Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20250314-en -
resource tags
arch:x64arch:x86image:win11-20250314-enlocale:en-usos:windows11-21h2-x64system -
submitted
16/03/2025, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
Warzone_Unlock_All_Tool_2.2.zip
Resource
win11-20250314-en
Behavioral task
behavioral2
Sample
60212957b9a2f6732f160e0070b373fe.bak
Resource
win11-20250314-en
Behavioral task
behavioral3
Sample
Warzone_Unlock_All_Tool.exe
Resource
win11-20250314-en
Behavioral task
behavioral4
Sample
c11eb6b9290acb12dc21c3e0b9549701.log
Resource
win11-20250314-en
General
-
Target
Warzone_Unlock_All_Tool_2.2.zip
-
Size
85.8MB
-
MD5
ba93079e300badc1bb3c1d6350c91c5e
-
SHA1
9a19059f089d7dcc607e8dd38077deddf39bedb8
-
SHA256
6db74250d83e75eda76a61af409c1987b0cfa6568feb4ff6d4dd1309053b1610
-
SHA512
790659e136a160f6a24b2983b6f8c659c4da77c2f276bd2f999017998acc3450dd270920e8b7ad5ddadd2608aed425028e203564fdd48a91d95207ee48857b5a
-
SSDEEP
1572864:uW4dh4O3Dz4xNpUm5Qs1K/wLBNiWR1Px22wQrkXlnhGuO6ypKmN7qx3RiZ4gWRp:JIq0DWph1KIRR1PxxeXJIugKm1q5TgMp
Malware Config
Signatures
-
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_1318664937\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-de-1996.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-hi.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-hy.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-lt.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-ml.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-sv.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-be.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-cy.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-en-us.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-nl.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-tk.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-ru.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-gl.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-hu.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-te.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-bg.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-es.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-nn.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-pt.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-gu.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-kn.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-sl.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-sq.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2056007472\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-fr.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-hr.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-lv.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-pa.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-sk.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-uk.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2056007472\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_1318664937\typosquatting_list.pb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-ga.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-it.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-ka.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-nb.hyb msedge.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2056007472\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-af.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-mr.