Analysis
-
max time kernel
144s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 19:26
Behavioral task
behavioral1
Sample
JaffaCakes118_94afbe9bba7169bbfcaa7e3742cb06ef.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_94afbe9bba7169bbfcaa7e3742cb06ef.html
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_94afbe9bba7169bbfcaa7e3742cb06ef.html
-
Size
7KB
-
MD5
94afbe9bba7169bbfcaa7e3742cb06ef
-
SHA1
6d59a5f20d742bfd87821744db5a832e847fb2c6
-
SHA256
c4556d09982d62294282c86d6b2c64a755a856b54533185a4a00a6e9e469c94e
-
SHA512
33a704b9600ef32a778cdb5f796f8be7f18baaf73e397619f7239a5ba239f8025c8bf6849a4691ac1cd8c694c941609925c24f60f6efb9c701df29059e4a73d8
-
SSDEEP
192:zax7TRRa93LR93a93Lp9YyuB1hZd1t7Nf:yoLR90Lp9EFP
Malware Config
Signatures
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\msedge_url_fetcher_4924_824284224\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\hi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\fil\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1109232783\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\fa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1973923361\keys.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1763616083\deny_full_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1763616083\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\mr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\kk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\nl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1109232783\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1973923361\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1763616083\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\page_embed_script.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\lv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\bn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\zh_HK\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\ne\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\ru\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1770426295\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1770426295\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\ko\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\pt_BR\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1770426295\sets.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\no\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\ka\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\mn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\128.png msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\am\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\cy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1973923361\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1763616083\deny_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\en_US\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\pa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\_locales\fr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4924_1623179990\manifest.fingerprint msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133877813626950518" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-814918696-1585701690-3140955116-1000\{D6FA99A6-A17B-49E7-9AF9-96025AF328F1} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5424 msedge.exe 5424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4924 wrote to memory of 5064 4924 msedge.exe 85 PID 4924 wrote to memory of 5064 4924 msedge.exe 85 PID 4924 wrote to memory of 2872 4924 msedge.exe 86 PID 4924 wrote to memory of 2872 4924 msedge.exe 86 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 2292 4924 msedge.exe 87 PID 4924 wrote to memory of 5492 4924 msedge.exe 88 PID 4924 wrote to memory of 5492 4924 msedge.exe 88 PID 4924 wrote to memory of 5492 4924 msedge.exe 88 PID 4924 wrote to memory of 5492 4924 msedge.exe 88 PID 4924 wrote to memory of 5492 4924 msedge.exe 88 PID 4924 wrote to memory of 5492 4924 msedge.exe 88 PID 4924 wrote to memory of 5492 4924 msedge.exe 88 PID 4924 wrote to memory of 5492 4924 msedge.exe 88 PID 4924 wrote to memory of 5492 4924 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_94afbe9bba7169bbfcaa7e3742cb06ef.