Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
9Static
static
7Solara/Mic...re.dll
windows7-x64
1Solara/Mic...re.dll
windows10-2004-x64
1Solara/Mic...ms.dll
windows7-x64
1Solara/Mic...ms.dll
windows10-2004-x64
1Solara/Mic...pf.dll
windows7-x64
1Solara/Mic...pf.dll
windows10-2004-x64
1Solara/Mon...dex.js
windows7-x64
3Solara/Mon...dex.js
windows10-2004-x64
3Solara/Mon...dex.js
windows7-x64
3Solara/Mon...dex.js
windows10-2004-x64
9Solara/Mon...ten.js
windows7-x64
3Solara/Mon...ten.js
windows10-2004-x64
3Solara/Mon...dex.js
windows7-x64
3Solara/Mon...dex.js
windows10-2004-x64
3Solara/Mon...ead.js
windows7-x64
3Solara/Mon...ead.js
windows10-2004-x64
3Solara/Mon...son.js
windows7-x64
3Solara/Mon...son.js
windows10-2004-x64
3Solara/Mon...raw.js
windows7-x64
3Solara/Mon...raw.js
windows10-2004-x64
3Solara/Mon...ext.js
windows7-x64
3Solara/Mon...ext.js
windows10-2004-x64
3Solara/Mon...ded.js
windows7-x64
3Solara/Mon...ded.js
windows10-2004-x64
3Solara/Mon...dex.js
windows7-x64
3Solara/Mon...dex.js
windows10-2004-x64
3Solara/Mon...und.js
windows7-x64
3Solara/Mon...und.js
windows10-2004-x64
3Solara/Mon...dex.js
windows7-x64
3Solara/Mon...dex.js
windows10-2004-x64
3Solara/Mon...dex.js
windows7-x64
3Solara/Mon...dex.js
windows10-2004-x64
3Resubmissions
11/08/2024, 07:57
240811-jtlxvs1fkq 911/08/2024, 07:53
240811-jree1a1enm 711/08/2024, 07:49
240811-jnwvwa1dnj 7Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 07:57
Behavioral task
behavioral1
Sample
Solara/Microsoft.Web.WebView2.Core.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Solara/Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Solara/Microsoft.Web.WebView2.WinForms.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Solara/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Solara/Microsoft.Web.WebView2.Wpf.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Solara/Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Solara/Monaco/fileaccess/index.js
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Solara/Monaco/fileaccess/index.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Solara/Monaco/fileaccess/node_modules/accepts/index.js
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Solara/Monaco/fileaccess/node_modules/accepts/index.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Solara/Monaco/fileaccess/node_modules/array-flatten/array-flatten.js
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Solara/Monaco/fileaccess/node_modules/array-flatten/array-flatten.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/index.js
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/index.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/read.js
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/read.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/types/json.js
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/types/json.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/types/raw.js
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/types/raw.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/types/text.js
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/types/text.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/types/urlencoded.js
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
