Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-01-2023 02:42

General

  • Target

    Synapse Launcher.exe

  • Size

    788KB

  • MD5

    20e1eb6b9b733bbd26ac8be5be603de2

  • SHA1

    36beefc2467d94b5ec9ae843b2bb099898581bed

  • SHA256

    73af760ad2ffdd931210079ef4b719a1a8c41a864e7d0a39faa5c1783fb140d6

  • SHA512

    d486fc560f0f6d94428b58ae041a17053659e78c49fe9154ca9e642d692da43aeb7dd3f03b1aeb428ea398bdbdfab743960c2f0fa885cd97bc31655be2e42e0b

  • SSDEEP

    12288:GoK0iEH0u6YNNCObkXxHDc/n3jUOSpUMh:nipzXonoOSpUMh

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 1 IoCs
  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 10 IoCs
  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Modifies registry class 52 IoCs
  • Suspicious behavior: AddClipboardFormatListener 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 29 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Synapse Launcher.exe
    "C:\Users\Admin\AppData\Local\Temp\Synapse Launcher.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3464
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault6e14b6b1h1d10h4ff3h9c38hfca0066d8b6a
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4004
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0xf4,0xf8,0x124,0x7ff8a4b446f8,0x7ff8a4b44708,0x7ff8a4b44718
      2⤵
        PID:2680
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1416,13228962792046845385,17473315400737055912,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:2
        2⤵
          PID:676
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1416,13228962792046845385,17473315400737055912,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4876
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1416,13228962792046845385,17473315400737055912,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:8
          2⤵
            PID:652
        • C:\Windows\System32\CompPkgSrv.exe
          C:\Windows\System32\CompPkgSrv.exe -Embedding
          1⤵
            PID:1532
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -pss -s 472 -p 2996 -ip 2996
            1⤵
              PID:4860
            • C:\Windows\system32\WerFault.exe
              C:\Windows\system32\WerFault.exe -u -p 2996 -s 3324
              1⤵
              • Program crash
              PID:372
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault0738a42ehfb16h47b5h9dc2h938246f2f1d5
              1⤵
                PID:2380
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8a4b446f8,0x7ff8a4b44708,0x7ff8a4b44718
                  2⤵
                    PID:3084
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,7537190327653019365,7414372235845151840,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:2
                    2⤵
                      PID:2700
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,7537190327653019365,7414372235845151840,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:3
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:544
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,7537190327653019365,7414372235845151840,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:8
                      2⤵
                        PID:1472
                    • C:\Windows\System32\CompPkgSrv.exe
                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                      1⤵
                        PID:3400
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaultf6f24445h73b1h49abh9119he46185dc52ce
                        1⤵
                          PID:1456
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8a4b446f8,0x7ff8a4b44708,0x7ff8a4b44718
                            2⤵
                              PID:5012
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2220,1368165568160494777,929774295111536480,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:2
                              2⤵
                                PID:1324
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2220,1368165568160494777,929774295111536480,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:3
                                2⤵
                                  PID:4884
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2220,1368165568160494777,929774295111536480,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:8
                                  2⤵
                                    PID:4008
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
                                  1⤵
                                  • Drops desktop.ini file(s)
                                  • Checks processor information in registry
                                  • Modifies registry class
                                  PID:5072
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService
                                  1⤵
                                    PID:1648
                                  • C:\Windows\SysWOW64\DllHost.exe
                                    C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
                                    1⤵
                                      PID:688
                                    • C:\Windows\explorer.exe
                                      C:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding
                                      1⤵
                                      • Modifies Internet Explorer settings
                                      • Modifies registry class
                                      • Suspicious behavior: AddClipboardFormatListener
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      PID:3996
                                    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                                      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\RenameSwitch.docx" /o ""
                                      1⤵
                                      • Checks processor information in registry
                                      • Enumerates system info in registry
                                      • Suspicious behavior: AddClipboardFormatListener
                                      • Suspicious use of SetWindowsHookEx
                                      PID:3168
                                    • C:\Program Files\VideoLAN\VLC\vlc.exe
                                      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\DisableCheckpoint.mpg"
                                      1⤵
                                      • Suspicious behavior: AddClipboardFormatListener
                                      • Suspicious behavior: GetForegroundWindowSpam
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      • Suspicious use of SetWindowsHookEx
                                      PID:3808
                                    • C:\Windows\system32\msinfo32.exe
                                      "C:\Windows\system32\msinfo32.exe" "C:\Users\Admin\Desktop\PingCopy.nfo"
                                      1⤵
                                      • Checks SCSI registry key(s)
                                      • Enumerates system info in registry
                                      PID:4424
                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                      "C:\Program Files\Internet Explorer\iexplore.exe" -nohome
                                      1⤵
                                      • Modifies Internet Explorer settings
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SetWindowsHookEx
                                      PID:3940
                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3940 CREDAT:17410 /prefetch:2
                                        2⤵
                                        • Modifies Internet Explorer settings
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2328

