Analysis
-
max time kernel
18s -
max time network
20s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2025, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
R.3.L.E.$.E-1.zip
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
README.txt
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
Rel3aseUi/ReleaseUi.exe
Resource
win10v2004-20250314-en
General
-
Target
Rel3aseUi/ReleaseUi.exe
-
Size
81KB
-
MD5
41c2401a4ecf9c80796e534d388e56cd
-
SHA1
e844e6b178ef8191ce189c0e632dc7fdb2947db3
-
SHA256
0e5a768a611a4d0ed7cb984b2ee790ad419c6ce0be68c341a2d4f64c531d8122
-
SHA512
6f7d365f10b45cc88d8968020f6232974398cc1b46710bf650c5aa162c40d48fef0a035b29fc1b0271d4f69410fbca1b4a4119d816eeec205043175981429071
-
SSDEEP
1536:dEV+sOWSnk3uXcieWN8WBnc1br8zlZAHaG8CaWCMp+O7Xg5U:dEV+sFSkMxRnc1br8j0aCCMXL7
Malware Config
Extracted
vidar
13.5
eb17a39311b2fbc653bb6a88c15634e4
https://t.me/v00rd
https://steamcommunity.com/profiles/76561199846773220
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 Chrome/132.0.0.0 Safari/537.36 OPR/117.0.0.0
Signatures
-
Detect Vidar Stealer 23 IoCs
resource yara_rule behavioral3/memory/4760-0-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral3/memory/4760-2-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral3/memory/4760-3-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral3/memory/4760-10-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral3/memory/4760-11-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral3/memory/4760-16-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral3/memory/4760-17-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral3/memory/4760-20-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral3/memory/4760-24-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral3/memory/4760-25-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral3/memory/4760-26-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral3/memory/4760-30-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral3/memory/4760-31-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral3/memory/4760-67-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral3/memory/4760-77-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral3/memory/4760-78-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral3/memory/4760-79-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral3/memory/4760-80-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral3/memory/4760-83-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral3/memory/4760-87-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral3/memory/4760-88-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral3/memory/4760-89-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 behavioral3/memory/4760-93-0x0000000000400000-0x0000000000429000-memory.dmp family_vidar_v7 -
Vidar family
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5736 msedge.exe 1800 msedge.exe 5720 msedge.exe 4940 chrome.exe 4428 chrome.exe 5672 chrome.exe 5092 chrome.exe 1324 chrome.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5440 set thread context of 4760 5440 ReleaseUi.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ServiceModelReg.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ServiceModelReg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ServiceModelReg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133896482667792381" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4760 ServiceModelReg.exe 4760 ServiceModelReg.exe 4760 ServiceModelReg.exe 4760 ServiceModelReg.exe 4940 chrome.exe 4940 chrome.exe 4760 ServiceModelReg.exe 4760 ServiceModelReg.exe 4760 ServiceModelReg.exe 4760 ServiceModelReg.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe Token: SeShutdownPrivilege 4940 chrome.exe Token: SeCreatePagefilePrivilege 4940 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe 4940 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5440 wrote to memory of 4760 5440 ReleaseUi.exe 85 PID 5440 wrote to memory of 4760 5440 ReleaseUi.exe 85 PID 5440 wrote to memory of 4760 5440 ReleaseUi.exe 85 PID 5440 wrote to memory of 4760 5440 ReleaseUi.exe 85 PID 5440 wrote to memory of 4760 5440 ReleaseUi.exe 85 PID 5440 wrote to memory of 4760 5440 ReleaseUi.exe 85 PID 5440 wrote to memory of 4760 5440 ReleaseUi.exe 85 PID 5440 wrote to memory of 4760 5440 ReleaseUi.exe 85 PID 5440 wrote to memory of 4760 5440 ReleaseUi.exe 85 PID 5440 wrote to memory of 4760 5440 ReleaseUi.exe 85 PID 5440 wrote to memory of 4760 5440 ReleaseUi.exe 85 PID 5440 wrote to memory of 4760 5440 ReleaseUi.exe 85 PID 4760 wrote to memory of 4940 4760 ServiceModelReg.exe 94 PID 4760 wrote to memory of 4940 4760 ServiceModelReg.exe 94 PID 4940 wrote to memory of 5012 4940 chrome.exe 95 PID 4940 wrote to memory of 5012 4940 chrome.exe 95 PID 4940 wrote to memory of 3296 4940 chrome.exe 96 PID 4940 wrote to memory of 3296 4940 chrome.exe 96 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 1868 4940 chrome.exe 97 PID 4940 wrote to memory of 5056 4940 chrome.exe 98 PID 4940 wrote to memory of 5056 4940 chrome.exe 98 PID 4940 wrote to memory of 5056 4940 chrome.exe 98 PID 4940 wrote to memory of 5056 4940 chrome.exe 98 PID 4940 wrote to memory of 5056 4940 chrome.exe 98 PID 4940 wrote to memory of 5056 4940 chrome.exe 98 PID 4940 wrote to memory of 5056 4940 chrome.exe 98 PID 4940 wrote to memory of 5056 4940 chrome.exe 98 PID 4940 wrote to memory of 5056 4940 chrome.exe 98 PID 4940 wrote to memory of 5056 4940 chrome.exe 98 PID 4940 wrote to memory of 5056 4940 chrome.exe 98 PID 4940 wrote to memory of 5056 4940 chrome.exe 98 PID 4940 wrote to memory of 5056 4940 chrome.exe 98 PID 4940 wrote to memory of 5056 4940 chrome.exe 98 PID 4940 wrote to memory of 5056 4940 chrome.exe 98 PID 4940 wrote to memory of 5056 4940 chrome.