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2056007472\sets.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-de-1901.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-de-ch-1901.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-et.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-mn-cyrl.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-mul-ethi.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-bn.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-el.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2056007472\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_1318664937\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-cs.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-ta.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-da.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-as.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-und-ethi.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-cu.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-en-gb.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-la.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-or.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3520_2002431981\hyph-eu.hyb msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133865944641005715" msedge.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1678082226-3994841222-899489560-1000\{922C0499-A1B6-4BF6-AF8D-CA91F33F3BD2} msedge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1678082226-3994841222-899489560-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1678082226-3994841222-899489560-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1678082226-3994841222-899489560-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5540 msedge.exe 5540 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe -
Suspicious use of FindShellTrayWindow 55 IoCs
pid Process 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe 3520 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3520 wrote to memory of 4988 3520 msedge.exe 81 PID 3520 wrote to memory of 4988 3520 msedge.exe 81 PID 3520 wrote to memory of 4956 3520 msedge.exe 83 PID 3520 wrote to memory of 4956 3520 msedge.exe 83 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 1612 3520 msedge.exe 84 PID 3520 wrote to memory of 2132 3520 msedge.exe 86 PID 3520 wrote to memory of 2132 3520 msedge.exe 86 PID 3520 wrote to memory of 2132 3520 msedge.exe 86 PID 3520 wrote to memory of 2132 3520 msedge.exe 86 PID 3520 wrote to memory of 2132 3520 msedge.exe 86 PID 3520 wrote to memory of 2132 3520 msedge.exe 86 PID 3520 wrote to memory of 2132 3520 msedge.exe 86 PID 3520 wrote to memory of 2132 3520 msedge.exe 86 PID 3520 wrote to memory of 2132 3520 msedge.exe 86
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Warzone_Unlock_All_Tool_2.2.zip1⤵PID:1136
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2e4,0x2e8,0x2ec,0x2e0,0x2f8,0x7ffea598f208,0x7ffea598f214,0x7ffea598f2202⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1872,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=2184 /prefetch:112⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2156,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2560,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=2136 /prefetch:132⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3412,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=3692 