Analysis
-
max time kernel
120s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 19:25
Behavioral task
behavioral1
Sample
JaffaCakes118_949e16b7d4f5bccc80da716d462a50e7.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_949e16b7d4f5bccc80da716d462a50e7.html
Resource
win10v2004-20250313-en
General
-
Target
JaffaCakes118_949e16b7d4f5bccc80da716d462a50e7.html
-
Size
87KB
-
MD5
949e16b7d4f5bccc80da716d462a50e7
-
SHA1
2a570059d433595fa14b3e91ee6bd72a84b84605
-
SHA256
9dd923875d0a042f5bc6e03b326b48056c01600b24e03b7d0a3d974ceb785f50
-
SHA512
4c6aa69053c274c3f93879edd2b89a6f4057413f97e15cf8bccc833566d9e2440f704cf15fb8d43561b6acfe6dfc3c036ec4b9b9af0ab9cd1419bd9282020ad9
-
SSDEEP
1536:3NVBi9gLY3a/euUkh8J9poK93c49nU3MhMSVSZKZD13odPhLKsRtH9M:3NVBat9pr93c49nSMhMSIwFodPhLKsRQ
Malware Config
Signatures
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_1691500411\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\si\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\sv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\hr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\km\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\kk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\no\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\bn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\pt_BR\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\ur\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\te\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\ko\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\lt\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\fa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\hy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_2094124451\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_1713611336\deny_etld1_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\eu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_1713611336\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_1713611336\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\nl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\ru\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\128.png msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\page_embed_script.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\mn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\tr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\el\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\is\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_1691500411\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_1691500411\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\ka\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\fr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_2094124451\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_1713611336\deny_full_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\offscreendocument_main.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3972_949150345\_locales\mr\messages.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133877824170121260" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1279544337-3716153908-718418795-1000\{1DAE534A-EB02-499B-A54D-33FC7BF8FA48} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2604 msedge.exe 2604 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe 3972 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3972 wrote to memory of 4632 3972 msedge.exe 85 PID 3972 wrote to memory of 4632 3972 msedge.exe 85 PID 3972 wrote to memory of 6064 3972 msedge.exe 87 PID 3972 wrote to memory of 6064 3972 msedge.exe 87 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 