Overview
overview
9Static
static
3UnderWarWater.exe
windows7-x64
9UnderWarWater.exe
windows10-2004-x64
9$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
3LICENSES.c...m.html
windows10-2004-x64
4UnderWarWater.exe
windows10-2004-x64
9d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows10-2004-x64
1resources/...sar.js
ubuntu-18.04-amd64
3resources/...sar.js
debian-9-armhf
4resources/...sar.js
debian-9-mips
1resources/...sar.js
debian-9-mipsel
1resources/...sar.js
windows7-x64
3resources/...sar.js
windows10-2004-x64
3resources/...lfs.js
windows7-x64
3resources/...lfs.js
windows10-2004-x64
3resources/...isk.js
windows7-x64
3resources/...isk.js
windows10-2004-x64
3resources/...tem.js
windows7-x64
3resources/...tem.js
windows10-2004-x64
3resources/...ity.js
windows7-x64
3resources/...ity.js
windows10-2004-x64
3resources/...kle.js
windows7-x64
3resources/...kle.js
windows10-2004-x64
3resources/...lob.js
windows7-x64
3Analysis
-
max time kernel
144s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
UnderWarWater.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
UnderWarWater.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
LICENSES.chromium.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
LICENSES.chromium.html
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
UnderWarWater.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral12
Sample
d3dcompiler_47.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
ffmpeg.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral14
Sample
libEGL.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
libGLESv2.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral16
Sample
resources/app.asar.unpacked/node_modules/@electron/asar/bin/asar.js
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral17
Sample
resources/app.asar.unpacked/node_modules/@electron/asar/bin/asar.js
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral18
Sample
resources/app.asar.unpacked/node_modules/@electron/asar/bin/asar.js
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral19
Sample
resources/app.asar.unpacked/node_modules/@electron/asar/bin/asar.js
Resource
debian9-mipsel-20240729-en
Behavioral task
behavioral20
Sample
resources/app.asar.unpacked/node_modules/@electron/asar/lib/asar.js
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
resources/app.asar.unpacked/node_modules/@electron/asar/lib/asar.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral22
Sample
resources/app.asar.unpacked/node_modules/@electron/asar/lib/crawlfs.js
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
resources/app.asar.unpacked/node_modules/@electron/asar/lib/crawlfs.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral24
Sample
resources/app.asar.unpacked/node_modules/@electron/asar/lib/disk.js
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
resources/app.asar.unpacked/node_modules/@electron/asar/lib/disk.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral26
Sample
resources/app.asar.unpacked/node_modules/@electron/asar/lib/filesystem.js
Resource
win7-20241010-en
Behavioral task
behavioral27
Sample
resources/app.asar.unpacked/node_modules/@electron/asar/lib/filesystem.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral28
Sample
resources/app.asar.unpacked/node_modules/@electron/asar/lib/integrity.js
Resource
win7-20241023-en
Behavioral task
behavioral29
Sample
resources/app.asar.unpacked/node_modules/@electron/asar/lib/integrity.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral30
Sample
resources/app.asar.unpacked/node_modules/@electron/asar/lib/pickle.js
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
resources/app.asar.unpacked/node_modules/@electron/asar/lib/pickle.js
Resource
win10v2004-20250314-en
Behavioral task
behavioral32
Sample
resources/app.asar.unpacked/node_modules/@electron/asar/lib/types/glob.js
Resource
win7-20240903-en
General
-
Target
LICENSES.chromium.html
-
Size
11.7MB
-
MD5
45bc486db849cf8b8f0e38f34c8ff05b
-
SHA1
f33015f0e3767e869e6e8f9ab73332fd865d77a1
-
SHA256
13b6a0f7b308c57cbced247d9ebb8c63aa97e253bdf2f21f733ae71cf48163a5
-
SHA512
eb2edfa0de7a84079967664039a3b2a51153d77b0d2b477e50399d75b8180690969cb6f799fd0fc480a8c4760cb206d1e8602a1b16f4c5fd4a144ccf204b673f
