Analysis
-
max time kernel
280s -
max time network
386s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
13-10-2023 13:05
Static task
static1
Behavioral task
behavioral1
Sample
2023_10_07_---d-e-m-i-s-e----22027008.png
Resource
win10-20230915-en
General
-
Target
2023_10_07_---d-e-m-i-s-e----22027008.png
-
Size
7KB
-
MD5
7b8f43ec23b277ee7df22bf1af0065c1
-
SHA1
5e1ba84de06b4d762f248b5b4b2cdd1d936fbf0a
-
SHA256
f62d6801e6e3c987f2483d74921644197bd385a23834ba18276112a3a1b27687
-
SHA512
8c436cdde9092cd15740f88990a8ee5e9cd6363538e33305649f7d3df3f5e14f6d54f9703c1427573aef2a2af36ed13866cb2deac7a4f0db7a2a601e7d5b12d1
-
SSDEEP
192:o65RZ+GRAXhwUyU0CD6o/IsijwLTE6Pw3Ptv0Rpredq6KmTwUQ:n5v2xwjUoo/BijeHPwVvUidq6mz
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
MEMZ.exedescription ioc process File opened for modification \??\PhysicalDrive0 MEMZ.exe -
Drops file in Windows directory 15 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exemspaint.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdge.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Processes:
browser_broker.exeMicrosoftEdgeCP.exebrowser_broker.exebrowser_broker.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-08760 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "5433" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.google.com\ = "25" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\vice.com\NumberOfSubdomai = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\www.bing.com\ = "132" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory\NextBrowserDataLogTime = 60d1fece08fed901 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Pack = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 4f36176bd6fdd901 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 0100000011e46fd891769edb0b7b79e88a39a4fc219a205655a42575c601588d6a75ecbd7976dcf55a5f7411b5e024d3d6e1a995401cb768d9828bf8dccf MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\Extensions MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\vice.com\NumberOfSubdomains = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 77010fb2d6fdd901 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "268435456" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\ACGPolicyState = "6" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 70c9746dd6fdd901 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DomStorageState\EdpCleanupState = "0" MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage\www.vice.com MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\vice.com\Total = "4979" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "395205405" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\MrtCache MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Privacy\InProgressFlags = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 938422b2d6fdd901 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "25" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\TreeView = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\DOMStorage\Total\ = "1982" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\002\Internet Explorer\EdpDomStorage\www.bing.com MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\OneBoxLoadAttempts = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\www.vice.com\ = "5134" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1894964180-3551943068-3090682958-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
MEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exeMEMZ.exepid process 3700 MEMZ.exe 3700 MEMZ.exe 3700 MEMZ.exe 3700 MEMZ.exe 3704 MEMZ.exe 3704 MEMZ.exe 424 MEMZ.exe 424 MEMZ.exe 3700 MEMZ.exe 3700 MEMZ.exe 1516 MEMZ.exe 1516 MEMZ.exe 4904 MEMZ.exe 4904 MEMZ.exe 3704 MEMZ.exe 3704 MEMZ.exe 424 MEMZ.exe 424 MEMZ.exe 3700 MEMZ.exe 3700 MEMZ.exe 1516 MEMZ.exe 1516 MEMZ.exe 4904 MEMZ.exe 4904 MEMZ.exe 3704 MEMZ.exe 3704 MEMZ.exe 3700 MEMZ.exe 3700 MEMZ.exe 424 MEMZ.exe 424 MEMZ.exe 1516 MEMZ.exe 1516 MEMZ.exe 4904 MEMZ.exe 4904 MEMZ.exe 3704 MEMZ.exe 3704 MEMZ.exe 3700 MEMZ.exe 3700 MEMZ.exe 1516 MEMZ.exe 1516 MEMZ.exe 424 MEMZ.exe 424 MEMZ.exe 4904 MEMZ.exe 4904 MEMZ.exe 3704 MEMZ.exe 3704 MEMZ.exe 3700 MEMZ.exe 3700 MEMZ.exe 1516 MEMZ.exe 1516 MEMZ.exe 424 MEMZ.exe 424 MEMZ.exe 4904 MEMZ.exe 4904 MEMZ.exe 3700 MEMZ.exe 3704 MEMZ.exe 3704 MEMZ.exe 3700 MEMZ.exe 424 MEMZ.exe 424 MEMZ.exe 4904 MEMZ.exe 4904 MEMZ.exe 1516 MEMZ.exe 1516 MEMZ.exe -
Suspicious behavior: MapViewOfSection 24 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exepid process 4388 MicrosoftEdgeCP.exe 4388 MicrosoftEdgeCP.exe 4388 MicrosoftEdgeCP.exe 4388 MicrosoftEdgeCP.exe 4388 MicrosoftEdgeCP.exe 4388 MicrosoftEdgeCP.exe 4388 MicrosoftEdgeCP.exe 4388 MicrosoftEdgeCP.exe 4388 MicrosoftEdgeCP.exe 4388 MicrosoftEdgeCP.exe 5804 MicrosoftEdgeCP.exe 5804 MicrosoftEdgeCP.exe 5804 MicrosoftEdgeCP.exe 5804 MicrosoftEdgeCP.exe 5804 MicrosoftEdgeCP.exe 5804 MicrosoftEdgeCP.exe 1712 MicrosoftEdgeCP.exe 1712 MicrosoftEdgeCP.exe 1712 MicrosoftEdgeCP.exe 1712 MicrosoftEdgeCP.exe 1712 MicrosoftEdgeCP.exe 1712 MicrosoftEdgeCP.exe 1712 MicrosoftEdgeCP.exe 1712 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeAUDIODG.EXEdescription pid process Token: SeDebugPrivilege 4652 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4652 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4652 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4652 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3016 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3016 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4472 MicrosoftEdge.exe Token: SeDebugPrivilege 4472 MicrosoftEdge.exe Token: 33 5264 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 5264 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exemspaint.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMEMZ.exepid process 4472 MicrosoftEdge.exe 4388 MicrosoftEdgeCP.exe 4652 MicrosoftEdgeCP.exe 4388 MicrosoftEdgeCP.exe 4716 MicrosoftEdgeCP.exe 5820 mspaint.exe 5820 mspaint.exe 5820 mspaint.exe 5820 mspaint.exe 5260 MicrosoftEdge.exe 5804 MicrosoftEdgeCP.exe 5804 MicrosoftEdgeCP.exe 6104 MicrosoftEdge.exe 1712 MicrosoftEdgeCP.exe 1712 MicrosoftEdgeCP.exe 1832 MEMZ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