                                    Network

                                    MITRE ATT&CK Enterprise v6

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      6102471af38b45f30decc8db2f59a8e2

                                      SHA1

                                      35428c52f58b3a35d5028929b6298d6b95d6bdec

                                      SHA256

                                      57e3a5210c5872fc5d56b4111a4d07e512ef54a79128391084c167c101a9d7c4

                                      SHA512

                                      1040720fe63680c7a17ced8026e3a2e31e0e73066bd0c3d74e5cd4a19c0e6f23dc30e0a41f62d92c0b9cc9840895ece4b3d36a200816e400feec49e54599b3fe

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      b3f8a0bd423c4316d4d71f68b4ebdb8f

                                      SHA1

                                      ad68d2fa22613c195f4ea75a39f536c4e0fc6a3c

                                      SHA256

                                      4767c0428f6655f660185344e563fc767d4e7f7db8f0b3000f11dd53d8de2536

                                      SHA512

                                      639dc0576d618aa8491a101a99ec238d11c943faddece33fcbb718f5f48a93144d6ee1e81103be95f5790c97c56921c722924573c0e2b7376eb54f163334eec0

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG

                                      Filesize

                                      334B

                                      MD5

                                      6f1bdfd120ceb2e73242e4e56cd33e09

                                      SHA1

                                      36f861b90d2eb0fbef7d3d663de2eebc8edafb88

                                      SHA256

                                      a0ae2b4b739b0110e0fecfa3512438bfbcf316a7926f69450e76e6896d598dc5

                                      SHA512

                                      aad0a597836b3bf53164f4087ec8fd9877cc9b0cd6b3f935eefba0642f649b4aff1d812e7b6908ccde9c382955dd146fce9d02d86d6ab68e17249a7564d2cb58

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      111B

                                      MD5

                                      285252a2f6327d41eab203dc2f402c67

                                      SHA1

                                      acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                      SHA256

                                      5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                      SHA512

                                      11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      3KB

                                      MD5

                                      69231065fcb176f8294137585879fa55

                                      SHA1

                                      5d7162997a36eb388f2a3035f9a01af8b381aee4

                                      SHA256

                                      747cb76334415007cede14a810f8b2ebc52ab10f2d519a51860ab40a47275d6d

                                      SHA512

                                      872d920b29dc306cbf1c6aa43eb2f0ad8321c6131a333864013a51a1d60b6e6df3c1d3bc2c996bef506aa0c76432fc520c35c1fdfbf1b000f9ca65985ab4c663

