Analysis
-
max time kernel
137s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 20:05
Behavioral task
behavioral1
Sample
JaffaCakes118_96f428afa667cd5869f1836bd4bd3978.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_96f428afa667cd5869f1836bd4bd3978.html
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_96f428afa667cd5869f1836bd4bd3978.html
-
Size
32KB
-
MD5
96f428afa667cd5869f1836bd4bd3978
-
SHA1
98bc85a9155d53a26c2c2a0e40899a383adca780
-
SHA256
a6a505e6f226307db4516fd4c9b2e1060968cff7e46a2f78516af3f75f2074e7
-
SHA512
bef7044a6a615bafa72b5112175acad4b7e810fccd277f567876af3c7434ececb7d0c998c0cf10c7a54f5bae6aeac9a7d53d4a81f7ca4123fee1c41706998b64
-
SSDEEP
384:S8gU2qOshhQnLQdacMa62QtoGfzO44iMzMa8SBe7exece6ZuER1bHy3qqYq0xb45:S67JhhQnEdvGGb1EG+OHdHF41V2RU
Malware Config
Signatures
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\bn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\lt\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\fr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\bg\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\zh_HK\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\nl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\kn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\en\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\th\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\en_US\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1089625339\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_177899232\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\gl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\be\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\no\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\te\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\lv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\ko\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\hi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\128.png msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_208810297\keys.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_208810297\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_177899232\deny_full_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\ka\messages.json msedge.exe File created C:\Program Files\msedge_url_fetcher_5116_477165376\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\si\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\pa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\service_worker_bin_prod.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\ca\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\fil\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\ur\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1089625339\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\el\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\cy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_1593511299\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_208810297\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping5116_177899232\deny_domains.list msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133877911572706056" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3975168204-1612096350-4002976354-1000\{CA946CBF-A22D-4E67-B943-5508F52A435E} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4396 msedge.exe 4396 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe 5116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5116 wrote to memory of 3016 5116 msedge.exe 86 PID 5116 wrote to memory of 3016 5116 msedge.exe 86 PID 5116 wrote to memory of 264 5116 msedge.exe 87 PID 5116 wrote to memory of 264 5116 msedge.exe 87 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5776 5116 msedge.exe 88 PID 5116 wrote to memory of 5304 5116 msedge.exe 89 PID 5116 wrote to memory of 5304 5116 msedge.exe 89 PID 5116 wrote to memory of 5304 5116 msedge.exe 89 PID 5116 wrote to memory of 5304 5116 msedge.exe 89 PID 5116 wrote to memory of 5304 5116 msedge.exe 89 PID 5116 wrote to memory of 5304 5116 msedge.exe 89 PID 5116 wrote to memory of 5304 5116 msedge.exe 89 PID 5116 wrote to memory of 5304 5116 msedge.exe 89 PID 5116 wrote to memory of 5304 5116 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_96f428afa667cd5869f1836bd4bd3978.