Overview
overview
7Static
static
3JaffaCakes...77.exe
windows7-x64
3JaffaCakes...77.exe
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$R0.exe
windows7-x64
6$R0.exe
windows10-2004-x64
6StartPage/$R0.html
windows7-x64
3StartPage/$R0.html
windows10-2004-x64
4StartPage/Local/ie.js
windows7-x64
3StartPage/Local/ie.js
windows10-2004-x64
3StartPage/...e.html
windows7-x64
3StartPage/...e.html
windows10-2004-x64
4StartPage/...k.html
windows7-x64
3StartPage/...k.html
windows10-2004-x64
4StartPage/...x.html
windows7-x64
3StartPage/...x.html
windows10-2004-x64
4StartPage/Local/wk.js
windows7-x64
3StartPage/Local/wk.js
windows10-2004-x64
3StartPage/...x.html
windows7-x64
3StartPage/...x.html
windows10-2004-x64
4install_fl...er.exe
windows7-x64
7install_fl...er.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8a5531c932ba8def563cab782c651177.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8a5531c932ba8def563cab782c651177.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20250207-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral13
Sample
$R0.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
$R0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
StartPage/$R0.html
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
StartPage/$R0.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
StartPage/Local/ie.js
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
StartPage/Local/ie.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
StartPage/Local/iframe.html
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
StartPage/Local/iframe.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
StartPage/Local/iframe_wk.html
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
StartPage/Local/iframe_wk.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
StartPage/Local/index.html
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
StartPage/Local/index.html
Resource
win10v2004-20250313-en
Behavioral task
behavioral25
Sample
StartPage/Local/wk.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
StartPage/Local/wk.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
StartPage/Selector/index.html
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
StartPage/Selector/index.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
install_flash_player.exe
Resource
win7-20250207-en
Behavioral task
behavioral30
Sample
install_flash_player.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20250314-en
General
-
Target
StartPage/Local/iframe.html
-
Size
2KB
-
MD5
7f025dd24024bb1ea34025cb86d17522
-
SHA1
19eb3d0d0a365f0997868d50256cce03ad108761
-
SHA256
0e158e6ad1423ec383db5cfb656e559bdce6f57bf11be464eea555b0d1491423
-
SHA512
bfea114378bd67b353b9e208478f330910074b2dadc78e82d57cca752fe1de080d10838f0e60980260aecb0ce5703f1f176cd19fd932e74a2726bc0aae5a32fa
Malware Config
Signatures
-
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping4804_1933683224\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4804_869173581\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4804_869173581\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4804_1933683224\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4804_1933683224\sets.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4804_20444876\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4804_98155259\nav_config.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4804_1829556283\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4804_1829556283\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4804_1933683224\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4804_98155259\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4804_1829556283\office_endpoints_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4804_1829556283\smart_switch_list.