MEMZ.exeMEMZ.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription pid process target process PID 4324 wrote to memory of 3700 4324 MEMZ.exe MEMZ.exe PID 4324 wrote to memory of 3700 4324 MEMZ.exe MEMZ.exe PID 4324 wrote to memory of 3700 4324 MEMZ.exe MEMZ.exe PID 4324 wrote to memory of 3704 4324 MEMZ.exe MEMZ.exe PID 4324 wrote to memory of 3704 4324 MEMZ.exe MEMZ.exe PID 4324 wrote to memory of 3704 4324 MEMZ.exe MEMZ.exe PID 4324 wrote to memory of 424 4324 MEMZ.exe MEMZ.exe PID 4324 wrote to memory of 424 4324 MEMZ.exe MEMZ.exe PID 4324 wrote to memory of 424 4324 MEMZ.exe MEMZ.exe PID 4324 wrote to memory of 4904 4324 MEMZ.exe MEMZ.exe PID 4324 wrote to memory of 4904 4324 MEMZ.exe MEMZ.exe PID 4324 wrote to memory of 4904 4324 MEMZ.exe MEMZ.exe PID 4324 wrote to memory of 1516 4324 MEMZ.exe MEMZ.exe PID 4324 wrote to memory of 1516 4324 MEMZ.exe MEMZ.exe PID 4324 wrote to memory of 1516 4324 MEMZ.exe MEMZ.exe PID 4324 wrote to memory of 1832 4324 MEMZ.exe MEMZ.exe PID 4324 wrote to memory of 1832 4324 MEMZ.exe MEMZ.exe PID 4324 wrote to memory of 1832 4324 MEMZ.exe MEMZ.exe PID 1832 wrote to memory of 2620 1832 MEMZ.exe notepad.exe PID 1832 wrote to memory of 2620 1832 MEMZ.exe notepad.exe PID 1832 wrote to memory of 2620 1832 MEMZ.exe notepad.exe PID 4388 wrote to memory of 2676 4388 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4388 wrote to memory of 2676 4388 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4388 wrote to memory of 2676 4388 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4388 wrote to memory of 2676 4388 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4388 wrote to memory of 2676 4388 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4388 wrote to memory of 2676 4388 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4388 wrote to memory of 4820 4388 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4388 wrote to memory of 4820 4388 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4388 wrote to memory of 4820 4388 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4388 wrote to memory of 4820 4388 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1832 wrote to memory of 5668 1832 MEMZ.exe explorer.exe PID 1832 wrote to memory of 5668 1832 MEMZ.exe explorer.exe PID 1832 wrote to memory of 5668 1832 MEMZ.exe explorer.exe PID 4388 wrote to memory of 4820 4388 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4388 wrote to memory of 4820 4388 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4388 wrote to memory of 4820 4388 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4388 wrote to memory of 4820 4388 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4388 wrote to memory of 4820 4388 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4388 wrote to memory of 4820 4388 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4388 wrote to memory of 4820 4388 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4388 wrote to memory of 2676 4388 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4388 wrote to memory of 2676 4388 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4388 wrote to memory of 2676 4388 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4388 wrote to memory of 2676 4388 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 1832 wrote to memory of 5820 1832 MEMZ.exe mspaint.exe PID 1832 wrote to memory of 5820 1832 MEMZ.exe mspaint.exe PID 1832 wrote to memory of 5820 1832 MEMZ.exe mspaint.exe PID 5804 wrote to memory of 5892 5804 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5804 wrote to memory of 5892 5804 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5804 wrote to memory of 5892 5804 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5804 wrote to memory of 5892 5804 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5804 wrote to memory of 5892 5804 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5804 wrote to memory of 5892 5804 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5804 wrote to memory of 5892 5804 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5804 wrote to memory of 5892 5804 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5804 wrote to memory of 5892 5804 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5804 wrote to memory of 5892 5804 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5804 wrote to memory of 5368 5804 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5804 wrote to memory of 5368 5804 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5804 wrote to memory of 5368 5804 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5804 wrote to memory of 5368 5804 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5804 wrote to memory of 5368 5804 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5804 wrote to memory of 5368 5804 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\2023_10_07_---d-e-m-i-s-e----22027008.png1⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4500 --field-trial-handle=1776,i,4193569335109092200,38171218319682817,131072 /prefetch:81⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4696 --field-trial-handle=1776,i,4193569335109092200,38171218319682817,131072 /prefetch:81⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4596 --field-trial-handle=1776,i,4193569335109092200,38171218319682817,131072 /prefetch:81⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 --field-trial-handle=1776,i,4193569335109092200,38171218319682817,131072 /prefetch:81⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=4592 --field-trial-handle=1776,i,4193569335109092200,38171218319682817,131072 /prefetch:11⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --mojo-platform-channel-handle=3148 --field-trial-handle=1776,i,4193569335109092200,38171218319682817,131072 /prefetch:11⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3120 --field-trial-handle=1776,i,4193569335109092200,38171218319682817,131072 /prefetch:81⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2924 --field-trial-handle=1776,i,4193569335109092200,38171218319682817,131072 /prefetch:81⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5280 --field-trial-handle=1776,i,4193569335109092200,38171218319682817,131072 /prefetch:81⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3168 --field-trial-handle=1776,i,4193569335109092200,38171218319682817,131072 /prefetch:81⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 --field-trial-handle=1776,i,4193569335109092200,38171218319682817,131072 /prefetch:81⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5244 --field-trial-handle=1776,i,4193569335109092200,38171218319682817,131072 /prefetch:81⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5236 --field-trial-handle=1776,i,4193569335109092200,38171218319682817,131072 /prefetch:81⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5256 --field-trial-handle=1776,i,4193569335109092200,38171218319682817,131072 /prefetch:81⤵
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\Downloads\MEMZ.exe"C:\Users\Admin\Downloads\MEMZ.exe" /main2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt3⤵
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe"3⤵
-
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\System32\mspaint.exe"3⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\System32\mmc.exe"3⤵
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe"4⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3060 --field-trial-handle=1776,i,4193569335109092200,38171218319682817,131072 /prefetch:21⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4101⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\read me after hacking me.txt1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
471B
MD533b2858aa06a09976a610424eeba3df1
SHA15c26698a22fe7ce2d703d3d15046e4e3d9bdb7be
SHA25680fe7b08ee4f7dc2e25e3cd8d827f5b271330b63702f8b840cc1f7810650426b
SHA512930597cf2bc6f42cb99872aeabeb26de9cb8cdabc013546cd5f4498bac538d580c4d2795f741bca75fb830599fdd687dbf23bc25ef7885c91179d81399c5f60c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
404B
MD5d2e6fee41148576fb5d1d4dea34783f8
SHA1638ae2d6dcaf17284a04db79327ec2eb446206eb
SHA256abad5d49d82b62911af0e07ea5260a567b8540975fa97b23202dedb9de22c3df
SHA5127de162847ddec9434fe5dc646fdadb57dd90e4873c70e78ef135e7a6d47b10a20724d97e8869046699c8d4bf8d2719112743204d9eafa96af5ce46c33c95a496
-
C:\Users\Admin\AppData\Local\MicrosoftEdge\SharedCacheContainers\MicrosoftEdge_iecompat\IECompatData.xmlFilesize
74KB
MD5d4fc49dc14f63895d997fa4940f24378
SHA13efb1437a7c5e46034147cbbc8db017c69d02c31
SHA256853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1
SHA512cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a
-
C:\Users\Admin\AppData\Local\MicrosoftEdge\SharedCacheContainers\MicrosoftEdge_iecompat\IECompatData.xmlFilesize
74KB
MD5d4fc49dc14f63895d997fa4940f24378
SHA13efb1437a7c5e46034147cbbc8db017c69d02c31
SHA256853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1
SHA512cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\0G1F2NWK\edgecompatviewlist[1].xmlFilesize
74KB
MD5d4fc49dc14f63895d997fa4940f24378
SHA13efb1437a7c5e46034147cbbc8db017c69d02c31
SHA256853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1
SHA512cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\DP57REOA\edgecompatviewlist[1].xmlFilesize
74KB
MD5d4fc49dc14f63895d997fa4940f24378
SHA13efb1437a7c5e46034147cbbc8db017c69d02c31
SHA256853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1
SHA512cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\C2K6OJHV\warmup[1].gifFilesize
43B
MD5325472601571f31e1bf00674c368d335
SHA12daeaa8b5f19f0bc209d976c02bd6acb51b00b0a
SHA256b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b
SHA512717ea0ff7f3f624c268eccb244e24ec1305ab21557abb3d6f1a7e183ff68a2d28f13d1d2af926c9ef6d1fb16dd8cbe34cd98cacf79091dddc7874dcee21ecfdc
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\IB3TM7MV\styles__ltr[1].cssFilesize
55KB
MD5eb4bc511f79f7a1573b45f5775b3a99b
SHA1d910fb51ad7316aa54f055079374574698e74b35
SHA2567859a62e04b0acb06516eb12454de6673883ecfaeaed6c254659bca7cd59c050
SHA512ec9bdf1c91b6262b183fd23f640eac22016d1f42db631380676ed34b962e01badda91f9cbdfa189b42fe3182a992f1b95a7353af41e41b2d6e1dab17e87637a0
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\NLRM4760\embed[1].jsFilesize
24KB
MD548ea90a271cbe4abc4b16e35009c3320
SHA1b63e74904b9456cffc0d75440033db8ece0f5f15
SHA25614a5b7c288b9d3ac982aadf85f2a789105ca3fa9bbf832b7d8f6b42c5401a9be
SHA51264f80cb79d668df38038f3a103fd1e2fd3bc57b263ddf54ae6b4386e52d38b9a723e4c9747d4390f49e35bf7810b9ebd114b6aaf67934e279e06da0fb07cb3d0
