Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/06/2024, 13:06
Static task
static1
Behavioral task
behavioral1
Sample
Solara ソララ.exe
Resource
win10v2004-20240508-en
General
-
Target
Solara ソララ.exe
-
Size
250.0MB
-
MD5
b5310c6c75c2844d01afac671d56a3a8
-
SHA1
f1649e694127388b1205c421b923fbd430a65e7a
-
SHA256
2d62ea5bf379875986a5bffdf2a7d85cb4c16114d707487a3df33011da266ab2
-
SHA512
d42aa518803e47ea1e067c47d85dfc3d7bc016b004b664db55e208a4b8e337a1b2b264b1c186758f752731a9677f64c28837c8fd04b661ab59c4380b743fd9aa
-
SSDEEP
24576:HfLqG6IsIuxnDvFgnKcVpnNVpbTOYKvRZNhVrJl2nuVoFMyepT1xRjjMixvC148Q:/V6I8DvF6ZZPTVoZNhVrJl2ni0702kYi
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3204 created 3364 3204 Arrow.pif 56 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation Solara ソララ.exe -
Executes dropped EXE 3 IoCs
pid Process 3204 Arrow.pif 4188 RegAsm.exe 3536 RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 3664 tasklist.exe 4660 tasklist.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133619804999766768" chrome.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4140 PING.EXE -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 3204 Arrow.pif 3204 Arrow.pif 3204 Arrow.pif 3204 Arrow.pif 3204 Arrow.pif 3204 Arrow.pif 3204 Arrow.pif 3204 Arrow.pif 3204 Arrow.pif 3204 Arrow.pif 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 2772 chrome.exe 2772 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3664 tasklist.exe Token: SeDebugPrivilege 4660 tasklist.exe Token: SeDebugPrivilege 4188 RegAsm.exe Token: SeBackupPrivilege 4188 RegAsm.exe Token: SeSecurityPrivilege 4188 RegAsm.exe Token: SeSecurityPrivilege 4188 RegAsm.exe Token: SeSecurityPrivilege 4188 RegAsm.exe Token: SeSecurityPrivilege 4188 RegAsm.exe Token: SeBackupPrivilege 4188 RegAsm.exe Token: SeSecurityPrivilege 4188 RegAsm.exe Token: SeSecurityPrivilege 4188 RegAsm.exe Token: SeSecurityPrivilege 4188 RegAsm.exe Token: SeSecurityPrivilege 4188 RegAsm.exe Token: SeBackupPrivilege 4188 RegAsm.exe Token: SeSecurityPrivilege 4188 RegAsm.exe Token: SeSecurityPrivilege 4188 RegAsm.exe Token: SeSecurityPrivilege 4188 RegAsm.exe Token: SeSecurityPrivilege 4188 RegAsm.exe Token: SeDebugPrivilege 824 taskmgr.exe Token: SeSystemProfilePrivilege 824 taskmgr.exe Token: SeCreateGlobalPrivilege 824 taskmgr.exe Token: 33 824 taskmgr.exe Token: SeIncBasePriorityPrivilege 824 taskmgr.exe Token: SeBackupPrivilege 4188 RegAsm.exe Token: SeSecurityPrivilege 4188 RegAsm.exe Token: SeSecurityPrivilege 4188 RegAsm.exe Token: SeSecurityPrivilege 4188 RegAsm.exe Token: SeSecurityPrivilege 4188 RegAsm.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe Token: SeShutdownPrivilege 2772 chrome.exe Token: SeCreatePagefilePrivilege 2772 chrome.exe -
Suspicious use of FindShellTrayWindow 60 IoCs
pid Process 3204 Arrow.pif 3204 Arrow.pif 3204 Arrow.pif 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe -
Suspicious use of SendNotifyMessage 58 IoCs