824 3972 msedge.exe 88 PID 3972 wrote to memory of 5660 3972 msedge.exe 89 PID 3972 wrote to memory of 5660 3972 msedge.exe 89 PID 3972 wrote to memory of 5660 3972 msedge.exe 89 PID 3972 wrote to memory of 5660 3972 msedge.exe 89 PID 3972 wrote to memory of 5660 3972 msedge.exe 89 PID 3972 wrote to memory of 5660 3972 msedge.exe 89 PID 3972 wrote to memory of 5660 3972 msedge.exe 89 PID 3972 wrote to memory of 5660 3972 msedge.exe 89 PID 3972 wrote to memory of 5660 3972 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_949e16b7d4f5bccc80da716d462a50e7.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x24c,0x7ff9a100f208,0x7ff9a100f214,0x7ff9a100f2202⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1800,i,2578939726874822727,3306661409475437038,262144 --variations-seed-version --mojo-platform-channel-handle=2320 /prefetch:32⤵PID:6064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2284,i,2578939726874822727,3306661409475437038,262144 --variations-seed-version --mojo-platform-channel-handle=2280 /prefetch:22⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2612,i,2578939726874822727,3306661409475437038,262144 --variations-seed-version --mojo-platform-channel-handle=2608 /prefetch:82⤵PID:5660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3532,i,2578939726874822727,3306661409475437038,262144 --variations-seed-version --mojo-platform-channel-handle=3580 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3536,i,2578939726874822727,3306661409475437038,262144 --variations-seed-version --mojo-platform-channel-handle=3612 /prefetch:12⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5336,i,2578939726874822727,3306661409475437038,262144 --variations-seed-version --mojo-platform-channel-handle=5328 /prefetch:82⤵PID:6020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5344,i,2578939726874822727,3306661409475437038,262144 --variations-seed-version --mojo-platform-channel-handle=5360 /prefetch:82⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=564,i,2578939726874822727,3306661409475437038,262144 --variations-seed-version --mojo-platform-channel-handle=5284 /prefetch:82⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5796,i,2578939726874822727,3306661409475437038,262144 --variations-seed-version --mojo-platform-channel-handle=5740 /prefetch:82⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5776,i,2578939726874822727,3306661409475437038,262144 --variations-seed-version --mojo-platform-channel-handle=5720 /prefetch:82⤵PID:5760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5492,i,2578939726874822727,3306661409475437038,262144 --variations-seed-version --mojo-platform-channel-handle=5964 /prefetch:82⤵PID:5984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5772,i,2578939726874822727,3306661409475437038,262144 --variations-seed-version --mojo-platform-channel-handle=6028 /prefetch:82⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6072,i,2578939726874822727,3306661409475437038,262144 --variations-seed-version --mojo-platform-channel-handle=6292 /prefetch:82⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6072,i,2578939726874822727,3306661409475437038,262144 --variations-seed-version --mojo-platform-channel-handle=6292 /prefetch:82⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6532,i,2578939726874822727,3306661409475437038,262144 --variations-seed-version --mojo-platform-channel-handle=6556 /prefetch:82⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6400,i,2578939726874822727,3306661409475437038,262144 --variations-seed-version --mojo-platform-channel-handle=6396 /prefetch:82⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6116,i,2578939726874822727,3306661409475437038,262144 --variations-seed-version --mojo-platform-channel-handle=6060 /prefetch:82⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5632,i,2578939726874822727,3306661409475437038,262144 --variations-seed-version --mojo-platform-channel-handle=5644 /prefetch:82⤵PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5280,i,2578939726874822727,3306661409475437038,262144 --variations-seed-version --mojo-platform-channel-handle=5736 /prefetch:82⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5860,i,2578939726874822727,3306661409475437038,262144 --variations-seed-version --mojo-platform-channel-handle=5972 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5692,i,2578939726874822727,3306661409475437038,262144 --variations-seed-version --mojo-platform-channel-handle=5948 /prefetch:82⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4412
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:4284
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:6128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
119B
MD5f3eb631411fea6b5f0f0d369e1236cb3
SHA18366d7cddf1c1ab8ba541e884475697e7028b4e0
SHA256ebbc79d0fccf58eeaeee58e3acbd3b327c06b5b62fc83ef0128804b00a7025d0
SHA5124830e03d643b0474726ef93ad379814f4b54471e882c1aec5be17a0147f04cfbe031f8d74960a80be6b6491d3427eca3f06bc88cc06740c2ad4eb08e4d3e4338
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Autofill\4.0.1.14\autofill_bypass_cache_forms.json
Filesize175B
MD58060c129d08468ed3f3f3d09f13540ce
SHA1f979419a76d5abfc89007d91f35412420aeae611
SHA256b32bfdb89e35959aaf3e61ae58d0be1da94a12b6667e281c9567295efdd92f92
SHA51299d0d9c816a680d7c0a28845aab7e8f33084688b1f3be4845f9cca596384b7a0811b9586c86ba9152de54cafcdea5871a6febbee1d5b3df6c778cdcb66f42cfa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Autofill\4.0.1.14\edge_autofill_global_block_list.json
Filesize4KB
MD5afb6f8315b244d03b262d28e1c5f6fae
SHA1a92aaff896f4c07bdea5c5d0ab6fdb035e9ec71e
SHA256a3bcb682dd63c048cd9ca88c49100333651b4f50de43b60ec681de5f8208d742
SHA512d80e232da16f94a93cfe95339f0db4ff4f385e0aa2ba9cbd454e43666a915f8e730b615085b45cc7c029aa45803e5aca61b86e63dac0cf5f1128beed431f9df0
-
Filesize
325KB
MD52011c46f74e8f5c89ff456b3014528a0
SHA1ad41c32c74d104d86558d7246070f20bbf7bf690
SHA2560005769599d4c83c8ebc6ec477ba815e484b8c15c803e1fdb58e32112963cda3
SHA512375be65d8371f8834275eabcbceea87f3bf0ac7feb9c703b4eb9039d93aecb0418325325cd9d33d324d620c76ac6f8f85e315f02b14c58384d7bae506d307c16
-
Filesize
280B
MD5998db8a9f40f71e2f3d9e19aac4db4a9
SHA1dade0e68faef54a59d68ae8cb3b8314b6947b6d7
SHA2561b28744565eb600485d9800703f2fb635ecf4187036c12d47f86bbd1e078e06b
SHA5120e66fd26a11507f78fb1b173fd50555dbd95b0d330e095cdd93206757c6af2780ece914a11a23cd4c840636a59470f44c6db35fa392303fb583806264e652016
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
3KB
MD57a63e0ae085b6cfa9be28b1223dd6139
SHA1acadd1a57b0828b2d2a12f5079fe915f83793d00
SHA2560333bfd87c2f56efc5b52714b58f37f3fba06d91c01cdc806070ba9928c90036
SHA5123ec5743fabae5676395bcb59d0896952919c6921e905da29fba338a21f062fa3dc17444fae818a93a105a4b4b64e2f634dd697fd2970a39aee8aae50d46e4844
-
Filesize
3KB
MD5f8fbff063c661cf5d917e81f3149cdb4
SHA112b4769d3afa005ba3ac02157292bd1a5e720baa
SHA2566c100bd9de5e341d8fe22996d3bc053a6171791c74bff8dd3811856431c61937
SHA512a84a9ee637ab03dce43b579898b627f1a559f79905c964701d4e7df8d65b4edb385abf94d1229ab7dc3361de43bf427593a1f79a0b8ffc65504f0d1d51a6f86d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5305ad8ce91df0fb8e523ce3522c93eab
SHA102ecc4866c1afa1ab0b90a309c8efcf7d3e01fb7
