Analysis
-
max time kernel
1020s -
max time network
848s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/03/2025, 16:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://pixeldrain.com/u/TcV2BREC
Resource
win11-20250313-en
General
-
Target
https://pixeldrain.com/u/TcV2BREC
Malware Config
Signatures
-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Jigsaw family
-
Renames multiple (1519) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE 1 IoCs
pid Process 4212 drpbx.exe -
Loads dropped DLL 1 IoCs
pid Process 2096 msedge.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-976934595-4290022905-4081117292-1000\Software\Microsoft\Windows\CurrentVersion\Run\firefox.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Frfx\\firefox.exe" jigsaw.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
flow ioc 92 raw.githubusercontent.com 93 raw.githubusercontent.com 94 raw.githubusercontent.com 108 raw.githubusercontent.com 109 raw.githubusercontent.com 110 raw.githubusercontent.com 111 raw.githubusercontent.com -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_12104.1001.1.0_x64__8wekyb3d8bbwe\AppxManifest.xml drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.2012.21.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-32_altform-unplated_contrast-black.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.40978.0_x64__8wekyb3d8bbwe\Assets\contrast-white\MedTile.scale-100_contrast-white.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsNotepad_10.2102.13.0_x64__8wekyb3d8bbwe\Assets\contrast-white\NotepadAppList.targetsize-256_altform-lightunplated.png drpbx.exe File created C:\Program Files\Google\Chrome\Application\133.0.6943.60\VisualElements\SmallLogoBeta.png.fun drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\AppIcon.targetsize-30_contrast-black.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.BingWeather_1.0.6.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\WeatherSmallTile.scale-125_contrast-white.png drpbx.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\osmuxmui.msi.16.en-us.boot.tree.dat drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_1.0.38.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.targetsize-60_altform-lightunplated.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.21012.10511.0_x64__8wekyb3d8bbwe\Assets\OrientationControlInnerCircleHover.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCalculator_10.2012.21.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\CalculatorSmallTile.scale-125_contrast-white.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.42251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageAppList.targetsize-24_altform-unplated_contrast-white.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.42251.0_x64__8wekyb3d8bbwe\Assets\AppPackageWideTile.scale-200.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.PowerAutomateDesktop_1.0.65.0_neutral_split.scale-100_8wekyb3d8bbwe\Images\PowerAutomateSquare70x70Logo.scale-100.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarBadge.scale-200.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.41182.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-80_altform-unplated_contrast-black.png drpbx.exe File created C:\Program Files\7-Zip\Lang\is.txt.fun drpbx.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\proof.fr-fr.msi.16.fr-fr.tree.dat drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GamingApp_2105.900.24.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\Xbox_LargeTile.scale-100_contrast-white.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_10.2.41172.0_x64__8wekyb3d8bbwe\Assets\TipsMedTile.scale-100_contrast-white.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.PowerAutomateDesktop_1.0.65.0_neutral_split.scale-100_8wekyb3d8bbwe\Images\contrast-white\PowerAutomateSquare71x71Logo.scale-100.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.PowerAutomateDesktop_1.0.65.0_x64__8wekyb3d8bbwe\Images\contrast-black\PowerAutomateSquare50x50Logo.scale-125.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_12104.1001.1.0_x64__8wekyb3d8bbwe\Assets\AppTiles\StoreAppList.targetsize-36.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_1.0.6.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\WeatherLargeTile.scale-200_contrast-white.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_2.2106.2807.0_x64__8wekyb3d8bbwe\Assets\Store\Square150x150Logo.scale-200.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.40978.0_x64__8wekyb3d8bbwe\Assets\contrast-white\BadgeLogo.scale-200_contrast-white.png drpbx.exe File created C:\Program Files\VideoLAN\VLC\lua\http\images\Folder-48.png.fun drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_1.0.22.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\MapsAppList.targetsize-96_contrast-black.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.40978.0_x64__8wekyb3d8bbwe\Assets\contrast-black\SmallTile.scale-100_contrast-black.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingNews_1.0.6.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\NewsAppList.targetsize-64_contrast-white.png drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\plugins.js.fun drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.2012.21.