Analysis
-
max time kernel
103s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2024 19:40
Behavioral task
behavioral1
Sample
0.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0.zip
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
0.exe
Resource
win7-20231129-en
General
-
Target
0.zip
-
Size
32KB
-
MD5
010cfb902cae00576e39556914eb7af5
-
SHA1
86bb5ed57999602fc4540ace6086a891c996e3f3
-
SHA256
c79ac8a613c7a25793b2a0167d48a6a5e8e7c811ccdaf01d0a47efc7dff99dbd
-
SHA512
5c848b7e537208aafa0b52f94c7f6a0348f8d4dcdf46b1bfbbf05d6813e47fcceea1dd1c8a9368f9476aae28d571dd97cfa1770e4a76947d430f94b597d2a9d1
-
SSDEEP
768:1WNTeakdIbb8karXzilV7uUdzM1VyY8dLDFa1X87MEH2fZz:1WxeanbmXeF3doVypdL5amYEHw
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\Desktop\0.exe family_gh0strat C:\553100.dll family_gh0strat \??\c:\windows\filename.jpg family_gh0strat C:\Windows\FileName.jpg family_gh0strat -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
msedge.exemsedge.exemsedge.exepid process 4980 msedge.exe 4980 msedge.exe 2924 msedge.exe 2924 msedge.exe 2904 msedge.exe 2904 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 2924 msedge.exe 2924 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
msedge.exepid process 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2924 wrote to memory of 4004 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4004 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4708 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4980 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4980 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4048 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4048 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4048 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4048 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4048 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4048 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4048 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4048 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4048 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4048 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4048 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4048 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4048 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4048 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4048 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4048 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4048 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4048 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4048 2924 msedge.exe msedge.exe PID 2924 wrote to memory of 4048 2924 msedge.exe msedge.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\0.zip1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://appdata/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffdcd9546f8,0x7ffdcd954708,0x7ffdcd9547182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,12765179002083332021,7978885197056739900,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,12765179002083332021,7978885197056739900,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,12765179002083332021,7978885197056739900,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,12765179002083332021,7978885197056739900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,12765179002083332021,7978885197056739900,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdcd9546f8,0x7ffdcd954708,0x7ffdcd9547182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,6475932515626230638,5151875094135034980,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,6475932515626230638,5151875094135034980,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6475932515626230638,5151875094135034980,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6475932515626230638,5151875094135034980,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,6475932515626230638,5151875094135034980,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2128,6475932515626230638,5151875094135034980,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5012 