Analysis
-
max time kernel
138s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2025, 09:25
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win64.MalwareX-gen.18984.6671.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win64.MalwareX-gen.18984.6671.exe
Resource
win11-20250410-en
General
-
Target
SecuriteInfo.com.Win64.MalwareX-gen.18984.6671.exe
-
Size
808KB
-
MD5
7f8e5fe3443a730c3b55e170ed25e7a8
-
SHA1
5ad4bb5a34b5906f99eb3bdedb48bc517d18136b
-
SHA256
7c1bb5e9ae1bf20dc9aafb0605b15bd688f7d5e23db424e019315f412f11ec42
-
SHA512
e9f7a3565868a606906d757bb1e751586685038761e8aba38e3c9156235a1280d23fbe950ccb45d545d854d545da714bb07b90ee8eaf1b28f10214fca612f516
-
SSDEEP
12288:zbGU3fK+OmAeJWcl28vZ2CYizu+9LKLdEEo4E7ka+9LKLdEEo4E7kaEO:vGU3bNkAuaKLdjDaaKLdjDat
Malware Config
Extracted
vidar
13.5
0259016785c18ed951c497596f76958c
https://t.me/v00rd
https://steamcommunity.com/profiles/76561199846773220
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Signatures
-
Detect Vidar Stealer 31 IoCs
resource yara_rule behavioral1/memory/4560-0-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-1-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-2-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-9-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-10-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-15-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-16-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-19-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-23-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-24-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-25-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-29-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-33-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-75-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-76-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-79-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-80-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-85-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-89-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-90-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-115-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-435-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-462-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-459-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-465-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-466-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-467-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-468-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-469-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-470-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral1/memory/4560-471-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Vidar family
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5228 chrome.exe 4640 chrome.exe 920 msedge.exe 5340 msedge.exe 4252 msedge.exe 2276 chrome.exe 4368 chrome.exe 3564 chrome.exe -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2364 set thread context of 4560 2364 SecuriteInfo.com.Win64.MalwareX-gen.18984.6671.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MSBuild.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString MSBuild.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133896147336663682" chrome.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4560 MSBuild.exe 4560 MSBuild.exe 4560 MSBuild.exe 4560 MSBuild.exe 2276 chrome.exe 2276 chrome.exe 4560 MSBuild.exe 4560 MSBuild.exe 4560 MSBuild.exe 4560 MSBuild.exe 4560 MSBuild.exe 4560 MSBuild.exe 4560 MSBuild.exe 4560 MSBuild.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 920 msedge.exe 920 msedge.