pid Process 3204 Arrow.pif 3204 Arrow.pif 3204 Arrow.pif 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 824 taskmgr.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 716 wrote to memory of 768 716 Solara ソララ.exe 87 PID 716 wrote to memory of 768 716 Solara ソララ.exe 87 PID 716 wrote to memory of 768 716 Solara ソララ.exe 87 PID 768 wrote to memory of 3664 768 cmd.exe 89 PID 768 wrote to memory of 3664 768 cmd.exe 89 PID 768 wrote to memory of 3664 768 cmd.exe 89 PID 768 wrote to memory of 1816 768 cmd.exe 90 PID 768 wrote to memory of 1816 768 cmd.exe 90 PID 768 wrote to memory of 1816 768 cmd.exe 90 PID 768 wrote to memory of 4660 768 cmd.exe 92 PID 768 wrote to memory of 4660 768 cmd.exe 92 PID 768 wrote to memory of 4660 768 cmd.exe 92 PID 768 wrote to memory of 1028 768 cmd.exe 93 PID 768 wrote to memory of 1028 768 cmd.exe 93 PID 768 wrote to memory of 1028 768 cmd.exe 93 PID 768 wrote to memory of 5068 768 cmd.exe 94 PID 768 wrote to memory of 5068 768 cmd.exe 94 PID 768 wrote to memory of 5068 768 cmd.exe 94 PID 768 wrote to memory of 4792 768 cmd.exe 95 PID 768 wrote to memory of 4792 768 cmd.exe 95 PID 768 wrote to memory of 4792 768 cmd.exe 95 PID 768 wrote to memory of 4304 768 cmd.exe 96 PID 768 wrote to memory of 4304 768 cmd.exe 96 PID 768 wrote to memory of 4304 768 cmd.exe 96 PID 768 wrote to memory of 3204 768 cmd.exe 97 PID 768 wrote to memory of 3204 768 cmd.exe 97 PID 768 wrote to memory of 3204 768 cmd.exe 97 PID 768 wrote to memory of 4140 768 cmd.exe 98 PID 768 wrote to memory of 4140 768 cmd.exe 98 PID 768 wrote to memory of 4140 768 cmd.exe 98 PID 3204 wrote to memory of 4188 3204 Arrow.pif 103 PID 3204 wrote to memory of 4188 3204 Arrow.pif 103 PID 3204 wrote to memory of 4188 3204 Arrow.pif 103 PID 3204 wrote to memory of 4188 3204 Arrow.pif 103 PID 3204 wrote to memory of 4188 3204 Arrow.pif 103 PID 2772 wrote to memory of 3224 2772 chrome.exe 131 PID 2772 wrote to memory of 3224 2772 chrome.exe 131 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132 PID 2772 wrote to memory of 1372 2772 chrome.exe 132
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\Solara ソララ.exe"C:\Users\Admin\AppData\Local\Temp\Solara ソララ.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k copy Parameters Parameters.cmd & Parameters.cmd & exit3⤵
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3664
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe opssvc.exe"4⤵PID:1816
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4660
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"4⤵PID:1028
-
-
C:\Windows\SysWOW64\cmd.execmd /c md 7848894⤵PID:5068
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V "FOUNDEDAUSTRIAGRAMMARHATS" Preserve4⤵PID:4792
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Amber + Angola + Laid + Tuition + Carl 784889\U4⤵PID:4304
-
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\784889\Arrow.pif784889\Arrow.pif 784889\U4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3204
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.14⤵
- Runs ping.exe
PID:4140
-
-
-
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\784889\RegAsm.exeC:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\784889\RegAsm.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\784889\RegAsm.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\784889\RegAsm.exe"2⤵
