Overview
overview
7Static
static
3JaffaCakes...77.exe
windows7-x64
3JaffaCakes...77.exe
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$R0.exe
windows7-x64
6$R0.exe
windows10-2004-x64
6StartPage/$R0.html
windows7-x64
3StartPage/$R0.html
windows10-2004-x64
4StartPage/Local/ie.js
windows7-x64
3StartPage/Local/ie.js
windows10-2004-x64
3StartPage/...e.html
windows7-x64
3StartPage/...e.html
windows10-2004-x64
4StartPage/...k.html
windows7-x64
3StartPage/...k.html
windows10-2004-x64
4StartPage/...x.html
windows7-x64
3StartPage/...x.html
windows10-2004-x64
4StartPage/Local/wk.js
windows7-x64
3StartPage/Local/wk.js
windows10-2004-x64
3StartPage/...x.html
windows7-x64
3StartPage/...x.html
windows10-2004-x64
4install_fl...er.exe
windows7-x64
7install_fl...er.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8a5531c932ba8def563cab782c651177.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8a5531c932ba8def563cab782c651177.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20250207-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral13
Sample
$R0.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
$R0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
StartPage/$R0.html
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
StartPage/$R0.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
StartPage/Local/ie.js
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
StartPage/Local/ie.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
StartPage/Local/iframe.html
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
StartPage/Local/iframe.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
StartPage/Local/iframe_wk.html
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
StartPage/Local/iframe_wk.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
StartPage/Local/index.html
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
StartPage/Local/index.html
Resource
win10v2004-20250313-en
Behavioral task
behavioral25
Sample
StartPage/Local/wk.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
StartPage/Local/wk.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
StartPage/Selector/index.html
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
StartPage/Selector/index.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
install_flash_player.exe
Resource
win7-20250207-en
Behavioral task
behavioral30
Sample
install_flash_player.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20250314-en
General
-
Target
StartPage/$R0.html
-
Size
7KB
-
MD5
bdc5a933dd11a46ba1881a7446bdd2c6
-
SHA1
03547b50e393b564fb7494027fe3a364018e1985
-
SHA256
2cb9c99f39635d2905be12cf17167628075aaea33d2da58fee0370f14f894e22
-
SHA512
17b98eb6296aab9d20b5850a9e31998c7f983b587170272f13df2a01f42e526e2d5b7bf7398e0ef0e748446e9a3417675a3a3e6ed557da227b36205cb547596d
-
SSDEEP
192:7uEFsHp4giMi03LcioiE3rj0i4iQQe28F:7RFsJ4giMi03LcioiE3Ei4iQQv8F
Malware Config
Signatures
-
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping3340_95706640\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3340_300116709\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3340_300116709\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3340_1850749559\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3340_633714696\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3340_633714696\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3340_95706640\nav_config.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3340_300116709\office_endpoints_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3340_300116709\smart_switch_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3340_1850749559\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3340_633714696\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3340_95706640\manifest.