Analysis
-
max time kernel
62s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2023 17:40
Static task
static1
URLScan task
urlscan1
Malware Config
Signatures
-
Drops file in Program Files directory 2 IoCs
Processes:
setup.exedescription ioc process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\c5e38f30-5e3e-43f1-bc82-f3b3df513e05.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20230321174118.pma setup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 2 IoCs
Processes:
powershell.exemsedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings powershell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exemsedge.exemsedge.exeidentity_helper.exepid process 1032 powershell.exe 1032 powershell.exe 4460 msedge.exe 4460 msedge.exe 1916 msedge.exe 1916 msedge.exe 612 identity_helper.exe 612 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1032 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
msedge.exepid process 1916 msedge.exe 1916 msedge.exe 1916 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 1916 wrote to memory of 100 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 100 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4076 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4460 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4460 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4640 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4640 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4640 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4640 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4640 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4640 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4640 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4640 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4640 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4640 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4640 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4640 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4640 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4640 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4640 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4640 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4640 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4640 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4640 1916 msedge.exe msedge.exe PID 1916 wrote to memory of 4640 1916 msedge.exe msedge.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell start shell:Appsfolder\Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge https://gripaco.gr/e-doc.html1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1032
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --edge-redirect=Windows.Launch https://gripaco.gr/e-doc.html1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffadfa346f8,0x7ffadfa34708,0x7ffadfa347182⤵PID:100
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,5810034506996658976,17081644496968782193,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,5810034506996658976,17081644496968782193,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4076
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,5810034506996658976,17081644496968782193,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:4640
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5810034506996658976,17081644496968782193,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3668 /prefetch:12⤵PID:3020
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5810034506996658976,17081644496968782193,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3676 /prefetch:12⤵PID:4516
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5810034506996658976,17081644496968782193,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:5000
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5810034506996658976,17081644496968782193,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:1308
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,5810034506996658976,17081644496968782193,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:3848
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
PID:4952 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff622155460,0x7ff622155470,0x7ff6221554803⤵PID:2700
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,5810034506996658976,17081644496968782193,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5810034506996658976,17081644496968782193,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3860 /prefetch:12⤵PID:3252
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5810034506996658976,17081644496968782193,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:688
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5810034506996658976,17081644496968782193,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:2840
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5810034506996658976,17081644496968782193,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5992 /prefetch:12⤵PID:2344
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5810034506996658976,17081644496968782193,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:5124
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,5810034506996658976,17081644496968782193,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵PID:5172
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5462f3c1360a4b5e319363930bc4806f6
SHA19ba5e43d833c284b89519423f6b6dab5a859a8d0
