Analysis
-
max time kernel
90s -
max time network
124s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250207-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250207-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
12-02-2025 20:00
Static task
static1
Behavioral task
behavioral1
Sample
us.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
us.exe
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral3
Sample
us.exe
Resource
win11-20250211-en
General
-
Target
us.exe
-
Size
6.6MB
-
MD5
47ef73872d8adbb3f66c4d0b145060bf
-
SHA1
f2dde0526a50623daecaaa969f77204d46894e32
-
SHA256
4fc13c81b5594dd189eafc3e88fd6d5cadf8f951b81d10fb2ffab3c851512771
-
SHA512
274ee436cb704002581eb3551f676e9c8f7015ea75ca090f6b783d9fd7d9b7c7be4dd86fd4024f0877658a464653e6c738f77fcda150221c8a88f276be987687
-
SSDEEP
49152:PJiTLxmrxMgiQNXf34SF0VwUhu6NqQFn8vca9Ypyy7KQ+cKa/Et9m3OnytR1ljyc:P0TLxmFkQNXgU0ZqXHfaj3OQjy
Malware Config
Extracted
vidar
https://t.me/sok33tn
https://steamcommunity.com/profiles/76561199824159981
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:136.0) Gecko/20100101 Firefox/136.0
Signatures
-
Detect Vidar Stealer 23 IoCs
resource yara_rule behavioral2/memory/5200-1-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5200-2-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5200-12-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5200-13-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5200-14-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5200-15-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5200-25-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5200-56-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5200-57-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5200-58-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5200-59-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5200-60-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5200-61-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5200-62-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5200-63-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5200-64-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5200-100-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5200-109-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5200-110-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5200-111-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5200-112-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5200-113-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 behavioral2/memory/5200-115-0x0000000000400000-0x0000000000422000-memory.dmp family_vidar_v7 -
Vidar family
-
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 472 chrome.exe 748 msedge.exe 4616 msedge.exe 3712 msedge.exe 4936 msedge.exe 3556 chrome.exe 1848 chrome.exe 464 chrome.exe 4592 msedge.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4776 set thread context of 5200 4776 us.exe 91 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language us.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BitLockerToGo.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BitLockerToGo.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133838640892144048" chrome.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 5200 BitLockerToGo.exe 5200 BitLockerToGo.exe 5200 BitLockerToGo.exe 5200 BitLockerToGo.exe 3556 chrome.exe 3556 chrome.exe 5200 BitLockerToGo.exe 5200 BitLockerToGo.exe 5200 BitLockerToGo.exe 5200 BitLockerToGo.exe 4852 msedge.exe 4852 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 1208 msedge.exe 748 msedge.exe 748 msedge.exe 5200 BitLockerToGo.exe 5200 BitLockerToGo.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 3556 chrome.exe Token: SeCreatePagefilePrivilege 3556 chrome.exe Token: SeShutdownPrivilege 3556 chrome.exe Token: SeCreatePagefilePrivilege 3556 chrome.exe Token: SeShutdownPrivilege 3556 chrome.exe Token: SeCreatePagefilePrivilege 3556 chrome.exe Token: SeShutdownPrivilege 3556 chrome.exe Token: SeCreatePagefilePrivilege 3556 chrome.exe Token: SeShutdownPrivilege 3556 chrome.exe Token: SeCreatePagefilePrivilege 3556 chrome.exe Token: SeShutdownPrivilege 3556 chrome.exe Token: SeCreatePagefilePrivilege 3556 chrome.exe Token: SeShutdownPrivilege 3556 chrome.exe Token: SeCreatePagefilePrivilege 3556 chrome.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 3556 chrome.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe 748 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4776 wrote to memory of 5200 4776 us.exe 91 PID 4776 wrote to memory of 5200 4776 us.exe 91 PID 4776 wrote to memory of 5200 4776 us.exe 91 PID 4776 wrote to memory of 5200 4776 us.exe 91 PID 4776 wrote to memory of 5200 4776 us.exe 91 PID 4776 wrote to memory of 5200 4776 us.exe 91 PID 4776 wrote to memory of 5200 4776 us.exe 91 PID 4776 wrote to memory of 5200 4776 us.exe 91 PID 4776 wrote to memory of 5200 4776 us.exe 91 PID 4776 wrote to memory of 5200 4776 us.exe 91 PID 4776 wrote to memory of 5200 4776 us.exe 91 PID 5200 wrote to memory of 3556 5200 BitLockerToGo.exe 93 PID 5200 wrote to memory of 3556 5200 BitLockerToGo.exe 93 PID 3556 wrote to memory of 3824 3556 chrome.exe 94 PID 3556 wrote to memory of 3824 3556 chrome.exe 94 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 5712 3556 chrome.exe 95 PID 3556 wrote to memory of 2420 3556 chrome.exe 96 PID 3556 wrote to memory of 2420 3556 chrome.exe 96 PID 3556 wrote to memory of 2120 3556 chrome.exe 97 PID 3556 wrote to memory of 2120 3556 chrome.exe 97 PID 3556 wrote to memory of 2120 3556 chrome.exe 97 PID 3556 wrote to memory of 2120 3556 chrome.exe 97 PID 3556 wrote to memory of 2120 3556 chrome.exe 97 PID 3556 wrote to memory of 2120 3556 chrome.exe 97 PID 3556 wrote to memory of 2120 3556 chrome.exe 97 PID 3556 wrote to memory of 2120 3556 chrome.exe 97 PID 3556 wrote to memory of 2120 3556 chrome.exe 97 PID 3556 wrote to memory of 2120 3556 chrome.exe 97 PID 3556 wrote to memory of 2120 3556 chrome.exe 97 PID 3556 wrote to memory of 2120 3556 chrome.exe 97 PID 3556 wrote to memory of 2120 3556 chrome.exe 97 PID 3556 wrote to memory of 2120 3556 chrome.exe 97 PID 3556 wrote to memory of 2120 3556 chrome.exe 97 PID 3556 wrote to memory of 2120 3556 chrome.exe 97 PID 3556 wrote to memory of 2120 3556 chrome.