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876101143323252" msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-805952410-2104024357-1716932545-1000\{4F51C4DA-D050-484D-8B93-EF995A4C71BB} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3640 msedge.exe 3640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe 3340 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3340 wrote to memory of 4768 3340 msedge.exe 87 PID 3340 wrote to memory of 4768 3340 msedge.exe 87 PID 3340 wrote to memory of 1328 3340 msedge.exe 88 PID 3340 wrote to memory of 1328 3340 msedge.exe 88 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 224 3340 msedge.exe 89 PID 3340 wrote to memory of 1380 3340 msedge.exe 90 PID 3340 wrote to memory of 1380 3340 msedge.exe 90 PID 3340 wrote to memory of 1380 3340 msedge.exe 90 PID 3340 wrote to memory of 1380 3340 msedge.exe 90 PID 3340 wrote to memory of 1380 3340 msedge.exe 90 PID 3340 wrote to memory of 1380 3340 msedge.exe 90 PID 3340 wrote to memory of 1380 3340 msedge.exe 90 PID 3340 wrote to memory of 1380 3340 msedge.exe 90 PID 3340 wrote to memory of 1380 3340 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\StartPage\$R0.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2b8,0x7fff4e52f208,0x7fff4e52f214,0x7fff4e52f2202⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1928,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=2740 /prefetch:32⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2700,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=2696 /prefetch:22⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2348,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3496,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=3552 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3528,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4208,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=4420 /prefetch:12⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4196,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=4488 /prefetch:22⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5220,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=3656 /prefetch:82⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5044,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=5384 /prefetch:82⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5488,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=3648 /prefetch:82⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5388,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=3476 /prefetch:82⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5948,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=5972 /prefetch:82⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5948,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=5972 /prefetch:82⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4352,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=6072 /prefetch:82⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6284,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=6104 /prefetch:82⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6216,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=6232 /prefetch:82⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6376,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=6128 /prefetch:82⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6436,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=6624 /prefetch:82⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6424,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=6456 /prefetch:82⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6232,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=6180 /prefetch:82⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6948,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=6968 /prefetch:82⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=564,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=3728 /prefetch:82⤵PID:5204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4648,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=6392 /prefetch:82⤵PID:5196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4636,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=4656 /prefetch:82⤵PID:5188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5620,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5820,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=4484 /prefetch:82⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5832,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=5636 /prefetch:82⤵PID:6132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3688,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=6072 /prefetch:82⤵PID:2500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=4644,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=3508 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6920,i,516025683635608326,13996037057320299028,262144 --variations-seed-version --mojo-platform-channel-handle=5968 /prefetch:82⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:2952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
Filesize
160B
MD5a24a1941bbb8d90784f5ef76712002f5
SHA15c2b6323c7ed8913b5d0d65a4d21062c96df24eb
SHA2562a7fe18a087d8e8be847d9569420b6e8907917ff6ca0fa42be15d4e3653c8747
SHA512fd7dfec3d46b2af0bddb5aaeae79467507e0c29bab814007a39ea61231e76123659f18a453ed3feb25f16652a0c63c33545e2a0d419fafea89f563fca6a07ce2
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
160B
MD5c3911ceb35539db42e5654bdd60ac956
SHA171be0751e5fc583b119730dbceb2c723f2389f6c
SHA25631952875f8bb2e71f49231c95349945ffc0c1dd975f06309a0d138f002cfd23d
SHA512d8b2c7c5b7105a6f0c4bc9c79c05b1202bc8deb90e60a037fec59429c04fc688a745ee1a0d06a8311466b4d14e2921dfb4476104432178c01df1e99deb48b331
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD50db1d88802048ff847bfcf47035335bd
SHA1bb54059e5b145da464f6521ae67353889ce00771
SHA256416525d2bfeaeab0950175c0eab55ad35e84518ef5299f10565023800788cf9a
SHA51232c5b42febdb38c3a30eb5179b8aa20a5e731b0e83aab16ec73d27b4108bfc89eb6316f71a988388cb5df19267ba823f6d0220fab5584667ba0adb0da1152a30
-
Filesize
280B
MD58734b4a181214bb62f91cfa36c7e2c98
SHA19cff323f10778a23d73ac3dcffc038d3bf661b78
SHA256e06afe980fa56c8dad3e7c6b8d0d8f1e7eb9a4860ac715e966026fb7631c3ba5
SHA512e8648a54da9aa24b6cba1f0377a0ce33979ea097554bb6347f252cad894ad4134e1fe839abc80eb48e2510061d5c6937e80374d32f95afd4cc8567b57694ac36
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5e71baf6ae67ffdab6f34a14ca99778a7
SHA1d43783295867e0722f0caed44f92672a250e08e3
SHA25684441d6d247d6d36fe70b48c43b599eb8cc0df22f5841864ec32c1f2b8805949
SHA512df35e4ca7377e4ea151ba540c99fecd5b5213b29536018582adcc3d5946bba941a65feba729731310129a8da7859e13653c5ff4f18f7f35b1a3f50a74959988e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57f721.TMP
Filesize3KB
MD57eeae1d43c1d3ecc6249dc744b7e62ee
SHA1af2fe2df28e38c516a22bfe7d13b89727754d7ea
SHA2562254c6aa4e36c6658516d5bacd908e8121ea7caedf9b4f227e26f5c667d7042a
SHA5127681b2807d0af55d2787f4cdadbf7b55a50e722e31070e5504e4514bb3ae69016ce2ff7e140f9c2a7092e0923d87565d891cc78d8022271f4277e8230fee0754
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
1KB
MD51e7fbb7d9aade52f5d8e7a21f9ea6c98
SHA1f9c53bcf54c18e05a688b1565b77cf7fcbbc42e9
SHA2566b26d52c0ea051d254e13d0a3d29d6d45800eb321a974d87935c4fb453de41a0
SHA512243148c0ecc019b9c01c8cb7a542ae08728dabceff61438248f70e2ab5f6552850ed6cfd906b0a382b26705cf2c5334b09115df525d63d2397ca2fb049d42a83
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
14KB
MD5356d0da290faf2a89160cc6eea5197df
SHA1b48ec9d7ad5d65c08ba19a8779b713466c4f2134
SHA256b04babfaae7ef06ba06739c80ccbd888379681180e84396044476b22cafd7280
SHA5123af449afcb397a18bea3f514c01a9555de919621b03100ee8951959e52059114d1cb35517f78a7523ef932a7752b0e01d2e9f5a4aac5405f51c4fe747ed9f3ea
-
Filesize
13KB
MD5f032e53e2a02cb668671cda1d5c70391
SHA1b2f9fd6cf7bef4ae411e6febbbe8834e6d103cd9
SHA256151dd90ef368cc6464bbc98d90b1352b195f9f694c4e0d7784eb2a3c47241277
SHA5121b6cd19def3e0b022924e62503dc16fd0a74e475f63a4400b305f73e1a5ee836e8d53d5e552691140d282880b69e8f2d170e52e7d827bcd53500b8cb9a87d1c6
-
Filesize
36KB
MD50fe0b819fbf09d7b6459aca9a2fa9411
SHA17de0de137c604972e69c0ca6718de16689f75f11
SHA25694be74896e21903afe97b0e13b470a33ce044e38bebed284d5af3ec8d1ddabee
SHA5125878ceba1b635bb5d623640b327b5fecd431c8f3025586e8b59cd7efdb263f0574d0f2819e7d9f0ef115fea999d1168b087db246878ecc01446df929e98c5e3c
-
Filesize
4KB
MD5a985359ef9857a009c7acf8b1e2d38fa
SHA17332ac808381c6e3d7053a144436aec3021ed139
SHA2561f237a403b8bed8ac6387e52efdc870975a3f2cfe32142f2f139b3797ed5a5e0
SHA512f3ba640c9eeeda4586781ba8787a268529f57e3062b9f2ff0a4f7ca951d6c494ba035dbccf2d6ea77c4f0efeb30772e40455270fade5cc654d2a27518b590e13