SHA256fec64069c72a8d223ed89a816501b3950f5e4f5dd88f289a923c5f961d259f85
SHA5125584ef75dfb8a1907c071a194fa78f56d10d1555948dffb8afcacaaa2645fd9d842a923437d0e94fad1d1919dcef5b25bf065863405c8d2a28216df27c87a417
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5d2642245b1e4572ba7d7cd13a0675bb8
SHA196456510884685146d3fa2e19202fd2035d64833
SHA2563763676934b31fe2e3078256adb25b01fdf899db6616b6b41dff3062b68e20a1
SHA51299e35f5eefc1e654ecfcf0493ccc02475ca679d3527293f35c3adea66879e21575ab037bec77775915ec42ac53e30416c3928bc3c57910ce02f3addd880392e9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
48B
MD584b7629262b392f49fd1d3eb086998e2
SHA1642f3dea66cafa5d4bdbe77640c3da5a9c484ffa
SHA2569a48a23855342b054c7de4d445bd63604be57b6271292bd8aa94751379cc96e7
SHA512feedaebb6f78e1f5245f295859fee98f3eb8f550df6c3fbd91633ae029babac89dbb0fe916e8b65b21f5ddb4f935a6260d8bbbba151ba5c75ab6cf9d36c02d5f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
264B
MD590a23ec4d91c9908de9dffd326bd1a7c
SHA16d02156dd84210aab5006729ee9c75e62047db6f
SHA256b1994d1da6267686ceef3f700411be3145ae205a8769fde8299fe26d2d63fef3
SHA512388f7f3375ac817e67c8463deecf8009ddbc77ce7bb724f8fad3161f32996f8bf109ebb4993687324df0925a3427a87d9ef0da79d67045a22ae0e558a58ab44b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.icoFilesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\MANIFEST-000001Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Microsoft Edge.lnkFilesize
2KB
MD556de59f3bc867c511fa1fb1f83eacb27
SHA1db42b7e3a5c3895d9958a20b9ee63ca2d0fa2d5b
SHA256ee08aa0521c19dae50c7c33fc7c661a8272030721c46896fcfa23853d8b70610
SHA51212cb51a666b5243491ed687adc7bda67849556dc5678e3cf92101d13339cb07e9febe5895589a3182de92f9106edd0a524076094bcb10795a51142886925d4c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
4KB
MD58ac476c39a2741482b67443cc4b1996e
SHA11ce5f9736a4b8d4d4db3f629abfa5f51b8fa4bc0
SHA256ddf97526015d7d7093b3dd039266e4663117c36f4fbfc3c691220a0b711191f1
SHA5126a37a25f13570bf8a54a49079ce2c53ca8346cb95df061639b5cd139feb14477d0723d0cec5b728bde42c8730254442b833f2b9bc4404687807dc4205cdb1e33
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD58496384906d73c0bb9a2fdb67337b6a8
SHA17b11ff39f2e5a6e624c8ad1dda2853bceab06939
SHA25607e8c0d6ba925647fcbfc16a7f9b422c918f573daa9564c2d0520521df09046e
SHA512b71378e2a53e9e0918e83e907bf03dea9365184b58986411962c65e166ef7ea62b343ca55dfa4e37bb55e67567a32e01c68e0531a057829eaf8646dce23e18c2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5c6890745e850bf8c90f69866c7bce9fd
SHA18fe845996558a829ad3e3ecaa3465b802797c09c
SHA25623ff58891dae0ae563b1f27ee5a3ca19e7c099c84e02caaadc97687e02ef5386
SHA512f89c4046d9e03b4dad3041ee9bc96012625908801fd1b14e080942c9988507d3902c9a9bd08b54e6b121861ff4239c49d65158642365d8b6b3a10bfb4e5bab22
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure PreferencesFilesize
24KB
MD5130644a5f79b27202a13879460f2c31a
SHA129e213847a017531e849139c7449bce6b39cb2fa
SHA2561306a93179e1eaf354d9daa6043ae8ffb37b76a1d1396e7b8df671485582bcd1
SHA512fbc8606bf988cf0a6dea28c16d4394c9b1e47f6b68256132b5c85caf1ec7b516c0e3d33034db275adf267d5a84af2854f50bd38a9ed5e86eb392144c63252e01
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD57b0fc2661db28dae438cd0c8c8aa91fe
SHA1e26e43d595139772777d6e139b4210d2151ff05d
SHA256195196490bda11fa8ccc9c7396c4730c865ad517c971fd90fe026f55a5d18584
SHA512cf3d65f1fbeaa0436781274025a1fde343e17c5a323730f1bddbdb3c51643782e3a31f2a39efd4c5d12255ffb66aa2cabf0fa0545ddb0fc1c8d2e70ad00ab2c2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe579a5b.TMPFilesize
706B
MD5a6a03eff3148deb2601ce094e55576e6
SHA1e88320c898fb01d0b9e9f3c59d1548cb02db1466
SHA256c5f4e5d087bbd0da51530223b21c5fa48e5f2d63801565661e9dcaaa3288f755
SHA5125074c55e58fe3e5fe7909174a0914fc49d213e6246c21a9ac0b49e5ae4ba3956ee28204603ee7ddccc6be74872e1e471e39cb5e21db21c7c3fba3692262bc9f7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c3fde9df-a1c0-4db5-afde-492a4fe5236a.tmpFilesize
5KB
MD5c79004b1bd4f1d9f2ba0487302ea231c
SHA100000186deaa6684c6a5b7a049cf00c451f01a09
SHA256c01c70281f227cb9428d94d3c3c7d951de2f8c8c36e8bd2c36a9c7f46f92b5b5
SHA5129abc38a3b66c247f6d02a0277c64f28dc465024e446e3054b2cae2edab0d3735f8790b44c3e94e1e19ad472a72c007045194aace4cf0b2f7021ad366855f4530
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
9KB
MD5a0ab0c2059bc171f372ea987b516e8b0
SHA1ebac71e84260ca4c2b0029cf719280a36ac5b304
SHA2562886dc38500b7be1432d0d377907fb0a7b3767a51b1a945527e957f534b1df42
SHA512df30059da8a6884f3b0e48e7ad253ec0c276160623c2b9d6fff591995415480ef49abcc3a597c7de094cb19bfa66b8045ef9bf5150d1eade885e8c8285deb9a2
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_h0atsh2c.ksr.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dicFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-msFilesize
3KB
MD5ad9bd466358bf7d80954fb9d22395c34
SHA16dc98e7d3d18838724520f8204601e2d2d1b88bd
SHA2560cb8cdf3554cd7e0c53e95777bc2a5960f9ab2bdf0619fb5138740107d225f71
SHA5129dda267d770a4362aba7a07ec792a8b83e141060e843ad9551b114db7591339cfd47556e00353db02afc575b1f12c37bdb4c5f03831df27e1c2ab412ff083f1a
-
\??\pipe\LOCAL\crashpad_1916_GSOUGFRZMKYKDUZAMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1032-144-0x000001C4B8740000-0x000001C4B8750000-memory.dmpFilesize
64KB
-
memory/1032-145-0x000001C4B8740000-0x000001C4B8750000-memory.dmpFilesize
64KB
-
memory/1032-143-0x000001C4B8740000-0x000001C4B8750000-memory.dmpFilesize
64KB
-
memory/1032-133-0x000001C4B8820000-0x000001C4B8842000-memory.dmpFilesize
136KB