- Executes dropped EXE
PID:3536
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /72⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffa28bdab58,0x7ffa28bdab68,0x7ffa28bdab783⤵PID:3224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1736 --field-trial-handle=2020,i,13536053267692258736,7712752707708825093,131072 /prefetch:23⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2108 --field-trial-handle=2020,i,13536053267692258736,7712752707708825093,131072 /prefetch:83⤵PID:800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2276 --field-trial-handle=2020,i,13536053267692258736,7712752707708825093,131072 /prefetch:83⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3112 --field-trial-handle=2020,i,13536053267692258736,7712752707708825093,131072 /prefetch:13⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3376 --field-trial-handle=2020,i,13536053267692258736,7712752707708825093,131072 /prefetch:13⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4072 --field-trial-handle=2020,i,13536053267692258736,7712752707708825093,131072 /prefetch:13⤵PID:960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4612 --field-trial-handle=2020,i,13536053267692258736,7712752707708825093,131072 /prefetch:83⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 --field-trial-handle=2020,i,13536053267692258736,7712752707708825093,131072 /prefetch:83⤵PID:4112
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2940
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c82192ee-6cb5-4bc0-9ef0-fb818773790a} -Embedding1⤵PID:956
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:5052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
6KB
MD52f6f21dbafd9d92dabec286fdc1da605
SHA1445520ca697608cd331bedf99de4e8ff6149a44c
SHA2561f3d3b035dc1bb9ccca1a3e9e6b7afcbab92c58bd1a545c2b1b3305d970e93e4
SHA5129b7a541fa37ab43944cb858487de6cc1d5734643c46aefc16db5fe7dc59532b55983e4655411291e170c28f1035c8c507cdb474684b2a71ca112a45af7486f07
-
Filesize
129KB
MD51836482b22ba7d60d9d426ac0a0658fe
SHA1f5b2124ffcdc3f77a7e1114211aa782eb1c39ad2
SHA2567c137a166770e10dc4fadc3252fc9b98eb25cd69fbba0e61ca35bcef02d50af3
SHA512ca225005c6fa64e579103fc8924e840d8ed041c09b6408ee2c9ce13818b733ed637fd75637a7bb47c1dc4fffd66a1700338c58bc54394f940f4367e179f28750
-
Filesize
915KB
MD5b06e67f9767e5023892d9698703ad098
SHA1acc07666f4c1d4461d3e1c263cf6a194a8dd1544
SHA2568498900e57a490404e7ec4d8159bee29aed5852ae88bd484141780eaadb727bb
SHA5127972c78acebdd86c57d879c12cb407120155a24a52fda23ddb7d9e181dd59dac1eb74f327817adbc364d37c8dc704f8236f3539b4d3ee5a022814924a1616943
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
Filesize
675KB
MD555fb214b26ead9114f031786117d0d8f
SHA1a69f4318d88c868f293151686f53331885c56a03
SHA2568c932400e0b995bd085375c26dfc750ac9f60083fcc63f5086c761e283bf8ed2
SHA512a654fc1f79010b11a86bd29a5f88de719b85ba7063ae4cd1fb4108fe7adbd7e3df058677b8e040f8f1a582ec1d945c4632d37705bb3366b384be39261b66e2e9
-
Filesize
59KB
MD57384a3b31432ae68a812790767890956
SHA1fbb65f075ba520471cb290840660b6b3337f316e
SHA2566b0c7c1c4c199ffb06999a5066530bc378d15387718d04d72b47145afa088194