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3420,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=3704 /prefetch:12⤵PID:5852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4988,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=4780 /prefetch:142⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5724,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=5788 /prefetch:142⤵PID:5888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5732,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=5828 /prefetch:142⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6556,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=6544 /prefetch:142⤵PID:5648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6684,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=6696 /prefetch:142⤵PID:5468
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.execookie_exporter.exe --cookie-json=11443⤵PID:1600
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6556,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=6544 /prefetch:142⤵PID:6040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --always-read-main-dll --field-trial-handle=6736,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=6868 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --always-read-main-dll --field-trial-handle=6544,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=7016 /prefetch:12⤵PID:5164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --always-read-main-dll --field-trial-handle=7200,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=7184 /prefetch:12⤵PID:5384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7012,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=5684 /prefetch:142⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6868,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=7360 /prefetch:142⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5576,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=7112 /prefetch:142⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3680,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=5236 /prefetch:142⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --always-read-main-dll --field-trial-handle=5412,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:5232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6788,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=7068 /prefetch:142⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6024,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=7420 /prefetch:142⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --always-read-main-dll --field-trial-handle=7068,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=7416 /prefetch:12⤵PID:5644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7436,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=3800 /prefetch:142⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5892,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=7116 /prefetch:142⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --always-read-main-dll --field-trial-handle=3792,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=3804 /prefetch:12⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=7712,i,3046147411072871645,17594588683257144176,262144 --variations-seed-version --mojo-platform-channel-handle=7848 /prefetch:102⤵
- Suspicious behavior: EnumeratesProcesses
PID:5540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:2632
