Analysis
-
max time kernel
225s -
max time network
766s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02-02-2024 11:31
Static task
static1
Behavioral task
behavioral1
Sample
setup-lightshot.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
setup-lightshot.exe
Resource
win10v2004-20231215-en
General
-
Target
setup-lightshot.exe
-
Size
2.7MB
-
MD5
a1f6923e771b4ff0df9fec9555f97c65
-
SHA1
545359cd68d0ee37f4b15e1a22c2c9a5fda69e22
-
SHA256
928c2808421dfd487ffa697379548cbe682c0e13aeb595eb89973ba9c515b8a1
-
SHA512
c9e54f48208151dcf60bf049d09a5c69f6ef7e4f046359fdfd50c61d49a6f9a37c3d3a2016d4beb70ae47270e9e9689e03064c02bee1e1d3d95998000e47f153
-
SSDEEP
49152:/i85nVhfVnQiGmEwZbyVKf3tOOr/o2rm0mMXgT11rNjiG0C+0LRzasw:a85nVZarmEwZecPzJWDLN+GwOnw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1836 setup-lightshot.tmp -
Loads dropped DLL 1 IoCs
pid Process 2080 setup-lightshot.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell chrome.exe Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1836 setup-lightshot.tmp 352 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe Token: SeShutdownPrivilege 2284 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 1836 setup-lightshot.tmp 1836 setup-lightshot.tmp 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe 2284 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 352 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2080 wrote to memory of 1836 2080 setup-lightshot.exe 28 PID 2080 wrote to memory of 1836 2080 setup-lightshot.exe 28 PID 2080 wrote to memory of 1836 2080 setup-lightshot.exe 28 PID 2080 wrote to memory of 1836 2080 setup-lightshot.exe 28 PID 2080 wrote to memory of 1836 2080 setup-lightshot.exe 28 PID 2080 wrote to memory of 1836 2080 setup-lightshot.exe 28 PID 2080 wrote to memory of 1836 2080 setup-lightshot.exe 28 PID 2284 wrote to memory of 2056 2284 chrome.exe 30 PID 2284 wrote to memory of 2056 2284 chrome.exe 30 PID 2284 wrote to memory of 2056 2284 chrome.exe 30 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2768 2284 chrome.exe 32 PID 2284 wrote to memory of 2544 2284 chrome.exe 33 PID 2284 wrote to memory of 2544 2284 chrome.exe 33 PID 2284 wrote to memory of 2544 2284 chrome.exe 33 PID 2284 wrote to memory of 2580 2284 chrome.exe 34 PID 2284 wrote to memory of 2580 2284 chrome.exe 34 PID 2284 wrote to memory of 2580 2284 chrome.exe 34 PID 2284 wrote to memory of 2580 2284 chrome.exe 34 PID 2284 wrote to memory of 2580 2284 chrome.exe 34 PID 2284 wrote to memory of 2580 2284 chrome.exe 34 PID 2284 wrote to memory of 2580 2284 chrome.exe 34 PID 2284 wrote to memory of 2580 2284 chrome.exe 34 PID 2284 wrote to memory of 2580 2284 chrome.exe 34 PID 2284 wrote to memory of 2580 2284 chrome.exe 34 PID 2284 wrote to memory of 2580 2284 chrome.exe 34 PID 2284 wrote to memory of 2580 2284 chrome.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup-lightshot.exe"C:\Users\Admin\AppData\Local\Temp\setup-lightshot.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\is-8B383.tmp\setup-lightshot.tmp"C:\Users\Admin\AppData\Local\Temp\is-8B383.tmp\setup-lightshot.tmp" /SL5="$40128,2148280,486912,C:\Users\Admin\AppData\Local\Temp\setup-lightshot.