Overview
overview
3Static
static
3Solara_Bac...es.dll
windows7-x64
3Solara_Bac...es.dll
windows10-2004-x64
1Solara_Bac...es.dll
windows7-x64
1Solara_Bac...es.dll
windows10-2004-x64
1Solara_Bac...es.dll
windows7-x64
1Solara_Bac...es.dll
windows10-2004-x64
1Solara_Bac...es.dll
windows7-x64
1Solara_Bac...es.dll
windows10-2004-x64
1Solara_Bac...es.dll
windows7-x64
1Solara_Bac...es.dll
windows10-2004-x64
1Solara_Bac...es.dll
windows7-x64
1Solara_Bac...es.dll
windows10-2004-x64
1Solara_Bac...es.dll
windows7-x64
1Solara_Bac...es.dll
windows10-2004-x64
1Solara_Bac...es.dll
windows7-x64
1Solara_Bac...es.dll
windows10-2004-x64
1Solara_Bac...es.dll
windows7-x64
1Solara_Bac...es.dll
windows10-2004-x64
1Solara_Bac...es.dll
windows7-x64
1Solara_Bac...es.dll
windows10-2004-x64
1Solara_Bac...es.dll
windows7-x64
1Solara_Bac...es.dll
windows10-2004-x64
1Solara_Bac...es.dll
windows7-x64
1Solara_Bac...es.dll
windows10-2004-x64
1Solara_Bac...es.dll
windows7-x64
1Solara_Bac...es.dll
windows10-2004-x64
1Solara_Bac...es.dll
windows7-x64
1Solara_Bac...es.dll
windows10-2004-x64
1Solara_Bac...es.dll
windows7-x64
1Solara_Bac...es.dll
windows10-2004-x64
1Solara_Bac...es.dll
windows7-x64
1Solara_Bac...es.dll
windows10-2004-x64
1Analysis
-
max time kernel
134s -
max time network
274s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
05-08-2024 07:18
Static task
static1
Behavioral task
behavioral1
Sample
Solara_Backgrounds/Shared/DAC/bin/fr/DacUnpack.Resources.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Solara_Backgrounds/Shared/DAC/bin/fr/DacUnpack.Resources.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Solara_Backgrounds/Shared/DAC/bin/fr/Microsoft.Data.Tools.Schema.Sql.resources.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Solara_Backgrounds/Shared/DAC/bin/fr/Microsoft.Data.Tools.Schema.Sql.resources.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Solara_Backgrounds/Shared/DAC/bin/fr/Microsoft.Data.Tools.Utilities.resources.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Solara_Backgrounds/Shared/DAC/bin/fr/Microsoft.Data.Tools.Utilities.resources.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Solara_Backgrounds/Shared/DAC/bin/fr/Microsoft.SqlServer.Dac.resources.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Solara_Backgrounds/Shared/DAC/bin/fr/Microsoft.SqlServer.Dac.resources.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Solara_Backgrounds/Shared/DAC/bin/fr/SqlPackage.resources.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
Solara_Backgrounds/Shared/DAC/bin/fr/SqlPackage.resources.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Solara_Backgrounds/Shared/DAC/bin/it/DacUnpack.Resources.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Solara_Backgrounds/Shared/DAC/bin/it/DacUnpack.Resources.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Solara_Backgrounds/Shared/DAC/bin/it/Microsoft.Data.Tools.Schema.Sql.resources.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
