Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-06-2023 13:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://protect-us.mimecast.com/s/gbPHCDk2oAT5W1pJt5DO9C
Resource
win10v2004-20230220-en
General
-
Target
https://protect-us.mimecast.com/s/gbPHCDk2oAT5W1pJt5DO9C
Malware Config
Signatures
-
Drops file in Program Files directory 2 IoCs
Processes:
setup.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20230607132216.pma setup.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\9351ae7c-9eda-43b6-882b-657298e5f036.tmp setup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 2 IoCs
Processes:
powershell.exemsedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000_Classes\Local Settings powershell.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
powershell.exemsedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2412 powershell.exe 2412 powershell.exe 1568 msedge.exe 1568 msedge.exe 3644 msedge.exe 3644 msedge.exe 2000 identity_helper.exe 2000 identity_helper.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2412 powershell.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
Processes:
msedge.exepid process 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe -
Suspicious use of SendNotifyMessage 8 IoCs
Processes:
msedge.exepid process 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe 3644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3644 wrote to memory of 2260 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 2260 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1852 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1568 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 1568 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4260 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4260 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4260 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4260 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4260 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4260 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4260 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4260 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4260 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4260 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4260 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4260 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4260 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4260 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4260 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4260 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4260 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4260 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4260 3644 msedge.exe msedge.exe PID 3644 wrote to memory of 4260 3644 msedge.exe msedge.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell start shell:Appsfolder\Microsoft.MicrosoftEdge_8wekyb3d8bbwe!MicrosoftEdge https://protect-us.mimecast.com/s/gbPHCDk2oAT5W1pJt5DO9C1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --edge-redirect=Windows.Launch https://protect-us.mimecast.com/s/gbPHCDk2oAT5W1pJt5DO9C1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xb0,0xdc,0x100,0xbc,0x104,0x7ff9700246f8,0x7ff970024708,0x7ff9700247182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,135682691025867061,8902543748048049567,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,135682691025867061,8902543748048049567,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,135682691025867061,8902543748048049567,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,135682691025867061,8902543748048049567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,135682691025867061,8902543748048049567,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,135682691025867061,8902543748048049567,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,135682691025867061,8902543748048049567,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff62c335460,0x7ff62c335470,0x7ff62c3354803⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,135682691025867061,8902543748048049567,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,135682691025867061,8902543748048049567,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,135682691025867061,8902543748048049567,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3676 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,135682691025867061,8902543748048049567,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,135682691025867061,8902543748048049567,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,135682691025867061,8902543748048049567,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,135682691025867061,8902543748048049567,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5ae2c65ccf1085f2a624551421576a3ee
SHA1f1dea6ccfbd7803cc4489b9260758b8ad053e08e
SHA25649bfbbfbdb367d1c91863108c87b4f2f2cfffbbbb5e9c1256344bc7f52038c54
SHA5123abbfbb4804c6b1d1a579e56a04057f5d9c52cfd48ecbae42d919398f70da2eacd5a35cb3c3d0a559ad3515fadb1734b0d47be48dce0fdd9fd11578948a6c7ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5c3770be634be8da92e71a3f9f76d79d3