Solara/Monaco/fileaccess/node_modules/body-parser/lib/types/urlencoded.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Solara/Monaco/fileaccess/node_modules/bytes/index.js
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
Solara/Monaco/fileaccess/node_modules/bytes/index.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Solara/Monaco/fileaccess/node_modules/call-bind/callBound.js
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
Solara/Monaco/fileaccess/node_modules/call-bind/callBound.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Solara/Monaco/fileaccess/node_modules/call-bind/index.js
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
Solara/Monaco/fileaccess/node_modules/call-bind/index.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
Solara/Monaco/fileaccess/node_modules/content-disposition/index.js
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
Solara/Monaco/fileaccess/node_modules/content-disposition/index.js
Resource
win10v2004-20240802-en
General
-
Target
Solara/Monaco/fileaccess/node_modules/accepts/index.js
-
Size
5KB
-
MD5
4fe4d2c90a2fd19d6e97443a7d24f815
-
SHA1
282263f45f6bf80fbf43f4097d53b5b60ff1a05f
-
SHA256
be2decbd50610e8f995c1e312ee4dd6d7c1244cfdf03ee4c4a3da68e572dada1
-
SHA512
c795b7285cc92616a46fd1ad2d00ce65fb4b269e6b6fc35315891d119b7c25b7f4573540be0627d577123201d9cfe119c8a53f0e75a8b6ea870f8d89a130c213
-
SSDEEP
96:oYG1MGmGHqyl8rAyBkmqFxo+uerpDWMlB8fdOGUJTit4UG9bCZhPwA:oYG1Xlqyl88yBD+uerRLD0YQ4rcZh9
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Solara.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Solara.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Solara.exe -
resource yara_rule behavioral10/memory/5748-754-0x0000000180000000-0x0000000180A7C000-memory.dmp themida behavioral10/memory/5748-757-0x0000000180000000-0x0000000180A7C000-memory.dmp themida behavioral10/memory/5748-756-0x0000000180000000-0x0000000180A7C000-memory.dmp themida behavioral10/memory/5748-755-0x0000000180000000-0x0000000180A7C000-memory.dmp themida behavioral10/memory/5748-773-0x0000000180000000-0x0000000180A7C000-memory.dmp themida -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 224 pastebin.com 223 pastebin.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF chrome.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 5748 Solara.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Crashpad\metadata setup.exe File opened for modification C:\Program Files\Crashpad\settings.dat setup.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133678366981742066" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-355097885-2402257403-2971294179-1000\{25898EF0-4737-480B-94E8-D0C60AD305FF} msedge.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2088 chrome.exe 2088 chrome.exe 764 msedge.exe 764 msedge.exe 2544 msedge.exe 2544 msedge.exe 5828 identity_helper.exe 5828 identity_helper.exe 2396 msedge.exe 2396 msedge.exe 3884 msedge.exe 3884 msedge.exe 5480 chrome.exe 5480 chrome.exe 5480 chrome.exe 5480 chrome.exe 5748 Solara.exe 5748 Solara.exe 5748 Solara.exe 5748 Solara.exe 5748 Solara.exe 5748 Solara.exe 5748 Solara.exe 5748 Solara.exe 5748 Solara.exe 5748 Solara.exe 5748 Solara.exe 5748 Solara.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 27 IoCs