Solara_Backgrounds/Shared/DAC/bin/it/Microsoft.Data.Tools.Schema.Sql.resources.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Solara_Backgrounds/Shared/DAC/bin/it/Microsoft.Data.Tools.Utilities.resources.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
Solara_Backgrounds/Shared/DAC/bin/it/Microsoft.Data.Tools.Utilities.resources.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Solara_Backgrounds/Shared/DAC/bin/it/Microsoft.SqlServer.Dac.resources.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
Solara_Backgrounds/Shared/DAC/bin/it/Microsoft.SqlServer.Dac.resources.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Solara_Backgrounds/Shared/DAC/bin/it/SqlPackage.resources.dll
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
Solara_Backgrounds/Shared/DAC/bin/it/SqlPackage.resources.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Solara_Backgrounds/Shared/DAC/bin/ja/DacUnpack.Resources.dll
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
Solara_Backgrounds/Shared/DAC/bin/ja/DacUnpack.Resources.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Solara_Backgrounds/Shared/DAC/bin/ja/Microsoft.Data.Tools.Schema.Sql.resources.dll
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
Solara_Backgrounds/Shared/DAC/bin/ja/Microsoft.Data.Tools.Schema.Sql.resources.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Solara_Backgrounds/Shared/DAC/bin/ja/Microsoft.Data.Tools.Utilities.resources.dll
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
Solara_Backgrounds/Shared/DAC/bin/ja/Microsoft.Data.Tools.Utilities.resources.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Solara_Backgrounds/Shared/DAC/bin/ja/Microsoft.SqlServer.Dac.resources.dll
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
Solara_Backgrounds/Shared/DAC/bin/ja/Microsoft.SqlServer.Dac.resources.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Solara_Backgrounds/Shared/DAC/bin/ja/SqlPackage.resources.dll
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
Solara_Backgrounds/Shared/DAC/bin/ja/SqlPackage.resources.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
Solara_Backgrounds/Shared/DAC/bin/ko/DacUnpack.Resources.dll
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
Solara_Backgrounds/Shared/DAC/bin/ko/DacUnpack.Resources.dll
Resource
win10v2004-20240802-en
General
-
Target
Solara_Backgrounds/Shared/DAC/bin/fr/DacUnpack.Resources.dll
-
Size
153KB
-
MD5
335dc82d727abdce114bcf090bcded1c
-
SHA1
166dd08e4de4b1c238e8827c5fb30784b6dbfb19
-
SHA256
37900233a1f49c0ecb83be93b3c38f261e9318bd1dbaa673fdcb1257074ab749
-
SHA512
6d5edf08abf56b19b3d45102759c278c073de9e9840dbe61354d28d14ef0ffb444b12afad859789d0f73a6c5d674eb94da86131054c483ad55db5b3d8df27549
-
SSDEEP
1536:XxpNooFyAJWnPhC+V2McFkpHgTqmAIWkdp58f:XxFHWnPhC+VYOudp58f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2792 chrome.exe 2792 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 2832 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2832 AUDIODG.EXE Token: 33 2832 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2832 AUDIODG.EXE Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe Token: SeShutdownPrivilege 2792 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe 2792 