Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 19:39
Behavioral task
behavioral1
Sample
JaffaCakes118_954bde82c004b956bf668392a0c1ab7a.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_954bde82c004b956bf668392a0c1ab7a.html
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_954bde82c004b956bf668392a0c1ab7a.html
-
Size
20KB
-
MD5
954bde82c004b956bf668392a0c1ab7a
-
SHA1
97e653bf3616a163a753798f46be3a971fbba06a
-
SHA256
29eeb18ee13c9209b52c79359fa89e8226d70021d6cf9a51e57acf4fda809b42
-
SHA512
f3c462dd92ed78495f62c3c23229afdcf4c3528aed9068a1f3c625064ebde925061f6eca5a89b78e737bb8c3457359ab0a51400d9716386e7db5268a8886bc69
-
SSDEEP
384:4tsmqKi0VuZZ9DXRU3YahV8f8lIIWTwObA0DVXdxn+R92ki0LuZS2oV:i5k02HmYahVUptt+00Eo
Malware Config
Signatures
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\fa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\hy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_1087587926\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_1087587926\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\am\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\lt\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_1376435206\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\es_419\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\eu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\ur\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\is\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_1376435206\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_223746852\deny_etld1_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_223746852\deny_full_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\gl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\page_embed_script.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\kk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\te\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\sr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\mn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_921191031\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\fil\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_921191031\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_1376435206\_metadata\verified_contents.json msedge.exe File created C:\Program Files\msedge_url_fetcher_2816_918601495\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\hi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_921191031\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_1376435206\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\km\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\offscreendocument_main.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\nl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\si\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\fr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\kn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\cy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_223746852\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_709927398\data.txt msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_709927398\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\mr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\ko\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\ne\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\ru\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2816_148333676\_locales\gu\messages.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133877840810048069" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3920955164-3782810283-1225622749-1000\{48C4D33B-204A-4C08-A50A-CBC8A8529AF0} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4744 msedge.exe 4744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe 2816 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2816 wrote to memory of 3620 2816 msedge.exe 88 PID 2816 wrote to memory of 3620 2816 msedge.exe 88 PID 2816 wrote to memory of 5244 2816 msedge.exe 89 PID 2816 wrote to memory of 5244 2816 msedge.exe 89 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 6008 2816 msedge.exe 90 PID 2816 wrote to memory of 516 2816 msedge.exe 91 PID 2816 wrote to memory of 516 2816 msedge.exe 91 PID 2816 wrote to memory of 516 2816 msedge.exe 91 PID 2816 wrote to memory of 516 2816 msedge.exe 91 PID 2816 wrote to memory of 516 2816 msedge.exe 91 PID 2816 wrote to memory of 516 2816 msedge.exe 91 PID 2816 wrote to memory of 516 2816 msedge.exe 91 PID 2816 wrote to memory of 516 2816 msedge.exe 91 PID 2816 wrote to memory of 516 2816 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_954bde82c004b956bf668392a0c1ab7a.