-
SSDEEP
24576:y9dQc6poY6jbCjK6uwR6ETamf1jZ6ojK6QjZ6UjK6ajK64jK6cjZ6ijK6b6cjK6z:yMeGAyWPbX8me7
Malware Config
Signatures
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\ru\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\es_419\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_356844868\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_596215008\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_596215008\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\bn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\am\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\en\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\service_worker_bin_prod.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\nl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\kn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\pa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_356844868\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_1300247854\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_1305751636\deny_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_1305751636\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_1305751636\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\kk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\offscreendocument_main.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\lv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\eu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_1300247854\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_356844868\sets.json msedge.exe File created C:\Program Files\msedge_url_fetcher_4688_1165897254\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\en_US\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_596215008\keys.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_596215008\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_1305751636\deny_full_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\mr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\128.png msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_356844868\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_1300247854\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\bg\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4688_876058597\_locales\ko\messages.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133876402937255751" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-308834014-1004923324-1191300197-1000\{E8E05088-495A-4822-A108-7FD31BEA9A36} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3824 msedge.exe 3824 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe 4688 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4688 wrote to memory of 2160 4688 msedge.exe 90 PID 4688 wrote to memory of 2160 4688 msedge.exe 90 PID 4688 wrote to memory of 4936 4688 msedge.exe 91 PID 4688 wrote to memory of 4936 4688 msedge.exe 91 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4988 4688 msedge.exe 92 PID 4688 wrote to memory of 4964 4688 msedge.exe 93 PID 4688 wrote to memory of 4964 4688 msedge.exe 93 PID 4688 wrote to memory of 4964 4688 msedge.exe 93 PID 4688 wrote to memory of 4964 4688 msedge.exe 93 PID 4688 wrote to memory of 4964 4688 msedge.exe 93 PID 4688 wrote to memory of 4964 4688 msedge.exe 93 PID 4688 wrote to memory of 4964 4688 msedge.exe 93 PID 4688 wrote to memory of 4964 4688 msedge.exe 93 PID 4688 wrote to memory of 4964 4688 msedge.exe 93
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\LICENSES.chromium.html1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2b4,0x7ffb039ef208,0x7ffb039ef214,0x7ffb039ef2202⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1828,i,12404093345451805964,4314762624792635044,262144 --variations-seed-version --mojo-platform-channel-handle=2244 /prefetch:32⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2216,i,12404093345451805964,4314762624792635044,262144 --variations-seed-version --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2572,i,12404093345451805964,4314762624792635044,262144 --variations-seed-version --mojo-platform-channel-handle=2184 /prefetch:82⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3500,i,12404093345451805964,4314762624792635044,262144 --variations-seed-version --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:5428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3520,i,12404093345451805964,4314762624792635044,262144 --variations-seed-version --mojo-platform-channel-handle=3548 /prefetch:12⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4820,i,12404093345451805964,4314762624792635044,262144 --variations-seed-version --mojo-platform-channel-handle=4796 /prefetch:82⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3476,i,12404093345451805964,4314762624792635044,262144 --variations-seed-version --mojo-platform-channel-handle=4920 /prefetch:82⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5248,i,12404093345451805964,4314762624792635044,262144 --variations-seed-version --mojo-platform-channel-handle=5492 /prefetch:82⤵PID:5128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5808,i,12404093345451805964,4314762624792635044,262144 --variations-seed-version --mojo-platform-channel-handle=5600 /prefetch:82⤵PID:5472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5808,i,12404093345451805964,4314762624792635044,262144 --variations-seed-version --mojo-platform-channel-handle=5600 /prefetch:82⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6196,i,12404093345451805964,4314762624792635044,262144 --variations-seed-version --mojo-platform-channel-handle=6208 /prefetch:82⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5988,i,12404093345451805964,4314762624792635044,262144 --variations-seed-version --mojo-platform-channel-handle=6180 /prefetch:82⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5496,i,12404093345451805964,4314762624792635044,262144 --variations-seed-version --mojo-platform-channel-handle=5852 /prefetch:82⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5516,i,12404093345451805964,4314762624792635044,262144 --variations-seed-version --mojo-platform-channel-handle=5572 /prefetch:82⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5536,i,12404093345451805964,4314762624792635044,262144 --variations-seed-version --mojo-platform-channel-handle=5856 /prefetch:82⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=2724,i,12404093345451805964,4314762624792635044,262144 --variations-seed-version --mojo-platform-channel-handle=5932 /prefetch:82⤵PID:312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5756,i,12404093345451805964,4314762624792635044,262144 --variations-seed-version --mojo-platform-channel-handle=6176 /prefetch:82⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6356,i,12404093345451805964,4314762624792635044,262144 --variations-seed-version --mojo-platform-channel-handle=6352 /prefetch:82⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6036,i,12404093345451805964,4314762624792635044,262144 --variations-seed-version --mojo-platform-channel-handle=6352 /prefetch:82⤵PID:5716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=5736,i,12404093345451805964,4314762624792635044,262144 --variations-seed-version --mojo-platform-channel-handle=6608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=1012,i,12404093345451805964,4314762624792635044,262144 --variations-seed-version --mojo-platform-channel-handle=3220 /prefetch:82⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3240
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:1472
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:3784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
66B
MD5496b05677135db1c74d82f948538c21c
SHA1e736e675ca5195b5fc16e59fb7de582437fb9f9a
SHA256df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7
SHA5128bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c
-
Filesize
134B
MD5049c307f30407da557545d34db8ced16
SHA1f10b86ebfe8d30d0dc36210939ca7fa7a819d494
SHA256c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54
SHA51214f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json
Filesize3KB
MD5f9fd82b572ef4ce41a3d1075acc52d22
SHA1fdded5eef95391be440cc15f84ded0480c0141e3
SHA2565f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6
SHA51217084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339
-
Filesize
280B
