Analysis
-
max time kernel
147s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 18:58
Behavioral task
behavioral1
Sample
JaffaCakes118_934c83041a7896d3b7d32a343847edc5.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_934c83041a7896d3b7d32a343847edc5.html
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_934c83041a7896d3b7d32a343847edc5.html
-
Size
73KB
-
MD5
934c83041a7896d3b7d32a343847edc5
-
SHA1
1fc8c11148df7d87771a20d3907a6f769c658e24
-
SHA256
6111151f6feabaaf64b7e7117802439f3216a8f0674b9e3e3e437552be1a645e
-
SHA512
c2000fc2e100a5a6a25829787f0e287a09627f21a72ba33a8d264c9a60fd50bef1d78781533e7eba006d0f56420fc94725afa203d933b50a1c929c844ebea492
-
SSDEEP
1536:uzwTiMRR+Z7CCCrP44Fvi4KEYcn3xFTp3eSXkLrV1odIh0fZETHPJi0p2NodIhdZ:u6iS8exFTVeSXCrV1odIh0RETHPJi0pO
Malware Config
Signatures
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\hy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\service_worker_bin_prod.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\am\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\si\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\hi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\fa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\sr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_1744919128\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_1744919128\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_1583113958\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_1583113958\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\es_419\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\en_US\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\be\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\fil\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\bg\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\no\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\eu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\lt\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\fr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_1744919128\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\gl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\mn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_1583113958\keys.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_1583113958\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_77920545\deny_full_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\zh_HK\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_1583113958\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_77920545\deny_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_77920545\deny_etld1_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_77920545\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_2127926446\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_2127926446\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\te\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\en\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\hr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\ca\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_2127926446\data.txt msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\page_embed_script.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\128.png msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\lv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3712_665139416\_locales\tr\messages.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133877761696756768" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-446031748-3036493239-2009529691-1000\{6190E4E4-3C21-495F-BEA4-934B412C010D} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5856 msedge.exe 5856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe 3712 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3712 wrote to memory of 1920 3712 msedge.exe 87 PID 3712 wrote to memory of 1920 3712 msedge.exe 87 PID 3712 wrote to memory of 2744 3712 msedge.exe 89 PID 3712 wrote to memory of 2744 3712 msedge.exe 89 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 4616 3712 msedge.exe 90 PID 3712 wrote to memory of 5596 3712 msedge.exe 91 PID 3712 wrote to memory of 5596 3712 msedge.exe 91 PID 3712 wrote to memory of 5596 3712 msedge.exe 91 PID 3712 wrote to memory of 5596 3712 msedge.exe 91 PID 3712 wrote to memory of 5596 3712 msedge.exe 91 PID 3712 wrote to memory of 5596 3712 msedge.exe 91 PID 3712 wrote to memory of 5596 3712 msedge.exe 91 PID 3712 wrote to memory of 5596 3712 msedge.exe 91 PID 3712 wrote to memory of 5596 3712 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_934c83041a7896d3b7d32a343847edc5.