Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 20:00
Behavioral task
behavioral1
Sample
JaffaCakes118_96ba681e4bf504a87267429bd67f22fa.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_96ba681e4bf504a87267429bd67f22fa.html
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_96ba681e4bf504a87267429bd67f22fa.html
-
Size
17KB
-
MD5
96ba681e4bf504a87267429bd67f22fa
-
SHA1
f56ffb433327f81af563c6bc3d3311ad97b6f0ae
-
SHA256
4ba94e602c66939104c84c725dd7f47ae2a11f62dd53e61970ba618232483e92
-
SHA512
0e2eec53db3c3948af883b1a7916e72242c0c645a08415adf8ad509d7a18d2813f1173db9a4ffe2a53ec695c2fd6cf685f585ad3c6d729e67c891ed5e7b4f373
-
SSDEEP
192:SI519ax7TR+Z2yr31Qks7wh0etXtbQLQfQ1QNQdQpQTQGgnQhQN/UpOBh8mwXCqN:SI0ML1lYu0iXxsYuiymcIGyH57Dy25o
Malware Config
Signatures
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\te\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\am\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\fr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\is\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1149620641\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\lv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\pt_BR\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\en_US\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\ur\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_732957732\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\offscreendocument_main.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1149620641\sets.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_2090914489\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\ka\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\cy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1149620641\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_2090914489\keys.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\bn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_732957732\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\gl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\fil\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_732957732\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\kn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\service_worker_bin_prod.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\en\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\hr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\sr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\km\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\zh_HK\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\eu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\bg\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\tr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\si\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\be\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\hi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping6088_1434345937\_locales\ru\messages.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133877888656470398" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1062200478-553497403-3857448183-1000\{D42E751D-603A-448D-A0DF-CEEFAFD118D2} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4200 msedge.exe 4200 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe 6088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 6088 wrote to memory of 5548 6088 msedge.exe 86 PID 6088 wrote to memory of 5548 6088 msedge.exe 86 PID 6088 wrote to memory of 5916 6088 msedge.exe 87 PID 6088 wrote to memory of 5916 6088 msedge.exe 87 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3540 6088 msedge.exe 88 PID 6088 wrote to memory of 3988 6088 msedge.exe 89 PID 6088 wrote to memory of 3988 6088 msedge.exe 89 PID 6088 wrote to memory of 3988 6088 msedge.exe 89 PID 6088 wrote to memory of 3988 6088 msedge.exe 89 PID 6088 wrote to memory of 3988 6088 msedge.exe 89 PID 6088 wrote to memory of 3988 6088 msedge.exe 89 PID 6088 wrote to memory of 3988 6088 msedge.exe 89 PID 6088 wrote to memory of 3988 6088 msedge.exe 89 PID 6088 wrote to memory of 3988 6088 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_96ba681e4bf504a87267429bd67f22fa.