Analysis
-
max time kernel
287s -
max time network
286s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/04/2025, 19:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://tria.ge/241010-x34qxsxfql
Resource
win10v2004-20250410-en
Malware Config
Extracted
darkcomet
Guest16
127.0.0.1:1604
DC_MUTEX-7X99PTF
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
DNgeskLTppzX
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
System32.dll
Signatures
-
Darkcomet family
-
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-shared-components\de\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-shared-components\zh-Hant\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\wallet\wallet-checkout\merchant-site-info.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\wallet\wallet-checkout-eligible-sites-pre-stable.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-notification-shared\pt-PT\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_2126241094\hyph-de-ch-1901.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-ec\de\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-ec\it\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_2126241094\hyph-sl.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-hub\pl\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-mobile-hub\en-GB\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\Tokenized-Card\tokenized-card.html msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_763317757\shopping_iframe_driver.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-notification\zh-Hans\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-notification-shared\fr\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-tokenized-card\en-GB\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_2126241094\hyph-af.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_2126241094\hyph-gl.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-ec\ja\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-mobile-hub\it\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-ec\zh-Hans\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-tokenized-card\fr-CA\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_2096877718\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-ec\th\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-notification\fi\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\Wallet-Checkout\load-ec-deps.bundle.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_2096877718\_metadata\verified_contents.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_2126241094\hyph-cs.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_2126241094\hyph-es.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_2126241094\hyph-fr.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\bnpl\bnpl.bundle.js.LICENSE.txt msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\bnpl\bnpl.html msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\wallet\wallet-notification-config.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\Wallet-BuyNow\wallet-buynow.html msedge.exe File opened for modification C:\Windows\SystemTemp msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-notification-shared\ja\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_2126241094\hyph-et.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_2126241094\hyph-sq.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_896750390\Part-DE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-shared-components\id\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_1199508628\deny_etld1_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_2126241094\hyph-gu.