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-20_altform-lightunplated_contrast-black.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\bg6_thumb.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\HxMailAppList.targetsize-20.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\LinkedInboxSmallTile.scale-200.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_11.2104.2.0_x64__8wekyb3d8bbwe\Assets\contrast-black\SnipSketchAppList.targetsize-60.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.32731.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-60_altform-unplated_contrast-black.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.2103.1172.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\contrast-white\FeedbackHubAppList.scale-125.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_1.0.6.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\WeatherAppList.targetsize-96_altform-lightunplated_contrast-black.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\ExchangeBadge.scale-200.png drpbx.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\client_eula.txt drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.PowerAutomateDesktop_1.0.65.0_neutral_split.scale-100_8wekyb3d8bbwe\Images\contrast-white\PowerAutomateSquare150x150Logo.scale-100.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailAppList.scale-200.png drpbx.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\duplicate.svg.fun drpbx.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\Alphabet.xml drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Todos_0.33.33351.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\Square310x310Logo.scale-100.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\OutlookMailLargeTile.scale-125.png drpbx.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\jvmticmlr.h drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.2012.21.0_x64__8wekyb3d8bbwe\Assets\Scientific.targetsize-20_contrast-black.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.2103.1172.0_x64__8wekyb3d8bbwe\Assets\MediumGray.png drpbx.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\TimeCard.xltx drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Yahoo-Dark.scale-300.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.40978.0_x64__8wekyb3d8bbwe\Assets\SplashScreen.scale-125.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\Images\Square44x44Logo.scale-100.png drpbx.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\ext\nashorn.jar.fun drpbx.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000027\assets\Icons\[email protected] drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.21012.10511.0_x64__8wekyb3d8bbwe\Assets\FileExtension.targetsize-80.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.12827.20400.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarWideTile.scale-200.png drpbx.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\forms_distributed.gif drpbx.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\Close2x.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_21.21030.25003.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-24_altform-unplated_contrast-white.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.2012.21.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.scale-200.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2020.503.58.0_x64__8wekyb3d8bbwe\Assets\CameraAppList.targetsize-72.png drpbx.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsTerminal_1.6.10571.0_x64__8wekyb3d8bbwe\Images\LockScreenLogo.scale-100.png drpbx.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-shared-components\fr\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-tokenized-card\es\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\wallet.bundle.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_888001498\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_1298563347\edge_driver.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_1298563347\shopping_iframe_driver.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\buynow_driver.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-hub\hu\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-mobile-hub\fr-CA\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-tokenized-card\zh-Hans\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-notification-shared\de\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\wallet-webui-560.da6c8914bf5007e1044c.chunk.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_888001498\hyph-bg.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_888001498\hyph-hr.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-ec\pt-PT\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-hub\ja\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-mobile-hub\ja\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-notification\nl\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-notification-shared\id\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-shared-components\zh-Hans\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_888001498\hyph-cu.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_1298563347\shopping_fre.html msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-notification\sv\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\wallet\wallet-notification-config.