Analysis
-
max time kernel
144s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 02:57
Behavioral task
behavioral1
Sample
JaffaCakes118_98382a0bb18eea5208c91df734b17cab.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_98382a0bb18eea5208c91df734b17cab.html
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_98382a0bb18eea5208c91df734b17cab.html
-
Size
103KB
-
MD5
98382a0bb18eea5208c91df734b17cab
-
SHA1
88eb9a9fd2e1f42c50f7028d3677a0545b24eb17
-
SHA256
50a46607e58ad3eb975ca9f767e8a889f8bb05747cf05b91104722ba8ac9840c
-
SHA512
e152a85216364b0daf816bf60d33765fc773a0d82a2bd6c4bc2e68fd30c9e1c0dc2f364d09786e8e3787a7258612a2a712f258044e13c870d8b4d11e1495a237
-
SSDEEP
1536:K9JfE+kpiTefHYjoJrNg8Nqu79p4QwgwGbapHm:K9nKiTewjod7Nqupp4QwgwGbom
Malware Config
Signatures
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\ka\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\ca\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\service_worker_bin_prod.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\en_US\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\ne\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_1417229208\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_1417229208\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_1568434596\data.txt msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_1568434596\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\es_419\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\cy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\ur\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_415382191\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_415382191\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_415382191\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\kk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\eu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\tr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\mn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_1935481419\typosquatting_list.pb msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\ko\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\sv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_384955521\deny_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_384955521\deny_full_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\te\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\en\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\ru\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\el\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\bn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\th\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\bg\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\offscreendocument_main.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_415382191\keys.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_384955521\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\kn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping2260_2130819650\_locales\hi\messages.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133877950775455437" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-308834014-1004923324-1191300197-1000\{DEEB89E2-9BF4-4FFD-B879-40568448811D} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3476 msedge.exe 3476 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe 2260 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2260 wrote to memory of 836 2260 msedge.exe 86 PID 2260 wrote to memory of 836 2260 msedge.exe 86 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 824 2260 msedge.exe 88 PID 2260 wrote to memory of 824 2260 msedge.exe 