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_896750390\LICENSE msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-hub\id\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-notification\pt-BR\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\Wallet-BuyNow\wallet-buynow.bundle.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_2126241094\hyph-as.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-shared-components\cs\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-shared-components\fi\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_1199508628\deny_domains.list msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_2126241094\hyph-be.hyb msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_763317757\manifest.fingerprint msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-hub\ru\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-mobile-hub\id\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-notification\el\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-notification\it\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_763317757\product_page.js msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-shared-components\ar\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-tokenized-card\fr\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-notification\sv\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-notification\zh-Hant\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-shared-components\it\strings.json msedge.exe File created C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-hub\hu\strings.json msedge.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Winword.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Winword.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133888726716340072" msedge.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2787523927-1212474705-3964982594-1000\{554B0BC4-61CD-46B3-9DD8-583A6D55F1AD} msedge.exe Key created \REGISTRY\USER\S-1-5-21-2787523927-1212474705-3964982594-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-2787523927-1212474705-3964982594-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\241010-x34qxsxfql_pw_infected.zip:Zone.Identifier msedge.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3240 Winword.exe 3240 Winword.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3500 msedge.exe 3500 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1444 7zG.exe Token: 35 1444 7zG.exe Token: SeSecurityPrivilege 1444 7zG.exe Token: SeSecurityPrivilege 1444 7zG.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 1444 7zG.exe -
Suspicious use of SetWindowsHookEx 32 IoCs
pid Process 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 4584 OpenWith.exe 3240 Winword.exe 3240 Winword.exe 3240 Winword.exe 3240 Winword.exe 3240 Winword.exe 3240 Winword.exe 3240 Winword.exe 3240 Winword.exe 3240 Winword.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2308 2104 msedge.exe 78 PID 2104 wrote to memory of 2308 2104 msedge.exe 78 PID 2104 wrote to memory of 924 2104 msedge.exe 79 PID 2104 wrote to memory of 924 2104 msedge.exe 79 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 3920 2104 msedge.exe 80 PID 2104 wrote to memory of 1684 2104 msedge.exe 81 PID 2104 wrote to memory of 1684 2104 msedge.exe 81 PID 2104 wrote to memory of 1684 2104 msedge.exe 81 PID 2104 wrote to memory of 1684 2104 msedge.exe 81 PID 2104 wrote to memory of 1684 2104 msedge.exe 81 PID 2104 wrote to memory of 1684 2104 msedge.exe 81 PID 2104 wrote to memory of 1684 2104 msedge.exe 81 PID 2104 wrote to memory of 1684 2104 msedge.exe 81 PID 2104 wrote to memory of 1684 2104 