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2b4,0x7ffe41b3f208,0x7ffe41b3f214,0x7ffe41b3f2202⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1808,i,12145631896349295805,6475178067626909329,262144 --variations-seed-version --mojo-platform-channel-handle=2236 /prefetch:32⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2208,i,12145631896349295805,6475178067626909329,262144 --variations-seed-version --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2508,i,12145631896349295805,6475178067626909329,262144 --variations-seed-version --mojo-platform-channel-handle=3028 /prefetch:82⤵PID:5492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3460,i,12145631896349295805,6475178067626909329,262144 --variations-seed-version --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3464,i,12145631896349295805,6475178067626909329,262144 --variations-seed-version --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5176,i,12145631896349295805,6475178067626909329,262144 --variations-seed-version --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5184,i,12145631896349295805,6475178067626909329,262144 --variations-seed-version --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5876,i,12145631896349295805,6475178067626909329,262144 --variations-seed-version --mojo-platform-channel-handle=5888 /prefetch:82⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5836,i,12145631896349295805,6475178067626909329,262144 --variations-seed-version --mojo-platform-channel-handle=5900 /prefetch:82⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5836,i,12145631896349295805,6475178067626909329,262144 --variations-seed-version --mojo-platform-channel-handle=5900 /prefetch:82⤵PID:5876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5056,i,12145631896349295805,6475178067626909329,262144 --variations-seed-version --mojo-platform-channel-handle=5068 /prefetch:82⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5060,i,12145631896349295805,6475178067626909329,262144 --variations-seed-version --mojo-platform-channel-handle=6212 /prefetch:82⤵PID:5304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5960,i,12145631896349295805,6475178067626909329,262144 --variations-seed-version --mojo-platform-channel-handle=5900 /prefetch:82⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6000,i,12145631896349295805,6475178067626909329,262144 --variations-seed-version --mojo-platform-channel-handle=6004 /prefetch:82⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5972,i,12145631896349295805,6475178067626909329,262144 --variations-seed-version --mojo-platform-channel-handle=6316 /prefetch:82⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5232,i,12145631896349295805,6475178067626909329,262144 --variations-seed-version --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:5304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5828,i,12145631896349295805,6475178067626909329,262144 --variations-seed-version --mojo-platform-channel-handle=6172 /prefetch:82⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6312,i,12145631896349295805,6475178067626909329,262144 --variations-seed-version --mojo-platform-channel-handle=6148 /prefetch:82⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6068,i,12145631896349295805,6475178067626909329,262144 --variations-seed-version --mojo-platform-channel-handle=6148 /prefetch:82⤵PID:5308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6252,i,12145631896349295805,6475178067626909329,262144 --variations-seed-version --mojo-platform-channel-handle=6296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5808,i,12145631896349295805,6475178067626909329,262144 --variations-seed-version --mojo-platform-channel-handle=5548 /prefetch:82⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5984
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:436
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:4844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD560d40d2b37759323c10800b75df359b8
