Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 21:02
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/3ZVQDLTQ#MLbn5bUCdY06l5EcAtZ9MrwnMXe0hcXYqIKFKBwFi7Q
Resource
win10v2004-20250313-en
General
-
Target
https://mega.nz/file/3ZVQDLTQ#MLbn5bUCdY06l5EcAtZ9MrwnMXe0hcXYqIKFKBwFi7Q
Malware Config
Signatures
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\msedge_url_fetcher_4088_1114733672\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\offscreendocument_main.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\te\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\kk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\sv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\ur\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\fr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1844200671\LICENSE msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1912405132\deny_full_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\page_embed_script.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\zh_HK\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\ko\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\af\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\hy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\is\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\128.png msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\mr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\ka\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1844200671\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1912405132\deny_etld1_domains.list msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1418341681\data.txt msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1418341681\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1418341681\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\be\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\kn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\cy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1901168435\protocols.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\sr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\lt\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1844200671\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1912405132\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\th\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\am\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\nl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\fa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1912405132\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\bg\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1901168435\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1473256679\sets.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1844200671\keys.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4088_1429236527\_locales\fil\messages.json msedge.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133878421871913010" msedge.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3446877943-4095308722-756223633-1000\{14256AB7-F399-41D0-9A35-1B649AEAF2D8} msedge.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe 4088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4088 wrote to memory of 5480 4088 msedge.exe 87 PID 4088 wrote to memory of 5480 4088 msedge.exe 87 PID 4088 wrote to memory of 1988 4088 msedge.exe 88 PID 4088 wrote to memory of 1988 4088 msedge.exe 88 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 3700 4088 msedge.exe 89 PID 4088 wrote to memory of 5148 4088 msedge.exe 90 PID 4088 wrote to memory of 5148 4088 msedge.exe 90 PID 4088 wrote to memory of 5148 4088 msedge.exe 90 PID 4088 wrote to memory of 5148 4088 msedge.exe 90 PID 4088 wrote to memory of 5148 4088 msedge.exe 90 PID 4088 wrote to memory of 5148 4088 msedge.exe 90 PID 4088 wrote to memory of 5148 4088 msedge.exe 90 PID 4088 wrote to memory of 5148 4088 msedge.exe 90 PID 4088 wrote to memory of 5148 4088 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://mega.nz/file/3ZVQDLTQ#MLbn5bUCdY06l5EcAtZ9MrwnMXe0hcXYqIKFKBwFi7Q1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x24c,0x7ffa069ff208,0x7ffa069ff214,0x7ffa069ff2202⤵PID:5480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1816,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=2188 /prefetch:32⤵PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2164,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2432,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=2560 /prefetch:82⤵PID:5148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3424,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=3456 /prefetch:12⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3404,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:5260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3932,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=5048 /prefetch:82⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4844,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=5092 /prefetch:82⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5592,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=5584 /prefetch:82⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5672,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=5636 /prefetch:82⤵PID:6036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5672,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=5636 /prefetch:82⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_xpay_wallet.mojom.EdgeXPayWalletService --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5900,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=5960 /prefetch:82⤵PID:6116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --always-read-main-dll --field-trial-handle=6160,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=6180 /prefetch:12⤵PID:5340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5848,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=6456 /prefetch:82⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6472,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=6592 /prefetch:82⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5828,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=5632 /prefetch:82⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5940,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=6456 /prefetch:82⤵PID:5124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6428,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=5928 /prefetch:82⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5280,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=5156 /prefetch:82⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5716,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=6568 /prefetch:82⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6632,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=6608 /prefetch:82⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6608,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=6684 /prefetch:82⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5188,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=6596 /prefetch:82⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6644,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=5952 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=2792,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=6672 /prefetch:82⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=1052,i,9786129495303043231,6125185280707270496,262144 --variations-seed-version --mojo-platform-channel-handle=3488 /prefetch:82⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4736
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:872
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:2520
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53B
MD522b68a088a69906d96dc6d47246880d2
SHA106491f3fd9c4903ac64980f8d655b79082545f82
SHA25694be212fe6bcf42d4b13fabd22da97d6a7ef8fdf28739989aba90a7cf181ac88
SHA5128c755fdc617fa3a196e048e222a2562622f43362b8ef60c047e540e997153a446a448e55e062b14ed4d0adce7230df643a1bd0b06a702dc1e6f78e2553aadfff
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
79B
MD57f4b594a35d631af0e37fea02df71e72
SHA1f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57
SHA256530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1
SHA512bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
118B
MD5480658722b6b11b003d0bf21f99ccb48
SHA13996d7f8d0e4366fcbb699602f9f4641d04a0029
SHA25664a5731a05ec7739548f46a0fe692de10acedc001c4394b46ba5b1fb15f4e9b7
SHA512bf1a5bfef2167b14632c6e09877e52c418da0d3eb417133b02f11a50b62aab9b6ae68a8f73dac9106ab719a14509a203512a10d3724e6a4baf4afb2d36a90ad3
-
Filesize
280B
MD57b0736a36bad51260e5db322736df2e9
SHA130af14ed09d3f769230d67f51e0adb955833673e
SHA2560d2adfd06d505b9020c292d30597083d808bfd90ddc0fe173def5db96832a087
SHA512caabdc6a8601b93f3c082e6506b3c9efe2242b90e92e86306dc0bd4857d33343ba395325fabb21f5db562d3e3932f52f77de547f379072d0154efd5f1b1cdeb3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD5775d880f6e09516f677e9345066b1aea
SHA170973ea11d40ba06810ced58edde1dd6e4f65e98
SHA256b715f385829e21ad0f4fec0010f61f70f87758189b026f75c6ae9e95950d741d
SHA512e5adfe82073acc817ddf68ca2d50947650b770d71dbf48e1f18a823c24b44c432a1033d67b8b8a2947266766a76e48806c658ec52d339256f2b22d6d05829602
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57b381.TMP
Filesize3KB
MD52e6d2e5794c83645e339725c7fce05eb
SHA1c6201f7ccae064fcf9076b8c5a8fb142fdea1da6
SHA25635f3f0532249551d92e72e9b752303e4faddb453323e315c78d8688fb5b6a92d
SHA51239b1fc20530218fe41526dfdb6e0eaf221188d16c667630c8c9aca3a5989ee2d48a52fc88c939488ee3f952307a87d8d7e09952264697751161360632a2a70fe
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\File System\000\t\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
107KB
MD540e2018187b61af5be8caf035fb72882
SHA172a0b7bcb454b6b727bf90da35879b3e9a70621e
SHA256b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5
SHA512a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
2KB
MD567c1e11864881ee6187488277506048a
SHA1522834e495134cb96b85a96e8391f54cc65d3256
SHA2567b4d5e99152e07474dcfca1e36014b99cd98660b4a7845fd5564aa04bc3c9fb9
SHA5124c79ebad5578b1c08ac88073d792224dced4d985f4f7332a8be84407efd17da2f06969ee40a7bd89e432a0832bf2d75b31228e0127663cded3a687b190998d5a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
15KB
MD59b4d48e2a4304b600567c10ad5d17546