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7a59758,0x7fef7a59768,0x7fef7a597782⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1200 --field-trial-handle=1268,i,5677421919944599946,14954963849761371051,131072 /prefetch:22⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1536 --field-trial-handle=1268,i,5677421919944599946,14954963849761371051,131072 /prefetch:82⤵PID:2544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1632 --field-trial-handle=1268,i,5677421919944599946,14954963849761371051,131072 /prefetch:82⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2180 --field-trial-handle=1268,i,5677421919944599946,14954963849761371051,131072 /prefetch:12⤵PID:3044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2228 --field-trial-handle=1268,i,5677421919944599946,14954963849761371051,131072 /prefetch:12⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1500 --field-trial-handle=1268,i,5677421919944599946,14954963849761371051,131072 /prefetch:22⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3212 --field-trial-handle=1268,i,5677421919944599946,14954963849761371051,131072 /prefetch:12⤵PID:992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3216 --field-trial-handle=1268,i,5677421919944599946,14954963849761371051,131072 /prefetch:82⤵PID:648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3428 --field-trial-handle=1268,i,5677421919944599946,14954963849761371051,131072 /prefetch:82⤵PID:912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3656 --field-trial-handle=1268,i,5677421919944599946,14954963849761371051,131072 /prefetch:82⤵PID:844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3668 --field-trial-handle=1268,i,5677421919944599946,14954963849761371051,131072 /prefetch:12⤵PID:3024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3792 --field-trial-handle=1268,i,5677421919944599946,14954963849761371051,131072 /prefetch:12⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2508 --field-trial-handle=1268,i,5677421919944599946,14954963849761371051,131072 /prefetch:82⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2484 --field-trial-handle=1268,i,5677421919944599946,14954963849761371051,131072 /prefetch:12⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2076 --field-trial-handle=1268,i,5677421919944599946,14954963849761371051,131072 /prefetch:12⤵PID:1108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1412 --field-trial-handle=1268,i,5677421919944599946,14954963849761371051,131072 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2408 --field-trial-handle=1268,i,5677421919944599946,14954963849761371051,131072 /prefetch:82⤵PID:1936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=4072 --field-trial-handle=1268,i,5677421919944599946,14954963849761371051,131072 /prefetch:12⤵PID:1900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=3972 --field-trial-handle=1268,i,5677421919944599946,14954963849761371051,131072 /prefetch:12⤵PID:2496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=3716 --field-trial-handle=1268,i,5677421919944599946,14954963849761371051,131072 /prefetch:12⤵PID:2296
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f92c2c6b35e38d5ed85b0e986dad07c7
SHA1f2bb85edf48a012e1ec17321f89fcadd54191a7c
SHA2566fec9010833ba4d53163b856fdb617a440c350e03b18d6041af40a7a395b3441
SHA51287b7800b30ad279093b4fc5cc7437a803ae40f5c7a7cdb908795344c4d2557bbb6092286aa0246b937865cc59b7dcd812fc45a40c12c04f03d705ce893d1ec6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5188b13092931738447f863853f91a098
SHA1271014366e2e03bb1fae8349e5bc3de5890c2bfe
SHA2563a38d7bfe26cd79e125fae66995ce6dde7437641977e888abac52b908888c284
