Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 19:50
Behavioral task
behavioral1
Sample
JaffaCakes118_960c2efa1f032c528c561289a75122c6.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_960c2efa1f032c528c561289a75122c6.html
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_960c2efa1f032c528c561289a75122c6.html
-
Size
41KB
-
MD5
960c2efa1f032c528c561289a75122c6
-
SHA1
ebb59dca89b64f4167d6d20c1bd36176a7bfaaf1
-
SHA256
80d0b061239a4f048f95d72e4629110b73393c504c78f4a7f31e532ff9408e76
-
SHA512
61162362687317f84d4ae76d2acf8c51ba8c98ce5987ad6ccb475bcbbfbbf0975fd32c87b256fef0b11df34fbefe0092a5139a979ac936973976943531f1b290
-
SSDEEP
768:SPoc8ujMLsO9ypXGyrTf2F3ViWWfpFsNizI:SPoc8ujMLsbpXoFsRFZzI
Malware Config
Signatures
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_1431041068\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\tr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_2089778078\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_649054302\keys.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_649054302\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_1431041068\deny_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\en_US\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_1275233578\LICENSE msedge.exe File created C:\Program Files\msedge_url_fetcher_3192_1787242887\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\hi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\ru\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\nl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_1431041068\deny_etld1_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\es_419\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\bn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\fa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\ne\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\kn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\km\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\el\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\en\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\128.png msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\hr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\sr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\bg\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\eu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\ca\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\gl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_1275233578\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_649054302\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_1431041068\deny_full_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_1431041068\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\si\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\mn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\cy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3192_273388737\_locales\sl\messages.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133877874670899544" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3975168204-1612096350-4002976354-1000\{5447FD03-3994-4A9C-B55F-8E7D2ABE5256} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1232 msedge.exe 1232 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3192 wrote to memory of 5556 3192 msedge.exe 86 PID 3192 wrote to memory of 5556 3192 msedge.exe 86 PID 3192 wrote to memory of 4884 3192 msedge.exe 87 PID 3192 wrote to memory of 4884 3192 msedge.exe 87 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 2132 3192 msedge.exe 88 PID 3192 wrote to memory of 3228 3192 msedge.exe 89 PID 3192 wrote to memory of 3228 3192 msedge.exe 89 PID 3192 wrote to memory of 3228 3192 msedge.exe 89 PID 3192 wrote to memory of 3228 3192 msedge.exe 89 PID 3192 wrote to memory of 3228 3192 msedge.exe 89 PID 3192 wrote to memory of 3228 3192 msedge.exe 89 PID 3192 wrote to memory of 3228 3192 msedge.exe 89 PID 3192 wrote to memory of 3228 3192 msedge.exe 89 PID 3192 wrote to memory of 3228 3192 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_960c2efa1f032c528c561289a75122c6.