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2912 2792 chrome.exe 34 PID 2792 wrote to memory of 2912 2792 chrome.exe 34 PID 2792 wrote to memory of 2912 2792 chrome.exe 34 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 752 2792 chrome.exe 36 PID 2792 wrote to memory of 2356 2792 chrome.exe 37 PID 2792 wrote to memory of 2356 2792 chrome.exe 37 PID 2792 wrote to memory of 2356 2792 chrome.exe 37 PID 2792 wrote to memory of 2200 2792 chrome.exe 38 PID 2792 wrote to memory of 2200 2792 chrome.exe 38 PID 2792 wrote to memory of 2200 2792 chrome.exe 38 PID 2792 wrote to memory of 2200 2792 chrome.exe 38 PID 2792 wrote to memory of 2200 2792 chrome.exe 38 PID 2792 wrote to memory of 2200 2792 chrome.exe 38 PID 2792 wrote to memory of 2200 2792 chrome.exe 38 PID 2792 wrote to memory of 2200 2792 chrome.exe 38 PID 2792 wrote to memory of 2200 2792 chrome.exe 38 PID 2792 wrote to memory of 2200 2792 chrome.exe 38 PID 2792 wrote to memory of 2200 2792 chrome.exe 38 PID 2792 wrote to memory of 2200 2792 chrome.exe 38 PID 2792 wrote to memory of 2200 2792 chrome.exe 38 PID 2792 wrote to memory of 2200 2792 chrome.exe 38 PID 2792 wrote to memory of 2200 2792 chrome.exe 38 PID 2792 wrote to memory of 2200 2792 chrome.exe 38 PID 2792 wrote to memory of 2200 2792 chrome.exe 38 PID 2792 wrote to memory of 2200 2792 chrome.exe 38 PID 2792 wrote to memory of 2200 2792 chrome.exe 38
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Solara_Backgrounds\Shared\DAC\bin\fr\DacUnpack.Resources.dll,#11⤵PID:2500
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1604
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4801⤵
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef62a9758,0x7fef62a9768,0x7fef62a97782⤵PID:2912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1120 --field-trial-handle=1376,i,15117623783332044626,4008752433969972963,131072 /prefetch:22⤵PID:752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1376,i,15117623783332044626,4008752433969972963,131072 /prefetch:82⤵PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1376,i,15117623783332044626,4008752433969972963,131072 /prefetch:82⤵PID:2200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2240 --field-trial-handle=1376,i,15117623783332044626,4008752433969972963,131072 /prefetch:12⤵PID:1788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2252 --field-trial-handle=1376,i,15117623783332044626,4008752433969972963,131072 /prefetch:12⤵PID:1768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1120 --field-trial-handle=1376,i,15117623783332044626,4008752433969972963,131072 /prefetch:22⤵PID:660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1468 --field-trial-handle=1376,i,15117623783332044626,4008752433969972963,131072 /prefetch:12⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3688 --field-trial-handle=1376,i,15117623783332044626,4008752433969972963,131072 /prefetch:82⤵PID:2636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3720 --field-trial-handle=1376,i,15117623783332044626,4008752433969972963,131072 /prefetch:12⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=1084 --field-trial-handle=1376,i,15117623783332044626,4008752433969972963,131072 /prefetch:12⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=904 --field-trial-handle=1376,i,15117623783332044626,4008752433969972963,131072 /prefetch:12⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2976 --field-trial-handle=1376,i,15117623783332044626,4008752433969972963,131072 /prefetch:82⤵PID:1136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2512 --field-trial-handle=1376,i,15117623783332044626,4008752433969972963,131072 /prefetch:82⤵PID:1944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=584 --field-trial-handle=1376,i,15117623783332044626,4008752433969972963,131072 /prefetch:12⤵PID:2604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4092 --field-trial-handle=1376,i,15117623783332044626,4008752433969972963,131072 /prefetch:82⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc9d940d418e2912abdd17a10c26cf4b
SHA1c9de36286d3f796325df218caf1bc55c7ae907c1
SHA256aff6efbb037ac770d93136f8fb9c014e25bc4e9b2b0ffed7363c4bb9de39f609
SHA5123853391eee335d2d54cc800bae7651037e075648822f67a60988105e93480669efec10ae32f856b440ee6b39b9e759e058f98a11575edf771ee9b15e523456cc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50be6f8b650aecd02f55a38dcd8918633
SHA1dd4b2e31d8f026829ef3c93a6d04399cced8099e
SHA256ef4c621d820d6b1ca5cd0973b1623e0f7033b227bb552fb1adc8610e890c3c0d
SHA512808383261f577d37384bde0dcf4199304edc9cc6b125790a3912ccf6a174be41680b015c6c1b847c51833691c6ba72defe3aff3119de85948c0441a4830ee616
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d226a5d9155840412b35c5323810b1a4
SHA195a2efda6def4114fd7641bb39408a6bc29bac8c
SHA25670dd3a4a625afc64a14d9e024efd3752b219e96a7d6311df161cd2db42b9f525
SHA512e42239e9ef10a7b18aa7768a5bcfaafe13a3ded08eb55ed0e8935941a8a2b648f8e3c4d8802edfdbe587b24aed3cbebc53ae5fe0a38e4d732f6c62c374efe527
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD540752b7dc4280b5ba94a695b35c7c223
SHA16d261a2feba3aa6235953c63ae9defe77eca89e6
SHA2563c0868d871658b6eaa0396230977403e3c1d0bd28952ed55f4550582e905f145
SHA512e4f159924ecef639b95a654a80c05ad762f60cc5936ea33927f271fa5c62b0dd2fa173aac15d94ac0ad966d4ad1b00f9656a73563e2ee0828d31cbc2bdec1b3d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\96e3e8f5-fdd3-4fd7-9d04-15a695f7a48d.tmp
Filesize7KB
MD5c658f84e0d489e27a1b42d0c7764fbc9
SHA145db911ddf4d6853bb7e65ac2a2c35d9cb2eda0c
SHA2566901ba0cddf3ade4a3a81368ac6dff58fc12f7393bbe277aa32bba7a210075d2
SHA5129b6013e92eb6f6cab0a3406510fbec421a492e27f78286cd3994313a474830a3f23519f77d2a01c951a3ae2450846bba02eca5dd8cc97513dcdd8b7350b8bbc5
-
Filesize
209KB
MD53e552d017d45f8fd93b94cfc86f842f2
SHA1dbeebe83854328e2575ff67259e3fb6704b17a47
SHA25627d9c4613df7a3c04da0b79c13217aa69992b441acb7e44bf2a7578ca87d97d6
SHA512e616436f2f15615429c7c5c37de3990c3e86c5e1da7d75a0f524fc458b75d44a5be1a3648a628d63e1cf8aa062e08b538f2f2bc9c6a0b42157beb24f82c571d9
-
Filesize
3KB
MD53f5b70565adf948f01e4eb81e3a8e1bb
SHA10cb21cf7fcc72c6acebe80a6f11f8c7296aedc88
SHA2568f68de8e62845d032c1a2b8fbd0e1e38b6325470337b2cb6ebd339c990322f5e
