Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 21:07
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_795cfd54579975f95f3c1bcdef013907.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_795cfd54579975f95f3c1bcdef013907.html
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_795cfd54579975f95f3c1bcdef013907.html
-
Size
60KB
-
MD5
795cfd54579975f95f3c1bcdef013907
-
SHA1
a2212e559d664ef7b71134f8ce80ed669d4631e1
-
SHA256
3760fb663039d456019cea83b313787739b87cf7dfab50f532f2fe19949c3f29
-
SHA512
9e2fcb9146a2290fe151b08897f1c681923ed46748c9a3b896ad02fb204c9ea9a13a78303a1fbb03a735026dd50a616649e6a302055dd3748db1cac0f6fdd41b
-
SSDEEP
1536:twgr8VkeO3g+GtyDI3yZXyxoaaS6cgRrHk1iO:5eO3g+GtyDI3zxoPpk1iO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4048 msedge.exe 4048 msedge.exe 3932 msedge.exe 3932 msedge.exe 1476 identity_helper.exe 1476 identity_helper.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe 4680 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 21 IoCs
pid Process 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe 3932 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3932 wrote to memory of 3908 3932 msedge.exe 83 PID 3932 wrote to memory of 3908 3932 msedge.exe 83 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 3544 3932 msedge.exe 84 PID 3932 wrote to memory of 4048 3932 msedge.exe 85 PID 3932 wrote to memory of 4048 3932 msedge.exe 85 PID 3932 wrote to memory of 3076 3932 msedge.exe 86 PID 3932 wrote to memory of 3076 3932 msedge.exe 86 PID 3932 wrote to memory of 3076 3932 msedge.exe 86 PID 3932 wrote to memory of 3076 3932 msedge.exe 86 PID 3932 wrote to memory of 3076 3932 msedge.exe 86 PID 3932 wrote to memory of 3076 3932 msedge.exe 86 PID 3932 wrote to memory of 3076 3932 msedge.exe 86 PID 3932 wrote to memory of 3076 3932 msedge.exe 86 PID 3932 wrote to memory of 3076 3932 msedge.exe 86 PID 3932 wrote to memory of 3076 3932 msedge.exe 86 PID 3932 wrote to memory of 3076 3932 msedge.exe 86 PID 3932 wrote to memory of 3076 3932 msedge.exe 86 PID 3932 wrote to memory of 3076 3932 msedge.exe 86 PID 3932 wrote to memory of 3076 3932 msedge.exe 86 PID 3932 wrote to memory of 3076 3932 msedge.exe 86 PID 3932 wrote to memory of 3076 3932 msedge.exe 86 PID 3932 wrote to memory of 3076 3932 msedge.exe 86 PID 3932 wrote to memory of 3076 3932 msedge.exe 86 PID 3932 wrote to memory of 3076 3932 msedge.exe 86 PID 3932 wrote to memory of 3076 3932 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_795cfd54579975f95f3c1bcdef013907.