Overview
overview
6Static
static
3offset dum...sample
windows10-2004-x64
3offset dum...sample
windows10-2004-x64
3offset dum...sample
windows10-2004-x64
3offset dum...sample
windows10-2004-x64
3offset dum...sample
windows10-2004-x64
3offset dum...sample
windows10-2004-x64
3offset dum...sample
windows10-2004-x64
3offset dum...sample
windows10-2004-x64
3offset dum...sample
windows10-2004-x64
3offset dum...sample
windows10-2004-x64
3offset dum...sample
windows10-2004-x64
3offset dum...sample
windows10-2004-x64
3offset dum...sample
windows10-2004-x64
3offset dum...sample
windows10-2004-x64
3offset dum...82.ps1
windows10-2004-x64
6offset dum...10.pyc
windows10-2004-x64
3offset dum...au.dll
windows10-2004-x64
1offset dum...ts.bat
windows10-2004-x64
1offset dumper/main.py
windows10-2004-x64
3offset dum...10.pyc
windows10-2004-x64
3offset dum...10.pyc
windows10-2004-x64
3offset dum...10.pyc
windows10-2004-x64
3offset dum...10.pyc
windows10-2004-x64
3offset dum...10.pyc
windows10-2004-x64
3offset dum...10.pyc
windows10-2004-x64
3offset dum...10.pyc
windows10-2004-x64
3offset dum...10.pyc
windows10-2004-x64
3offset dum...ase.py
windows10-2004-x64
3offset dum...tor.py
windows10-2004-x64
3offset dum...ode.py
windows10-2004-x64
3offset dum...tor.py
windows10-2004-x64
3offset dum...nce.py
windows10-2004-x64
3Analysis
-
max time kernel
1797s -
max time network
1737s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 03:31
Static task
static1
Behavioral task
behavioral1
Sample
offset dumper/.git/hooks/applypatch-msg.sample
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
offset dumper/.git/hooks/commit-msg.sample
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
offset dumper/.git/hooks/fsmonitor-watchman.sample
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
offset dumper/.git/hooks/post-update.sample
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
offset dumper/.git/hooks/pre-applypatch.sample
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
offset dumper/.git/hooks/pre-commit.sample
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
offset dumper/.git/hooks/pre-merge-commit.sample
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
offset dumper/.git/hooks/pre-push.sample
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
offset dumper/.git/hooks/pre-rebase.sample
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
offset dumper/.git/hooks/pre-receive.sample
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
offset dumper/.git/hooks/prepare-commit-msg.sample
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
offset dumper/.git/hooks/push-to-checkout.sample
Resource
win10v2004-20240910-en
Behavioral task
behavioral13
Sample
offset dumper/.git/hooks/sendemail-validate.sample
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
offset dumper/.git/hooks/update.sample
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
offset dumper/.git/objects/4e/b9f19865434d5fb04fe5766f7ef3ee6c016482.ps1
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
offset dumper/__pycache__/main.cpython-310.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
offset dumper/bin/luau.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
offset dumper/downloadrequirements.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
offset dumper/main.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
offset dumper/main/__pycache__/__init__.cpython-310.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
offset dumper/main/__pycache__/base.cpython-310.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral22
Sample
offset dumper/main/__pycache__/boundfuncdescriptor.cpython-310.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
offset dumper/main/__pycache__/bytecode.cpython-310.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral24
Sample
offset dumper/main/__pycache__/classdescriptor.cpython-310.pyc
Resource
win10v2004-20240910-en
