Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
02-03-2024 19:34
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://steamcommujity.com/104923960430529#
Resource
win10v2004-20240226-en
General
-
Target
https://steamcommujity.com/104923960430529#
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 8 msedge.exe 8 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 3032 identity_helper.exe 3032 identity_helper.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe 3304 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2688 wrote to memory of 212 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 212 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 3988 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 8 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 8 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 5052 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 5052 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 5052 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 5052 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 5052 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 5052 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 5052 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 5052 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 5052 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 5052 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 5052 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 5052 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 5052 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 5052 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 5052 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 5052 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 5052 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 5052 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 5052 2688 msedge.exe msedge.exe PID 2688 wrote to memory of 5052 2688 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://steamcommujity.com/104923960430529#1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f44846f8,0x7ff8f4484708,0x7ff8f44847182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,9424305339525449202,8406549246434546025,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2540 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,9424305339525449202,8406549246434546025,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2592 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,9424305339525449202,8406549246434546025,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2604 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,9424305339525449202,8406549246434546025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,9424305339525449202,8406549246434546025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,9424305339525449202,8406549246434546025,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,9424305339525449202,8406549246434546025,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,9424305339525449202,8406549246434546025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,9424305339525449202,8406549246434546025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,9424305339525449202,8406549246434546025,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,9424305339525449202,8406549246434546025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,9424305339525449202,8406549246434546025,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2772 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,9424305339525449202,8406549246434546025,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,9424305339525449202,8406549246434546025,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD59ffb5f81e8eccd0963c46cbfea1abc20
SHA1a02a610afd3543de215565bc488a4343bb5c1a59
SHA2563a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc
SHA5122d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5e1b45169ebca0dceadb0f45697799d62
SHA1803604277318898e6f5c6fb92270ca83b5609cd5
SHA2564c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60
SHA512357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000027Filesize
115KB
MD5ce6bda6643b662a41b9fb570bdf72f83
SHA187bcf1d2820b476aaeaea91dc7f6dbedd73c1cb8
SHA2560adf4d5edbc82d28879fdfaaf7274ba05162ff8cbbda816d69ed52f1dae547f6
SHA5128023da9f9619d34d4e5f7c819a96356485f73fddcb8adb452f3ceefa8c969c16ca78a8c8d02d8e7a213eb9c5bbe5c50745ba7602e0ee2fe36d2742fb3e979c86
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000028Filesize
119KB
MD557613e143ff3dae10f282e84a066de28
SHA188756cc8c6db645b5f20aa17b14feefb4411c25f
SHA25619b8db163bcc51732457efa40911b4a422f297ff3cd566467d87eab93cef0c14
SHA51294f045e71b9276944609ca69fc4b8704e4447f9b0fc2b80789cc012235895c50ef9ecb781a3ed901a0c989bed26caa37d4d4a9baffcce2cb19606dbb16a17176