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x264,0x7ffd4fb0f208,0x7ffd4fb0f214,0x7ffd4fb0f2202⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1768,i,5710980406973861070,1134516123857599567,262144 --variations-seed-version --mojo-platform-channel-handle=2264 /prefetch:32⤵PID:5244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2236,i,5710980406973861070,1134516123857599567,262144 --variations-seed-version --mojo-platform-channel-handle=2008 /prefetch:22⤵PID:6008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1400,i,5710980406973861070,1134516123857599567,262144 --variations-seed-version --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3536,i,5710980406973861070,1134516123857599567,262144 --variations-seed-version --mojo-platform-channel-handle=3604 /prefetch:12⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3544,i,5710980406973861070,1134516123857599567,262144 --variations-seed-version --mojo-platform-channel-handle=3608 /prefetch:12⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4864,i,5710980406973861070,1134516123857599567,262144 --variations-seed-version --mojo-platform-channel-handle=4888 /prefetch:82⤵PID:5836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4828,i,5710980406973861070,1134516123857599567,262144 --variations-seed-version --mojo-platform-channel-handle=3504 /prefetch:82⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5700,i,5710980406973861070,1134516123857599567,262144 --variations-seed-version --mojo-platform-channel-handle=5708 /prefetch:82⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5728,i,5710980406973861070,1134516123857599567,262144 --variations-seed-version --mojo-platform-channel-handle=5808 /prefetch:82⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5728,i,5710980406973861070,1134516123857599567,262144 --variations-seed-version --mojo-platform-channel-handle=5808 /prefetch:82⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5984,i,5710980406973861070,1134516123857599567,262144 --variations-seed-version --mojo-platform-channel-handle=6064 /prefetch:82⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6080,i,5710980406973861070,1134516123857599567,262144 --variations-seed-version --mojo-platform-channel-handle=6216 /prefetch:82⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5716,i,5710980406973861070,1134516123857599567,262144 --variations-seed-version --mojo-platform-channel-handle=5808 /prefetch:82⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5800,i,5710980406973861070,1134516123857599567,262144 --variations-seed-version --mojo-platform-channel-handle=4312 /prefetch:82⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5844,i,5710980406973861070,1134516123857599567,262144 --variations-seed-version --mojo-platform-channel-handle=6248 /prefetch:82⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5192,i,5710980406973861070,1134516123857599567,262144 --variations-seed-version --mojo-platform-channel-handle=5296 /prefetch:82⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5328,i,5710980406973861070,1134516123857599567,262144 --variations-seed-version --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5160,i,5710980406973861070,1134516123857599567,262144 --variations-seed-version --mojo-platform-channel-handle=6236 /prefetch:82⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5188,i,5710980406973861070,1134516123857599567,262144 --variations-seed-version --mojo-platform-channel-handle=3504 /prefetch:82⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5688,i,5710980406973861070,1134516123857599567,262144 --variations-seed-version --mojo-platform-channel-handle=4948 /prefetch:82⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5780,i,5710980406973861070,1134516123857599567,262144 --variations-seed-version --mojo-platform-channel-handle=6228 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6228,i,5710980406973861070,1134516123857599567,262144 --variations-seed-version --mojo-platform-channel-handle=5904 /prefetch:82⤵PID:5708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5892,i,5710980406973861070,1134516123857599567,262144 --variations-seed-version --mojo-platform-channel-handle=3428 /prefetch:82⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3028
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:988
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:3812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
118B
MD53e4993f878e658507d78f52011519527
SHA12fce50683531c5c985967a71f90d62ab141707df
SHA256a2fb35b03e24f5ba14cbe0e3c3d8cb43588e93f048878b066fd1d640ef8e59cb
