Analysis
-
max time kernel
147s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 18:56
Behavioral task
behavioral1
Sample
JaffaCakes118_93398043cbad8c6d06e715bc195987f6.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_93398043cbad8c6d06e715bc195987f6.html
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_93398043cbad8c6d06e715bc195987f6.html
-
Size
46KB
-
MD5
93398043cbad8c6d06e715bc195987f6
-
SHA1
4944791cec18559af8ff7e0563580d7546efa8e2
-
SHA256
6f431106c802aee5bcab8fddc38e42c0b4d1bb9f23033cb1c7ed6b7f4f7856b2
-
SHA512
b98d0f54d9e500169305122c231a88b35bf40ae25ed9022b74b6e1e6e2375da354c3dedce15667c71301d0349b9dffd6805c13364f0e934b52a8a2bfd6e513e8
-
SSDEEP
768:Ei1S5y5v/2UBX1w6U85l8pJodPhOiMMtS5dE2T:dg81/2UJ1w6modPhaMtS55T
Malware Config
Signatures
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_572548944\deny_etld1_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\hi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\zh_HK\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\ne\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1946254625\keys.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1946254625\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\mr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\km\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\mn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\ca\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1352980114\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\offscreendocument_main.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\tr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\be\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\ur\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1352980114\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_572548944\deny_domains.list msedge.exe File created C:\Program Files\msedge_url_fetcher_3896_1751620880\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\es_419\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\ka\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\te\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\sv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_663282937\typosquatting_list.pb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\cy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\pa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\sr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\ko\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\am\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1352980114\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1946254625\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\lv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\lt\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_663282937\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\th\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\ru\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3896_1787825934\_locales\ro\messages.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133877772927976207" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1062200478-553497403-3857448183-1000\{45B8FEAE-196A-4A0F-8CE3-67847B0945BD} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe 3896 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3896 wrote to memory of 3728 3896 msedge.exe 85 PID 3896 wrote to memory of 3728 3896 msedge.exe 85 PID 3896 wrote to memory of 780 3896 msedge.exe 86 PID 3896 wrote to memory of 780 3896 msedge.exe 86 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 3524 3896 msedge.exe 87 PID 3896 wrote to memory of 5472 3896 msedge.exe 88 PID 3896 wrote to memory of 5472 3896 msedge.exe 88 PID 3896 wrote to memory of 5472 3896 msedge.exe 88 PID 3896 wrote to memory of 5472 3896 msedge.exe 88 PID 3896 wrote to memory of 5472 3896 msedge.exe 88 PID 3896 wrote to memory of 5472 3896 msedge.exe 88 PID 3896 wrote to memory of 5472 3896 msedge.exe 88 PID 3896 wrote to memory of 5472 3896 msedge.exe 88 PID 3896 wrote to memory of 5472 3896 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_93398043cbad8c6d06e715bc195987f6.