MD501cc3a42395638ce669dd0d7aba1f929
SHA189aa0871fa8e25b55823dd0db9a028ef46dfbdd8
SHA256d0c6ee43e769188d8a32f782b44cb00052099222be21cbe8bf119469c6612dee
SHA512d3b88e797333416a4bc6c7f7e224ba68362706747e191a1cd8846a080329473b8f1bfebee5e3fe21faa4d24c8a7683041705e995777714330316e9b563d38e41
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\181723ae-2f53-45d7-8bf9-3633c80494bc.tmp
Filesize107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2KB
MD5e0ac67d3185e0f99d4422f82054d8e99
SHA1c6c27e0ac094f23e8ae236852cac0bd9f4216c7a
SHA2563ef7e7b3e33112348a3ab80aca548e7e4d8502c2dc48bec931daa45c7c0cccfe
SHA5121b6776da7bdaa236c83c62f828a5e7b73e7053beaf06cfcabf1835b58a46e92df289ef5823068d32f2d8ee88d8228f31f7a487707dce4096798cc3e9fa6c3220
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD541529cb04f8f5851107afe1692cf777e
SHA11474c4355d95e2538b3bc336e11f4bdedae5823f
SHA2568d281611f83d348cc5418cce25f8affd44f7714dc854c290b55f2c7ff980393e
SHA512134d8206ad085e391bb52cf609e0aa78c0f63c8a57870a1d100a144479a3e622fc91086d80ecac1b498abab3aef4f781843fce29b92b95ccc4acfd5e5bc786d9
-
Filesize
16KB
MD54f88ce33a3c14df32f3cecdc5c3571a2
SHA11ba40eed902b9f130c99802c46768f014288b15b
SHA256923b5039a1589c67aff593491d3206129e0cc4e26f555a7ba1db6fc37d756322
SHA512463b2edebd2a38beeeb6e53b73a8238f8dc0f72dcbb980ff2da06f5610ec0ea357e36c44b4a8cde79fb2a7105a0514366f19c10bee20fb4b290f335b5a62cafa
-
Filesize
36KB
MD58632d55467db42debbc7ee55bd8f84e5
SHA1989ec9b3bee644ebf8bbae5b901f0a5cb1350c55
SHA25635677dd93f665456890cce393650c11f938295279acd111f2c61dbc11e4bc6d5
SHA51280a1728d923f99eaf833e8b99e9d9672d8e5fa8ad0536bf6674387e6edfe227c4139af60ce3cf378cd623d98e56d4f4ace9913de439e51ebc3210a81d6735a21
-
Filesize
22KB
MD5b52e90f6bbde07ce8bdb79f7aae57fc3
SHA1041f2fa834ed16a2fb345b7c1d328c06608afdea
SHA256843e8e6339e285333f8b8ef051efadcb59828b050f395843a1ce0bbd14f37817
SHA512a726a272dbd5c4b13e3cb1d787ea468541e80db3838f8ceea0c993fc60e30e85da59f17fd88be9831431b978f12d0c9f59a27986edec416f680abc91801fa251
-
Filesize
23KB
MD59f8acee48d32686eae557bdf9be9b46f
SHA1013389b670b86a06121a068dcfd4cd74b7694c13
SHA2568efc06e1cdca5ac4ec2a25b1d4e4b8162f64439279e26f788f7bf4329f051c4f
SHA51256dae7578af63e31de5933128883e4e8f1b8958ac5a6053e97fd48f64c435ee0ae0faab120f4ab45dfab1f3f869bfb8fa51d18d2cbc5012a74faef390d2f78c0
-
Filesize
900B
MD58f7b441d38385854de912e86a6c22528
SHA14183cd5989bcb5fd219705c37d5f6d393eb18be5
SHA256179264ae8e7aa14695717b3c95f199938d6ca7f02704b02fa63404f36a64f587
SHA512e740c1614e7278a87e81180763eb274c8378ea107cc61b34b2cba847ba878275ab33cbab010c997645a1f7ffe3c06820ad26ad3cc777a99811f097935eabe4a1
-
Filesize
467B
MD563167b02fc9354c7b1579f34715be6cc
SHA1d5dd4b63c8336cc348d9b4641f8617eec6b2fd47
SHA25692a94b04439e8596e3b3d2172767a1c9a810ef634b826a6d3bc9d1d036cd7546
SHA5128c5932bb4f7ea6b44db9878cf95b6c95651811e5402e0297e1ef03ddd9310fe05a449b2a31f2fb71afec056868ed75e8f07c6bc1f231d3a481fce2ca2a3ed91e
-
Filesize
19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
41KB
MD5f90fda1522722eaee85ce9e5c27dca9c
SHA19fbf590ef3056caf766d6f4b2d432e98042d7fc5
SHA2568871ae29333d1b1280b5ba9b00b210ee546a8cfe0c74652195631c15e8da6454
SHA5124fb1bd29eec4312bb90f880e7f9062df78d7e796ab0342414467c366cde120f959afadc25b3467b5b9ebbafa526f1989e1c1733f01dc7e71520e1dc08811513b
-
Filesize
40KB
MD546716a2f6b3a7b7e6551a620d0255447
SHA18d0273e01d4c30b733b145ba7dd763618dbcdf00
SHA256eeec3193a759784fbbe4d204d34c69c5215e5a6e671f342ded5a4d5a7eb58692
SHA512e7efeab7521ceca880b52d7cc67ad5c52a24547c9c25030d02b364941fe7d8a933db51be31e55869503b8e5a226226cc3af891589d227f15b1605b9945a6cc03
-
Filesize
50KB
MD57c2bc9f206b73813060c2d2eabd0f18e
SHA19411e01e4cb4c8c8f3dcb253909e9426a48ab1fb
SHA256361cfe3f8a810306ddeebe18496f85df96c6c9fbcc059d608172cdd25dfb86f0
SHA512b0e976277aca187590c894369953d0e85fd87d80f0d73d969842c140783c96194f23f89532aab74fbfa432ebb0913d1897b73bf02823962bed3a8a37f88e44b4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD589e3fad019ce6cade2b3db27f68f3e3f
SHA1ec60234777059d14b1e281fd21d9bb3b08b9c32a
SHA256f9c78cf22603a428dc8cd82c9c29c11e798d0d332141209f441f078ff215a6c6
SHA512643a57f77de526155fba5f1adfb085074f6b227ea6ebd9bcd16d10efb9b8886113dc3f27e4f07272998471f7ede3ba947e1ad256c161793660d16518efe3ba45