Behavioral task
behavioral25
Sample
offset dumper/main/__pycache__/instance.cpython-310.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral26
Sample
offset dumper/main/__pycache__/maindumper.cpython-310.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
offset dumper/main/__pycache__/propertydescriptor.cpython-310.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral28
Sample
offset dumper/main/base.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
offset dumper/main/boundfuncdescriptor.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral30
Sample
offset dumper/main/bytecode.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
offset dumper/main/classdescriptor.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral32
Sample
offset dumper/main/instance.py
Resource
win10v2004-20240802-en
General
-
Target
offset dumper/.git/hooks/applypatch-msg.sample
-
Size
478B
-
MD5
ce562e08d8098926a3862fc6e7905199
-
SHA1
4de88eb95a5e93fd27e78b5fb3b5231a8d8917dd
-
SHA256
0223497a0b8b033aa58a3a521b8629869386cf7ab0e2f101963d328aa62193f7
-
SHA512
536cce804d84e25813993efdd240537b52d00ce9cdcecf1982f85096d56a521290104c825c00b370b2752201952a9616a3f4e28c5d27a5b4e4842101a2ff9bee
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4292 msedge.exe 4292 msedge.exe 5052 msedge.exe 5052 msedge.exe 3588 identity_helper.exe 3588 identity_helper.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
Processes:
msedge.exepid process 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: 33 3008 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3008 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 1456 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 5052 wrote to memory of 4996 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 4996 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 1952 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 4292 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 4292 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 5020 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 5020 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 5020 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 5020 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 5020 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 5020 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 5020 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 5020 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 5020 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 5020 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 5020 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 5020 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 5020 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 5020 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 5020 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 5020 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 5020 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 5020 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 5020 5052 msedge.exe msedge.exe PID 5052 wrote to memory of 5020 5052 msedge.exe msedge.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\offset dumper\.git\hooks\applypatch-msg.sample"1⤵
- Modifies registry class
PID:4884
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff89dc546f8,0x7ff89dc54708,0x7ff89dc547182⤵PID:4996
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,12243988499038211683,7521961862639576190,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:1952
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,12243988499038211683,7521961862639576190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,12243988499038211683,7521961862639576190,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:5020
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12243988499038211683,7521961862639576190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:5036
