Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 17:47
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3952 msedge.exe 3952 msedge.exe 548 msedge.exe 548 msedge.exe 1400 identity_helper.exe 1400 identity_helper.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe 2132 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe 548 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 548 wrote to memory of 636 548 msedge.exe msedge.exe PID 548 wrote to memory of 636 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 4764 548 msedge.exe msedge.exe PID 548 wrote to memory of 3952 548 msedge.exe msedge.exe PID 548 wrote to memory of 3952 548 msedge.exe msedge.exe PID 548 wrote to memory of 1244 548 msedge.exe msedge.exe PID 548 wrote to memory of 1244 548 msedge.exe msedge.exe PID 548 wrote to memory of 1244 548 msedge.exe msedge.exe PID 548 wrote to memory of 1244 548 msedge.exe msedge.exe PID 548 wrote to memory of 1244 548 msedge.exe msedge.exe PID 548 wrote to memory of 1244 548 msedge.exe msedge.exe PID 548 wrote to memory of 1244 548 msedge.exe msedge.exe PID 548 wrote to memory of 1244 548 msedge.exe msedge.exe PID 548 wrote to memory of 1244 548 msedge.exe msedge.exe PID 548 wrote to memory of 1244 548 msedge.exe msedge.exe PID 548 wrote to memory of 1244 548 msedge.exe msedge.exe PID 548 wrote to memory of 1244 548 msedge.exe msedge.exe PID 548 wrote to memory of 1244 548 msedge.exe msedge.exe PID 548 wrote to memory of 1244 548 msedge.exe msedge.exe PID 548 wrote to memory of 1244 548 msedge.exe msedge.exe PID 548 wrote to memory of 1244 548 msedge.exe msedge.exe PID 548 wrote to memory of 1244 548 msedge.exe msedge.exe PID 548 wrote to memory of 1244 548 msedge.exe msedge.exe PID 548 wrote to memory of 1244 548 msedge.exe msedge.exe PID 548 wrote to memory of 1244 548 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://acrobat.adobe.com/id/urn:aaid:sc:VA6C2:76eb9f23-02fc-4044-8aaf-5a49add8d85d/1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc72a46f8,0x7ffdc72a4708,0x7ffdc72a47182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2324,4137963632287337761,16640676527976726539,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2344 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2324,4137963632287337761,16640676527976726539,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2324,4137963632287337761,16640676527976726539,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2324,4137963632287337761,16640676527976726539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2324,4137963632287337761,16640676527976726539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2324,4137963632287337761,16640676527976726539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4916 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2324,4137963632287337761,16640676527976726539,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2324,4137963632287337761,16640676527976726539,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2324,4137963632287337761,16640676527976726539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2324,4137963632287337761,16640676527976726539,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2324,4137963632287337761,16640676527976726539,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2324,4137963632287337761,16640676527976726539,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2324,4137963632287337761,16640676527976726539,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD57b56675b54840d86d49bde5a1ff8af6a
SHA1fe70a1b85f88d60f3ba9fc7bb5f81fc41e150811
SHA25686af7213f410df65d0937f4331f783160f30eaeb088e28a9eef461713b9a3929
SHA51211fc61b83365391efee8084de5c2af7e064f0182b943a0db08d95a0f450d3877bde5b5e6a6b9f008e58b709bb1a34f7b50085c41927f091df1eea78f039402e9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD548cff1baabb24706967de3b0d6869906
SHA1b0cd54f587cd4c88e60556347930cb76991e6734
SHA256f6b5fbc610a71b3914753feb2bd4475a7c77d0d785cc36255bf93b3fe3ccb775
SHA512fd0c848f3f9de81aca81af999262f96ea4c1cd1d1f32d304f56c7382f3b1bb604e5fbe9f209ad6e4b38988d92357ef82e9668806d0727f2856c7dc1f07aae2b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
792B
MD51d8191bb34c2469e6859681ef5efcd1a