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\NLRM4760\recaptcha__en[1].jsFilesize
460KB
MD51597adfd61770da62f147c7072ddce90
SHA1ac0214495692e766b4c453589ce587a46242af67
SHA256c662a9036d1fd054a03bd683564761866f27663c4607aaa2b1ff417d17c512f1
SHA5121d247287949b3c7d326d0fbf600cc0bb18f4cfb461a24db60b56b0bc22096c5aeb86f3acc72dae6968639c3a102deeffa922ba5ee9e3e5db85392784f2b0ef36
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\RKJ9MAJL\anchor[3].htmFilesize
58KB
MD5afd70bc3cefa9d9a85624da725f1f091
SHA184762e384fb7a90ba4c4ae795bc098e793e0df45
SHA2565a2bec21275b6f1a925037e03873e25a7e0572a84dfe531b4e24f8457d1a944c
SHA512ac0c086162e49df23dc20ed7a3946a3d41e3832730362f3b130b64b5a181b78f5b2aea7d2029dfab6419c1dcc32f169ada7e980f53e09d7dca1aaabf217f4be0
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\RKJ9MAJL\bframe[2].htmFilesize
7KB
MD59725945436dc5a77c1e0944cebab944b
SHA13f8f60babc1775eede19701349712d5f5847e816
SHA2563ae98ac4603cd0de801c3d97be37f5bfc01e5beb97be466290f3e7d971936670
SHA512df3c21dfc28ff656007a74703a1ad09bf99c309ba26fd29ea1d8290f03df215c37e18b0ebca64f6574a40a52ae2f38d02bf22be3a50919385e61bb74e178057e
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\BH9DB18R\www.vice[1].xmlFilesize
17B
MD53ff4d575d1d04c3b54f67a6310f2fc95
SHA11308937c1a46e6c331d5456bcd4b2182dc444040
SHA256021a5868b6c9e8beba07848ba30586c693f87ac02ee2ccaa0f26b7163c0c6b44
SHA5122b26501c4bf86ed66e941735c49ac445d683ad49ed94c5d87cc96228081ae2c8f4a8f44a2a5276b9f4b0962decfce6b9eeee38e42262ce8d865d5df0df7ec3d6
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\BH9DB18R\www.vice[1].xmlFilesize
7KB
MD5d329f31806f795b241e17549ff3f1938
SHA14469e4d4815eba00ce485cb0c1d96a37bcd1eff8
SHA25634d0e8b888aa7e386bd33fa7a71665f52b080b752ef904ac678f6f14ebf5e70f
SHA5125eff109fe3bd597211aa0556552115c3a641b353efa90b8a230fb89234e21edd9100b3696da0bcdc5822b8f4301fbc87355771da76685cc7974f8300d0fda116
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\TS8E0420\oembed.vice[1].xmlFilesize
17B
MD53ff4d575d1d04c3b54f67a6310f2fc95
SHA11308937c1a46e6c331d5456bcd4b2182dc444040
SHA256021a5868b6c9e8beba07848ba30586c693f87ac02ee2ccaa0f26b7163c0c6b44
SHA5122b26501c4bf86ed66e941735c49ac445d683ad49ed94c5d87cc96228081ae2c8f4a8f44a2a5276b9f4b0962decfce6b9eeee38e42262ce8d865d5df0df7ec3d6
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\7FDZQXUC\favicon[1].icoFilesize
5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\J91TTHFO\coast-228x228[1].pngFilesize
5KB
MD5b17926bfca4f7d534be63b7b48aa8d44
SHA1baa8dbac0587dccdd18516fa7ed789f886c42114
SHA256885cf4c748081f6e569c4c5432249084eded544d55f7c85cf47ec1aebe6bdcd6
SHA512a99269cc3c0af6a291e5373c4e488eaa3900e66bc3342933da3a18caff5401a4408aa1cb4463fac649c3cc5d88773f789fb120e292ed956188f1f5eda8ca7633
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\Y0RAXMJS\favicon[1].icoFilesize
758B
MD584cc977d0eb148166481b01d8418e375
SHA100e2461bcd67d7ba511db230415000aefbd30d2d
SHA256bbf8da37d92138cc08ffeec8e3379c334988d5ae99f4415579999bfbbb57a66c
SHA512f47a507077f9173fb07ec200c2677ba5f783d645be100f12efe71f701a74272a98e853c4fab63740d685853935d545730992d0004c9d2fe8e1965445cab509c3
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.logFilesize
512KB
MD58623cae2e1301b57a35e400f9ec216bd
SHA14a2cb2edebd03306feb2fa69a8d111792e93a6c4
SHA2569d937bcf324357e95566485c21b263c44ecbbdf2e9f696ce8ae4efba045e8176
SHA51295744f447c950e967dc42e64bbdb648751d3bd4b62686227270adda4efa60eadeda0f1f589661e50ce05be40605ed49c6ed9e39a6797b67c072baa3f714ba2e1
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Temp\~DFB18AE29550815778.TMPFilesize
32KB
MD539fdd42e448335624a1c262bf97e5981
SHA18ec509336e3e57904453b17d32e6efd8cce087a1
SHA2567c19ea575608a66947e49c1fb42c38768a51bd6158e9a1cd04c14b6d799ba7d7
SHA51210d2b89e40039ce271f6caca0d8ba8f6b72adbb6f56bb17a305c3e032c35745df0ed822d2efc36a87aa985bd2d312e742e31b534bd18bb4650842ccfaf584ad2
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\C2K6OJHV\KFOlCnqEu92Fr1MmEU9fCRc4EsA[1].woff2Filesize
14KB
MD579c7e3f902d990d3b5e74e43feb5f623
SHA144aae0f53f6fc0f1730acbfdf4159684911b8626
SHA2562236e56f735d25696957657f099459d73303b9501cc39bbd059c20849c5bedff
SHA5123a25882c7f3f90a7aa89ecab74a4be2fddfb304f65627b590340be44807c5c5e3826df63808c7cd06daa3420a94090249321a1e035b1cd223a15010c510518df
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\C2K6OJHV\KFOlCnqEu92Fr1MmYUtfBxc4EsA[1].woff2Filesize
7KB
MD5585f849571ef8c8f1b9f1630d529b54d
SHA1162c5b7190f234d5f841e7e578b68779e2bf48c2
SHA256c6dcdefaa63792f3c29abc520c8a2c0bc6e08686ea0187c9baac3d5d329f7002
SHA5121140c4b04c70a84f1070c27e8e4a91d02fda4fc890877900c53cfd3a1d8908b677a412757061de43bc71022dfdd14288f9db0852ef6bf4d2c1615cb45628bebc
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\C2K6OJHV\KFOlCnqEu92Fr1MmYUtfCRc4EsA[1].woff2Filesize
14KB
MD5e904f1745726f4175e96c936525662a7
SHA1af4e9ee282fea95be6261fc35b2accaed24f6058
SHA25665c7b85c92158adb2d71bebe0d6dfb31ab34de5e7d82134fe1aa4eba589fc296
SHA5127a279d41c8f60806c2253cba5b399be7add861bd15bf0ac4fa7c96fa1eee6557bf1ebd684e909086d9292739f27fa18947af5c98f4920fe00da3acf209c6260a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\C2K6OJHV\KFOmCnqEu92Fr1Mu5mxKOzY[1].woff2Filesize
9KB
MD5efe937997e08e15b056a3643e2734636
SHA1d02decbf472a0928b054cc8e4b13684539a913db
SHA25653f2931d978bf9b24d43b5d556ecf315a6b3f089699c5ba3a954c4dde8663361
SHA512721c903e06f00840140ed5eec06329221a2731efc483e025043675b1f070b03a544f8eb153b63cd981494379a9e975f014b57c286596b6f988cee1aaf04a8c65
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\C2K6OJHV\KFOmCnqEu92Fr1Mu7WxKOzY[1].woff2Filesize
5KB
MD5a835084624425dacc5e188c6973c1594
