Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-03-2024 01:00
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://go-link.ru/mNW1d
Resource
win10v2004-20240226-en
General
-
Target
https://go-link.ru/mNW1d
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 2096 msedge.exe 2096 msedge.exe 3832 msedge.exe 3832 msedge.exe 3308 identity_helper.exe 3308 identity_helper.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
Processes:
msedge.exepid process 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
Processes:
msedge.exepid process 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe -
Suspicious use of SendNotifyMessage 34 IoCs
Processes:
msedge.exepid process 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3832 wrote to memory of 4736 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 4736 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 396 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 2096 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 2096 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 4868 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 4868 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 4868 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 4868 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 4868 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 4868 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 4868 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 4868 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 4868 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 4868 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 4868 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 4868 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 4868 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 4868 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 4868 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 4868 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 4868 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 4868 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 4868 3832 msedge.exe msedge.exe PID 3832 wrote to memory of 4868 3832 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://go-link.ru/mNW1d1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff974f446f8,0x7ff974f44708,0x7ff974f447182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,9989156880825360329,80799689388534572,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,9989156880825360329,80799689388534572,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,9989156880825360329,80799689388534572,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9989156880825360329,80799689388534572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9989156880825360329,80799689388534572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9989156880825360329,80799689388534572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,9989156880825360329,80799689388534572,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3528 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,9989156880825360329,80799689388534572,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3528 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9989156880825360329,80799689388534572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9989156880825360329,80799689388534572,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9989156880825360329,80799689388534572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9989156880825360329,80799689388534572,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2120,9989156880825360329,80799689388534572,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5684 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9989156880825360329,80799689388534572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9989156880825360329,80799689388534572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6096 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9989156880825360329,80799689388534572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9989156880825360329,80799689388534572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1904 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9989156880825360329,80799689388534572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,9989156880825360329,80799689388534572,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6628 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,9989156880825360329,80799689388534572,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000008Filesize
88KB
MD513a6d74ad6b98b7194ac1e2bb91ebf9c
SHA1f4e125f62cdfdcb8774a8479ce7ab070c88815e8
SHA25657f0940477fc9fec40f298c5dd6135c961d947d63375f0303b445d22346c8930
SHA512155e22e639e7eb54ead79ac114e5bcbcd1169359742decb7a62d1172cfe6e8a81002fa28c1a68ad80d9a6dcb1da77de4030207ce3b756ed7f2ea7f5cbf95ca51