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce38246f8,0x7ffce3824708,0x7ffce38247182⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:12⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6376 /prefetch:82⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2308 /prefetch:12⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6164 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5836 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6404 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6508 /prefetch:12⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6540 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6748 /prefetch:12⤵PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6396 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1156 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2308 /prefetch:12⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6452 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3972 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,8865365572208343626,10619347105686921889,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6596 /prefetch:12⤵PID:2548
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:8
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\69fc2969-9b46-413f-8e6e-ce3809fa0f33.tmp
Filesize5KB
MD57e851dca9f13dfe63fefa80a177904fe
SHA15f92694283e69484d6354d22d50e08b84eb8f4a1
SHA2565da9a9a3edba56a82c01ee4a8c8c0391df4b6a8af460cd01f3af78432a5c4e52
SHA5124a0b5db6560b0ea9eebff0ad0b5ebe1bb5dbce4645a2cc8a13025b9c38e476d48f847edcf98dc5eb1240d9b77f710ba9b29b3940dfefae0466da30e03c70a158
-
Filesize
61KB
MD5468446a7240461af44b59ebb2047c231
SHA147b7c525dc91bece99df0c414960b9490b986ba8
SHA256ae1a0126552472d1e1347ceb8027ed725db3b93fcbc0b39745a92412cc1641a6
SHA512ac8cdf824112a3d25248e58f05495b458038d9388ba7e46e1ea8f6933cae23f044f4e532b74b13f52812bfaf602ca12ec152e44ce95266abe7cd6bd66b4a70b8
-
Filesize
71KB
MD5da52e38c98b0f2047abeb07609608ab5
SHA1da1210caff36df73e49a0c271ff7d573c2d20d02
SHA256726a2ef49785eaecce64e98fcb3490c40db06d6a205455784f3267a5b4b7c34b
SHA51235adf36acd8e1c65f040663d7a064f642a6db5e0b7978241db8a9b4eb52b8ae71cef4e7bb1b4a0d85e4af1f7240d6d52e5a07f512e5e90504e063e51376b5f5b
-
Filesize
23KB
MD57e98564be3c2fbfe5d55ebceef08fb8b
SHA14b35415b61c5ed813f615475df2d513f5dc73d5f
SHA256b9a21d15fe5b99b73ccfd9f8df4213debb40456341e1e71d0848b3602cad2ad8
SHA5124878d6d53441aab8c306b67a0e4051fe9fa0aa5377d6ff806c6e86fffb042c41a82efd7135754d9af1d6fc571fd23e3da37e680eb4bf983ce08de72421b0259e
-
Filesize
52KB
MD5f9ad6fffe23fad04422671cf2fa4a661
SHA1b8366163961f1689411636988a73dbc16d13ff3c
SHA256f0ca592df98944df58f4c281890809d30fd2117e471b8021ff138314efef5dab
SHA512e9d95f4f0eeed04413a1d798161d1c20d876f5ea4440c13e9fa356a562e931f98d84b3f6a907d6541cf6bbbd7e84f0e106b48fe2f5fcce77d66f70e114834aa6
-
Filesize
65KB
MD57af886875451603b72866b340cdea6be
SHA1d1c06a4e1bbb6b4174ce13b0d30dc3bb28bb7068
SHA256c165dbb192b1c1727c3e16d4af80dcda7b184e424fd4a550e13fea1721e9a3ab
SHA5123d6ae86d39203da53cc91ecbb366bdade5a132cca2bcfb1880f4662c33c703712073351d9925c4c2bc5f1d0d8e41412e5f0ed5a5c7fa5e4e5ffa43d67f8517b1
-
Filesize
128KB
MD578c43a99381de321fae101f6dda2754a
SHA10c31ccabae8dc7ae2e042291d7cb81ad728119f0
SHA256a6342bb72e8a9db56d92fb867b44444584a975778b73ee48d8192858e724313d