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6475932515626230638,5151875094135034980,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2888 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6475932515626230638,5151875094135034980,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4484 /prefetch:12⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\0.zip"1⤵
-
C:\Users\Admin\Desktop\0.exe"C:\Users\Admin\Desktop\0.exe"1⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\553100.dllFilesize
64KB
MD545dc749351fd65d71da89ca2ed2766cb
SHA1e080faf81157b7f867cb56938c5e579c206af9b9
SHA256391109432ba2df9f3ebc74e0144f42a490405f7c8ecb51da01b4ce793be72f25
SHA5127e63d8778a4656a19397849a6edb483993f1183257fb8c0793ad4b5c625ed69d1b9472969bac6dfc98938e19baed7e3e61ab80085a1a6edd8a50ca660ce3bf74
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\7bd9a1f4-65dd-4620-869c-97cc61473b52.tmpFilesize
10KB
MD5dc1e044953715f1217b63f5d366fba23
SHA13cab29e1e73f7c522e627727306f7c99b8a74acc
SHA25670329e6ab79b6b41c2c5319e16f3c75d0ec7b9e5d6a86a939fb9db7edeaeddc9
SHA512be410486d1b59922974a4c064c44adfb3996cad0a54ae8cc9ae9e628bcceb551cf91f74998abb22afaa367232621f33ab8142b7aebe8e50b4b6d724ef3f3fcdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5f2e3885a1beea7c60ab54f8741501127
SHA100425ac15f68498461716b3ffb46782c30dacaac
SHA2568379ce8898da3f421476c92ea32d5eaeb6905b56200305cfe030cbe991e40771
SHA5125cf56d9b28b01cc93992b5613aaf8932743c5cf7101f6a326e48fb6f4cd8b07213e477f0f44ac9e775543c43a5f3d73e17c8763a1ccac276c8b0785e8a7f908c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD53e71d66ce903fcba6050e4b99b624fa7
SHA1139d274762405b422eab698da8cc85f405922de5
SHA25653b34e24e3fbb6a7f473192fc4dec2ae668974494f5636f0359b6ca27d7c65e3
SHA51217e2f1400000dd6c54c8dc067b31bcb0a3111e44a9d2c5c779f484a51ada92d88f5b6e6847270faae8ff881117b7ceaaf8dfe9df427cbb8d9449ceacd0480388
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\4ff53311-b39c-4060-afa2-3787ce1ebb8e.tmpFilesize
24KB
MD5d52dc2ca09d662937e3e669200ec0cb9
SHA1d61e36c11bd13511e35c2221ce2d82f509d38e91
SHA256288af9448609160db5ae774bb18de8d77e367e51f21919a22f85fc1954140fed
SHA512dc294f662521adec1ae09bf0e53de9de7ea1f17f8cfa5ed42b1310d0127709e2755d586e6329fcbdd65a10654d5157f895809fdd95bfdaf2c72b704d70843eb1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\data_0Filesize
44KB
MD5fa9c7e940d15216cfc00f85f9d5e19a0
SHA1ec1eb94451176853c6c7ea929965d7f47f2e3bf5
SHA256a9a31a277fc25ca916c974a006c7b8c90fa1d8051a3c713c5629aebbab21f0da
SHA5127b1ee0905c36a11e2cdd341d71489287a59ec103bcce1df340cf4a93f979faae559c7d2b894933624f11d703a50aa30380bb33df79ff105378423ba33536cc29
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\data_1Filesize
264KB
MD53e582dce8090b452eb7ceb929ab2070b
SHA1a37f273f905486affed066b5fbb3714ec08cb71d
SHA256acf9b29eef746425a519a1273700ece2356f80ae207a79892a5e6cde13f66b47
SHA512019f57e4328421ddcef0fe3fd7ce290bc202dad318c8cb824f548ff3d6a309c6cadddcf237b63cf4d7dfbd8360147f7352e82b91b9a701072dea872d407d1a8a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\LOGFilesize
322B
MD5007ea23f75d558dac6204f884ea7b030
SHA151dbd4db2d82c554ac81876f46155b2258f2cb1d