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2f4,0x7ffc7346f208,0x7ffc7346f214,0x7ffc7346f2202⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1756,i,4672707351017927441,15295657423708635627,262144 --variations-seed-version --mojo-platform-channel-handle=2180 /prefetch:32⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2152,i,4672707351017927441,15295657423708635627,262144 --variations-seed-version --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2516,i,4672707351017927441,15295657423708635627,262144 --variations-seed-version --mojo-platform-channel-handle=2340 /prefetch:82⤵PID:5596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3520,i,4672707351017927441,15295657423708635627,262144 --variations-seed-version --mojo-platform-channel-handle=3548 /prefetch:12⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3540,i,4672707351017927441,15295657423708635627,262144 --variations-seed-version --mojo-platform-channel-handle=3596 /prefetch:12⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=564,i,4672707351017927441,15295657423708635627,262144 --variations-seed-version --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5192,i,4672707351017927441,15295657423708635627,262144 --variations-seed-version --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5188,i,4672707351017927441,15295657423708635627,262144 --variations-seed-version --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5408,i,4672707351017927441,15295657423708635627,262144 --variations-seed-version --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5404,i,4672707351017927441,15295657423708635627,262144 --variations-seed-version --mojo-platform-channel-handle=5368 /prefetch:82⤵PID:5260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5512,i,4672707351017927441,15295657423708635627,262144 --variations-seed-version --mojo-platform-channel-handle=5544 /prefetch:82⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5900,i,4672707351017927441,15295657423708635627,262144 --variations-seed-version --mojo-platform-channel-handle=5912 /prefetch:82⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5908,i,4672707351017927441,15295657423708635627,262144 --variations-seed-version --mojo-platform-channel-handle=5984 /prefetch:82⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5908,i,4672707351017927441,15295657423708635627,262144 --variations-seed-version --mojo-platform-channel-handle=5984 /prefetch:82⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5032,i,4672707351017927441,15295657423708635627,262144 --variations-seed-version --mojo-platform-channel-handle=5052 /prefetch:82⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4792,i,4672707351017927441,15295657423708635627,262144 --variations-seed-version --mojo-platform-channel-handle=6608 /prefetch:82⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6372,i,4672707351017927441,15295657423708635627,262144 --variations-seed-version --mojo-platform-channel-handle=6024 /prefetch:82⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5796,i,4672707351017927441,15295657423708635627,262144 --variations-seed-version --mojo-platform-channel-handle=5828 /prefetch:82⤵PID:5420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5488,i,4672707351017927441,15295657423708635627,262144 --variations-seed-version --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:5432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5572,i,4672707351017927441,15295657423708635627,262144 --variations-seed-version --mojo-platform-channel-handle=6368 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5884,i,4672707351017927441,15295657423708635627,262144 --variations-seed-version --mojo-platform-channel-handle=6420 /prefetch:82⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:6008
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:3036
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:5840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
53B
MD522b68a088a69906d96dc6d47246880d2
SHA106491f3fd9c4903ac64980f8d655b79082545f82
SHA25694be212fe6bcf42d4b13fabd22da97d6a7ef8fdf28739989aba90a7cf181ac88
SHA5128c755fdc617fa3a196e048e222a2562622f43362b8ef60c047e540e997153a446a448e55e062b14ed4d0adce7230df643a1bd0b06a702dc1e6f78e2553aadfff
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD58625e8ce164e1039c0d19156210674ce
SHA19eb5ae97638791b0310807d725ac8815202737d2
SHA2562f65f9c3c54fe018e0b1f46e3c593d100a87758346d3b00a72cb93042daf60a2
SHA5123c52b8876982fe41d816f9dfb05cd888c551cf7efd266a448050c87c3fc52cc2172f53c83869b87d7643ce0188004c978570f35b0fcc1cb50c9fffea3dec76a6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
3KB
MD5056a79536b6d1e895ed65f2d44f0d2d3
SHA10265ad207ba46002beae94f9a9f927edb585ea03
SHA256f5ab34bf10cac41b3b73811836ce26380ceb579def4bbca9e85da99b1398f93f
SHA5124bd82e965619dd091ffa6488f9dd9ec1fe858ba917d9fcfaa885ad390a0d579b844fb07a957c1b4d26c71d958bb12a6211e4938e191c1ce77bb06afda54c6f39
-
Filesize
3KB
MD5ebd2d057fae7c6cde43916cce2f3b035
SHA1f91bb8f05e7bd69847eddf23b503348c1dee1e0a