pid Process 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe Token: SeShutdownPrivilege 2088 chrome.exe Token: SeCreatePagefilePrivilege 2088 chrome.exe -
Suspicious use of FindShellTrayWindow 61 IoCs
pid Process 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe -
Suspicious use of SendNotifyMessage 48 IoCs
pid Process 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2088 chrome.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2088 wrote to memory of 3524 2088 chrome.exe 96 PID 2088 wrote to memory of 3524 2088 chrome.exe 96 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 3292 2088 chrome.exe 97 PID 2088 wrote to memory of 1104 2088 chrome.exe 98 PID 2088 wrote to memory of 1104 2088 chrome.exe 98 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99 PID 2088 wrote to memory of 4732 2088 chrome.exe 99
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\Solara\Monaco\fileaccess\node_modules\accepts\index.js1⤵PID:4884
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffd69f2cc40,0x7ffd69f2cc4c,0x7ffd69f2cc582⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1828,i,4098923620333350712,4815783632286949819,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1872 /prefetch:22⤵PID:3292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2112,i,4098923620333350712,4815783632286949819,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2096 /prefetch:32⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2308,i,4098923620333350712,4815783632286949819,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2324 /prefetch:82⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3168,i,4098923620333350712,4815783632286949819,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:2512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3264,i,4098923620333350712,4815783632286949819,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3736,i,4098923620333350712,4815783632286949819,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3684 /prefetch:12⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4952,i,4098923620333350712,4815783632286949819,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4964 /prefetch:82⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4968,i,4098923620333350712,4815783632286949819,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4936 /prefetch:82⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level2⤵
- Drops file in Program Files directory
PID:184 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x284,0x288,0x28c,0x260,0x290,0x7ff7b8454698,0x7ff7b84546a4,0x7ff7b84546b03⤵
- Drops file in Program Files directory
PID:3220
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=3732,i,4098923620333350712,4815783632286949819,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:1548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2372,i,4098923620333350712,4815783632286949819,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3532 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:5480
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2192
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4224