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12243988499038211683,7521961862639576190,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:2004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12243988499038211683,7521961862639576190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:2616
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12243988499038211683,7521961862639576190,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:1844
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,12243988499038211683,7521961862639576190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:82⤵PID:4648
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,12243988499038211683,7521961862639576190,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3588 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12243988499038211683,7521961862639576190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:548
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12243988499038211683,7521961862639576190,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:2424
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12243988499038211683,7521961862639576190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:3200
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12243988499038211683,7521961862639576190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:4476
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12243988499038211683,7521961862639576190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:4248
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12243988499038211683,7521961862639576190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:3788
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2036,12243988499038211683,7521961862639576190,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5984 /prefetch:82⤵PID:2504
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2036,12243988499038211683,7521961862639576190,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5308 /prefetch:82⤵PID:4544
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12243988499038211683,7521961862639576190,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:1900
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,12243988499038211683,7521961862639576190,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3996 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4392
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2892
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x460 0x4c81⤵
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000008Filesize
20KB
MD53684c7775bc328aedb86315ec6891439
SHA1cfbff177f45afdf36026595ba0abd3bb59f86a43
SHA256e8d182897c2ec12664cd8e86b31ed441f775479b41a7f1ba39278d32e29fed87
SHA5122f5f00b2018c4632260b7b26ed4d524dcdcc02f66c3e561a3ccef3a023c042ffefc3028329b4c58b59c4186936d51514b892bed0da00a410502b81bc95b6230f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000014Filesize
47KB
MD5c1867155a9d5c9821327479b0012ba58
SHA19445f077d117a5e7085f15fe521f3ee31c4fb056
SHA2566a4871006c55105f07a16486f6d07ff21bd9134dcadd80cf24652f85074908a4
SHA512b0118fcecc0a1f64bb69f112de35609808954a950f5a78057390a8ad2013324ee60ac1ef794bf5268d89d23df0ac711ef998493610c4e15576a967e99529b5d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
456B
MD5b6117e839a490cb227743a5fb16f94ac
SHA17771b96e2c1f0f37a1b41c553774fbdfbc2fcf69
SHA256019eefefa023ba61899301627eb453110ae9707f7b777c35197a5a396b02a25d
SHA5126b2117faff67ab3b9e513695167b8b0b486f722e739de5d9b472131d7b815eac4f80c7f43b971d90e363b9b2b7460858b139d00c538a37e3cb9ce2ccbb070057
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
648B
MD568d0a78bc1534ac6fafe989dd923adf8
SHA10857d9a108b10278392283138859631d33a3f982
SHA256d09931c69a9f893d685c299ca83e1a2d9a72c6b7ddc87732d0bae9ba5514000d