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x24c,0x7fffcdddf208,0x7fffcdddf214,0x7fffcdddf2202⤵PID:5556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1912,i,8470316753590730081,6438859182830361532,262144 --variations-seed-version --mojo-platform-channel-handle=2128 /prefetch:32⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2016,i,8470316753590730081,6438859182830361532,262144 --variations-seed-version --mojo-platform-channel-handle=2004 /prefetch:22⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1780,i,8470316753590730081,6438859182830361532,262144 --variations-seed-version --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3504,i,8470316753590730081,6438859182830361532,262144 --variations-seed-version --mojo-platform-channel-handle=3564 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3496,i,8470316753590730081,6438859182830361532,262144 --variations-seed-version --mojo-platform-channel-handle=3584 /prefetch:12⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4268,i,8470316753590730081,6438859182830361532,262144 --variations-seed-version --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=5116,i,8470316753590730081,6438859182830361532,262144 --variations-seed-version --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5700,i,8470316753590730081,6438859182830361532,262144 --variations-seed-version --mojo-platform-channel-handle=5736 /prefetch:82⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5708,i,8470316753590730081,6438859182830361532,262144 --variations-seed-version --mojo-platform-channel-handle=5760 /prefetch:82⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6168,i,8470316753590730081,6438859182830361532,262144 --variations-seed-version --mojo-platform-channel-handle=6384 /prefetch:82⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6536,i,8470316753590730081,6438859182830361532,262144 --variations-seed-version --mojo-platform-channel-handle=6568 /prefetch:82⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6536,i,8470316753590730081,6438859182830361532,262144 --variations-seed-version --mojo-platform-channel-handle=6568 /prefetch:82⤵PID:2812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5620,i,8470316753590730081,6438859182830361532,262144 --variations-seed-version --mojo-platform-channel-handle=5628 /prefetch:82⤵PID:1292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5520,i,8470316753590730081,6438859182830361532,262144 --variations-seed-version --mojo-platform-channel-handle=6680 /prefetch:82⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5536,i,8470316753590730081,6438859182830361532,262144 --variations-seed-version --mojo-platform-channel-handle=4308 /prefetch:82⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6468,i,8470316753590730081,6438859182830361532,262144 --variations-seed-version --mojo-platform-channel-handle=6652 /prefetch:82⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6400,i,8470316753590730081,6438859182830361532,262144 --variations-seed-version --mojo-platform-channel-handle=5416 /prefetch:82⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5752,i,8470316753590730081,6438859182830361532,262144 --variations-seed-version --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5888,i,8470316753590730081,6438859182830361532,262144 --variations-seed-version --mojo-platform-channel-handle=7056 /prefetch:82⤵PID:5216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7060,i,8470316753590730081,6438859182830361532,262144 --variations-seed-version --mojo-platform-channel-handle=7140 /prefetch:82⤵PID:5924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7116,i,8470316753590730081,6438859182830361532,262144 --variations-seed-version --mojo-platform-channel-handle=6336 /prefetch:82⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5872,i,8470316753590730081,6438859182830361532,262144 --variations-seed-version --mojo-platform-channel-handle=7040 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5680,i,8470316753590730081,6438859182830361532,262144 --variations-seed-version --mojo-platform-channel-handle=3276 /prefetch:82⤵PID:5672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4340
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:4496
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD565044109d1beb8ed8d59560642cbc519
SHA10084485b0aa26069232fab51ee603682e8edfd17
SHA256a1e0b448218678b30356cbbe4092ea091435e7450822a9748361b6e8b198962d