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x268,0x7fffa3c9f208,0x7fffa3c9f214,0x7fffa3c9f2202⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1820,i,18228925436390325417,9757530961633471726,262144 --variations-seed-version --mojo-platform-channel-handle=2316 /prefetch:32⤵PID:264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2288,i,18228925436390325417,9757530961633471726,262144 --variations-seed-version --mojo-platform-channel-handle=2284 /prefetch:22⤵PID:5776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1412,i,18228925436390325417,9757530961633471726,262144 --variations-seed-version --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:5304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3468,i,18228925436390325417,9757530961633471726,262144 --variations-seed-version --mojo-platform-channel-handle=3496 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3472,i,18228925436390325417,9757530961633471726,262144 --variations-seed-version --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=3380,i,18228925436390325417,9757530961633471726,262144 --variations-seed-version --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=564,i,18228925436390325417,9757530961633471726,262144 --variations-seed-version --mojo-platform-channel-handle=5504 /prefetch:82⤵PID:5480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5448,i,18228925436390325417,9757530961633471726,262144 --variations-seed-version --mojo-platform-channel-handle=5548 /prefetch:82⤵PID:32
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5460,i,18228925436390325417,9757530961633471726,262144 --variations-seed-version --mojo-platform-channel-handle=5568 /prefetch:82⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5500,i,18228925436390325417,9757530961633471726,262144 --variations-seed-version --mojo-platform-channel-handle=5492 /prefetch:82⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3236,i,18228925436390325417,9757530961633471726,262144 --variations-seed-version --mojo-platform-channel-handle=5600 /prefetch:82⤵PID:5696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6060,i,18228925436390325417,9757530961633471726,262144 --variations-seed-version --mojo-platform-channel-handle=6208 /prefetch:82⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6060,i,18228925436390325417,9757530961633471726,262144 --variations-seed-version --mojo-platform-channel-handle=6208 /prefetch:82⤵PID:5412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5360,i,18228925436390325417,9757530961633471726,262144 --variations-seed-version --mojo-platform-channel-handle=3476 /prefetch:82⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4312,i,18228925436390325417,9757530961633471726,262144 --variations-seed-version --mojo-platform-channel-handle=6368 /prefetch:82⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5368,i,18228925436390325417,9757530961633471726,262144 --variations-seed-version --mojo-platform-channel-handle=4824 /prefetch:82⤵PID:6120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6476,i,18228925436390325417,9757530961633471726,262144 --variations-seed-version --mojo-platform-channel-handle=5244 /prefetch:82⤵PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6636,i,18228925436390325417,9757530961633471726,262144 --variations-seed-version --mojo-platform-channel-handle=6676 /prefetch:82⤵PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6804,i,18228925436390325417,9757530961633471726,262144 --variations-seed-version --mojo-platform-channel-handle=5588 /prefetch:82⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6128,i,18228925436390325417,9757530961633471726,262144 --variations-seed-version --mojo-platform-channel-handle=5332 /prefetch:82⤵PID:5336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5996,i,18228925436390325417,9757530961633471726,262144 --variations-seed-version --mojo-platform-channel-handle=5808 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6640,i,18228925436390325417,9757530961633471726,262144 --variations-seed-version --mojo-platform-channel-handle=3360 /prefetch:82⤵PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4672
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:5112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD565044109d1beb8ed8d59560642cbc519
SHA10084485b0aa26069232fab51ee603682e8edfd17
SHA256a1e0b448218678b30356cbbe4092ea091435e7450822a9748361b6e8b198962d
SHA51296dcc68fe92f98c4329a8335cfffdb0849a52562431045ccc42076bda0abf3842491303fb669246bfd04e64113688d3f90000a09571dd76ff84b52e34e45f9b6
