Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 05:44
Static task
static1
Behavioral task
behavioral1
Sample
38abcf53defcbb12bf54dce33d4134a2_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
38abcf53defcbb12bf54dce33d4134a2_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
38abcf53defcbb12bf54dce33d4134a2_JaffaCakes118.html
-
Size
193KB
-
MD5
38abcf53defcbb12bf54dce33d4134a2
-
SHA1
527ff50c7e7be3d2fec2bfe946b9e5c2b5e98d72
-
SHA256
de434e5948e79aad207378bc71fa220c9642651cbc7291318b971e6d9afaacd2
-
SHA512
85e5984cac6bfc4a95f07055b0a274fdcf312242c4ff16cd7a5bbc678e90755e74ab4bcfe06e5b762907b44d2b4fb5414656e5288740f8eed7d7ea9db79ded5a
-
SSDEEP
3072:wmo8Njz2S81Ep2svb7nLm7s+23YOUFRd21D6VleByTPBXJ27/P7UHeaA23O1W8:08R1gnE1AkLF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4120 msedge.exe 4120 msedge.exe 2656 msedge.exe 2656 msedge.exe 3548 identity_helper.exe 3548 identity_helper.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe 2828 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe 2656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2656 wrote to memory of 4412 2656 msedge.exe 83 PID 2656 wrote to memory of 4412 2656 msedge.exe 83 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 1896 2656 msedge.exe 85 PID 2656 wrote to memory of 4120 2656 msedge.exe 86 PID 2656 wrote to memory of 4120 2656 msedge.exe 86 PID 2656 wrote to memory of 3104 2656 msedge.exe 87 PID 2656 wrote to memory of 3104 2656 msedge.exe 87 PID 2656 wrote to memory of 3104 2656 msedge.exe 87 PID 2656 wrote to memory of 3104 2656 msedge.exe 87 PID 2656 wrote to memory of 3104 2656 msedge.exe 87 PID 2656 wrote to memory of 3104 2656 msedge.exe 87 PID 2656 wrote to memory of 3104 2656 msedge.exe 87 PID 2656 wrote to memory of 3104 2656 msedge.exe 87 PID 2656 wrote to memory of 3104 2656 msedge.exe 87 PID 2656 wrote to memory of 3104 2656 msedge.exe 87 PID 2656 wrote to memory of 3104 2656 msedge.exe 87 PID 2656 wrote to memory of 3104 2656 msedge.exe 87 PID 2656 wrote to memory of 3104 2656 msedge.exe 87 PID 2656 wrote to memory of 3104 2656 msedge.exe 87 PID 2656 wrote to memory of 3104 2656 msedge.exe 87 PID 2656 wrote to memory of 3104 2656 msedge.exe 87 PID 2656 wrote to memory of 3104 2656 msedge.exe 87 PID 2656 wrote to memory of 3104 2656 msedge.exe 87 PID 2656 wrote to memory of 3104 2656 msedge.exe 87 PID 2656 wrote to memory of 3104 2656 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\38abcf53defcbb12bf54dce33d4134a2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb993b46f8,0x7ffb993b4708,0x7ffb993b47182⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5584 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6300 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6944 /prefetch:82⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6944 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6156 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6916 /prefetch:12⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6316 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6384 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3548 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3600 /prefetch:12⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,5820230642307136684,6864500277853090251,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:4044