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x24c,0x7ffac8bcf208,0x7ffac8bcf214,0x7ffac8bcf2202⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1936,i,4206906556985946893,8370355209158661628,262144 --variations-seed-version --mojo-platform-channel-handle=2412 /prefetch:32⤵PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2348,i,4206906556985946893,8370355209158661628,262144 --variations-seed-version --mojo-platform-channel-handle=2340 /prefetch:22⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2584,i,4206906556985946893,8370355209158661628,262144 --variations-seed-version --mojo-platform-channel-handle=2600 /prefetch:82⤵PID:5472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3536,i,4206906556985946893,8370355209158661628,262144 --variations-seed-version --mojo-platform-channel-handle=3560 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3540,i,4206906556985946893,8370355209158661628,262144 --variations-seed-version --mojo-platform-channel-handle=3588 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=564,i,4206906556985946893,8370355209158661628,262144 --variations-seed-version --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5188,i,4206906556985946893,8370355209158661628,262144 --variations-seed-version --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:5560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5192,i,4206906556985946893,8370355209158661628,262144 --variations-seed-version --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:5552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5300,i,4206906556985946893,8370355209158661628,262144 --variations-seed-version --mojo-platform-channel-handle=5240 /prefetch:82⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3064,i,4206906556985946893,8370355209158661628,262144 --variations-seed-version --mojo-platform-channel-handle=5228 /prefetch:82⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5316,i,4206906556985946893,8370355209158661628,262144 --variations-seed-version --mojo-platform-channel-handle=5332 /prefetch:82⤵PID:5784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5952,i,4206906556985946893,8370355209158661628,262144 --variations-seed-version --mojo-platform-channel-handle=5804 /prefetch:82⤵PID:6052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6180,i,4206906556985946893,8370355209158661628,262144 --variations-seed-version --mojo-platform-channel-handle=6356 /prefetch:82⤵PID:5464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6180,i,4206906556985946893,8370355209158661628,262144 --variations-seed-version --mojo-platform-channel-handle=6356 /prefetch:82⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5108,i,4206906556985946893,8370355209158661628,262144 --variations-seed-version --mojo-platform-channel-handle=5104 /prefetch:82⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5112,i,4206906556985946893,8370355209158661628,262144 --variations-seed-version --mojo-platform-channel-handle=6484 /prefetch:82⤵PID:6004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6404,i,4206906556985946893,8370355209158661628,262144 --variations-seed-version --mojo-platform-channel-handle=6704 /prefetch:82⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5796,i,4206906556985946893,8370355209158661628,262144 --variations-seed-version --mojo-platform-channel-handle=5780 /prefetch:82⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5232,i,4206906556985946893,8370355209158661628,262144 --variations-seed-version --mojo-platform-channel-handle=5620 /prefetch:82⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=3016,i,4206906556985946893,8370355209158661628,262144 --variations-seed-version --mojo-platform-channel-handle=5608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4000,i,4206906556985946893,8370355209158661628,262144 --variations-seed-version --mojo-platform-channel-handle=5972 /prefetch:82⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4476
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:4128
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:4888
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
72B
MD5a30b19bb414d78fff00fc7855d6ed5fd
SHA12a6408f2829e964c578751bf29ec4f702412c11e
SHA2569811cd3e1fbf80feb6a52ad2141fc1096165a100c2d5846dd48f9ed612c6fc9f
SHA51266b6db60e9e6f3059d1a47db14f05d35587aa2019bc06e6cf352dfbb237d9dfe6dce7cb21c9127320a7fdca5b9d3eb21e799abe6a926ae51b5f62cf646c30490
-
Filesize
280B
MD5690f9d619434781cadb75580a074a84d
SHA19c952a5597941ab800cae7262842ab6ac0b82ab1
SHA256fc2e4954dbe6b72d5b09e1dc6360ea699437a2551355c2950da0b3d3a4779fc1
SHA512d6b1da8e7febf926e8b6c316164efbbac22c7c3d9e4933a19fffba3d1667e1993cdeb5064aa53816c0c53f9d2c53e204772de987eb18adbb094a0fb84ae61fa9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD55138155ca7d5a9359579c5aa1d463cca
SHA1e569762bdf7825b903e5a476949d069cf1e6d550
SHA256b523f06934455927584456f1db7b13100a15366d6a9c998ddc19eec01d5647b2
SHA512d5e66325da1e4e90a806b658d698726c6d58a81afb76f422dca9d6c462c2b9c1da02ae9fcd9b3b0ed31773a4596a2d10c59134881471772610d06eed103b0e5e
-
Filesize
2KB
MD5466e5ea309983c6b55748ea19e168eeb
SHA1fef89058dbf856129efc43def605bd5690299a12
SHA2565a873f476af13783899cb0b400f3d5f16ec706b0220a684f378364ce6d2dc2d9