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:1696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD519a88bad99bffbae6102e191cfedd75b
SHA1df476b325df883b73eda1b2349bab45aa22e808d
SHA2560d576dfbde1712b7288e4561e3eea75ffdad84dc50a77ceb57a6e9c37d60465a
SHA5129ec5eb487d8c8fc8e283a94bd43afd740edc4df6a4509d83629416d040586bd42330eb0da6dd41ec1e5550bce9a6643319ff8584f8638a9cde9042fa406825fc
-
Filesize
119KB
MD5e93a7b0487c20bcfe9ca4e102ee950a8
SHA1c9a60cbb5cb81746f9d2d4dcf43a72257804f75b
SHA256ac27be700e31e255097e00096ba3fcd034aa9347ffce69b35713960aebe27941
SHA512c86b03fb76ed7bf17c8b14c6ada4a1d0457905cb87841c0b5d7d7751179c36d883e27753fab13da914c163b507ea43eea79c1fb90b570a383fd2a0d6779a2b0a
-
Filesize
98KB
MD54a68983965bb0ee2328181e4af6da7cc
SHA13eb71de989ca60e332005611d4c756143391cc3f
SHA256a999576cdb4de9cb0010a1b626595f9ee94f10206f088103253ad0273f1a30c8
SHA512a844f4f118e8108ff404c694f80381eaedcd97150f3145a340ef0d2ee2e444d618ed1a885c42bbe088aec3851ff1e55f89d5378d4ec73e5d50bb8b0b32653a4b
-
Filesize
53KB
MD52c4e31a462b7c6406c277dafdc1d6718
SHA11a413f0eeec5fa359e73d943286869432cdda237
SHA256d960f9461fd2d1cfe0c0f574a9334fa284713f239c0b72b5ed8fa43f9ed5f968
SHA512fff5596f81c8b7ad3bcae08807628d30dcec576291d765e12e45e3b9807d6d58f6dfb46542dfec3e8ff8e076ac4d2fe689e1a4d6064f5256e08068a79ad8b3c6
-
Filesize
29KB
MD5656a13b894c460504dcd9da92a5a9cf2
SHA1b141c3d737ce2b1a8b77e3584f6ba3b14da24dce
SHA256f0943a6c5419dd2307288d45e878f16b9f8569f3b9d8d8c21b103973b9dd150d
SHA51204e6e23fad77353cddc8d5dfe0e2746793993b37ccfe1b860ef131ccab5858f7fee05205e79fcdab3e587ab26bb5af0f6f6daddc703599df8fdca712f65b7167
-
Filesize
162KB
MD5018bfe502dc569bb114e6453f721e47c
SHA13e442cee9d596710120cf511802651db45cfa137
SHA2561dcf28b8b4ca9516bdab4018af9e10003f78e323eb07b86fcd0eafb77cb6b250
SHA512dd6bba0a4826e07b1cd238d42dbf4ae10cbf317fc256c72947ddc564b54c7f252ddfb0b8f0ad29b1f2543636827d0d74797db1262fa00ac385bae297d99e490b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize5KB
MD5a0a76438111b8ca4fc42757f0795538a
SHA1a3c6e22580e47b0dd0667e52292f24c1e2ab5d52
SHA2566fdfd6b260ee441b430f0bf8b052786871798afcbe6a4ca7451072ac697c8a3e
SHA51271f9b398f2fb6d73bcfa74ff7f63ef28b9ec18a4d81d27e83addfce7e99e9cec3f5e1eceb5e632d0bfa8e6e0c74770e338f2242166b6d8bd2984ae5559180d1f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize4KB
MD5486a80c509b068b023a8e992366ea2f7
SHA119e07dea834937ec0de7dc4fcca489c78abd90bf
SHA2565ff7c80a72eb2024c3aa4b444c6b191974c8661ad7c2b4f126dbe5f98c856408
SHA512739039df99ef368f692921a62d52ea8a9510f5cffd548b4b99b84e502515002c07a8215904a7efb0b1d8e44456596b6a1ad90d0db84e3b2b601985911cd52923
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize5KB
MD56803eb400c96701b6813aff0a12c9798
SHA1df4ce2954de3b7257137d6c79fb6134327e81258
SHA256dca111854e420cdda3be57bc95c3cc690f895dbf68c1dfc5ab437e05ff4c83ff
SHA51274e70876f66711335d13f118396b1b4141fb33a7a6c3bf65523d73f236a75bb9ef7ebf1c7d1cfc19ee43e436de47eed2530d38875d9f3ac7e5c8bcb231795b3d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe5835f0.TMP
Filesize3KB
MD53b394d25716e4c40b0da92776b671f5b
SHA1be53c44ac5037aab52fc0e1591441d4e776280b1
SHA256f33f0110edc724336b3ef72906282add2af5842533217103f6c05afaa8b46202
SHA512633897563b8c97c8b369396c14056819781742e9573fcb38e2bf604e27dbdc097f16250f0d301ea9921f965928b86cb7f557b7847cb819c802cd79ca44a149f9
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
4KB
MD53cbe00bc8906d3083ca495ed0f3cc515
SHA1df403b3ba6fd63ddca37f7a6e8eee5579db6dcc9
SHA256c1d64245eaf5135ed356baec12c28a845d9d9b6ac504ffbf5f8d756bd39b15f2
