Analysis
-
max time kernel
146s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 19:52
Behavioral task
behavioral1
Sample
JaffaCakes118_962dcee45cbd8588c9d36078ded1584e.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_962dcee45cbd8588c9d36078ded1584e.html
Resource
win10v2004-20250313-en
General
-
Target
JaffaCakes118_962dcee45cbd8588c9d36078ded1584e.html
-
Size
41KB
-
MD5
962dcee45cbd8588c9d36078ded1584e
-
SHA1
443e7a54cb831d3461d17f0a4f540d12494bbeed
-
SHA256
33e986551035fc698e0133dae4bfbb9ceb12cb921376513e45bd9213014d1fa7
-
SHA512
74a0d3837773f56ad854d7e71af2a16ec347f7399797b2f63aecf3f1c0f02dcf5550e31fdfcdbdff737fcd3bfb4b804c057ab4d4daedd37bf49b7458b5f202f7
-
SSDEEP
768:ZpWQwAyBQ4ya3h4ZQynR+svHdH+wWN50lbzKmIGwZ36QuSSHQO6vYWw+BtyOLDek:TdwAxZ//ZhcZqQuSSneJtyU5
Malware Config
Signatures
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\tr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\en_US\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\cy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\km\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\ne\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_2143649407\keys.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_2143649407\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\ka\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_683218777\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_720966692\deny_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\service_worker_bin_prod.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\no\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\ca\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\fr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_720966692\deny_etld1_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_720966692\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\offscreendocument_main.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\bn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\th\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\128.png msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_950287846\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\page_embed_script.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\zh_HK\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\si\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_2143649407\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\te\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\sr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\kk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\ko\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\kn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_683218777\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_2143649407\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\bg\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\gl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\el\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\sv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\mr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\pa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\en\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\hy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\pt_BR\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5788_1723929093\_locales\hi\messages.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133877869953676461" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1279544337-3716153908-718418795-1000\{96A298EA-6FCF-48DB-97A3-09EC9D9C3EFD} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5220 msedge.exe 5220 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe 5788 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5788 wrote to memory of 5060 5788 msedge.exe 85 PID 5788 wrote to memory of 5060 5788 msedge.exe 85 PID 5788 wrote to memory of 3532 5788 msedge.exe 86 PID 5788 wrote to memory of 3532 5788 msedge.exe 86 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 1336 5788 msedge.exe 88 PID 5788 wrote to memory of 1336 5788 msedge.exe 88 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 5800 5788 msedge.exe 87 PID 5788 wrote to memory of 1336 5788 msedge.exe 88 PID 5788 wrote to memory of 1336 5788 msedge.exe 88 PID 5788 wrote to memory of 1336 5788 msedge.exe 88 PID 5788 wrote to memory of 1336 5788 msedge.exe 88 PID 5788 wrote to memory of 1336 5788 msedge.exe 88 PID 5788 wrote to memory of 1336 5788 msedge.exe 88 PID 5788 wrote to memory of 1336 5788 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_962dcee45cbd8588c9d36078ded1584e.