SHA256f0f707bdeeb6b6fd234aa1e639ffe1f11f2190bb0c006a56e0a6d7e98f4fb1a7
SHA51224cce7eb6ed25ca46cce28dfbb09074c945ac1b218eee833ecc40a7c95a72ac2973b066c30c9259f34ea3befbf6d05e982e7861e4c3a338acad0e51d3ed0b85b
-
Filesize
16KB
MD5a98e1aea4f7f3cd3fe8d72803abc7416
SHA1d52e130462eed505f14871601fc7bec7ceb4bfcb
SHA25635d94fce9e1a80e2f83477dd55117785ab786bbca4e80ba7d4162d46ad42a2c6
SHA512d05fcb16b71d5d3a039d183b74ac90964235ca1734da1e9eaf8c6d73bb738a1afbe6b76511eeb1dec63588b4338fc8d639d953665c48bfc209adcc74f89dc89a
-
Filesize
16KB
MD515af48c7bad5170772cf844e9e008fc7
SHA12b535cc22d60e3b2e34c52ce8eb16525b5f5a782
SHA256b94b92de408d3ca07e296675b3bd594cbba385d189b2aacbbc1aa55caa510dc6
SHA512354f7f8873259375437e9bd79673f411601903296b7840325e5e9b7824cb81d71e8bc152e79a387864f03b22f523183d0cc6e3a764db8a39c04ba48745913992
-
Filesize
36KB
MD5cb210b48dab6cb4970b6e2bb44f964d9
SHA16ee107094baae517e51c679e0d60b4fa2fa57bfb
SHA256b085548d6ac5d0837ee429854d7593576aff03a90cf2dca0cb4424f4b652c092
SHA512b138f3d6247e8a043df03b4ee54963acdb4c712532d05bb9df305c178efaa85c4e36280921f90ebad9d1b849899ec3501991797454b52292637749298200103f
-
Filesize
22KB
MD5ca6521c02e78781b8a070ce97c2b1a97
SHA143bbd96f15e623175be07a0eeb0a075587e2c7c2
SHA256bcc79a28334a75fceed271f6e07f7bd341a41f76dbc57b9a5bb6abe879343ac9
SHA51206e53e811340fac81c2bf5a3ace4831509553c510ac08632b84833b12d6d5d9bd1bbe1deca9ee9a4333ec2a4006b466aec330e58cf0177a9f11bd080a7931773
-
Filesize
900B
MD538a9cc340dd74840f26536d4a843f993
SHA1bc91b946019e3681a2a5095de75f84c76f25d7ba
SHA25687c95ce90bffc45a197c92069a918e5b40065296b24c667314bd204630c7ed14
SHA512c4cdcdb293ff0e4280bc9e188869cc3477141dada01113c04cce207c3e99ea87ccdb51b5c14993a1402dea25e48f7ce20b0c7f8caa05e42c68b3a6a2b78dddb8
-
Filesize
467B
MD55e67766671387baf7b8aba1648adda78
SHA16f6806ba3f315b96ce3c142f0e9b427c86979ba1
SHA256e7734fcc5e5b04194009f85e01c179079faa475020b687ac2ec84a06501e1159
SHA512e3331dc46cb7846ab80b3fa667a1db19cdc9e0903da1344d7e4d8f2ce94212e59ca39a83875d2c1532bca0a1c14da00f3725cb3818d0ca74d025b1c6af9b5ed2
-
Filesize
23KB
MD5948053aacaa376b0b6e2c889eee3b19d
SHA1c7174177c0219923b59883deae0986b1e5d97e76
SHA25631d94a4f339cb0735919f253e7d281853056cff0e35526ab7037292de3e3bb82
SHA512040d91b34259de178e80a451563c2a07ef28e0d633e57efd9b606cbd5916de6a063ad382ad69329e4ab1b204c53bfb9c3869e1604c3f89ad8a2f93285ac36cca
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
40KB
MD581cadd1e6ed4fd59e373e38cdf71677c
SHA16c9c9e878877ca896aa01899af772c40ad8cff2d
SHA256f962f9acfa19f4d99661612ae829035a8c52a774cea0e89f885ea05ebc5fb715
SHA5123a4c3555cd9e1d79f021941b938154326e8a85adfaeed07cbba91f3394dd070d977cb7e9065b1b0d4854a0ec02265d481de2ec425b482d6e1276012f43d26107
-
Filesize
40KB
MD554875f98779c5c5faf0d03b20750be4c
SHA1ddc7beec643c0f18f8c54d11745e568088d18c7a
SHA2567acae063ff94891114c96e35ded7e36fb65ed9a6ee84a05721012e5bbf23edb2
SHA5122e19430de082d9f1567aaa472fc5d0818ac36c082807b11571392200ff84d09a952e0b355a889ac1dff088940f5960c14aea6b47734a4eda9862b67375bc8488
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
Filesize
40KB
MD53e27fec7e5192503d4b4f982954c124f
SHA1dcd98fbf8ea89b2ead372e25071c52d78daa75aa
SHA256311ebd856332ad3dccaabd523516cc5b396263976a2d711f787066e6d84da8c0
SHA512b1e3618f115a906dd6fffcbd0fbd7ce36500e9f40f52dd0d5651271dd2b70d04f744ebe8e4e8b0d8ca8706f54f085511c9d2e991d9d6aa331b3d985589552dae
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD523865cb6739116fead0c06fd090970c2
SHA1543cb931fae8586972491be55d99d1084cda1e9d
SHA25670983aba327c1aa05e6b6596eab8e56771464c741842d16606da98591e2fdbab
SHA512f5a7dad037c31cf8756c5000ea9d9b4a66324309583f9184359503d1bbb4d9ab514049036d0458f6c02739d753531bfed42d665635879096ee41ff0d04d7b50c