SHA1f5890e7d8fc1976fe036fea293832d2e9968c05c
SHA256c3a2f26d5aef8b5ed1d23b59ed6fce952b48194bed69e108a48f78aec72126e0
SHA5120c339563594cc9f930a64903281589886308d4412ee267e976520a58d86b2c339d7b2320e1b3fd6fbf81f092ff1735f0710c669af2986ea5b63d2c1e0a6df902
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD52d3d39f549813375325c3d45e6a51920
SHA17713eb0bc7002bd7f85b5676d73116583acb9945
SHA256af89d8b0449cf183becc7a64088b7c01bc196a7c39826240e024262db93102e0
SHA5129840c747e05b147f3c7295225a2cfdef94dee2a9179aa3a396267dbb7baf39310f9d9a0c683ac9d22e2e0acc94f81367d338fcdbd37b226248538cf002d5cc6b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5b10e0b48e077c9d1b3b5b11542bdaf10
SHA1efc09cc67c8e6804b2db398aaa9f79ed1c92c2c0
SHA256fae87bdb905663c94fa39ea4c6f797b72072ef1a32dd95663cc6b7776989eebf
SHA512137b211f0e6d679027c4e1ab6062326fd43b533209bc49113bebd191469d0e76c8888bf12ba0e886c24002db5f468a464f8c2b8e2bf57b948555c57affbb577f
-
Filesize
16KB
MD588508a9f12dbc768a68febcdc48b1775
SHA1175e61f5da1677e6962a08bdf63910fcb7b59dfa
SHA256092dff335ce2aa1523d6c96e9d0324982c6c84a5ddb0fb44112d6cfa3bbb63f7
SHA512cd8af724d8e9261a9188f5711b831eb627b53baf1348c9835c30af4139266f65dcf6f94869f21d24742e2ff6be5cd38070708f890750f2a495fa3e7473b15e4a
-
Filesize
36KB
MD5eee01f8c5bb57f4885ac0b3b2d5a941e
SHA1ed5eb15d1e6e8f2d0222b0c08ca1bb8fcc731444
SHA256850e08fb5e62fc36531e9af866aedba872955109fd31619df1d0856d54674aa4
SHA51247ed7dad23c17eafd75f9f17b7893ca8e6db21bd3b5850bd725771c7f2022d307136f5de939ccd9402eaf27ba8f170ab96a91ff0d6239504ab7a21fa4213bf13
-
Filesize
22KB
MD5623e0470fc2c91d55ee78c039189246d
SHA123268d0c19658fb700f89bc766eb35ce022fb54a
SHA256adfeec7915dc3db00ff73eed8e5411cebad9af916602b2fc23738de71d4c1ec3
SHA51262f4c0f73c7eac15d3a5e5bf5865bd5a5d48bf57cb984a2da03c2660be04854e5ead51640d55be72508041902513b9f4349dd450922cfbc9e8c2b4dfb37a1d58
-
Filesize
465B
MD5fe1532d5fe109163884505c60210f207
SHA1749976154d6a690ed71e1d2d5f89f9a855e9ecb3
SHA2563ffa5cc5d713a4a0f998d38feb01fabce933a9177aaf64b12cc065b3c19cbf46
SHA5120660112caf9428d07f4686ff89b6b35799e252211e94043f89c4150fac40d663e85b12c9a00caa44ad2b445e56c2460c7bb88679994a85b3968c6833ca5d4b6c
-
Filesize
898B
MD540efdcd1f7d2879ddaee1948a22f9243
SHA1ace92cdd73b85902e2c7f053608198fb834c8852
SHA256b7b7508adc626273bad8c2bef1d720fd1af327c7699574e3771f6a8f21869ee0
SHA512a92f9b04f30341093191a80894c19dbf8087ed48da86af2be6867242af1df4a81952b842d56f7f6fd573b2b63c9de27f09ada7622b37c026b6d25e5c5d060a35
-
Filesize
23KB
MD57912398a9992e8724a2381cfd0ea7d8b
SHA16a5cd5dbcf480559bc364181b3af1f0dac6f5bd6
SHA256e60e9b11dfbbf9057ef2b53134fd5c2c0f7d9208e0a826900ff1ba58f2f654fe
SHA512a93471a0f02ef6926dc0b27b70196c4e8bb9e50aec3192475e822000e6fafb0afb2c4a1037c47de19339698faa0394f20a5329ed08903c0c485adf8eb9cf0e6c
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
49KB
MD56ad8bb4fd2066cec0521409c38fced37
SHA12ffc0419862bf7f7e0e02d8b93abb737253746d3
SHA256ed4d65879dd43bd6c5de573cd5a52f371560aede2f3d2e67c488d464d4487b8a
SHA51240b770a64c49b0ca4c57f9b8d1978c09b887c85500a1d4b5fce5478d1a68d25f7083390eaf1d80abcbefd219a3d127841ea6e8866e6817340cdd2c4042ada2d9
-
Filesize
40KB
MD5759840b5e584371cc399e8d6a7abdd10
SHA104ba6eace64292b52678ab0d3490e36e60f8af53
SHA25638bf3722904c363557e6bee388337a3aad6fc6124eae10cc3cd83f058473eb3d
SHA512ea917cccef7199308f2d9668f24014791ca9825b6dbb88bfb4c158e8dbd7ce19030ee686e75f894f81ea0ae007a70e3578961977befff9f1308ebf209ba8b342
-
Filesize
40KB
MD5acffc7d06582f0c426d22df5a47eaa72
SHA1dbaa2e5dadbdeadba04c1333cb28cad82d1973fb
SHA256d8c81cfe40164a8d1db4bbede5ca12f637abae7a2e62ae2cf8cb39e464cc4431
SHA512cfa70b8785e57ce282e37fef73a898d56a8c0f206a24324268982a0c5c6bfd0cb2066087de923011c736bd1616e4decf2ab8c698b1d527a69fb79494c6378f0b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5918839007a4410e6b5a9eccab537df18
SHA19eaa024f8f895c762d1325ba47816f622f56a46b
SHA25608739fe83d44add8399ab7e4c5fbb04c07a7423173fed4dd4d412452fc02528b
SHA5122764a46681f3c61ec06c68b54f79a395bdfb6cb36a04295131f6ee9ca57186ebf169323f27c6fe25932281bccc5cde8eb58a2553494e1228ab1fcb663b12b53f