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://tria.ge/241010-x34qxsxfql1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x2e4,0x2e8,0x2ec,0x2e0,0x2f4,0x7ffeae1af208,0x7ffeae1af214,0x7ffeae1af2202⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1740,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=2012 /prefetch:112⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=1920,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1832,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=2480 /prefetch:132⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3412,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=3476 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3420,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=3480 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4840,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:5604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4652,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=5016 /prefetch:142⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4640,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=5040 /prefetch:142⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5556,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=5564 /prefetch:142⤵PID:3136
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.execookie_exporter.exe --cookie-json=11283⤵PID:1248
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5568,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=5592 /prefetch:142⤵PID:5292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5568,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=5592 /prefetch:142⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5676,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=5692 /prefetch:142⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5740,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=6072 /prefetch:142⤵PID:5820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5484,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=5956 /prefetch:142⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5896,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=6112 /prefetch:142⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4636,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=5104 /prefetch:142⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4128,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=6076 /prefetch:142⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5680,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=6172 /prefetch:142⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6116,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=5832 /prefetch:142⤵PID:5396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2100,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=6168 /prefetch:102⤵
- Suspicious behavior: EnumeratesProcesses
PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --always-read-main-dll --field-trial-handle=5284,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:5576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5216,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=6180 /prefetch:142⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6332,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=6388 /prefetch:142⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --always-read-main-dll --field-trial-handle=5904,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=6516 /prefetch:12⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6072,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=6200 /prefetch:142⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3916,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=5300 /prefetch:142⤵
- NTFS ADS
PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --always-read-main-dll --field-trial-handle=6764,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:5408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6644,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=6380 /prefetch:142⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5804,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=6740 /prefetch:142⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6732,i,1932516690540775977,9020182678598375982,262144 --variations-seed-version --mojo-platform-channel-handle=6744 /prefetch:142⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:4984
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start1⤵PID:2248
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start2⤵PID:4680
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5528
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\241010-x34qxsxfql_pw_infected\" -spe -an -ai#7zMap4461:120:7zEvent288041⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1444
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4584 -
C:\Program Files\Microsoft Office\root\Office16\Winword.exe"C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\Downloads\241010-x34qxsxfql_pw_infected\3178fcad2d2c2f3c0f4f70aecfb18db7_JaffaCakes118"2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3240
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD534d09b852bf4a5ef1d936591501926ca
SHA188ff0b1c2a5664765e11e47843a5ac8e1782ed0c
SHA25652bd897dfdfca849d627b36a49b976eef861b1a7af075527c8f247adb862dc20
SHA512dc63eebf94384dc9580f5e3c9291047e8d410f8fc1f746d180673f445a9bbe746608c01cbf10a38f2f935cfa5c8bb89864f87cabd8fece809dcaa1fa137f71d3
-
Filesize
216KB
MD550a7159ff34dea151d624f07e6cb1664
SHA1e13fe30db96dcee328efda5cc78757b6e5b9339c
SHA256e990d9d31c4c7d57dd4795e43baea05501fb6ea8b7760f89001be660425dd01b
SHA512a7768dd7e315b07754a305080e0fc023765e5a224b2c3824e8e10f29286df63bbdefef379e069941fd8cd9c7c3befce976779ae2efdfb6e7da697b09d7f07250
-
Filesize
3KB
MD55a193491fe70b0fbeeb53b0d6b1b86dc
SHA128586b87e5d4124e7075c3f00015631162107eac
SHA25644d698c713ca17392b110dbf72731653ec6f4bf3e72855ae561d2919ca8813ec
SHA512fc660ba5acdd4dbe98aff05b8a0b9ede024b90f267186c67c50ab84acf4078914c854156cb377f00394b54c294bc4edfcafd263fb469ee6299ff7b71f785a43b
-
Filesize
3KB
MD57e43388c7bf07f7c71fc38da7328e0c2
SHA17089983a03b21be4b190ae580bfc08a61137d81a
SHA2565a323c35b03caf09df32a20fbf868b3f250a6923f6de0b9f4d2c762cbd5f9c26
SHA5121912cb1203a8995a0efcb8b04a9f22cfc75501cfa99cfc49c05c9ac6fd4aae54f84be136ef978609021f3c03d724296c103fb1dbb55798f1fcfa5640ea59e001
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize3KB
MD591eb6fae86a3d6f2a02ce78a2f92c28d
SHA1e59f158d4a931fc4de9254064bc45a76d656b3fc
SHA256ff6da71fc013f7737fe8d788783ea4ecff968933386499a61370ecfa7bd67ce1
SHA512ba144cf6112bdee387ae60883b1eb0b6f14b539f648b787b8e59879e7f43737bd9e5196026f5d4c350af09868bdd8763be40d41e0ae37af686232278fcdbbaca
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57973f.TMP
Filesize3KB
MD51845e195003649416e71eee4154f44f3
SHA1445dd403e2e8a12baabec7ff8448359bdfc7cd48
SHA2567a9d87d3f2ce927a89bfa2c06ccfe4ae18859199879b99a54458f08beb1f3f88
SHA5124b7767b5fb8d99ead5053a0d9731791066cb57b005eb25abbcf25d05799fe726ff6c61937e8fdee553e756d15f34ace045fa392dc8c71badc2cafa950f024385
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
Filesize
4KB
MD5c8313caff81721c29979a175a57f0232
SHA1d4e1789e5e244421d2968a10e9377a44cb0cbc84
SHA256ed0524ff345430f0e03bac03268c8af1eddbb0dab25b4167b000c9d4e439468a
SHA5123b9b66e7067a0e8e97547396285383a1b4e2b8938924f5a75cd6dd53e8a7e5e669f6a2fe1d2e967cb156b8cee5f88f4109828ccbdea4efad6a646b070d9eb2b6
-
Filesize
4KB
MD552a20036fb77d5beca7d18f14884e645
SHA12a5e09c8bd01de05380035826a85880813f40282