SHA160b0a4a45561a2594401000ccf52b2c180843ff6
SHA256dfe144c2e1bfb77ff38ea1c7f70b16759dc77c61956e554f49de259aa12bb079
SHA512a40792808b6c3af69d5e2280e718f6c8f21e3988a2a68143ffdee570cd8dd165ee9a13429be04d2dcdec5eee38b7ad22aa043e9a6ffa23da4184be5d4d14d852
-
Filesize
16KB
MD5ae869564108f74875d9438ac89a3a514
SHA1179e307d5bd29f2cada5f9ad1bd6cd63ba6169f8
SHA2560f1aee73eab9c151e76eeb6a47953390856b4d40319fb231f1eed0fc385684d8
SHA5126d03c09147ff5d2101c302c1a6b8d475f2b82e585b162cc58889e2fd22251dd085377afaf6da705f0ed5e21c304e61c48038596ce8e9e15d9c2575ac0ed7f670
-
Filesize
36KB
MD588d34605c58e03cc00be4e2f40072e3f
SHA179a0e0abdfc81d5b9461a6d8e0e92e367dab7894
SHA256fe3e52bd11bd388314e87303e22b05190066c1fb4e321b71d00201bbc7772425
SHA5127294166324c52b5da362d04ab845359a4f2faf75d82dd1aad376eb7ab59bccfb104ccf879524d811a184462b427abac2ed5c2d06897aa7b8e61baff10e18451f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD55e0ff7e6f30b1423e129ef32572b72fb
SHA12462c54291e42bd6f5608ad67d10b70450e9d1d3
SHA25685f824814d7c318d0bfa75644914fa5a69852ed7311ac15e7e52428c70dc206c
SHA51202199f4898eaf5a8390b4fbbb37913e15fc02c6ccf17641c510b45e1250a672a9f147e90a13bcd52bcbf62329196a5e14908b2639bb588a0828eb269f057d80c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57a037.TMP
Filesize48B
MD5a9d4923b32ddc6099fc63076dfcd8a6b
SHA1a5d38ba86745346c761c8774df37304a6b47f7a0
SHA2567f4bde352bdde1b03a326fcf12dd490369f4daec1f5b68063767dceada70c2d9
SHA51260540f3acdf0d9567b4e0fb8d0fe8c10238198048d26ff7120ef1747c77cb33035fdedffbdbf87ca3b97e86d79f05c898147cad08428a2d72e77f5d05c0bdc92
-
Filesize
22KB
MD5044ab327dbf9a0c00709a87483beec57
SHA1026bda8919215190cd85ee3f69072ce9b9ebf120
SHA2560d53fc3be3a18b3930348ef859f3e4b1fe4bb19e3e95dc731e2190460d565426
SHA512397b3ba0128776ea57455d0a381df009c0b19b1675387aea3ad3072ef1fbf8f656b3d1fad2206705c22e95b9127b9e0188541a4fd92453fcf8b8300a61ee2884
-
Filesize
113KB
MD560beb7140ed66301648ef420cbaad02d
SHA17fac669b6758bb7b8e96e92a53569cf4360ab1aa
SHA25695276c09f44b28100c0a21c161766eda784a983f019fc471290b1381e7ed9985
SHA5126dfa4eca42aea86fba18bc4a3ab0eed87948ea1831e33d43426b3aca1816070ecb7fd024856ad571ca2734214a98cc55e413502b3deef2c4a101228a7377e9d5
-
Filesize
896B
MD5cae034a6d9579f625bbde965e8ada901
SHA16a4cc50e82594fce2cd2c56e0e49a8a524fa1b99
SHA2568a0999fd3bb2ea335b01465ee17f916e38f6fbe6034cc6aefcdde72577108384
SHA512f3a931f01879bde4ef4684eff31d41696eabd24bab755a8971d40bc1f55302ec935a311b80b86177f3381d4e1b8e6d96cab6f1a783990e545402572409a6594c
-
Filesize
465B
MD5c231a0ddd6f5aabcf6b63cc7081f875b
SHA1d78042c68bd2d4feee5d0827ebf6ee660c2b854f
SHA256e8f60790797b9c763de4b6d4b7571c1e6bf68847aaaa29180a1bc42c8e198e85
SHA5122909bedbd1245eae74878bcd8681c6620e0f0f6a9acd4ccba9625d5650ad00f8d8230f2962bd697bbaf4300f35a2c8ef852638822a59a1ad3e173fc284b1050f
-
Filesize
23KB
MD5d41438b11aeb60e9fe39b1bc757263cf
SHA16c74aae04cc2d5e262b46f1613a7c7a2875645b7
SHA2560ecea7b4826c031e245d54dffdb9fa5fbece6a51c40df77223149ba7523cf523
SHA512a97fccc6a0647624272abfcf539ba36155fe1548785b12d3383d18b3260362def30acf263d230ec28b567d92c5149ecb11255f70b82d8c9584de94f5cc3e7845
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\aeac1105-77a3-492a-8723-cf039de293bf.tmp
Filesize19KB
MD541c1930548d8b99ff1dbb64ba7fecb3d
SHA1d8acfeaf7c74e2b289be37687f886f50c01d4f2f
SHA25616cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502
SHA512a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75
-
Filesize
54KB
MD51533f111e55908acbd8e58de2df266c2
SHA1395aab0c4ae869f45b26aaf902487c813f0f795f
SHA25679a7d688b8eba00ef6700bbea6ad51db06702bdc33378b4de28c8fae6c57e0d1
SHA512262e4357a6fc2dca2b9e6e45f9313c94bf665b488a442fd8eeaf34accb1c0f18d4a383f072e4ad9fe2308af10eca508fdd4afdd02d8aa432dbfe7a8686e24c8d
-
Filesize
40KB
MD5a240e35638d41a16983cd0b5926106cf
SHA1679ffccc8b527e8343f6fc1d6de72368b4493daf
SHA2562d47165d17e6e65e20f9551e1843d30fe4d537a185d90c7f4bc1f506e76067ba
SHA5122864303bb7fe16c61ead413a5f5aa9d0cc6eefac006245848337806f2af5b463eb6c1e9845dd542522e89a6c27e064ceef8466fc1549a7a89418180a4cb1d880
-
Filesize
40KB
MD51f6aed0250a099d9c72ea1583efd1c5e
SHA1872cf950277f6be032a7bfcf909330758b5fffc8
SHA256016798fe8d6dc94cc3d23eaaa48e42d2a79ba700058cf36257303275ba86a4b4
SHA5121a9d8c7d64d653f30494a2977ce6fc1455ad9eecaa4c450e3016291a9a74245ac42bab7eea0bed85233b92ac6248a85c61c13cad8d97a47e4764182d59896f73
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json
Filesize6KB
MD5bef4f9f856321c6dccb47a61f605e823
SHA18e60af5b17ed70db0505d7e1647a8bc9f7612939
SHA256fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5
SHA512bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.3.30.1\typosquatting_list.pb
Filesize628KB
MD598849c1db14656cfab9c60b3612e3237
SHA115ae02571944517c9d8a87edc1634ba7c6721ebf
SHA2564ff29e509df32a6171a22f67e04faa4f11a10944220abb920f131b715e30f28c
SHA5129863aa647c8a7ad552e41a1b5973604253d49e1be6d7e4a08c864ef6a6f6552ee093576bbc2e83be4e2a4003a7fd343c78f714cf7a935607effbbc7f39e70e1e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5ca9fd084bddf8a073bd15ddae5176efb
SHA18f9fa5b31f295ac35ee27d3b13c43bc1419246bb
SHA256311813b0ad91ad94534792ff72a6c9f5bb54ccec9a51c7a43a00d8475871c152
SHA512bc8f80a639056415b5e98599b0dce724db4a744d8ce3be2629cc605ec272bf7e147903c8f6df1d9f7b6b679c8b258b7556e7fd92abdc070d876e7363c5e36036