Analysis
-
max time kernel
30s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 16:45
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://getsolara.dev/download
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
https://getsolara.dev/download
Resource
android-33-x64-arm64-20240910-en
General
-
Target
https://getsolara.dev/download
Malware Config
Signatures
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 115 api.ipify.org 116 api.ipify.org 118 api.ipify.org -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876539757946444" msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-869607583-2483572573-2297019986-1000\{94771FB3-11A8-4EA2-A996-1DEC0154EA76} msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-869607583-2483572573-2297019986-1000\{BB182536-5BF7-41FC-A23E-D51809832900} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe 4044 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4044 wrote to memory of 3968 4044 msedge.exe 87 PID 4044 wrote to memory of 3968 4044 msedge.exe 87 PID 4044 wrote to memory of 2248 4044 msedge.exe 88 PID 4044 wrote to memory of 2248 4044 msedge.exe 88 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 2480 4044 msedge.exe 89 PID 4044 wrote to memory of 1668 4044 msedge.exe 90 PID 4044 wrote to memory of 1668 4044 msedge.exe 90 PID 4044 wrote to memory of 1668 4044 msedge.exe 90 PID 4044 wrote to memory of 1668 4044 msedge.exe 90 PID 4044 wrote to memory of 1668 4044 msedge.exe 90 PID 4044 wrote to memory of 1668 4044 msedge.exe 90 PID 4044 wrote to memory of 1668 4044 msedge.exe 90 PID 4044 wrote to memory of 1668 4044 msedge.exe 90 PID 4044 wrote to memory of 1668 4044 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://getsolara.dev/download1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x21c,0x24c,0x7ffd44fcf208,0x7ffd44fcf214,0x7ffd44fcf2202⤵PID:3968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1860,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=2240 /prefetch:32⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2204,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2628,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3460,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3484,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4192,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=4276 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4292,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=4336 /prefetch:22⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3620,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=3564 /prefetch:82⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=5356,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5496,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=5508 /prefetch:82⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --always-read-main-dll --field-trial-handle=5676,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5864,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=5880 /prefetch:82⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5168,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=5840 /prefetch:82⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --always-read-main-dll --field-trial-handle=6204,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=6216 /prefetch:12⤵PID:876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --always-read-main-dll --field-trial-handle=6368,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=6340 /prefetch:12⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6796,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=6768 /prefetch:82⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6788,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=6764 /prefetch:82⤵
- Modifies registry class
PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --always-read-main-dll --field-trial-handle=6372,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6928,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=3596 /prefetch:82⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6928,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=3596 /prefetch:82⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3540,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=4340 /prefetch:82⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7184,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=7196 /prefetch:82⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7268,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=3956 /prefetch:82⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3920,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=3964 /prefetch:82⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7272,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=7444 /prefetch:82⤵PID:5156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5172,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=7640 /prefetch:82⤵PID:5504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7752,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:5616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7592,i,15052258340607455186,15971236993584547580,262144 --variations-seed-version --mojo-platform-channel-handle=7636 /prefetch:82⤵PID:5672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:2944
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:1388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD54facd0ff10154cde70c99baa7df81001
SHA165267ea75bcb63edd2905e288d7b96b543708205
SHA256a13534df0cd0a79a3a1b91085a6d575b47d5a9aad7fc6d712fd2616c0e95a23b
SHA512ad8d2b965851c0ddc23e92ae151b3b0b2bcda850c446f4278bdb0754d6b42ead8fc034b394749578a27b33ad7e4ab0633f974dfd4773fbe4d93ae477f00b73f2
-
Filesize
280B
MD5049e5a246ed025dee243db0ba8e2984c
SHA115ec2d2b28dcfc17c1cfb5d0c13482d0706f942d
SHA25633071ca42c472861a2fabd0f82f8b03ef0daaa6796b24b83f3df02587e4c3d12
SHA512bc5f6fa6a8cae20ab40eae4552650d75f38ebb158c95288a79d9f332623bb507946513c39d19c00a5aee323df01f0f1a51c54594ef1c293289baf45f4ae2145b
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
16KB
MD520523e1c81bb449dfca3cedff19c7366
SHA15600a72a99184e07535b63d94fc2ce69cd5c52cc
SHA25673d0b94abad26d4c3ddbbbb34723d90058e6e8fbe392a63cdf87ee2d7769efed
SHA512c8722d75e5343e77c38f72ca7123ce58460db1c195175c4958e9f42f7b360fd9e97bc8cb8a6ee1c7fd8670d0caead1d9e5d5fe38e10bc5520c4cbd6359602e0f
-
Filesize
36KB
MD5a975620edd59be58402b2644b3d464e4
SHA10472afa0552e643caca75b8ba87953b544150cae
SHA2562a34084a00814a61d4e8d4bbbaebe11bac8565df11d3ceb5e8677e36c958ea9c
SHA5128e6b57fa8fc242ae03c228227eb5cdf521180038debae417375a5be99a851af1e31cba2cdceaab9c29439fbb3a03c1ccbec8fb3659f81dcf3328d242f3a7dab6
-
Filesize
6KB
MD5f04b514389542e32c8dd964b324226a4
SHA1dd4b0071260088b8ac662a43c2f2d1082dc32bd1
SHA2565566f248e37e4fdd44f56f60ad51ee5d9a2a284f74533dc84f97a7225b4dfcd4
SHA512b7400e764c12860261213898a99f9af7f1520493ec1c875f2e2b937bc2d2d2c2270c90be56b57f7edcaa024c966c1f0c9279d5eb7a632aebc0e382409fba4a75
-
Filesize
7KB
MD508d52284027a9f75b2ee853f5dd39a4a
SHA156f1a59ceeac8c573d1f2e9b530f644144ce37ae
SHA256ebf4ab4d2e76e67be69c9d429766b9a413d2c0ffb36e776ed15707b9d4f66621
SHA51228cfd8955fb3097d01a405b47df1c3c97e4a53dbdb3296c3c682120b7d745738d8c3748cfd92db62b9ddbb04b980f1cac9bd59672e1a2ec95796a7f765c3178b
-
Filesize
30KB
MD5b5f861b76f5560dbc651932ef9b4b31b
SHA11075b416a32a35fea6066d71a98489e3e07da262
SHA2561e92b53b9944d233147cb227f9199df01586bfe8032e95d31c36aa96ce47a2d2
SHA512e540a71ba626099d5a4ba7a91f49ec74e1eadaeccea8701e565caca7081bd1edf50dbac9e9846a8cb32195abe1d0f5d1cd27c86b249458b74ed11fe60a2c6d65
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD58e0192cc696ad9745f71c7e1d895b35d
SHA1128277c9e34b51d210dcccd5ce88648436a5b367
SHA2561d1f6400204e683276b158513c367063e5796213bcb9df89c2da533a5651c67b
SHA512dfbd2390d15e1431358d0c8052cc3b55fcc5407227d7621d5b0ce1bea0d48848df4095b1fc89b4ded87f2ad08122df4a0e847dd1f4a4411948e944a3ca647bc3
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4044_1309515249\7cd1bc29-5583-4f18-9d22-c2863ec78b88.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de