SHA12711ea132b715714389beb4d3707d9a0da2c06be
SHA256eeb3b4fd4b6dd5b7de1c25c2ffab246592c2fd4cee49b8c1b766e87c2ced39b1
SHA5127b03f4cc0b64e21475e57f9488f9b0eb5aa1d3f7ec8497a32dc1251db300a9d3dcd816222bb8bee944be7f814291d0ea44ec17515164729911b4989aedb4ee45
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_acrobat.adobe.com_0.indexeddb.leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
959B
MD51781a64011334bc36e650bcc52a29780
SHA18b0a4fff99ece5b7788ec31967fb6fb64f374b3b
SHA25630ce7a2c747f39505c10e224063110aa488e6f17e89df5d1b11387ed8a6ae2e0
SHA5122582a3267545db6f8c37bef74668db7e84f161d0375f9a75f3cde46954e0aec8e815f1e7026e267b60a43e5f9d208360bb5185b884db84a48f37e7ed0f831cfc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD55feddee8eb447a4bf6960663eeca9e80
SHA15de8194909bec71166e5c1eba8401e89ca812fe9
SHA256ba307e263909b26a4467d21dc34c9b3ad7f98dc4e9cbf6fb5de2ac1a19971eb4
SHA512e68a429ea02255dc40be01e4cc743518ff4293a740e9d8a3c987b997a84beab3518963ff94e0606e5b48848a71ab5cbf069c2b01c2b961fb0222c776591fbf13
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5b8c9970e78c6f6123d8c02ecf8f1f587
SHA149c9d402afdddaffe2bba95a6c514c4ad3f8b88a
SHA25601cbf0154b29716144b6e0a8053c46034126c0662fcfa57e4186c50d50fd5a11
SHA512941423438a1ceaa28fc8134b1ea4ab3acb9cb76fdb825ca80fbc4e99e4882c95646770bc5e7c288bcd05e695dbb57cfddc71436a143150657c71de518c850eb9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\7b539bde8ca0807396a791d6ee4db1189d0e5380\3a104919-eed5-4d70-8503-17b623b297dc\index-dir\the-real-indexFilesize
72B
MD5d271e891c1e4ab78f61ce53889cc4405
SHA178958e6a63bf564b338ea990ac762a17ae544a73
SHA256c9cd551520ca2aaebca1e7ed78115e97d87f67f99419aa06f9117173e2752338
SHA5124bc710c2d93e74e370aad029f247adcc78e0bbfdb7c6b2a1a67a9d5f04b5f0b6cba3a41321ea5f029940203da99f457750556b6cc954c4c8b1720363dee0c8d8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\7b539bde8ca0807396a791d6ee4db1189d0e5380\3a104919-eed5-4d70-8503-17b623b297dc\index-dir\the-real-index~RFe5798b6.TMPFilesize
48B
MD5e3af8471d6854d29bf7cec4b192fdc65
SHA1fbf7cf81148ad2e7caab5b256d27c2e07cf25f0f
SHA256dab833034323265a923e07865899e6128edec656c04d7dcc8134a9169efa528d
SHA5122c96ff8bd75934a0542dea6d668385746d145b077f1d2deaa2d6034812a2ad6d586eb80a5a40fdd685b09381d9cb23ee78a055192a6c67ac0ba31b4dd7b19345
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\7b539bde8ca0807396a791d6ee4db1189d0e5380\index.txtFilesize
129B
MD54f07cd02c9bd8c596eba0b882579d95e
SHA1f18054f64d828ce7bcc35153072c238e9cbb3ceb
SHA2568803f43247e7154f022aa1c43a76672b10a94100a62eb5b9b97f9af33ae06b37
SHA512f0e9c8552ea89f52f3b4c206bc8eed251dbec077b6a2ebf69ef318c07f55452ea06e3d976780292e636038af6940d8a77516b6eef2f98d7ad15532e7359fc239
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\7b539bde8ca0807396a791d6ee4db1189d0e5380\index.txtFilesize
123B
MD54cc0d5c0addf6104b290eb61d861e3bb
SHA12eabcd9da49b6c70c6fb98a458148716ecbc269c
SHA2560952437678bab03d7f1cbe89690a81cfb26756cf4e6c619a22b50e310cbbd646
SHA51246d3868df326ce2df5cf2390edb24c975005a846aa49b968f9c183950c18ec2c1b1a386190ae3d6e80260786ffdb18f00dd085de06ae7d166111215df3a68d24
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-indexFilesize
72B
MD5da8d7f0cb5b5146c016a06f410bb9845
SHA1a0e51a3418ad88d87f61647c9c4149444b981bd3
SHA2561b6bfa1ca93bdb7f365fe6d02d668203d25108316aeaadbbe3c9b35e7985749f
SHA5120b1fd1ce10b537c834114ce5c773437f9cf7123b2cd8b8101b79a137c7f459af19a33eb47192b8d131c90a61a555b495ddbc617595da75b18d123e49c8f03214
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5796f0.TMPFilesize
48B
MD5224c032a506129a79bbb77fc98101f0f
SHA1740ec8551d9d14c26afde820be51481d240dc472
SHA256872c4e99ec908ead20de6be045d2378a9ff7c39cf94e71751a8d32b4e60fb7a8
SHA51290dc79190eace6a054d11e4827210437415959f208fd6efaa1980f297c71cae7ab093294cdd2bc46707db0a3f60a505b7c357e2f32921a7c8bc95288652aa578
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5fb98790b1c74f485c45c2acb4884b502
SHA12531beec9d21223b253e40906e1bd175f8c63697
SHA2566e6354f3b3829331ee8e8fb7117170792f042c7ac14916b2c4a92c4303904093
SHA51265a74047852b26b424f7c12efa364e1decd0b9f52d1bbbba1c4b61fe21d864fb3f858511b8838bb8ec3417463f3449c58c6ad20fefa0725767ad05f994247339
-
\??\pipe\LOCAL\crashpad_548_PMTOMATCQEXPBLKQMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e