SHA512acc8a37175649b9b53b007b850d8c090ecdf8422397c653ab25fb65137a87f0dd0e29457b09d57e199bc10ca0fe1b9c2e671fc55aaf3b93322b2e9b3fef6e257
-
Filesize
146KB
MD586c3a517d9649719c2efb9d0964a6e96
SHA177c9378dec6e8ee471e05fa5e2ce358cec271156
SHA25666366f80f903d19e7ad37a26a826fa3c5e42c130444fb1110563365c86e038c0
SHA512275577e372c2920289b31ba2f04f269e3e794b5ce69b8b1918f6559e17af143d1ddd4ec5ece23a29a2c8f1c71f19515bad6a68d962ef740ec589fba670ea2a1d
-
Filesize
198KB
MD5a19042d4bf2aad5657e2ec6b6197bb40
SHA10d3e14e2d6e9723b47d21c978e98bb9b728b80a1
SHA25635b1981adaf3c8a1b343628642eb4e9992d44591e22fe1296564bb7a1dd6ba4e
SHA51290c10d5e7002ffb0382e53204652d6d2c87626c0b587ee04b88b6c368e67f5bded48307f8224136c253a9ad8be73e8dccbfbc47fb3e7178c47a2309fcde9f14f
-
Filesize
57KB
MD54d0ffd10fec65a01c280c3dca962ffaf
SHA13e033dd0953873005c3d84224c23119734799227
SHA2564181210dbbc713f7edeac8520731ce54aa4fb64c4dcc02424b246b18b6b99f5b
SHA5126c297652c12942804d806403c92a62d9c353da05246975611efe2bb4a4db12756989420a02a89383d53fbdd7901c7cdbdf65c9c84cc661dd485093e11f71bee2
-
Filesize
82KB
MD59c8d6d08e7cbeb1bc41cfe3c17d0ee05
SHA1a12d24d2dfd5f2787c9897fb46f229c23574e08d
SHA25637b1dfdd00bb7e7bea36ae63ca7693b26a1eb05fd2d73ba3a2376c873474c9d1
SHA512873c8b447a5130b8984f408626d99c0e3d843b1c7f026b99dbd7788aa7d39f6d40243ac10fb596671be19d85b21f8666375e6370d44991337b025d922f0534a3
-
Filesize
50KB
MD5f84b80f22e51d026619cdd4a80a75fba
SHA135f34ea6238ba5c6da14ac7dbbed6d0626fa5651
SHA256485222dfde4f0d9e04b6f65a50de3a93142cab51ab88761a0022ccbdcdad234e
SHA5127d78f11a806b5d14ac50a747f5570f60d8afab97a44159858d9cc16709ff7b36083e83817bfb82d8e429262e1cc1ce07c45396afd466b11ad9097691d75827e6
-
Filesize
14KB
MD5397e059f7bc495d388cccc22682975b7
SHA1149546a7a0968c29804b6d67da3bda0ecc667926
SHA25634433522f8fb867df240ca5958c4f919c6abbe9aab33d79740542be0446f943f
SHA512687d4ccd2c56de48176f6b1c62fbb6a99d4f0bc3ff5507bb4d82cf3ef5eaa34810838e2df55decd3d6d3aacb0338520b629fc4758f4597f14787edf8f26e07ea
-
Filesize
8KB
MD5c170d4cf276bc5409fcb32f30071c5bc
SHA1b832cb52a821308cc4f60a6e1240e7c63b49ca74
SHA256ec14da501e828f6758dccfbd05b785cb9461aac9666c4f8b1c5b5d2060f1ff3c
SHA512f6be7a7b80d977b974be61fff8850d94fb222c02df3294b35eb4b5b28cc282b7a783b8f9192dee9a8d01c532517c7b5707ed044f6b3a6912b30767f09d2a9707
-
Filesize
51KB
MD57b81fc611f2f462f05f99ed9451c44f9
SHA13e3823b5016bb80a0a48e5352324c5028c1e319b
SHA2562807997b2a43ee0975c46a0bef9998c2bf9be76c51d101859edf02a326163034
SHA512564b9456a26f19fc1b574b1dfbcf581ba172d1ee8962958bc51b19c4e8e37e11bd4dbd9e53b7c8742c882e59db7e4c7bff885c8eb60d717ef9f11ac0d30cfd71
-
Filesize
58KB
MD54cd3f566ff21f33f7340b3a53ef44942
SHA166ea0c3d65d60dbc7166de4996541e1b5beff9b3
SHA2565e1425f1248ae28318959e935f41fa8664e48b32b69296014e85922e20f1766c
SHA51205b281d678ee7530bf1e10ec6e21fae925a7b131d4e019471abbecd997c067a9ee8e4e87b09f7efbd807258ba7b933761bf24a28fb49fb5f9a6210ec66130e98
-
Filesize
14KB
MD59a6a1ce4b3ba2108bb66a4a2c2e04762
SHA1626c193748b57ad5e72f5558da0b1e3bac9b0900
SHA256d03325e496e9952e2c6016a03ffac1753b6cc0576069f1c1f53d0eeeeacc8d02
SHA5124bc4c834b4ff4e3e2fe8c03f95789dabf6bb31e7866c7403f874143a311cb55d6d187f6a20d003458fa5edadf1f5899f5b82a15c68657141f4280518dd93fb00
-
Filesize
14KB
MD5dd3916e8effec43593f0597a83f509d1
