD522f3d0b7696a8570c3871a5ec3b1e8a7
SHA1e29f18783d9155df484faaf937d239aba56478cb
SHA256e358a91524a81d419a5b6e7a26e5823c713ef06220d1579a5e87a4f8b4a12ab2
SHA5127a9945847e2c2ded3a84662630bc82cb7b9fc6559afdb01e0b78f66c65e856a2a5551ba552db646627f70b6ea426ebdd31f4c3c5577f2bb73825f67fed80aa30
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\e19e2128-2d1e-48bf-9889-b99033cd2c37.tmp
Filesize7KB
MD5cf972ff952dac2b1681a0bc7e3ef3c24
SHA16727494383bdda614a08a79b0cd8c0d06c1d7438
SHA256b494b43ef39f9e22ff5a40b00daa35d6178cf5892539b65c3716256271510827
SHA512a077801284cce42e36103298135ccd82159319f37e6ae876e047ee7c1c0cf753780223eda7631249ab1efb99ab9e880184bfad923ec23722af275e2f53b18208
-
Filesize
304KB
MD59e590f5ec80cf6ded21870fa7445105b
SHA1a58b24b3683563eafb4397cd59b081ab6e076224
SHA25631de2d001a5da3154ad103feea3cb455a11642b3f5c8dd5a3859e392016bbaea
SHA512af851330b254687450cbbb13f535b12672f52ae4fba44b721a19762c829ee944327b4ace82670fd1d1398a87996297da87054b44fcb13e6b0a86a80c41fb7416
-
Filesize
304KB
MD5cea08bf895b0ad3897ed24d1c5d5f380
SHA193fab42d5cb964a81f8c59483d05f53823f184f4
SHA256a1ade448d9b1ebc0ec25af72034d0ded900c518775a5c2faf9fb57a012ff77f0
SHA51209586f14776e0903dc6f407c3c11b8d727556d566d979a27eda96ac0625c58f9ec9731bbc121de5498b13179ff3a99d3d9eed286017ca9a5ca8d05223bbc134e
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b