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5788 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x24c,0x7ffaf37cf208,0x7ffaf37cf214,0x7ffaf37cf2202⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1908,i,1835726253469921740,11422021307418889693,262144 --variations-seed-version --mojo-platform-channel-handle=2760 /prefetch:32⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2716,i,1835726253469921740,11422021307418889693,262144 --variations-seed-version --mojo-platform-channel-handle=2636 /prefetch:22⤵PID:5800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2240,i,1835726253469921740,11422021307418889693,262144 --variations-seed-version --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3488,i,1835726253469921740,11422021307418889693,262144 --variations-seed-version --mojo-platform-channel-handle=3528 /prefetch:12⤵PID:5432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3424,i,1835726253469921740,11422021307418889693,262144 --variations-seed-version --mojo-platform-channel-handle=3532 /prefetch:12⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=564,i,1835726253469921740,11422021307418889693,262144 --variations-seed-version --mojo-platform-channel-handle=5204 /prefetch:82⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5208,i,1835726253469921740,11422021307418889693,262144 --variations-seed-version --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5236,i,1835726253469921740,11422021307418889693,262144 --variations-seed-version --mojo-platform-channel-handle=5300 /prefetch:82⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5272,i,1835726253469921740,11422021307418889693,262144 --variations-seed-version --mojo-platform-channel-handle=2068 /prefetch:82⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5344,i,1835726253469921740,11422021307418889693,262144 --variations-seed-version --mojo-platform-channel-handle=2440 /prefetch:82⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5740,i,1835726253469921740,11422021307418889693,262144 --variations-seed-version --mojo-platform-channel-handle=5572 /prefetch:82⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5252,i,1835726253469921740,11422021307418889693,262144 --variations-seed-version --mojo-platform-channel-handle=5880 /prefetch:82⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5252,i,1835726253469921740,11422021307418889693,262144 --variations-seed-version --mojo-platform-channel-handle=5880 /prefetch:82⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5052,i,1835726253469921740,11422021307418889693,262144 --variations-seed-version --mojo-platform-channel-handle=5048 /prefetch:82⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4756,i,1835726253469921740,11422021307418889693,262144 --variations-seed-version --mojo-platform-channel-handle=6272 /prefetch:82⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5680,i,1835726253469921740,11422021307418889693,262144 --variations-seed-version --mojo-platform-channel-handle=5904 /prefetch:82⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5872,i,1835726253469921740,11422021307418889693,262144 --variations-seed-version --mojo-platform-channel-handle=5088 /prefetch:82⤵PID:5544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=2084,i,1835726253469921740,11422021307418889693,262144 --variations-seed-version --mojo-platform-channel-handle=5384 /prefetch:82⤵PID:5380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5768,i,1835726253469921740,11422021307418889693,262144 --variations-seed-version --mojo-platform-channel-handle=1228 /prefetch:82⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2608,i,1835726253469921740,11422021307418889693,262144 --variations-seed-version --mojo-platform-channel-handle=760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5732,i,1835726253469921740,11422021307418889693,262144 --variations-seed-version --mojo-platform-channel-handle=2392 /prefetch:82⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5988
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:4196
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:1008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD5998db8a9f40f71e2f3d9e19aac4db4a9
SHA1dade0e68faef54a59d68ae8cb3b8314b6947b6d7
SHA2561b28744565eb600485d9800703f2fb635ecf4187036c12d47f86bbd1e078e06b
SHA5120e66fd26a11507f78fb1b173fd50555dbd95b0d330e095cdd93206757c6af2780ece914a11a23cd4c840636a59470f44c6db35fa392303fb583806264e652016
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD5ac7dde10bffb6450f1742d49f22600a0
