Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 20:12
Behavioral task
behavioral1
Sample
JaffaCakes118_974ead5e90164bb5721f86ed699fe9ae.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_974ead5e90164bb5721f86ed699fe9ae.html
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_974ead5e90164bb5721f86ed699fe9ae.html
-
Size
52KB
-
MD5
974ead5e90164bb5721f86ed699fe9ae
-
SHA1
c2e9fd9c5e61de80062a2d38e84850fcd65e0930
-
SHA256
3252a6545fde9622576cb8af8b318b1a444c518455474730e34bd4947d70e146
-
SHA512
ffb714dd42d89fec78cb650f20ecd8de1999540889b1c64f9120fab77ce290c7cc0e52d44a3259c12249153f776d7700bcae069d25c9737fb1a1f423c7ee7e7d
-
SSDEEP
1536:S+05wPj80D0F0K0H0n0w0l0H0f0Q0W0cC56rVATD4e:D9C56OTD4e
Malware Config
Signatures
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1015637297\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1015637297\sets.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\bn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\kk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\fil\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\gl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\lt\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\si\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\ko\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\hi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\en\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\pa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\128.png msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1932734693\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1932734693\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1465631268\deny_etld1_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\pt_BR\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1015637297\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1015637297\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1813777901\keys.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1465631268\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\mr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\am\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\be\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\hr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\no\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1015637297\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1813777901\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\page_embed_script.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\zh_HK\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\ru\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\hy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\fr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\is\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1813777901\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2044_1316473504\_locales\mn\messages.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133877925263281342" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3342763580-2723508992-2885672917-1000\{041139A6-AD10-40DF-B700-B5319300278D} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe 2044 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2044 wrote to memory of 3024 2044 msedge.exe 86 PID 2044 wrote to memory of 3024 2044 msedge.exe 86 PID 2044 wrote to memory of 1604 2044 msedge.exe 87 PID 2044 wrote to memory of 1604 2044 msedge.exe 87 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 2176 2044 msedge.exe 88 PID 2044 wrote to memory of 224 2044 msedge.exe 89 PID 2044 wrote to memory of 224 2044 msedge.exe 89 PID 2044 wrote to memory of 224 2044 msedge.exe 89 PID 2044 wrote to memory of 224 2044 msedge.exe 89 PID 2044 wrote to memory of 224 2044 msedge.exe 89 PID 2044 wrote to memory of 224 2044 msedge.exe 89 PID 2044 wrote to memory of 224 2044 msedge.exe 89 PID 2044 wrote to memory of 224 2044 msedge.exe 89 PID 2044 wrote to memory of 224 2044 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_974ead5e90164bb5721f86ed699fe9ae.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2f4,0x7ffa3f3cf208,0x7ffa3f3cf214,0x7ffa3f3cf2202⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1788,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=2248 /prefetch:32⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2220,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2552,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=2564 /prefetch:82⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3528,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3544,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=3572 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=5012,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=5152,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=4956,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:5884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4860,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=4848 /prefetch:82⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4872,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=5568 /prefetch:82⤵PID:5964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5984,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=5980 /prefetch:82⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6232,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=6256 /prefetch:82⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6232,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=6256 /prefetch:82⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6468,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=6588 /prefetch:82⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6704,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=6596 /prefetch:82⤵PID:6024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=564,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=6848 /prefetch:82⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6324,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=6612 /prefetch:82⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6272,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=6712 /prefetch:82⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6180,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=5680 /prefetch:82⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5804,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=6016 /prefetch:82⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5768,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=6632 /prefetch:82⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6108,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=6396 /prefetch:82⤵PID:6020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6384,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=5828 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6716,i,17296589052173760856,7589529308565996283,262144 --variations-seed-version --mojo-platform-channel-handle=4020 /prefetch:82⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4520
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:3376
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:4996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD5df2d1721cd4e4eff7049314710dc7c11
SHA1f5aed0158b2c0a00302f743841188881d811637a
SHA256ba336ffd1b01965d7ab0e5fac5415e43cb594139c76b19e4c0d9b5b3b67c1e93
SHA51211fd520176193f284563c7d050e6a7ab4e9895bac49fdc05759bab2c8a69f224858ccc784b351fc1d3ee5d39345430f9234623c9390978d7daf6a08ff5576ef4
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD5fe6518fc5916aabbaa14bba631fdc6ac
SHA13eedf0c9c3c1761c81ff7ea057f7cad2b7ea6d69
SHA256e8ddc269ff7a188851779ae4d868311a061dd6fdf15b3e07624164481e1ea81c
SHA51229f402c1fe9f60accd141e61ee89ddc76c19ab604d814c7f34130061edede87cfff71c410c8f0777984ba2d51d105f33a60911adca01bd2798687ac6ecf5e915
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5014c1bdb0757b849433ae577f3883c9a
SHA1b6b766815945da684240a736aeed197113b5220c
SHA2569c5527b1cb64a89c8d2d5929cf6362da30e8a97913a53aa55ecefcbf4eb08a3e
SHA5121dd2ab60600743dba568b5c037bc8a94398896ff7bbd21916ed1052d47a9ee3e61a7d2540218fe5f3d4daca62b336b52e12957fcadea83f0cfe5585cffaac084
-
Filesize
16KB
MD5d101e5ae3602dcdfc84b021a93496b2b
SHA1d320ef31034956a69976bede906c23d3009eab03
SHA256a00a6136b9126f8824929f28d3bf11e0c043de53764977d91af2d406db391388
SHA512323369270eea975c945eaf4504ecf5ee9d2fc5ae9679fa94bac302ba7722ba2b29a4cd142ef437dde8e3f5b494592f4009143997fd2efe7fcac8de3f75eac0bf
-
Filesize
36KB
MD5d02ba13be9e1e41a8e16cfb227511089
SHA1175804afce5f85544690d668ea38d8de1b944d18
SHA2569478cd9db87505f84d206309e92889c169ed67fd3128fa640ce2cc35c6669275
SHA5127b06f5199e9eaa98e6014c619378126cae767c34557134d81d5645e6e3dcc377b0fba68b88a45648f456e0aecef6f46e7c0ead6297f20c4881a33ca6d26bea3e
-
Filesize
21KB
MD587b2469b87d9a8c1a43832f477fef436
SHA168d6efaee5143c033c66899fc7fac87da5cf8071
SHA256262e2b782c3bbd86a4be979dd3696290e84ffd919557643e0a9f9a8e68619070
SHA512454b20b8aa416809e2d2ee5c27974d097764dc0d3ca9072c4951238b3c7bded5330553eacbf064e9af4e1fb94220f97dc45dd219e75f049f1cd4c46251a128e4
-
Filesize
467B
MD5aec68fe0fbb5bbacd7eedba228327665
SHA1fadbea4577adbc101204a6e107fafd466dbb36a2
SHA256c416b41e41514f81a0f33e4bf731c340befc07492469af4eb6c1af2ac2833cb8
SHA5125a94b43162e2eb27e428828ceea3430b76e5bae7218230c255045b431a4a9312341c95b4932c5d2c42542f1fb4e4220d85a0012978ab4e37b61b1bf9d4f39677
-
Filesize
23KB
MD568602d251252b544f3733cc2d2e099d6
SHA1e70edb229b2b457a869a478ada4f343d08863300
SHA2568fafa3cc0c62ef52de0713d58b55fb925b480653c32b7acd7fadd62a553f642e
SHA512138a5a8348cb53bf66e034a473b0990cab6aad43a13c37c8a0dc0b55e4181a805d4169b44e2f12ec734d7a01761b1dfe2dc757b72fb20b7a752499a6c70a042a
-
Filesize
900B
MD5f19848b708fb26e887a98da566d3842e
SHA1c197767db1b49e9a4964d8b505cfbe4de6eaf1c5
SHA256675417d82ebe68660494276893c0d09eda0fd4586fed89f961a73c4975e0646e
SHA512ceeeea71b28408b992f2d36c8047316589ac6a6f3b53a9d90511b112b2e8b9a9d4feb113738a067943480a112df830bf4fb8dfba5beb262ee0574b90f2257cca
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\f2082e18-c893-4107-8454-93000828d4bd.tmp
Filesize19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
40KB
MD56437fb33158aad0c547dfdff9fdfef90
SHA1ebf0e10481b05756f523880b70e534e4c1c2edcb
SHA2565156c9a9f3b54087d9ea77f43d604a8d58052d93c215e399a6d6274195238c96
SHA5127e6f74cd311a2db6d0454a4fe959f0c83e74d1498312ce795782dc666b268976a7f95c792765f33fb53dab52097e52f18ee131a76e2ab4325d860891e9c8cfea
-
Filesize
41KB
MD57d2246a8d8c3f3bcdf8ed818689214e7
SHA104c80c5d23c87cb0fc69ec03587344ed403a3c26
SHA2568f2d6e8f8e8e45d3a00e5da454df898ae3572093698958a4d55265c6fdb9d35f
SHA5124b31ded5fbdc0dc356f8b9b6d6f9aa2bd9517be30cc7a6b6113b73e4a1c06504c5d6f9391c68daf3e417837402fa0d5a02eb679f137621d7c7c408d23606c923
-
Filesize
50KB
MD5a1e653a530356532476eb7bfd5276142
SHA1833ee34b810c4a37f4399c806aab4d52950e6906
SHA2566f3d29487e471df0d585684faa26c245020f88017c0eb3960ce94d2f07d45c11
SHA512c2ebb06584b6687bf683b5ff19202b8dfe0807c51f34c0183292ea9c3ff4c5c2e308f97301134b545ffa8d7fa13d4f8df18888cdd6baed4125e77e9f8bca9aed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD558d05608cc18334103a1580240167c50
SHA175a6218ccf37769d1a5fe33e2b66eca6be6127ae
SHA256af4c06454dc17a4a7136b38421faffa746dac5fce55abb8f5b3679923d928577
SHA512d04a61bd41bb0b53a81532cf18da070137e3d664720ffd7ba06448796d56ef640545d05508f7d24aa7186d16b175e6fdf65996e5d22329626be10e3e8e92483c