SHA256cab8d51465c128c877fa811e61f3fe2b5c8b37545c35f30b744241b829d6b119
SHA512fd4f2ea5d1db8c27c76124d08cb3eb02d6a3fd13022881f8b9205701969149892096d4cbb30ebfd0e243341c9c5b677bec7e7081fb67f707d5ebf1b2a341c174
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_1Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_1Filesize
83KB
MD5e28ff58528a06c949ddaa8b55b0ab0f6
SHA1bd1dd2cd8e5a66e0399c113d021d774f5751b60a
SHA256da0dc68464f88af2eddec3ea66ff26bf6d6ef0742501794339275f118f8c373f
SHA5121776d722621e6250b9cd9a43033b0aec9394f8cce9d6e3a4b5aeee8183654e3f1633305389874404f07336c61dcceb6d538dab8387707b44ccb42b9269af8ac6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History Provider CacheFilesize
6B
MD5a9851aa4c3c8af2d1bd8834201b2ba51
SHA1fa95986f7ebfac4aab3b261d3ed0a21b142e91fc
SHA256e708be5e34097c8b4b6ecb50ead7705843d0dc4b0779b95ef57073d80f36c191
SHA51241a1b4d650ff55b164f3db02c8440f044c4ec31d8ddbbbf56195d4e27473c6b1379dfad3581e16429650e2364791f5c19aae723efc11986bb986ef262538b818
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOGFilesize
334B
MD571f6950dd9d2879d49de714548427fe3
SHA16bc02c6703088a6f1d9d241c4d2d06a992d0c961
SHA256763b271e44bde276b1f6ac6301bca297554d0e1d70491691eb549203c171b22c
SHA512c44e1b822d4f947be30aef7e91009576113850ccdffd266faddc6ccc5fe498c76f5c51c34a687bdb05459f0cb7550556408d22a244cd75db6c5fac40f01dbd6c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5b4c5f84f3419a77a8f4dc16ac524432c
SHA1e7c20764690d7a4fa7ab2deaa10ea5b91d5b28f1
SHA2565f1c4154811b1bc4ed59a02a2aec0ea0c8179782729ea52cca5e19051d3e5acf
SHA512c28876413d6253436f04ee8e60054ab4dcfbc4bbf1bb954fff807c66943b4d3c6ed8c816b9e14992b423d9f7bf6283aa4ba47e70ba894b5a1f3c7c08b3981177
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD50ccfdb8246a9bc335a8cf39c0313b198
SHA11b1d14549177435e163ebba71b8b41a1b0478f1c
SHA2569408f8f0cbba39a2e1ee3457cac510e285c1d1892a18992de5c2bff5b4189568
SHA512b4d259ee7082b40946f0087f2d912d860626ff3fb7215bd7b8ecbe075dda54633c9a5408d08fd736bec0a15f1971bbc749ec69c4c9c112af7338bf722b38c6e7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD554f37bbe18275f7f6f384e0e8c6e84d5
SHA1e92a4abfa6ab46e892ffe484308dd2dd5c4fe741
SHA2564332dde48351d489a88f7fb276c4a9375e7f18677b8950b8a508be0ba512cdb6
SHA5128f298ce0ce60778ddad2194e84c546271865c1f778068e0706915b08d6a488dcc32afbadabb6fedb0dd89cdfb22a080962d1f77a65d525cb56d26d91f7ca6fd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5b57a9b898079269dfa5ffa1856d0b8d0
SHA1e6efb3cccde6b9576e906bd09c5745f2f595db5d
SHA256a3040253a285fd5039deefbb77911d640dbbf4327a5baaf268415ac84827b8a3
SHA5126cf8642640e9d4ec633c9f74cebc7fa0e60096de8e4956f6581033b43a671430f929759f651eb933c17dfb01fc1c362639d87387422c6d8197d4f45be1914b43
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.logFilesize
99B
MD5ba92e5bbca79ea378c3376187ae43eae
SHA1f0947098577f6d0fe07422acbe3d71510289e2fc
SHA256ccf4c13cd2433fe8a7add616c7d8e6b384cf441e4d948de5c6fc73e9315c619f
SHA512aa1d8b7eb9add6c5ed5635295f501f950914affc3fa9aa1ee58167ed110f99a1760b05e4efb779df8e432eab1b2a0fc9cf9d67a05b2d5432ff8f82c620a38a62
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOGFilesize
322B
MD5a7d28bf8bce8253721165f185f5eaeba
SHA118437641d05c472b787cd9310cd38cf622e06afc
SHA256bb1428d719860074bce9ba57fbd33a025f3f40b1d715af3c2894c61359415b71
SHA5126955777b5cc4cfd78f406f455e2b3a65027b520ac2445ec180bc964ec51801c3b5b1b314f01d0c04c035301f1d62abed25a6c38381d15d57e85dff2c578d529f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13349907860048664Filesize
454B
MD54aefc59a4061d3d18cb17d5b791444be
SHA11ace1e6eba50c0c42c86245487f72ba3571638ad
SHA2569ccc85e3bd18599b6c90822c6f47922adb666b621761b8877fada0932a783ef7