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1364
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
23KB
MD5c6ee151c95d5bd2339c67eca774449fe
SHA1c2de7e4a87b91ddd246fee53b8274b35fc55603a
SHA25665edc4727e2bdb04a0ad28564af17bcf3bd7029811429804d283c8f0e186ce09
SHA512eb04604f00aba42cffeecf266cc7dbfc096708ebe615ed2141bd422585db26a12b54f9c22041c798cb01e4c3d3e5c70fff935b0c7a508fbf61f6201c3dc678b8
-
Filesize
23KB
MD52f24e0f5d2c2997a89fb4a8d943c141f
SHA199515bde1a5bf72105116ac902ccf3db1dd3df29
SHA25660c9ecaf27ba56d7c35aa78c329aa7dfa586e6c71ed3cdd0019ba7e767b18aaf
SHA5120f4c5508dfdcf0ef63141df8d29c76e219d2ec433d59d37d7f17e110b455f24235fd0bc4f539ad5adc368285536d73f57dc4e21e3201dfd5753e76789208989d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD532dc4c1b89437fbc4ee902503c2f1582
SHA1f6e82e55f2485372e3bf2854c4f8525802f583ce
SHA2563c9b7b4bca83e0b7bec1b6534ceb81324fb4e17fc9b6e074d9dd74adaf1a0729
SHA5121daca957b203cda652ebaae57664d6250c91948d41ab7bbaa32ce43eabe82c193118805b7aec5cbfbdbf5ac336f4da99742ad4e14f189d8f62ed81a8ce0d4776
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize216B
MD56f75130e19ead0a212a19f44fd2ed6f7
SHA1bed00bb5e085c28944fb88e6fc739768da03138b
SHA2560daa37d26067698d5dd1e505d1076cadfbea75c6b73c982d7ccf0358ca8a4339
SHA512bfe6081d07731275f9f8181be21df61c5da10ae3ada5dee8831351b7fed7ba6d680b6e959b5f6a203b6ba59c8932777195080ae21e568424a902136c8d4aab85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize240B
MD54fa1838efc914de88a325b52e34d4a85
SHA1509cff367eae876648a58b6d3098fe09bac1d4a4
SHA256ec3f3abb279a8353bd6d0385df002ba8570cf02d704ce44c2c072c9e9ef4311f
SHA512b5e86266172871bc11b09a5b63207c10b9dbcf29b61894d2b71d667b4b883dc8dc4f70cd67f307b5f792172693bdad04e9f80e4df45f88260d3f098da0e488ea
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1008B
MD591ff7aad15de0877a35e398332b60308
SHA18208c0d29516bc9d47ea74cc13b694a8a5df1a45
SHA2565c860ed20180756cd5196a8bf3869076cd1066c1244fe70021679b0e14c17a9f
SHA51259c8f38252473a0cee808cf328bbea121d55fc214cc359d87860b006988f38825f64fcd4623cbff3df61be30321c715a3dfa53a9f287fadf3fad0e30e96b57f9
-
Filesize
2KB
MD5949045abf1589463354434c8ad333aa5
SHA15304425fca6209f4269b92210ec3c146b8db89c0
SHA25663175d24996c3209cc5f7e112e5b467477e37cc3aabdb877624cea3535681153
SHA5126717f545d3c68cb2e00cc7812e3a5a2bef1102a53fade7cfb85113ccee7c6ce0d2e208957a947e6b7726f247966314698355b6bd36818e0589db38da593b04f5
-
Filesize
5KB
MD5deda443eb0d4621d24cba1d462566afc
SHA1e2bc71f86e9717a6ad545e2084e2d2562ac427a0
SHA256681e6efdb88be223b76b40abd698437e6cf3460799abc77ed1ca517839cf9abd
SHA5122b77c37f9c1d2f06ed820479d0dce4d71b2e5383d8d8856881d15bafb0f8624b19ad9d4c1ca0bd719fc3c166d8a413a2023a9fc0720646df549a157176661dd4
-
Filesize
6KB