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\wallet_checkout_autofill_driver.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_888001498\hyph-af.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\crypto.bundle.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-hub\pt-BR\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\Wallet-Checkout\app-setup.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-ec\en-GB\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-notification-shared\en-GB\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\shopping_iframe_driver.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\wallet-crypto.html msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\wallet-webui-227.bb2c3c84778e2589775f.chunk.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_1841471771\_platform_specific\win_x64\widevinecdm.dll msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_52950708\typosquatting_list.pb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_888001498\hyph-sl.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_1003554533\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-mobile-hub\zh-Hant\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-shared-components\ja\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\wallet_donation_driver.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_1517265123\data.txt msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_1003554533\Part-NL msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-notification-shared\ar\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-tokenized-card\de\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_600148386\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_338262587\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_1298563347\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-ec\ar\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-notification-shared\it\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_888001498\hyph-da.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_888001498\hyph-ga.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_888001498\hyph-ta.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-ec\cs\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-notification-shared\zh-Hans\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-tokenized-card\fr-CA\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_1391362576\manifest.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\bnpl\bnpl.bundle.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-shared-components\th\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-tokenized-card\nl\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\wallet-webui-101.079f5d74a18127cd9d6a.chunk.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_1517265123\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-notification-shared\zh-Hant\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-shared-components\en-GB\strings.json msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133874797008346282" msedge.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-976934595-4290022905-4081117292-1000\{19A215F2-711B-4D7A-820B-97E1A8926259} msedge.exe Key created \REGISTRY\USER\S-1-5-21-976934595-4290022905-4081117292-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-976934595-4290022905-4081117292-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-976934595-4290022905-4081117292-1000_Classes\Local Settings OpenWith.exe -
NTFS ADS 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Frfx\firefox.exe\:Zone.Identifier:$DATA jigsaw.exe File created C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe\:Zone.Identifier:$DATA jigsaw.exe File opened for modification C:\Users\Admin\Downloads\Ransomware.Jigsaw.zip:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5404 msedge.exe 5404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 5520 OpenWith.exe 5520 OpenWith.exe 5520 OpenWith.exe 5520 OpenWith.exe 5520 OpenWith.exe 5520 OpenWith.exe 5520 OpenWith.exe 5520 OpenWith.exe 5520 OpenWith.exe 5520 OpenWith.exe 5520 OpenWith.exe 5520 OpenWith.exe 5520 OpenWith.exe 5868 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2096 wrote to memory of 5392 2096 msedge.exe 79 PID 2096 wrote to memory of 5392 2096 msedge.exe 79 PID 2096 wrote to memory of 4856 2096 msedge.exe 80 PID 2096 wrote to memory of 4856 2096 msedge.exe 80 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 6052 2096 msedge.exe 81 PID 2096 wrote to memory of 5428 2096 msedge.exe 82 PID 2096 wrote to memory of 5428 2096 msedge.exe 82 PID 2096 wrote to memory of 5428 2096 msedge.exe 82 PID 2096 wrote to memory of 5428 2096 msedge.exe 82 PID 2096 wrote to memory of 5428 2096 msedge.exe 82 PID 2096 wrote to memory of 5428 2096 msedge.exe 82 PID 2096 wrote to memory of 5428 2096 msedge.exe 82 PID 2096 wrote to memory of 5428 2096 msedge.exe 82 PID 2096 wrote to memory of 5428 2096 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://pixeldrain.com/u/TcV2BREC1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x2b4,0x7ffec004f208,0x7ffec004f214,0x7ffec004f2202⤵PID:5392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1804,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=2308 /prefetch:112⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2280,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=2276 /prefetch:22⤵PID:6052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2416,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=2424 /prefetch:132⤵PID:5428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3380,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:5376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3388,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4840,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=4948 /prefetch:142⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4900,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=4880 /prefetch:142⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5384,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=5420 /prefetch:142⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5436,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=5416 /prefetch:142⤵PID:5192
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.execookie_exporter.exe --cookie-json=11283⤵PID:5996
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5736,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=5760 /prefetch:142⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5736,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=5760 /prefetch:142⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6104,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=6100 /prefetch:142⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --always-read-main-dll --field-trial-handle=6072,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:5656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --always-read-main-dll --field-trial-handle=6448,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=6384 /prefetch:12⤵PID:5828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --always-read-main-dll --field-trial-handle=6452,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --always-read-main-dll --field-trial-handle=6604,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=6428 /prefetch:12⤵PID:5964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --always-read-main-dll --field-trial-handle=6700,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=6844 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5760,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=7088 /prefetch:142⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --always-read-main-dll --field-trial-handle=5764,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=3540 /prefetch:12⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5824,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=7080 /prefetch:142⤵
- NTFS ADS
PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6884,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=1460 /prefetch:142⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7224,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=7188 /prefetch:142⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4492,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=4500 /prefetch:142⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6560,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=6812 /prefetch:142⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6892,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=5192 /prefetch:142⤵PID:236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6532,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=5012 /prefetch:142⤵PID:5348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5448,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=5416 /prefetch:102⤵
- Suspicious behavior: EnumeratesProcesses
PID:5404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5492,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=5324 /prefetch:142⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6276,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=4788 /prefetch:142⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4988,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=4864 /prefetch:142⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=2752,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=6808 /prefetch:142⤵PID:4748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5240,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=4792 /prefetch:142⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5644,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=5608 /prefetch:142⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5904,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=7232 /prefetch:142⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=2988,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=6124 /prefetch:142⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5264,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=7200 /prefetch:142⤵PID:5264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=760,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=5056 /prefetch:142⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4116,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=6192 /prefetch:142⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6156,i,7993709222631011407,4324826543460004114,262144 --variations-seed-version --mojo-platform-channel-handle=7172 /prefetch:142⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:1112