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4804_1933683224\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4804_20444876\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4804_869173581\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4804_98155259\manifest.fingerprint msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876101157056861" msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-83325578-304917428-1200496059-1000\{76789C3D-3CF5-4CBF-8877-6CD30A564563} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5444 msedge.exe 5444 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4804 wrote to memory of 1644 4804 msedge.exe 86 PID 4804 wrote to memory of 1644 4804 msedge.exe 86 PID 4804 wrote to memory of 1676 4804 msedge.exe 89 PID 4804 wrote to memory of 1676 4804 msedge.exe 89 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 1328 4804 msedge.exe 90 PID 4804 wrote to memory of 412 4804 msedge.exe 91 PID 4804 wrote to memory of 412 4804 msedge.exe 91 PID 4804 wrote to memory of 412 4804 msedge.exe 91 PID 4804 wrote to memory of 412 4804 msedge.exe 91 PID 4804 wrote to memory of 412 4804 msedge.exe 91 PID 4804 wrote to memory of 412 4804 msedge.exe 91 PID 4804 wrote to memory of 412 4804 msedge.exe 91 PID 4804 wrote to memory of 412 4804 msedge.exe 91 PID 4804 wrote to memory of 412 4804 msedge.exe 91
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\StartPage\Local\iframe.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x258,0x7ff87128f208,0x7ff87128f214,0x7ff87128f2202⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1948,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=2472 /prefetch:32⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2244,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2496,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3468,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3484,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=3536 /prefetch:12⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4180,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:2340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4216,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=4236 /prefetch:22⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3616,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=3608 /prefetch:82⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5108,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=3576 /prefetch:82⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5096,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=5416 /prefetch:82⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5424,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5940,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=5960 /prefetch:82⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5940,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=5960 /prefetch:82⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5888,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=6076 /prefetch:82⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6200,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=6224 /prefetch:82⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6216,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=6028 /prefetch:82⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6208,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=6336 /prefetch:82⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6496,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=6508 /prefetch:82⤵PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6664,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=6500 /prefetch:82⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6808,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=6820 /prefetch:82⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6800,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=6956 /prefetch:82⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=564,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=4756 /prefetch:82⤵PID:6120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4228,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=4708 /prefetch:82⤵PID:6128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4220,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=3552 /prefetch:82⤵PID:6136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3604,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=5776 /prefetch:82⤵PID:5764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5808,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=6944 /prefetch:82⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6236,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=6560 /prefetch:82⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6612,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=6320 /prefetch:82⤵PID:5188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6196,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=6308 /prefetch:82⤵PID:5280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6504,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=6320 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=1004,i,12041157987821645628,4520339281588982214,262144 --variations-seed-version --mojo-platform-channel-handle=1304 /prefetch:82⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4972