SHA11bef196929bffcabdc834c0deefda104eb7a3318
SHA2560dfa6a82824cf2be6bb8543de6ef56b87daae5dd63f9e68c88f02697f94af740
SHA51238f2764c76a545349e8096d4608000d9412c87cc0cb659cf0cf7d15a82333dd339025a4353b9bd8590014502abceb32ca712108a522ca60cbf1940d4e4f6b98a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\C2K6OJHV\api[1].jsFilesize
850B
MD5cc4657404e419868f941ae8f7298bd7d
SHA1804263fd3fddc5c2555ad54467ea611bc9666c2a
SHA256407d3bdbc00f22e2287f7b5945d51cb12eb386f64413e2855a5bafe11e4c5f75
SHA5128579170e60875d8444657a4bbd1ef23df9a3a4c0216d29b350d59b10d64f189ee73066a5eba4d53464a6378280a7693a74f83db6ea12f339954a77c4fe7f7379
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\C2K6OJHV\logo_48[1].pngFilesize
2KB
MD5ef9941290c50cd3866e2ba6b793f010d
SHA14736508c795667dcea21f8d864233031223b7832
SHA2561b9efb22c938500971aac2b2130a475fa23684dd69e43103894968df83145b8a
SHA512a0c69c70117c5713caf8b12f3b6e8bbb9cdaf72768e5db9db5831a3c37541b87613c6b020dd2f9b8760064a8c7337f175e7234bfe776eee5e3588dc5662419d9
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\IB3TM7MV\KFOlCnqEu92Fr1MmEU9fBxc4EsA[1].woff2Filesize
7KB
MD5207d2af0a0d9716e1f61cadf347accc5
SHA10f64b5a6cc91c575cb77289e6386d8f872a594ca
SHA256416d72c8cee51c1d6c6a1cab525b2e3b4144f2f457026669ddad34b70dabd485
SHA512da8b03ee3029126b0c7c001d7ef2a7ff8e6078b2df2ec38973864a9c0fd8deb5ecef021c12a56a24a3fd84f38f4d14ea995df127dc34f0b7eec8e6e3fc8d1bbd
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\IB3TM7MV\KFOlCnqEu92Fr1MmEU9fCBc4EsA[1].woff2Filesize
1KB
MD552e881a8e8286f6b6a0f98d5f675bb93
SHA19c9c4bc1444500b298dfea00d7d2de9ab459a1ad
SHA2565e5321bb08de884e4ad6585b8233a7477fa590c012e303ea6f0af616a6e93ffb
SHA51245c07a5e511948c328f327e2ef4c3787ac0173c72c51a7e43e3efd3e47dd332539af15f3972ef1cc023972940f839fffe151aefaa04f499ae1faceaab6f1014f
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\IB3TM7MV\KFOlCnqEu92Fr1MmYUtfBBc4[1].woff2Filesize
14KB
MD519b7a0adfdd4f808b53af7e2ce2ad4e5
SHA181d5d4c7b5035ad10cce63cf7100295e0c51fdda
SHA256c912a9ce0c3122d4b2b29ad26bfe06b0390d1a5bdaa5d6128692c0befd1dfbbd
SHA51249da16000687ac81fc4ca9e9112bdca850bb9f32e0af2fe751abc57a8e9c3382451b50998ceb9de56fc4196f1dc7ef46bba47933fc47eb4538124870b7630036
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\IB3TM7MV\KFOlCnqEu92Fr1MmYUtfCBc4EsA[1].woff2Filesize
1KB
MD57cbd23921efe855138ad68835f4c5921
SHA178a3ae9ec08f2cf8ebb791a2331b33a03ab8cc76
SHA2568eaae4c8680e993b273145315c76a9a278f696467c426637d4beab8cb3dc4a3d
SHA512d8a4db91d2063273d31f77728b44557612b85f51143973caa3cfd60ab18f8c3e4b8cdaab43af843fe29441cd1d8299bf2f139a78e47bf740277b33a377377177
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\IB3TM7MV\KFOmCnqEu92Fr1Mu4WxKOzY[1].woff2Filesize
7KB
MD57aa7eb76a9f66f0223c8197752bb6bc5
SHA1ac56d5def920433c7850ddbbdd99d218d25afd2b
SHA2569ca415df2c57b1f26947351c66ccfaf99d2f8f01b4b8de019a3ae6f3a9c780c7
SHA512e9a513741cb90305fbe08cfd9f7416f192291c261a7843876293e04a874ab9b914c3a4d2ed771a9d6484df1c365308c9e4c35cd978b183acf5de6b96ac14480d
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\IB3TM7MV\styles__ltr[1].cssFilesize
55KB
MD5eb4bc511f79f7a1573b45f5775b3a99b
SHA1d910fb51ad7316aa54f055079374574698e74b35
SHA2567859a62e04b0acb06516eb12454de6673883ecfaeaed6c254659bca7cd59c050
SHA512ec9bdf1c91b6262b183fd23f640eac22016d1f42db631380676ed34b962e01badda91f9cbdfa189b42fe3182a992f1b95a7353af41e41b2d6e1dab17e87637a0
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\NLRM4760\KFOlCnqEu92Fr1MmEU9fBBc4[1].woff2Filesize
15KB
MD5285467176f7fe6bb6a9c6873b3dad2cc
SHA1ea04e4ff5142ddd69307c183def721a160e0a64e
SHA2565a8c1e7681318caa29e9f44e8a6e271f6a4067a2703e9916dfd4fe9099241db7
SHA5125f9bb763406ea8ce978ec675bd51a0263e9547021ea71188dbd62f0212eb00c1421b750d3b94550b50425bebff5f881c41299f6a33bbfa12fb1ff18c12bc7ff1
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\NLRM4760\KFOlCnqEu92Fr1MmYUtfABc4EsA[1].woff2Filesize
9KB
MD5797d1a46df56bba1126441693c5c948a
SHA101f372fe98b4c2b241080a279d418a3a6364416d
SHA256c451e5cf6b04913a0bc169e20eace7dec760ba1db38cdcc343d8673bb221dd00
SHA51299827a3fab634b2598736e338213e1041ef26108a1607be294325d90a6ba251a947fd06d8cb0a2104b26d7fe9455feb9088a79fe515be1896c994c5850705edc
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\NLRM4760\KFOlCnqEu92Fr1MmYUtfChc4EsA[1].woff2Filesize
11KB
MD529542ac824c94a70cb8abdeef41cd871
SHA1df5010dad18d6c8c0ad66f6ff317729d2c0090ba
SHA25663ef838f895e018722b60f6e7e1d196ff3d90014c70465703fc58e708e83af64
SHA51252f91e02b82f9f27d334704b62a78e746c80023ee8882b96cb24cb4043f9a256f395d24830b1f4513bd7597f8c564af20db9c715ab014eb2ab752fd697156591
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\NLRM4760\KFOmCnqEu92Fr1Mu72xKOzY[1].woff2Filesize
15KB
MD5e3836d1191745d29137bfe16e4e4a2c2
SHA14dc8845d97df9cb627d9e6fdd49be1ef9eb9a69c
SHA25698eec6c6fa4dcd4825e48eff334451979afc23cd085aea2d45b04dc1259079dd
SHA5129e9ec420cf75bf47a21e59a822e01dc89dcf97eec3cc117c54ce51923c9a6f2c462355db1bc20cdf665ef4a5b40ffcfa9c8cee05bb5e112c380038bfef29c397
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\NLRM4760\KFOmCnqEu92Fr1Mu7mxKOzY[1].woff2Filesize
1KB
MD557993e705ff6f15e722f5f90de8836f8
SHA13fecc33bac640b63272c9a8dffd3df12f996730b
SHA256836f58544471e0fb0699cb9ddd0fd0138877733a98b4e029fca1c996d4fb038d
SHA51231f92fb495a1a20ab5131493ab8a74449aabf5221e2901915f2cc917a0878bb5a3cbc29ab12324ffe2f0bc7562a142158268c3f07c7dca3e02a22a9ade41721e
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\NLRM4760\recaptcha__en[1].jsFilesize
460KB
MD51597adfd61770da62f147c7072ddce90
SHA1ac0214495692e766b4c453589ce587a46242af67
SHA256c662a9036d1fd054a03bd683564761866f27663c4607aaa2b1ff417d17c512f1