SHA5124f8a009b630e76644f1f310433214b2b415695a3c045bc82de7e8c5d66d466f36d266f33f30d0cb38635059770a9b89860a8294e909ad7cd297d43dd0f03d401
-
Filesize
168B
MD516539181840b987a34c52322755205b0
SHA13ae1bc72a1d5392da0607edcb580864810ffcbb3
SHA256eee11ef5ff1f0aa44a88c9a6c0d99a9c209c89313356a7024eeefa9cd139fbe3
SHA51279ca51165281d8de4a4413d443cf1188e25d08e99e60d7cb3fa3de6e2954426c0bce91d5eda0e813df9dbd79a1bd41e0da2103faf6b40c8b9bd06cda11d42288
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_www.roblox.com_0.indexeddb.leveldb\000002.dbtmp
Filesize16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
1KB
MD55bb54fca46eb8b4bbbc24f6a62980cd1
SHA1f838cc618750731b5755b1411481fdb770043443
SHA2568fef7017315554613165c505978b26a513fd01f00a35f383a8b2a69e7264de5d
SHA512b07ab378b57f7237ee6b9c90558607afcc51df04a283d64e6cfd244f811e25a89565b45fc4993856432a4b9bb0060c8dbcbaadf905a202e4e5cdf357eda3ee8f
-
Filesize
363B
MD5f37a01c1be5b9c483165f7c266c754c1
SHA1ea115b2d0697ebeba1060b82284c6b61547c65b2
SHA25604ee6a636f1edd693442bc6527f1da30be51dee6b1a88d0e8b97eaa5bad72c1b
SHA51227e2de75429876f9a73bfde244e71d7b8c6fe3ef65c59edd796bef1afd5c35dde6fc164596529c5c094aeccb537eda426ace324ce4b43f08049f74a8ef8ba172
-
Filesize
363B
MD544106494f9ab9429752c65a42d47f490
SHA1b9bb46a3eaac7b092315453e13cf411346dbbd27
SHA256385f4259126a668139a4fe1172ce592d76ad3855b80bc5e2094da72f1722fa9d
SHA5124a92f7e244d9763755e4eac889210792d4cd258596e7f5417a6c49a074f061a29c4fe4fea046f496f3c1d8c5408db290273c1fb585d67f95dcba7998d5cce91d
-
Filesize
3KB
MD5bc0d1f69d6cb2ce4c2df3ffee381dd9e
SHA17b7de65c5b79e8082c65d602b7f12430ddaea815
SHA256d85df1fc6dd09d35a4182130bf8d0360f3441e6c9b73622d73781b08fb9d2e91
SHA512680b1bdbb1ac1dee1897321135a39d73506018dfa770420c6deb47e634225f76b2cc6f37291e6d51ded5449916b8ab6e712253b83fd128d099eb9ac6f85757dd
-
Filesize
3KB
MD54fe762a749660193fdbb9f8ba8db0b3b
SHA1683f51a7c240de8ce45102641f878b9cf4e5a6cb
SHA2560b826f5f7b4106bc394218a9a673fa3083cac289e0a493e1425f3af7ff90f1d4
SHA512dd9a02513664fc20769aaac0ee5320ab04222b7549fa5f7283af4c81dc0aa54ad01cfea1c5456df5484a01e570b57717d8a9978ca7316d4f02b9d8d63675f3e1
-
Filesize
3KB
MD5dd2be43493bb9c29da23273ae5ad30aa
SHA1663b33d309619e30163df19ef2baeda98af4783c
SHA2564aea0f8cd1ea8a8eb6ae01362806eaa433dd454b5269ba015fbba46f31a0bcae
SHA512e1721424a56d8fb2f1bb81887df88ad18ffce06566b0eaf42c0856d8811303ef11c631518b015b8f85055a7113598d0477708e9edda4369c1122eff655141386
-
Filesize
3KB
MD5dff67c1232436d90b6ad6d2f1f917878
SHA18d2247e9f6ac40dc980403649cb79a8e2d3e8d04
SHA25665492a7376edc7a4bd4c0a0f75eaea801d4710d4b62d72fddbc84db939a14791
SHA5127a801a50e1472822a734d2fdf56c009474bfe7e8017d3e65facc2ca599e9ed7799929782bdef47ff694a9530e53795a70c915c7d9f7742de531dde39185d351e
-
Filesize
3KB
MD5e500148d6a992da3ca3895ec576f858f
SHA185cecde4f061c028aa0b153c10f07da28c5706b5
SHA256f1ea77e67cd32bad43737d12df7bcf389eafc34681cb04aea4a838165dcdb811
SHA512b876deaa2770968d3326c4e7034ecf4147f3ac0bc195d639e6524feb1329de1c52e9079bb5ab816a332986003b3b60c88e22b34ca6c0aace14fc4e726ea48f14
-
Filesize
3KB
MD56a00cadf3cdf167096dc4ea0d18a197e
SHA1dd82bb271a7939e17ee94ee812c159134b852a56