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5900
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5520
-
C:\Users\Admin\Downloads\Ransomware.Jigsaw\jigsaw.exe"C:\Users\Admin\Downloads\Ransomware.Jigsaw\jigsaw.exe"1⤵
- Adds Run key to start application
- NTFS ADS
PID:5368 -
C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe"C:\Users\Admin\AppData\Local\Drpbx\drpbx.exe" C:\Users\Admin\Downloads\Ransomware.Jigsaw\jigsaw.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4212
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5868
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt.fun
Filesize32KB
MD5829165ca0fd145de3c2c8051b321734f
SHA1f5cc3af85ab27c3ea2c2f7cbb8295b28a76a459e
SHA256a193ee2673e0ba5ebc5ea6e65665b8a28bd7611f06d2b0174ec2076e22d94356
SHA5127d380cda12b342a770def9d4e9c078c97874f3a30cd9f531355e3744a8fef2308f79878ffeb12ce26953325cb6a17bc7e54237dfdc2ee72b140ec295676adbcb
-
Filesize
160B
MD5580ee0344b7da2786da6a433a1e84893
SHA160f8c4dd5457e9834f5402cb326b1a2d3ca0ba7e
SHA25698b6c2ddfefc628d03ceaef9d69688674a6bc32eb707f9ed86bc8c75675c4513
SHA512356d2cdea3321e894b5b46ad1ea24c0e3c8be8e3c454b5bd300b7340cbb454e71fc89ca09ea0785b373b483e67c2f6f6bb408e489b0de4ff82d5ed69a75613ba
-
Filesize
283KB
MD52773e3dc59472296cb0024ba7715a64e
SHA127d99fbca067f478bb91cdbcb92f13a828b00859
SHA2563ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7
SHA5126ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262
-
Filesize
86B
MD51d726d00a7033a5dab753d6012eee269
SHA10eec68c618a8c4d44299dfb8415b9add0eb03863
SHA256fcce59c5531bcd9542bc0fcd0427669e9527e71384a83a31199d91f157a01928
SHA512c50f27a7ed7f26f928fe740d4086c863e7a3c5e86d85cd99ccb83534e6d58b662cd0e4608ac4729774d7028cd4b62e38349e94c67c80a8ecec9c5d637b1b0a3e
-
Filesize
280B
MD5a9d248b3bc52122d400056f964018866
SHA16eedde7a90165b48fa99a122c49d21ff78ded33e
SHA256d94d59d0d4b52c2d8957188401757d6e7443acf86123ce8927dca5b2f66f8371
SHA512515f48271b114303ac72ae6a30cbf5323f4464d5640107e596e74f407e80d2f9e952c6106e7789225b9f24fba01219cf11769d1247a255bb3b2c1345d10a1815
-
Filesize
280B
MD5623d0eb0c4a36135a270354557aae018
SHA1864d2599207960d2aedba50ada4a3b1b2a5a8b87
SHA25652b485675b621aa85ff48f5cef95a29f845616b63d9a683bb7503f324cee3d03
SHA512685e69631c295fee7ddb6bedccb9ddab7ac0fd5d5476f5236ee22d7b8af871f9705be8f30ec71b0bfdeabc69927be677942bf8bfcfbdb7ed1151e7dfe80105ee
-
Filesize
21KB
MD5577c02fbb05b84ef1ce087cfc7ca6d19
SHA181c413d737f69bd2b14f6ce1ce08c53a51cc8372
SHA25657b6f6af21029fd9bc791c6be4ceca7ec0462f02a0350c360588fd04f789f57d
SHA51229ad22eb6a369ebb09eddfe289af3e355888ccd4683b2cde909e28701b8809f941a2214999680f91e1acf7e79759d98b5ca3708372281f815d9caf27e7189993
-
Filesize
331B
MD540ef8f79c59d86bba8c5e743505b9c2c
SHA13a84d92a3ba4cda58c07787d1da7186592417b8c
SHA256379c5a56bec1ff347db678a76ec69d8dc0e745a114eefd3702b8fff7f5f2d52a
SHA5128d513545fe70801fb9a64cb41ad61d2b24195e11ea2eaf2495f2b32bdda591f75fa26ab4a28ccbc8c90b5625fd330452a11222acd28e4eb157f6deba07126a55
-
Filesize
331B
MD5f624595d8cbf850511217c9c1d1fcc5c
SHA147ef9fdaf68b7dafa78297459126d4ca25e2030f
SHA2568e476d5e372d741be7e4dcde215f34a772363c66a4a8ce1c6bbc2d79f9ddb284
SHA51245de18b8ad02a68c0c37e3a7e72150b097ae2d4a86e53b69165f4b0a5e68a6b6708eb20b943c81264cc2db42bdb8750787f43162b289ef2e9ccf2f7bd0970a89
-
Filesize
334B
MD5e77a53b48ca09174758c972f076bed1e
SHA1c5a0fac6c35b0ee280e1155aeca0728fc03278a6
SHA256a4f9134eb30a5474c477eddb798bbb067187e4a0a2bca133bfbdb0879ca5fd07
SHA5120539198c7cef3a5482de48fbbd91a4984767d7b384938c6d49796d54c03af391dee89a55e007a25e567676ed914bf17f34d48e7fd86c1b68bad9ff626dff9665
-
Filesize
239KB
MD53ad6374a3558149d09d74e6af72344e3
SHA1e7be9f22578027fc0b6ddb94c09b245ee8ce1620
SHA25686a391fe7a237f4f17846c53d71e45820411d1a9a6e0c16f22a11ebc491ff9ff
SHA51221c21b36be200a195bfa648e228c64e52262b06d19d294446b8a544ff1d81f81eb2af74ddbdebc59915168db5dba76d0f0585e83471801d9ee37e59af0620720
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize6KB
MD51e7d3914c3ba7bb3ef026d3d886201ea
SHA12f00f5b97a83fc9db514cde273e502f5255dae7a
SHA256d6220cf496d769fdfcee86b2cfb811a6f38a6cfb82660ad596390b8d9f72542d
SHA5122a7d9351860af0a35ac1373a714d0c46bc06eed6a8d46784cdbaf1bff88c381ad58d3111df91edf13486661050124ccaba4f555f1eaaada233de7810063aa63b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe582035.TMP
Filesize3KB
MD59454672b07baf30e3e3ba674a4491b3d
SHA1f2a1906e6e20b6c92fe3272a37ab353096fa9e2e
SHA256b1df2ef7c1fa90e8a6e155b2a654dae6bf6f6e5189c416191085edc0ea3a7886
SHA512958418cb7e5b790e76e3fe34a8a629eee9f2c8f2346dafafce1162961ef1bcf749174a450124de75593df95b71d6755fef324c2929f1d739c4059c4329710866
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
3KB
MD5975ec6bf7bc23aec2d70e513d232a516
SHA1f4a709b503b22adece1220e4ebec0b6cb28a076f
SHA256a19d71050b4c5f277e5dd1f998fcb9eb7ecaa41a4959037720b82cb20e36de7f
SHA5127998c4784ea64ac1f7e03c7f856e423c4ecc39c1d1b9baeec2bde305ebeb535b2494071531ffac60b6e924525cc8f337693a2c76c873836e6476b5c51d8c3296
-
Filesize
3KB
MD524fc10e8067b20cce432752061ebcacb
SHA15eec4b64102b06c22248287c3a21d38b86b99bf1
SHA25638634d059b37bd3ec30838e7c7c7771d63a5f48a9d44f7a4ed72745bb06a87b5