SHA5127c042462badfb9d78acbbfd9b698eefe3269f9c649acc38940ad6bc6aa3e4f376f8c42ef734e39654baea23e0d967898b4ed484a99e4f377ad84a162ab48ce7e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD54b389a03cf2b869cd10fb5ef7295690e
SHA1fe270a1c6a5754c910611b9847967bdb2b88efea
SHA256ef222cfc6de6b859c2f1ba6b3e8b4af57934e49fb57010286acaa7069fa9111f
SHA512e4e1f99a653126bc46b8d480c88b982376093e04dfd096ed939fc8772eb36c5e445f0f42fadc328aa4d6cd900c45b69f56ee0971bf8f55703478902ba4a51110
-
Filesize
15KB
MD5f736fa1c9812e1801bbbca2915a78439
SHA1ef605db74c6de8a1d3eacebf81a196e8eaceaaaf
SHA256e31a6068499c6d2bce5f3f372b5d0d27f334da22d1ed173ff40c1e729e55ff55
SHA51224e7d453d4393ad0ddb8e1904b44bae519724fd8d7e7733b95281a2a58b09c2461f2a038b9bcc50faa74f011336e36ca0a2aeca04766e5349fb7e5b93d37773e
-
Filesize
16KB
MD5ffbcb501c833ee33362aafda1bcb93f6
SHA1d2dc997f8ade8471c3f5f24ec843536bc02fc787
SHA25695ca011e9bf20849522087f642cebc18ff2b4e43f8a70cc37cf0e09722c2493a
SHA512f4a943b6fd0ebcc7771fff0f863b5dec61c69b567cd315999ef55de59fd191059b2fe117dcd4f761fcc59998fca226a6121fae3653212ba18716283b8e3a6b11
-
Filesize
36KB
MD516eaea2945446c01a19f01c11451a26a
SHA1eafb11aa705f77fe8dad7ea1e9f2d2d366c8eab5
SHA256a577818149a0e7f125d4176de0c73b80a8737ad85708ce9e72e903134b44e028
SHA5125fffac638ee97ae3010a4f1f042651ffa8186a6c556f346ace3d4dcbab373e0a01e66d904ddf32c6ed66f3361b52ec592a4c9e2a9b0c2dd4813837261dc049ec
-
Filesize
22KB
MD5d893edc385478ca514125b6955a343dd
SHA1587ab6da2cb3fc50e529fdabd52b8c539a5f03cb
SHA256b6bed97eb1a8238505e3f2573b7da6657e3c23ba686f2e8be5de44dd9b37ca9b
SHA512c776ba132380a6d647cbb3e02dc8278f1b40d37ae8889a8ff76072c088bf0e45efa2cf08402ecc921ddf5afed39a714d2d04c715436df406c7d4c17b6a96a309
-
Filesize
465B
MD5076f93bb7ca7205ff4b72c7885d5bab5
SHA189576550c769211800c63b6a0a235b1302d65c78
SHA2564aacf3dbcc0582d79bc7175dce5498d2e7d9d2ba853588d3f6bd8e25e40ee64b
SHA512d1b95d59490f3371005108c1f8537a9266a169b7b87259afcf69e8e108e071ef4801b2db879b75d2f32ac5895aac0fc2d9692390fc6a9649cfdc5156cac1399d
-
Filesize
23KB
MD5a5509268d102d098103ee6f4d67942ca
SHA19e51d1fb95279c5426bde0e7d1a1fa511ccb6dc3
SHA2566eed684ca25cefd511fe69f034246a335aec8b67765ee275d3bfe61425f943bd
SHA5122d9e618618a1c105dc800677f172d0752bf12698108f8a00a33a7731ee0531a1b9d76f859b80d76c84af59a12e4178009d636a1f3ecda5d831c5d4b8455fbd48
-
Filesize
896B
MD5d85ec33753a9b2de77b85b33fb71cb72
SHA19ae8de57e7be939c007a7609cf69bbab96abd52e
SHA25635727861b13a82f2aa5e4dcdc6fe9a42f01b2e71246c180feee2843587c345ad
SHA512b9ea4cd69c167ff8385f730871ca5a939e95320c940cb5e70946d794be56a065530f6a01d4d9159fbbdd3eb0cf298c2c60091ffa2f8a06577119bbed2cd5f5c4
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
49KB
MD5cf9da7c878c395e1474dc92940265e50
SHA1f8636fcd5634b6783c11bf3b1c39b3c0d29c7b6b
SHA256aa3b42d8333b10c315a54c10661c646f318abf27886dd07b2e094b65d6391171
SHA5127efe9d01cb89e9a6458fa1a107770f63ef93579a3aae2fb6469417a467b350d1a88a5a209038124ce886c7b1650bc4f6fccdfade7332adcfa862b49de9fe2e83
-
Filesize
40KB
MD5790393857d10c943c8c8eb6adefa1f8b
SHA1ca902bf8233c43a08205e85e0526e206c4a8e9a6
SHA256fa2077daf0040f37a8d38b4d82cfcd6ba2a0b12bf571b8713d93ab624ccde933
SHA5129e8b9253e33bebeec6337c79affc97244e4c755415ddd52f51bfb4a9e4cfc471446ebbe25f1022005598172c306c4492d156a05fccc968d7f904ea8b3ec46b81
-
Filesize
40KB
MD53346c68e823ac5b66e4d1882e0f18480
SHA1fdddff46e893d51c44962e392880bbf9c346184d
SHA2563f8991265146248461ab540a2f598f9302bce858069ac40e78f7ee7d2448fe96
SHA5128162b03ac69937f6a391a454aed7a311b5ee096e7a64d39007ff2c93e2e9af93c7a80f778e3e96035afa36914354981a23cca8f4962de68f275dc5c3a91424f1
-
Filesize
40KB
MD5d7d8db79d374737dac0d3098a1ed49b3
SHA1db799e59c79200fcfca1f9583bd673e2956fee7d
SHA2568e8d0502fe85e0b57f2e3cfc644dc37fa898a9817232fad91d671fc645100f2b
SHA512e151178d8ebcebaba80189591bdc52451d399aadf46185c5b50f7392c19a339f637edca610540f98d61d1d063739b3cdf610e5fb0dae03936c30f45fcc0ab74b
-
Filesize
163KB
MD5bd6846ffa7f4cf897b5323e4a5dcd551
SHA1a6596cdc8de199492791faa39ce6096cf39295cd
SHA256854b7eb22303ec3c920966732bc29f58140a82e1101dffe2702252af0f185666
SHA512aa19b278f7211ffaf16b14b59d509ce6b80708e2bb5af87d98848747de4cba13b6626135dd3ec7aabd51b4c2cfb46ed96800a520d2dae8af8105054b6cd40e0b
-
Filesize
3KB
MD517c10dbe88d84b9309e6d151923ce116
SHA19ad2553c061ddcc07e6f66ce4f9e30290c056bdf
SHA2563ad368c74c9bb5da4d4750866f16d361b0675a6b6dc4e06e2edd72488663450e
SHA512ad8ed3797941c9cad21ae2af03b77ce06a23931d9c059fe880935e2b07c08f85fc628e39873fb352c07714b4e44328799b264f4adb3513975add4e6b67e4a63c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD51759d336338c5ddf888781a1340256d3
SHA15fc56066b04cba210ac273079ba71ecfeaf19f3c
SHA2565b354fb418f53e5e63ae693f7e416d2debf348e3fa47b376924365b2587d57de
SHA51271ce444abfd52e3c195d7aedc2aadfd933ef3c5f3e7951451f78f5391725c4363b79df8e28228810e81de210654a3ba0c81eb974e3532f3d5cee0d55b61a08c7