SHA512fffdeb6a614b3712e3bf128fd18b9f89d7b0a8cd648a496487ec4eed6d57e37ecc460ee89b13742eff983eb8ea1d9e11ddba09ad9365be788d29e68dfa6ebe8a
-
Filesize
5KB
MD5599e143ece12b12dda2ff94e4857e45d
SHA18703d808f6fdd3b59bc37606a374dad43067bf28
SHA2560f4600e9a007c5bc58beb1d0b59695febe1cbca71a50baa1987f93bbd2ed0e11
SHA5128e23a7a7be8c827d0ef7252eff79994fcb99f45f60d7372cf48695f96a75c912dc1ae5881e33d1d47b79269dccd20eaab9a6b48b5d92af87656c8efd4266b850
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
209B
MD592dce5a8d6884241d035bfb46a5c8aae
SHA1bab8796bf51d8ea7ff785c30772f55d8d16ee050
SHA256a7c8f9ad9d34c2361a6dfd0d80e91a16d00b72bbfb3db3efbad75331006f710f
SHA512f654414a952e6ab964f34b9d29c71f9f32f533ad051930803f58fc4e8fe8132c563cfa2a2f90af9e379ceaa0df0ba308358b1b47c416974e9f4d33044f3d9256
-
Filesize
17KB
MD5d7c374a61d63e4c95247d1d00b7f741e
SHA10a92a80bafcf8b323b5c76cf8c8b77a105e77b2d
SHA25635327d89942a79ae8402636eda64aa26799a88f5eaa97fdb3c9f1e333e652424
SHA51218c6973a22c9b566eba2e5e75602e973a3f727bde1dec863d53e5281245553ca0f7f90324b8a7f3f8677f6af5af0e5ae8a4fadd28d19d2de378ed78167210121
-
Filesize
18KB
MD573516f6a9bd6f76f7f65e3f57ae8308f
SHA1a55e26d8a88581b9d6bc76de4f304a3eccf69e69
SHA256038b4f361df323e01c95e63d0d8ac0c61f847a01e239b4662801c245621c8f0a
SHA5121ecfb2025dfe555d58489c94fe3122e31a90ee37291f3f4a9b8a1acda1a82b753bf8a0d92551789b7a2c0601bb7cc287a905ba31d4f527978d4a7ca3be0d5bbb
-
Filesize
19KB
MD52d589b0ffd02f9dbdafd167e5bea7380
SHA1b8a213844423df370de6548ec5d069c24d202090
SHA256eac0447381efceed9cec32dcfef0c6beed20896bfd6432c8960661b9531e7e21
SHA5125a209687db68d041c41d9f3588f0e0b3bd1135da3d5acb56c2b101de2cd75ad041f5e3f9dadbb6ca2948a4171a980a268b3e37d4052279c492a421c886b8fa3e
-
Filesize
18KB
MD561ef71208acc395a5dc766ac80bef9fb
SHA1f57cfe0aaa7fd769b184ffe6394d5b19d7335fa3
SHA25609440a96a1ead24fdc89fdc2187800992054d9d054f0f10c1840e0da904aefbe
SHA512002b0219597138d70d5a9480a61f53d79b2d0312babc0fea4304eb89a4fbddf8b8d10322a5b7c295329db00352772c53005702574fff2dc2a421324ebd945156
-
Filesize
18KB
MD5d0a97739fa009535efc3f6cd90db0686
SHA13a2d62b12bac59d32723e3133d808da47c0d118c
SHA256b6d602288ec6cfae68419de7d09040d07b2a684449494521b77acfb22af59d7b
SHA5123eef73d30e1affff2212bfe8f8e3451953381442e584f672a42db0c9d36b2a1977112c618046b4b47d41bfcb9892ac584371b34dd426392b30760006c5c03997
-
Filesize
37KB
MD5dcde2ab129f57109fb60781ac4e4718a
SHA18baad15c2f662cfa33a9567dc8051ed8e6a204a2
SHA25677701060d8abbee5ab99b28e28f48e592e8dd7f2ad9b3221012e9a3dab865a44
SHA51209d1574bd48d40e2a40f212aa461b4b37dd38e5423063d5758ed59ef0d1dbf9b2322461948859acf62d447179abfd9dab2222017dec1b40feb23e3c0bc815f52
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\10be04ae-9993-4e15-83ff-bb02a552afc6\index-dir\the-real-index
Filesize72B
MD5254e42cb053e60af05edb4e43eb36c34
SHA14034e14ae0ec184135cadaf5a7598eaccc730bda
SHA256c3530f62cd2dd7bdddfcfb74b73f5abc14bac152c594718c16c393f56b0dbc94
SHA5128bb5830ec6eeea0ab01b1a8b19e3a8764c248228fbf9d24380cc56921a25e30cf5dbe2f3676a6de9833d2ad9615905b123bbf414232bcac0caeffe436ea8a599
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\10be04ae-9993-4e15-83ff-bb02a552afc6\index-dir\the-real-index~RFe58c6c6.TMP
Filesize48B
MD5c310235625ecbaa718dedee5d62ef13e
SHA1705860741eed1f724d5c77de1a087342b5743dd1
SHA256f5583c688f8624d15b02c476ca20b570fd79547a088780d6e52c05bcde40bee2
SHA512c10da7a1fb1c695f10792fd4e03cc8922dd23b763267f2d44e56feb2d4c4537914cb825a43a1a9097e434ec225f7b51bb5156a6ef53532b775afb4ef5a8f8307
