Overview
overview
7Static
static
3JaffaCakes...77.exe
windows7-x64
3JaffaCakes...77.exe
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$R0.exe
windows7-x64
6$R0.exe
windows10-2004-x64
6StartPage/$R0.html
windows7-x64
3StartPage/$R0.html
windows10-2004-x64
4StartPage/Local/ie.js
windows7-x64
3StartPage/Local/ie.js
windows10-2004-x64
3StartPage/...e.html
windows7-x64
3StartPage/...e.html
windows10-2004-x64
4StartPage/...k.html
windows7-x64
3StartPage/...k.html
windows10-2004-x64
4StartPage/...x.html
windows7-x64
3StartPage/...x.html
windows10-2004-x64
4StartPage/Local/wk.js
windows7-x64
3StartPage/Local/wk.js
windows10-2004-x64
3StartPage/...x.html
windows7-x64
3StartPage/...x.html
windows10-2004-x64
4install_fl...er.exe
windows7-x64
7install_fl...er.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8a5531c932ba8def563cab782c651177.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8a5531c932ba8def563cab782c651177.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/FindProcDLL.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20250207-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20250313-en
Behavioral task
behavioral13
Sample
$R0.exe
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
$R0.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
StartPage/$R0.html
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
StartPage/$R0.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
StartPage/Local/ie.js
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
StartPage/Local/ie.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
StartPage/Local/iframe.html
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
StartPage/Local/iframe.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
StartPage/Local/iframe_wk.html
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
StartPage/Local/iframe_wk.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
StartPage/Local/index.html
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
StartPage/Local/index.html
Resource
win10v2004-20250313-en
Behavioral task
behavioral25
Sample
StartPage/Local/wk.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
StartPage/Local/wk.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
StartPage/Selector/index.html
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
StartPage/Selector/index.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
install_flash_player.exe
Resource
win7-20250207-en
Behavioral task
behavioral30
Sample
install_flash_player.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20250314-en
General
-
Target
StartPage/Selector/index.html
-
Size
15KB
-
MD5
283a98ba9466718cb6e46a001e5002f2
-
SHA1
46ac6469d958fcbb5156d98b6468aeff06e9d182
-
SHA256
01086414fb97f745082c62afe145084555e1b293cab5d768236dcec74a2beae8
-
SHA512
04e18f9d8ce0ef6b42a501daaf2757f1101cdd9bc99d99179a379adc44cb9f3ebd99ca524da66f4304e333213b981a1d9abfee3179a9e4334c2dd6cbd6102b83
-
SSDEEP
384:77eO72IDW/jcBq/503ql3UUhuTYtlwrWnmsTdtQr510mAdiTiGZ5ff50+cl2Heie:uX8uq6lE0YaKCmspM2E5ff5Akvb3a
Malware Config
Signatures
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\km\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\zh_HK\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\gl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\be\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_87514128\LICENSE msedge.exe File created C:\Program Files\msedge_url_fetcher_3856_1804755842\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\el\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\fa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_87514128\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_370517473\deny_etld1_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\th\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\eu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\ur\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\offscreendocument_main.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\mn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_87514128\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1893091824\keys.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1893091824\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\page_embed_script.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\ko\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\pt_BR\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_370517473\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\sr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\ne\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\mr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\bg\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\pa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\te\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_370517473\deny_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\fr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\is\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\service_worker_bin_prod.