SHA5121d247287949b3c7d326d0fbf600cc0bb18f4cfb461a24db60b56b0bc22096c5aeb86f3acc72dae6968639c3a102deeffa922ba5ee9e3e5db85392784f2b0ef36
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\NLRM4760\webworker[1].jsFilesize
102B
MD5e82e2a2d9574aa1510adc2ffdc04b2ef
SHA1ef4116a276c39549961167d28ba479087f3a58a1
SHA256145bf25d7a0b98497c1dbfa062c7ec9a2f329f19854545fc9390634f5788a3ae
SHA512538b9b5e231043ae4856978ce35193cde2fe1d41b293fd687ef03d0aa81975a3668fad33e379eec42f824175b1087bd684133f9e45c5657d2b87a06919945644
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\RKJ9MAJL\KFOlCnqEu92Fr1MmEU9fABc4EsA[1].woff2Filesize
9KB
MD5df648143c248d3fe9ef881866e5dea56
SHA1770cae7a298ecfe5cf5db8fe68205cdf9d535a47
SHA2566a3f2c2a5db6e4710e44df0db3caec5eb817e53989374e9eac68057d64b7f6d2
SHA5126ff33a884f4233e092ee11e2ad7ef34d36fb2b61418b18214c28aa8b9bf5b13ceccfa531e7039b4b7585d143ee2460563e3052364a7dc8d70b07b72ec37b0b66
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\RKJ9MAJL\KFOlCnqEu92Fr1MmEU9fChc4EsA[1].woff2Filesize
11KB
MD516aedbf057fbb3da342211de2d071f11
SHA1fdee07631b40b264208caa8714faaa5b991d987b
SHA2567566a2f09ff8534334b7a44f72a1afaba6bdbb782209be8804636ee8b963c75f
SHA5125cd45dfb0d0ee44afd9b3ffd93c2942c2f04e359d067d4631edd67a2ee09149766294b29c75aaab7436dacc775a8ca02392c5e4cfb8d7fede19c028448507e0e
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\RKJ9MAJL\KFOlCnqEu92Fr1MmEU9fCxc4EsA[1].woff2Filesize
5KB
MD56bef514048228359f2f8f5e0235f8599
SHA1318cb182661d72332dc8a8316d2e6df0332756c4
SHA256135d563a494b1f8e6196278b7f597258a563f1438f5953c6fbef106070f66ec8
SHA51223fb4605a90c7616117fab85fcd88c23b35d22177d441d01ce6270a9e95061121e0f7783db275ad7b020feaba02bbbc0f77803ca9fb843df6f1b2b7377288773
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\RKJ9MAJL\KFOlCnqEu92Fr1MmYUtfCxc4EsA[1].woff2Filesize
4KB
MD5133b0f334c0eb9dbf32c90e098fab6bd
SHA1398f8fd3a668ef0b16435b01ad0c6122e3784968
SHA2566581d0d008bc695e0f6beffbd7d51abb4d063ef5dedc16feb09aa92ea20c5c00
SHA5122a5a0956ecc8680e4e9ef73ec05bc376a1cc49ddb12ee76316378fe9626dccedb21530e3e031b2dae2830874cc1b6bfd6cce2d6d0dce54587ff0fc3780041ace
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\RKJ9MAJL\KFOmCnqEu92Fr1Mu4mxK[1].woff2Filesize
14KB
MD55d4aeb4e5f5ef754e307d7ffaef688bd
SHA106db651cdf354c64a7383ea9c77024ef4fb4cef8
SHA2563e253b66056519aa065b00a453bac37ac5ed8f3e6fe7b542e93a9dcdcc11d0bc
SHA5127eb7c301df79d35a6a521fae9d3dccc0a695d3480b4d34c7d262dd0c67abec8437ed40e2920625e98aaeafba1d908dec69c3b07494ec7c29307de49e91c2ef48
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\RKJ9MAJL\KFOmCnqEu92Fr1Mu7GxKOzY[1].woff2Filesize
11KB
MD515d8ede0a816bc7a9838207747c6620c
SHA1f6e2e75f1277c66e282553ae6a22661e51f472b8
SHA256dbb8f45730d91bffff8307cfdf7c82e67745d84cb6063a1f3880fadfad59c57d
SHA51239c75f8e0939275a69f8d30e7f91d7ca06af19240567fb50e441a0d2594b73b6a390d11033afb63d68c86c89f4e4bf39b3aca131b30f640d21101dc414e42c97
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cookies\YL5WLDYD.cookieFilesize
279B
MD5144863d5399ee348a423be71822771fb
SHA1716aab9f6c70cbf5339799e9afe79fb873c74e03
SHA256ab19f1f42406058a4c42fdabd094581471b5b99292bc83468c5b209d619b00c2
SHA51278077b7e57f09b983907835f5465dafb0da1ee0cd03e76bd2b547daa92266d9e9dd62fb012b79cf9e155feaab164b2d2bbda5f5b4cdb2959c158464f8edfff1a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\H4WV8X1W\www.google[1].xmlFilesize
99B
MD5c66addbeb5ecfcf8aa581f8a0259181e
SHA1789fdd64b921e9d1cc50af4fc064512a0cc05de1
SHA25634685de8629ac006a75f0bb740cbb56e851b231d3495f5de3d19caa5c937bc08
SHA512f6f0fa55b2a4a8bf3af414f4aff6d8cccc589b561c82f8129dd9adb9550e8aed3603ca16717372d49c88f4c562f4250fd7382ffa95a31759a4b84ddcfd8533d2
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\646C991C2A28825F3CC56E0A1D1E3FA9Filesize
1KB
MD5923f6e4d45a5884f0abbfe60aaf2a972
SHA1b77ca54adace5c1e34615832c53f9f7f3ee02887
SHA25645c2b4583dd60ac1d507af81ee09b636d4605f246c7596526e26d1a8d4af4df1
SHA51272f0bfdb3dd6a0b9f8dd9a14e7f6f410f16ff7e516f110266bd8c87d7a81a27e6174a3ccabd80c828e50867e129d895ff93de1c45b1cdb70e2024139c14efa98
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53Filesize
471B
MD556f8fa6aa59f3ee1aa24361d930a52d4
SHA12b43132dcfbedcd28adb4e03c2c90290f81816b8
SHA256066a23f715a61c55ba3c4cae2e214a473fa4c3cf3a4bf963f323c62bba98e0d2
SHA51246312236d22521e8e7d96ba38f411420a6e231d029a09bcfe57154fe670526ea36159572cca9c8fd2b43c7b2948e3a05b09f3fc98a5734079dfd7bc2db5ec15a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAFilesize
724B
MD5ac89a852c2aaa3d389b2d2dd312ad367
SHA18f421dd6493c61dbda6b839e2debb7b50a20c930
SHA2560b720e19270c672f9b6e0ec40b468ac49376807de08a814573fe038779534f45
SHA512c6a88f33688cc0c287f04005e07d5b5e4a8721d204aa429f93ade2a56aeb86e05d89a8f7a44c1e93359a185a4c5f418240c6cdbc5a21314226681c744cf37f36
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_9EBD80E624B865607A21974E30809640Filesize
471B
MD586dd6d9049c9126ed4d892019fe202f7
SHA10a8c428748a264457cb0d21dd0446c781091ec0f
SHA2563e37edfb573c2be91caa2a0d41fa3dbb8c7f5d459c685cac67407e9c980b4dd5
SHA51222ee938c84a2c67ba5c61f327f2cf624dbcd2dab3eb69a7151e57762f09e2c031f5d85c4730e1c671d6a5fbf1ac8e274b1e1853f76ee67cac4334545ae984c43
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_BBCE07F0D1D3591F7AACC4D200BCC3F0Filesize
472B
MD503bb3d68c3f1719c581e9ec25d45ad5a
SHA12d145ea62999aa87aa34d3251f335957f6e40f6b
SHA2562fcb9bd2771620301bfb11405e8092cf4e80092bfa2d29d1deb7b30c628f9f85
SHA5126a025943d2c1f6f208a099f320a54b4c0c31cc5d0db35aab6849d62a511e0644ffbd5288c3d6dbde32652532df163407026003506d1699f4726a6addecf226ba
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\646C991C2A28825F3CC56E0A1D1E3FA9Filesize
