Analysis
-
max time kernel
63s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-06-2024 14:43
Static task
static1
Behavioral task
behavioral1
Sample
SolaraBootstrapper.exe
Resource
win7-20231129-en
General
-
Target
SolaraBootstrapper.exe
-
Size
797KB
-
MD5
36b62ba7d1b5e149a2c297f11e0417ee
-
SHA1
ce1b828476274375e632542c4842a6b002955603
-
SHA256
8353c5ace62fda6aba330fb3396e4aab11d7e0476f815666bd96a978724b9e0c
-
SHA512
fddec44631e7a800abf232648bbf417969cd5cc650f32c17b0cdc12a0a2afeb9a5dbf5c1f899bd2fa496bd22307bfc8d1237c94920fceafd84f47e13a6b98b94
-
SSDEEP
12288:n1mzgHpbzEu8AgpQojA1j855xU9pHIRxSNN:1mzgH385QojA1j855xSHI
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
Processes:
MsiExec.exeMsiExec.exepid process 2020 MsiExec.exe 2020 MsiExec.exe 2344 MsiExec.exe -
Blocklisted process makes network request 4 IoCs
Processes:
msiexec.exeflow pid process 14 2472 msiexec.exe 15 2472 msiexec.exe 17 2472 msiexec.exe 19 2472 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: msiexec.exe -
Drops file in Windows directory 5 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\Windows\Installer\MSI2977.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI29F5.tmp msiexec.exe File opened for modification C:\Windows\Installer\MSI2A34.tmp msiexec.exe File created C:\Windows\Installer\f762472.msi msiexec.exe File opened for modification C:\Windows\Installer\f762472.msi msiexec.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2788 2284 WerFault.exe SolaraBootstrapper.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Processes:
SolaraBootstrapper.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 SolaraBootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 SolaraBootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 SolaraBootstrapper.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa20f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349040000000100000010000000497904b0eb8719ac47b0bc11519b74d0200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e SolaraBootstrapper.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
SolaraBootstrapper.exechrome.exepid process 2284 SolaraBootstrapper.exe 2284 SolaraBootstrapper.exe 1764 chrome.exe 1764 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
SolaraBootstrapper.exemsiexec.exemsiexec.exechrome.exedescription pid process Token: SeDebugPrivilege 2284 SolaraBootstrapper.exe Token: SeShutdownPrivilege 2980 msiexec.exe Token: SeIncreaseQuotaPrivilege 2980 msiexec.exe Token: SeRestorePrivilege 2472 msiexec.exe Token: SeTakeOwnershipPrivilege 2472 msiexec.exe Token: SeSecurityPrivilege 2472 msiexec.exe Token: SeCreateTokenPrivilege 2980 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2980 msiexec.exe Token: SeLockMemoryPrivilege 2980 msiexec.exe Token: SeIncreaseQuotaPrivilege 2980 msiexec.exe Token: SeMachineAccountPrivilege 2980 msiexec.exe Token: SeTcbPrivilege 2980 msiexec.exe Token: SeSecurityPrivilege 2980 msiexec.exe Token: SeTakeOwnershipPrivilege 2980 msiexec.exe Token: SeLoadDriverPrivilege 2980 msiexec.exe Token: SeSystemProfilePrivilege 2980 msiexec.exe Token: SeSystemtimePrivilege 2980 msiexec.exe Token: SeProfSingleProcessPrivilege 2980 msiexec.exe Token: SeIncBasePriorityPrivilege 2980 msiexec.exe Token: SeCreatePagefilePrivilege 2980 msiexec.exe Token: SeCreatePermanentPrivilege 2980 msiexec.exe Token: SeBackupPrivilege 2980 msiexec.exe Token: SeRestorePrivilege 2980 msiexec.exe Token: SeShutdownPrivilege 2980 msiexec.exe Token: SeDebugPrivilege 2980 msiexec.exe Token: SeAuditPrivilege 2980 msiexec.exe Token: SeSystemEnvironmentPrivilege 2980 msiexec.exe Token: SeChangeNotifyPrivilege 2980 msiexec.exe Token: SeRemoteShutdownPrivilege 2980 msiexec.exe Token: SeUndockPrivilege 2980 msiexec.exe Token: SeSyncAgentPrivilege 2980 msiexec.exe Token: SeEnableDelegationPrivilege 2980 msiexec.exe Token: SeManageVolumePrivilege 2980 msiexec.exe Token: SeImpersonatePrivilege 2980 msiexec.exe Token: SeCreateGlobalPrivilege 2980 msiexec.exe Token: SeRestorePrivilege 2472 msiexec.exe Token: SeTakeOwnershipPrivilege 2472 msiexec.exe Token: SeRestorePrivilege 2472 msiexec.exe Token: SeTakeOwnershipPrivilege 2472 msiexec.exe Token: SeRestorePrivilege 2472 msiexec.exe Token: SeTakeOwnershipPrivilege 2472 msiexec.exe Token: SeRestorePrivilege 2472 msiexec.exe Token: SeTakeOwnershipPrivilege 2472 msiexec.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe Token: SeShutdownPrivilege 1764 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