SHA2563c9346c5d53a702870221548d74ab6604288b4fb9063be1f97883ee0671fcd53
SHA512bb8237db71bb1902adf0654df12403c3a2882a688784dd38c64fb92e8358651c8e144309e4dbf55bb65a39513469d0ef5213cc865aa147079809949047c2a578
-
Filesize
2KB
MD5a482a9b3b68775e5453cd65db9a11d61
SHA18a960a48c9e4225e2bd11cc52962213e4308f526
SHA2567d63570906b7e670b68d65240cac54e44bc9b691dc22b77d94ead9f090e6a20a
SHA512de13f6758960d278f7613af7d73ee852b9fd2de61a10682acc48290abc0c8ce1c1a453c34869225467972514b84caca0ceebe1adf264159e10c2b4c9d9d00bec
-
Filesize
3KB
MD565ec1f9bdaf48a9c06fe4ecde0a8f3d1
SHA14e9a9f1ec56b0033c294f56ae7815f23455d7518
SHA2567e1e7253470dcbf6bb9bc3d3d3a3a186e1ef5482c3a8905169f6f6c021f74192
SHA5125403d1539939621160fedba150f1ec40c4d2df616db224f7294e1694440fd11f46acb02a8bed87ded73e07d5231761f1e374bf4ef604617c9f2f4c6711408d62
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
16KB
MD59019906ebf10c1ca769d45c83ec9d5fb
SHA13cda467300d07941ceb6e5430564347d0aa61b63
SHA256c9945aa3544a98aac44d19c0a7bb57923946013c379c5e7cda97cbf452b9b7f2
SHA512fc3c68dc32bfa757151208ec1348d18d4e32c56c174aa71b110bc0d1bc73984d790bd87e1ebe54b5e2aa20dd4f59961be09f1688781ec58050d266457e2dc67c
-
Filesize
16KB
MD5cb9da949ed07f7f6ffeefeffd363ebee
SHA1edfe108806742a120e446ee4e9b93a4eca6c713c
SHA256adc510b85438cc7ec143df57960ceed745f8894354a64924a7fcee1a2f7ddd14
SHA51226ee8ca435192abeeb0cd36fff0b7b7581f43bf932f491e5ad1fe76d961f6f29349481c34de97deed60fc4d7756fb93830be399f139a3e7d49b3509c8a7ff816
-
Filesize
16KB
MD573e0108d3120dbc957788a25bfc491d4
SHA121ca294d3483774bd97b5ada1641354d735207f7
SHA256e0548d697f3c318df00b3afe322e9e9fd8744ca81ffb36a7444b8f8074acf381
SHA512c2605d459085dccc8b9edd09e0ba1c1bccd2fe6567b839490406e85d8c4c4f05bf3eaededc34990b6463fbe9e0382c83dbb1449c6028aaf2b1580aec11aa8911
-
Filesize
15KB
MD5fd1f53a0cbe5251f393a80647c641e87
SHA1e4e1196adf5495bbc0b253f25c31e1320785aa59
SHA25673de001de1aabd297ceb2695195b4086fb2a15907b3a9179473f091b0ab0c320
SHA5120586d3ba304ce2c247a732f5accba1025405ae684a4f3d42a36f883023a5ed8f76c3298da773ecf08aa532fd07326750855f5bdfe334c293d574f39d4c210913
-
Filesize
37KB
MD574dd70648029ea3523253bc7e87704c7
SHA18b658634e87d675b14ddbd278d34190edd107cb6
SHA2563a73d0023c44a14f3b6f09927426f23cd43986d23865ab04309b0e65c74ce204
SHA51251f82b6a6bbd35ddddf49e0d63252ede8024a45bcac78357cff94128f218f7dac67b5813bb602fd9ca630c43c48cc292e15b8907691aa123fe4bb4ac1843b8f8
-
Filesize
22KB
MD523ee7b24517fa06b9b144a13448efab8
SHA1d23fd232373550f4837e99847ce0943ba436970d
SHA256328107829b6dcb93ca9c4145c314aebea908a8768810754a0bf934951af77eae
SHA5124169e626bd1418be06e69b15695ea90cca1ee2cc9c513c23fbc1c871ae9f12f68aa1625682905b7b1e5ecb2749d8f29fc75b813dffa0fd0359f24341462e872b
-
Filesize
469B
MD53efd0ed4976a0949ae1babdfdb46ca72
SHA16fd66530059eef9670b23028ce47a721201857f0
SHA2569d9f1222fd29775304521b6d81d2f6fb3782319b5bacd96303a8abdb879f386f
SHA512e4ba961452abd69d938e34fb80e172c6a88fa731dfe380dbecb18fd9a57963885730e09a439152780c10035cac4da340b220f29d95b254821a7f6d5ec357cc7e
-
Filesize
904B
MD56f3b7ba40418804fec98a02ce4c38696
SHA116315844f6dfdf480d8bcd8f6a2031881d9a40f0
SHA256d47e9c7889d1c7856ce220fceacb3b4ab14cc2e051f84d0d84393739db258173
SHA51284d50026210ed63adb10372639f6602be393d749281e82f994b88626ef5279ebc8c00bdfca090f9dc3b7dc0026d9af990fcfa5666b7c843e61f27407c5fb4c3e
-
Filesize
20KB
MD5e1a108e3031366da72f9ee937643f15b
SHA11639eefcbed3d3e681131d858be56a191440ae9c
SHA25659d58ccef6d94d22f4c6182982f2127c2d31230e42a3368686a90242f15e6a95
SHA51264243fda8b0c77a948b3b61c584cf71822e3a90038162b88dfd97335450adf3b70f49105be63d8770603f36d1819c579ca9afc4f1a4e58920ec1bff937ec8b6c
-
Filesize
22KB
MD53f8927c365639daa9b2c270898e3cf9d
SHA1c8da31c97c56671c910d28010f754319f1d90fa6
SHA256fc80d48a732def35ab6168d8fd957a6f13f3c912d7f9baf960c17249e4a9a1f2