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\13bf7cd5-3f0a-4967-869d-004c84656018\index-dir\the-real-index
Filesize72B
MD5eb3175814e3a1620d13eadc2aa082283
SHA1f8105bd0986fd2de9eb1b54112fb9ac2cbbebd9a
SHA256ed7d2b7d7def5ca0bb7f357283d7a21d7dea5177e64c73e41fc03d083ef9822e
SHA512ec1c2b5a63d5684cb8aca19f120bd0734e4bb0aa5161f0cd3d4222deb8192ca5a50a1b727c61b292e54cb7f6bdda2090fc906064551b5842d58c414d81b1f182
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\6de81848-5b24-4103-b044-7a04b1ce3981\index-dir\the-real-index
Filesize2KB
MD5064c9738fda5ec2f23f101e7eef820e5
SHA1a6f7c9a61da5324cd2c6d69aee7bb13860213cb6
SHA2569a2b5cb9a2b8de4c7942bc96b816c1325fa0f4e80cb4d13c8e491136f863e7b9
SHA512eee2465d5251fe03ed54f5900237e86db41a1b50d39bc1eafd2bcf22c3862d84d5837e7f430248e79ed6d6914c566b3fe4afb397cf3a3d7613e59613c41c83f4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\6de81848-5b24-4103-b044-7a04b1ce3981\index-dir\the-real-index
Filesize2KB
MD5a0d74d21ba27fd764ed13aab5c2a6e21
SHA15b69a5a722e9fe348e51c161ecf0cf4d028be123
SHA256ed8a719e7d40339c537dd4fd32ba060352b767aef4439df2927b9115cecfd4f0
SHA51255b3afb3d3a94f58106f3cf0e90e0297796f69d530abdea73e383f1084b7b5804b597f0aa0336321ba5df77c664e11aa20346730fc0aaa6ae6ed53c604b824e8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\6de81848-5b24-4103-b044-7a04b1ce3981\index-dir\the-real-index~RFe578240.TMP
Filesize2KB
MD5188dd57d20d493a56d4687a85f9d8e0d
SHA1e2e61bb4b90d7a7fc5be64550d5a0fa6a8db4a7c
SHA25682b2ba80274828031086fa4f62b2077bf16ced37a64b405858782281fb13395a
SHA512fb3db3766589d217bdca4bd02f7cabd05b490618433769c031cd1b7974bad3ce5e91eeab9e19fef1257bd4470c2c7bc9fb16eecf47ca5b9fac9dfdd452318b8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\cc7ad1e6-2a51-4dc0-9579-f8bf6674ff51\ee91b116cc2005be_0
Filesize56KB
MD53bd6933cec8996f06bf17b0caea8531a
SHA1fac0a7bafd7f095eba339f6355d0c7a69572c19a
SHA256e970d3598ff2b382308b8f6fed66d5aec3d2aad656642f2dc8abf885f50ca665
SHA5124ba0c51cce30b9d94f6150792593b4261fc3ed49ec9f90c843643d4c07b526b6d5e0841c80c0f4d324fd9e023c4249e6b64cc7e134fdcf8ba6dd7602426c3236
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\cc7ad1e6-2a51-4dc0-9579-f8bf6674ff51\index-dir\the-real-index
Filesize72B
MD5ef8bae0fb7034ad7dfabb0896f137122
SHA183c2dab55e91f66bd8c61aaca2534ee32657f908
SHA256b0d419bcb849c2ec9a97bc35a730ac3b5a84c708b5a423cc40112ee585d6e28f
SHA512308b67652067236f3ac8c8461a5fe3cda379d9a55e30fc0f8e5ea8f1d37bfdc1a4788c1e1a7c817ff4b274a57a8d198502bcb5117cfa912630d6e449e6912838
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\cc7ad1e6-2a51-4dc0-9579-f8bf6674ff51\index-dir\the-real-index
Filesize72B
MD52bbd3a0bc772c3745e2b4cec39c1a12d
SHA168920681ac53aed9e468ccf84e48a562f8f597b3
SHA25683ffc6256172bc5ff9af89e95994e21e1c5649cc96b9f3b0b831821427260cde
SHA512c05a68d1e895d933288555e0c9d5c4ad406bc3b04949f234a8d22110281ff0ecba11d66bf9897b7928007c19e9e07c39eeb2faa8fb9092e5e1633e747d97a66f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\cc7ad1e6-2a51-4dc0-9579-f8bf6674ff51\index-dir\the-real-index
Filesize72B
MD56f67c94df772773bb058a748e5f1de52
SHA103303d2def47c84f93475fdc786e4a345c70fee4
SHA25618a0e201ddab634c01c5857b92a6b34640a46315d48ffc1ecd189af2b7dba2ff
SHA512c611482c9747749b4e93f149631a25bc677dab552baa31e17754f176233236d83753b58f47f89c5fff26f6984fb02e8a53b7f2e31120e150fbde1c562f54cac3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize253B
MD573dade3aab15676b6f0668a006fa171a
SHA1ded23a1a5bdd0d83795b99bfd065c2ef2b35310c