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\am\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\nl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\kn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\hi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\hr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping3856_1714912220\_locales\ms\messages.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876101160726529" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3975168204-1612096350-4002976354-1000\{40F55F57-A87E-4D87-BB58-396240E6FA24} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe 3856 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3856 wrote to memory of 1740 3856 msedge.exe 87 PID 3856 wrote to memory of 1740 3856 msedge.exe 87 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 5900 3856 msedge.exe 89 PID 3856 wrote to memory of 5900 3856 msedge.exe 89 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 2264 3856 msedge.exe 88 PID 3856 wrote to memory of 4028 3856 msedge.exe 90 PID 3856 wrote to memory of 4028 3856 msedge.exe 90 PID 3856 wrote to memory of 4028 3856 msedge.exe 90 PID 3856 wrote to memory of 4028 3856 msedge.exe 90 PID 3856 wrote to memory of 4028 3856 msedge.exe 90 PID 3856 wrote to memory of 4028 3856 msedge.exe 90 PID 3856 wrote to memory of 4028 3856 msedge.exe 90 PID 3856 wrote to memory of 4028 3856 msedge.exe 90 PID 3856 wrote to memory of 4028 3856 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\StartPage\Selector\index.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x264,0x7ffe9cd6f208,0x7ffe9cd6f214,0x7ffe9cd6f2202⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2256,i,3016345269909639425,3841562017747089114,262144 --variations-seed-version --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1800,i,3016345269909639425,3841562017747089114,262144 --variations-seed-version --mojo-platform-channel-handle=2344 /prefetch:32⤵PID:5900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2436,i,3016345269909639425,3841562017747089114,262144 --variations-seed-version --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3484,i,3016345269909639425,3841562017747089114,262144 --variations-seed-version --mojo-platform-channel-handle=3576 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3476,i,3016345269909639425,3841562017747089114,262144 --variations-seed-version --mojo-platform-channel-handle=3572 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4924,i,3016345269909639425,3841562017747089114,262144 --variations-seed-version --mojo-platform-channel-handle=5056 /prefetch:82⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5020,i,3016345269909639425,3841562017747089114,262144 --variations-seed-version --mojo-platform-channel-handle=5036 /prefetch:82⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4804,i,3016345269909639425,3841562017747089114,262144 --variations-seed-version --mojo-platform-channel-handle=5528 /prefetch:82⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5592,i,3016345269909639425,3841562017747089114,262144 --variations-seed-version --mojo-platform-channel-handle=5656 /prefetch:82⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5592,i,3016345269909639425,3841562017747089114,262144 --variations-seed-version --mojo-platform-channel-handle=5656 /prefetch:82⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5976,i,3016345269909639425,3841562017747089114,262144 --variations-seed-version --mojo-platform-channel-handle=6068 /prefetch:82⤵PID:5208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5536,i,3016345269909639425,3841562017747089114,262144 --variations-seed-version --mojo-platform-channel-handle=6220 /prefetch:82⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6284,i,3016345269909639425,3841562017747089114,262144 --variations-seed-version --mojo-platform-channel-handle=5656 /prefetch:82⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6288,i,3016345269909639425,3841562017747089114,262144 --variations-seed-version --mojo-platform-channel-handle=6248 /prefetch:82⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6276,i,3016345269909639425,3841562017747089114,262144 --variations-seed-version --mojo-platform-channel-handle=5900 /prefetch:82⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5740,i,3016345269909639425,3841562017747089114,262144 --variations-seed-version --mojo-platform-channel-handle=2132 /prefetch:82⤵PID:6068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5672,i,3016345269909639425,3841562017747089114,262144 --variations-seed-version --mojo-platform-channel-handle=6300 /prefetch:82⤵PID:5132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5124,i,3016345269909639425,3841562017747089114,262144 --variations-seed-version --mojo-platform-channel-handle=4796 /prefetch:82⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6164,i,3016345269909639425,3841562017747089114,262144 --variations-seed-version --mojo-platform-channel-handle=6292 /prefetch:82⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6300,i,3016345269909639425,3841562017747089114,262144 --variations-seed-version --mojo-platform-channel-handle=5588 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5372,i,3016345269909639425,3841562017747089114,262144 --variations-seed-version --mojo-platform-channel-handle=3500 /prefetch:82⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:5464