SHA25652855d5baf4af56d0597356fd4e0ec32bc5cb21cbab6a088f52a6877e0f73e53
SHA5124bac932f9466f61968d32681b4771ca0ee112cdb183fe4aa059026374fd9171f357c16e64fcd7264f5c5ee455e61c044d52b339068cdb29a5e2edf21288282d5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
15KB
MD5aeb938e8c411396f04bea475a3d92c20
SHA159d2f94242f9d50b72e126b129059ddc36eabf55
SHA256299157d2c5a8377093d89e22eb14515bb2330c8ae83b7f1e46244b82a682ff3b
SHA512473dd2aa03808d816f4be68fc60d6105a94f01553f9efe308decb0871c76f3154b4b58003f506dfda12c68fee45d4ed843fe763f421690092ccb1101033c57dc
-
Filesize
16KB
MD5e79bac77adad91397ebaeeacd72e5917
SHA15960cb8c391c0ef099842230f46e1774c359f022
SHA256b1593f5033fe632b40a84e6df547b6dbc93079d37bf102510b19661b8f3534b9
SHA5121018ec90bd66b2d288cc8aef0c12aee50d478ecfc0eec917153d8428d3d80da476a2eb5626ca595fe85cc8bfa60c88d090ebd96c63fa76dc16fe5b3ddba5853c
-
Filesize
17KB
MD5ad712045dd0667e8959360b6a92e2cb1
SHA19cb0da431a77235919206ab4c49f3bf685d1c5e8
SHA2562790899d15c67d4751237e7ccc39494a3d2f2aa84ec12eec8ed63eb0a2cf2bff
SHA512ce48efa45bdf74c0bb74dfa12896897c49d7fdbd1086bf9b6335387c861ca11d85fb66c078458a337fdc82051156be9455ff78052d1734ea71a92ff5ade60b62
-
Filesize
17KB
MD5d23b73888951293286faa19aac89b87c
SHA170bf93a252306d027fe1727dd25622f9221900e3
SHA256cb685ca23f8a1d1210cac149ac67d786d1b4a1c1bcb2ab420ac3ee693b7c7841
SHA51241f98ccdc214d4a1557e8f4b7f20f576943ac818045ccaf8848c83804c8fdd9ad7157ee53fcc89e87d8d9632b7802657e55adf6f34842a20be5431b10c1d4b0b
-
Filesize
17KB
MD5cd5b31083630c06eb0f6d1124cd5cfe2
SHA1f4356030e837e907fcde64e2034482975f2720dc
SHA25661a536e1bd4efdd6d1c515a5bacfabd3d19ea4499cde000f8244150eb5a578c6
SHA51225146ea26e1da29382eafb349561aa885e606f348595a3500de801669cee8fcf3a9b5b37d520838bd461d45233ed39c5dda009cb80b87e86ec7fb408d12f5831
-
Filesize
36KB
MD5486507bf80553f11ad6456c7c79a38df
SHA1c6458b0a247536b70e20ee77cadccad7ecae9a01
SHA256b4b3185e1fe80138edc32b84a2cd3e3f121f8e662327ed018eb26806334c8289
SHA51209423abdc6480f1cf346e10d4401e8ad134253755567d1acd9a1caf1faf769c3ad5fb18b712db90986ee72626043ded2dc7597af5c1e11a23955f9edd9ef9b5e
-
Filesize
22KB
MD588d09300d33fd8c8c99951ce51a613f7
SHA1356fa88cfa7ab35ae3244db6097ec8d759abc375
SHA2562caeed6964f181089bef69a8eefede3899d1f32c964d2721747b48a5b97ff11f
SHA512f4cd6a7c973047b3f251087f211300c3bf4589647b8370f24274191573c0509bc8e8823e900a39a9892ae7c440ad1460d9fd9c7a9ea3c62481718a3014734d2e
-
Filesize
113KB
MD560beb7140ed66301648ef420cbaad02d
SHA17fac669b6758bb7b8e96e92a53569cf4360ab1aa
SHA25695276c09f44b28100c0a21c161766eda784a983f019fc471290b1381e7ed9985
SHA5126dfa4eca42aea86fba18bc4a3ab0eed87948ea1831e33d43426b3aca1816070ecb7fd024856ad571ca2734214a98cc55e413502b3deef2c4a101228a7377e9d5
-
Filesize
23KB
MD5b8fbaa272d8d10baac503e968c1bd2e5
SHA18fc1b7ca478d366eeacf3bccd85279145ead98a9
SHA25658dc360facc19e0232ee9ff40aa652b52eadd52d940612e3c82a7ea4d2adfd28
SHA51231cef87e1cdf459faf85d41ce9b9cb0d2a2c2ee774186f14ffe74850a092c86d69bc33f29e00b984f15e8fe74538d6b4a7966a33b5fc07f451c2851cf298dc23
-
Filesize
467B
MD580b32c849c71beea0ec98645e80449a1
SHA1fd19631cb50f450783525b3e4e06b3dc8c24aca0
SHA256d881a58001124c8845b42d24d3d63fa24611ae42c52488cd74a1eb7bcde854fb
SHA512597a6a2984278542272e7f216a30107c34b48ca6d70d5bb2d2f3b8403aac1076c1de48cad909999b31e73e0269605c0e0af1e37a2abae86ed83a1ae0a7ad48d8
-
Filesize
900B
MD54bee3209730959ac6674ea7e8218490b
SHA1ed9838db8c59b9ced38b484f513af5f71a449a9c
SHA256c1d739f84396e9f6752880c0fdac4f03d760801e1ef2d1300f21227dc7680b11
SHA5124dc45b4e6696c5721802533be4cad233d0ae767dccf835bed5aeae3e6b82033be48522a26b96b424db2499845c179830f8abc1e2bc9a8ce7522ab7db1e052b49
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
41KB
MD5a0e7673741ae3d0a4b01af0155055d26
SHA19ec41f8dfce78ee0e228cff12895cd9c1e94d63a
SHA256a86b84432b55ea74c7923e8fe3a48f898ad47ddb35fc4303fd90ca7326576dc7
SHA5121bc11a0722a2abdb556c8ca1482326969413b1dc1755eefd2ab32e47e2fda98db4d34f44f3e02f181fe9ca58920c6a613c3f3a904b320051a4c6048ba9ed46dd
-
Filesize
41KB
MD505112cd73f8dca4ed0239d6a5d32e9c8
SHA1f1c176753c0b0c54c90c60be8abb4ed05f979ede
SHA2567a17a0b4bac4763a6ea6677cd845e191251dc50fc5e9ae85872cb95af3eeff4b
SHA5127c1043b97238e4157d8224a21caee590bc240a45ff54ee40432e04c653f7682e25d8d1271ce31e4abc380b06897ffbb5fc3cfe4f95f982ada7f6dfc52ea17019
-
Filesize
41KB
MD544c8e83f29f7b5496c7bd93d20004c25
SHA1672237a6bd87d3f470a4c85167a4a41b26fbda5b
SHA2561bbc02fb0dacbf67ee292961e52d18029aceffe9b0b1485f289d894c38f3c9cb
SHA5125bd2d5dd02bb8030d887bb147b5d68b258d171aa890156ba2f64c9a100f77b84ccfcf91bc55edf3d22fb49a3c3ea0d2d4cdc7cb0bffb68acd35b7a7f90793b99
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5159f9f725444fdc1be1883bd8fd7a3f7
SHA18b6cf4e4a7de40c023044ed9ff1f5701e285aee3
SHA25636fe76c39fe327edb2a09d6370b46fe48d59fbc48ecaab3ec34bda0c9bfc9efe
SHA5125623ef68b76863c5a648d72eb331ad6bb1cd97a804bbc5e9456a806634e3bd6a589e62d92c98bbc1063455aea7ee9ef849b7e8993755341dd7c68d42f2e17466