Processes:
chrome.exepid process 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe 1764 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
SolaraBootstrapper.exemsiexec.exechrome.exedescription pid process target process PID 2284 wrote to memory of 2980 2284 SolaraBootstrapper.exe msiexec.exe PID 2284 wrote to memory of 2980 2284 SolaraBootstrapper.exe msiexec.exe PID 2284 wrote to memory of 2980 2284 SolaraBootstrapper.exe msiexec.exe PID 2284 wrote to memory of 2980 2284 SolaraBootstrapper.exe msiexec.exe PID 2284 wrote to memory of 2980 2284 SolaraBootstrapper.exe msiexec.exe PID 2284 wrote to memory of 2980 2284 SolaraBootstrapper.exe msiexec.exe PID 2284 wrote to memory of 2980 2284 SolaraBootstrapper.exe msiexec.exe PID 2472 wrote to memory of 2020 2472 msiexec.exe MsiExec.exe PID 2472 wrote to memory of 2020 2472 msiexec.exe MsiExec.exe PID 2472 wrote to memory of 2020 2472 msiexec.exe MsiExec.exe PID 2472 wrote to memory of 2020 2472 msiexec.exe MsiExec.exe PID 2472 wrote to memory of 2020 2472 msiexec.exe MsiExec.exe PID 2472 wrote to memory of 2344 2472 msiexec.exe MsiExec.exe PID 2472 wrote to memory of 2344 2472 msiexec.exe MsiExec.exe PID 2472 wrote to memory of 2344 2472 msiexec.exe MsiExec.exe PID 2472 wrote to memory of 2344 2472 msiexec.exe MsiExec.exe PID 2472 wrote to memory of 2344 2472 msiexec.exe MsiExec.exe PID 2472 wrote to memory of 2344 2472 msiexec.exe MsiExec.exe PID 2472 wrote to memory of 2344 2472 msiexec.exe MsiExec.exe PID 2284 wrote to memory of 2788 2284 SolaraBootstrapper.exe WerFault.exe PID 2284 wrote to memory of 2788 2284 SolaraBootstrapper.exe WerFault.exe PID 2284 wrote to memory of 2788 2284 SolaraBootstrapper.exe WerFault.exe PID 2284 wrote to memory of 2788 2284 SolaraBootstrapper.exe WerFault.exe PID 1764 wrote to memory of 2124 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 2124 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 2124 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe PID 1764 wrote to memory of 708 1764 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"1⤵
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exe"msiexec" /i "C:\Users\Admin\AppData\Local\Temp\node-v18.16.0-x64.msi" /qn2⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 15482⤵
- Program crash
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\MsiExec.exeC:\Windows\system32\MsiExec.exe -Embedding C7E152F86E030374DB5E20151617B1272⤵
- Loads dropped DLL
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 56D0DB8E005B7646DF12494E18D0E0402⤵
- Loads dropped DLL
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6e59758,0x7fef6e59768,0x7fef6e597782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1128 --field-trial-handle=1240,i,4434025653169034114,5774467473449991348,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1240,i,4434025653169034114,5774467473449991348,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1240,i,4434025653169034114,5774467473449991348,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2192 --field-trial-handle=1240,i,4434025653169034114,5774467473449991348,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2188 --field-trial-handle=1240,i,4434025653169034114,5774467473449991348,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1460 --field-trial-handle=1240,i,4434025653169034114,5774467473449991348,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1420 --field-trial-handle=1240,i,4434025653169034114,5774467473449991348,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3440 --field-trial-handle=1240,i,4434025653169034114,5774467473449991348,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3200 --field-trial-handle=1240,i,4434025653169034114,5774467473449991348,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3152 --field-trial-handle=1240,i,4434025653169034114,5774467473449991348,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13f6a7688,0x13f6a7698,0x13f6a76a83⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4044 --field-trial-handle=1240,i,4434025653169034114,5774467473449991348,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3604 --field-trial-handle=1240,i,4434025653169034114,5774467473449991348,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2256 --field-trial-handle=1240,i,4434025653169034114,5774467473449991348,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD54f727616485af0ae6dc72a071d7689c7