-
Filesize
16KB
MD57d7725dedf0ecd321f4a7bb3f9ae3b17
SHA16f94912de3806462487554e04429ad4f46921b74
SHA2569bd75bde30424feb61a34d9ad8db64e9228336079729612a153b2a04ba69a050
SHA512ff3ae91b2d31dd613086be9b2f8f93186afc08fa45e417cfcb33eb1d62c23e4d4c9538377d6302a7a92f43db6271cd0e59c98372e2d45038be9d492fdcb3d872
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD508aad44d50845985ff233af1a2a38985
SHA1a8499210f13744664f3c918bb093287841ffadd9
SHA256c811b59300a5220c2b2c7062e66f72cbffc392979ab4f0dc0336ce719002c3de
SHA512c47ac0713ef75f3ab4c4a633b54c5cb52cc1e5ef50d94c39f5bcb9fcb69dbcf313918151357a05eae54bdf15925b650b964aadcf27d683c9404f640fa50966e1
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
15KB
MD5905bfc4c4bc40d438c52c596727f92ba
SHA190acbcc4a9c3c7645590fdcb74fd867515c76fcb
SHA256a18aeeaddb9afd42e4bd5e7e76fa8f2118613f73ed38903d35d6eef79cb5eb44
SHA51211ff0198a08f0e9655591174ffdda6becbd16878a08aefbd4406f43a430a318d4ecd5a9e25a4131ff209ceba8657550dc7b3a055f07e90582b46641584165249
-
Filesize
16KB
MD5284ca048e5217c244270ce51facbc003
SHA181282635a72d472a3b5ed667e283a8b9bd07a71b
SHA2565ce2cb2ee37a7f6f4ca95e4b0816a5200958abdb6449179badc633d2c6bf04c6
SHA51243b62cac44ef94bd07ed5ab643b768e8f74214cda77bb5152c5f3cab0ebb60cb2954a13610d12197070d0a5354c272a92840d4c3b0967f2392680efbb2c78b9b
-
Filesize
16KB
MD562f7f5dc60e16ec20200cff782ae07a8
SHA15c54709dfd664bbc7cc904e189740e096635e35d
SHA2561ca196ffe5122fbe820d785b261acdc151f184833ca2cc0ba48a402b27d72919
SHA5125a98e434c326a1cb17da87d90399457208ae31e9f6314ee06aad82fbb5e3cb3ea6bcca775c3c674ee030bd5f96d71cbacb8620bdaebd157c8e4e1ff4dfb85f4e
-
Filesize
36KB
MD5f011fa8141cd1e5b48fbac3cadf579e6
SHA1e51c2a3ba80141469d9612d24cf62235e0b551e2
SHA256db1c9a60ef79598c3b54cba2150fe528fe08540b62c531fd0a17b72b872390d1
SHA512edd8d299ade27800f3df3a209cd3cba04ae2bb4e503f5123a85185882612e746559d789c703a627cd11f4670d49b7b54003f6d87bce9a6a8b8f7b05d2d175672
-
Filesize
23KB
MD5896c7f045b30fad8eabb2c677426bf61
SHA1b905b69a1ed164efee215b862fb3852815037483
SHA25643b243c373baf59e4509365ceb8d35de1ade2f7f228eed3e049a5e701055d037
SHA51228b1c05483818c1ee6bf6a5663400604ccdb8613282a6eebd61148402740f7153271317ddb8bff0b7206c9c3514a4a6b65f5cb1eb50e3462f10083bd2a683357
-
Filesize
467B
MD56715c99a959770d75d6f7e9c4f31979d
SHA1fc3a437545581ca30c5fd3ec6df98898e6196719
SHA256c4761c56db50d8b5bd1aef6c055f9c27ef202cff979d5f141cbc9884a1207e70
SHA512a795c135a3407ee18d2ce19e62b80e31f8aac2acc6bd9cf3bdd2e7424b2202093b3cacfa1ca9a929fd7e23b627439581a0145958a9503631d850a4f90a922c67
-
Filesize
23KB
MD5784d96e9ea5a1b2f65442d45dfc05951
SHA12e332a7570b3020a0d99993ea5bf2e60a904d4f3
SHA25697b494ae1081388cfb74907fca94c74048c32f0293e12dabd75bf6b7295df47e
SHA5124ccb68ffbaa2e2248361d524a16edbe9a20d1447d5a35ba018a2e8d7596d4e548b0d1b90b1c6e4ef35017bc40420dc48bc73aaef4303d0674796ee7ef9b67475
-
Filesize
900B
MD5008aaa8b010b15ab04bcd193b3a117fd
SHA168f3361bd2c5cdef334b05399cb9b95b85138cef
SHA2563e90156cbea6b5a61d896f48dcba0d7e8c4329039bfd8334c9aa563763f7bf6a
SHA5124fd5ee40d63264c9d48de17e6ee17b3aa793a52e0e5b9e08528f846965183530b90b46299b629bf5aedd3997ea6f1b145c31a33451b245f0712d31e8d3473fd8
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
41KB
MD537bc301e2f1969108a7e7c5347ab8db5
SHA1363f113c50dc37d95415c9304e00d4eaa21b419a
SHA2565ab81512b94667d6d1d391cb8080e03cf524901d14ae47a8ef6cd2d866a311ae
SHA51243dabe036fa185256b072daf98ad8a0830d4812b56c1214fa1b5721cb67fe72a8eead68d4899921a71589887171a1d18f6f437096829f16e51eec75cafeb2bd3
-
Filesize
41KB
MD57f305086d8db94efe29fdb7b7362bbe1
SHA1fb108f85faa13084933654bac0b03ea88bcad0f4
SHA256997b5c62cc0fae00b711c19133a03a5e490bf2fc3be060a2748fbcafea1b0421
SHA512f1673610f07b580418c5d0681af344148c4b70bf4ac5b40627b0339ab033ee35129319d808d1ac08d80fbf24f3041450bcdb19f3c6f1d3ca2300934204dd4e78
-
Filesize
50KB
MD583dd2ce98fcaa60e622917a3d119bc38
SHA185fd3a9a6b38f51c109a594738a3d8d3b8d453fa
SHA2563d641be0844279c1fc36fb69127f548cb643c25c9d83d431761265925973e884
SHA51252e87b58903423cbe0785549876f3c98252303e6193d5d8560a9e203b01b28af79c854f19004fdefe500570bdae62879823aa8ce3d290231f87d3207f25c4a6d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD50c5fd93e1516061717acad649ca1eb84
SHA1a22dc98fb853469c8e1c078436870851fe48ea49
SHA2562f7133bc2d4ec799f0bd2c1b7d7c7ff80853938a4ce8137d0d78061227ccc1d4
SHA51227b546fd99949e8d5cbc0f431e2aeb622f7bda623a347ad9b3b74a4412a59dc0b7bda553efbe5400f043d918bfa7aa5f04958dc72233c539a1a89611bb267771