SHA51296dcc68fe92f98c4329a8335cfffdb0849a52562431045ccc42076bda0abf3842491303fb669246bfd04e64113688d3f90000a09571dd76ff84b52e34e45f9b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\7e291f27-06e3-407d-93da-4efd98bf3ade.tmp
Filesize15KB
MD51f4400a774af699f272ef0402da8a3b2
SHA160a9a3d332abbd8647480545ba00ebedce8ef4f4
SHA25623e8e40f8c258e1a83829d280d9172481407ae8cbf5d8072572cb5af5ce229fc
SHA512bcd952b77dd26118d0416f8b20c829f1c37ae70f3dd497bdd8f3fa913cfd89988f6f6c96e49b631e8d5542164d80a8f03086373814416e3f6c1c60893bfda4eb
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD56e6736e6b24a5b20b43f13034059293a
SHA1ebe7a88867a2a682c38c2d4dc1fcc0914e5da534
SHA2560f916b7c2a3a8abb5654c93aa00e008276324385ba29361ac527a44601d325af
SHA5125360ed8fa44e0a61b83abe91e1c0c2835f1b6e947af77760621631470049e607ef033927f69227bff833fbc950be5de143438f0a127cca41cdad9f020ff3a810
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD59e0cacb2d83820770d126edee514f056
SHA1099dc66799ff19bcfb8c14dc5c13a7a231df6fd5
SHA25696000a7694631958ccb00af946a9817ad8ef1c5acc0f1a960af4c5eab9d7ccc6
SHA512bc3b7e96f94f5ab63b4ca18727fcd908eebd44af245edfe0a1a1c9099603a87442ce00655ef55ebeb7c9a05da6a8fb64327a6b6497f730fc5df373b86af3b858
-
Filesize
16KB
MD5897b90b8d26370d87e64a0705a56c4d1
SHA12740d0423038e03d77cf5fa1ebb64eb6f19c5e25
SHA256cad2d1816f1f89231b55da2b39e28390e91ccc2e3d56ff6efd252c515881f4e4
SHA512f37e946f5f6d8661d11f96c6e85431a1e96f9f0148ed009748967aef26c94f8eded76725e2ae2f52c695149f01d46f584348ad3089072bba72baf9a22919418e
-
Filesize
36KB
MD5182c409c263fdaabf7065d69acd68377
SHA12bb3c0dcf3f9272269b34cfb4e4d0480240a443d
SHA256af4f72a4ed41376e8c4b11c0a23f8f6c6eb5e85f16ff957e478db67cc7df8213
SHA51213c3fb6899c14f206df90870182d2b1940f8857d2125e22aa3f8f48cb4d6411fca09065aeac04acba66903f9f2b4f657b2095ab814810dd3d560c17bd4490313
-
Filesize
23KB
MD5239129bc0357ad0076f459477d8f9dfb
SHA1876a82b4be74a292cf867b7235f0dc9b5f1d9c21
SHA25666008771b12a8bb8baa9dac3d40db4ecb8e24bb478178b6bb341d717b086e6eb
SHA512aaae05cee189882eb339b7801ccb24579237c544959fdcd08f5f8675b5de79f041921f321613a0bc9becd979786735457d235f79fb0010e5458bd449cd325477
-
Filesize
467B
MD5e49e33de96582f5d89f35a28d0827d66
SHA12d4f85746d845a79aae9380f88e1093349e0054f
SHA2561b34eddcd1c67edbc735493274bd006c7b53dcf1ce2d114a4da6d0cf5f99c585
SHA5126b7a4d48e110521c21142ef9368ea656dce62c78a25155ddeeab096a75b0b800d9ef114375ba1d303b42314b970d596f8c18c839cd1a580fa3afb3debd9b2096
-
Filesize
23KB
MD516854a074ddf0cb1ed734c6cf161c61a
SHA158faa995dc956adab5d49b87920e5bab533cc58f
SHA2564ed8e5e5918c8abdd2ea3cff45e34acd2ae6f108e09e952903f05787403d2921
SHA512948d4ce7a66d639cdfe6dafbc988ab47e3f70c8d28461a8a6610289f9f7fabc8544dc42d8207d19401455f1397aaf871d37af83740db9f48e9cb365f08700f07
-
Filesize
900B
MD506a95b3a8ded8cf0fbf2d8f681ac827a
SHA140913e933cacdcdbf1ac8e29d2cd2fb99f3a27c7
SHA256df2dc46a91ec9a5f936b7637f3bd179e64e599cce5fbcfdc8ffcc284e3dece5b
SHA51216b9bc9de4a40dff719386582e1fca3d1d4aad0e7106ab31647ec4b98e970b4b450f8ad291b3a77d88a70bf3a19b7ac080f97e02bd4e11952f34ce7d07d50643
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
40KB
MD524afa3f09c58bb37f1e39fe56334361c
SHA15eac32f7840f3ce32aa89611573403914c1a957e
SHA2567440ccba82253633c57c48aab0a622cd45ed8f2a66add813d66cfd5cbc3f7e7e
SHA5123afa9925de9cfc69029ae35654c8ae5ef29b8914948de925c452b86b3c8a50c91e77776bd6a5d45d3a0b37238ad959ef972777aa2bc33b48341eef0182b3d908
-
Filesize
40KB
MD57e8b9a7a4a458674c6461f459ecf5c16
SHA1320923dce9e1acd2d76610e6a34d5fa29bf8e458
SHA256dbdcefe1f353e1e3727a94fb1022cd49cd942aca448f88957aa192e35962f147
SHA512e66b19cdc1e059e9d5f2e5096bbb83404accf8a71c574953ac8e0b4b1deffa5e99e0d89e1f87785cd419a72d5ef695527a9f9302a9680560e9d4faf5e047382f
-
Filesize
40KB
MD555c804f1d07b3e6e1cb4c0e3f538ddaa
SHA1bd83d9bd40f26150b2b47c10cb4a31765f7e405f
SHA2560b196580d5332cb3ecb4016249141e247d2c3cb8ff299a66db03161debb4986b
SHA5129c49e8bf8ccb249af708e504ab4a10d8d7523664ff9d4cb1325c5b863d7932971fd99e4c981daa679861b69aad276ca5771ba62c9bb54aad036d296e6bb16730
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD557543762be7c5233d91ab51cad352f0b
SHA1a353e58fe0343448a4dc01e464309f2e6ebe4c9d
SHA25644ccbaa2df4067562237408d9e5b909939f8cde3399e110b11758c831d2f8d4c
SHA512d646f7e5ede02c61379f60e3549c964502306d869ff7e972c8bfbfbcc1fb9c5217dcabd788579b07a037b86592a96819c959b74b0d051d6ea8f2384ded1ae727