SHA5120d394af006a16c0ceaa9534a77102e7234e990d8f93dee9499581201726def6fbf8d67bf9801e90e2d46752e078fd81022bfb2d41ee887eb27eb088683ac770c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD552efa4c7d11553fc406ba61e9685a8b5
SHA157d5ed9ed41cf053f57ec75bde29e060b5c05b0e
SHA25626654225ae6f6dede13f125ac3e827c181911fcd9d494e7c448b551cc61077be
SHA512fc87ed8bcd8b9599c382051c8439a2d4a9a5e5d2689f8e9b90794109234a36f66f572fef3632f2533d078eb46daefeaa5315f7ea496183b3bd6ed13098722249
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d684a54bb8905a27ae3ab541cc2b5551
SHA13958299d0b57debb22831ec8dfdef7c8622603d5
SHA2563e68967b55462789d2067dacfc9f957d93cfac058152cf54471488cf36b734c1
SHA51217c85117a8f53a6482c941ced1c2e35bf0fa7861628d48859bfe264f31bfe9726172274e60587a11136017ef3620f3c3848eb0ec636693feb767dfdab99a7cde
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5699ada4075902463f0c9a5ff3b38d6f0
SHA1317e4b109494510c2d36c3efd3416f23628c8a77
SHA256bd42d7af06833b32b35f52c083fa78c18dc972535e16524ac3f2b883c3dbcc81
SHA51295d370f23035d6e5fab351ca8eec11ec54289e93b576d419c6be80ebb144f81fa294b79a53acad9750c2c9f67537afeb58bbf8465d86d4e4d3e7e8bfbc1a6ac2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57ee90a2f43adce02f65b6bb37a3ffa55
SHA18684949be1660b3afe613e928ca8ed6bf1bcbdae
SHA256ba1651e36b6eabf552cf45f66bc5f4ef365b532ff855161fae51644429ca5939
SHA512f1c8a37b5b07146997c391d783a6694c6f3ffb5fbcb43cb0d9ac57ebabba4963a4d382fb511ec8ad52d3f70db680a79d072a8ebb4ecdb6c2b7504b72bbc64120
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD585735fa02c35e4e793555244ea9c1236
SHA15600bccde85387e389359b5b69335c75e6b9b391
SHA2560eb2a925d0553eea914fa8efdb540f026fd47af58df854f639762a0df556c22c
SHA512c0f23b04956ca0433e8946061b044d0477294acece52ff5bb3deffc2973e2e72acee66bd339629a625fb324fa221d2a28dff82d0ff6e19ed623ba0e96ea053e4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD570484da2b8d632be6cdcd8c3679a3052
SHA1f835bbf319227ed12bcdfda60ea2ef0db4962886
SHA25639efb7d429d2dfe40e4961d9da89811a0fe2f944593dbba8bede4da25d2c3f65
SHA51212dec3aa8f26633efa92a3adeb296ffb3e15bdb4010706ed1220144b9d64cccb037b70560017008071d31e5133555fccbbbfe94fc13ffeb46f5f2eb14e5e6d84
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f6203b48224188ef8bf06daa30cd9dfb
SHA199f35ea86aff4bfda8a3c8b4bdd36f3dcc88104a
SHA25623fbdbfea5811c57ab7a229afd45d824622e92ea70a9629522846762bb3c595d
SHA512d6d92d8e116f852b40a9d331609cdbd2e98290398e8d6a04d77157878c3adcee589c9e23b57da1639a0144cc500b8c62e05e522df6469d724f174c530852c4e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e0a81296b5f274d060c107097c64f6fa
SHA1e312d7893b06fa8568046b872a7123a3f67c5d27
SHA256d8365cae690ff8f2a5edd1bba501a3f16410bbb8c0c414ee11e8405cee1a2560
SHA5123d413fe39ff92d70f13a7adafda18d30b2375e8302f3b84f9bcdf5a66b7eee2fcd9ad7903e8929c7605d7081011d85beab9215c78741c99568e5d110fce398f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59b49b6a7645931caf504081a88abaf92
SHA1cae7f198b9539f14d74d8e2ba18b92c602ea670c
SHA256b3aa6fefee7969e953e7163fa007527a8c1f35917917e5d5bef76fe0b70f8fb4
SHA512d99315c427cff6e166b002a4b95c86aa0383726e43c25026321160ee058662b1f272007c527521f3ed83fc31681849b4da9e7371c654cceb17ab31d1135d9f56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD52162b29a0e223c85deba2cd4f50a5528
SHA1c52914c76026dad86b7a10a4092ac1a18d73f393
SHA25626991946dda3237d5c60811587d5c0970b51729786b03bdec097873fe565a821
SHA512cd453a6e4ca3597147ebc27256d7f38f998665824e6a156891b35d1f5e242a561d8a8f9576f248a383f3e5c5237c744e9248b9041a21735b759f4a336a576bd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD529cb9ed4b673e912834d3b7044df21d1