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000029Filesize
121KB
MD52d64caa5ecbf5e42cbb766ca4d85e90e
SHA1147420abceb4a7fd7e486dddcfe68cda7ebb3a18
SHA256045b433f94502cfa873a39e72d616c73ec1b4c567b7ee0f847f442651683791f
SHA512c96556ec57dac504919e806c7df536c4f86892b8525739289b2f2dbbf475de883a4824069dbdd4bb1770dd484f321563a00892e6c79d48818a4b95406bf1af96
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00002aFilesize
37KB
MD5231913fdebabcbe65f4b0052372bde56
SHA1553909d080e4f210b64dc73292f3a111d5a0781f
SHA2569f890a9debcdfccc339149a7943be9aff9e4c9203c2fa37d5671a5b2c88503ad
SHA5127b11b709968c5a52b9b60189fb534f5df56912417243820e9d1c00c97f4bd6d0835f2cdf574d0c36ecb32dbbf5fc397324df54f7fdf9e1b062b5dbda2c02e919
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00002cFilesize
195KB
MD589d79dbf26a3c2e22ddd95766fe3173d
SHA1f38fd066eef4cf4e72a934548eafb5f6abb00b53
SHA256367ef9ec8dc07f84fed51cac5c75dc1ac87688bbf8f5da8e17655e7917bd7b69
SHA512ab7ce168e6f59e2250b82ec62857c2f2b08e5a548de85ac82177ac550729287ead40382a7c8a92fbce7f53b106d199b1c8adbb770e47287fc70ea0ea858faba6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
456B
MD569823dff621a7a2e9fce22e84264e64c
SHA15ac1a4a47dd0182f119cb661617ea034e4cda09c
SHA256c13e68e657e7c164bb01ce1940315e9206382eb4788e3b6ca07b8ff7d2ba3a36
SHA5128b78395a0fe928891fde1f7b45443a351ca5f842c7f7462401557256d7af8f2ba8151243adf254e5f07d167be3ed38a8e17323e072b8a7eb02ad5bcb1ffc1445
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
792B
MD52dc6e99c301f7d59a573f8ee8d8a6d1e
SHA1af0a453be97c83795c0bdd04b592e95e31655fe0
SHA256996d2cb5e6a2f3cd590df9897ba89b698850d642b7fa3e1d7a6a027515edd241
SHA512078af4b317fbac8d75400c5ea6543557b0d3a24e88eba0dadddc368e341509a11f7aa7b39a536fe8e0024581f0eadbc7611dd8d750772c919eebd8dca4595be3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
1KB
MD560f04a769ef00c6ac19c4e20a52bf548
SHA1998e639615eb4cdd34417410f13b0e1c05f9ca49
SHA2567f8670d5edf438c6fb22734dab31c4575ef87a73a03aea52ac25aec7c85d759f
SHA512b856791db866227495bbbe1ce864287137d2c88e466451c361b9f5053566a171e6bb99c974d91d0009b0737b4abfebbd0c04f247f59a45e96b133a3e4426f09e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
1KB
MD50e9ffcf9d44014531d089f1a39eba012
SHA1a97543ae460b23e471c8891de8aa6d26ef5d24ad
SHA256e0110eac08993db0cb968b6ad5c580e07a9f7db08dda599c9b2229dfd05d4287
SHA5124cde153c9580712b68fc9bf4f77e1571716218d54dc235e092e37663a71feb6992163fc3cb58458e071f8e2af540e19d08dcfe90a47b3333786d2cc532ef1030
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD54ba06d026cd4f665f4c1212b8071ea7f
SHA15193c9712414351b96f6dfae20b4b936232bf107
SHA256ee8108ec79dc2c8a8b0638dfa0a7fb20995ab3356a32cd90614845185cf40363
SHA512721f380de6f29f07015cfe17a25246618e1c039061e4370f4789685dcf9ed99812576caa17bfedb33f21ba40885d3a2032ca853e3a17526b4139394935547e0a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5be0c19c7480990c05dc1663dc0a7db94
SHA182897f6365ddd7e22b8461a80ba83b244e8c10f7
SHA25687b03c295f0e1acbe247cb1efeb020bac5f5ea5612bf2f4fd937669240c2e46f
SHA512addae360d5c08e8b149c01bb27e90311fc08dccdd0ced73d763b35a27131861c26974e472b67bea79fcf4df6b0ffc4caeb1f29d2856e2d5f2560d00a0418d8cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD55010ccee806f28ec1b2c8004b706f9ff
SHA1374c86f11653fa025fd4d83064d16685098afb57
SHA256aa3566c7f97fdcf1faec47379eaf15d401abd802dc7c7af84a0203367850b3e0
SHA512e8819005935a005bc74a0a811737c249d3d2fe751935f7f5f8dd0cd70245cf1790d41d6087eb52ec4a0f33a0e976059a0ab1f2afe738cb1dec8475ecf0abe076
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
704B
MD505ff65e8fa06554fd8b79fe61f01aa85
SHA1fc3dc81a89f0799e31a984840b1a0e4e4405f5c6
SHA2567bb6f539a2e390005bacd2d6b0ae90dcb6b984519b81cf0124120cb7392631ae
SHA512c0711fbf961c3fd9ad55a407b66acce7ff04d05fc236d6ba8dde42da0831106e8cdaf53969b15eb6f5875fb6266b2f8e59c5d24ffd7b1f12a9fe058a7b5344b7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57dca4.TMPFilesize
540B
MD5df24de7b8cc81dc9b94d92098672fc45
SHA1f3f5dfca763e0e124a9f596b88042fca8a33e48c
SHA25699b378514049b06683e4ea3cbe7b2a504933b3b405cc7845e2e85751e15bf9f8
SHA5120bc60ed135369be60a67a52ec1cab8e8c8f0f281f6412f1a005179723f9c2190f14c3c0636db84f89254a4a4e9c473ea2292a6e284ebd9b58739032eb7d937aa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5d8960f8152d29dbe323d6db5ae8dafe2
SHA10a18fb331196af76ca71c3a47e5d2b8228078db0
SHA2565085f642df8ff734de82dfe9f754404fe0f49d4cd67b88877db57866a7fa85eb
SHA512d7f0f25877f534f24fb20045a332f7e8b428015b0f2f2d1bf844b38db4c60330ea7bd9c565b3dc1c6274ac3619fb75c64a9ce2d34a152e8648153e737c51d087
-
C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dicFilesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
\??\pipe\LOCAL\crashpad_2688_XLEESEBLINOCWMKYMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e