88 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 5336 2260 msedge.exe 87 PID 2260 wrote to memory of 3684 2260 msedge.exe 89 PID 2260 wrote to memory of 3684 2260 msedge.exe 89 PID 2260 wrote to memory of 3684 2260 msedge.exe 89 PID 2260 wrote to memory of 3684 2260 msedge.exe 89 PID 2260 wrote to memory of 3684 2260 msedge.exe 89 PID 2260 wrote to memory of 3684 2260 msedge.exe 89 PID 2260 wrote to memory of 3684 2260 msedge.exe 89 PID 2260 wrote to memory of 3684 2260 msedge.exe 89 PID 2260 wrote to memory of 3684 2260 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98382a0bb18eea5208c91df734b17cab.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2f4,0x7ffefd46f208,0x7ffefd46f214,0x7ffefd46f2202⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2508,i,1535395565644785422,3575463099574602150,262144 --variations-seed-version --mojo-platform-channel-handle=2504 /prefetch:22⤵PID:5336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1848,i,1535395565644785422,3575463099574602150,262144 --variations-seed-version --mojo-platform-channel-handle=2908 /prefetch:32⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2272,i,1535395565644785422,3575463099574602150,262144 --variations-seed-version --mojo-platform-channel-handle=2984 /prefetch:82⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3472,i,1535395565644785422,3575463099574602150,262144 --variations-seed-version --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3480,i,1535395565644785422,3575463099574602150,262144 --variations-seed-version --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4968,i,1535395565644785422,3575463099574602150,262144 --variations-seed-version --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5472,i,1535395565644785422,3575463099574602150,262144 --variations-seed-version --mojo-platform-channel-handle=5484 /prefetch:82⤵PID:2600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5468,i,1535395565644785422,3575463099574602150,262144 --variations-seed-version --mojo-platform-channel-handle=5440 /prefetch:82⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5464,i,1535395565644785422,3575463099574602150,262144 --variations-seed-version --mojo-platform-channel-handle=5512 /prefetch:82⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3268,i,1535395565644785422,3575463099574602150,262144 --variations-seed-version --mojo-platform-channel-handle=5508 /prefetch:82⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5504,i,1535395565644785422,3575463099574602150,262144 --variations-seed-version --mojo-platform-channel-handle=5420 /prefetch:82⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5880,i,1535395565644785422,3575463099574602150,262144 --variations-seed-version --mojo-platform-channel-handle=5892 /prefetch:82⤵PID:5912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6044,i,1535395565644785422,3575463099574602150,262144 --variations-seed-version --mojo-platform-channel-handle=6036 /prefetch:82⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6328,i,1535395565644785422,3575463099574602150,262144 --variations-seed-version --mojo-platform-channel-handle=6188 /prefetch:82⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6328,i,1535395565644785422,3575463099574602150,262144 --variations-seed-version --mojo-platform-channel-handle=6188 /prefetch:82⤵PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5388,i,1535395565644785422,3575463099574602150,262144 --variations-seed-version --mojo-platform-channel-handle=5328 /prefetch:82⤵PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6608,i,1535395565644785422,3575463099574602150,262144 --variations-seed-version --mojo-platform-channel-handle=5312 /prefetch:82⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5288,i,1535395565644785422,3575463099574602150,262144 --variations-seed-version --mojo-platform-channel-handle=5292 /prefetch:82⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4700,i,1535395565644785422,3575463099574602150,262144 --variations-seed-version --mojo-platform-channel-handle=6184 /prefetch:82⤵PID:5724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5496,i,1535395565644785422,3575463099574602150,262144 --variations-seed-version --mojo-platform-channel-handle=6204 /prefetch:82⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5660,i,1535395565644785422,3575463099574602150,262144 --variations-seed-version --mojo-platform-channel-handle=5684 /prefetch:82⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6488,i,1535395565644785422,3575463099574602150,262144 --variations-seed-version --mojo-platform-channel-handle=5640 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5760,i,1535395565644785422,3575463099574602150,262144 --variations-seed-version --mojo-platform-channel-handle=5588 /prefetch:82⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:724
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:2968
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
53B
MD522b68a088a69906d96dc6d47246880d2
SHA106491f3fd9c4903ac64980f8d655b79082545f82
SHA25694be212fe6bcf42d4b13fabd22da97d6a7ef8fdf28739989aba90a7cf181ac88
SHA5128c755fdc617fa3a196e048e222a2562622f43362b8ef60c047e540e997153a446a448e55e062b14ed4d0adce7230df643a1bd0b06a702dc1e6f78e2553aadfff
-
Filesize
118B
MD53e4993f878e658507d78f52011519527
SHA12fce50683531c5c985967a71f90d62ab141707df
SHA256a2fb35b03e24f5ba14cbe0e3c3d8cb43588e93f048878b066fd1d640ef8e59cb
SHA5129d24ef876ac989e50e9d4d06732a4c4f61e12df366b3d4e5ff93d6a60badac36c3e55e7f13c2539ecb525017490a887fc56580ef8e83483019041ad9b13358d5
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD501cc3a42395638ce669dd0d7aba1f929
SHA189aa0871fa8e25b55823dd0db9a028ef46dfbdd8
SHA256d0c6ee43e769188d8a32f782b44cb00052099222be21cbe8bf119469c6612dee
SHA512d3b88e797333416a4bc6c7f7e224ba68362706747e191a1cd8846a080329473b8f1bfebee5e3fe21faa4d24c8a7683041705e995777714330316e9b563d38e41
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
3KB
MD546d72f2af1398245262ee3fd3a7b3488
SHA1371b03b3194f589619567c0f792a383808616fdf
SHA2565e261d90a28b9817906e2a12631380a8e76761fc6014e0aefe1cea9619aa52f4
SHA512b5e311ea9dc5771fa3693e6b6c92b50aa63c1f257a6d45878b1566a498966c51c54d5bca6089d709d07175f2f30e77bad24e1d64045dea66fcf81aecb6831f2c
-
Filesize
3KB
MD5724372a8292bec3b3bb1c130407da22f
SHA19a03b59966c03641a6d2d65a23d2d8f5485b0ba9
SHA256b548119fb3e72adec6e77265e9600cefadb956fbeb3be11cff6ae50e5b070da5
SHA5124ebf1bc0d282798656a03e362394dd09b7273bfe562c12c41960dde44e20019ffaa45a681d9c0095d16de0a3556d084d069a2664911bf493565fd9b3aef0bf0b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD50762781f2367872e8d7f5529c8861b50
SHA189a27808f4bd6808511965c92f53e63e4967c56a
SHA256aa3020665f6fd51cf0f3b02db427042b2ae5b42ffaecce73410d938a87de9447
SHA512e67a430c138d3d39dbfb41b68604cd1bbe9aa54085d739d01fdd2774ddb04c6d2295b9e630a3d02540960204db7a8567281d0cf5daa112026d1ce6cdef9da913
-
Filesize
16KB
MD586478035f2451530784c10cac78c36d7
SHA1ff72c65b34abfb6efae93b08e59140066145d58d
SHA256aca0ac43e910f8a20efc861c094f94aa309efde2eade836f080c6f3013ed1c3e
SHA512a5ea6b478b360674e0cd552cd3853f8d09d6f599ff66eb40f6834916b167ac7525d97d16151665344b6ff1ef9f13c68a3775deaa914788434d2ff1ab47df6e93
-
Filesize
16KB
MD5da403ded29159a071df5027014b2857c
SHA10528f30103df107afc84bc4a22c6e15ad5b24124
SHA256b8975dedbe8802f274487e420978ed2fdd4641abbbd63b8da628233645f8ac37