SHA512f6df718223a693f7ba598e7e7d38132f15020ad0b2c8688c042cd58b6aeb0ea5c157ee8d5532824db53a571c18f83bb755ae4d11eb77c4edbd392334533d3eea
-
Filesize
3KB
MD5748c8931a461e7c611d0da5630789c54
SHA104ae55c1b3347abf3c580020f1b6626b1594131c
SHA2561ddda7d444be500d980e38b565cf10dfc896ce9b17ce3ddd1ba0dc1d4fde8374
SHA512654b0ea2397f04e21fbf765534f5dde0ddf9ad08dadecee69dddb8399bdc74480995c2d9e8ecee7849638f68ef0e9655e3542c32c9211e534041e274ba198135
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
211B
MD578145907308acd1dbdce00bf162cab5a
SHA155ff8679101456a8cddeb2ad073d46ede4163e43
SHA256d390ca3bb47530f086438fc53933e25ffda3043af7a91fb2427c0490986ca4f5
SHA512241b6ab9fedbe689bbdeb5ed4f4b17302a8aa202d49cd822174327b6eac6b1ac4666584dbcdbfa7f1de502a33929f6746241a7ee31a22b8be3ef284d81358d0e
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
18KB
MD59ba1788d01f775f0756156df1da9c441
SHA1abfcb9983144535baae388b1cc8528a024ad8840
SHA2563d2ac6f5719b0b6f1eab0450045db040c49b0bb85f2de063e50870510ecde8d5
SHA5128fc59b58ac7faec1b39dfdf993a9abd3003682efc9c65ce8c0c63c517d6a3d645a5a48b1c9aa3766c20efc5e49c8c7e81e5d7824d774f0bf047c75119554b7fe
-
Filesize
19KB
MD55ae04ba3471ac57cb05f6ce0c0173ad6
SHA15b071c0b70d9e28f097d618bef9a7be3c68b9446
SHA256e572eef811eda247283c1b65deda7d96c869de3485a6a07a2b53ca8ee4eae73f
SHA5128b0fb5324b175cf15e434cc7b4429fb589d915bd48f4b825121031cf7caa781a34c6f51a5dc5cd0a84bd0602579290b12938fe35ce7ec38eac393fd17d886167
-
Filesize
19KB
MD5a10da8f973472dbc8b56ece864a13667
SHA197ced29475cdbd4e13a1f9030b7eb91d183f021b
SHA256834b0598c5fa4eef44935377c3cb5059f152ac95657218bafa94a39bb0330c77
SHA512f47dbef3537d49309a33862944b794abd22eeea558ad13b86d4d81cdadd19da3f70a78d66153936d4ccfee84d61f37c7077ecc55a29940e99b50645863638c8a
-
Filesize
17KB
MD5c9a9dc1ad9c925f37d55e2ee7e4a3887
SHA16560c93b78689f03c76607e876fc80dffdae9ff0
SHA2564d4a78232c72e384696ee8411def826cbe8f51062e3f24286dd410891180d697
SHA51223c1969b92a16bbfc5639d78d4d29ae4c9a7f1cc35a04e4bd372d0fa2c82a3a5f28a498afdf98e5b095525c97268491cf05e236dd8f827cccbcbf53ce064553a
-
Filesize
37KB
MD58b1b20668d4654daa2ec4eebfd4c8711
SHA1bc48b88452f8bd476c2af2f0d28b56a776a045ec
SHA2560d4cab4ee8ec7bd92851df6f4a93afdbbebd60001951e4d18beb98bd8f4a40f0
SHA512efcfb08a569423f1aa7ed67415d45a44e8dd2913710fc4c21b3538c40577b1dda9e6a8c3d9ccd00c9336149066f88544497a7cd893d0f75dce4077046a71a64a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\cc6df4d9-21a0-415c-a960-a810ec9b1432\index-dir\the-real-index
Filesize2KB
MD5aee7d6e877191ffa9f91bc214d2733b7
SHA1f35ff789eb25eb59adee686a88272fad1863e24f
SHA256f0afe48abe9826be3418250743ac0204523e2226e4bd7c06af02f909cfc481b8
SHA51253736414d6f577661324935b51f8c75727e604cd5913e0ee5eaa1d89b266032ada09127ff17ee953580e451dd82884d0e2153440e1e91b4e62b2c284b3e77144
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\cc6df4d9-21a0-415c-a960-a810ec9b1432\index-dir\the-real-index~RFe5c1303.TMP
Filesize2KB
MD538d87c9458d5cf6e9849e97b5adc78d3
SHA1feeb2f8e34518263e714ab5d9fb3c37efc778340
SHA256033d032b79ef8a040db36582f84ea9ddce1eb133e0c386c717aa5b5fc5fa4bd4
SHA512ed4f43b5f1561df27069cf81461720b67cffb7b3cf1a2d83900f39bbfd17aee85bedf009d0f2ed64549ec4fe459e8ed6bb191d10ec13045f27f3cd680b440562
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize253B
MD54a1903e07ea6afc895096e8fc6a12744
SHA101987ec66e59040bdb5f3e7691019a55af2700ee
SHA25667ae1ac23b302a582c88ebbbca74d553918a76f64b0e3d85fb546020f14ffab6
SHA5121dcae7f937c583417e1874562a483c219a98178901e3fa01160217f82398f5f3d0be940b0971601ac14b8cf1cc1f37fb2a0996e883614269a4e5308a58e2a318
-
Filesize
22KB
MD583cff158b8fbbdb69ef869b6833cde7e
SHA10d70da7c18889fcaedae3a1fd0d36e55bb54dd87
SHA25616382452703e115311c9c153fd89b1a1d8847af57a7809e6bdcb01e8f4317f6a
SHA5124dc3a0b8053517401118ba32714ab49f74c347f752716460ed1ad133820619ace4b7247cf802fee4d45438b018c38c5b78115b7cb1ed7efecc12a61a889ae810
-
Filesize
113KB
MD560beb7140ed66301648ef420cbaad02d
SHA17fac669b6758bb7b8e96e92a53569cf4360ab1aa
SHA25695276c09f44b28100c0a21c161766eda784a983f019fc471290b1381e7ed9985
SHA5126dfa4eca42aea86fba18bc4a3ab0eed87948ea1831e33d43426b3aca1816070ecb7fd024856ad571ca2734214a98cc55e413502b3deef2c4a101228a7377e9d5
-
Filesize
23KB
MD5a13a4eba9278ee717f1afbfeba59d25c
SHA148f0cdb65f7f6cba594db94b842cd13d6d0913ae
SHA256abe96ee4c588688f05741cbbdc011d7a20ff38f570c7ddf2acac63dd06a45884
SHA512dcd82d0984bbf01b4caa549af8cfff1a9b46e4ff523c3416c83b8bc15947967e2e23aab88ed9f3820241a0321b22f8992deca3f450b6fb558f244b7b4b765337
-
Filesize
904B
MD570dad42c64c44669ccf20353e2c285e2
SHA1389fe3e909fb4030fa466a52834bbca1969bc52e
SHA25621d19042ec5736c4d8fac205343752033009e2a8d2c99a931d49db0c978c8614
SHA51262b72aad0fda7384f51968662c7e526177c9cbed16cd9d0fc832d0d9a60c7dfbc325f984dd4214e3333ce76be789bbb72ae17972d579b9525b420c2449121611
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\f4540832-ceac-493f-8cec-be035e8e55e9.tmp
Filesize469B
MD5b06ba5105c5b9c2496684d7dd35e0117
SHA1289782416077197fba285b80272c3009b07e4cc1
SHA2564b89d4f246c69fe2fb61fe4b10a7d46553a7ec158d9122e0170c930f8fd660c3
SHA512453b2fd57056859276a079630ae3bc780c8df676a2a8cc5ba9ab0eadf593ce90c09e8e79fbfd5ab38b78139849484c28fb424c51d202a7bbdbc804be8ca1ee14
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18346.18345.1\json\wallet\wallet-checkout-eligible-sites.json
Filesize23KB
MD516d41ebc643fd34addf3704a3be1acdd