MD54231bc8877fa1a9340d546713bddc2ee
SHA1bca548c88749ffa6c9030ba24dccfd443e1ccad4
SHA2566615e0e96b46206fceb012ffa26b1ae4bcfc17d72e50dcd71b752550a30ed30c
SHA512db2e4ad5037142929a227b0090f52237fd147707aecc70099da2d9256817c3cbd4d7e71f6f853b333cd67fe0f64b2df8ae0093791f16a92eefc62ea2e089381b
-
Filesize
7KB
MD513ef658ac335448cd63a8e4498575510
SHA112de3fbbc568ac360695a3810b0d96cb0745f290
SHA25601fc85184e06322adc9c931ece5d00afbd18d51d65df0a9f23460d4b6e0ab20f
SHA512c53f7fb04a0a636c704c9458753e15b7fac48055e6d10aa4a157b56f9741d84913a1c081a8597028b3346c10d070bd433b9647f3ed7f83291922c3ae64f02ac0
-
Filesize
9KB
MD5ae34941a365fb834b92591705ef388d0
SHA1816250ca36a538a656c8233294704b2956478fba
SHA256b32b75904e1026c9dbc92acf93a6ad003039088acface124f9dbbe1ae8ef4523
SHA512b4703d561b4ac205b1c13c5ee2f1322401063c24b2002f06882f86277e14b2e2d3f77ba0f3e98a4f08cd7b71433c5e182bd9e23e2ed2a8912244891d46847b34
-
Filesize
10KB
MD56ec29e81ee8eda837ad997c7ecf2ba7c
SHA16745093efdb97fba0fe455c9ede8917d45eba1d5
SHA2568ba0090ca2058a38171c48fa143105878de6a4d072ad0ebbe9314cc5c4649358
SHA512c99947ec0aa6900442cb57befa8de8a8da67b47bda6b028cd14e617860beaca1e66c4ab04125d7de2da68edd34d9484fe84fbb59bee5d444dd6c71de64cbe583
-
Filesize
8KB
MD5c23217e417e147995bfb73064a8bcaa4
SHA1ea5619b11088fe25bc6d56f6b0bf22733e313d0c
SHA256d25031ad463b32e54c0700de2cd9844e3b059c4a7b9dd5860c734f47d5afcdce
SHA512d927b85ecc65926210ba43be0afad0bb091e229dc068496dd2108fa8a8849e7c2dae8438850ffc8c7366a1567c20436f0e267e6199b887299f2ba4e9beaa817e
-
Filesize
537B
MD59bf31b044e2229d66315eb6d5ead3077
SHA1266661773ba22844cbc3fb905233312b0d5609e7
SHA2561a9601791fb0060e99a299727774e14b2e4d4621dfcff74c65bc61a12684416a
SHA512a3ad454e0dccedb08ca28e07dcb8c39ed29f6ec22514b954bfaf0673066a65a63515c65f2b2f9784f40861bf9d676242234c010f79b2befd07000da2825a0282
-
Filesize
704B
MD5b61450133643c089d426eda775d6a32f
SHA1fcaa4dbce689d2d423d29f28d8c42e6da8a24cf1
SHA256d6c2ab0d4c8a98fe515efa07d97d9be552be4b6b02699cac7903e329f80cda5a
SHA512acf1318fa389ca2409608b494fd5546ede70a559b4f569b4c21ee98d3bd64380c2ffcd63acedd432e86945aa6a831975ddd0cf20e92a270304c371e60a8bcbce
-
Filesize
1KB
MD57d01389059d9dcff9aae707b66adffa2
SHA1f0b21cea53830a937ae87e0c9dc5d29b971306b6
SHA256162bf1deb20d46bd50963b02d8c040faed3597a978061c0d0730cf14e785410a
SHA5124662206d9a6a7a104b868ca24cec7667045469d3d1bf091503fe44e83fdcca21cfc22a4918f2cf053ee0c28823342dac5388a2aab72712123e6ae8227a2101b8
-
Filesize
203B
MD5bd81793140c3b1857dbb9636cc066f05
SHA1d0082b06e0b6ef19364fe1a9c8f67d245cf7e506
SHA2563f0cb9cfb61a387619e0b32f2e8418d99eaf035ae11a5e01a1151363d0a3ed92
SHA512bc4fec2a8d9b70787626e23cceaba5975a890536857931165275aa27625f530a39ac3c69f24f566c13a601e23c7e3d557685e418a3c57ac2503c731a0730bfc7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56b473e64e3127fd44440e3ac5eacab00
SHA1542dda3f2cd8e46bc7006c445e9eff460557984c
SHA25653b12f968b63b6eef2d5d45435fb2531b5ad4e8e0ae27f8a53143edb91631b39
SHA512bf29bd0aa16851f94beb2c7ad31a67417573e689f3fb3c5cddda3724cfc0f3798c2adca0ff334f0dc40adcbe9382979d6c23c07a07efdcd518655d69489532e0