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
168B
MD57090afed2455636efd6a24168564c728
SHA1b212576fc6b8e7a0fa2cf0f01ecc4b00dc476066
SHA25628d9782ba0077e07782d9d780ceb9d1e5ca47f5bdcaa55c2b75c998505f58c99
SHA512d6da93da3e8beec02bc1cacb503dd915a14c4a38aa1dc904149fde7243d6320a9522263d2d9e17d035e47d742d76312e4b4e3e3b4256648a9c0a27c7d48b09be
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
216B
MD5f433f4d3e9b529a524e3cef377a8b481
SHA1bbf10ed3da6f84daf5c664060da0abfabecb9e5b
SHA256a6265c640f626e2303c75e805fb0f80e33392575fefc085a68faef3a0516e945
SHA51226f7774836e55389d6e913e7a3100403cb9dafae54e4203ac6bfc68c49bfdbd81ffca1cc91002a07c46669447313b3201056fbd04b8d3c61029600b97f3bf246
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
775B
MD50dc62df2b9aa04504f447d3e03a43f05
SHA11f2f1ea2d1df394cf0a5d5f18818737b7197dbbe
SHA256a5400634fedbe3d9e78d0e2ee66729eb4b4a0dce66af94957512f4dfd9cd96e6
SHA5125d5251999aeaf796afab60f55578afb9a3ae2feef00ae8b7ae49a477ee57ad3d3978b86a111b09d5164b944b5d1ab633c99ba09b5218107b623ecbe97dd1dd4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
869B
MD56e6acbd7390c19eb847378c0b15de4dd
SHA11d8a37c729ffa2610e7af78d8abcfd2a3464846e
SHA25621f17b1b09e7c7e31e79a240b74346f15681f07ca41bd4f0d1fc931f8a378402
SHA5120858024bc8d9462d066154d0561baba6d41e6385f79cd958f58c543caaeeab1af3dd5c2cfd0b00b0f0f08d2d399cb2ffc220e3563e0624cc538ddfe8f5ea52de
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD526b51b94d0a523e8d8f978ec97f6fdb5
SHA12e87175e59344c3ca6f80f961ed8b41a268b75ee
SHA256b02766926264829fd64fbe7805ad9dbbf3dd92785598002b81ee211696858460
SHA512ccb8e652b697f3e4b7e41fac8936b449ab53fbadcc1d7f5e41b62b66cdc7686fd0abeb611e6e545812136ab40066d6cca4e014d2d759417065b056c745a02cfc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD5a78e520e15f4eabbc9951d904b8b6ae1
SHA1335f7e7fef0d3c7f5523187f47084e14c11e1d8c
SHA25695183360e2bc10d1dc6e0759d06dde5b7d7a4c12f611b23617c36155cec558ba
SHA5121834122716ebaa9d9209e6ba05e52e7a15f6d7e229202870a3882ccd583121ad0649443f562d3917dd507c1202e8aee1570fbc841858193d0e92f9f7111d88fa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD5fbf6c6f293cd3c1862d0d9ade04d721c
SHA11d5f8b4d510b4d47a8636402696786faea118a3f
SHA256ad99d5c615e7c8785a14d77acccd2d42a564b31a4da9ceeeb3368e36aa2787f6
SHA512adebd6c0889568dc00d9c38ee6c387f52a12468d6b5dd81fc6ffad1795b238f8017019f93c4e28cb2aebeae1c8317bfecc1cc2073706a8707ce5301f4bcd420b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD576ee9829dab175d454d0a77c5ff79d29
SHA1d50a3a9b21a0a3e1f5b93e92db2d39cac8ea84e2
SHA2567ae9e9e9b745440a9842be8e27285a5e38fcfdf31298aa3196cd43f9267d6a89
SHA512f67b2fb11aad78de4dda83224a8ad090a7d5b2ad719fc7ca1cfc935e999711ab4df8514195c542076838475baff2f6120b2857e5685a248f99ea59707e9f8c46
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD5a8b6be72d0b08625a6710eb892bc188e
SHA15f58df6dcc11a9e9bb8f8091141d24c622ba1fae
SHA256f25e0dc0010829f67a085ae219a937a64e372d05dbefad7c7e1d1e055b9f171b
SHA512a71ceab17b9782cfe781a7470ef29623be192efa508749226438db9f132ea33537b5172d56ae1266e9b11adbcc11796c4ba92f97f87a0287b9e42e4b326f6151
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD5eba0eb1682af3ef1d20ef227c1dbb8fe
SHA199dbd493ef2fb7306f7616dfea13c01dcfd7476d
SHA25604c7deb4ff9ed71fce8e858455d89ef8d7b9fdadc8a52a783924597e9d9f0e03
SHA512c1ccc95f0030472d03f02a4353d9b126b03b26fa57ad2ac14e9e6834222907d55a738d5ac64845f501cbcc45d31eddcfd2bbf25703ae6bb2109022b0eae13c1b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
369B
MD52132a196c50c4f12061b1b479528d8d5
SHA1feb2abf3fc69ccdbc9a4baa02a2ebee2aa20e319
SHA25669fa1f3ef52cb79f15500faec2da9dd2b9a0cd5c969132aec1d852c3b35abe87
SHA51220206adbe5351a88f53887db2ccf7c86892cd86540996068968de102e72198f802ad082160f290f2fd314168a1443394474f1f77f99a948b3fb4e46794721f9c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
537B
MD55967a7c4bf9207df078c7c80afa61b67
SHA17fa8595912bc420249eaddbe72e7a472a019e392
SHA2565f3b100adbe2f2defe7b552749fb35a7a625d71f0d76068f24309d7245cc6f35
SHA5121c5776fa6c8cb1c51014dd600d427e557e0308efc8a3d34f9927bb2cc1de53bdd05135b9941880f435e62b949cbc9bcc5e72abb8b94c8c7a8c9c1a3fccca47ad
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe592fff.TMPFilesize
202B
MD5bb04ca0117589f91551ba6e99899bd8f
SHA19f631594b1e586c71e0d039a5651d69c96e755ab
SHA256a8e7bc7d9ca39998b30b0633f004007f3283957669977be1eafe539e29f2d380
SHA512640778c2d17517e25dbab01cedf0cf4a20c885d0130f4a1ceb8f6ca665f17255a506662774131b7d91083df36eae1ea0f44f372389e8a425e8755ddcccedd45c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD536062fb4d69edb3286853b52f58be6ef
SHA1cf99997cd7cd79b5b918a2fb594ea8f10928457a
SHA256e4307cfa69f3c72312a660d8106685cc789cc49342ef1059ba019a7524fd031e
SHA5128d4c2c0d8e825aa0d299ca5b59e83515a4b649a9f7929236113263a139535f20e0a18c4905c697effa9d3aa9662831e53d495cac9054e84b7f40bf8b795d0091
-
\??\pipe\LOCAL\crashpad_3832_HUOMWQHWLALXDKKFMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e