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:1200
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:5244
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD565044109d1beb8ed8d59560642cbc519
SHA10084485b0aa26069232fab51ee603682e8edfd17
SHA256a1e0b448218678b30356cbbe4092ea091435e7450822a9748361b6e8b198962d
SHA51296dcc68fe92f98c4329a8335cfffdb0849a52562431045ccc42076bda0abf3842491303fb669246bfd04e64113688d3f90000a09571dd76ff84b52e34e45f9b6
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2KB
MD5d1df1eab0ed65f30fcd81ae4551ad898
SHA1585ecee6914ff1b048a339c10632aaaf32833b9f
SHA25660b63ea17674782cd8c504c1f961dea47320317d54b2e0c673ec121de1aea848
SHA5122c8a47761f8eb0dfeb146c679e24647ec7e849fe980d47a9c0b60169a5bcd1e9165fa8284f4b0da36128a19b9adc8172bc34e9e82927815d661f75011bde827c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD5decb36edf70ce6db5a36d41df9aa6fde
SHA1ec990029d2e2ce1d035e46822e50977395d77984
SHA256732e54ee5cf181a8c61be2437eb6c5915ef88a19c1e2d22e1062cc65d26143ab
SHA51257db7c421dfbd813164ceb54fcea20050ac610b1a207360d3aa55b9eee700993f61dde80db2cf509fcb9d081afeacab510020f73df5b0e98be28ae94ebb40ca1
-
Filesize
16KB
MD5b1794c7b3473a5387375a12489cda250
SHA1ed7dbdddd81af41b51c142278213382da8081be8
SHA25652928cb38603a7952aa1cf03f57f8531760418ad18390700a5e479dd06b1bef4
SHA5126edd2bca4fa67e7f7bbe3ce9eae5c1a7007398e507defcc1ea82388f24d9ba2c2df153b627efc135e187be4dac1f31e406b631fdcb3e70cbb4613a98bc6ce802
-
Filesize
36KB
MD51a5413d1077e8c62eb5450fba635177e
SHA1f3c6f066a27c634f35a7ea9df6262b75ecc1cf26
SHA256974cabd58499526def8fb2e90514aaf1c3e4faa42edef767f02fd388020d04f8
SHA5121dcc0464780d0289f2b0a3504d907a77f7b6cc9e542c4388de688ec7cb4de2378bc8f30775abd9269a2e773310b60204c26edfdd292fcda7ae7e75101415a112
-
Filesize
22KB
MD5e800317cabe333a0a23ae432f37c1aba
SHA11694c5a212b0dd3f38687ab97660edc13a9016c1
SHA256722b8a803c6a94e327f565e7e26c0009fbaa92571a045fc3b246ab8749252134
SHA51212ce5f8305d89b11fa41d0d07db3485d64663f3939ed7a37c73d58e987c77bc6a2c8ed4face14aa67a73f2e8768ce37f02d7a4956fd58f1a6d8c8de8a7576185
-
Filesize
23KB
MD52c22a1e5220a0004e7bc5e9a87f6c66c
SHA14e2cb0ba0ce038b6c21be2b63f0a5bd0885daf5e
SHA25637e088b6fbe84529950d52fdd3cf87139124c69fe5aeef6fd64b474a4d8c91bc
SHA512b18cca15109e23e6c71b61f97228268528ba46159af3f1428d7ed86946312640a30f84601609382d622ecd98443ec13b99a9a0628c1766e39239be35606c76b3
-
Filesize
465B
MD5cdaae3c6d637003757759d67edafec08
SHA1873cda3fe5751c4f6fe1be0a820f11d2d5c29a14
SHA2563cbb83e6404276f8c7901f9d762e702f9f30a56ab53a967510f5ec312df90a7a
SHA512a5f4d0edbd464f89eb8420bd0c4064a18f84cf6cf64c0acd33daaecb1581c155273f16bd8f17fa278e73e5ddd50112fa9f61d9857476e1d7afaa00102df70384
-
Filesize
896B
MD5f9a528e64545f0a91c568eab6e263ca6
SHA1194efc51f29c7f945e855c7a021c2cca08a1c569
SHA256f4232083fcfbb278224c1dc546e07e23ce4cea7e273f34e85440c6f7e84d339e
SHA512984cdb5b318ece4690db46cfd6d7e685c6ced297e7d7dae163264438c66a7464dfe4e788d53f7fd89f7238c087b18e14d457e30b1e2f345e3d19fd2a760a07d7
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
40KB
MD5344aa08f55eae1aa54fe6b4db1458fca
SHA164df5277525299076d70593c1c285035c9dda5d2
SHA2563125e2f340c75f907b5d72d69c9af746ad71dae44e35812af94429af704657d5
SHA51211b3c53517391353f38ca7ec664af07389a1b978bb649f46b4a9404d852acfe13802b168d87538c60d991bc7bc042129286914bf41ed491ee43ddfc3de8708ba
-
Filesize
49KB
MD53933393fb3ff3c0cf4ec1f286961bd65
SHA116870b8dad874126fdb0237783d740e73497db81
SHA2562a7159e187a7ef3fdecb69e3cf13980c7763adc1634c1514023f28c7ae0a001a
SHA512e541a54d89363eff42ea8e3bf623467ce8049513826a53629d194c469bf7ef793c32be484998afc5348b144e2d0b1bfc23ef0eb049c80c423301ce331cd43f33
-
Filesize
40KB
MD535f97a6fb201818f20961cf9aec59c4f
SHA1237ed1f5ee13568b9cd1878f3f04ce0ea2178033
SHA2569969ceaf188db8081ec5ad7d72fca6b47c00d6ded50ac01ae07e97b27804ea14
SHA51294bcd4a5dba4a401d5231ad79a61c1d2d4054111c681aa817b82fcb33dc0aba742213253a8facc49ec71acf6312a1889dd8768e1ac7d6797f0ecf1a4ff3f8f7b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5f93e073d9789a561388f919bb5649ae5
SHA1b3cff108fdd2b00666a52fff62e4ad2d99d776b3
SHA25665b61fa84ea4b48480f90d636d94bde970186dd46852a907a0f9a081ed241ea8
SHA512e3f32fb1a610b17bdfacbaf8a9598223b1fdcd34be60bfacbceefbab4a838432b03413fcb8a8cedda5ba6be1e928740a2ec391ca8a785865bfdc754d804109ba