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe Token: SeShutdownPrivilege 2276 chrome.exe Token: SeCreatePagefilePrivilege 2276 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 2276 chrome.exe 920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2364 wrote to memory of 4560 2364 SecuriteInfo.com.Win64.MalwareX-gen.18984.6671.exe 91 PID 2364 wrote to memory of 4560 2364 SecuriteInfo.com.Win64.MalwareX-gen.18984.6671.exe 91 PID 2364 wrote to memory of 4560 2364 SecuriteInfo.com.Win64.MalwareX-gen.18984.6671.exe 91 PID 2364 wrote to memory of 4560 2364 SecuriteInfo.com.Win64.MalwareX-gen.18984.6671.exe 91 PID 2364 wrote to memory of 4560 2364 SecuriteInfo.com.Win64.MalwareX-gen.18984.6671.exe 91 PID 2364 wrote to memory of 4560 2364 SecuriteInfo.com.Win64.MalwareX-gen.18984.6671.exe 91 PID 2364 wrote to memory of 4560 2364 SecuriteInfo.com.Win64.MalwareX-gen.18984.6671.exe 91 PID 2364 wrote to memory of 4560 2364 SecuriteInfo.com.Win64.MalwareX-gen.18984.6671.exe 91 PID 2364 wrote to memory of 4560 2364 SecuriteInfo.com.Win64.MalwareX-gen.18984.6671.exe 91 PID 2364 wrote to memory of 4560 2364 SecuriteInfo.com.Win64.MalwareX-gen.18984.6671.exe 91 PID 2364 wrote to memory of 4560 2364 SecuriteInfo.com.Win64.MalwareX-gen.18984.6671.exe 91 PID 2364 wrote to memory of 4560 2364 SecuriteInfo.com.Win64.MalwareX-gen.18984.6671.exe 91 PID 4560 wrote to memory of 2276 4560 MSBuild.exe 97 PID 4560 wrote to memory of 2276 4560 MSBuild.exe 97 PID 2276 wrote to memory of 4068 2276 chrome.exe 98 PID 2276 wrote to memory of 4068 2276 chrome.exe 98 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 644 2276 chrome.exe 99 PID 2276 wrote to memory of 3480 2276 chrome.exe 100 PID 2276 wrote to memory of 3480 2276 chrome.exe 100 PID 2276 wrote to memory of 1688 2276 chrome.exe 101 PID 2276 wrote to memory of 1688 2276 chrome.exe 101 PID 2276 wrote to memory of 1688 2276 chrome.exe 101 PID 2276 wrote to memory of 1688 2276 chrome.exe 101 PID 2276 wrote to memory of 1688 2276 chrome.exe 101 PID 2276 wrote to memory of 1688 2276 chrome.exe 101 PID 2276 wrote to memory of 1688 2276 chrome.exe 101 PID 2276 wrote to memory of 1688 2276 chrome.exe 101 PID 2276 wrote to memory of 1688 2276 chrome.exe 101 PID 2276 wrote to memory of 1688 2276 chrome.exe 101 PID 2276 wrote to memory of 1688 2276 chrome.exe 101 PID 2276 wrote to memory of 1688 2276 chrome.exe 101 PID 2276 wrote to memory of 1688 2276 chrome.exe 101 PID 2276 wrote to memory of 1688 2276 chrome.exe 101 PID 2276 wrote to memory of 1688 2276 chrome.exe 101 PID 2276 wrote to memory of 1688 2276 chrome.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.MalwareX-gen.18984.6671.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win64.MalwareX-gen.18984.6671.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd1268dcf8,0x7ffd1268dd04,0x7ffd1268dd104⤵PID:4068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2064,i,6826997875413665093,6557357067335080074,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=1984 /prefetch:24⤵PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=2268,i,6826997875413665093,6557357067335080074,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2220 /prefetch:34⤵PID:3480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2408,i,6826997875413665093,6557357067335080074,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=1912 /prefetch:84⤵PID:1688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,6826997875413665093,6557357067335080074,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3208 /prefetch:14⤵
- Uses browser remote debugging
PID:3564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3216,i,6826997875413665093,6557357067335080074,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3236 /prefetch:14⤵
- Uses browser remote debugging
PID:4368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4276,i,6826997875413665093,6557357067335080074,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4300 /prefetch:24⤵
- Uses browser remote debugging
PID:5228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4700,i,6826997875413665093,6557357067335080074,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4736 /prefetch:14⤵