SHA512d75b93f30989428883cb5e76f6125b09f565414cf45d59053527db48c6cf2ac7f54ed9e8f6a713c855cd5d89531145592ef27048cf1c0f63d7434cfb669dbd72
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Shopping\2.1.37.0\edge_checkout_page_validator.js
Filesize1.1MB
MD5003fe9be736ed918d1fa5738e03dee2a
SHA11875f50d89bfa23064db1a7c2d80f97e3f4fa1e3
SHA2563bb1b93f917e9d8e76afa18c3f6d88bd7708b26f5142b29b8e977af80e93d8af
SHA512e6af65d2586da8a96014faeb9ce5986aeecb04145f66b32be0d2cf849d6e56c22c179ac8adb9211e7ab7cc41d9d8e0a8f7910210b8adfd810f13f43563c4c5f6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18347.18346.65\json\wallet\wallet-checkout-eligible-sites.json
Filesize23KB
MD516d41ebc643fd34addf3704a3be1acdd
SHA1b7fadc8afa56fbf4026b8c176112632c63be58a0
SHA256b962497993e2cd24039474bc84be430f8f6e6ab0f52010e90351dc3ff259336c
SHA5128d58aa30613a2376ccc729278d166a9b3ec87eca95544b9dec1ee9300e7dd987326ea42d05dca3f1cc08186685f2fdaf53c24fd2b756c1ed9f2b46436689dc74
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18347.18346.65\json\wallet\wallet-notification-config.json
Filesize804B
MD54cdefd9eb040c2755db20aa8ea5ee8f7
SHA1f649fcd1c12c26fb90906c4c2ec0a9127af275f4
SHA256bb26ce6fe9416918e9f92fcc4a6fe8a641eceea54985356637991cf6d768f9fd
SHA5127e23b91eab88c472eec664f7254c5513fc5de78e2e0151b0bcc86c3cd0bf2cb5d8bb0345d27afdd9f8fcb10be96feaa753f09e301fa92b8d76f4300600577209
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18347.18346.65\json\wallet\wallet-stable.json
Filesize81KB
MD505f65948a88bd669597fc3b4e225ecae
SHA15397b14065e49ff908c66c51fc09f53fff7caed7
SHA2560e329e63d8457bef61d0986a521f81d747a09dadf3b1136f2011942ba14d9fc0
SHA512ed7b767a741d18c0dd35e0311db752120e0f090d39ef976d541cbc5ae78fa32655cb3f9c27cddef6ca8091ca8bf31513254a748bc8b95353897f6198a667cf58
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18347.18346.65\json\wallet\wallet-tokenization-config.json
Filesize34KB
MD5ae3bd0f89f8a8cdeb1ea6eea1636cbdd
SHA11801bc211e260ba8f8099727ea820ecf636c684a
SHA2560088d5ebd8360ad66bd7bcc80b9754939775d4118cb7605fc1f514c707f0e20d
SHA51269aff97091813d9d400bb332426c36e6b133a4b571b521e8fb6ad1a2b8124a3c5da8f3a9c52b8840152cf7adbd2ac653102aa2210632aa64b129cf7704d5b4fa
-
Filesize
41KB
MD5492fb3c819b798f066e743662ffccad7
SHA1308ecf1842b890715dce51a79fa66ca67cd09141
SHA256a151d37f156540cb04b07a5f00d2783fba3e3fac3ed647a72771100962954c0c
SHA51287f8733d040cd74cecc2f17d3e8a87c4588f9a7bf88fd744e97b1b9afd2ea776b45b1f89150261013bf4c0066896845f984b746244ba7ca9c4c19075acddd133
-
Filesize
41KB
MD56c03aac03895b626fde1eb22c09ea863
SHA112c9db131d5ab81ffec6af821d00dae4677289bc
SHA25626847136fa45b11daae173c4c2015d51992edb3a3f743a367d777a7e80a6459a
SHA51203ca33568a5862a93d58a75f8e59362e20fa56014b975f89ab2b874f95a7847380b981d79796d9adfe97a8c8f25c93ab7342c291492c8e7d49ed478c33054d23
-
Filesize
40KB
MD50d044263a7549dd46d7249c2a90bec4a
SHA1b11dd7cbd97111d6e8aac1ed2d4ab18825f79912
SHA2569522d6733e893fc7ff9497674cab5f33960e94ca2d9f88db19ab332489529bc6
SHA51289b4b0926e673966f8b16767ec5b6e1ac284063f2afd2c544a9ba3672ca5e6876c4cd742da8d0c062047f6d0b28a0df4ba24f3d0045ae5c7aa226f4359c85baf
-
Filesize
46KB
MD5b6dd24579cc2a32f14d9cf7ec1bc99cf
SHA1cf86ec634ffe3b42f180385a8043f5aa0204c37b
SHA2567afa887ea889db3f0254f17363d84bc3b8089bd1de8654d8d74e7f25ab84d5d8
SHA512a1dd7368937b5e031368296c148b77cce84dce8b969071b5437099db522c009d88336557bc325fec8fed537da1de36c84e0aea8eab066c213adf486ee247f1a7
-
Filesize
46KB
MD52c77dfd945ae3fddd0ab307f1bae0cf3
SHA1b99e8cc7209c084e0ddb6c8efbcf12ba70ed71a0
SHA256b6d241bb95827a32d46a288a2276c7916e64187b575c1ed8d23fdf77ce919a5f
SHA51216372e3867719afb40958c82e478272acbc9941023c7e3939015ca0fb44988a0a78d714cf91fffe5aba9bfaf155a52e73f3e4b31d5ef4a930dd560e676c5628a
-
Filesize
46KB