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xe0,0x128,0x7ffd645946f8,0x7ffd64594708,0x7ffd645947182⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2604 /prefetch:82⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:5128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:5136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:12⤵PID:5484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:5492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵PID:5700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2168 /prefetch:12⤵PID:5972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:5636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4464 /prefetch:82⤵PID:5704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3692 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4504 /prefetch:12⤵PID:5144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5676 /prefetch:12⤵PID:5560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3700 /prefetch:12⤵PID:6120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:5188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5764 /prefetch:12⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:5408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1196 /prefetch:12⤵PID:5456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6116 /prefetch:12⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6248 /prefetch:12⤵PID:6008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6276 /prefetch:12⤵PID:5532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:12⤵PID:5184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6712 /prefetch:12⤵PID:6060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:5504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6352 /prefetch:82⤵PID:5740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2124,726604113782050226,17614045172979826374,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6728 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3884
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5156
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x41c 0x4f01⤵PID:4248
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5360
-
C:\Users\Admin\Downloads\Solara.Dir\Solara\Solara.exe"C:\Users\Admin\Downloads\Solara.Dir\Solara\Solara.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD53f3afce4ea01f96b03a3d084f3285bce
SHA16bfad706937e8479f2d9f08e629e039b69da0076
SHA256f433530f7bb6f863da186fafff83a251c9152ddfa01f91648fd82c79a6555e91
SHA51271ad2cfc52ace990b2bb7cdd212f6bfc347f87dd057e69ecaaa9667085e702fef197d2f786839ce5aa364670c1860706c482dc4c3a4df788ffe3a3c206542eb3
-
Filesize
210KB
MD548d2860dd3168b6f06a4f27c6791bcaa
SHA1f5f803efed91cd45a36c3d6acdffaaf0e863bf8c
SHA25604d7bf7a6586ef00516bdb3f7b96c65e0b9c6b940f4b145121ed00f6116bbb77
SHA512172da615b5b97a0c17f80ddd8d7406e278cd26afd1eb45a052cde0cb55b92febe49773b1e02cf9e9adca2f34abbaa6d7b83eaad4e08c828ef4bf26f23b95584e
-
Filesize
216B
MD5807f5bc79fc4f4c60e68029e373ccbe4
SHA19733d8e4853ed96750e9b05a4534a2f2a17acf06
SHA256d89b78cb38fca187efa21941c707a5560e121a60f4ae819f3c4e0387bb932b35
SHA512da28370da30f7b47e8a78af0aca3bd78fc61a215d7c314620dfab90f2537495306ee4b78994aa327ea5cd13319e1d482f16425a938c81d594e5e96775af441b3
-
Filesize
2KB
MD5c902d03fe07a77a299d0d4726f155988
SHA1996d7a60ecf2fa2753cf8233881b2fe912983430
SHA2563ec2de23a6229bf8c42702c8761ef680229d31ffe22678d7bfe7d2f3d7db38b3
SHA512590391350b5f245f54411fe713f78cdefae6f22a447324ab1f65df743ee2c2a7f4d005ac15388ad3f04bb76a8c2652449ed2da9b7dbc730cdea9b5aa969a1b37