184B
MD5e2270e690df17013b3c9ec75ae5397ba
SHA1940b821fa269dac8c723263309b97b6145a79298
SHA2560d2084464f3db90e258b194f04285155559c139cf2c9e3aaa21ed853e49c0658
SHA512a67f9da2ff67cf8604b9e7a07a295c831c51b1f9e3043d64bb1e1ccddce487096903fb36890eaf6a119fd0c0ad9bfc0df1714267a341c88b91291fff9bce66af
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53Filesize
412B
MD5e613cfe6509fa22649b1d47a42bfe6e8
SHA160c93dd44e61a0843b83ed9ab60e50515f1ac308
SHA2562419ac3f1eb649414f11618f818a1c88b2b66484ea3f6efc3f13ce1a4cd75b50
SHA5128d951350e91afd75d39327d3f20c8a6ba95719781bc9e0b4e38233760ed4dead65205d878c0be0aa999e09a8a6548d6299281361b86b1b5afb15f066ea987f26
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAFilesize
392B
MD54afb503351d146664f757af956a0ca81
SHA195fd702f06ea6eb1b51f4081ada282b9f9dcc026
SHA25608b52bff78ab8b89fe236badc139e8ef3009aeed9e231f22b64450af9e9c3998
SHA51210942ab592f6edb64b9d334080eb4392064c3deb9f8f6d248444364d660804bd5b7c90cfbcd2b52cc1129bf1b730c84fadd2cb9437b0e38818315b38726af385
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_9EBD80E624B865607A21974E30809640Filesize
406B
MD5cac978caaabeccdad6f43e0020bb4454
SHA1056232b9314ce61bcdc53f9d5fe394208bc5f50e
SHA256207b9b67f3420b5ef6b654fabc0eb983a2dbd6e515b561b1c95bbeeeb31687db
SHA512d369e21dd2442c8887e6f9104860940243bb0d064f075d4843741df7acafdb21c28d6e0836910cd1634344a2f771a9893c1da0fbf18988bb89f903a9773febce
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_BBCE07F0D1D3591F7AACC4D200BCC3F0Filesize
402B
MD560cdee1ba8a60eb7bc4e806077142cb7
SHA15d8e0986bc447b220229bc66cddda9411f8dbae7
SHA2566f5cfea13413659aee4fddc0af5bd80b206606bc03c337e356ea46192c238ed3
SHA512b427ec5e4918a2a752d9d2de17b7f9f1df3a6885654da43152546ca2c26524d023e493ab84792c1d9dcecaaf8a5ac9d4c91c918f14c66bbba05761f601a01c3d
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\7FDZQXUC\favicon[1].icoFilesize
5KB
MD5f3418a443e7d841097c714d69ec4bcb8
SHA149263695f6b0cdd72f45cf1b775e660fdc36c606
SHA2566da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770
SHA51282d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.logFilesize
512KB
MD58623cae2e1301b57a35e400f9ec216bd
SHA14a2cb2edebd03306feb2fa69a8d111792e93a6c4
SHA2569d937bcf324357e95566485c21b263c44ecbbdf2e9f696ce8ae4efba045e8176
SHA51295744f447c950e967dc42e64bbdb648751d3bd4b62686227270adda4efa60eadeda0f1f589661e50ce05be40605ed49c6ed9e39a6797b67c072baa3f714ba2e1
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.logFilesize
512KB
MD58623cae2e1301b57a35e400f9ec216bd
SHA14a2cb2edebd03306feb2fa69a8d111792e93a6c4
SHA2569d937bcf324357e95566485c21b263c44ecbbdf2e9f696ce8ae4efba045e8176
SHA51295744f447c950e967dc42e64bbdb648751d3bd4b62686227270adda4efa60eadeda0f1f589661e50ce05be40605ed49c6ed9e39a6797b67c072baa3f714ba2e1
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.logFilesize
512KB
MD5520d198d625f6094fc3ac0836f72f9c8
SHA1ae68df9730b72402b6d5aa69775e1f3795e3e108
SHA2569df6b82ac9a96fbbd802da6dbcf71c4fede82d133eaba304ee361ffb9913f234
SHA51235eca215c2e3da6f8a18a0cd04d67f8c09bc7a42115a18deda385d22624468420cdb6072b7b4596f54148e4517e17e4d9c5683ba16df9251f8ad6876f8c48ca7
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\edb.chkFilesize
8KB
MD56d572901cc95bcc78947fda1d684c154
SHA1e5680111922d73328f078f5dda2ff782e618f396
SHA256219a2defedd7d7861fe8389343be9c16ba50c1a97cc08e8ed49b63da2570787e
SHA512f1af193fcc074a1839501dc696dfb423d1db2088528817190bca09f4b1d170eefdedaee1fc99612d6062f707164ef7b88ec4ab564b7f6cf4fcbc9ce0d280a6c9
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.edbFilesize
2.0MB
MD5800aaeef70a0025688348521d8a9b585
SHA1c2b38e4f82be1c00632e1ccb95cbb313a48d689b
SHA256747b5c477f627570dc64dd6abc637c7ae85ad0f2372ef4baeb74a9c48e276a51
SHA512a1355249038c4b4f63bb7919d7be89afeb956ec3e2bc9cafd63f8ad37cfd1c66069b1b564e0380bbe097c85c563ab414293226c8adfd42c27065c05295e9ad6a
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.edbFilesize
2.0MB
MD59d187ebe1ebb3e559e0bd0d23314a403
SHA1e82878c83b2e691ee9a498a7f50dcb9f67ea8f63
SHA256b7521a8d39e2ee4635f098838a62abcf9d546acd861fb848caf0c76b79518f61
SHA512c86cb65532f60266ec63d0e9d1a819126acee413ab1feb79377dc1d3444ca706dedc3a83984cec19349014c4c5390f32177d685731707ca9e222e0e71efa6924
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.edbFilesize
2.0MB
MD5c4d1bb320b7bc125db2a09d503f2644b
SHA18f93ba1377552d3d74f603aa4a8029d5453be2fb
SHA256f1944d4f1a85fcb948ef2d96e80da27f882a6dd7e9439ecc8a62e0b938094694
SHA51240396a3400ef56cb559742d963444fd7cf5ecb98e48b468c944ba33cbf7aa276dbafb1e386c2b16f1704691005d1e835e5a7257f27c911c80f56377ad3ea4d30
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.jfmFilesize
16KB
MD5e54e6539da9232dadc906d65b98f8cf5
SHA1eef1557aed08f3d8618344d483215e0fe156d985
SHA256487591870fdfa686a12b862e07feca3a98b20e47b1f8ec1a540bc353406771a3
SHA5128a7e0c119706b01eb9352a0d2eb8fc167494ec5f8b7432a19b5580379f5dfc3b5f021b6a37cdbbfece043c52a9d3bea2b074898c19a1e27f6328a84a6fd8da01
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.jfmFilesize
16KB
MD561eba71654282bbfa6d04d73e7d89129
SHA1765645c8aff6482d59a41ab3cb532d1a6d99b08a
SHA256b2b290ab9c275e216b3a7714017af6e212ea9627a5659e8b4f032dedac8c2b67
SHA512a90b5baf686240d49d8a8f53fcab28d456fe763fca1f5495abeed65000bae8bdc383772628f98ac2f13d98719d032fb0d9da4377e0992a7cac34c2af0862c315
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.jfmFilesize
16KB
MD5c76e0d6f3ea5624b8e635d6287e32387
SHA11fae81286b10c9858620270a5b1cd5242223e6d3
SHA256c00b7e3da3a960c9efafe633b11a0de1d0d01bdb3fb79bb4a53a3645619938e0
SHA512af9f47ae28e96c44c3110256d1a3774ec0176c30178f573412309cad117e55f1341a7d20f978bb58543918f22e8a399ade338350894e757e663323a4a059711b