SHA256690603697f0ac2a140cc67971965ba4fca445e7cb6f6b6632dcd35c93fdbd514
SHA512bb8348361dab87cb31fc58293b8437613f5e5e16dc5c276ccf6cf62d4e1eee49c95433a93c15eecf7c83c2da588b9d82ecebdf89e87597b35871bdcde74e6f1d
-
Filesize
363B
MD57515d60a19ef44a4fc779bfdeaae2296
SHA14479e8f4d9a55a082b89eaefe15e6f13838c0c0b
SHA25644a1888d05a49af02094af41b1d1a0209b76dede1f7914444f54c44d780432cf
SHA5128ae1f5cd315e898bce87b92884f36d1275e46d8596bdcb1c03af2379669c6ea8a8941042daf99c3302a24d60836e18e78b5579e76ff37d5bcfdac89038ad0914
-
Filesize
3KB
MD5e1791a43015d51353482b30416bfd5c2
SHA19f9d0824e73b30fd0eaed61619056de68005df2d
SHA2560d10256d5f5a3b2b32636cff16aaea8c7f002a70fb8b5bc2d2b395d852514225
SHA51269dd8da19e89f3f59a92c9cb747adc4dbeb207455e09e9907243f07078fa042ea247f6b496913322e1645be8ed5f3e6c63a00f3ba236b6bc5f9c71ce088f2a13
-
Filesize
1KB
MD5890c22e097f9027f5dc44c2a6e4d7aaa
SHA1af932baaf03f8b9979a64f120afe7e0849696933
SHA256c4633feda85823c3ca2242c28ba07e209036c52e4ac24650b5171df5037c45a5
SHA51251a4f03d41a3f7eef410ca8a47131b642f0d156d1036d17ceb75b6441ea46ec16dc7f8438a3d51d9a0a737c1fe09d25b6982f27c6b1348c9eafb05acc249d98a
-
Filesize
6KB
MD5b9a37233f1b97016ca7d1a5f125663fa
SHA19e30869430411404b350d603358b9686c37ef0f4
SHA2564bbea561e07227ed5141e664746bf10549b964856024922118e618c90fe6ac62
SHA5127b943377c999d8441c7f86132c5d923baf7bd59c1496745c7a34dcb30ad17e0729954721fcf7fc7e9c601122b52db441386f13a98a91f07f8719e0d6988b6eac
-
Filesize
5KB
MD50f621cd61fd4e49dec00d14250202380
SHA14e2410cdd17ec21369380d17a2324aed0acdccc2
SHA256b17873988ab9245add343cda70e77d2f2632dea13b3b79e1bc21e57837e518cb
SHA512a0c007aa41898ee53885c18e6e795e633155b4b609af3c5bde38994e8579cc567349d00469dd314ee7f6c9a9f3dce17641d2aff507f6d2931d17d46714859ae9
-
Filesize
6KB
MD5d557383008f67f2975a2f921734f6c7c
SHA1eb50c5bf044833f22823a85411c44e7e04c7fce0
SHA256a55d1953803a18f343ab81ef33afeba2444f2cae904fe51298b697afcf92f536
SHA512870e381678ce0be81e55b3e8e9129639fdcd8a6055ed98d0464b5002c6197436271a656369ca86c0c20738431b11529481766d53bef57d9e3db0da7567284c69
-
Filesize
6KB
MD52f81d09d3a3a26bce19cfc937f455d61
SHA1429ec1965fcd281bb7c781cba26d7f00f7e8c624
SHA2561456565af0336d369006285aeecd7fbf8d74ea340fd020c7112d91abe2e19973
SHA512fdc164c3738750b02f491d37369cec121836a2c21e0209c693206e63c0540435fc43154b648f3c05a8908f55264bb45bfcdc2f27a442a6ae722901b58fca0df6
-
Filesize
5KB
MD56a9746ea27ed92b654dfbeef6ca7c1c3
SHA1a97a430f9dee5d8060f6df2a8d2a6af5b2b8e70f
SHA2564373dd339a6789c881fdc39694e8d6a84eb678112dace569e5dfcb16c3af45f1
SHA512c1127ede17ab5dc41bfa8a0ce3ce13caa8a66a637c9244bb1d2b730d5b6bd56811393ce5bd11636ad108a08ce8c91f09ffeb084a827ad06e1adb222312e15a27
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\CURRENT~RFf7af1fd.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
75KB
MD502ca1fb12216521146e8330da9b750fa
SHA1df89727bbdb8aca21035b0aab32d3703d005d5c6
SHA2564992436247e1bc39410122284f6972216ee17a87207dca999948678a544ace98
SHA5122b42e82d51e394e81d5b53319d027e1fa2ae2c395a18e6f29829352f4111f3d0fbb423d9226eca6eb52e44c8eb4b6e34db00d8978e8896c94219c8b717bbc1a2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b