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD534a2636a303993189dd2d2e91313f929
SHA1c488f0355b5949dcd7b4c98ced94aff573713824
SHA256111a7796ead7e2ca0c1c502b1aa65810f79cd9bdb8207ec9aa34260a21967c38
SHA51215a01429695aa6f5ff6fa60c7afae6f62e39eb85892db8ba08c79d01ab4501a4d0b87ff965676c09e8137ebe191d378944f080cfda0ddfd6362c8a3aad1b820f
-
Filesize
9KB
MD5197b32c68a8b6551444a428d4921994d
SHA1604c76818c6e2513a46caeffd6757bec3996bda0
SHA256ca1f9c712b6885f2d2fa5275c98c1c4965754cdd11550436cab0e3fa52cb6643
SHA5121672d5a29083d8e65f91fd87fb7affc61f3848ef1df9dc3a127a06427e45a3838f5d0c3f9abd7a155f516fbfefbe45c4f45ccb78f188432fed225f2b10d40210
-
Filesize
9KB
MD568ea6f0309edc576c2dd3f307a5b6157
SHA1bdb0c7b108731d4b6afe365bfd4c5915262343d0
SHA25692b3cafe5cb4364d46ceb749b1c6949ad8bb6d196171bc00c05e9d14548b123b
SHA512310473f26d7688a769ab1197197f97ca3557451e5de98d9af8673e28c606da8519971b9b87cfa43a141397b9a14657edcc37ccc98f8b70529b99e710da9afbb5
-
Filesize
9KB
MD5eccc0a2c049d418fc002da856d3d55b5
SHA14a88292fce2fe3c3ec2d479ff4bc75ccdda24bf6
SHA2567f2cd3bcb199eba561b1961df8e9d8ad426c09f50c60885978b9bb972b9c2bb4
SHA5125a353d0554cbef374c393d249f9a70d28dee71badef3f159da546c3f0c1e62ed4f2940d2f2f29584712ffd5a59b628e45f0f78a04b2e606b4ed81c6ea18c9565
-
Filesize
9KB
MD5c5e3f714bf8a4c79c6aecc9f6eddfa97
SHA17398557cab96d8614d4358bdbef389c5429c00c5
SHA256345e64f9652559cace27a1e087332cfdf59cd5b18f22d4aed5bae2df25412414
SHA512e50c988f831c2b889d0a6fddc12c861697d88abcb247005532ba98c32e8eb2983d94936bfc8fb695b0489db4c78b772ee9245598895838b773905b00bdea1856
-
Filesize
9KB
MD577f115bbbc10b4016751f4e8775b05da
SHA1ecf3d99a35d5ed7efe45f1a9dd418a2dbdaadedc
SHA2562ecd957719ab26f0f5626da97ea513549af6de7b512bd71ee380e94661edd285
SHA51247f1a18c0f697b901de0cc276f7142d47a22a6c3b6a941931cbaa081dc6b9ea2a6d4385c2e4c781c01ec37ed5a684c73a7cb9ecd939a0005cdb01caefd483dfe
-
Filesize
9KB
MD55d6db01c3ac9d895eb7af9ddd10cc6f2
SHA1b74655f2fa66c99f0c7ef7c09fd4c83b75784cc8
SHA25650ea68a07080bf78d4f26157b991fbf06f3e68539ca282b80f8bc92aeb01f31b
SHA512f54acf9db5fbcc929e6c6010cb26865b8cafdc64f7ba07c2b616d6de9ca156ccbeba13192a1427657ddcda9e12fc5bbb793ef63a1d1940579b355bab900f3baf
-
Filesize
9KB
MD5e3763697b3649d89d9a16fde718358a5
SHA1925f3fa14fdf88c12d7bce0e9764507c4959df84
SHA256f537db455fada1339e3a57b5f91ea4362f228db6f34cc60d43f9515084acff7e
SHA512df8461db28fbfd6e19df95d887f407fa51a70a3b5d8d297c2eec65072f94d5832ff40ed9e08252ce7a01537128155358bba6547726c12718191d3a97f7758dc6
-
Filesize
9KB
MD5f3289df500d44647240388b778524944
SHA1c2507dfd0f7b768686df8320b9137cfd0b7da06a
SHA256f8439c339c4867c0babd46b1b96f2dc61f83e06de41d79a3c106c92bb917816e
SHA512dd482ed679356583e1459fe0d5bb93995c21159dc754d793f252678b081f302105b22fa127a519cab5ba618da536424a199d0229b0688da8ff724b7016ae06f2
-
Filesize
9KB
MD531410045c7aa257ca4ef59f65e90dd94
SHA1791e860efd0b9d748a46dbe946bfe4a0c3748cba
SHA256f5f2206f422d84ce37dd09c35082d0afdeff5cb408a2177e963cc594b4e8650a
SHA512bfac38ae8854cc09c9f20df356fbfe79dab6944bc684934291ea010459578b10231111bda1be23a63ab4ca62447eb36ad361da6dcdf4020bd0aa4a7deba63a73
-
Filesize
15KB
MD5de686ffcea25edc84f6e342e3cbe9374
SHA13e1e6e4526584030dc6b4b7c2366a6a41320bad5
SHA256b1d438c779e724be3483d70d62d11ce879b28d55df2602875c5c7d61c900c0ea
