Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7Solara/Mic...re.dll
windows7-x64
1Solara/Mic...re.dll
windows10-2004-x64
1Solara/Mic...ms.dll
windows7-x64
1Solara/Mic...ms.dll
windows10-2004-x64
1Solara/Mic...pf.dll
windows7-x64
1Solara/Mic...pf.dll
windows10-2004-x64
1Solara/Mon...dex.js
windows7-x64
3Solara/Mon...dex.js
windows10-2004-x64
3Solara/Mon...dex.js
windows7-x64
3Solara/Mon...dex.js
windows10-2004-x64
3Solara/Mon...ten.js
windows7-x64
3Solara/Mon...ten.js
windows10-2004-x64
3Solara/Mon...dex.js
windows7-x64
3Solara/Mon...dex.js
windows10-2004-x64
3Solara/Mon...ead.js
windows7-x64
3Solara/Mon...ead.js
windows10-2004-x64
3Solara/Mon...son.js
windows7-x64
3Solara/Mon...son.js
windows10-2004-x64
3Solara/Mon...raw.js
windows7-x64
3Solara/Mon...raw.js
windows10-2004-x64
3Solara/Mon...ext.js
windows7-x64
3Solara/Mon...ext.js
windows10-2004-x64
3Solara/Mon...ded.js
windows7-x64
3Solara/Mon...ded.js
windows10-2004-x64
3Solara/Mon...dex.js
windows7-x64
3Solara/Mon...dex.js
windows10-2004-x64
3Solara/Mon...und.js
windows7-x64
3Solara/Mon...und.js
windows10-2004-x64
3Solara/Mon...dex.js
windows7-x64
3Solara/Mon...dex.js
windows10-2004-x64
3Solara/Mon...dex.js
windows7-x64
3Solara/Mon...dex.js
windows10-2004-x64
3Resubmissions
11/08/2024, 07:57
240811-jtlxvs1fkq 911/08/2024, 07:53
240811-jree1a1enm 711/08/2024, 07:49
240811-jnwvwa1dnj 7Analysis
-
max time kernel
337s -
max time network
674s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 07:53
Behavioral task
behavioral1
Sample
Solara/Microsoft.Web.WebView2.Core.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Solara/Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Solara/Microsoft.Web.WebView2.WinForms.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Solara/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Solara/Microsoft.Web.WebView2.Wpf.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Solara/Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Solara/Monaco/fileaccess/index.js
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Solara/Monaco/fileaccess/index.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Solara/Monaco/fileaccess/node_modules/accepts/index.js
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Solara/Monaco/fileaccess/node_modules/accepts/index.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Solara/Monaco/fileaccess/node_modules/array-flatten/array-flatten.js
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Solara/Monaco/fileaccess/node_modules/array-flatten/array-flatten.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/index.js
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/index.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/read.js
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/read.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/types/json.js
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/types/json.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/types/raw.js
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/types/raw.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/types/text.js
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/types/text.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/types/urlencoded.js
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/types/urlencoded.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Solara/Monaco/fileaccess/node_modules/bytes/index.js
Resource
win7-20240705-en
Behavioral task
behavioral26
Sample
Solara/Monaco/fileaccess/node_modules/bytes/index.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Solara/Monaco/fileaccess/node_modules/call-bind/callBound.js
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
Solara/Monaco/fileaccess/node_modules/call-bind/callBound.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Solara/Monaco/fileaccess/node_modules/call-bind/index.js
