Analysis
-
max time kernel
168s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2024 18:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://steamcmnunity.com/gjft/742241#
Resource
win10v2004-20240226-en
Errors
General
-
Target
https://steamcmnunity.com/gjft/742241#
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies data under HKEY_USERS 15 IoCs
Processes:
LogonUI.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "151" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4300 msedge.exe 4300 msedge.exe 2676 msedge.exe 2676 msedge.exe 2608 identity_helper.exe 2608 identity_helper.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 4756 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4756 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
LogonUI.exepid process 4884 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2676 wrote to memory of 4344 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4344 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 3700 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4300 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 4300 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 2584 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 2584 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 2584 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 2584 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 2584 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 2584 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 2584 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 2584 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 2584 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 2584 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 2584 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 2584 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 2584 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 2584 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 2584 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 2584 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 2584 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 2584 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 2584 2676 msedge.exe msedge.exe PID 2676 wrote to memory of 2584 2676 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://steamcmnunity.com/gjft/742241#1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc85f946f8,0x7ffc85f94708,0x7ffc85f947182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,15483737856262429004,3799585898033068879,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,15483737856262429004,3799585898033068879,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,15483737856262429004,3799585898033068879,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15483737856262429004,3799585898033068879,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15483737856262429004,3799585898033068879,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,15483737856262429004,3799585898033068879,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2216,15483737856262429004,3799585898033068879,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15483737856262429004,3799585898033068879,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15483737856262429004,3799585898033068879,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15483737856262429004,3799585898033068879,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3548 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,15483737856262429004,3799585898033068879,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,15483737856262429004,3799585898033068879,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x510 0x49c1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39ac855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD57c6136bc98a5aedca2ea3004e9fbe67d
SHA174318d997f4c9c351eef86d040bc9b085ce1ad4f
SHA25650c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2
SHA5122d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD55c6aef82e50d05ffc0cf52a6c6d69c91
SHA1c203efe5b45b0630fee7bd364fe7d63b769e2351
SHA256d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32
SHA51277ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
432B
MD56972601a85d64e86732548a50e558fdd
SHA1f54e843d36035a3b32062c29e1c40af9591c0aef
SHA256376bd98bd8ae78dce2be464681932978382b38d210d0d70bf369cf68c4bc9213
SHA5121c41640e36b3405cadc31d0dec4ea8afacfd6e6d0d77a03e753abe2b6b151f61c48b549106d1d4015ed32e54dc1d8919a20271a1a94a9927ef2db98c8687c50e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
873B
MD5f538ae7d5fd3404bab4484746c1a4db9
SHA15453f7d8fe5c5931e23982c2137d3b872795f8a5
SHA256035fe1cdeaeb8afc0bdb70e3ed81f6fd2fba964b2e296905fd05f2fc56f50e9b
SHA5129e9a559dcbcff6ae36779a6cc5abba74131bfffd058aea6f04bf11a5a9d17313d02ed786ded2a9a49e6761f8ebc97b7ec1693bcbd7a0da9c15986a2d7aa9d4f3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD54a8d7125dcf3cb6902b8330454fae0a6
SHA1afbbfb2d79eb43cd924a681b8ef11ab4be222fc1
SHA25654e7667746c90a1e8defad91089876335811efe8ea44297ee29241227de6ebb1
SHA51294519811e9484ef6e79cb5b38516036048335c0f642915652f0d0fefdffd544da4de99de8fc69032bc220a203230682bdcfa261a51a8fa6da45c82b49437e956
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD51b7d2bf3536ca8ce724f525c9da8274f
SHA113d89b928460b3bc8cc279278429053f110e7d52
SHA256d58a23f903ce310c9b7ad9cb3a72f73e9eb16cb480ba1358ea1feb3f0fc9955c
SHA51213b72741fcbf8fc072de9b1c7ab234ea41bac4d5b089613bc2717140b58232b710957aaaf8e323c1332ab997dfbf4181cdd8ee6e6f7e24e329f22c4adce65a82
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD57afaa41ccb0acdb247291aef8747af6d
SHA1c896a361d0871f28e754a61b66aa471e1ccf536b
SHA25623b45baa52495cab2de2065ef6e8d3592e7fe7ee02253dc71e27d66cfb8d5cad
SHA5123534edd9389c21bb988a8fc92acd82f46ed1451b68f3083444b7031fda3f958410bdfe4289e4cad11f13b0ee26405487dc2502bfe49b9836290faebf3d40ea19
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5106ac1b9d47de0246e3ff923b4f36565
SHA18e28e9ad5665e080626df485b44f72ededfade98
SHA2565bf93f0b2fa1c550d31ac21a94ffbf7898127056c11a9085dfca431aa78eb32f
SHA5124992fc0b45f3388e53572a5203547286594a45fd7968907ec670a902182e2f773f25efcf28549822d3b1197a7be9a63dcb210f69bc70e11508f30e346dac690a
-
\??\pipe\LOCAL\crashpad_2676_OEBLBTWMONQXHSFLMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e