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:6088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x280,0x7ffc1b75f208,0x7ffc1b75f214,0x7ffc1b75f2202⤵PID:5548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1828,i,14084754395542461804,145106602905963049,262144 --variations-seed-version --mojo-platform-channel-handle=2276 /prefetch:32⤵PID:5916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2240,i,14084754395542461804,145106602905963049,262144 --variations-seed-version --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2600,i,14084754395542461804,145106602905963049,262144 --variations-seed-version --mojo-platform-channel-handle=2596 /prefetch:82⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3512,i,14084754395542461804,145106602905963049,262144 --variations-seed-version --mojo-platform-channel-handle=3572 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3532,i,14084754395542461804,145106602905963049,262144 --variations-seed-version --mojo-platform-channel-handle=3600 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=5008,i,14084754395542461804,145106602905963049,262144 --variations-seed-version --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4836,i,14084754395542461804,145106602905963049,262144 --variations-seed-version --mojo-platform-channel-handle=5228 /prefetch:82⤵PID:3776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4848,i,14084754395542461804,145106602905963049,262144 --variations-seed-version --mojo-platform-channel-handle=5232 /prefetch:82⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5840,i,14084754395542461804,145106602905963049,262144 --variations-seed-version --mojo-platform-channel-handle=5848 /prefetch:82⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6016,i,14084754395542461804,145106602905963049,262144 --variations-seed-version --mojo-platform-channel-handle=6044 /prefetch:82⤵PID:5460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6016,i,14084754395542461804,145106602905963049,262144 --variations-seed-version --mojo-platform-channel-handle=6044 /prefetch:82⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6204,i,14084754395542461804,145106602905963049,262144 --variations-seed-version --mojo-platform-channel-handle=6228 /prefetch:82⤵PID:5520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6240,i,14084754395542461804,145106602905963049,262144 --variations-seed-version --mojo-platform-channel-handle=6188 /prefetch:82⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6316,i,14084754395542461804,145106602905963049,262144 --variations-seed-version --mojo-platform-channel-handle=6072 /prefetch:82⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6216,i,14084754395542461804,145106602905963049,262144 --variations-seed-version --mojo-platform-channel-handle=6048 /prefetch:82⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6408,i,14084754395542461804,145106602905963049,262144 --variations-seed-version --mojo-platform-channel-handle=5924 /prefetch:82⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5688,i,14084754395542461804,145106602905963049,262144 --variations-seed-version --mojo-platform-channel-handle=5240 /prefetch:82⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6312,i,14084754395542461804,145106602905963049,262144 --variations-seed-version --mojo-platform-channel-handle=6336 /prefetch:82⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6508,i,14084754395542461804,145106602905963049,262144 --variations-seed-version --mojo-platform-channel-handle=5380 /prefetch:82⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5860,i,14084754395542461804,145106602905963049,262144 --variations-seed-version --mojo-platform-channel-handle=6384 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5916,i,14084754395542461804,145106602905963049,262144 --variations-seed-version --mojo-platform-channel-handle=6360 /prefetch:82⤵PID:5972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4796
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:5224
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:1672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD5690f9d619434781cadb75580a074a84d