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
Solara/Monaco/fileaccess/node_modules/call-bind/index.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
Solara/Monaco/fileaccess/node_modules/content-disposition/index.js
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
Solara/Monaco/fileaccess/node_modules/content-disposition/index.js
Resource
win10v2004-20240802-en
General
-
Target
Solara/Monaco/fileaccess/node_modules/bytes/index.js
-
Size
3KB
-
MD5
83cf8fe86424252c5a9a3e2fe90dbd57
-
SHA1
bd46529e5637ff1a659f1d4af2598925b12741e0
-
SHA256
893fcbbbe962dc00e40dc2e4b20e76e92d874dd257345003c6575d940e91a37f
-
SHA512
f0630152a247cf51dfc677c22323afccc667350a11db093b59b93f403481deba1d44cd78cd53f4c4a3e2df297c35fe54cdc841c10c4667ebb81d3a54fbf56d43
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2608 wrote to memory of 2632 2608 chrome.exe 31 PID 2608 wrote to memory of 2632 2608 chrome.exe 31 PID 2608 wrote to memory of 2632 2608 chrome.exe 31 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 1100 2608 chrome.exe 33 PID 2608 wrote to memory of 2916 2608 chrome.exe 34 PID 2608 wrote to memory of 2916 2608 chrome.exe 34 PID 2608 wrote to memory of 2916 2608 chrome.exe 34 PID 2608 wrote to memory of 2936 2608 chrome.exe 35 PID 2608 wrote to memory of 2936 2608 chrome.exe 35 PID 2608 wrote to memory of 2936 2608 chrome.exe 35 PID 2608 wrote to memory of 2936 2608 chrome.exe 35 PID 2608 wrote to memory of 2936 2608 chrome.exe 35 PID 2608 wrote to memory of 2936 2608 chrome.exe 35 PID 2608 wrote to memory of 2936 2608 chrome.exe 35 PID 2608 wrote to memory of 2936 2608 chrome.exe 35 PID 2608 wrote to memory of 2936 2608 chrome.exe 35 PID 2608 wrote to memory of 2936 2608 chrome.exe 35 PID 2608 wrote to memory of 2936 2608 chrome.exe 35 PID 2608 wrote to memory of 2936 2608 chrome.exe 35 PID 2608 wrote to memory of 2936 2608 chrome.exe 35 PID 2608 wrote to memory of 2936 2608 chrome.exe 35 PID 2608 wrote to memory of 2936 2608 chrome.exe 35 PID 2608 wrote to memory of 2936 2608 chrome.exe 35 PID 2608 wrote to memory of 2936 2608 chrome.exe 35 PID 2608 wrote to memory of 2936 2608 chrome.exe 35 PID 2608 wrote to memory of 2936 2608 chrome.exe 35
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Solara\Monaco\fileaccess\node_modules\bytes\index.js1⤵PID:2220
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7229758,0x7fef7229768,0x7fef72297782⤵PID:2632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1208 --field-trial-handle=1268,i,3451004560237283140,2861928309623869195,131072 /prefetch:22⤵PID:1100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1444 --field-trial-handle=1268,i,3451004560237283140,2861928309623869195,131072 /prefetch:82⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1572 --field-trial-handle=1268,i,3451004560237283140,2861928309623869195,131072 /prefetch:82⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2208 --field-trial-handle=1268,i,3451004560237283140,2861928309623869195,131072 /prefetch:12⤵PID:2124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2220 --field-trial-handle=1268,i,3451004560237283140,2861928309623869195,131072 /prefetch:12⤵PID:2372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1848 --field-trial-handle=1268,i,3451004560237283140,2861928309623869195,131072 /prefetch:22⤵PID:1312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3248 --field-trial-handle=1268,i,3451004560237283140,2861928309623869195,131072 /prefetch:12⤵PID:1740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3716 --field-trial-handle=1268,i,3451004560237283140,2861928309623869195,131072 /prefetch:82⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3684 --field-trial-handle=1268,i,3451004560237283140,2861928309623869195,131072 /prefetch:12⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:2256