SHA25697745c80d545f0e5f70e342a773c2627863cdb62ea01ff05e4ea0e9386d36b63
SHA5126728a1791cbca2fd1ff9b7081af7af7f0812d138c378347ced0b72c4148b798c7a55262e23842d274c1bf58522e9a17b2f102cab165ebfbc30efd9b9d9a161d0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize327B
MD57707765e75b3bf94c0350ef735da6d4b
SHA14e779f188148837d9f09e2abf8ff9816463fc197
SHA256f025ff845705881c2cf13002e4d5f2fb8cd1432f5164d249bb2f095856970dd4
SHA5122869c29bc35d73e9a3a3b01815349896d3735977792214bf67859da16d473f29e68e7f7ee6b52561d597f566ac6f66077036b23d3da2dda92dd010e2fe8d86d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize322B
MD52519a61e1b0aa8d83684aab3949d2dbe
SHA1467a653a4f511e75788f6555ee6cbc78a366ceba
SHA2568b7462b6a6fdc3e6ea9f84a471b9e89b37260bef51d6c08caabe01b60083bab1
SHA5121de21aafcb8bda9f8ce1c418101b65e538f63561774d2894eb2f65993e4385e127d8f45794f59bace6ad7710971b29b484af6fa17b3284632fb0e08c315a4899
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\f1cdccba37924bda_0
Filesize115KB
MD5655aa29b50516991b0a741d137fadfe4
SHA1e487ada99c6f0d0adad81f65b387755bdaeb5db5
SHA256b0b1dce9346bc771ab71d797609d50ca2c24a46254e0d527f8f577ca010da61f
SHA512379660262b8d66ba0d653df364da9652f0bef56bc0c54f71cc705e309e1cc8a33fb414b43f49ba5ec15faeda4566c9a9b4e83ac347992c367b9ec78fefa8b6ab
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5cdd9394b95461518c5b6a993090b371e
SHA12a93a3fb9e4886f8522d52e591aecc9e1d931033
SHA2562936e50e0645237aa278e6b2d91597b030dadd477abbae5bd979af5c60313e16
SHA5124815d664eb495e34a95c94d400769d94ded13693cb473030fbc1f6a9bbb53f506be19843f821db11ed4fe8266b53fd00558db6bac2ef3d2b0de017c69f036e60
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57d745.TMP
Filesize48B
MD56196fbd3e52940d8eccdca07b5939379
SHA1f3093695831f7b569f7cf6b673f7816b34c16cea
SHA256f28b045483d0f1aa4dbf93b6cd5c420eda0d8a126e88d26ea1bceec076ac0379
SHA5123c8f769de26fd92bae8c09746830f55e7831947f145140f57d0dcb5496984c68680a106ce034fff395976dd2824dfd1a275a13812536cc37e37658f78b773a0e
-
Filesize
22KB
MD583bf17d6f78617bf24f74219195a8aef
SHA1de545a265a9da8d49bbd1616762a71b8473881c1
SHA256d78b1c417ebfabfa71f79f5eaefee76fb4ffa9350c410c9fc597c4e85aa30d52
SHA512d529347c2a0a5ef63829703e0314bbca357312d066971e4544f6806ea36ae26d1218c884891e2fe243dc1436cffe097c21320a28dd43d1520b6cbae597c4e32b
-
Filesize
464B
MD5087ad51a136d4f0f821e455dff4e3d99
SHA12cbe57525d33a578a1fb6f5fc1575ee47fa5298c
SHA2568d53d61c8b70736a3c6ea55254ec0214311129fd9f70229c0fc91dafb7c560f6
SHA512f3feb5ced02ba888ef0ccdde75a1e5033767dc524956b961ef902e1e621ab16f1d859ed87931bbbdf933344d0bef43da6f44adc84b6fd3eeeec455b5dfd4c101
-
Filesize
50KB
MD5a08a0d51358c3d44a4b64a88b2f125d6
SHA1a38a9fe75e491b8ef5790fd5f009822b31a7c044
SHA256f5b6463c71cca16dcc02d6501800ce263d8b58386c5377e18024bfa90aa90646
SHA51299b45433e671d8eb0f50a12f0fa1988c6e4560085429e265ab702365b0899c14e47f11cb29343a7cf4a3a64e442698a07833ddfa2a858c5931badb384d1be1b6
-
Filesize
40KB
MD5e40d83b8548d3fe3581665af04084157
SHA1dc0d41c484608dec91256c25c72aaee919a08e26
SHA256a835d5a17e27795ce18a16a2e0e598500f2eab7637c64454278438fcbe9645eb
SHA512de278df9797756ddb9c9f3c700c61372a48e2008e970ea612d02b2143e32a987ea145696f13020a69bf9a7dfc2668d4bc005698893122a946db304b431c463bf
-
Filesize
55KB
MD5d20fa80b0822a2e0dd179846acbb09cd
SHA1a5e238179faaa9c2cd5dcf607aea4181d8712e5f
SHA256cba8c090bdee7acea87f1789dc162120d94cc7fed9581acf4711699ffcf967a6
SHA512a1f4e409f0920cc166218c2b1f368c96b8a0c624f089b775724f7dddb6bd85ee7a77fa3c7adc72e9f40e3e92e47e686bf809405e9d6f23023da1609e44c7932b
