Overview
overview
7Static
static
3JaffaCakes...77.exe
windows7-x64
3JaffaCakes...77.exe
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$R0.exe
windows7-x64
6$R0.exe
windows10-2004-x64
6StartPage/$R0.html
windows7-x64
3StartPage/$R0.html
windows10-2004-x64
4StartPage/Local/ie.js
windows7-x64
3StartPage/Local/ie.js
windows10-2004-x64
3StartPage/...e.html
windows7-x64
3StartPage/...e.html
windows10-2004-x64
4StartPage/...k.html
windows7-x64
3StartPage/...k.html
windows10-2004-x64
4StartPage/...x.html
windows7-x64
3StartPage/...x.html
windows10-2004-x64
4StartPage/Local/wk.js
windows7-x64
3StartPage/Local/wk.js
windows10-2004-x64
3StartPage/...x.html
windows7-x64
3StartPage/...x.html
windows10-2004-x64
4install_fl...er.exe
windows7-x64
7install_fl...er.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3Analysis
-
max time kernel
144s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8a5531c932ba8def563cab782c651177.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8a5531c932ba8def563cab782c651177.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20250207-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral13
Sample
$R0.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
$R0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
StartPage/$R0.html
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
StartPage/$R0.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
StartPage/Local/ie.js
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
StartPage/Local/ie.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
StartPage/Local/iframe.html
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
StartPage/Local/iframe.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
StartPage/Local/iframe_wk.html
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
StartPage/Local/iframe_wk.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
StartPage/Local/index.html
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
StartPage/Local/index.html
Resource
win10v2004-20250313-en
Behavioral task
behavioral25
Sample
StartPage/Local/wk.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
StartPage/Local/wk.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
StartPage/Selector/index.html
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
StartPage/Selector/index.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
install_flash_player.exe
Resource
win7-20250207-en
Behavioral task
behavioral30
Sample
install_flash_player.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20250314-en
General
-
Target
StartPage/Local/index.html
-
Size
7KB
-
MD5
bdc5a933dd11a46ba1881a7446bdd2c6
-
SHA1
03547b50e393b564fb7494027fe3a364018e1985
-
SHA256
2cb9c99f39635d2905be12cf17167628075aaea33d2da58fee0370f14f894e22
-
SHA512
17b98eb6296aab9d20b5850a9e31998c7f983b587170272f13df2a01f42e526e2d5b7bf7398e0ef0e748446e9a3417675a3a3e6ed557da227b36205cb547596d
-
SSDEEP
192:7uEFsHp4giMi03LcioiE3rj0i4iQQe28F:7RFsJ4giMi03LcioiE3Ei4iQQv8F
Malware Config
Signatures
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\hr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\km\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\fil\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_1134024459\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_1134024459\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_581218917\deny_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\lt\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\ca\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\en\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_1982976028\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_1982976028\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_1982976028\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_581218917\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\sv\messages.json msedge.exe File created C:\Program Files\msedge_url_fetcher_396_1566787681\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\te\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\sr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\eu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\hi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_581218917\deny_etld1_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\ne\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\hy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\fr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_1779625835\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_581218917\deny_full_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_581218917\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\page_embed_script.