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\us.exe"C:\Users\Admin\AppData\Local\Temp\us.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5200 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x220,0x224,0x228,0x1fc,0x1c4,0x7ffb5a08cc40,0x7ffb5a08cc4c,0x7ffb5a08cc584⤵PID:3824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2000,i,10581828506231164594,14930897539518674497,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=1996 /prefetch:24⤵PID:5712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1904,i,10581828506231164594,14930897539518674497,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=2032 /prefetch:34⤵PID:2420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,10581828506231164594,14930897539518674497,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=2468 /prefetch:84⤵PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,10581828506231164594,14930897539518674497,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=3200 /prefetch:14⤵
- Uses browser remote debugging
PID:464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3224,i,10581828506231164594,14930897539518674497,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=3244 /prefetch:14⤵
- Uses browser remote debugging
PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4388,i,10581828506231164594,14930897539518674497,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=4576 /prefetch:14⤵
- Uses browser remote debugging
PID:472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4728,i,10581828506231164594,14930897539518674497,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=4796 /prefetch:84⤵PID:4424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4860,i,10581828506231164594,14930897539518674497,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=4628 /prefetch:84⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5028,i,10581828506231164594,14930897539518674497,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=5008 /prefetch:84⤵PID:4652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5152,i,10581828506231164594,14930897539518674497,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=5160 /prefetch:84⤵PID:4544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5156,i,10581828506231164594,14930897539518674497,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=4784 /prefetch:84⤵PID:5604
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5108,i,10581828506231164594,14930897539518674497,262144 --variations-seed-version=20250210-180233.097000 --mojo-platform-channel-handle=4804 /prefetch:84⤵PID:3108
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:748 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ffb611446f8,0x7ffb61144708,0x7ffb611447184⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,754081456071268481,10620050670354071028,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:24⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,754081456071268481,10620050670354071028,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2456 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,754081456071268481,10620050670354071028,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:84⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2124,754081456071268481,10620050670354071028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:14⤵
- Uses browser remote debugging
PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2124,754081456071268481,10620050670354071028,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:14⤵
- Uses browser remote debugging
PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2124,754081456071268481,10620050670354071028,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:14⤵
- Uses browser remote debugging
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2124,754081456071268481,10620050670354071028,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:14⤵
- Uses browser remote debugging
PID:4592
-
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ua /installsource scheduler1⤵
- System Location Discovery: System Language Discovery
PID:548
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3224
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD5e34c3c87fc826bdccbe8f4c376fb131b
SHA147ca51ad4ceaaf6bbe5fed44d80f2706836288ee
SHA2564e99e96853d05a8d49974838f557da5567efa08ba34a0759373ab538e67d912c
SHA512cddb3b8f64c4d5717ef876b02aede044c5bc322b71c93446f1d1bc3cc4092cc31aa1057165e6857c19891d2e4e8cf40aa8d9282a81f4bbf87debe94c72b14003
-
Filesize
5KB
MD5eac1527cdf13b35b500c03642aee3310
SHA10e5d93817bc8824b008fe4aaf51038d03a0a0a44
SHA25641f69883f6705ce50151a93abf864007a5933ea20cd7ec1498fb682073a9e033
SHA512243e5bebd0bf5174c32f3b1dd80cb5fc939aa24bb6603a12c225a19fabaaf405c8f2a5500258ad29c320ab10cbe14149ec4d61ccde4284bff3355b60f83e45af
-
Filesize
112KB
MD5e03fc0ff83fdfa203efc0eb3d2b8ed35
SHA1c705b1aa42d84b3414fdc5058e0fa0a3dc9e1664
SHA25608d550d1866b479c6c41ebbda7b453dba198ee8744a52c530ff34458024ee1fe
SHA512c0840930d7a9cf16e8fbefefd09c564eabfcfb6e9df1f9b906b830e8218a818c3f9721f9ce1fc2a96b2e6ce725baba0dcd5810a9b55d20b3c9d6f4569b9008a2