SHA5129fcddfe4bee7c1941a6cc1140275b2aaf8cd5c101493d0053366185dc359f15eb2090ef74342117208f515756c093348ce96e565aac877635296f8a299e477c5
-
Filesize
41KB
MD5ca9e4686e278b752e1dec522d6830b1f
SHA11129a37b84ee4708492f51323c90804bb0dfed64
SHA256b36086821f07e11041fc44b05d2cafe3fb756633e72b07da453c28bd4735ed26
SHA512600e5d6e1df68423976b1dcfa99e56cb8b8f5cd008d52482fefb086546256a9822025d75f5b286996b19ee1c7cd254f476abf4de0cf8c6205d9f7d5e49b80671
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD58805f3c98c8b5e83f049928ea339844e
SHA1bbedd4de89a4e1d37e5b4d4450c297b1c96116e9
SHA25634446749f80a2e4248d936afcf89606c2c521bd63aa39a269a8cf39651d653a6
SHA5122788752f44c55fa663f0fb052a3a53c2e19aac58f5d3ebe1336bdd33d1a547a2ced8c3dc518e1902915b4681745a06eac94fc7b33724825043452599964ac1f8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD589673d8510396f48f10e8bf303ffd070
SHA19a6a8b5f67406420294f2be63f0f184c2fe8446c
SHA256230a69b9d2f7d7b7af98fbd3872f6da269a72ac5a42e083179a53fce16db10b6
SHA512bb534d4a76ff911bb8c2d954ead100d18675cf960bf82a0b54f2d492d504c16bd873697705c84315cc46e71cc3116da6b4103852d46d8e135645463d763653c1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize432B
MD523189470c1bdcd73badb55e025c593e7
SHA1ae0bd6ce51f14e215a28388b05f3ad4d1b5d54a5
SHA2567328a4b58e7adce3a7cc2517c3111f9e01eafcbe8240941c6d5b823a765848a7
SHA512a4f68e3b163e6309aa92e35c200b0beacae4aa5326fc3f1f0bc5ab05c49e4b4bb2ebd3cd3ff263fbbb3c80e76bf62dc1881e3aef599d389060032f7581864fa8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD557d5ec0c9cd6118fc29b4f7989102f2d
SHA114137137667c9ba0f0cc54a175c43836c90aff2a
SHA2564a5e9e40442a886ae4a8f287f9f2ca3f2d9625da666ef1e77e907e0880340241
SHA512a1c4e7073a7f113566f62698a72bf28f04085dcf9d2e1e4dff9cb80c0cc334ca091965acb4ba7856e868454341d86e44d4ad061d2d223dd6d92be23c1232f62a
-
Filesize
1KB
MD5c67923807f8501e37d7d86c67a6eea92
SHA15a80809198806a3a5ced1963e1ca413e1fd793cd
SHA25663db7e29e49425d32e343d1360784b42def07ffdb2e9fc808beb77c3534d97ff
SHA5128176e915e5da935920f443711665e210e3b7728094b33bd14000a561ebe7bc62b3670a0e9e1489563396e490d933512b0e1313326c66c2a1006bb29b1dad8d96
-
Filesize
1KB
MD5b86e8d27ef8b09edc7e659e4f23d3bc3
SHA12471607aaa75ab4089c58d3d4750fc5cdd5f4c5e
SHA256982d1f373ed28f6bb99054334bfdff01fd3dbe362f04a3c603e8e29bcead5c54
SHA5123c7171b9d8c50322aadcfdaa2333d39e4be919a4854f941b9d4566383c9bda3abdc102770fc408e572e97d758c13d1a73adc967c8fa63158ff3e50072675ec7c
-
Filesize
6KB
MD519634d2e9d00ad629d2b34b75cc782bb
SHA14fd1c794faa42f449587a8cf24d1c313194c9a7f
SHA256c10cdec4d6b09c80a7e597c11c2aeb77ab37e86d29cc2e6832fcd304bd861ebe
SHA5128a3836cc524581cba5570224a7f64259f7b013aa40f6f6ae8bc77457ba946e4c00224e9acae0057baaf6b11e4a866ea989cd0fa119c30054b447bc2fbf94b2cd
-
Filesize
6KB
MD523b85b81b9e8244a43fe24605c18a199
SHA1fce3831cb5e89ab1776713fbc0c49481b8156e83
SHA2562377fcfa0ddc0d24080dc5f015e618d90a1024b9d54400ab7412fd74c008607e