SHA155c63d3760f5cc73ac5bd925b7d44efec8baebd2
SHA25674d4e79b1c9e7458d4fbdbd040f1a79f7646d5a5f964cf3c9d90271a4065d4cf
SHA5123062cab031876a8cd1362ec5db8f88dad131d8a970ede93c52cbf06dd634991751ce6407d286058f6aa125a95ec7a35bba9c9650c96add69a97a670fe4af03dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56d6f24fa999e52503edb3b5d3da4b2f7
SHA147b0f7bea5dc50188d052dc856fb9bff58ae7219
SHA2566d8d852a5e40838a24da7f7c9e112e9c4f2f0ed58de30f0abc93fe6221796a28
SHA51274b578da487e3ebec223e7958de29e307920e1f5d2b7bff4b24281f4f6be87c2fe465d3a05f7cafdad281d3d8c5cbdb4efbc2c201df0a626eaaae0358028fca0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD580ba389ce3d97fc34be1eb01e1da43e8
SHA15d8dfcdf91e86c865210524f15eaaf74d017f7ae
SHA25633b35e5b7ca43410c181ac1459c39afa2cb3d2ec599fbd3bbf2d4fc5bd3ca0c1
SHA5124a718244fda58244af35479d6ee6cc8bc6cd5a757603af20989fae535f7607f6402c1e37a3ba2a3914dde7bcada221ec7b7b4389f7eee30ef878deec65c8443c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a0c17b74ab0450c87d6432e12d6823a7
SHA1bd955bfbbae4ad6849cb046b350c4b80e6072d48
SHA2560bb6a330db3c3b8e24f1d89f79a856e51479cf98d699d1ccc971ef922b2f1473
SHA512b65ca3d4bd3c7e1c41f788d34aed6802de577f2f66d44635d5357e9ce42a3846bf4eab1b88cf6b7a84f9ab067c8ec76901a69a8439ae19cddc89be6deb8aa5b8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5dc9fd9110a6a79052b433b3732d6ea4b
SHA19fc29801bbd220f7a5ea032e30decd2689f1dca9
SHA2565a941ed9e1ffda4b994aa9815a658cabe9c57ccb9e0d9898dab2554acb7a1276
SHA512ca90333827dd7fa802fc8d4940b0037dd715d8b2ced133cf22e853e9b4561a746bfabd52b3a0a15ee1dcb6a55c2e5eb8b2dcad3e4788d751c069ecefe53c6495
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50b246615efcb1a278219d143b18df953
SHA1f0712027c2edd35e9aea9ac84298080127a52d6a
SHA2566c7aa6296f2be529160c9406cd381e9067df61a265603fa3ea3cf5bea03d3e3e
SHA512b644a43a6dcab4212550f93b32a299551833ff00b8f7bbcd78b8f975599baa8f28876e390493e240fdeaebd35c1bdc4cf33226ba919715a53175ddafa6e8d4d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD540d511051e2452c4248c82e77c9d3c14
SHA14bdb590718b96858768a1c2997e9f07aa3bb5f28
SHA2568fd56cbc7d328069dcf25c2ce9c3bb031e7df80bd0d34b760d59e97daa6b6324
SHA5127bcc2f8022e516782c84e3050f61983c1e9a6828d3bfd582a6e438aded599152bbbe26c39bf816ad89f71a88ff7b347961fee6287b712e750296d875fa724440
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5906ff6fdcc5f80f9d124112227543da3
SHA1c4f02112e834b826b1f6a959a7757777af58832d
SHA256d38ae4266f754d2ba3bf9e08db54e1846efa8e3a3dbff7eda6b4359e6fd756e6
SHA512f77f35af8d5095ef159f8bdbf19425d734357ec4bf7908153eaf90fb71c69b08c84158b387193f08551f1e1d1988bcac6dd8a6eb06325fda9f3694fc5f446339
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD50a9ffd16ec00bee4e261ecd32c2076bc
SHA15036cb376f01e4a15f8289e3a60f9e9aeef7160f
SHA256c062959aaca48db713e06639c0ef9cd6227d487cb394408489f8e24b5e77586a
SHA5124d691065c2340982b2dad6898d0ebfed3cdf10113421fa6184de54638b18c27077b2e9707b4035dd19dbbcb12a0f1257aa4b2729536c9ced6ce60319387107af
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5b3e0cf8e561bd517a3b0b83aab865cae
SHA17c5f0c9daff7a1f4dc6001663c1086b8a4488a15
SHA2562899ea31e1f2d022959e07cff3871ed8fc53a84708ed5828381f55d3938b5295
SHA512ad742bab6df8c44a94cf90c11f3b1e1db747da51827b9ac690b04c5de7656be42bfe9cb28f86eceb6eeebc007f24a4f333b641460d52347d3278dd79088e66c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bffb847cecb8afb52bdfca2e2e0fdd2a
SHA10d3f0f00145eccce38b5125d57ece12c712a6965