SHA512a6baf8a5179eae11f5545cdc15b2ca384375057cf06994f0e3fbc47d719ac32e485faa69ac383ea6351cc6286df3f98e7c514c1f60e2c798957cc88566436f2c
-
Filesize
36KB
MD54d782a71e160466c36795efe9c520bd7
SHA10430eec68c51e4db9737e7dc7635d002dd2523f9
SHA256865f9fd51791d98434aa59c33f03b6717e1ddae2c4c1631c5ed561c80be6adb5
SHA51267b1633b94b849231a5ae15b117a37b1f4f9016ea51f37dabb169ab4346b8a9fa720378a397142e28f8b0e5e2be3b2ff6f7060dd4fc2afa2811bdb1ded3ed8d4
-
Filesize
22KB
MD5c84eca3ceb9bfc7ce34ab36d45fc92a1
SHA1c953a071d038fbe6837bf191e9ece3ae39e05454
SHA256774293866c0a9d649d565d866b6857be9cce49ec811a53be389940b70fbdf618
SHA5127c01de9daca41d39b58dbd0aa7589d291cd94c50dda0d30aac16a1af91174929ad19030e99508d82e8a3fa3acaa9203b69c26da382055f303d524dfcf2e79f99
-
Filesize
113KB
MD560beb7140ed66301648ef420cbaad02d
SHA17fac669b6758bb7b8e96e92a53569cf4360ab1aa
SHA25695276c09f44b28100c0a21c161766eda784a983f019fc471290b1381e7ed9985
SHA5126dfa4eca42aea86fba18bc4a3ab0eed87948ea1831e33d43426b3aca1816070ecb7fd024856ad571ca2734214a98cc55e413502b3deef2c4a101228a7377e9d5
-
Filesize
23KB
MD523ed91dd7fcb21933ad9eca6006e10ae
SHA15313576d0c0f84307e1d1786e5331323dbe1e52f
SHA256da755bcbf2ea592463753cbc377c97facb8c90140521dbe2d87ddce2827d12ea
SHA5128a1d933f150f96ad7ae9e68206bafc001706e64af08a216e5e70370448ca2f468a704b9c6740128ba3de24574c3a44e5836468ff5619c5f4eccd4dc3ceff5e47
-
Filesize
900B
MD5e4f47e3e83bdd0ca035bbc2946debeaf
SHA12570f814a387fd8d2f28808fac9b34ded2404058
SHA256762a7d79aab72f1178e90fb9c7d620904ee4455d68940232e591843f8ac4d598
SHA5122d24d6ab35184e0d63268d03d933e9822f9cf05d7c05f0d2ae0db16b0a4c26bab5b0f679523927001adfc740e2957e7bbce765f2f634616585d0548b2cfab845
-
Filesize
467B
MD505277cfd050f2f194e4db2952eb3dcf9
SHA1cb55456dcd84841ea0f24deb1460064278b972e9
SHA2565e2d004ed314faea32fbb40001d20b4485985ee23e892ac46ddc23b50a7a514c
SHA512d4a8d79ecd1475f38dca73948841a9440bc86f4838e677b4ce895045642e7b3183ae829f70faeb4517f02c7b473333a7b915f2c18bdb99156f6a0fbc37ddcff7
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
40KB
MD5a3b25dcf1f1b3b0809f4c8ed90b393bf
SHA13a3378b889c80beb9d86397cb318aa621e87c2a4
SHA2564a7400202680db4fdc56719f2c009bde538467b05565b5c9b358a13a4865a3da
SHA512716052eebf8e4f8b46a433cdec204a8b8c8c607f78be4fee296fae290df16be5620ef7765529feb4f16fa6dc275675ca7212354f93e44dfcfcd8ee6c5a429355
-
Filesize
40KB
MD56efec3a732b889ca25a7693bbc10c0b6
SHA1b3fd936cccf3c3c19c3feb98f042887b8a165a99
SHA256ca8fb457245968afb63d75fd1531f6cf72c3bcb7957a246f7bdeea46dc51d7c7
SHA51262dba8deee9e04c96c70be774466874e024cf1beb5c04463b7278bb78dae95fa13c70bb9599fb4c7a8e89130864c6b276018e615a2794ac477780d53d3599024
-
Filesize
40KB
MD576779f6afebabb4a9c68023fc3da57ae
SHA1c4b5454744e142dd3c347126360caef854c4bee0
SHA2562da13a737f8738504ab17c3f1f96057ea0aff4451d0efab8210ba82bf106f383
SHA5122deaff4fc126fd69c968289af61b172c63dc40fcc807f9ba0fd60addd08ada3a8e8cadf6568dfa3a86286ae72940c1e33d6fa90bcfcf8a593b4836838d8a7980
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.3.28.1\typosquatting_list.pb
Filesize628KB
MD5bd5eeb9c4b00955e5a0f6a332d78cdef
SHA1cf9e85ae41cf1ef2385a73ef36ebeb3c3378ea3a
SHA256dbbea874b4b73aeb3ad17355c90f692767a947516481f158b7319f7c43f0e657
SHA5122cfa521120dd1ab9c2cc90b74cd8d3f6f8991a086bd2dc1b9d225b08aeca8420f565e047f551ddf6d2149cfb02e4ce69b641e328a774dde7017ad374fd58eb96
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD552f0e7ead59aee1281b7ac1c857d5676
SHA17889d5b4c0b210e4998592aff72b179945230e62
SHA2569f43535b03a8b34a79e2b7992c0d9c117ac44ab86670f6a125fc7dd35b44e9d8
SHA5128eb0052b17f20670a2a684b5af66c3e88ec56d8cf975aeeed3d912c99e61590780bfe73dc4bb8f14ac7b255c785408b5da8431f2245661248947a9a3751926b2