- Uses browser remote debugging
PID:4640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5340,i,6826997875413665093,6557357067335080074,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5280 /prefetch:84⤵PID:5268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5356,i,6826997875413665093,6557357067335080074,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5424 /prefetch:84⤵PID:2040
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x268,0x7ffd11b8f208,0x7ffd11b8f214,0x7ffd11b8f2204⤵PID:5592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1920,i,14633722934563400236,17994486306122363200,262144 --variations-seed-version --mojo-platform-channel-handle=2716 /prefetch:34⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2688,i,14633722934563400236,17994486306122363200,262144 --variations-seed-version --mojo-platform-channel-handle=2676 /prefetch:24⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2288,i,14633722934563400236,17994486306122363200,262144 --variations-seed-version --mojo-platform-channel-handle=2724 /prefetch:84⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3560,i,14633722934563400236,17994486306122363200,262144 --variations-seed-version --mojo-platform-channel-handle=3600 /prefetch:14⤵
- Uses browser remote debugging
PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3572,i,14633722934563400236,17994486306122363200,262144 --variations-seed-version --mojo-platform-channel-handle=3608 /prefetch:14⤵
- Uses browser remote debugging
PID:5340
-
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:2896
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3676
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:112
Network
MITRE ATT&CK Enterprise v16
Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5e09266cf9dc38d6ab64c72d30c6acce2
SHA1aba04c160a966a9514585f74435a8540d4d76261
SHA25604b94c1d13856f512a62d53e4f58963c50e80b47b69c71b506e1a2290e8e289e
SHA512fef87203e2635ff84daf9e44d42cd1d10ffa34b03ecca02da6e274a1ab0cc3f118217068635c30fd2629696ba536d7c67cdb285a3e36a3d548f721947807e464
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
78KB
MD5b885b6ca1b754899f1af730bd3ff3716
SHA1dc51f695b88069f2f43cf6bb669fb7ccf60b796c
SHA256cbf0b97dbd9303f21caceff24bacd027d47f2f80c914d9c845c75295ce27d607
SHA512f865606b3e1f327ab8d507a15b2b1d5772cf81d7435cb5a585e2c8c5ec7d0d9142e09247e724d5144036dc0c4e6dca4c78a68a5ff3cf7c8313462ac0a8e01570
-
Filesize
280B
MD5576f64b8f21f4203eed3f6c7b065f527
SHA1e0c4e8f914319e112a4b3562d2d6f4107750aba8
SHA256c39a636afaeae67ebd98682bf35ff7afafceac020ed21cb564ab954ab1ef6f87
SHA512af606a5d7d4d96afd80d8e0117f2d5f02cc82b810149f50e26d46a5b8fd7c6b2aa119aa1b7123c54d2ef19d05ca92ca738994e047e24e567e53765fc1c52f653
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\f4c676d2-896d-4e89-b4ea-3e01d7bd1ded\index-dir\the-real-index
Filesize1KB
MD5853cb76b6533f5da916ffa3b9955b927
SHA142580281d76271728f2b8729f94a24cf4d971dfd
SHA2566dbf101c9d3d7f3d394ba04587b163d13349d2148391371b6cbe71dc1654fa73
SHA5120c8206f28c252b99c480ccca9d4843e07e0522c2d3436bb42ab14c289f49f2d9b80749ec4d2a7c2e964a17ea554229b83b8eacf7d7d89baa3f2ddf68c5734bb8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\f4c676d2-896d-4e89-b4ea-3e01d7bd1ded\index-dir\the-real-index~RFe589e5e.TMP
Filesize1KB
MD5dbcbfa604d7c9182f7ce71b5c7dbf96d
SHA1bf1ec4645e021cbeb41f1f20b73aa375f3452d01
SHA2566bcb102a9db0f55722cf198fb1a31f720ad30661f17ac7c82e120a4f6784db2b
SHA5124ebe5efbfaac33347cebc9b474e363cdc680a59a3b3a6e6fe3eefc33b255466c9fbb8525f46126d7d56aac1072819ad4e54b014fc47bda2e8f0f6e43793a3ffb
-
Filesize
40KB
MD58f108422fcb43449a587ca5f1d67a64d
SHA15dc2ffef8bfe4f6ca85ce7cb935b9af9cc6b4a3a
SHA25666ed7f9308ca5674a7e17eb2d5d9a40dee5b55bf84f9fe34aaa41994a9f3209b
SHA5120c98e75679ffcb182fa0c55ef12706568c736a01949fe6d7cf0c1267174f9e0b4b561e53a824f99b1fe82c42929fe248a1ed763450e80cedb7fe29adde9222ee