Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:41
Behavioral task
behavioral1
Sample
e0079f45745174de18343a91acc3a5886fed056887fd14ddc82374325c764e4e.exe
Resource
win7-20240221-en
General
-
Target
e0079f45745174de18343a91acc3a5886fed056887fd14ddc82374325c764e4e.exe
-
Size
165KB
-
MD5
a41523f673ce86873df0d01ce2ba2f6f
-
SHA1
0ef8aab867ef8c948f9219987270350d275577b8
-
SHA256
e0079f45745174de18343a91acc3a5886fed056887fd14ddc82374325c764e4e
-
SHA512
ae0daa24f17b39ba71782750c1a8d107162f38d92eb59c589332706cd2264ba74d60ac6fae0ba5351cdb9e7374f4397f6ea2480138c8511211341b3d8027181d
-
SSDEEP
3072:Zi816ZlbD857Cv6nZqAMn/ykxM0wUht7Tthcqsf19:ZnolbnvJDykxvP7TtF81
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4276 msedge.exe 4276 msedge.exe 1240 msedge.exe 1240 msedge.exe 3488 identity_helper.exe 3488 identity_helper.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe 4428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
Processes:
msedge.exepid process 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe 1240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e0079f45745174de18343a91acc3a5886fed056887fd14ddc82374325c764e4e.exemsedge.exedescription pid process target process PID 1308 wrote to memory of 1240 1308 e0079f45745174de18343a91acc3a5886fed056887fd14ddc82374325c764e4e.exe msedge.exe PID 1308 wrote to memory of 1240 1308 e0079f45745174de18343a91acc3a5886fed056887fd14ddc82374325c764e4e.exe msedge.exe PID 1240 wrote to memory of 2984 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 2984 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 1636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 4276 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 4276 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 636 1240 msedge.exe msedge.exe PID 1240 wrote to memory of 636 1240 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0079f45745174de18343a91acc3a5886fed056887fd14ddc82374325c764e4e.exe"C:\Users\Admin\AppData\Local\Temp\e0079f45745174de18343a91acc3a5886fed056887fd14ddc82374325c764e4e.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=e0079f45745174de18343a91acc3a5886fed056887fd14ddc82374325c764e4e.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ff8b20946f8,0x7ff8b2094708,0x7ff8b20947183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,12610610340216982295,4677833652192725648,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,12610610340216982295,4677833652192725648,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,12610610340216982295,4677833652192725648,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12610610340216982295,4677833652192725648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12610610340216982295,4677833652192725648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12610610340216982295,4677833652192725648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,12610610340216982295,4677833652192725648,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,12610610340216982295,4677833652192725648,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5308 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12610610340216982295,4677833652192725648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12610610340216982295,4677833652192725648,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5348 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12610610340216982295,4677833652192725648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12610610340216982295,4677833652192725648,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12610610340216982295,4677833652192725648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12610610340216982295,4677833652192725648,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,12610610340216982295,4677833652192725648,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=e0079f45745174de18343a91acc3a5886fed056887fd14ddc82374325c764e4e.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.02⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8b20946f8,0x7ff8b2094708,0x7ff8b20947183⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
264B
MD543c9a3646494d458841221414a4f1dee
SHA1ef1b212e2978493f6a75d5beb2242ef4f7193785
SHA2562e29e753a5192200a3f99dfa0205a8fe3df9a8d5dc3e6cf340f2658f3b9b613d
SHA512d145bd6d3722f3a3a369f3499cdabe513b68c3e0c8062a48f2d2f1855b464f272d5162d79df9a5db3409b86d6262d1394de7bb86cbf669b063b9e6aebc89d791
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
437B
MD505592d6b429a6209d372dba7629ce97c
SHA1b4d45e956e3ec9651d4e1e045b887c7ccbdde326
SHA2563aacb982b8861c38a392829ee3156d05dfdd46b0ecb46154f0ea9374557bc0fd
SHA512caa85bdccabea9250e8a5291f987b8d54362a7b3eec861c56f79cebb06277aa35d411e657ec632079f46affd4d6730e82115e7b317fbda55dacc16378528abaa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD52e814fc4e3c0f6f947f52efe32ab1ef5
SHA1552abc51cc3ab09ae0a70ed20e5919186b44c1bb
SHA256452e550b567b6b422383fc5e92d0b81402e4dfd94e34e0e15eb17efddee7d7ee
SHA51246da2f4cd464f223200dc5cb933f77a53799896a2fe1cb8534460c6d5e8dfde050549bfe7333200121c02278f434952e32184c5b1c8c3cd8d2ec60e0c77bcfc3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5cb6b198f163bc592862cf41eeaf97c55
SHA1c433560932ea5bfa8346ca7e0ac73bced957f7ea
SHA256e6b2e69d57740cbc798ea109a4b21c050dabf008c641827a1d64e3b90dc0cb8b
SHA512b1d68c57003075e64488d04bb49c911bcebba302b85b5db91f5b49c75443dd2f668b960a0c6069861d45670a375605a71faeedd698460a2fc82823f2c84d60f7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD57b5e853a24eac0eb4ec003636d46c173
SHA175f231dbd9de8387a234c6746def8c200c060624
SHA256b8bd4fe6a572cd96c1de2bff5321800ec7c017f09e9542b23386765575a0ad32
SHA5125f339738fb3003f199fd9dc4aecc338835a1ab9188684d008c99e414c1980c7d89200c8fa4b23db24adcd3a61a6ca3cb01cc756069766d161223283ad1b2f984
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
371B
MD561a47e1857e6d6fd3393c71b875a8559
SHA10a4205a8a0600eca4d84659ff8c7b33760f7a60c
SHA2564d18055735f34eae5812e8f5ef4397c1447e739e02035cd13efa1f85d4983018
SHA5122fbc2be18bc533aff6bc61fb01ef016eea676e44a5b69ed6e7b8e93009cfdd828596e918c46716d9f70c77d4f223691de05603aa18edb64716df786514f92d1b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57c18b.TMPFilesize
371B
MD5d766d89d97a9295316b50af9415307b3
SHA14f3e2e601901eaa4cf18838b7568e1266e6a47d0
SHA2564877aa34119e53e15c36817b3667153ed6547ae8fbc67df3d499093ca7f7985a
SHA512d11e1eb0f2366ef53ca54568900223f78fc8f784df7973b9e9667609994db882f7f4f4e4f4c1990e2682f550fff22c3e8268110953a3086421ecfbb661b51a06
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5a95bd33e52776906ba3815af7fd81d8f
SHA13121ae4d355b80876c7fd9ae74b9128b67c6c273
SHA2565e2763c4444cc6526f1ae88912b8db03ef006b68c151c9cb410704a74b9f1e1d
SHA512553e597539b2edaaf39aa2a383bf64088fe94a87c03656ffa0b1c5cee4287f896227518217ecf0b58eb1124143bf4e4fd0ed679a3d7c5efa288f16cb3f92950a
-
\??\pipe\LOCAL\crashpad_1240_BIULALNONRFELVGEMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e