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160B
MD5a24a1941bbb8d90784f5ef76712002f5
SHA15c2b6323c7ed8913b5d0d65a4d21062c96df24eb
SHA2562a7fe18a087d8e8be847d9569420b6e8907917ff6ca0fa42be15d4e3653c8747
SHA512fd7dfec3d46b2af0bddb5aaeae79467507e0c29bab814007a39ea61231e76123659f18a453ed3feb25f16652a0c63c33545e2a0d419fafea89f563fca6a07ce2
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
43B
MD5af3a9104ca46f35bb5f6123d89c25966
SHA11ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8
SHA25681bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea
SHA5126a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
160B
MD5c3911ceb35539db42e5654bdd60ac956
SHA171be0751e5fc583b119730dbceb2c723f2389f6c
SHA25631952875f8bb2e71f49231c95349945ffc0c1dd975f06309a0d138f002cfd23d
SHA512d8b2c7c5b7105a6f0c4bc9c79c05b1202bc8deb90e60a037fec59429c04fc688a745ee1a0d06a8311466b4d14e2921dfb4476104432178c01df1e99deb48b331
-
Filesize
105KB
MD5fd6b6f00704ac26b2f79a1e70e399265
SHA10795986afcb44dea3fb9ca54e873ecf8b921a034
SHA2563a5b4fa1cdf64c432e20306cf91542e7be634d31a4a7495b9496a8b7c07f6efc
SHA512d2f84a577f5c286f0a1d56eaf14ab2f06b3fa6539d34d403c3ad69d5239ce3f5e0731f6df8e88f0aad915d9fabb16981f1ee2d879876ea37e601072d93b780ff
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD55a7e1750438748bd333b79a94ca69b2a
SHA194fd1be56969e269ce195ba29c3d464d356d6556
SHA2566d7a64a318c25c643323d5cf1c0c80ccf2f2433e7d74b722fca90468f8f9b914
SHA512842509c0f495ee24d152ab3f7867183d7cd64b01b5a9305405682abbbff3aa18a8ad7d97ee039393fdd1766fc17ad2df1caf711dc4db8dc7b9df608ffc0fdc7e
-
Filesize
280B
MD5eec55fe349980566b1dbf1d409d28c3e
SHA1654ce4b550defea0851f12e8ff81ae9298bb3f60
SHA2562e81ea3d7ddfc0274f3955d5131143c481e63f2529514c5295873b393d508efe
SHA51258e02658d08732b5f36e868331a483b5fde15475a6c5f704a19c97d920399c3f7d41a8fa163c66683bf403598f8f48f0cf9fa468f9783fcabd9136a55cec0059
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD57d539d30ba3fff03571b48315ce7ffc5
SHA1afa91f1ae01a5010531873568f6b174495f822d7
SHA256217d376434c2c4cb56ef181f51694ff344722212f54c406aefab1c3cae6f45bd
SHA512e379c6a818b74a87c9c09f12523293efb6571775ec4ad09e91b5db15f7b13256e2075674b86de2f2b8058c3203096e4e416631b65189e76c78a922cd528d723b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57ce6c.TMP
Filesize3KB
MD5dfe6b8430ea5d948a92b8a7ead497ea6
SHA17f370a211141bd656023e4018fa2906a2fdba9d9
SHA256f2250edc8df9c11c94d17e7552e6f5599a5d6f82f43367a9b752c287d752fb70
SHA51236ea9ae855cfc3f978aeee9540fb35522b28ca556b91c82b9d98d07577eab9516672b1e443fb2b87a6c999e775515e9a8674c23a936817b5bd803648c1ad00c5
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
69KB
MD5164a788f50529fc93a6077e50675c617
SHA1c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48
SHA256b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17
SHA512ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
1KB
MD5c6656c07267f68c49b02aa55873c6130
SHA1ac44a0c18e57e7147d626a54b8b2aff2eb418760
SHA25639840195caee2f18b19f7a76d333094a147eed6e8a95c511267af9c8a4aca298
SHA512217ef9039b13b43bf15053c965da6160d57d1aefa852a6832d6a5b6c7f969b89b1e38fbfd8c29a422fac2d89ceb1196f181aee0eb3f7798ab0c6287b65611c35
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
13KB
MD57dcf906634f4998406e0562858a1ad3b
SHA1807c40694f48d0778b4777e5cbaebea62a222b35
SHA256c358b1c3d4bdb847b749562732cca920b2810deb5cb7c456928bb823b96d4026
SHA512f02f2652d126000aa98f366341e85f0b12abdd3e13ae1654978a8e6c511e3785fecbf8ff4fc099f518b51b3208c4662a59af88fc8913fb3be090c8fa60c4507f
-
Filesize
14KB
MD5fc248feeb54606ea6043b106cef786e4
SHA16d0321094a7848891917038df553592094dd5228
SHA256e249d5b5d99b6237f4521226facfd8e7a2bd5e2e032c0bd8c3a8713dad9a04ce
SHA512e62360e11ad2617f9ef5b97736a6db069b1dfcf77d716402d588c4fcf374a2d62395cb2814d738b072923a20a4cd4c1a03c49e92a7c4ccfc8581f9923c817687
-
Filesize
36KB
MD5d29abb0953e18a48cd1791176e73e97c
SHA17c7cfbddc37f2c6e4b3690cca74e20dd6e2402a3
SHA2567c471062fcf96352ec24cf4fb401d902b3182c68700f78467fe333395e6becdf
SHA512c4992fbcb3b172c16289336cbfdc4d1c130db4e2aa314a7036763cbdb807e319683e9e17ba9a7f24a00b773fe5e4163e9cca3a1e7051c282efebe477035e8c5c
-
Filesize
4KB
MD515e08415a205b58d266fbcd068db72b2