SHA1f4538b79d313dd46e55d1fd3e6ca3d4681fe4c3f
SHA25623549094c00feed7abf21e56caae3c8b22a7bd89cfc2f5ea369cf13259273432
SHA51209c1a087be6dcb49fd0725936571946266f31298f8ae141d59b9ac60f3f0fe8e7d964f661818d72682633845b48dbb906d8c89bb33bd2060bb4971b3e14fc4a0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
48B
MD5d5b6a609d4ecbde4be0ff7cdee01e2f6
SHA1d88bb2cc187b5b0983ca7936441e39c2eecf6e88
SHA256e293fc06d0ccf9baa94ae399cb8f1bff830b41fe8a23b6d7620c4c01c1748730
SHA51254fd8345fbb19ea02879fb65d777f14353931848e969e36735c05e0e0fa9b7f0d909ca8fe52db3d0a684b1b14fd97b3adb649ab7df7cb34e6a0994e74619f56e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
216B
MD5b639aeee297542dd03b6567576542805
SHA1b1b5823c4f3f4009c3177e7482fb90deeb1dab68
SHA25634d2a595a1f7567ab307a2091854df1b8b3f3aaca9e30b7a08c4515f80c8db57
SHA5125d112b5c0c6eee1a18b5b1c751b428eddbd92921aa6c16dd76f69d4c74df9906a3fd60881dbfe20252b36f46f03611e96ae619f5af4d2ec2f9bb42740821dbdb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.icoFilesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\MANIFEST-000001Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Microsoft Edge.lnkFilesize
2KB
MD56f4c864ddd959678c0e343d815acf683
SHA17ec1144389dd27377e976d802bb390e01b3cf13b
SHA25650dfa027a26bbe691e8e090e368bdf6387cd24c4ad2b5997435881a038a9e8b6
SHA5127ca8e369d1899677df039db7de7e813b74e505fede47efab9d4089b392585cb034d6cc1f94be32272afb98ab21926ced5f81ce3e7591d20f401b4ee6836c1777
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
845B
MD5db9a3f7af6e6a48fff3d5851e5dcfc16
SHA1e82dbfe7bafffe166811f7cc15fdce575776ac1f
SHA256cc2b92a3fe2538d75d3d174ea44d96380d935c542e1505cf9baf43024cf2be00
SHA5127d26325cf3e15f647215c56eb4bb26ad82926ad37c01898dd6ab22b2ad5fa50631c3510448e541a12d9b89e7b8050e11db3f101162991cce5a1da39df103ddd8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD594a53e3564b20c5387be3c49ed0f55a4
SHA1b237f4f577bcb212307cace490412893e5c382d0
SHA2561f01f70fbadc8425e288a3af0d0a337ea9d1d9b9b5b72b548374ccd55c3a62ff
SHA512f1b3a5cd236e2843956ca1355a47b75ce71ff79768151f085ed2fc039f5cfd28c9307d035af2bc3ccfb2198d2c62dce323eeffbff842f750cf99aaafaddc2dc9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
4KB
MD573dca0362925193567ced4596218735a
SHA15ba0f0fa814f6a455f47aa7cbd45e39806b51c2e
SHA25644887c383b1a905a6e20e7c55e9ab02bea71d4953be219d9ec3e1b5f7d66fe1f
SHA512a258e5aab922b691322713c6051c009d4d2e1d63a3e3baf4ca0d05d0dc93d5b93a2a9cbc00603cc7457363615f8c67902d9523186e67ae205dc20f9b6bf0442b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5b03e2e51abeb86def2e481708e7364d9
SHA15a92d408e5fd71a976ef328205f542482423d658
SHA256ffd34d4d1bec2d43632a424e359bb5107fc73f037d27f33a45bc6b174cd5dda4
SHA5127b94ccf2dad4dde02dd658215be78a4dd22592afea9332613ceaa1f8dbc8863cd1a2b5a239ebe8c2545df168d40245080fa05ea7130eef72ea22ea0cb9da45ce
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure PreferencesFilesize
24KB
MD5b3fbb8a02260d5e41407a7e1af3ee2f6
SHA19180c8b9593405936b0fe52272571b63829525d4
SHA2568c1434a31409aa606a51bdae37e0853597cb408a2cf199f05e02705df3fc15de
SHA5128a6ec40722054025a8969a80e795b026fc806a0710eb2f9e016feb68cc09a19333404a8a62910e9b0335729fd64e8e1b6250513ffc334dc8d669d96de62eb5d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure PreferencesFilesize
24KB
MD5cfd585ce0db9a1484f8223dc2cfce2f8
SHA14e5e287160c05ecdff8acdfa0899faa5bad4de82
SHA2560bcae3ddcadfadb917e4f910daefde07af8d2708b7795f3a1146102dcf6cf445
SHA512b45dd6c3231a79155508d807d4b6f839d49e6120841c4f31147a83039515d3358822fa1fa4ae6f770b4369b96f221326c0b80dc2f0cd99d605440b12c93fb648
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
9KB
MD5abdf0ecccf8c1568c2ca4326d9ba6576
SHA16c53ba93f7204e0765dd4085445d4f69f29c92e2
SHA256ffc31060fba9445e97d287e218ae17eb6ad1b7e39ccc4a1c855ee6c0c92e2c49
SHA512fbebb669f3b5431da5c52a1fe5befbcd6324ea3bedf6ea1eaf80d21185eb287319e1b289370073987746cd975edbbb8057fa753fd57fdc9618062561ad59c675
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
12KB
MD54a18b824b94e0bfc83855bf17e064f33
SHA1cab92e5d5d1123bee1edc1eaedd85225f4fb2b5e
SHA256e41d8e9bf99b85e4caf9caa8020f0f5b0ddf4ab02f4a1c9d19f880fd43785fbd
SHA51202b131f27a102e7cd60b6e54efb80c26bd369081587912e5e1a3fc7f536f33fc09fabbd5e1135ff4b8dcbbd9a552b5b4549b9a7fc3faa5da053ba504fccbbcb8
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kexfszwb.qgd.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-msFilesize
3KB
MD51547c793a9ea8d92c1d9f3777fd0134f
SHA1fad6f74f28db7666c11bd6b9f2c765e7fee64e1f
SHA256df5eeb84f74fd45bab0abde5165a39625ad3e2874e730bdd7d669a58f6d0b472
SHA51245ace7e10dc6fff17ca204d8f0b7d56c5f83140bd4a85de16885bfdb0e9493aa98265e4fb9c6ac54f7824294e40c64b87981d5ec79bc882a8f6e2e0ca89c6436
-
\??\pipe\LOCAL\crashpad_3644_VGKOIALQEIUVHWVXMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/2412-138-0x00000213FDEF0000-0x00000213FDF12000-memory.dmpFilesize
136KB
-
memory/2412-143-0x00000213E1F80000-0x00000213E1F90000-memory.dmpFilesize
64KB
-
memory/2412-144-0x00000213E1F80000-0x00000213E1F90000-memory.dmpFilesize
64KB