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13f5e7688,0x13f5e7698,0x13f5e76a83⤵PID:2364
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD548d2860dd3168b6f06a4f27c6791bcaa
SHA1f5f803efed91cd45a36c3d6acdffaaf0e863bf8c
SHA25604d7bf7a6586ef00516bdb3f7b96c65e0b9c6b940f4b145121ed00f6116bbb77
SHA512172da615b5b97a0c17f80ddd8d7406e278cd26afd1eb45a052cde0cb55b92febe49773b1e02cf9e9adca2f34abbaa6d7b83eaad4e08c828ef4bf26f23b95584e
-
Filesize
168B
MD56ac0132792fd391b251bacd6ca804ea9
SHA1ff0534fd0fa3a6dd0750ab79eee2469ee5921cce
SHA25678e15fd5cbee4ccd8873a445d33d6585314164fb348f29fa7b9f58dbc255ccb9
SHA51267ce1c070c392c205f7f451568412e80b90fad71ff7a3af605709ad4c84a4492f676bea1df1dd52f0c586b68b04661e4b057dfa2cace9045e0f3107f189db635
-
Filesize
168B
MD53a0eb7c001a95dd70acf1e9e2bd297d6
SHA128803ce0980be03d594024c4a62aaa373188bb00
SHA25691567497d1b7a524d29cb8fbb713f90d5bca7607e2cf5cf19466b20db5820bc5
SHA512f6db47eb5ca72b1b085056e52573be4e5f42f9195c3af512573dd7ea9b4b30bc658d98fc482ab1b351e96ce8be1520b7c45e4b848a3f5c396ba2de7c8c8489f1
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD55b2df7404f08e32ee4e8898eb79ed50f
SHA18a7e5799b14e14934de239ce43bb6de80d13aaa3
SHA256a3af37d90d0bdb0cb9ca3d2253ae0175853933f8784a6eb941065ea9994986e8
SHA512a18c720f60671d1947e5be19e8e21154da60656fb4a17e3f8f460099748cbc5cddd00c19c9016cf7d8279b6594287c8d08aaed19c9076c3451c339ca32f1d477
-
Filesize
1KB
MD50fd2a08dd762748f7482bf1125c7e69c
SHA1857a89675232569f93058745f18f416d3f4d3dc4
SHA2560b69843591398ff2589a16ade58b16f3c81dabc338a02fc25229cd9ec12e7403
SHA512a1c8b849b4ff44591a5c641e7cffd9a3e6da014cf9c584788408799efc35a67ead61b29b9b00d3b084769c6650f9a31b7f44d0861326b0f8595e46fcbb98071c
-
Filesize
1KB
MD5d3b30296e22bd44f0af3dd26af099c04
SHA13c66240d29fd32cd4e0e104e0168589153a5bef1
SHA256b048b3a9722000ed21bfc8f177e22dc60448a3665d5b353af65657946e4b55d2
SHA512dac69ef1ac01fcdc1aad8985dcfde05e1231d37ce22d2b3d8b4f4bd3aae3dd38ba03ca53bf41638eed267394f47fa20b3bd71fb14b3bf213615c776ca794e6da
-
Filesize
1KB
MD5da5bfe6cb0e1c1f4a26bdc22515eb72b
SHA1b99d5c7def427417b184d61ee2efba8bc6fd0951
SHA25699561dc7eba35f707ffb01bfe1e9a7b60f59b47320c5906f3e9657016e638990
SHA512408d2c7ee88062ee63a3f584b820d7736f791accf4d265959df9bfe3e1e483aa84b2953482c7f911ad236c1bdc71b0845cc0c4ddc225f2915366e7a21071bee7
-
Filesize
361B
MD54d8ad38af69b86c0d784690d63bfd2ec
SHA13a299e9d622ceff51cd4ecc63e772a1ec37ad83a
SHA25646a584e574992011dbc9e8c23b5ac2389add8c5a812d22dedc3122d0b1d52338
SHA512f66b722bc5cd04e3f7417c743d1bd279898999307d86f84b48d6641456875f6c8bf3e92616f1894c603aa79f9e3c166fda885b58053553532bc5741e7ebae487
-
Filesize
6KB
MD52b39b9f0a9f1e3799feaa4f8b4215bb3
SHA15b893183248d156257afbfd13329a6fff91a93c8
SHA2568b0c1dcb55027c9494586be8d07b3e0a9c0d54fbc57daad469fdefd4fbd0503e
SHA5122c142395cb37840b390ad694e05357a14b62b4ca1a82d3271f3567357dab07dd38d863711c825edddc240be3fe4aa9bd5a721428392a2e04f17c6c53c9524131
-
Filesize
6KB
MD55f1065cee5ef8135dbbe041098f1ac70
SHA1252699b3cc10e57ebd9d46dc6638e7156105c261
SHA256acc9add146c7165f7fef80a89896a5a5267feeec9a33b0d62e2492046c1fff99
SHA51239ef72fb36700c7ed54dc548ee7e22b90ebc3201bf605f9f88f687c6b2d5633e20779fbb6798ab586665089780ae9cb072cd1bd090b6db74a5c7cacc30f0b0ee
-
Filesize
5KB
MD5a45b4a7c92285f5425239e3ecdbb7d9c
SHA134e5934c74f1cc75ed61f9973922c2f1e9824726
SHA256383983598e0b0f358bbe7fd9182ef97e680298d02ec3404f5588e3df6ffeee50
SHA512c1ed7579522db539e585eb9b9e0dd751ccf242817010c6cf14b77fe75975d7c7c9d785b3c0dce881edfa4779c565c0dac014811aede968fb3d37f1f7c6e31b41
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
311KB
MD5caca419875c040c3f0a7d720a1795b0e
SHA145747844e89ce5a656d9ef829301d527bda60433
SHA256f866ed1b2c0c2603322b9da6bdf8a46373ff1c364e24be77b4469889f3afbaab
SHA512a280fecc38ead22fe4d390b714413475247f33e7393309a7eb63b9ed1f4d12f0b817e8e39a22fdf68d013e4c4a60c5b4bdd6ad0ce2823f841521dbd308236a0f