SHA1b1cc75355e3e52be6fb102b9e5618ccba0687721
SHA2569fc23cb899ab85e95d825c02f541582dbed3538124089fa9d6282779631f96c4
SHA5122404abd6f2160faba66f3e566df80f0fda5a13fb7474be98569a664655b7a23ab5d548404f9281cb0d979220f1db9720bfb661d065295a6d56a0b98485d773f9
-
Filesize
876B
MD5cafb0c97f274715857b3a48ef207726a
SHA1fa9fcb053b8c7d4d05fbde4e0d1c949ba94ca4ff
SHA256927e8a2a539cb00b68d20c4f0a8d14b84d66344fd43111fa0515ca2100dcf33f
SHA51278696009390af6fc0ce963e8c074082e702677aa46ff6cf1aeeea01012682b5533646812e6122d8f120bfd791316350c2b986b23fb8f8b20c4caacf332c320be
-
Filesize
23KB
MD595490bc5aae57ed99e4539623f8f07fb
SHA1544edea5c867475e4cf6ff02bd75f36a75a80658
SHA2566248c1811c1f8557bca0443dbeecb51296309fedbca28ff83cb85aac47bb1c49
SHA51200488d3e8e4a2c971f79a53265237e198ca7326fce81a1104b84abd3eda29183eeaf1b6c72e7cbca9215051109da8b4d03df0b8f3811f371109cebda0eb31262
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe586879.TMP
Filesize467B
MD5be6ad16ff77f32cadb7250e37a9868e4
SHA154b2ececca94e3b6bb529b834672f824823a5ba5
SHA2567c85d2d60d15707c9e1ae4ffd7fef76e75e79153855064872c60042a0afced84
SHA5128cb2e0fd923b1abba33ea76de52e2286da7adeaf17e3134e74e23bd33d2d10c63b7e24c163a13b34302ded7d67e8411ba8a5781821878cec0ea96933e4d0daec
-
Filesize
22KB
MD556a63f182b2938fbe3e59fbf9681dc08
SHA1b76578ca24fb20b8bd5dafad4296e5a46735a5e1
SHA25636edc2510fb072092e4c6b95efe4521857d9dcb7f0b45afdf5e8ef02e5d19593
SHA512b17246b7c61e26fce1f211311b578d6b3d22c03a042137bb2bb5b23018ce5290a8fbf7a34b2f66fa30b2027296b8a570478f66a144385c320d63c1cef64434f8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig~RFe586915.TMP
Filesize3KB
MD5c7569efb2fa9fe93c0ea2f0896f54036
SHA1e231c700b778b624f6065b035e5803fdd8b4db4b
SHA2562422f055fd21adce7a027c3eaab1bbc474345a26cb1b9762b3d7572ebde67d3f
SHA512c394da9a75cca87f6e20cb2abbc2e087d3e374b613bbc960f255ebfc8f01d4349fc8a487ec56ff8141f47566cf021dc33196e42b6295ce5399ff78e5ce4b066f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Data Protection Lists\2.0.0.0\office_endpoints_list.json
Filesize3KB
MD594406cdd51b55c0f006cfea05745effb
SHA1a15dc50ca0fd54d6f54fbc6e0788f6dcfc876cc9
SHA2568480f3d58faa017896ba8239f3395e3551325d7a6466497a9a69bf182647b25e
SHA512d4e621f57454fea7049cffc9cc3adfb0d8016360912e6a580f6fe16677e7dd7aa2ee0671cb3c5092a9435708a817f497c3b2cc7aba237d32dbdaae82f10591c3
-
Filesize
30KB
MD53c210e67d73ebe104327691801fc22f3
SHA1c80946092c787c01777aedbc9801108164ce69f8
SHA256131b6d2f7fea946466ff11ace531c2fc86c2305a39f8f803a8e3af6e1500ad02
SHA5121d3408e483cf51faf55a27a006035a401c791d9ef036a85d9fcad7d6b0bcd8d5bcc4b1526fa6017cb5b9c682c7c41345b346b46f0196906ee89d8118855d92c6
-
Filesize
6KB
MD5818aa80d4544084362a114a9190ad245
SHA1153e776ab42dbddf77c8f9d7c8284e7318e1f3de
SHA25623aa38b36d576856e0e0ff81df4c464189217fe55f2b846cb005ded2ae22727e
SHA5122577b7ca0b9b8cea876f32372148e8ba0ede6d38827399d74be596284e2334bae927316a4f974751ac17e688af48aede1712d4c1cbed7e40b93e7a50ec16fd49
-
Filesize
7KB
MD5f8b13eba623026fc271332b5753ca916
SHA16fe4a46fbaa51e4ce0c3d1455fe7f20c1862d79f
SHA25604aa281ad5df7b6d69e88564ee6c8a6c93ed3b23a8d4c0e4aae93fbc32f0ee2f
SHA512f01b0236f9da1acb61bb4841154357c5e707d03f5897a89ad437ffff5e5785ac8f4d7376fd701bcb9cc844d136e8ae6a9859e70781e98682f69b7139148e825d
-
Filesize
34KB
MD56f3f7a2ba9bf66a05387f0dda1ca0153
SHA1801cc0ebc1090b757f6aedeb23d0e2e79f0aea2a
SHA25619ac26e883c2a3142b630548eb06341a1ea3707c46ad74b13cd628c3431509fa
SHA5123d2ec778f2134d62db2af8dc3fb93e82f03cd1a87de619ddcbe3752f762465d03efa146b68555ffea6d7889f2419870d3969cf79e9d70ab1925d5eab2ffcd23e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\WorkspacesNavigationComponent\1.0.0.5\nav_config.json
Filesize2KB
MD5499d9e568b96e759959dc69635470211
SHA12462a315342e0c09fd6c5fbd7f1e7ff6914c17e6
SHA25698252dc9f9e81167e893f2c32f08ee60e9a6c43fadb454400ed3bff3a68fbf0d
SHA5123a5922697b5356fd29ccf8dcc2e5e0e8c1fd955046a5bacf11b8ac5b7c147625d31ade6ff17be86e79c2c613104b2d2aebb11557399084d422e304f287d8b905
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5f1a972b8ab620a0d4f9eb1428fd4be81
SHA1360c3606fcf1932cef9cc4c7a6fa0a2538f1b7b1
SHA256919e7a34c069cc03324c3bdea3637f2c82b09f5d9af6b9b5e3b913d05f14c7dd
SHA5126a7d2a21af15f8224f9fd7100779299692bf079be39ae537b7795ebcdb6b256714977802e44e357994e9dfe9faf7f98430e711a87f8405a1bd949a94da70741d
-
Filesize
10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4804_1669088491\029c32e2-75ce-4f3d-b8b7-2f4143d96356.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de