Overview
overview
7Static
static
1URLScan
urlscan
https://www.youtube....
windows7-x64
1https://www.youtube....
windows10-1703-x64
4https://www.youtube....
windows10-2004-x64
1https://www.youtube....
windows11-21h2-x64
https://www.youtube....
android-10-x64
7https://www.youtube....
android-11-x64
7https://www.youtube....
android-13-x64
7https://www.youtube....
android-9-x86
7https://www.youtube....
macos-10.15-amd64
4https://www.youtube....
debian-12-armhf
https://www.youtube....
debian-12-mipsel
https://www.youtube....
debian-9-armhf
https://www.youtube....
debian-9-mips
https://www.youtube....
debian-9-mipsel
https://www.youtube....
ubuntu-18.04-amd64
7https://www.youtube....
ubuntu-20.04-amd64
7Analysis
-
max time kernel
1748s -
max time network
1685s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 04:55
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.youtube.com/watch?v=SJKVdJycZEI
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
https://www.youtube.com/watch?v=SJKVdJycZEI
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
https://www.youtube.com/watch?v=SJKVdJycZEI
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
https://www.youtube.com/watch?v=SJKVdJycZEI
Resource
win11-20240412-en
Behavioral task
behavioral5
Sample
https://www.youtube.com/watch?v=SJKVdJycZEI
Resource
android-x64-20240221-en
Behavioral task
behavioral6
Sample
https://www.youtube.com/watch?v=SJKVdJycZEI
Resource
android-x64-arm64-20240221-en
Behavioral task
behavioral7
Sample
https://www.youtube.com/watch?v=SJKVdJycZEI
Resource
android-33-x64-arm64-20240229-en
Behavioral task
behavioral8
Sample
https://www.youtube.com/watch?v=SJKVdJycZEI
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral9
Sample
https://www.youtube.com/watch?v=SJKVdJycZEI
Resource
macos-20240410-en
Behavioral task
behavioral10
Sample
https://www.youtube.com/watch?v=SJKVdJycZEI
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral11
Sample
https://www.youtube.com/watch?v=SJKVdJycZEI
Resource
debian12-mipsel-20240221-en
Behavioral task
behavioral12
Sample
https://www.youtube.com/watch?v=SJKVdJycZEI
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral13
Sample
https://www.youtube.com/watch?v=SJKVdJycZEI
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral14
Sample
https://www.youtube.com/watch?v=SJKVdJycZEI
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral15
Sample
https://www.youtube.com/watch?v=SJKVdJycZEI
Resource
ubuntu1804-amd64-20240226-en
General
-
Target
https://www.youtube.com/watch?v=SJKVdJycZEI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3584 msedge.exe 3584 msedge.exe 3740 msedge.exe 3740 msedge.exe 3664 identity_helper.exe 3664 identity_helper.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 4468 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4468 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe 3740 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3740 wrote to memory of 1584 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 1584 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 2644 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 3584 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 3584 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 3472 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 3472 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 3472 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 3472 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 3472 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 3472 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 3472 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 3472 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 3472 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 3472 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 3472 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 3472 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 3472 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 3472 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 3472 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 3472 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 3472 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 3472 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 3472 3740 msedge.exe msedge.exe PID 3740 wrote to memory of 3472 3740 