SHA512bd5392a71e2f41274c68ab24d2ea3dccef0c5970d612307ac75349b8cebc0503597a8ae88856121be5e35fab85bc20465b76f8b7344a941d06c4fb86d01bd4e3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
2KB
MD55e78be7c7570f7ce816008e488493da2
SHA1ca3ad8880b69afadc61b4e718c499c2b33b47747
SHA256d8d4517ce6049310414253baa6835f51ac5dd812f909bae6c30d89d066ec3e9f
SHA512a29c9dcfd66a25629d31ebeea1ce2af286742b4cc4eddac04f00cb2809634b5f0fd961c95215090157522af6ac44028a37855db93eeebcb637700dce2ec772bd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
3KB
MD5831cd400edc69ddf8644e303ddb6e03d
SHA128dbcfef7d0f963e4669ce873b0af19e6f90cd4b
SHA2560ded04d1ab486ee767df731a4098b5a8368642bceb2d3d25084f4a9da505b23f
SHA5126379e760e527ddf9c2653d592868ef665aaf2a336bf553995917a673e7fcde8eee290c83bc342a5ad5f173b2544778e3b8bf79083a0dfc811d9fb64720f165f0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
3KB
MD5331cf9372b1554858b638d4e220f95f5
SHA11d06a7d611f28a6b7f06318b5066605e488c2103
SHA256e7da854414f156d2307ab44ecf40ca48cd42ac2da1ca1a0b08f368387a310098
SHA512326331da9f25430610e028e2f125e0efe1463ff9b13f59ae8184b543301e5c5cd516f2e58ab6c39734d3970b223d26cee58a5d9c1c0ab8d34a5edf2b5376e29e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
3KB
MD5b0f53e7fe7898d645977cd7c5e7a1810
SHA1c7ec8142fecfc919b2036d8ecfa771ca468313ec
SHA256a3774369283ecbeef7162969df3bbcb4963419ae3b99183d14f946982a4e9e5c
SHA5123830ba60dd854a21bd2db8cc3e1bb14cd08af977f9b252c2d32fe1d26dd26e679033a2d51efdb5a34aa8b3d68534e898ab16c398615e280820ead22d865c8138
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
3KB
MD51822f27e26be8a2821064234879678cc
SHA1a375fb08072a561d8000629e29acdbecf1e517fe
SHA256946a751e8c3d0369bb0fb10c021c5169b321f1d2574ebaedc0f64d140f7f2f60
SHA512ad5b489e34f4d6578336e875eaabcebbc3c59f72f8edceee9e0bcf756b1b526982af554cfd46caf3d77df7d0beb9d6a3cede9f25280f9ae4edaedbfc9568ef1e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
3KB
MD51791bb8aecd571cd010afa3eb6a3eb20
SHA19dc067a8a757c683b0bfb11e86b4bed269d96758
SHA256882c3ff1f3aa842de182dcd60fcf22bab9c38a3340286acb1ae8919107553b77
SHA51248283e7a65e94ae8ef65f91b5518a5b669c4d2ff4450d74107d1d2eb2d4b0cf60fb94354b9580619d6dbfdd594ce1dfe5c38749aad51e768c1590d9ad2f69b87
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
3KB
MD566dc08136e22e865d96383efacd59bca
SHA181ca2e348b4d38c9ca261b833e4f941c899a5272
SHA2562b68f70b99992edf78f42a909fce257b4db3ce918f28fdbd33ae9a6d18a62b26
SHA512dcb407f33294d34d7c19c6296a6cc89bc047e86ff34e8be8bdeb69c71810cfed95bc85283589ad0f8ff592b5bced33d8838ea80d4a33e9f94407142c6e149a80
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
3KB
MD53d8783324d59e42744c973c643c8865f
SHA1182e1143cd5f8e45c9e411f7fd5decda6da578c6
SHA25625c08983cae4e9cb93d345c1270f16e4a29b40eb90b063d8d6bbe9a0dadb4820
SHA5124eec4d7c69c36f593984fb35e090cf8e4ed8ec624b739ded8d3088644304f77f90f74c51be624f505d994f4844836a55dbe440bb5bf8ae7a3a24712cdc3477c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
3KB
MD51a743af4affcf0a994bc644a34d9fbcd
SHA1cc2af021fba2a9aa81cd4c8f6047e17845d76c63
SHA256d4284e0da40cb3d75ea8ec5c95090ea962f5c2aed5c440038d8890f3157d0136
SHA512e5ec7c7169fcbf469b9bf7fb9723355613bb1d905a692fb6c730f76338cd2c881c89ef7ce1d48266d933d08e31b8b6e9feb0235430f0f44c65c6a4ea83f1deaa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
3KB
MD548404c258c360f24b6192fdba9cc4708
SHA1eed83dac46d0cfacb2ddffc4abffba7af7ddea52
SHA2564983cb461f7773003d4901ace222498d3f285b136e61dedb480f88f1eda6a729
SHA51243b14cd486ec9a3f95ded079a4c80493121785fa45c7ac6ff515b627d083a1cf3d0fd7b5e3b6dfc58eaf62366a1bb8d51777e1f4b244c26d033157c727b3835d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD5091bec1ac2ffdaaf55d3cc8a0571a913
SHA12d9fa6be5b3df726bc6e606d543c690a48cc8cfb
SHA25635b5aabac6c68767c853e1ca90e980276c8ab9f3814a7c5da9a395ae94f078dd
SHA51288b011ad8347e1353c2ce25c83466cd554595a12c63284e9c25190a4aef72b5eccc4deea51326d5ae32acde9a257b9e1be7e0334f0f02325fb570fb4b1149ad8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD50fb61906b344886209cdfa002f272a48