SHA5129d24ef876ac989e50e9d4d06732a4c4f61e12df366b3d4e5ff93d6a60badac36c3e55e7f13c2539ecb525017490a887fc56580ef8e83483019041ad9b13358d5
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
40KB
MD5e8186b59ab4e046998333ccda7cd4ce5
SHA10c1bbba839a2dfe1593365a2ae7fbc92a696f31a
SHA256535d26f76966f7eb44426ee765c055da1f174d94e5dcafadd9745272ee697045
SHA5120447641cffcef55bcef1adfbd6955dfeb0e8fe2ba2514a736e99f45e1fbaa4c116aeddb0f7a519ea69d87b12e560f0ebbdbe00d8ddf84900ac20d993a4374aef
-
Filesize
280B
MD5c37f9d2c357647fca20f2eaa89c18edd
SHA1cfd1035ed2d057c317b48546f467209cbbe15f2e
SHA2562ea3a0b7e6145fd110653b1a77cb827ad7e4a145c29378344bd3d28f595b2072
SHA5123563f4aca9e47f35de8cb38e42a3c0448bb3ec4c9183fa392abc28fee4ca08bf16da028ffbf31cf0c0f8301ed810238961e745590e5c71621bc5a2a889dd12f7
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD5e5752988171810cf4e734014e7a1b66b
SHA173cdef4a45ad52ad86d239b54e2605bc0a9ddc76
SHA25647c96192a9937a33db62f1737e4111aea66936c85178d62e9bc37646f3d1151e
SHA512f077d460c505e054b20a2d0a7bf404f55716c5a0b79e70ebb6d483292996f3de8eee307e8c0606177ac9498ae046ff84e42f54041e490bc6a6d7d677c3eb99d4
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5e6bb6e4a1189655d68e360791f7f4ff7
SHA14468d7c9a3bb2558757e0e0f8f3ae44b3b0d0af0
SHA25671a2985dc64cc4af008bcf71e89bd2faa8095d7720db8864125e0b5f9a80f4fb
SHA512e090bb51bf4ee3716a6e90c101421fd03df5a9190759bb3b5752be4462305035438811c1108052b13b0f631ce7082868ea9d818e6436ba66abf8fd7eee722361
-
Filesize
16KB
MD53300043afdce36ca004c5c5bc58085a7
SHA12482f60fd5d83618dc5173b14cfa076256df8062
SHA2568e2af0267c1b2f1ac3d23b88f96ebb80344645e7cac40ea7acdb4a2e6c48f1f0
SHA5124f0f587eb9f3f3cd86c4db907192a65e018027b10e28b6b3986995704e22f9efcf2f1b1b50ccea03e9fa65e39b8d8f0996ea7d17fa4a08f69de964c94244e8cf
-
Filesize
36KB
MD5a58ffe09147fffe6e68fd13d698d0f5e
SHA125f2a032a15ef89b2b7a00de9289c75f516adbae
SHA256dbfdb04e69291012b0b11928aba790201a9fc8aeac2bf1d94e56bfb6c542073b
SHA5129ce8a9ebbbc5c17a8e5efc3cf3f5b6cc07647e8bb673322f51f7ad8467a40d7dc938ba7be49e89b93627fae83af743eca43d262daab9fb9984209eaebbca0961
-
Filesize
22KB
MD56c289aa124884c47482cb6e096bc3e4f
SHA12b73e9d331c5d66512a2a56c6f5eb9956f900e33
SHA25637eb565ceaef41688f0929bac979f5abf5e3162ca7339f6b4855e5ce4262c4ed
SHA51281c44646e2aa626b54f36f97a72b5319e741347460729c223e4ab5a7bf6708ccb51af88d89b9f2bd227ab5f6af23371261170e692105fb0cc38a51208f29f5d6
-
Filesize
900B
MD5dbb051d7579eeea819324f4749ebf864
SHA169f9d070f517793aa3abfdd90c6eb0e9aa172bbd
SHA2568ebf871b796df9e9eaa349804123e8aecee4ab533dc41a83bcac8b7168f26ca7
SHA512d00b418e56d4410582858209e67d19a67f5843523d8772dacf4be141d29c44e64022c6aa9c7ff484cdd9e6f19f27ca63bff480d966e21d37a8d56e0c3e2ead74
-
Filesize
23KB
MD55dfc90e6f062ab47bea4897026beea4b
SHA125b317f0bb09aec5ade31d66b2fc07b438737088
SHA2568827c6f9c9a6a724c1ba710488fa81a9880e9d45f010c8d8a01f2d64825ad5d5
SHA512df8ee973f3edcfb8f241cc9c7764713118253bbe9bd253e7cf0987083661b48ba8890bc5fb38c23c2573504bb343715e540c8b851909f34a2b0bb9e3c4f13c53
-
Filesize
467B
MD5be07878fbd2d783cf1e8250a4ebbe8ac
SHA15b7e77fc2d5dcb848d3d0b97db168c91dba40352
SHA2569ce6ff4e047bdc4adbf4439361cf31ceab3c071f0e14799b7ececbbdb65652d8
SHA51241c5d4886ef2ca216d422cfc84d1740df33ef2f56d387ed4e50ca397867e5ec72771895e2cab74bc57961570e3d851412901a8c5df38733cac3e76b1276c0996
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
49KB
MD5eeeb2d12cfac2b19790d403dae5e6112
SHA1c9f8e8f0185647bc688e0222c4702c94572a456b
SHA256ae628ab63ddaca4d9204847d6f3c4839c4171dbf8f9bdd2b1f84be87ff6ca973
SHA512ca53b2d6cec17ab7cea840f88805b441d44da2e250b58c470615267ece260d97c3ab28529ac3a6de56221fc5ea44b9af19279cc787288a6d58b7a368a88cf9e5
-
Filesize
40KB
MD5a9194d8bc2f29c26ec929f052710d9af
SHA15f6a7fb21da48c24663a8901fb84e08a574ee9ed
SHA256349dda0869fad1d2f8d66b02c60457dd68c380954aa128752e44360dd78cfdb0
SHA512daaa1d1cd3b6cd28edbf241c73218d222e750ed2e371a800c32c0349dfe69382af6919798c5fc177f61dc021439a428b691911f4ce76d13229da638f26a6b8d2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.3.28.1\typosquatting_list.pb
Filesize453KB
MD51a3cc1ff9dff2dda177fa2fcd355f5a0
SHA1f04580a23bb6ee17d1c96359f5339862be05daa3
SHA256b0eede47a5826b833a65e3d67ce3c1bb0bb5f540c0728f3aa01bcb3039137559
SHA5128781e1d8c6d0747551f8e4c28a37cd88044ed2cd508666252c156cc9f99cf5ccdfc20833ed3442bd9546158a553c97befaa600c29bab3b55d4b0bcea48ca0a99
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5ceb86b8e8375bf4571b5e3328f426482
SHA15f2aa2f9a151bba9ce50973ed8f86687ca4fd5f9
SHA2567543d022db608c5f93e12ef806eed04c9afe0b4e94f2dd72c87f1bb2c0a43475
SHA5127185fba8e947393f07e7761f46a2ed074a8199acde493488da7a781d681f2be0ebcf9105527579cce2bec847ef085ce8acb765d4336cf2a58b3aa359f97c03d6