SHA5129bd96c09e9d063a65ab75cc8a9dfb3f1a9bac0ed95bf80e7da6a6315b0e4b44c30e96cd0f3888877f36a2b91b2c6eeae9f376bb20e30cef6b279a68cd0f4fdb8
-
Filesize
6KB
MD5b49b46a72f22a4b0825194a894a2b094
SHA192621e3f6cfd32528f9a9010569dd199b3fb8617
SHA2569f073c9454b43cf5ddd0ee141ace322ea37459fba66f28bb715fd81c7297f0bf
SHA5122edcdb44b2cd0dc22f21ee8f2fe7e1a2b4974cd87cab08c91e055868526f3babcad6fd336c1c7f2f2b160482c38a59bec156c4487f85438ac88820038949b387
-
Filesize
6KB
MD5403acd3b9d7b0d15f6ece91dc079a368
SHA1190136cdaa90297f24b37972c7ee2f7ff1f893c5
SHA2564125212e750ed55c53916a5bdc83c6873c5cd2a67eb97eda62df89aad9978345
SHA512f59d655b42d56ba37ef22d09b0971cce3a1a610372060fc793de6636432256b3fb116a740fd2e845fd7d8b753e6a6fbd4f74891e63301fd0417aa9ce05c86d06
-
Filesize
6KB
MD5ce1d710659a6066a45ba7f1c78524ae9
SHA1679c4d3815068f32b1b273979cc77036e74e8695
SHA256543ad536d3d0a639150f579069e9aa908c83a18114dea63bb495c4082d56757e
SHA5129f39c99669d3d29545272bbf6c07721c1204c497a4b369b78a2cc58726a7b0f034b6bcbcb134add4ee0e2e230106529afa7b64cc0945e9b3d8d1e68cfc9739ec
-
Filesize
203B
MD53ffabf7d48409a51baeb57057e06dfbc
SHA1bcea1d461eedc1c8b588c2e22fe9d62090cd4441
SHA2567c683ad78e030ec5e7196af802ab555d470290a50c48e5c1204c4c0207681fe9
SHA512336753fb546a06a21add6e4ee379eff2d44b4cdb61c2730750cbdac5a54df7d15552ca182567f237700e14fdd249b93df8c73774e220e53d60f0840e5f354902
-
Filesize
203B
MD53ff8081b3736f6be3128c7500951057b
SHA1e0cd56c0807cbe744488f199c21a40dccbf3cf24
SHA256b818851f604655e171d010f47c3c9613e22533e981ef9efebf681e213fb5b4c1
SHA51296ba321de8b17bf877f394af278676a374cc6256812e67d473bd618f64243cc8635eddaea9235d96ea68a6a0e3cd339097df1592c332604b1f1ca0c9652a0169
-
Filesize
203B
MD5ca6a8b8eb67fca6ca4b4fe9e151cdd54
SHA1e48748108b66fcb84c62b5aa382f3c860606a404
SHA25631d68b67c9b84c0cf3c80e1cf39128d5301dd2f661fd3ae0ee5f02e22e3dc1ed
SHA5129395bc2168005d621f7e9187866f9f95e94aeab0751fea205d77b2cd3f8b0c71e67eea50386066616c926919260e44d7c1a3039c8d860792503c62b3a8ccc31e
-
Filesize
203B
MD590314c585d5aa1da79ffc1feffe31a0e
SHA11630932c96ddb2159d8b9b4d6f7bcb60fca04418
SHA25688cda565df58aa9d5fc1085771c545d70176dd9b38db729fe50b3532f80d0fbf
SHA51284df35203ebb6ee804e12a15d61a074001646af02a72ca225ccc811da172aba7385786a6cde564c7d3f5e7e935c9f8becd8a66457a788bfa04cd025d03c0fe85
-
Filesize
203B
MD56d51e413144271d969dd3e273161d2e8
SHA1372f38c00cd5bcc9459bc3ea5fa3d277a018c689
SHA256c929ed506bccfc5e6131d9c7dda6dabd33b1afbbbd9c1bbe311cf13346a73110
SHA512642678be01e083000cb7265d410848b632fc58368c8fd2eae092b6e9295e543e00789fc9579697628b3d8dfd7dc2cd26d94b3886c841b4bb62e1eee761a07998
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d86af69283afb52f9a851a270cd75a38
SHA1d68cc70e6896de61c7b102fb390ab995cd53c00d
SHA256ec30b052cd4b99da6dd1599d78dc09883dcad582259de73f386b32d8347663f6
SHA5124578b4319872e9ccf7517810f7797037a18294ae0f8e931c4b09ad881015754db38f97de9c13975288b69db144bd0b17d25152e3e1321225a5810530853b3f69