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      4KB

                                      MD5

                                      d7a305e89f332bd172f9c2e95e8aa2e6

                                      SHA1

                                      87c5ea737dedfb78fecf13c34191b132139f5b6a

                                      SHA256

                                      e00e1ff5bf728f3345e6ca838f2bf41dde323d85897e08ad2c6f92f6a4e62dbc

                                      SHA512

                                      e8b1935390ef109b503794b7acce62c08761daf58a65afa5e8316e427fcfe868336c4dff8ff23e8174218a76d772fa43e594d2db783bfaa52fad6dbe9b906516

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG

                                      Filesize

                                      350B

                                      MD5

                                      4a6b6a9d2d1c2a8660a2c31d662e99b7

                                      SHA1

                                      c2f6dc2a82e447843126bf93c8e1ad9fb64be35a

                                      SHA256

                                      b33d901cb205131fdca45fe2bff5d5bfb3e54e1324963316e93df8a55ba751a8

                                      SHA512

                                      364e709de34f57010e9619fe6ccf1f0bcee2c0535908d4452be7a1ec14b1e226c6c09261401953f174b6d87e35bf73d5af5e359fdddc13a9c1216ac5f132ae65

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG

                                      Filesize

                                      347B

                                      MD5

                                      f0c24deefddc5d77f9e22732bda52841

                                      SHA1

                                      af38721cef18049272d7689395acf8ed53903294

                                      SHA256

                                      1281011f2c07ea1f0425bd976aae15d8374cfed5d89638a6bba0cb38b6560c0b

                                      SHA512

                                      abc5fe57ee7bd848a9acd2ebd8c1362b7441bc28fb3a0b1cf71b683b1d361dbbdc3d806b340dbe50986c2643dcca79083bbd77d401d0083302b0b1abdc626aad

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG

                                      Filesize

                                      326B

                                      MD5

                                      c85a7a1fc8c00a83d9c28fb61ced449e

                                      SHA1

                                      ed7717d3a581f92ce081b6c6fad9aa9e5dc9d9ff

                                      SHA256

                                      4abf645a831cd5eed1b0ee319a4210c64cacd3dce534fdf0ffbbb2a04b187f90

                                      SHA512

                                      c0b2337da82506d8aa2b32725f0c3835e4c4d54311baa13efacaf1473f4642b77c8a4dd0daed5e0b83063bdab5af61a1abaf580d99dd62f24d75978ecdd00d98

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG

                                      Filesize

                                      323B

                                      MD5

                                      5bd821c49aa646cb998bc77822fc2749

                                      SHA1

                                      d766f31728bca92e3b36ba89624587d431c85a24

                                      SHA256

                                      ae325a2d627c3de690a7d329884a92425a5a594c9710bac1efb855c2f9498894

                                      SHA512

                                      3e0f5adb47fc2a2a4830cb2837f85d80b8988fe3cb96fce30b0d5ef7ed1720640ad8ce92dd0d0cbbe4c56be20bf1597656407c2c10ea8971f0b40f676669694e

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_1

                                      Filesize

                                      264KB

                                      MD5

                                      f50f89a0a91564d0b8a211f8921aa7de

                                      SHA1

                                      112403a17dd69d5b9018b8cede023cb3b54eab7d

                                      SHA256

                                      b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                      SHA512

                                      bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Last Version

                                      Filesize

                                      11B

                                      MD5

                                      838a7b32aefb618130392bc7d006aa2e

                                      SHA1

                                      5159e0f18c9e68f0e75e2239875aa994847b8290

                                      SHA256

                                      ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa

                                      SHA512

                                      9e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Last Version

                                      Filesize

                                      11B

                                      MD5

                                      838a7b32aefb618130392bc7d006aa2e

                                      SHA1

                                      5159e0f18c9e68f0e75e2239875aa994847b8290

                                      SHA256

                                      ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa

                                      SHA512

                                      9e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      3KB

                                      MD5

                                      2680b030499bcceae18035875af346cb

                                      SHA1

                                      8344e83661d606a939184744944edfa022475bd0

                                      SHA256

                                      49f318a168c5f80177661bfe16348e46f1c567352a88110b1e02cc90ae6d2156

                                      SHA512

                                      deb4feb74c61dbe154e4f1d667bc635438f2d73e44d7d4d330923fbb030c49cfc3ae0afa62fec2fba584d39dbca378621bfcf6c0e576010321ea835f886a180e