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\ImageStore\byxmkpb\imagestore.datFilesize
12KB
MD57c5f3c6846a89b95c338cab2a095edff
SHA18e30de361a3329ee2a3226f50ecd6285dee90a9c
SHA256c1f15cda69bc68e13068435e21101c4d6d5407f070cdfad42cba97dda0166065
SHA51260cfcefde91511c9cbfc3c6046248a98031cb583a8d68051d053cb1e3c45ab4139827e901ce7552658a5a31fbb2a02a9d00d6c8d8aaa29fd238bb651e7d0d604
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\ImageStore\byxmkpb\imagestore.datFilesize
6KB
MD562de745277e0242fdd1a0c8036bd6796
SHA1e1b4268a542eccc87b0e464d42545906fa431810
SHA256cae004ce72f73a230fc1cb3a3ae27795fd7012ca6af0978cb8f0c45752b4c1cb
SHA512decb852d5f8e5cc77902b0a26e4a3c62547413945d0ee3a1f5d3f5bf5ae18609ecb31ee8230d6bf177b37f23a5db4d41c53ee91fff4d135fb438070beb71fd81
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\RecoveryStore.{0A878B85-CF90-4830-9798-FFD3B4F3B487}.datFilesize
4KB
MD5306ee22d47380fac0b2d9639d2f8043b
SHA1a8790e017e3a95fcb686ed24805acb6b8d0a0fdd
SHA2563048b219c2edbef358c7635d25a9c6ea5f9c2d038e9fa8251e656757482d9d73
SHA51259a88a4acabfc5cf21c0f2f8551ea5ece668c78209a1cfe051791e4b7882fe724038f14ac0242d252fd9cc9704ac3d18456ca483ee66762bbbf6583242ff4364
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\RecoveryStore.{2F5C5D94-4000-41D4-AF51-E39DCB7A1F5A}.datFilesize
4KB
MD5de9616316b162fdd074fac33582b3a87
SHA18fefc0006da276bc00689d13b751829161d0dd5e
SHA2565ed96f36d109713090f9ad978470f73ac032ac0e552fcfb958b7b49262488e6e
SHA5126b4b5e81518ee6e7e68fbe7b04f0093957d54610b200a5cce6b0aa7fbd0194e41422acd755b2d24a1a06680bd08899b3556f0ab3aa4172d3a42f4b26d00be775
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\RecoveryStore.{ACE8DA39-899E-4987-8547-DA172A8F17D3}.datFilesize
5KB
MD5fda9fb182326f558ff52944013aeef11
SHA1576323ad896eb7767e00ee5b38c67cbf7bafac69
SHA256009e1a4fdc4bbf920b173f8f3812146fcf189347f393b593a9178c5440645dfb
SHA512ddbb4be34d0e2081045912d3034b4826bc26a9a3e445d3d1bec948081249c03c5ad6c8ae920ec95ecbb051d5cb1bce5efa644dba72ead33503f4e41ef6b2a807
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{4FF8F2A8-2B82-4A59-AB82-9FD9FB9132C0}.datFilesize
42KB
MD50b458cbe8027c5973533ffdc49736ce3
SHA17e19810fdd99004dacb8a3922c9a20735ed7a804
SHA256b8aac0be54976ff72d9488ce366a2e6fc6e385382cfa9e471cdf6549f672742e
SHA512be569e307be29e3324b9b07958cc9eba4a82ea1fa470e8f112f04331b7e95395558f0876cfd6aa774b1492e3f94c3e1233031d84858c13f50e34a01ee44f9c82
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{56164D9F-51FF-4259-9E21-DDCC614F89F5}.datFilesize
43KB
MD54152fdc3c80e9c38edd3680bb664b6cd
SHA1545692d957004940727786ce6de3a0714b90dcb1
SHA256a80384d9fd327e5c123362f497082c00dab72554957539bdb72a56360435a0c5
SHA5122de6a780fab61274d2c3ee8fb654b340ada4354ae9031a5f1f00b5b9edd2a76dd64a470dc03d3238665e7144b885b7365ced49639d845f56a70facbfa6a4debe
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{AEABC016-69B0-4F62-B101-CF01311425F3}.datFilesize
15KB
MD5d1a89aecee0a54e38d8cce4d5fe08c74
SHA138b5ca5593bbaac6595bfc8a2038b1dacb10a464
SHA2563e882b5cfd20a581d976b2ed394308cbd821b7aa5f0ea846f22eaabf8dcfd3a3
SHA5126be42efa7bf3c23188496217f2005a412e84bd8919d043dfe1e03ba22f04400d8f80e0549fb824844dff57e0a63149c83236c03d2cad7caa387a3d89946c9733
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{F0F442B2-EFA9-4140-ABF2-959480E14062}.datFilesize
5KB
MD5746de78684d0cd6185eae5fdf3778fb5
SHA12ec3f8176034cb7eef14c3c074052d28eb62585e
SHA2564d15fb059fe0a94cde3ee2be0e8e153e047e7fae8064591f5beb6ee03ff736af
SHA512f729791e4081602dcdef3e5c539eb979851ea03ae253dcde5bf8444ee2a49e7baa0167ec85e4fac6af7516dbd496dc3f4896b54ce7f2b868117fd1131612943f
-
C:\note.txtFilesize
218B
MD5afa6955439b8d516721231029fb9ca1b
SHA1087a043cc123c0c0df2ffadcf8e71e3ac86bbae9
SHA2568e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270
SHA5125da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf
-
memory/2676-65-0x000001823A890000-0x000001823A892000-memory.dmpFilesize
8KB
-
memory/2676-57-0x000001823A7F0000-0x000001823A7F2000-memory.dmpFilesize
8KB
-
memory/2676-59-0x000001823A830000-0x000001823A832000-memory.dmpFilesize
8KB
-
memory/2676-61-0x000001823A850000-0x000001823A852000-memory.dmpFilesize
8KB
-
memory/2676-67-0x000001823A8B0000-0x000001823A8B2000-memory.dmpFilesize
8KB
-
memory/2676-63-0x000001823A870000-0x000001823A872000-memory.dmpFilesize
8KB
-
memory/4472-18-0x0000019BB8600000-0x0000019BB8610000-memory.dmpFilesize
64KB
-
memory/4472-37-0x0000019BB8250000-0x0000019BB8252000-memory.dmpFilesize
8KB
-
memory/4472-522-0x0000019BB8280000-0x0000019BB8281000-memory.dmpFilesize
4KB
-
memory/4472-70-0x0000019BBDF10000-0x0000019BBDF11000-memory.dmpFilesize
4KB
-
memory/4472-519-0x0000019BB82E0000-0x0000019BB82E2000-memory.dmpFilesize
8KB
-
memory/4472-69-0x0000019BBDF00000-0x0000019BBDF01000-memory.dmpFilesize
4KB
-
memory/4472-2-0x0000019BB7F00000-0x0000019BB7F10000-memory.dmpFilesize
64KB
-
memory/4472-526-0x0000019BB8240000-0x0000019BB8241000-memory.dmpFilesize
4KB
-
memory/4716-151-0x000001D878BC0000-0x000001D878BE0000-memory.dmpFilesize
128KB
-
memory/4820-304-0x0000023083D00000-0x0000023083D02000-memory.dmpFilesize
8KB
-
memory/4820-288-0x0000023083980000-0x0000023083982000-memory.dmpFilesize
8KB
-
memory/4820-292-0x0000023083B70000-0x0000023083B72000-memory.dmpFilesize
8KB
-
memory/4820-300-0x0000023083CF0000-0x0000023083CF2000-memory.dmpFilesize
8KB
-
memory/4820-311-0x0000023083D40000-0x0000023083D42000-memory.dmpFilesize
8KB
-
memory/4820-220-0x00000238FECD0000-0x00000238FECF0000-memory.dmpFilesize
128KB
-
memory/4820-214-0x00000230EC600000-0x00000230EC700000-memory.dmpFilesize
1024KB