SHA19c952a5597941ab800cae7262842ab6ac0b82ab1
SHA256fc2e4954dbe6b72d5b09e1dc6360ea699437a2551355c2950da0b3d3a4779fc1
SHA512d6b1da8e7febf926e8b6c316164efbbac22c7c3d9e4933a19fffba3d1667e1993cdeb5064aa53816c0c53f9d2c53e204772de987eb18adbb094a0fb84ae61fa9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD592684bd93ddc156529b48d85facceed5
SHA1d2f5cd5cdca4c815562b92fb10871f70a5de623d
SHA256a801182f82389b62edf23455417796c297d2157f560754a71651f994e6dd2e92
SHA51258300b89469fcac2beebf57dd599421a3916f352434daa66d19134a3bd5318c6d04248fd295089526ee6286ae2088e738996608f136e3bc964a8d0239be6ea87
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\c9ad22e1-6e0b-4ca7-8a38-feb7a6690d85.tmp
Filesize40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5f67e21f19d58e4f9f954c51971a78f43
SHA101886c2bb4405d5e64f4e52dbba41b7b74034d1c
SHA2562e7d9e926d56851978468fd14ebd542f4e3fa72936d9902abfb8f1bd175378d0
SHA512e7c4918eef88af2fe430494cb3ec92bde9bb365552441a76237e29340650f8679d4d7ab4bf7b6eb76656fd98ea0084da401a70465fa66c01ca136f14a4d6819a
-
Filesize
16KB
MD528f7aebfd57325e9b1bb6b9a6c59f88e
SHA1a54a08d5026d9c531d87f5eda07637352e7c1e98
SHA256f63bf7f949e1e2f746bc58c19edfd437428ba1fc9f30b86db5d284dd4a7cd6e6
SHA5120120238d5cc9133e172b7cc1b033a2b35d2b3eb3d0aa7d70ef7fd7c9c5010231e7de16ade406fec99262a314e0295cf793ccd516d15e138a2611379b061c5434
-
Filesize
36KB
MD5f69822fc5a251bae7e7e41c23853268f
SHA113e2b42142c15db659f76195a0b4e213d8d05247
SHA256e46a77e3e909f5781d2080743c827f875729f4eb4647d0755bc942988972ff9e
SHA512c131296f24c229a8307ce296116134c238ff259270c5fd3dc4a71e885ad1d1a84a67ddb39fff94f9d6d0d255cc9fcc8a55bfc092f1949694cad86cd3970489b2
-
Filesize
22KB
MD58ca322c0d841f8d4a47a8219a9b37609
SHA1d304862280e1c17290ddc2520b4ecd894200ea54
SHA256c2c9d598370b64f91c782dbc380ef80c55fa9f61d2657a7eddfe154c7e9378cd
SHA5128229d39dd0b3c68638e6ab8b5ae9f098fc22c771d32d615041cdabdb4f408ff592698fc6d5155d874adbeb2737fb99c9af2212b78ad7b491ce3cc531d11d9fbd
-
Filesize
467B
MD54a3dba9d80e771d95de084f3cb48f1c2
SHA10bf657a9986cbbd97a7158b3ec43542159a2e975
SHA25688db842988adc9f62b25c25ca5a93cdec3059b33621c0abf6a1f6ef462e64eb1
SHA51279bd74f0747b7bdb1f17d7a8e338d387def513152fde7092a59641b2056d259193c63e0e993e4191c5e8138d2550310a006cf6574c81dcdcd6978e660b227b1a
-
Filesize
900B
MD57efcda15272146091efbb6f2c2e72ad4
SHA1e522147b11152ef2f83931f2d0ddd6d190af8083
SHA25611f87ef3c798a89a58c6b1f62ed5b98198c9970fdfb4717311f7e74d8a4515d4
SHA51221c1048cba37c63c743e258317b03cb40af6801679a5e1815378956f13c2f977404d3091a3881128552781876894a1c7dc61468f243418a247e461d247da936c
-
Filesize
23KB
MD5eb8409d4f7f5cd55efbed19a7ba8d879
SHA159a2b6d428f6b8f02d9c07760b7f87dc4af47ed5
SHA256e3bf41371d3e2f8850f49dfc455eb616e2afbb59ed88f55b84bf1e3ff5c71f5c
SHA5126e6d510c3bcb877296576e159cfe353bf09e6d7afc7a1f988cd094c3bee8a16ee39d27738d376264311e4cbb22d2f19ab3b7c4775fdfac12ad01703a9ee89501
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
40KB
MD59fc151271ce1d6b340622feff05f637a
SHA17c239bb6d01ff73ca99babc981838bd3a383c69d
SHA2569a60c28a93d88da85626a4acf0250510c05b5b8eec6b3a404ef12fe3c8a453fb
SHA5120b756a32448a74bb67199c8f3ef4b78b1bd5e0f8fdb968e0739058d161f0d7dc137bb7a2f682b953ad23ca4466f6f7dafd5a71086d5442e42adfb4f8b0c12cbc
-
Filesize
40KB
MD59a42235729d17a1c02592313303a337f
SHA15d5cd9d994fadc88d04ca372cbabcab4519a1175
SHA2560d86b7703f3012d241d988e53adc0b37e98aec741ce1b91b7ebcba937ac5f860
SHA512b98002d85e04dfcf3405532d4eee0373a8e83b240a0206e6e0ca4892876f233ff1bdafb63aaf7d9d82e37159c63e93d3435629c96a4de2b71d8e03b258efb8f9
-
Filesize
49KB
MD5ca65a1beb5b502ba63cfae0135736f36
SHA17fd923c6ccfffd5c91ff2ca989702470225779bd
SHA25634f91f95ade046b7a49989eac9e0524af0fa3d7a4b9e67a58d6423d19b25a6eb
SHA512c9fdf05c2ee0eca283afee92994b6163c50eaefa21572a08c27c4eda5b704fc74d523ec0c428c64a7277a8975859cc8eaeb1a4e948f53b96551a3e2763233975
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD539290663cc0a63c0c3af34587f27cf9f
SHA10081ec750315fb2c8101d3b797f5f607ae554410
SHA25653a6a1495b0f58aa3278e94f81945ae389f2e132d990d2a5cd5150ba3a150cea
SHA512f38f90132fd62823ec12215e1b64ef4f6a684f5efa77bb53ac92abd9fe52f904758bc8095442c355e5db23f9a0602c445f87a1cb88b791f65713425907d9ab15