SHA51200e0d6c1c5a4273de16b743d25c9f2751d510b27a2da7d297c1a8b4b1c9a1ef678cbea8f64a63b0224507f01129e95597f97080c407b26c665cfe3b69f0397cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Tabs_13349907860050664Filesize
1024B
MD5576e23e68c16e414b0cbf0ebee534573
SHA18a0a6edf6d80d79365ffa62739d18f1bf892c925
SHA2566a76d4932f20eeb7fffb63c3fe8946034c67984bc888a5e23e2f72cbee4a814b
SHA512588ee23ab0587f0466a3cdb5b484c302e49c77605b034b4abe86c969da5fe4784287bff3a491dcece673725727ecf763ff1fb66215d62b76e610e13108f5e601
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOGFilesize
347B
MD57b296b7bccfa1d82a0660a5667eeef79
SHA1482ed56f5c4e5a46e7e68d86dbdc9b4e974a25b4
SHA256a0617e9da12b322e7190e1a2389c4265bc01cf9911d4f523da4ffd3a508c1f36
SHA512f970b8d4c15f08c98d8c8cd2e082bec3acaf0016011dbefa847d47d6ee6925dada578fdac6ab002c26bd63309830a95df1bd6d4cb707396fe273d902aa3c6b4f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOGFilesize
323B
MD5e6165a0c35e635b78696ca0bc9108ed5
SHA1660f1ff5d2e3c4790303080cfe85132ff04e81e1
SHA2561ba6a32d2d9944fabaa1ad0a5a6fd3602cdf36e1b20fc3b9f4b90b33b2effd64
SHA512194769d37b0ab85a29ea4ab0524c09d76903847c4a8bce2f2690723b2b34dd219b0f6b549628bee23b1c0e51934a55bba5125461416fcbdd805f715c63a5ef63
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.dbFilesize
44KB
MD5f814c3763510e472f3908e5c371b223c
SHA1bfa7854fb52560485468b806b7afed596bb96d02
SHA256cc03e3d2ba6b070d6857a0d8ec7ef2540f3216222f01d2dfd8975e229fb0e8bd
SHA5128de966fb078df5c7126770d180daa4d56ecbfefc8d95a29c3ae21cc9eaa9cfdf9aaef978c9f9bb11c59f3d4bde1fe1b818a0f0a9a7c8f9087e283e8af903e953
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOGFilesize
319B
MD5710f8a14bb178a5d57140a341b61f249
SHA103bdf969b3b7449b6a586a012e2c4b987fd199b9
SHA256112fbfff1211e8f57f10ff053dcf18616380f84047d0e4ac21d201477d6f398c
SHA512f01ba15ffece9654656149c3c0747cb4ca02ed304737ce3fe3b390a0fb50324a325520b47dab0d7a8a60d9a3784c5ea4278b670f15f82bdc272a7fdc60b89842
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\000003.logFilesize
565B
MD5dbb805a0ebd21bca3d0aa93ccd995326
SHA1d839471308547b9fba1fdb2d4d9a120df099367b
SHA256218e73d1cc5296bbf8382d9951d4ce0740edb39dee874b2b93e1e3c34115440d
SHA512878fffc094ed461d24088ec641c317044cbd25deb24dc19d2c24d5d90104819c1c45e9d65aee4a188969ecd4ff98a20b93db13e877e024079cc5e8016a4ba879
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOGFilesize
337B
MD512ed6b99e1a836973a2ae90ce45016e7
SHA17727e5551df11d1e6b6eee3c1b8a8dfaecd2ba06
SHA25645ad6fec3140fa9d30fc63cbcbcd12f09cda1dcc880dcaa12b245229b313aa2c
SHA512e60602e5adaf6247303e6eb85f192273752cf34c63c7bc9a89a85e7f70a21249ae8c22a2a9463918432dc65c1c88b49a46a9c6f9e52281c21249eda05a2d962e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_0Filesize
44KB
MD52f65768bb8a7d6eb7feed4814bcc28c1
SHA196914c1ff2624361e58a8d594d1e0671f1c72455
SHA2560d99de3bb6eb0148c9714aa1b969c50556c4d610852325ba66344b0c68a8a1fa
SHA512979e4642266013d45a94d3b439a4c4a06db31eea89dcc1cce2a17df76d6b8d2dce16ff17ef93089ad9ce6da61289a2273d6d199305946fcb9150e4e88e651ff5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_1Filesize
264KB
MD5749a99211a1f3b509a83cbae38fc3cc5
SHA11fe6a80257be5900d3dee44273c93c4ada869026
SHA256c5137151816cdafe508e0ed513047febcd246976596c7f245dbe739dfadcb9f3
SHA512134ce50522e069bdb53e72df29339d59d3de77bdc0e10fe0a9e023f4bddb5dac97f7898d9c9660077814a3b4e35c0af94a517de789dee6fbf27d63a5bf95fa2b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_3Filesize
2.3MB
MD5f715f1b33457fdd50203ec187747c3db
SHA1be4479de8adb06e67b2918fd3bbf8fce72244558
SHA25618c98d2e7e02d16e81f5ae1d8a6bae3bed61ca302d57c7d982a06eae8bdaebc4