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/watch?v=SJKVdJycZEI1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa382846f8,0x7ffa38284708,0x7ffa382847182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,13589709490830475341,13097666430700241715,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,13589709490830475341,13097666430700241715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,13589709490830475341,13097666430700241715,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2972 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13589709490830475341,13097666430700241715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13589709490830475341,13097666430700241715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13589709490830475341,13097666430700241715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4680 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13589709490830475341,13097666430700241715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3700 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1996,13589709490830475341,13097666430700241715,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4120 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,13589709490830475341,13097666430700241715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5944 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,13589709490830475341,13097666430700241715,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5944 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13589709490830475341,13097666430700241715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13589709490830475341,13097666430700241715,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13589709490830475341,13097666430700241715,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3704 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,13589709490830475341,13097666430700241715,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3684 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,13589709490830475341,13097666430700241715,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2496 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4d0 0x5101⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5cff358b013d6f9f633bc1587f6f54ffa
SHA16cb7852e096be24695ff1bc213abde42d35bb376
SHA25639205cdf989e3a86822b3f473c5fc223d7290b98c2a3fb7f75e366fc8e3ecbe9
SHA5128831c223a1f0cf5f71fa851cdd82f4a9f03e5f267513e05b936756c116997f749ffa563623b4724de921d049de34a8f277cc539f58997cda4d178ea205be2259
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5dc629a750e345390344524fe0ea7dcd7
SHA15f9f00a358caaef0321707c4f6f38d52bd7e0399
SHA25638b634f3fedcf2a9dc3280aa76bd1ea93e192200b8a48904664fac5c9944636a
SHA5122a941fe90b748d0326e011258fa9b494dc2f47ac047767455ed16a41d523f04370f818316503a5bad0ff5c5699e92a0aaf3952748b09287c5328354bfa6cc902
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
528B
MD5f13f816f182d7e99e69e5b395e153a5e
SHA1fbdedc3e4b156c30d51acaaa9472300e8a0b5cf1
SHA2562506d4edcbd6b8cbc776f297c06d9fe4a199a82d4b81a70501d07d1992728338
SHA512e1d001180331e5fa2924a99930fa21be02b2b34bc6ba49159386bff5bc6f1f8b49eadea22b3220c7258be8533cf5644b75343b951d600d853d62ffdb055f2b98
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
2KB
MD5f04f14740057ab216e6724141de84865
SHA1747de14669f2b2887d79a2adaa3098534c9bf226
SHA25684ce775ae62bfe8f285b56bb924fdb44935948fa2131e8d6e3e930ab8ce4dd2f
SHA512a842828e8f9cae9734922684dacb88db40ed84ff376ebd02e3ceb3ce6757668af99167f110abc2ade3f27bf377f700271dc0c6a37cd7039ed94e3935e27687da
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
2KB
MD552313a8cde9b9225b58e72de03839d73
SHA1a200cca73142c98cbac8c6e491f3f576234ae419
SHA25689ef34ada3b052d810447bbecea34d340a075a94f267eaf59357ab0a32dc7b87
SHA512e1b45ee8205f21eb8709b27accee87cdbc70afb8d8e116d4368c7b30e17bb0035276953a06e34ce5b53445a738e77ab1d042d2229336548bafddecf1dd58f66d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
2KB
MD5a8943e288f17f12520fcc43f48b767fd
SHA17ac96f7c808abf7956b6dfa41bf3e54480279d62
SHA25657c5d7479bae618f32b8f76d5e3c1ed07d7ba966b7fc35a78cb8aa3d9551b01e
SHA5128247cb9f0163a0c1fe41a3f3e2f4e6e1f4004fc7f87a1c123b077cdf100e1dd849e41f165405276a37acaef75b4b209bdb8cd5f803647b5e99e1cc363fcd6f7e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
2KB
MD582be89422f9a06eee48cc0f8a050ef38
SHA156d458e11e2084fbf4b29b1c2cbf6bc88f6eb200
SHA256e618c1a7009e3b7114ecb34311e9b6ab1bb1bf9e4d32f8b1de56a7b14b3324e8