SHA51215060c947a79b7d79c90e7507838d270d002c86e5b231bdb8d763e70f45f7517150aba6d7c453d52a7a5d044aab1b1ec8a215dec489093628dbf4355be91adcf
-
Filesize
194KB
MD59a5e2287c5ffba7cf20944894c84c415
SHA1676b9a66d4b9aea19c7ec8725cd0fb1d33d0d10a
SHA2564c0d84496301ed3f5a1254b4aca121712db99a2d2f5cb8ee86009cf6dc1f9142
SHA5121f29c9dd2bbbb1e67ae324b0f42bdc84c96a4c5b637a5ecd3bd8aefa55f89b48af8c93c367f68a0abde4b89bc281e8e9fe717ed771e6f5b83506f1de1ac28335
-
Filesize
194KB
MD5b61c8c23d068f1677ad0546ff6173bf2
SHA17e789b2a32f25557f1f056268585556b38b66cab
SHA256ef91057860eed52d69487131bf49029ee533829fb8ab08bae66b4729bd999ef7
SHA512b7ea6641d2b2ebac342fcc5dfbeec233a76312c0c66f11071acedcb565068601a256736b2ba160ad06238667d528b7810d39b82650e035f7f0cded77922b7997
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
37KB
MD51814e213f4a4b78a2fbab94c64ef8b10
SHA15232634c8288a37d14dea43edf88d7ea0cdc157e
SHA25684bfa8a67ccfe2c87b44872876e544a96a3b6c1c805870593ef048570c8d1304
SHA5120a50923cd547ed44482ed4a87add1cab16fb3c8e9a7a3fac44a3d5e58e8e90663ed36cdbeaaadd531985bf64c8d16a124525db5aefc29254ed4bbab9399b7dd2
-
Filesize
20KB
MD50c4e029571dc182bfb39161f25531f06
SHA177b38d4a247b63881e7b9be324979c203987ae4e
SHA256fa5e2241e03bf7f6357dbff6a4716e4fee8b612fcb241ce68411552ba643cee1
SHA51251501b8f4caadf0975eb5d1b3e193c3215c3b0706f7203d9173c8bbd3149526e9134b8b87ebcb0de6f1ed44e9f735ea3871201ac476f99e463380fbdd39ec7db
-
Filesize
20KB
MD58c34c7b82f4668c975defa63ea3c9911
SHA101aee6e4857efb1898934c58dfbaab60a9bafb75
SHA2566fddf44c880fa4ab45d21e764fb4371c8820b7b1c49502ece0fb5e1eab95ab3e
SHA5127b8db2103dedf6b36759771c5b0451d6e2feb8ba889a07f1dbb869c229739e4343636ab5fe0bae8ff7ae5798d533caf3e408e34b71be72d0bfdd076da5a6104f
-
Filesize
24KB
MD5c594a826934b9505d591d0f7a7df80b7
SHA1c04b8637e686f71f3fc46a29a86346ba9b04ae18
SHA256e664eef3d68ac6336a28be033165d4780e8a5ab28f0d90df1b148ef86babb610
SHA51204a1dfdb8ee2f5fefa101d5e3ff36e87659fd774e96aa8c5941d3353ccc268a125822cf01533c74839e5f1c54725da9cc437d3d69b88e5bf3f99caccd4d75961
-
Filesize
54KB
MD58949c46b485a23f9413b25affea4147a
SHA17175dd61b714a1b418555741b158a80143230c0f
SHA2568d5d8bd16d2dd9c548c00d6d76b3266bc4501eea166c9557866f1be3cb72e2af
SHA5125f14da747931fe6a886e8164430c7f3e7095f65b0432eaf9efe7813a7264d5568d945ec5c5818e9675847454cac8a56dd962b37f9309c9b926b0096a65365e08
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD562d699701772c1878619ea8e0cdb8732
SHA10007eecf255ff0f948280f362a7ca8a32406c6a3
SHA2567c0129b391e9d4bd7c5fd5f2f05a78fc87903efb201229aa39d7c2932d7f196e
SHA5123bb32b7910e38a86e567ade977ce340ce66ef5c4f67d86325250c3d03eca2f13f82644b25d55609eceeb5a374be906c158a489dde07fbe3ab155402bd512581e
-
Filesize
3KB
MD55ad54644310a78115a479ce922769413
SHA14c1dd20be71268281f229eac0ae1895b7c78369b
SHA25631870ef59b9dac11fbf925d29c19bfbadbb3e188034fac599875c96401094a16
SHA51227821d9e908f67c025077a965d803e4ad145422fc95a353f142348cf2b6b6040e396ebd0a3df85312086c386a668a4e2cdf528637ea53e8545ec3a3809a32889
-
Filesize
6KB
MD579871d2f350d8b906dac69b4671a48aa
SHA10d059c70c3135ca49d48e89a7934cb702c6f4f16
SHA256e4e17d296cafc5acb1ed64fa022dff47e8ff1f764325ca81b2bd7946e565eee8
SHA512320f6dddfd0e7e79002f00c1be0da0a0250133061f491fe5cb649828ac31a0ae29e7a66a153eb38db622ce09b94f60c5b4d8905ae92f59d940e2b1b64de9886f
-
Filesize
6KB
MD556db1706f196570644c332af667d21e3
SHA1d7d627ed1ebe4d3bbe33f66ad1f09f241080bcc6