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\kk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\mn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_1134024459\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\th\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\is\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_1134024459\keys.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\offscreendocument_main.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\si\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_452320689\_locales\cy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_1982976028\sets.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping396_1134024459\manifest.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876101150280487" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3446877943-4095308722-756223633-1000\{A7C4D608-46F2-455D-920E-F7FEDF6C0011} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5304 msedge.exe 5304 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 396 wrote to memory of 4456 396 msedge.exe 86 PID 396 wrote to memory of 4456 396 msedge.exe 86 PID 396 wrote to memory of 4280 396 msedge.exe 88 PID 396 wrote to memory of 4280 396 msedge.exe 88 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 3028 396 msedge.exe 89 PID 396 wrote to memory of 5248 396 msedge.exe 90 PID 396 wrote to memory of 5248 396 msedge.exe 90 PID 396 wrote to memory of 5248 396 msedge.exe 90 PID 396 wrote to memory of 5248 396 msedge.exe 90 PID 396 wrote to memory of 5248 396 msedge.exe 90 PID 396 wrote to memory of 5248 396 msedge.exe 90 PID 396 wrote to memory of 5248 396 msedge.exe 90 PID 396 wrote to memory of 5248 396 msedge.exe 90 PID 396 wrote to memory of 5248 396 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\StartPage\Local\index.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x258,0x7ffb659cf208,0x7ffb659cf214,0x7ffb659cf2202⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --subproc-heap-profiling --always-read-main-dll --field-trial-handle=1952,i,8637214218159046918,1664442415247550935,262144 --variations-seed-version --mojo-platform-channel-handle=2040 /prefetch:32⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --subproc-heap-profiling --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2232,i,8637214218159046918,1664442415247550935,262144 --variations-seed-version --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --subproc-heap-profiling --always-read-main-dll --field-trial-handle=2564,i,8637214218159046918,1664442415247550935,262144 --variations-seed-version --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:5248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --subproc-heap-profiling --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3532,i,8637214218159046918,1664442415247550935,262144 --variations-seed-version --mojo-platform-channel-handle=3572 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --subproc-heap-profiling --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3552,i,8637214218159046918,1664442415247550935,262144 --variations-seed-version --mojo-platform-channel-handle=3584 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --subproc-heap-profiling --always-read-main-dll --field-trial-handle=5088,i,8637214218159046918,1664442415247550935,262144 --variations-seed-version --mojo-platform-channel-handle=4896 /prefetch:82⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --subproc-heap-profiling --always-read-main-dll --field-trial-handle=5092,i,8637214218159046918,1664442415247550935,262144 --variations-seed-version --mojo-platform-channel-handle=4880 /prefetch:82⤵PID:5784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --subproc-heap-profiling --always-read-main-dll --field-trial-handle=5516,i,8637214218159046918,1664442415247550935,262144 --variations-seed-version --mojo-platform-channel-handle=5428 /prefetch:82⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --subproc-heap-profiling --always-read-main-dll --field-trial-handle=5672,i,8637214218159046918,1664442415247550935,262144 --variations-seed-version --mojo-platform-channel-handle=5860 /prefetch:82⤵PID:5960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --subproc-heap-profiling --always-read-main-dll --field-trial-handle=5672,i,8637214218159046918,1664442415247550935,262144 --variations-seed-version --mojo-platform-channel-handle=5860 /prefetch:82⤵PID:6068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --subproc-heap-profiling --always-read-main-dll --field-trial-handle=5996,i,8637214218159046918,1664442415247550935,262144 --variations-seed-version --mojo-platform-channel-handle=6044 /prefetch:82⤵PID:5632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --subproc-heap-profiling --always-read-main-dll --field-trial-handle=6032,i,8637214218159046918,1664442415247550935,262144 --variations-seed-version --mojo-platform-channel-handle=6044 /prefetch:82⤵PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --subproc-heap-profiling --always-read-main-dll --field-trial-handle=5852,i,8637214218159046918,1664442415247550935,262144 --variations-seed-version --mojo-platform-channel-handle=6088 /prefetch:82⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --subproc-heap-profiling --always-read-main-dll --field-trial-handle=5428,i,8637214218159046918,1664442415247550935,262144 --variations-seed-version --mojo-platform-channel-handle=6068 /prefetch:82⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --subproc-heap-profiling --always-read-main-dll --field-trial-handle=5536,i,8637214218159046918,1664442415247550935,262144 --variations-seed-version --mojo-platform-channel-handle=6176 /prefetch:82⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --subproc-heap-profiling --always-read-main-dll --field-trial-handle=5628,i,8637214218159046918,1664442415247550935,262144 --variations-seed-version --mojo-platform-channel-handle=5652 /prefetch:82⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --subproc-heap-profiling --always-read-main-dll --field-trial-handle=6052,i,8637214218159046918,1664442415247550935,262144 --variations-seed-version --mojo-platform-channel-handle=4836 /prefetch:82⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --subproc-heap-profiling --always-read-main-dll --field-trial-handle=5084,i,8637214218159046918,1664442415247550935,262144 --variations-seed-version --mojo-platform-channel-handle=5236 /prefetch:82⤵PID:5300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --subproc-heap-profiling --always-read-main-dll --field-trial-handle=3008,i,8637214218159046918,1664442415247550935,262144 --variations-seed-version --mojo-platform-channel-handle=5344 /prefetch:82⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --subproc-heap-profiling --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=4852,i,8637214218159046918,1664442415247550935,262144 --variations-seed-version --mojo-platform-channel-handle=6084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --subproc-heap-profiling --always-read-main-dll --field-trial-handle=5648,i,8637214218159046918,1664442415247550935,262144 --variations-seed-version --mojo-platform-channel-handle=3352 /prefetch:82⤵PID:5708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4592
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:1856
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD57b0736a36bad51260e5db322736df2e9
SHA130af14ed09d3f769230d67f51e0adb955833673e
SHA2560d2adfd06d505b9020c292d30597083d808bfd90ddc0fe173def5db96832a087
SHA512caabdc6a8601b93f3c082e6506b3c9efe2242b90e92e86306dc0bd4857d33343ba395325fabb21f5db562d3e3932f52f77de547f379072d0154efd5f1b1cdeb3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\9f1294d3-0991-4d85-8784-e24a6aead7f5.tmp