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rel3aseUi\ReleaseUi.exe"C:\Users\Admin\AppData\Local\Temp\Rel3aseUi\ReleaseUi.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5440 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ServiceModelReg.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ServiceModelReg.exe"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8aa81dcf8,0x7ff8aa81dd04,0x7ff8aa81dd104⤵PID:5012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1548,i,4699291644394292271,12598702274035336851,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2072 /prefetch:34⤵PID:3296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2012,i,4699291644394292271,12598702274035336851,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2068 /prefetch:24⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2360,i,4699291644394292271,12598702274035336851,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2512 /prefetch:84⤵PID:5056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3236,i,4699291644394292271,12598702274035336851,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3252 /prefetch:14⤵
- Uses browser remote debugging
PID:5092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3280,i,4699291644394292271,12598702274035336851,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3296 /prefetch:14⤵
- Uses browser remote debugging
PID:4428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4252,i,4699291644394292271,12598702274035336851,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4284 /prefetch:24⤵
- Uses browser remote debugging
PID:5672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4584,i,4699291644394292271,12598702274035336851,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4680 /prefetch:14⤵
- Uses browser remote debugging
PID:1324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4236,i,4699291644394292271,12598702274035336851,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5296 /prefetch:84⤵PID:3536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5484,i,4699291644394292271,12598702274035336851,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5236 /prefetch:84⤵PID:6016
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"3⤵
- Uses browser remote debugging
- Enumerates system info in registry
PID:5736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x268,0x7ff8a99af208,0x7ff8a99af214,0x7ff8a99af2204⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1892,i,4767629450802669651,12337471251017510891,262144 --variations-seed-version --mojo-platform-channel-handle=2216 /prefetch:34⤵PID:6096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2180,i,4767629450802669651,12337471251017510891,262144 --variations-seed-version --mojo-platform-channel-handle=2176 /prefetch:24⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2540,i,4767629450802669651,12337471251017510891,262144 --variations-seed-version --mojo-platform-channel-handle=2684 /prefetch:84⤵PID:5336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3556,i,4767629450802669651,12337471251017510891,262144 --variations-seed-version --mojo-platform-channel-handle=3592 /prefetch:14⤵
- Uses browser remote debugging
PID:5720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3564,i,4767629450802669651,12337471251017510891,262144 --variations-seed-version --mojo-platform-channel-handle=3600 /prefetch:14⤵
- Uses browser remote debugging
PID:1800
-
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:2188
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5876
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:1888
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414B
MD53e22c7759f0ea2302f823e2b17f7247f
SHA183a4ba5cc7d625f169aa8bb48f8eb714d27d0f1b
SHA2560ffc9595f2e1c2ea80aa3b509aeffc930f1d178a91167473f50a1bc1b37fe410
SHA5125eb62a939150096638dc684b43e2fa354b61a03810e8fac89e7bf4bbf2881e2b5fec6dbff6a0ba7317e78aa25c90f675d1493b23a57206e2a48d3d079de9e3bf
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
79KB
MD57ba1fa5e1cbe359ddb857829b96f475f
SHA1bfafaddfa3a4c1d38bae2681df1444b7f95c4a76
SHA256745f5d022622316ab032ffb950c74f67737e5ca73a61805f476d9751af198f52
SHA5124a5eb0652fd2e67b76f401a0254ca110074bad0e80fdc266f55810fed08b134ef94d3270eebeebdf03275316f4f40bde11098573a0b45167b5da2465e954c3c1
-
Filesize
280B
MD58625e8ce164e1039c0d19156210674ce
SHA19eb5ae97638791b0310807d725ac8815202737d2
SHA2562f65f9c3c54fe018e0b1f46e3c593d100a87758346d3b00a72cb93042daf60a2
SHA5123c52b8876982fe41d816f9dfb05cd888c551cf7efd266a448050c87c3fc52cc2172f53c83869b87d7643ce0188004c978570f35b0fcc1cb50c9fffea3dec76a6
-
Filesize
41KB
MD5aafe550938d55de5b92cea0561e486de
SHA1345bd3faf6be4fe9001460bca9ede1e4e23e57b1
SHA256044c36b092bc0790d3eb2b4ecdbacd99db675e341a0d0c56d94e55c0ef611346
SHA51261c46ef9013e77233a7742218a240ccd2d2d2fe7ce895ecaed2576e42e7d6dbe72326762ed672573f488bcf2ae512e8d8208c22615e756cec3e3bd301e68f40d
-
Filesize
40KB
MD510cb225ec060210b05c65c16f45fc5d0
SHA167d1ae2d413d0074de23a897ed85cbbdeb05f978
SHA256117ac7d840c2a6a9067e37402745fc9183af6565340261a1c77be1afcf635ca8
SHA512c2ca0a0926b907124c2260977b05d8db8c04a34da2bab2509d686ffff8c071704c677400c91575bff9d6264c28bb061b741cd5efc49a0ab597fb49f269031a26