SHA15453bbc04b2da9e82486daced695d097f7ccb508
SHA25625240517d95e4a71ee36a575ada97d3b0004d364d84378852906c6c9209e10f2
SHA5121fbd48a2bc3f8f21f2ea48c01c33c7bcbed869eb6025cdca0b06d255e22d58f3b43cb4f24b0a8eaf4dc74c6aef849145c8d7ef56ee527728f6ecce366e29f691
-
Filesize
22KB
MD5a0370402b58ce2cc2fd433d4689a136b
SHA18a4ea8d45047c101fa9646fb1bd377f0573f7a73
SHA256538d14ed0683b7a77c3f2a4b7ffd3272e4a43a36bfedcb1fd85f1e4622a516cc
SHA5122794da4690a33f4ddc02b0e2bdf749f09e2d978fe8e5f382a0acd2bcbaa3710f480b14bc5a9c2d06e0a9aa056cd83f9a7af6d488a904653f2817f09762b84c52
-
Filesize
60KB
MD5f4cf20783d687141b37dbf7f5718abbc
SHA1dd2a8bab7c89ce10b199d89ab550585b4824f1bd
SHA256b7c17dd99e98f66bee3dd9fc9770a3966bb294f7391c05d14b6758b527cf0b73
SHA512a86ec0e4c9f96cb4d6faf22d9042be38638a8e1e267f04864ea586fb08724ec0c0a2f80bd0b51b5f4d0a06fe612041cfd46c0adb3bf8184dbc2b571db58606ac
-
Filesize
67KB
MD5651f8fbcd1c8a688b2eb676297ca96a0
SHA175c97f1df2e75d9ffd678f845b541cf43b553487
SHA25624e12bf9d90f4bd446f44482cf7af005f8656949db0ce9d6eee2f1bf9d4fe64a
SHA512ad49f646b56d43adbbd35ebff07580bd472e70768e8c859db1a88515bcd35d5618348b6a61052522ccfa4d7491cc49be3cc7b411422d054c87b21264af8442d0
-
Filesize
34KB
MD5745c5d06e1ecc4149fe6c32e0f25800a
SHA171d492b14e1d5684aacfde5bc513698da5c9e808
SHA256a7b7b07d323157853d8d59e6521864f539c2c2903d2c590b168b4268a2025040
SHA512c947b0c65ae3dc14436cb793e945ca5f314ce50b72df5c236cfab5bc8750699adbe2b74b01bc56cd0c3c6fd0bd7561b8763470ee4f4bea1cae29cca665e4fb1d
-
Filesize
50KB
MD5aaf10db5c01c9e56b4dce148d3d691a6
SHA1964e6fffcc9e8f2ab48a25f175d0d719b0059554
SHA25666676045cf0cf58b6692d089e47571835a0b8f90cb11898e15b8510f3b95b258
SHA51244e9e243220aff375a624403464e28e735732f8941f5541e3841b8d6e0cf679fb69c0d4f07f6e7251dd9ad431dc85e6b19b2ae8de9f53681deec09883f5ad5f8
-
Filesize
65KB
MD55b6afddf63344bd4043014e8d72072bd
SHA123dc57fa2a2aac3d79e9b292735580ef35e8843f
SHA2565ac57a66de8b1d213eec66ede6672eb45121df091555699c1553e849217193aa
SHA5125f42dc397cbc59ba9502f4d020d9ad26e9c4a241b6ff217d5e702941f1297ec8687beb5d4a5aab3be41f79d15e936aae721fa5a2f48d639cc2210736be64357b
-
Filesize
48KB
MD560b8bc8bbd68f242a3cff63a88d211c3
SHA13ef27f2fe1601ef6efc3fdd982d439594ca261d6
SHA2569a0af772412b90f3b8b033eab71069e862c8ab92eaf61bb897979a74f566eaf3
SHA512411d599e83db36dbdc2130b1d697226ef049c8843653580e387ece73518774fc09df53f2885968d61e2923c53a0eeb70e0202ba9c661bf87009060e760dcec3b
-
Filesize
18KB
MD53228cbcf9503bf2478e1317085b4e7db
SHA1c68cf7fa931c012d85f85b589745806599410b8a
SHA2561d4080a701c4cbc7a95e697f874ea0e0e2f713c31d01db60c4fd050f792827f9
SHA512906ace2984d922126cd7f58024010fbdf5f590733eb768fbc6fd61d13c6447d81b4eacf04d2f57535cdb1c9395dd1d05acbc23fc7833c56f71006bd12bf29ce7
-
Filesize
23KB
MD5090a4c2604c757c6880a085f01139e2d
SHA16541a4cb73d11c7299c4ea0d79ab965b0b458826
SHA25654e1f5d7669ae799d1cbb62995a6da2cbe51e8572928c9ba93b38bf7b11dbb04
SHA5123375a71d26f6effe30b1e23e237eb261087e028f4e8642d44a82d37728560aa8ee1aa9d6211eb8d283eb3a8d9d4cd9d95c3a8f5335eed18eb5d6565f269716c7
-
Filesize
25KB
MD5b90a614de7c70fcd6fede1847229eab8
SHA139a1b290c2626aa19384fd62815c6c560e733c88
SHA256a5fff38b14b1a9f086c443f1b2280384472368586cc9cfb4d1294a6ea9bc64c1