SHA2569a16c119a8019961ca9f19707b5001ae4591b544823ae1a599002b1cc67e2f8c
SHA5120979a237b2454917e573af6e24d56a6aba5f1de4439e6c690665fdcb7061e425a09f8645fa7773c8062dbbe1644d0282971d29555b5471b3cd18a622b3005e1c
-
Filesize
8KB
MD544bbb31dda40319407c9600cfae49c7d
SHA1163f0c40e0699b5dba25875cf144d7a216c6cfef
SHA256b8969571565cf55252b7b1c18e58ff1e74cc15982f5ff339fb6e7d3f395b45e4
SHA512d8b950f96e7b4a897db18846de2d3f3c695ab5501797ecd991d562f1cdcfbf6dbfa6dff1fc4c17663a47529ab87a5365734323130ab6b0132e476a1ff9068449
-
Filesize
7KB
MD5a36c9775704252e527753d81be8eab3a
SHA1c5df2cbfb63637d9d4e442139af9d92a7d2bd6af
SHA2569a6e0f2ed8e007783a9cf0645bef038a808be889dae1871261ab7ebd0c4d3f65
SHA5129968c793cb068ce8032c620c6a8a8a70e0533167945b2f51555c669491431e9209a9ec9956b680313dd1a108290f0565e7283beb5741a653a44d98cdf0480a90
-
Filesize
8KB
MD515431f572275a0bd43bf466944d3688b
SHA18bf5ac9dc527add7a31b4276d8a687ebeedd3a17
SHA2562e9053887abf2d124d466629846d2b6b3b3c4551908a5456fb9a51771aa9b120
SHA512dce43a6c2d214f1007095ef6ad817ab7cd9cdccdf89b003dc925354dd9203cb577f130d03a1b7f7930a8e9936d6a2d78967c391bf5e3687d575edce032c8411d
-
Filesize
704B
MD57f72425c070ed6fde621a8ecfd28af3c
SHA192e513ed5d1e69989b336c1b4c7b804cb465261c
SHA2562324412fa1c033615f5f99034961ed977f0271cb51bd9e722e8122a02c9eaaba
SHA512ee4f5d9a5496375c8ecc9a0d36306fe2801e401fbc1ed4b05ccc1a8513f9a200f12208c37e9ad7f0ba56c9fdadaa44d7eaf90d415318ae1803f712be0070921e
-
Filesize
706B
MD56d3dc9b3a3787784218428e1fb4f85ca
SHA15882a0d681754e98807f4a7605a27e7cfa88ce2a
SHA25687c6f36df71e9aadb9f22ab2ba3933cdf6820615c14c7b0303de823f69013ebb
SHA512acf30779dbd24d1809a4dba81edc5db2757674d96e8d8600d6cb09f5073d1f542ab56d12f2236ffc1f3127a14b0f6f3438abc0bb27d0e1fb98a0b24800e46035
-
Filesize
1KB
MD5057450b4f3f9c726d862a6abc87a2989
SHA1c644697ef21b3f13d37b51a368a6ecb936ab9a57
SHA256c1804ec641cdd9238fc7f0982dd5eb6d29725d412ec1a2ed615f3fff4b449cbf
SHA5129c0ffbaa3c21634e7cb46bcf8909bb088ad5caa3d7ed7a4fd06359ecc9cb76ca419a69c9c283c2027afe03469d2480dcac6614a1f8fe60be0e1452b05fabac07
-
Filesize
538B
MD542f0051ce63ef90a5db60282423f821d
SHA184a073a54eb0d6f50803e732449bb090ca254d9d
SHA2564ac035f1e476542cab05c70c7a9be725d3d3a6fb9342247d7955fa53cc4980a0
SHA5123e24c4daacd5d3f65141eccfcb8e23ae67fa5eaf6452a0851fd93132dc124b898e20e54fd605135af6a8e871d5a082d33049780dfaf7160d0ad2dc31ff785724
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
12KB
MD541d746e5889d177bce2175cd34bd30e0
SHA17373f79c2d8c081a8b18a822a690ac0b248f2d91
SHA256015d9ec7c55713ae96fa9b2ff8dbd05d7d6e86f90d7c4830b20f94293dd0ac0f
SHA512a6573a3b77d33b3dcabc2e18dbeabca1a19e287d5f388fe677af5040b72fa6ad0d08f570a71822eed65c9df2d58e3c45229bc06da68e862f9a293b93e48708f5
-
Filesize
11KB
MD5e4fadd86b2e12269ac8faf508767031a
SHA108c647539a38ae27b600f1f220ec34f389de6b72
SHA256017c7a67fffb7b26858020fc92ccdc6fc3c472542d390f7cbc9182ffc0ddcd12
SHA512e732836de0d1ddf5cd56030274bf6326cf49c417e9fbd2e1f4834bb6d9ce2f605d1cf2c3aa5c82bad6ba959acf34d1827ce4459bcab39490aff9d7709ccaf348
-
Filesize
7.6MB
MD543681f04dc1e31ccdcb90a7e69949a52
SHA15a311ce3609ff81426fae34bc4a5731700830b06
SHA25679907648beb01a39a141640961cf63f203e57b4c8207a242c4179a72d02354b1
SHA512f24ce5811073514564569cec4f90500cb302606f86e1a062066c4e29e3381e494c5cc5ce3928dc7370083b99d75f1df8bfb850e657e1b6b96d08fe56d9be6381