SHA1b7fadc8afa56fbf4026b8c176112632c63be58a0
SHA256b962497993e2cd24039474bc84be430f8f6e6ab0f52010e90351dc3ff259336c
SHA5128d58aa30613a2376ccc729278d166a9b3ec87eca95544b9dec1ee9300e7dd987326ea42d05dca3f1cc08186685f2fdaf53c24fd2b756c1ed9f2b46436689dc74
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18346.18345.1\json\wallet\wallet-notification-config.json
Filesize804B
MD54cdefd9eb040c2755db20aa8ea5ee8f7
SHA1f649fcd1c12c26fb90906c4c2ec0a9127af275f4
SHA256bb26ce6fe9416918e9f92fcc4a6fe8a641eceea54985356637991cf6d768f9fd
SHA5127e23b91eab88c472eec664f7254c5513fc5de78e2e0151b0bcc86c3cd0bf2cb5d8bb0345d27afdd9f8fcb10be96feaa753f09e301fa92b8d76f4300600577209
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18346.18345.1\json\wallet\wallet-stable.json
Filesize81KB
MD52e7d07dadfdac9adcabe5600fe21e3be
SHA1d4601f65c6aa995132f4fce7b3854add5e7996a7
SHA25656090563e8867339f38c025eafb152ffe40b9cfa53f2560c6f8d455511a2346a
SHA5125cd1c818253e75cc02fccec46aeb34aeff95ea202aa48d4de527f4558c00e69e4cfd74d5cacfcf1bcd705fe6ff5287a74612ee69b5cc75f9428acfbdb4010593
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18346.18345.1\json\wallet\wallet-tokenization-config.json
Filesize34KB
MD5ae3bd0f89f8a8cdeb1ea6eea1636cbdd
SHA11801bc211e260ba8f8099727ea820ecf636c684a
SHA2560088d5ebd8360ad66bd7bcc80b9754939775d4118cb7605fc1f514c707f0e20d
SHA51269aff97091813d9d400bb332426c36e6b133a4b571b521e8fb6ad1a2b8124a3c5da8f3a9c52b8840152cf7adbd2ac653102aa2210632aa64b129cf7704d5b4fa
-
Filesize
49KB
MD5c146c836ad1095fdc6fb706bb1ef4fd5
SHA1bfa0d76572df73b14acde36dc3cde6002e0b1ceb
SHA256ff0008258fdb20d5b2e49a66476d0339934309114823602a7f1b81bca6bb4767
SHA51286165635c49b5636ba559df62499ac93bff98cff11d4f0e1ef48091636ade9587b25ff7098b33949583942e2a85d293bf29758d8fa56420b633826b4332ddbf0
-
Filesize
49KB
MD5b199baeda7f711bc03521c79e7f95535
SHA101234641bb88b29418ab6708f994ad85b23e06cf
SHA256acf0c035ac0fa8dd6f37efd2016ffc898ae9a84b3706a02923ba800930798288
SHA512f3e0031c504f12dcd989092e7caaa331cfe615e992802a8a6281c90f9d271495a6e51a68d5733f34cb0b0618353108b8bfb78f8e233e0cc41074874f9845c900
-
Filesize
40KB
MD5cc0e2b8eaf387cf6e29759d01ee8e2fd
SHA1da4edea0e1b5ee04322ffcf2bb347eb56408a175
SHA256230154275c4bbff7982d28c4a3f2777c23dda1102b476927327167ced852121e
SHA51253e3153931daddd05d76e27cbe926050321686fe42ad19dcc2ffd6ee520503f917f988c5ee310f8b2f529877c6ad0a11c5333efaebda012721798b3174d1e636
-
Filesize
55KB
MD54176ed954715a61bf020568450fa3675
SHA1372c634be4710428b1123b7f4663d49cb2177b2f
SHA25640f786aaf1394d5f35f3ac9017ba6aaa8a42e50d22d18a9d4d22edaa27faa4cd
SHA512522179005bac71395841b6c9be70576f1de57e09b81b575815545e58dd9fcfa62efe5e47b93fce37504b13d0c6759c8071fcdb41d28193a599a2f262d881acbe
-
Filesize
55KB
MD552e1aa425d24b0853336392a5c0e31d2
SHA1e73256aeca3e722361d83f7c276191d3bc27d7ce
SHA2565703b04bd2eee3e783a5e97608e9741638fbf71ff73ab13e664f10b793e34443
SHA5129d2969a3983ef27db1b12107ab5470f36c42c518dcdc67691a1f8db0fd7604d9a659dcee776b78fab021ff416a3d373ce6df8f780af4381d4af7d6ae57395642
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Subresource Filter\Unindexed Rules\10.34.0.57\Filtering Rules
Filesize1.8MB
MD5d7c9c6d2e1d9ae242d68a8316f41198c
SHA18d2ddccc88a10468e5bffad1bd377be82d053357
SHA256f215127185b2ee6b01e12b6ca75d3e5c4e454598dd4aed36124ae13d59afd547
SHA5127fd14824e9200dd99e1fd2cee402656dc0cfc3d0a60058c5eb05c68e9e65b7f0b47e550fb4d6c2b59eba204dbf3ef9e69dc9723b43a9b3ccd5412d6b77715fc3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Subresource Filter\Unindexed Rules\10.34.0.57\LICENSE
Filesize24KB
MD5aad9405766b20014ab3beb08b99536de
SHA1486a379bdfeecdc99ed3f4617f35ae65babe9d47
SHA256ed0f972d56566a96fb2f128a7b58091dfbf32dc365b975bc9318c9701677f44d
SHA512bd9bf257306fdaff3f1e3e1fccb1f0d6a3181d436035124bd4953679d1af2cd5b4cc053b0e2ef17745ae44ae919cd8fd9663fbc0cd9ed36607e9b2472c206852
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.3.26.1\typosquatting_list.pb
Filesize628KB
MD57c411ccffc2c011ba155c4bae74c9217
SHA16e0f96399bea0c45b188caf7c11b2549a2bbb551
SHA25671529860ca9874c1b29017b1b4846986d14f51f9f60dcbd8c7af7559cc0e0ac8
SHA512cbeba7735948e9565f4d7ee462366693a6915758486c5d7a84a4d6eaf0bcac948f579e91d883e1d6ffa27268acd10db86f02d7f9111837c757349e8cfa8fc0da
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Well Known Domains\1.2.0.0\well_known_domains.dll
Filesize572KB
MD5f5f5b37fd514776f455864502c852773
SHA18d5ed434173fd77feb33cb6cb0fad5e2388d97c6
SHA2562778063e5ded354d852004e80492edb3a0f731b838bb27ba3a233bc937592f6e
SHA512b0931f1cae171190e6ec8880f4d560cc7b3d5bffe1db11525bd133eaf51e2e0b3c920ea194d6c7577f95e7b4b4380f7845c82eb2898ad1f5c35d4550f93a14b6
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.AccountsControl_cw5n1h2txyewy\Settings\settings.dat.fun
Filesize8KB
MD5f22599af9343cac74a6c5412104d748c
SHA1e2ac4c57fa38f9d99f3d38c2f6582b4334331df5
SHA25636537e56d60910ab6aa548e64ca4adafdcabde9d60739013993e12ba061dfd65
SHA5125c8afc025e1d8342d93b7842dc7ef22eca61085857a80a08ba9b3f156ee3b814606bb32bc244bd525a7913e7915bdf3a86771d39577f4a1176ade04dc381c6d4
-
Filesize
16B
MD58ebcc5ca5ac09a09376801ecdd6f3792
SHA181187142b138e0245d5d0bc511f7c46c30df3e14
SHA256619e246fc0ac11320ff9e322a979948d949494b0c18217f4d794e1b398818880
SHA512cec50bfc6ad2f57f16da99459f40f2d424c6d5691685fa1053284f46c8c8c8a975d7bcb1f3521c4f3fbdc310cf4714e29404aa23be6021e2e267c97b090dc650