SHA15143b9aa4a9f57d0506e17cc7eee47cb97a64542
SHA256d801d49de690f503124c54dca7fb4bf64a2f54e302a71e75fb327f9cf00a8e38
SHA5120323c7aaeff684f552a546d37ce20869b6cf59dd3b306a7494bc93d41dace54a1d9e8a6e1e9a4043d9e78e1f6fce3f75a1cb469f360978c0f1eebd0844fa830f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5007f76421ccd4abfb96dca80b2b87f90
SHA14428e2ba27599606efdd810112c636613c3e8667
SHA2565c0d4873c449fc775d439ac62a66dc4450365c6b59109fefc407f37305b9e094
SHA512f5a1e85ebebb9639e4ee279728d7adbce68e48c6988f1ff87346e1090760e2e245d3de85936f51385d8c1f6cb9276d68604fed26657222893bf63d18e7406f9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
242B
MD550e38deb553847c196ab5d629ad71352
SHA1db0f105caebf158fde79e7368e154663488a5719
SHA256f2c094922cc4a48f519a4ff970d63855a92c1cdfd3f3be47124f587980dfa1fe
SHA51274b0eea2231816d1b3e18e5d50c9ab5746c60ee04c22f004bbc41a8c395fbc7a4b8f4f1018bca7a7cbb9ae29eda7405fb7817dce17eb0de4f1168515ef4630cf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmpFilesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD501291e64b16e36e53bcda8d2925acc06
SHA165861db7ecfb762a78a92ec1ccd901b667943b31
SHA256a5e8b4f1f9d1cb2e8f9630c9e2a1b8b779a4714c5e719f4fc9da5f88dac3a366
SHA51218d300ba6c965dc14daa7d95a0011ab257cb94b15d18f23a7e155e6e571965e510cbbed7636d53751cc044f672ab17922ea6dfe62fbe4a02253edc8f6eb9fe36
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD54530e13512ade4204a988186248a8f41
SHA1c24fceea7c3d8ddf1528037103302ece92dc6dd7
SHA256e3eb07704f6c681915f4c90d290a128b0611d0a9bc98f500ff5a0b9ef10af130
SHA512a4e19da4e5090f017740c218b42a7c09a37f9e09941f0fb25170b77fb51630db35f5b1980395fd09b3d572efa0d07c2c9db1f2e0d3ad726532bc9f75d5b454b0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD54ca5530b4441ef9a8ad0184f439a094b
SHA17c674bcbc2de905341a8832034995fcb1bc93968
SHA256717522cf2b50d7b0905f3e835eb9ff7dc3821c3e53de042049a91885ae0f91dd
SHA51274a5deb848a5701cb6bf1937c2ea45299d244b89db916d4e7415a8abf292c7d27a2fcc6ad81ed452ad88b0350dbec2a8f8644e7d56b3d5de11b4b44d2ba10842
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmpFilesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
156KB
MD54edcb7cb1ab0d391b9f632ae775e898d
SHA1e94be2143d2e397af5d07a04bd112072f9ecbd8b
SHA25647fd63b3e2ea44a5e82e98a8091ac00e94ebc64e3480fada53ca04a4e5b45e55
SHA5120c9a2221d410cec72f13030b7425305a771c5821850afbcf2ac749639963691783edc12cf04004e19cb8bd580a1854773ecfba476355e2386606801b7e3ca60b
-
C:\Users\Admin\AppData\Local\Temp\Tar17E9.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Users\Admin\AppData\Local\Temp\node-v18.16.0-x64.msiFilesize
30.1MB
MD50e4e9aa41d24221b29b19ba96c1a64d0
SHA1231ade3d5a586c0eb4441c8dbfe9007dc26b2872
SHA2565bfb6f3ab89e198539408f7e0e8ec0b0bd5efe8898573ec05b381228efb45a5d
SHA512e6f27aecead72dffecbeaad46ebdf4b1fd3dbcddd1f6076ba183b654e4e32d30f7af1236bf2e04459186e993356fe2041840671be73612c8afed985c2c608913
-
C:\Windows\Installer\MSI2A34.tmpFilesize
211KB
MD5a3ae5d86ecf38db9427359ea37a5f646
SHA1eb4cb5ff520717038adadcc5e1ef8f7c24b27a90
SHA256c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74
SHA51296ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0
-
\Windows\Installer\MSI2977.tmpFilesize
122KB
MD59fe9b0ecaea0324ad99036a91db03ebb
SHA1144068c64ec06fc08eadfcca0a014a44b95bb908
SHA256e2cce64916e405976a1d0c522b44527d12b1cba19de25da62121cf5f41d184c9
SHA512906641a73d69a841218ae90b83714a05af3537eec8ad1d761f58ac365cf005bdd74ad88f71c4437aaa126ac74fa46bcad424d17c746ab197eec2caa1bd838176
-
memory/2284-98-0x0000000074E50000-0x000000007553E000-memory.dmpFilesize
6.9MB
-
memory/2284-97-0x0000000074E5E000-0x0000000074E5F000-memory.dmpFilesize
4KB
-
memory/2284-0-0x0000000074E5E000-0x0000000074E5F000-memory.dmpFilesize
4KB
-
memory/2284-2-0x0000000074E50000-0x000000007553E000-memory.dmpFilesize
6.9MB
-
memory/2284-1-0x0000000000E00000-0x0000000000ECE000-memory.dmpFilesize
824KB