SHA512a30a26c584e93dcb59179fc1ac9e2c802957d0428932b121214628ac52236159c8ba673ae31bfa92f76bac786a8b3d35133ceb989c43bbf1ac3cf57a84adf92e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Last VersionFilesize
11B
MD5838a7b32aefb618130392bc7d006aa2e
SHA15159e0f18c9e68f0e75e2239875aa994847b8290
SHA256ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa
SHA5129e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5c162147d6f240ffade4ac8c1af7616a0
SHA1b25f3af87fa33bfce37255d89f3661698af1efbc
SHA25607fcc3ec974d4c88a875c1c7eb66c3a2733e71f9e48aa96ed847cc2bb11fe125
SHA512bc8665349d35436945b397086fee23768508a9ae6829faa6ae7367d4b01771a4ef198ab4ca1e3e867f9d9a2c1174ea4e6b4a9f7995e8a71741e46517f20757c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\edge_shutdown_ms.txtFilesize
3B
MD51b0cb513f2ac66101ba793bf6072d1cf
SHA1c54e9c30011b3201d38fb98c3fd76fa8efb065ff
SHA256ee0821d1b8433ed22d0d739b16c0fc1759f0afcb8597f353e4d9a0268dd47e3f
SHA512f498f1c3daba7f6c6103c35dda01fc777a894b650adbabfba1bfc19ce7731dd6eec79af9b0fef626cd1dc1182001cbbcda9156db778935c11fcc19f35bdf553b
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\9cd93bc6dcf544bae69531052e64647ec02f2bb4.tbresFilesize
4KB
MD5eea8836a44ad94cfb4858964877f92e2
SHA1b4c7e116ac727dc7a009332303e584c861f9546f
SHA256c51bd729df4193a631f4ef17df5efeb671ec07524533a798c5c969767a0ce187
SHA512c93f320d8440cc5f33f96370a139cfe519bf2ec75a4c2fd4892d7304fad89f6907fed32daab2e67af0e3dbf2d0abb6f67bd70cc78edf3b3ab709039a99ff9345
-
C:\Users\Admin\Desktop\0.exeFilesize
71KB
MD52a9d0d06d292a4cbbe4a95da4650ed54
SHA144c32dfae9ac971c3651adbd82c821971a5400dc
SHA25609a1c17ac55cde962b4f3bcd61140d752d86362296ee74736000a6a647c73d8c
SHA512ed15670a18bffa1c5c1d79f1a5a653d6b2bde649164c955473580321f4ab3d048124c26e1a92e9d8ba0edaf754617d2d2c13d8db92323e09957b6de225b5314d
-
C:\Windows\FileName.jpgFilesize
786KB
MD582364522d9ca66d17cc9f2581536f141
SHA1b6527940be61493bde1895189f2c76faa37b2622
SHA256fe56f5b5a229f399f7d3b91d53420623dc8f0cfbcec5ec330ebac63ec57cd549
SHA5122c368bb98945d4387de12f202aa36cfc997f1630f12eecceb1d1636caf384a704941c08fb627cc0b35a8cc5663ba3ee542f49aba76f0b341f2578473a78f7e79
-
\??\c:\NT_Path.jpgFilesize
42B
MD500321f6b3af8934def466aa5fe918368
SHA1b6eb6bb7b1bb0e05b710bfb8793aaf790ac8d61d
SHA2562fc5c1ded0c6655e04139d1758fc123d89499887991a7ae7c3e3c8c7d33974bb
SHA5129b707350cc7b4348c202ed75d4c8b7e799f64b9dba2069c9fd7e6f8b979742c587e8e6c6ce82f2a62e182d4d195c84a605502cb0813506bb3fc8381a7bbf979d
-
\??\c:\windows\filename.jpgFilesize
1.0MB
MD53d73d127bd0c081867ecf05f93751586
SHA140f954402bee83df3eeb155049daf069ed373618
SHA25609992cf65f63cf6bb2bf057e982bc5be676e89b28b41ec5da1bb58d59a685967
SHA512a0fe31dd27be8114487356de1088b2f6cfe49690251da23f5ece30cab474e576a602a5b26a4f544b5bf2963d5b7f0ef86e432663781c5bb1e28b7d9e74dfbc54
-
\??\pipe\LOCAL\crashpad_2924_SKTXTPDVOLAIXKXLMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/5924-251-0x00000207D4DE0000-0x00000207D4DE1000-memory.dmpFilesize
4KB
-
memory/5924-250-0x00000207D4DE0000-0x00000207D4DE1000-memory.dmpFilesize
4KB
-
memory/5924-261-0x00000207D4DE0000-0x00000207D4DE1000-memory.dmpFilesize
4KB
-
memory/5924-260-0x00000207D4DE0000-0x00000207D4DE1000-memory.dmpFilesize
4KB
-
memory/5924-259-0x00000207D4DE0000-0x00000207D4DE1000-memory.dmpFilesize
4KB
-
memory/5924-258-0x00000207D4DE0000-0x00000207D4DE1000-memory.dmpFilesize
4KB
-
memory/5924-257-0x00000207D4DE0000-0x00000207D4DE1000-memory.dmpFilesize
4KB
-
memory/5924-255-0x00000207D4DE0000-0x00000207D4DE1000-memory.dmpFilesize
4KB
-
memory/5924-256-0x00000207D4DE0000-0x00000207D4DE1000-memory.dmpFilesize
4KB
-
memory/5924-249-0x00000207D4DE0000-0x00000207D4DE1000-memory.dmpFilesize
4KB