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      3KB

                                      MD5

                                      002c017804148b04143cf26e10167a23

                                      SHA1

                                      06123089a1ede7c07bd8f2935cc5afff88e1b5f3

                                      SHA256

                                      1551ea49aa0a49287965424d687c57cdaa1b9457633192ac794982b4f3887368

                                      SHA512

                                      ed50f7e26302dfaebc3e0a7997d75996a70882b73c6c69b71d60bc9d0e4fcbfd32558b181ad12184b47784d144e980bde15301d277bdcf6310365e7bf32f6159

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                      Filesize

                                      264KB

                                      MD5

                                      f50f89a0a91564d0b8a211f8921aa7de

                                      SHA1

                                      112403a17dd69d5b9018b8cede023cb3b54eab7d

                                      SHA256

                                      b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                      SHA512

                                      bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                      Filesize

                                      264KB

                                      MD5

                                      f50f89a0a91564d0b8a211f8921aa7de

                                      SHA1

                                      112403a17dd69d5b9018b8cede023cb3b54eab7d

                                      SHA256

                                      b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                      SHA512

                                      bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                    • \??\pipe\LOCAL\crashpad_1456_HUDWXBSYBFKKVBFD

                                      MD5

                                      d41d8cd98f00b204e9800998ecf8427e

                                      SHA1

                                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                                      SHA256

                                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                      SHA512

                                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                    • \??\pipe\LOCAL\crashpad_2380_SKRRLBHPIEQBIONR

                                      MD5

                                      d41d8cd98f00b204e9800998ecf8427e

                                      SHA1

                                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                                      SHA256

                                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                      SHA512

                                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                    • \??\pipe\LOCAL\crashpad_4004_AUDSNHBIQCGYRDCV

                                      MD5

                                      d41d8cd98f00b204e9800998ecf8427e

                                      SHA1

                                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                                      SHA256

                                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                      SHA512

                                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                    • memory/544-152-0x0000000000000000-mapping.dmp

                                    • memory/652-141-0x0000000000000000-mapping.dmp

                                    • memory/676-137-0x0000000000000000-mapping.dmp

                                    • memory/1324-168-0x0000000000000000-mapping.dmp

                                    • memory/1472-155-0x0000000000000000-mapping.dmp

                                    • memory/2680-135-0x0000000000000000-mapping.dmp

                                    • memory/2700-151-0x0000000000000000-mapping.dmp

                                    • memory/3084-142-0x0000000000000000-mapping.dmp

                                    • memory/3168-174-0x00007FF885A70000-0x00007FF885A80000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/3168-176-0x00007FF885A70000-0x00007FF885A80000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/3168-179-0x00007FF8838B0000-0x00007FF8838C0000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/3168-178-0x00007FF8838B0000-0x00007FF8838C0000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/3168-177-0x00007FF885A70000-0x00007FF885A80000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/3168-175-0x00007FF885A70000-0x00007FF885A80000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/3168-173-0x00007FF885A70000-0x00007FF885A80000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/3464-134-0x0000000005680000-0x0000000005712000-memory.dmp

                                      Filesize

                                      584KB

                                    • memory/3464-132-0x0000000000D20000-0x0000000000DEA000-memory.dmp

                                      Filesize

                                      808KB

                                    • memory/3464-133-0x0000000005B80000-0x0000000006124000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/4008-172-0x0000000000000000-mapping.dmp

                                    • memory/4876-138-0x0000000000000000-mapping.dmp

                                    • memory/4884-169-0x0000000000000000-mapping.dmp

                                    • memory/5012-159-0x0000000000000000-mapping.dmp