SHA2562b1082545256c48d97a621335aedcf8b0617f80f90415cbb0fb58b414130c011
SHA512ba02a93d83dbcd6eb2da1722b138d99dbb5e313409884859c724bdbf4ff385650d8faac97f40446dfcc68826a97568b167ab2f5553c40501b79f4975eda51571
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD587aea67da2075dd37b8515fe13150c9b
SHA1ab72c0a5955982154a898b705b0edaf0c9546125
SHA2569e0bfa323630c8edf18a86fe25310b7dd8e1e92cf8063fff662b54844cf2cc81
SHA512829f44cfe9e883c35cb9c6b1b990c97cbf977efdfe9909e3fc852d707dbd25d18c328c81bada082e50f858f281a30b26d0711006fd6caaa4ae3d9a075a3de0e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f59328553fe520cf301a432c4f8f1767
SHA1d809e8e36f829040ab9fa71d6a10904beef21bd5
SHA256e17855b584ad3c2b94b8c46bbe8a61183bad4f184a1b8348fdbe9000bf10de03
SHA512668b58f9e0ba0ba2386becf9b7a718e105feb0df888001cab8d01dbc1afefcc0353be51c0a71e7ed35d0f1cb559bd09c9041e0303b17d28ac4cdcf10fd9c00fd
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
7KB
MD57523f67e9f1d31ad4245693ff007d03b
SHA1a14d2ff858d61a29798df4f03aed1cca42676c58
SHA256ca997bc938ac3d363e4b46c7bcb20d09463b75752dca3537d2611fc463abf88e
SHA5126a47244820e2a263094eaa04cd49b6fa50d30f6fd4070072dd6d5d8eb266a7b767380c03f1cf571fffd62671b176e8cb91efbff8fd5ca4745858807f316139ea
-
Filesize
6KB
MD57cba51245e891e4e3b9de5707f431047
SHA1da20b16127fdadc09881cab61663955acc630d4d
SHA2563a1cf471cc217228442dfbe309e186468c71eb0e299baa530b3755f94b6b7324
SHA512009bd3eeda8be3b44fc1868446b4f4b9a8941a630bfc023a8a72ee787e396eef84a0a0bb1224f9bd5f4dc6a8a134d18748b9412629f629854f7f8814f362b2ab
-
Filesize
1KB
MD5d63baca749940dea51a059c1a1655921
SHA1cb172c3907fa820234372960967c4a68c7514653
SHA256261843035881a9fc621231a6688decf305b6f4cf4b924ffa6378cbc4b1e354f0
SHA5128e23567a065c0484d403e1ca954aa294da2ad1a38875d468f039dbd688fb754570e85129eab18c30c62db9dcbd615effd8f613292ba215a68f5e3081f0307f75
-
Filesize
359B
MD5f2bf79b153e5e224522be824767b120c
SHA156f33878daee28e05707886f247dbc37a9117eed
SHA2566f673c00756f4959434d4b036c01fa867094662c65d7cb696e58f8be9f1c1f57
SHA5122ec845d39bb44428513b07b5452270b88322b2a6d1e7f10df837d175aa76eb187dc53f063d7c45ef977148b9d693166f0370199d7f78b321c961422a0c9600f9
-
Filesize
682B
MD59b713334d33a3b74c6ed4757bd0ef7fc
SHA11868c2637167433f15d1a81374478613a69b3f73
SHA256bfbae89491c0924992257e7e7a4de2fdf936fa35bb2c45c774bf0a20c653f511
SHA51286c79cd0422e2b760f2b9d340f4b9af659d56c905d305e1259d50239cb1a7549f88e210601e10040d74ff2e97254f6e26b659ed7a3c738254d4e2dc239d464f8
-
Filesize
5KB
MD5916fd4971df25d405bc86ce160cdd98f
SHA13e8708ccc997c3b296a168d3608f21e2f9e84606
SHA25619bb5cf3c6b96a40ea152386338a9133cd0459f551fa39b832612a748f77da6b
SHA5121b22ef3c52e68b19bc9991c86de31e94fd24fc01d4ab7055dd04d15608cfd2f01601991d939fc94a0c9732c530756466d8df1c4afd10982b699340ceba0ba473
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\e6000adc-07b7-46fe-accc-67835bb8c314.tmp
Filesize6KB
MD5f581db9f55adba1db42efe5af4bb2a9f
SHA1f8fa73ff1165887b2eb9ae4963c24f0a10986dc7
SHA25617d212ed7c752d958cd674a3936fbb7df20fbcf6043bf751b8773ebf89bc289b
SHA5124fe62721827984ffab6f714d79ea21b802c047f2db5b9e3718b61b4e511d66daed946f63e419a7fddb67d5d3581d137ee790d747ed13322139523d09f4a71755
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
1.5MB
MD5c6bffd4da620b07cb214f1bd8e7f21d2
SHA1054221dc0c8a686e0d17edd6e02c06458b1395c3
SHA25655dbb288d5df6df375487bae50661dbf530fd43a7e96017b7183a54db8fc376a
SHA51291e50df87a6e42b01e24accead25726047a641c3960fa3336f560168ed68356e6992d289a0a71b629d74ad7b00bbdbf7e6e909a4c8b5b1616fbf3b0cc63210ab