MD5d30fb403d9f278943efda4add03e8e00
SHA19bca5c2d0588e7a5fe0a26f3eb7949fe531c15cb
SHA25631f704b8c0c62a4cdddaff8cb4e0bef7ad6e1db620528a55a2d777d6dbc36dd3
SHA512357055df2266d95d96e265dbfcf9359c3e627951f3c1dfd12323033ee7b528b1ffb6e8e298839ac7f38b476a5e885237a527baad4423dd8540fa2ffaa9fd8e8f
-
Filesize
392B
MD59073d8a5f06ba3712a8d2fc651eab77c
SHA101c6359eb401130267427cc9b593fc4e18fc3f73
SHA256b98367461387cdf859308c7db55050cd5aa7d997662c2938e59d0b998de9064b
SHA512a1e7336595a8a162dcfaa58541be0e7b1ce479c8e59887d478c959e99427779cbcde8c67763f1c6d00f2b26b04c2dcc6e822b093a2100a001037712d4a76a414
-
Filesize
392B
MD51f919de6f9bd7eb54221ab891166e4d7
SHA1a413ce7408bcebc9b09ae9c0861fe5666810b59c
SHA256750c2caa42efa6c953508dabc769f675272ca93411083b42652839563fd4e66f
SHA512a5ad243f21e2ecf3287ff61330da640c5657d8a5f8feb652f21052a9cdb3502818179e18510261e14ef95f09ba5a0b81e24a8113b6a92e225eb152d11e3064f4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Subresource Filter\Unindexed Rules\10.34.0.76\Filtering Rules
Filesize1.8MB
MD5d7c9c6d2e1d9ae242d68a8316f41198c
SHA18d2ddccc88a10468e5bffad1bd377be82d053357
SHA256f215127185b2ee6b01e12b6ca75d3e5c4e454598dd4aed36124ae13d59afd547
SHA5127fd14824e9200dd99e1fd2cee402656dc0cfc3d0a60058c5eb05c68e9e65b7f0b47e550fb4d6c2b59eba204dbf3ef9e69dc9723b43a9b3ccd5412d6b77715fc3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Subresource Filter\Unindexed Rules\10.34.0.76\LICENSE
Filesize24KB
MD5aad9405766b20014ab3beb08b99536de
SHA1486a379bdfeecdc99ed3f4617f35ae65babe9d47
SHA256ed0f972d56566a96fb2f128a7b58091dfbf32dc365b975bc9318c9701677f44d
SHA512bd9bf257306fdaff3f1e3e1fccb1f0d6a3181d436035124bd4953679d1af2cd5b4cc053b0e2ef17745ae44ae919cd8fd9663fbc0cd9ed36607e9b2472c206852
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
Filesize
319B
MD526d2ad00289a908823fb6242652a6ed2
SHA1613a6d123161b0f772cc9824a3400bed57f429e9
SHA2564fbeef6902565500237179f1ba1bd4cd9aa26b0437cfe5f9ab5bdf2701587e98
SHA5128cdb22d552490c90eed3262abe96c685bd19953ef9657d0834fb505dcfc6d0c611d8bcdb9d78ab8c197091fc854bfb9fb1e6bd25d4bbef03d5108279441be786
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
16B
MD5d29962abc88624befc0135579ae485ec
SHA1e40a6458296ec6a2427bcb280572d023a9862b31
SHA256a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866
SHA5124311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f
-
Filesize
350KB
MD5ee073c1aaaa8d0d37cd39198ccd11ac8
SHA1835c400d5e99942cb78defe5c74988b4868badc6
SHA25683d5eccade332575a6f1a805466b55e21e314988c3258e70221e155d183c57b9
SHA512f40286715bf078dcc90959309ac7615e3b021a8e95733757fc6c56f15483b4fe0dacfd0ba2a11904362be6e72afbe50776f87960a823afab376d39243700d9b3
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
C:\Users\Admin\Downloads\241010-x34qxsxfql_pw_infected\3178fcad2d2c2f3c0f4f70aecfb18db7_JaffaCakes118
Filesize658KB
MD53178fcad2d2c2f3c0f4f70aecfb18db7
SHA10ecad6522214f9bef4dd8f2f8eb927827bc4971c
SHA256dd8650f0e484ba0ea4775ccce3a9644bba747ee92f1b534628525c7ceedc69f9
SHA51257148c860850344b1086c8765c083862d57d99119914e218aca4c8e80dc9cbe48d206b6aefaea9ad5cda58a459ff5888f1bc82f6fabacd2aa81f52818cef4985
-
Filesize
176B
MD56607494855f7b5c0348eecd49ef7ce46
SHA12c844dd9ea648efec08776757bc376b5a6f9eb71
SHA25637c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd
SHA5128cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a
-
Filesize
1KB
MD5ee002cb9e51bb8dfa89640a406a1090a
SHA149ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2
SHA2563dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b
SHA512d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c
-
Filesize
85B
MD5c3419069a1c30140b77045aba38f12cf
SHA111920f0c1e55cadc7d2893d1eebb268b3459762a
SHA256db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f