-
Filesize
392B
MD5e0fc8d860335d26e69ad5939eea4cc36
SHA1e82d00df725f488980d49d589b0751abc2ac847c
SHA2562fc35c2664882036dee4bdb1959b3df806fdab39637266f857b9719c3a80c03e
SHA512e2486728cf99fad54bfd3db5ab09f4033dd0bdef31f7059c29af68141b6bf4e33902b143c4e7cd022a84094989ddb65a51c984d9e08968b90b27fcb83e889642
-
Filesize
392B
MD5605d53b840278282fc8433c611c1dc24
SHA19d4584040c300105483ea3d4a28d80112d2cc1ce
SHA2562271d6d1d86c07bb7de370cf7a4c540352be7e889a6da5b1a7680f838678dcdc
SHA512543e7ef1ca0012b188b04bfb1f8f37c65bdfd767263f8e44b189c0c245cc8a280db9d2878427d8f291d0253409046e452f2368f4ffd78bdcc318ec133368a06f
-
Filesize
392B
MD51ff9a62e81db51b8a53f69f853356483
SHA15315d2c474a65330c4cb1b36216689d89628defa
SHA2567365c058e69b71deebf511b6891733a71f1f52ddd56a0b044838a3808d8d849e
SHA512a718e38bd1017fc1b50068e95fd031c52b71dc9898772b88045849af98ddefa6cb25960da92ddcb408bdad16a9c583ec7ec132d1fa923af573a64350d08bd6d7
-
Filesize
392B
MD512129b76b40a54f1b94613c09aa81c7d
SHA195b44baa487acbd55fb647626c392176b3253f92
SHA256b5e1100450b88eafb06fb2cea7dc6631388397315e4e086c73bf1f36013b3a1c
SHA512139f300e5c911e9f9c69e9e186f50ad10041564902b831f9f8fcbd5f77a0f98772bf841f39151f4c306e8d9baf31afa61422dd9a39d41b3010f63d2f6f3b745b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.3.16.1\typosquatting_list.pb
Filesize631KB
MD5c3ec8bf0a625c2583833a3340825f1cb
SHA1582054710a312897117128ed59ddadc983525eb6
SHA2567d10e035e0b2e152a1fe32a92b0b34295a979f7db2269cfba69d4aaf3401b77f
SHA512175125259eb39225d0584fa4e3c5cbfc66bd22646cf32677f0eb7514a0abeb2c08118375210a69207be85e6e7ebdd9b6fa9a967d3c4ecd40ecd514e306873c6e
-
Filesize
66B
MD5a9ad1318d1471dd1400e12e76d7a2c0c
SHA14fcb197b74943af818f72405ae2b4c0057bf47a9
SHA256434cd3a6a04ec7395a5414afc841ce3757feac54a3bfe9173823a79e5751a55a
SHA512341b4c3bb5792cbb8b092351fc0ff38a5698cc79d041fee9023fba37e7131b53de7c2b619a7b6c18e7d77973158fdfb94c8b76ecb617bace97f0c00155f7d5a0
-
Filesize
118B
MD5ffa5fcfeb00002903f6cf667e9fe6a3c
SHA1ad765ea344c8cfd95a591da8259fe412e52d13b0
SHA256dd0679c622258bad2e2ddaec3470297259dc68b55b8c4f4d7f2f28a378826217
SHA5128da9b780e9bc6785efbd56b51a4decc8703c9f1d41b33469153cc0aea8190c1b6a9001128c6022756a66ee539086ad6f787da84b6b7082dc51939077365e7beb
-
Filesize
703B
MD58961fdd3db036dd43002659a4e4a7365
SHA17b2fa321d50d5417e6c8d48145e86d15b7ff8321
SHA256c2784e33158a807135850f7125a7eaabe472b3cfc7afb82c74f02da69ea250fe
SHA512531ecec11d296a1ab3faeb2c7ac619da9d80c1054a2ccee8a5a0cd996346fea2a2fee159ac5a8d79b46a764a2aa8e542d6a79d86b3d7dda461e41b19c9bebe92
-
Filesize
687B
MD50807cf29fc4c5d7d87c1689eb2e0baaa
SHA1d0914fb069469d47a36d339ca70164253fccf022
SHA256f4df224d459fd111698dd5a13613c5bbf0ed11f04278d60230d028010eac0c42
SHA5125324fd47c94f5804bfa1aa6df952949915896a3fc77dccaed0eeffeafe995ce087faef035aecea6b4c864a16ad32de00055f55260af974f2c41afff14dce00f3
-
Filesize
141KB
MD5677edd1a17d50f0bd11783f58725d0e7
SHA198fedc5862c78f3b03daed1ff9efbe5e31c205ee
SHA256c2771fbb1bfff7db5e267dc7a4505a9675c6b98cfe7a8f7ae5686d7a5a2b3dd0
SHA512c368f6687fa8a2ef110fcb2b65df13f6a67feac7106014bd9ea9315f16e4d7f5cbc8b4a67ba2169c6909d49642d88ae2a0a9cd3f1eb889af326f29b379cfd3ff
-
Filesize
82B
MD52617c38bed67a4190fc499142b6f2867
SHA1a37f0251cd6be0a6983d9a04193b773f86d31da1
SHA256d571ef33b0e707571f10bb37b99a607d6f43afe33f53d15b4395b16ef3fda665
SHA512b08053050692765f172142bad7afbcd038235275c923f3cd089d556251482b1081e53c4ad7367a1fb11ca927f2ad183dc63d31ccfbf85b0160cf76a31343a6d0