SHA512efe1385adccaa0fd66601d0da640552f6ec94b6077d96e593abd2cbe265675dd9d353acd62a670f5e2c5963b13cd44ef815f4b19e4d18880291287fb42f29fb9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
2KB
MD5317511a4ab137af11b25648f4de1bdb0
SHA1d943b0726a0654b9cd2fff07a3ba21b6b50971cf
SHA2564fb21706436fb0534db17d1d6ce80cf986aa5c3ceb604d216c69d72f97da99e4
SHA512e7f8d8dcc95ba17bac5a0f921105c776844b47b51d362a496ec7aa9051bc8308dd750d1612bc1bf58b5b662db6bb3cdb86ba6ced5339a0356ef157ddc357aec8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5f2da52e8abfd8e090513a5c97fa05103
SHA18322ad950270873916b54f8bfe82f56a593b8f44
SHA2567ca2149eb9db6a845c238157d956e91ca1174400543f83671b1d92bf9728d01d
SHA512a757e45e2f431d80a1668e3938bacb36f466c3f0b8d2265b843022a384d650628a4e1114685fc8554ba09724c6125f69344b506fd406a3e69a23b9bd4cb35000
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD50778a4050a2e2436af04dd074d372805
SHA16773569dc3c3d1bb2b0b0803d141adedfe982fce
SHA2569923f512d4902607469248580ebfba011cfa8757b1fe8dfd8d5b60d471eb4c3a
SHA5127406b0c694f23d11a2536621a74c66f993a56dbb2739dc7889312a305b27519d4a75bf5fe1c0a0eb4985bd58e5b214995181ba8c7a14be3688d62d2aaa59dc75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\fcd044dc-ccf9-4720-bd39-e6f38ec772d6\index-dir\the-real-indexFilesize
2KB
MD5bc387f07d6e8210953bdd6dec0a912fb
SHA1770bbb03107c5be79ea640ade20a66d1215a2924
SHA2562abe4423ed02f3408f4cace423b950806649d60018525907ee3bb5617be6592c
SHA512916740f273a008256f663a4c75cdebc89ded6061b78f4501ab4ef08822ffb942506ad12b8e7ca9b327c39807cebc44086451264c4702010ec26b03a8538fafa1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\fcd044dc-ccf9-4720-bd39-e6f38ec772d6\index-dir\the-real-index~RFe57955a.TMPFilesize
48B
MD57ec8ead834359952fca14b5dc91bcbbf
SHA129edf2dd43d8559d04d5e660cb1ff1e7ce81a13e
SHA25624b26dbbef27d6677dcf8ac84d17af5f30eb98674361639ec563307074116b6e
SHA51294642908c2ee60789a3d67b5b0099b3c1e38792a4759a2ec0a47d634283754867588bb313fd81d509f6865a4bb0d10a3ff460082d6298f6d59d73de2b87ab5f4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
89B
MD5449ab64e22285bb9cfb2e4272c95215a
SHA1dbc67ae6313fb59400b553c3cee0701d48db3966
SHA2560b5d298b592dfd34478e4bd52bb565dd9e28f26e3bf4fba0f8826bf0a847f4c1
SHA512567c3b0aba6bfba5a9f991ca1af34065f3fd797f1146079cb4ff8e7a612c493e1f3c736e8e0ce6c9b263207dabf088affb43d497135ed35e805b013fcafbda3f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
146B
MD5c9e00b8b86b3e8a8242ba557befaf940
SHA18e187f34fb0b97ac12c5dc78a7dcacf908ccf11a
SHA2561b8055f02fb6cd806daa4f8240a0c26fa9db768a5292b20c479e08e27c3a1984
SHA5125e38ca968830da9d46ecdbb97eb64f13b9eae1d41849c50069b93add50d123bb0a023474a0fdd26a6532b3b13d47ede62fd36da5c2aad176b76fe08add1371c9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
84B
MD5fc0b7b85a5a43072e255d56f927e9965
SHA1c173a5fadfa0993a10bf577c213ae8f43e5ba897
SHA25641fee64a49078682e673b78d120d82bddc7c93fc84f54a6a80faf5dedb05c074
SHA512c3ed0d59318fa301ad0d1bad8aad1ad752277bcd78490985f58601a92b4e78bf662de063a6b5e7d864e950239d1ac48982a0930a13365914938e439011ffb40c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
82B
MD561a9acb1e8320d66703dd98a0d1faf7a
SHA1317ecb234a562c8ed4a3a5f3eef6b0a55d4b6523
SHA256f9812510e3f4f55e943ed662431b4774e477934b2173b88f5b70ef8617800127
SHA51264dafeb3af5f4c5ec803a2a174221919732f290f93b8221400a733147810546f995d9588d51a4b915a3ce8e1f26bd353e5b280accc2a025c1e213b95f3163263
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-indexFilesize
72B
MD523e2dc858aab66a823fb01d62c22a5f0
SHA1eab7dcc0fd8871a6608ba8f040c9c0ae54ad4edb
SHA256fc9f4bc0d23d503c08f24f01e052f7d56516ebaac611b084696b0c9d46f163ff
SHA512fdf4542eca7a6638a00edacd6ab731a4313a4cb3878dbd18c2a6ca249696059eaf240c2e4908075ed198dc7354b9c9ccffabfc30cdcc9cb74dfb19cc5c87ee62
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe578b29.TMPFilesize
48B
MD5c3ab6738ce95affc667a07472d2e2f8f
SHA169e3f36ece357e98e4202191b00a4c7f31f2c9d4
SHA25658b7d02525d69413ce964cae06101054daf38ac5c5c1a493886901b4bd2742bf
SHA51274919576bb71926a0ae6b003ac60ea59cca2e0ed4348f0af2b3cbc9d65a10c537aed897acedff59299e4a8ca5f669bc2f3588032e60fc6c5e87eb1fb9c3941e3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5bbdfed144f388666278ea60864b74a23
SHA1644dded6a793259d846fdac24774b330fe1c1599
SHA256064d8c9d1020c0915e564ae11da3f77bd2b3f18b581dd290d2afb7a84dbfc5f8
SHA512c2d6af6004d6aa040cbd25b7746dd7aaba30a1b6c51bbba959cfd4b29704413dec6e9aa40d3ab6afa5b019cca68345983b9793dbcb70a33f34d594094d600bca
-
\??\pipe\LOCAL\crashpad_3740_IDRAFYGCJAHOVIBJMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e