SHA512c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1
-
Filesize
703B
MD58961fdd3db036dd43002659a4e4a7365
SHA17b2fa321d50d5417e6c8d48145e86d15b7ff8321
SHA256c2784e33158a807135850f7125a7eaabe472b3cfc7afb82c74f02da69ea250fe
SHA512531ecec11d296a1ab3faeb2c7ac619da9d80c1054a2ccee8a5a0cd996346fea2a2fee159ac5a8d79b46a764a2aa8e542d6a79d86b3d7dda461e41b19c9bebe92
-
Filesize
687B
MD50807cf29fc4c5d7d87c1689eb2e0baaa
SHA1d0914fb069469d47a36d339ca70164253fccf022
SHA256f4df224d459fd111698dd5a13613c5bbf0ed11f04278d60230d028010eac0c42
SHA5125324fd47c94f5804bfa1aa6df952949915896a3fc77dccaed0eeffeafe995ce087faef035aecea6b4c864a16ad32de00055f55260af974f2c41afff14dce00f3
-
Filesize
141KB
MD5677edd1a17d50f0bd11783f58725d0e7
SHA198fedc5862c78f3b03daed1ff9efbe5e31c205ee
SHA256c2771fbb1bfff7db5e267dc7a4505a9675c6b98cfe7a8f7ae5686d7a5a2b3dd0
SHA512c368f6687fa8a2ef110fcb2b65df13f6a67feac7106014bd9ea9315f16e4d7f5cbc8b4a67ba2169c6909d49642d88ae2a0a9cd3f1eb889af326f29b379cfd3ff
-
Filesize
82B
MD52617c38bed67a4190fc499142b6f2867
SHA1a37f0251cd6be0a6983d9a04193b773f86d31da1
SHA256d571ef33b0e707571f10bb37b99a607d6f43afe33f53d15b4395b16ef3fda665
SHA512b08053050692765f172142bad7afbcd038235275c923f3cd089d556251482b1081e53c4ad7367a1fb11ca927f2ad183dc63d31ccfbf85b0160cf76a31343a6d0
-
Filesize
76B
MD5ba25fcf816a017558d3434583e9746b8
SHA1be05c87f7adf6b21273a4e94b3592618b6a4a624
SHA2560d664bc422a696452111b9a48e7da9043c03786c8d5401282cff9d77bcc34b11
SHA5123763bd77675221e323faa5502023dc677c08911a673db038e4108a2d4d71b1a6c0727a65128898bb5dfab275e399f4b7ed19ca2194a8a286e8f9171b3536546f
-
C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\Notification\notification_fast.bundle.js.LICENSE.txt
Filesize551B
MD57bf61e84e614585030a26b0b148f4d79
SHA1c4ffbc5c6aa599e578d3f5524a59a99228eea400
SHA25638ed54eb53300fdb6e997c39c9fc83a224a1fd9fa06a0b6d200aa12ea278c179
SHA512ca5f2d3a4f200371927c265b9fb91b8bcd0fbad711559f796f77b695b9038638f763a040024ed185e67be3a7b58fab22a6f8114e73fdbd1cccdda6ef94ff88f3
-
C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\Tokenized-Card\tokenized-card.bundle.js.LICENSE.txt
Filesize1KB
MD58595bdd96ab7d24cc60eb749ce1b8b82
SHA13b612cc3d05e372c5ac91124f3756bbf099b378d
SHA256363f376ab7893c808866a830fafbcd96ae6be93ec7a85fabf52246273cf56831
SHA512555c0c384b6fcfc2311b47c0b07f8e34243de528cf1891e74546b6f4cda338d75c2e2392827372dc39e668ed4c2fd1a02112d8136d2364f9cab9ee4fa1bd87f5
-
C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping2104_741459275\json\i18n-tokenized-card\fr-CA\strings.json
Filesize2KB
MD5cd247582beb274ca64f720aa588ffbc0
SHA14aaeef0905e67b490d4a9508ed5d4a406263ed9c
SHA256c67b555372582b07df86a6ce3329a854e349ba9525d7be0672517bab0ac14db5
SHA512bf8fa4bd7c84038fae9eddb483ae4a31d847d5d47b408b3ea84d46d564f15dfc2bae6256eac4a852dd1c4ad8e58bc542e3df30396be05f30ed07e489ebe52895
-
Filesize
122B
MD50d77c27baa669b0714c49b73e68447ea
SHA165103c9707e083c5503ad9979560ba1bb7634ae4
SHA256c853d6a286d9d31a382c6d3fb109d5336d275651950f22b8243289eb6125b516
SHA5121f011c405ec558229a1f5e2923b38b7054144c66d4c69d658c9c2c371f6cc365317485c274cafcab80bcb88f989b0be4c43c763933de3f86362a79ec1e962ff3
-
Filesize
145B
MD5a3842aa29862631e5548a02b38a07ffa
SHA1d4b345c8f29d091bf67df12a17b72df84ff1d24a
SHA25686408cbb3cb0c03520762e8d59f5dfb8887d68219bef2ce95bb50b5486d6d5bc
SHA5123f0171c91a973b0910538eca3f2802a8ec54f7b615a525206896f4feeba61332c40089db7b655d156e32a654480cad3ffafa7caa3c042cf6ba94619c0cc93cb8
-
Filesize
116B
MD5d20acf8558cf23f01769cf4aa61237e0
SHA1c4b21384309b0ff177d9cd3aa4198ab327eb2993
SHA2563493b321a7fc5e183ed6f223ae55ce962541717d0b332d16bdc7cbcadf7e6f78
SHA51273d082cbd71f6d0f06c7afc1bf63ee41c9a8e501df3e56f21a551b2d369a0afc8306894c8e0a38d0324e2ac403ec506ac1ecd8e9b61a9cb27134a229ccb13725