-
Filesize
845B
MD5d9768b3f85f647516c182c2586e427ed
SHA14c6c06dd179d8accd6dba47653ccd476701f53cc
SHA256aa697ad1f0fcb9a83e63db1a43ce204d3dfa1a3b7c0f7e7efc089a27c83dd51e
SHA512345a6151fcd85537f3f8f0882dd5925bcf9dfac0cafee361d73db9477e95866bad4c6982ae3633c54a600206f4df0da3440393227e6acf8987b625c158afcd73
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\5c41e229-719e-438f-9216-262dbd27a7d9.tmp
Filesize22KB
MD556a63f182b2938fbe3e59fbf9681dc08
SHA1b76578ca24fb20b8bd5dafad4296e5a46735a5e1
SHA25636edc2510fb072092e4c6b95efe4521857d9dcb7f0b45afdf5e8ef02e5d19593
SHA512b17246b7c61e26fce1f211311b578d6b3d22c03a042137bb2bb5b23018ce5290a8fbf7a34b2f66fa30b2027296b8a570478f66a144385c320d63c1cef64434f8
-
Filesize
23KB
MD5edcef04307545ddcf607e0e8bba59f39
SHA112c6d3c7f09a8bc0b054131d9e137402ef0cc2fc
SHA2563a92979ca88272266f7bb093ed6c317a33658ddd1780f379764438dff22ce18a
SHA512510e3388b15ae5804f6b8a9148fa2054faee9240728f69d517aeb152655e98c0c3c2a7d955a6a5a94a26e9f96ff021cab9308da344b17ff7340135c71c66526d
-
Filesize
876B
MD55acf1118c4a8c808439471a2a2dad212
SHA1f1f377a0b667b7bc661acd49c6319910d574ac77
SHA256a0c67cce8384f9af3493d501f21259420755cce6cf558f1bcc1234ca43a6b978
SHA512b69f2a6b553402c29389bde6571f7eabec4e7a54dee4fcd424768ea5082be3bfaf97b3cec2a881f99a88823eb5ee3eacfbf458e475b9ca3f39b1525d027c33f9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe58920a.TMP
Filesize467B
MD5f925a51683631d5f7b5f4eeeaf7237c4
SHA1e295f8a40636ce4ccf5d24e2a74a710776f223f7
SHA256fb836125dc87b494eb8b9be9371e083cecae108994892527415a70de25851d15
SHA512b69548633649848717ad3b5b2038ac072a94dc87f89f8c51cbff33433cbe68d1e2007eb9ff1447c47f7bb4f3d1cfd8f02ebc9ea219954ab06c9bd83956fcd394
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Data Protection Lists\2.0.0.0\office_endpoints_list.json
Filesize3KB
MD594406cdd51b55c0f006cfea05745effb
SHA1a15dc50ca0fd54d6f54fbc6e0788f6dcfc876cc9
SHA2568480f3d58faa017896ba8239f3395e3551325d7a6466497a9a69bf182647b25e
SHA512d4e621f57454fea7049cffc9cc3adfb0d8016360912e6a580f6fe16677e7dd7aa2ee0671cb3c5092a9435708a817f497c3b2cc7aba237d32dbdaae82f10591c3
-
Filesize
34KB
MD5d70e4d625153c0cd7ffaf3aa93d9a68f
SHA1378acf20a70042bfb1d7998519b4160f69ab9165
SHA2560aac2eda6e6e78b5cbc89041a1bbe62ca336deffcf0d558f8b0ab48e4ee2b52c
SHA512b1f39e63f53a3e4297b8939e88e612fe0c9d7a4a224e9f84d7fbc8e1c146639feb3b5b4bf94fefd6b9e3d73dcc9754f5d3c1fd26021af18e91646d230868976c
-
Filesize
6KB
MD5fc110f07e72f7d296d685a6c58b7c482
SHA1a144d59c24233ddb0059d4b4862bd804e2b2d910
SHA256cb2b28193515238a93721a9068bf7b423f5d5f96ef3434fcea27094acbef10c4
SHA512f8431b2d77421a91863d894dca1bdfb090528e2f8431245440cbf8c98c70d3f58e6a6a7ed03de3eb0dfd4d0a072302cf6f927e1404188115a1f225456f440eb9
-
Filesize
30KB
MD595d7bb34b84e586b9fe3f8c1408b4f6f
SHA15b6be7d93ff487f82d77170500da4e73c035880b
SHA2569f165c7073224a6343a1cfdffb586798275dbb167c55970b832c8163ab8eb719
SHA51274b51fc31abc269ce40c0114a1240dbfd99c985bd4df32d5018b0563a40c9b6606b58b709cd075f9911c9a9e6818ad6ec8748143c18b591474b09ab60bcfc61b
-
Filesize
7KB
MD588d5765ea31e9c29c871935c81ce4697
SHA10f26f15cfac2ac01da370040214c2066d9853b3f
SHA2562bba9156f1b589fb342b2bffba5b9cbbcd278701510510edc3cee90e958d6676
SHA5125a8b9bae18cfcced5a05300c4391247943874495d9e3bf4317835aea8e5706034e25acb436a2cf25412e9f5acf4221cf9124d5f2b7fda99ff13ea3b7b1fceb4b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\WorkspacesNavigationComponent\1.0.0.5\nav_config.json
Filesize2KB
MD5499d9e568b96e759959dc69635470211
SHA12462a315342e0c09fd6c5fbd7f1e7ff6914c17e6
SHA25698252dc9f9e81167e893f2c32f08ee60e9a6c43fadb454400ed3bff3a68fbf0d
SHA5123a5922697b5356fd29ccf8dcc2e5e0e8c1fd955046a5bacf11b8ac5b7c147625d31ade6ff17be86e79c2c613104b2d2aebb11557399084d422e304f287d8b905
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD57e752e88d8fe8443b4e6e2d8f3aec49b
SHA1525e859fe563de8f118a2dea187dacbe0aaa2650
SHA256d941c179120b368350f283ad732b1f7ddbf89c9a2442254519bfb8ed586ebab9
SHA512f31f63f206045d09276b410733e331dac10fdb174fa06ec88fe245b99a56438ca76ecdbb6d70286f06a88bd6aa68745718e93fd009076801212a9491a076bc1b
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de