SHA1fd5c79fc17c08949b1ed458fe4511a8bd8ea2939
SHA256a8be40e63405c9a76e9d28fcf094ec0a9ca98104e5645f8f997040abb34a0f25
SHA51262724c9a601eed51e3f2284f3117f5d12044ddd1d8db70f233bebee1957cc68b268cf52573615819d72a57b2bc19440d0eedc2ba189dc96fe2505b0fd5f6ef4a
-
Filesize
1KB
MD58d96df2487005b104350267e7a99768a
SHA1933904548b2f33e75010296fc35d73326a7bfc9e
SHA25626f5a9a66075f8c90941e0583bd969424b153dd0d50fcbab0424e233f0254148
SHA51233f42749fa95db8a53442834e985b12a3a8dac5b0c41401633e717529ec9d3164f93a5d67e32047f85614390aa87ad536172c1fe5121f353f7eeb2966d640e05
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5f0e5851a6e53d476d55e6d4b0b7a0d8f
SHA12198b1571b964ec2f994605c74ca7ae47dfc6ce6
SHA256f395d49d853d83f9eaff9405eb6640c4cd4de466956d6f51b0c5e1c9f68298d0
SHA512b4b97fa30b907236e7b06f1d46371bf9181c1abbc9bd59110c41413ab714499ae411f69ad23efe6bda13b78e9606ce2a35d312abd6611c4a6144422addad4593
-
Filesize
15KB
MD5ac8315eca23f71b51396f7c1bed76ec0
SHA1ff84836dd1e5a9dca270c7452adc19d86eb8f8d7
SHA2569071ad260e2b668b43713b202d2584acf1008241ddb741e105f8b0ade6d76b36
SHA5122ff20475f765462727e194f89ca605fdb990ec363e1463ca1823281141ddcc12ce0627044e51a62e1b76bc396dd020b8d26dde049b218f3e9bb1bb78c19e084d
-
Filesize
15KB
MD5f56c1929723f0a34c634363f671f04f0
SHA10bbb07de55cb2e272675c2bfe99cfbcd9bdcb381
SHA256baa668b789b0c90bcb9dadc001d93ad89da92b54edca18ff441ad4077f4f005a
SHA512da1cf90b089d1f7f38ec9cf2cb1ecfc895a2af1b706b8e1e1820b72523592286b3589019859b45c74828c1ecc292ec33f42ceef512c0f331bb9a817fa074cfec
-
Filesize
16KB
MD57478f67290f6159f526636353efb584f
SHA174a4bb5a6e590591fd7a17fe247cf191eb4853bd
SHA256a64361be777cbefb44cc8f66c1fb25d1b7896892a53968e6a1e07f004ba8d597
SHA512107309c75133d59f0fcef2f7b90b97945442334496dca6b02320d8e95c1d55fe58258a59a49db063287abce77a2900e34e80cc915709858b0fbba079d9966d1e
-
Filesize
36KB
MD5f51c4987835cf29eba9cfa2de7d36dd3
SHA100fc604a58ffb62768236bf86aff36136e03ece6
SHA25655452b155d1d29a87c1be222c5cbd795ddec0575c537f0e8f12377d3bf2c5248
SHA512e3571f1bb8c66229571615efd83f2fb46b15dc68150776cc5f476ef522bccab295bbe441b3fc6ae9bc6cede9258829c0b8c6c3a640c03f5f90d1652c9bccaea9
-
Filesize
22KB
MD5fa8ef0919697704f44df3b99185afe2b
SHA14cf94f8eecb56c533301d3a014aec1469c8e29b2
SHA2564214962ee4ee5cc4c580f2082836f968217ad6c305168d1dac19825f071e3d8b
SHA5124cd56fa5b018ea07f0898bdb29c5491b90cd9e7c0bcd992594f38e08ae9eebabebb4c0176175815571fe9f115f7e1b1ae5573ddb5de16a8f0145b42170fe71e0
-
Filesize
467B
MD5116507d2d77ed731893843be9e445c7a
SHA1fa50a94506885d09108547f23d2bab11b5e9963e
SHA256a778fef4586e348173e687c91e84f34868a4f622cfa840941551010a00b5c61f
SHA512ed934dc3bcc9145e43e5b2edf0d4dbb46ccc1dda7fa6c8fb4792362440e6299e488e16d684845833c05f3a75f745aaae5bf2a759506168449a0eab4c7c304cb7
-
Filesize
23KB
MD5cf58bf1c61609ed795df003a0b6b3635
SHA1388a93f74347a65493b345586a7e2dacbd89619a
SHA256ba81d8e3b5229323ed8324a4a5ad8bfa762c0bdeaf0944a55fe965d59a948dcb
SHA5122b6d98d389ed83ff12d1f3b7c332ee596e1cb95b3760c4d3c7af0f6bc58874dbba400889d1b9752c47fbe0a2330b5ae18103b7170115578942842e6efaf22b29
-
Filesize
900B
MD586c1f9f93805692245abd221ad43acf4
SHA1d23c2cf23337b1255072e882afad4fd3eba64983
SHA2563914b541aeb0ee753f83dfa72d49f2670afb7e08ecbc093754d1f2058d3f4157
SHA512e9661bcb48693410225c0ef547456794c6b7536cf02e7e5a69422eb20b11a9907dc112ca6aaf6308d2b2f7da16ff5cb4ba16de21396be9548be9c902dd793644
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
40KB
MD5a4f0835dc7b74f0dc8eeea4356e8a004
SHA1fb2c12fc9f51b7830ee7d19fde524ed2f397f1a5
SHA256024ce9625d0c42013552193084078b97a47024803cc4f3c5059a9c6be769f557
SHA5121fd873339d2ef334b481ab59e98684879fe3bea110d6bc9aab1c8f172642c72c3a2879cd6c44b1cf100e58584c83de7636bd7edfa7c92f56f488ff349296daf9
-
Filesize
50KB
MD53b6d1b52225c15f57bab8760b846312b
SHA17a1b8f5e359969b223344fefd3913bb572b9931c
SHA256d7ead546d8a05b7cbf96184f3a69467b6c31d9924b1b41108a988d97f90c2117
SHA51210db4dc5edd3c48b67991244cb102f51b9bdd0670498f5334fa568438db89b41f8c494455b112247f387ed0fa7cf96484d064e2d848fa5116ab576e10b9654de
-
Filesize
40KB
MD5dfeef96b28e67d61b74aaabe474c7bab
SHA1a7aa923fc81f582ea9cbcfdbe67a1bf8db0052cf
SHA256d6dad5dbca0535e275e7eda98076a899db9c306f3efb0dc040819217cc4afece
SHA5127811fc3a67ae284072a5b6c40078fec4d01db3d67626cab69104ced989c39f93f8fdac66df8f9cdb353421b54964adc8014cd2f35012acdd7a9563225a3565c8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD531b2db520ba26a23d178a87105c6c89d
SHA128f4a0d705b5780f59c7350247cd4e1c6afec894
SHA2562f914cce67d3aeab27835f8abad51d60a957fffe1645fb8ab4b31eb1e34a8f18
SHA51242e3cc93f492e441447e2358d19203872c313db7d0c5b9f6f051a8b565d9e7c3465687cb7014a243e5c443f68cdf8e6a6626acbb729ffab365f7490db88f12b0