-
Filesize
124B
MD56f47633611026823a8526d21431d9e6b
SHA172e91c7300b0b5adf765869b8bd9c120cb65fc22
SHA256a3a77ffca2f9a81f80c3cd4448500ab1d4802609c4cf40626372e9bac60e9ce4
SHA51247b036d0363aa20b34c27199f8569931bad903ffdd031b8446285969dd8c0e04ae4f4682a463a718321905723f3dac43b5ad3e4f0ccd66c5332238c19d2f3fe3
-
Filesize
116B
MD52188c7ec4e86e29013803d6b85b0d5bb
SHA15a9b4a91c63e0013f661dfc472edb01385d0e3ce
SHA256ac47cc331bb96271da2140941926a8accc6cb7599a6f3c17bd31c78f46709a62
SHA51237c21eaff24a54c2c7571e480ff4f349267e4404111508f241f54a41542ce06bcde4c830c6e195fc48d1bf831ed1fe78da361d1e43416cfd6c02afa8188af656
-
Filesize
145B
MD592d8fd80d37e7f7ceab3b7f7e9ade68a
SHA1f350b2460c3d9a9dcf1ed3fb965f727503a7944b
SHA2562262c642067206eb885632bcfd0e12238155a14c98fd46be587c852471514513
SHA5128112d4bd7256726fe63dea0eedf8c274f90424d29ee3cc4c360ba0c54ccc1d07ef36faf1a2fe19d1aea1447dd5a6ba6d2db0607161c486e882bcb3c01885238a
-
C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\Notification\notification_fast.bundle.js.LICENSE.txt
Filesize551B
MD57bf61e84e614585030a26b0b148f4d79
SHA1c4ffbc5c6aa599e578d3f5524a59a99228eea400
SHA25638ed54eb53300fdb6e997c39c9fc83a224a1fd9fa06a0b6d200aa12ea278c179
SHA512ca5f2d3a4f200371927c265b9fb91b8bcd0fbad711559f796f77b695b9038638f763a040024ed185e67be3a7b58fab22a6f8114e73fdbd1cccdda6ef94ff88f3
-
C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\Tokenized-Card\tokenized-card.bundle.js.LICENSE.txt
Filesize1KB
MD58595bdd96ab7d24cc60eb749ce1b8b82
SHA13b612cc3d05e372c5ac91124f3756bbf099b378d
SHA256363f376ab7893c808866a830fafbcd96ae6be93ec7a85fabf52246273cf56831
SHA512555c0c384b6fcfc2311b47c0b07f8e34243de528cf1891e74546b6f4cda338d75c2e2392827372dc39e668ed4c2fd1a02112d8136d2364f9cab9ee4fa1bd87f5
-
C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2096_133353270\json\i18n-tokenized-card\fr-CA\strings.json
Filesize2KB
MD5cd247582beb274ca64f720aa588ffbc0
SHA14aaeef0905e67b490d4a9508ed5d4a406263ed9c
SHA256c67b555372582b07df86a6ce3329a854e349ba9525d7be0672517bab0ac14db5
SHA512bf8fa4bd7c84038fae9eddb483ae4a31d847d5d47b408b3ea84d46d564f15dfc2bae6256eac4a852dd1c4ad8e58bc542e3df30396be05f30ed07e489ebe52895
-
Filesize
121B
MD516f004af39a3675a73f5c15f6182a293
SHA1e7027edbadfd881e03d8a592ae661a985fd89cd7
SHA2564e5ef1851bc910ceeb59a63bb53725cf5d8149feff9483e960b54cc26fdc419b
SHA5128ef0d80259b5a38424676918f07238a76c527b643267008999dc3b2cff5c93e29ae85cbf0605f0d0b4f880fd6ae96254ebd30e5b80097eea95f5d27b5d461ff6
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
53B
MD522b68a088a69906d96dc6d47246880d2
SHA106491f3fd9c4903ac64980f8d655b79082545f82
SHA25694be212fe6bcf42d4b13fabd22da97d6a7ef8fdf28739989aba90a7cf181ac88
SHA5128c755fdc617fa3a196e048e222a2562622f43362b8ef60c047e540e997153a446a448e55e062b14ed4d0adce7230df643a1bd0b06a702dc1e6f78e2553aadfff
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
1003B
MD5578c9dbc62724b9d481ec9484a347b37
SHA1a6f5a3884fd37b7f04f93147f9498c11ed5c2c2d
SHA256005a2386e5da2e6a5975f1180fe9b325da57c61c0b4f1b853b8bcf66ec98f0a0
SHA5122060eb35fb0015926915f603c8e1742b448a21c5a794f9ec2bebd04e170184c60a31cee0682f4fd48b65cff6ade70befd77ba0446cc42d6fe1de68d93b8ea640
-
Filesize
76B
MD5ba25fcf816a017558d3434583e9746b8
SHA1be05c87f7adf6b21273a4e94b3592618b6a4a624
SHA2560d664bc422a696452111b9a48e7da9043c03786c8d5401282cff9d77bcc34b11
SHA5123763bd77675221e323faa5502023dc677c08911a673db038e4108a2d4d71b1a6c0727a65128898bb5dfab275e399f4b7ed19ca2194a8a286e8f9171b3536546f
-
Filesize
118B
MD586095c966115d8fbabfe3e7496461e73
SHA19f6af2a9e4608c25b5c9257acdf77ba9838abc1d
SHA2569313c1c29918e4a75e85b3146647555080286d61517f0ac9c62c1993e274a6a6
SHA51251970ae96e6af2a2dbf086ea25a7ec6912a76954346dc85c885e6fd81128699abb14b368b09dd18c5d34183734fc6cfc8dcf0db03b916cd1dc21af7180653005
-
Filesize
141B
MD5811f0436837c701dc1cea3d6292b3922
SHA14e51a3e9f5cbf8c9c96985dabe8ffc2de28dae87
SHA256dbfb38a16e33a39c35ac50bd81782e4608be14954f1df69ac8272c0b9ce87a5d
SHA51221e7bf2f8333b2900bcbcb871ede14684073249597d105095dc7d3f101e7ccc326068732f11d4a167365f245a3f2205793f520c7666d7f948e70919b40b43d35
-
Filesize
703B
MD58961fdd3db036dd43002659a4e4a7365
SHA17b2fa321d50d5417e6c8d48145e86d15b7ff8321
SHA256c2784e33158a807135850f7125a7eaabe472b3cfc7afb82c74f02da69ea250fe
SHA512531ecec11d296a1ab3faeb2c7ac619da9d80c1054a2ccee8a5a0cd996346fea2a2fee159ac5a8d79b46a764a2aa8e542d6a79d86b3d7dda461e41b19c9bebe92
-
Filesize
687B
MD50807cf29fc4c5d7d87c1689eb2e0baaa
SHA1d0914fb069469d47a36d339ca70164253fccf022
SHA256f4df224d459fd111698dd5a13613c5bbf0ed11f04278d60230d028010eac0c42
SHA5125324fd47c94f5804bfa1aa6df952949915896a3fc77dccaed0eeffeafe995ce087faef035aecea6b4c864a16ad32de00055f55260af974f2c41afff14dce00f3
-
Filesize
141KB
MD5677edd1a17d50f0bd11783f58725d0e7
SHA198fedc5862c78f3b03daed1ff9efbe5e31c205ee
SHA256c2771fbb1bfff7db5e267dc7a4505a9675c6b98cfe7a8f7ae5686d7a5a2b3dd0
SHA512c368f6687fa8a2ef110fcb2b65df13f6a67feac7106014bd9ea9315f16e4d7f5cbc8b4a67ba2169c6909d49642d88ae2a0a9cd3f1eb889af326f29b379cfd3ff
-
Filesize
82B
MD52617c38bed67a4190fc499142b6f2867
SHA1a37f0251cd6be0a6983d9a04193b773f86d31da1
SHA256d571ef33b0e707571f10bb37b99a607d6f43afe33f53d15b4395b16ef3fda665
SHA512b08053050692765f172142bad7afbcd038235275c923f3cd089d556251482b1081e53c4ad7367a1fb11ca927f2ad183dc63d31ccfbf85b0160cf76a31343a6d0