Filesize107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2KB
MD51a1a972e74a9285d04e4a42d173a71cc
SHA14b377f4b2610628f67e98bb5fa542603ab257077
SHA2560aac57533cf8ef420b7f2292d2aa3f00e23f1c233d3b5abb1c9ac7672aa76936
SHA512bc57adf398fcb5ad2399170e16e9bb57338f88195f478443b2217ed738e47710e0e2d7fd5dd7e667db8d16e9950732bd67a73df7dcc07681ed2c67378722106b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\a127d668-4602-4c9e-a3b6-373520f6e3c1.tmp
Filesize40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\f7920551-aa95-4c47-b17b-93f7253610b6.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
16KB
MD53b5ffdf6af5beb2dfbb5b57130126860
SHA15c6f44808e244d40edb7fa970a1dbbdd5cddfdc2
SHA25668976a3eb84ef21be1ea7b5c809363295757693d8fc92f54f3243d966a11f483
SHA5126390c684cefa2f5ca9583ef6aa30a0730cff0fbfe962435920580e83618e5f8fc4761fbe20d359f8cc22c670beddae5d453e80ddda640fdb3c95698c3cf9db93
-
Filesize
16KB
MD5bcdd6550a6f0a37732b9f2fcc5b3f69d
SHA141d11fdd109a865385b4ead5424c5b2d513a591e
SHA25637a66b36af2b637a643f8eb658fe90555853067a5c099715196fca81de5da4d1
SHA5128e0a6b9d14fa104ccc2a32d71dc4d27f0294ca770da2e57871fd50122d63834192d01a141850b8d247224b837422758796bcb7646be675ec66cc1aaaa9642537
-
Filesize
36KB
MD500cfa61e0ba41ac5a23ea16f41c0b84f
SHA17b28efe1d0b818e66eff8e854f0c233bd7bb58fa
SHA256e2d6b74f73c573ef5905fdbbe67bc991fab2034d75817de1345a33fe247f3de4
SHA5124f97f18837c668ff0a04f06d9cd01fdc1e344ea45a674d226f7465401b159a09762636e7a135e42684b1e7085fc0ddceaebbb28672351cf373e118bbf52a99bc
-
Filesize
22KB
MD5c9d06c16b78451c6011b400e61c5d570
SHA18f1d8202a1b495eba37889bfddc85d4051792fa0
SHA256de7b8736c459c87c3383cb627843e3fe942e92c374e8c5eaf8baf36266fcf9e0
SHA512083218b60f9215c0f148ca74f0fcdba31dcb05b1244927545c7057cb331f5cbcd918f50143ec74b108289ec64a8c3fca5aa5f0f285c576b91b3c4ea43c7b66b3
-
Filesize
467B
MD5cb6818c90d7f3b12b526f94b76b94626
SHA189f9ecca2e62418001aa7b8a42ab878e5f79f54e
SHA256b481b1c20d27cc2e843bb0dd9398a81130de68fc37945debd6423efb8d3e0c06
SHA512dba7d592983af5cdff368f6a4c7d1a037a6891a5064bd5f9d8c1e822e29ab753511386ba8a8e4509bf58bf43a583e7eacde2a90fffe493089100db2d2be93121
-
Filesize
23KB
MD5847536ef05e06a2e35c2451988b762f4
SHA1abec8d09fb308cfea874101b66227723d5bacd28
SHA25641666853ace2486b010b6da8bd848fcae4c38b0fc7dd2f54d868e3cc186f624a
SHA51205c8eda3add16cd9fa517afac2d7c830e3547851cbd209600a56d8a109b235f8178662a64d6c86c1f171731b853c877a1a4119cb7f92f45367fca94f6d151e81
-
Filesize
900B
MD5717265a735c7bcb61c5a05b094075bef
SHA1254ed8c490660b87356e9de7dadb9a69508196bc
SHA2569a8d5c4cb2f6532b5bdabe11a6dd5ca1e6cdfcb5adfb66cd60353bd5cf142fab
SHA512c23665a53d2fa2713dbadfa2b27ca444b85a06226c9e34865efed33cc44d2eb4ae26903a5dbadc86020f3ced5180fb856d31260181e99bbb62ddcfa83add0839
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
49KB
MD56fe57218f1b7e8290b6fab822a9dbd6c
SHA1f4b2ffd772c8c44c65594f9db87b30ad5ebcea49
SHA2569e12f9c133246c53739018173554bdda47ca0608aecc643e6bb4865e724bd623
SHA5123cd31177211f528afbbbc704b6056b0bfb8fdd5995da7a3d4f85629112dfcdb0fa5535e2ed28407a8f7a562f0cd35631a58c2230e8b0f09b470ee9875ad81415
-
Filesize
40KB
MD5dad5ac058355aaf78bb6036779300c82
SHA19307796dc7314df424a73c0562f4df8e3eae92dc
SHA2561213e991fff4f5968b26891f966d23b651e099603bb4ae80c3d61e51cc63d24e
SHA51237cfa1db79cb8434e7b3fac27a7d12fd23d4ffa73212cfbe4bd6a703c1541e17744540446f9b71feff7d3638ee111b5f67d641a1ca5a34f5c5eb38ec18c4b561
-
Filesize
40KB
MD55eb220bf1436ed21410d6a338ed8abc8
SHA17b0a253257638f4f5bb1fd60eadf4842c1710df9
SHA2563a1d0d00021662176fb60faa4df5f87cbf4111bd411cdf3e7234bc1ed04c0e0d
SHA512fdd19b32f87bf194bc62c33c9624d065d17d1e05010bf64c6e30e6804a7a1ce3d8db4bbcf61dde456443dce402468a0adc36df1f3fce72f1c4d00436035fef07
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD56febada55fee327595ff21783c3fe6f1
SHA17e6d16e2cf8bbbeb70ed22fd599228407b74de36
SHA256302ee7674a836a07792c76a4cea1cd4929bb2c5d1dbf72482d03258ba222d62d
SHA5122ce3c12ba965d652f130f00807f4f827a336c51c8c7ade2589982b8eea9323e3e9e81dfd161774ece2b8edd6e63aba48fb6e9b3b0a14011e8c982b87a7422011