SHA51274f10978473b3171ef1bfed04ae608dca82555bd25ac691fbe3297009c47b47ed61621b2b46b06ff9507dead41e696506ee9ded59b0b8f6eb957a3ac94fb2d4f
-
Filesize
10KB
MD5e92ca0e8c43bac325f82a43e3acc357c
SHA1e627169ef6422877914caa3f332d4346e8f682bc
SHA2560a740ad3794560aca8eed671b74e8e4966d401dc5b418d6fa3787cef7601c4d5
SHA512b5d9fdbb811553afeab348d0c4c44ccf096a3404c6ddf9168bd817710f0f6a7c528c6794da5640922eec988e88443eac2a167185226a67ada6fd8d1af3110bc4
-
Filesize
76B
MD5162cd9a51818a26625b2d1589ccea4ab
SHA12117c12af63f2eb0536b228bf91f063ed2058c3b
SHA256a3a501e3cb503e5cfeff152217d48d629d0d61a3130172007be34ea9003632e4
SHA51280d3593f3f20b01cca3d434e9c654fba40118572cc5c23ac78eb0ae5801befc64d892e27d66e4f50583d608618377cee1892a0d70b95a6ca2bbee65b0354d79b
-
Filesize
46KB
MD52d04ed77214d5c2d49821b17776f1f28
SHA1d18c1b454fdad6ce613c7448a2a8ce44c4e276ba
SHA256031a7698925dbd545b939d0f278ba119959a0fd0046c49148098899c5269fc04
SHA512a80107bb74644ff6fcbcc2eba02508f9363667714a4d5d3159d55f178f83bbc902b0ed3c3d3d0d55850e154c7cd74f3e08d562ce06216019470f3153fe28fdf1
-
Filesize
36KB
MD54e19b307c18abe38f0735c0a6e218e68
SHA18c136f825f18109a472ec311c112ebc065fb3485
SHA25676a78afd9808f7c9e9cb41f72272fbafe562c62aecbdbd1b7d1babc3e5617629
SHA51220767cec5d05bf06d287a69a72b2ccff877eae0cba79a9aee66e4efee6d9b671b4c88bffa3eb24fe137e2ec774d6451e5f15701ee376e097f40d16e25bd71e5a
-
Filesize
22KB
MD540f5099abf0eb50b91ceaa66004273f3
SHA13d57cc8b2d25070225d0d74ad0e1655256ade633
SHA25625171ae00ad82c2987d4475573da560b63ec41f0e6b0addf2d429d3de8789ba2
SHA512bdf919130e8ed369176cf9a1412b9165d977078e2efb6df5ef4e57b383fa73bc47473803a37b293f3ad1a0d4ca17b7809e4ccc5beb016e92079888eeb81f09c2
-
Filesize
20KB
MD5c524e96d7c06dc00c5601fb2a3652f60
SHA1fda9b704545ad7990914e11ba0b6e7f87ea91ff2
SHA2564bb9eccf5d00ac0192d5ad0d5ddc9a32a0c0b7775263e75986836ecba7cf338b
SHA5124e69156a155d21d057a86b72bac1c81b0e8c269b947b1b0228cbbac3de038b59471eb562f42b550de605d8653ab60b291c0363ac457dac8ad73c47f618b0faa8
-
Filesize
57KB
MD55cc085db470b5eb2ca2de0341256b308
SHA181edf106e7438004a0483cdf377cb85bffe15967
SHA256facd02047d6c657e99efcc84031a49d7bfe62b5a8b5b7662f0f36d8d3d31dea5
SHA5127c0b39e76da86448807fcc3b42b8537d388e89485f5cf8e621e5635c7ecab2d6da20f39831062b8b3d68ed958ba644237eb27830bfcb5164cf1fb7d40758b000
-
Filesize
23KB
MD502faa3c9f7f978a231874456230d0366
SHA10576c96b07cdd05c652500df8b89469fe129020d
SHA2568de5888f91492de440be400659d872574318029edfc2dce880a048304aba3657
SHA512c41a9da6f366faa2ccba1ad0e34fe34d13fbd0ceb98df78b21b9726870ed5747fbe099865912c3ee4b15808b0535ae9d905b4544ca8717f2a245a7519aa604b1
-
Filesize
182KB
MD583d7da60f609431b6af81019efb0019e
SHA1c9953a9aa69887fd46d7e748f6ed17ea502f5205
SHA2567ec5fe7b2751a7eec437d7e45d0441216f1db8343d34c376e70b1adb05548747
SHA512d6124326b315425f95a90850cd191f394269311cb4edaabfdbe86b3b6e0b65a0b74facf1c072b4980def8bbc13f2123b1ca5eb3e087fa6b6735c1384967ad398
-
Filesize
54KB
MD5a6a6a03f72b6dbd324468484f0b74275
SHA1a084db5d24e2ac959916a3f8a3ea3225fd01fe55
SHA2560bb5fda691540d2345dcd851a3fc80bb10d248a27b98a14ddfbe1e18b12b56ef
SHA512a813043e1bc807b0a1817f6f5f8cbaaafb11d97afcf5167fca04ad1adc5a761d3604b1d413092943944b98774e97ed4017209aed08070526852610a6b044affb