SHA1fd24b5bf3f2e7d00afcf46b09d50490a1ce830c3
SHA2569523f76f6f1d75ed01c30f61d4b33aeb27dd67724f58b6e8ceae2c33bad1debc
SHA512c971a07a7a5f84eba3ecd29981dd29fcc7de6e274ed6e27c7ade856bef65373bf943d0da71bcced51cfa448037296b33120c9787952ca130deb8e2927577c7a8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5d49a9236f848bc2850e62c839dd0e61e
SHA12fd97d3495ed188b82d9107851eaf632b0dd2949
SHA2565e5116fb952c5457267932c2c33eeb66437616261a21a0d26741a6f6ef493272
SHA5129ff2cefdb3020456ddf7fce9176e9e7d6c5e1b05132d2af0e6198f6a1c9afb3134403b7ce923e318c67f3a6166db166774ae99cc97b77c11055d7cd60e1e6395
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5e6dbbc37280cc3c69a347c072a1cdaeb
SHA1823e5c1d9a1d7ed01ca82f9c410c860594699c2c
SHA2568994c57ff8af7a30f4a874eeb22bd4ed99e2529a39b0c9094e8d8f6f1617aad5
SHA5127b840c768d412ea33f31cd7a2ca6fcc9686d7593a1d8b75dd4c59cd6ed357da88baa0d355acfdc6d6d4fd3dcdd9db8e8f6ea9e1d490d5e595a06bea49701207d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD53e22d79de42f1451cae602911a2d4784
SHA1bcad9589656f27658761827040d693a9ee894f0c
SHA256d56fbb20c2d3fe52f6dcf98b13b21f52ecdcb7931379d69770c4d8c8e7d0798a
SHA512113ad1571bf420184fb0b7f84ee80857cfed26cc9b57f47ac8c12c1d34a1b906d783efebe7ba75dbe150b13480524056a4bf945aac090089cbfbb357335c0703
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\51e6d5a1-5fbd-44c1-a783-c2604a5abdcb\index-dir\the-real-indexFilesize
624B
MD54455a7b0687d86d83e0dab05d17da946
SHA1ee428581c4cb354d2d58e162e89dbeca0199f115
SHA25613eddcf298d3b83900a38257e0b817d9c342870d4278821102fe727851ff82d3
SHA51251325347afaaa4738c3e911decf04066139d9e9a4d2aad51b6776d1c193c3a201360192efa4c742511ca4eba6aa8c022b02a49703796c7e888aca124e7b1082a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\51e6d5a1-5fbd-44c1-a783-c2604a5abdcb\index-dir\the-real-index~RFe5a47e7.TMPFilesize
48B
MD52da80c79e8f05e978d3aaef2b44c6745
SHA1c701ec59bc0c35fd9aa53572f5d97b1875a73d05
SHA256d872290a5ff675689aeaca9b3b7f1902da779310345ff1dae2444cee41dbc0fb
SHA512adc9bb75b7b516193c2d50e03b2147b5aa08438826e6364fe0b87ea9b4a253c71919801ca0620309c7d4dc4ed771507aa36726aaecd949dd1d592fb544b3c325
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\8eb32f61-d7e0-43de-9e8d-2d81c91b1ac9\indexFilesize
24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\d46b1608-466e-469a-8ec4-c612b1c32ea2\index-dir\the-real-indexFilesize
2KB
MD55f4dbe008b28753b3a93b97a035c82e6
SHA131ecaae51b69e0d5e8b8bc7800e62bb7c501815d
SHA2561a1eaa5718b807d06c906d94b9b5d109cc6b279c49648812897d2fe6c8a7b705
SHA5129094302be49b8c80cf8dc8b7df0f511f5a67660d89223055462be07284bd6da6a016dabf308f85a7fd21b1e67d2a34d62e8d62e2cf7f6ce609c37fdb3b9e0c6c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\d46b1608-466e-469a-8ec4-c612b1c32ea2\index-dir\the-real-indexFilesize
2KB
MD58c00525686c15dd239e5b72c46138995
SHA133ea2ecc9fe725397576364f83bfa6a9f6684ff1
SHA2564fa6c8a596136fc59156ee8749567a31d195bb5fc62c0abb120bc4fb4e97ca28
SHA5129f396ae037391211e06a6915731e920dbf3e51ec7bd32813d88c94d4c7af8cb4af3fc1d343e9aa356e951bdf3faeebb626f3e39a2881c645d77a95f785ee8179
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\d46b1608-466e-469a-8ec4-c612b1c32ea2\index-dir\the-real-indexFilesize
2KB
MD53c6918af1bddd1f9203e20018eecc2a1
SHA102ef77dd49e6979f004043d56d966c92fb407f4c
SHA25642a8582b2a1d33b67bd7bf656e3c9cdc9f102df2cebac855f7dae811817e6dfb
SHA512c88fd44402d175f63c0aa32b4662cb06a9c66aeae2437d8074128b0ffffd7855030db43d249323f9bac314540dd70f1ca865a54220a09cb5f29517422bcb60c0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\d46b1608-466e-469a-8ec4-c612b1c32ea2\index-dir\the-real-index~RFe58dc13.TMPFilesize
48B
MD50cb72812bdddbf1b9aa1f508d91f21de
SHA1e104264bbc844a1c2d54ddfeb9245a09b7bcf4d5
SHA25601837154b1aea75970f7423d72b2b9a30aa4b7fe6c62ad34908ae723dbf05ce7
SHA512060ad70688d2840e7cf36ef8a1171013963a0bf3ff2b42598afdadfa171e44360b0c45b0979b01bf078e2047ab79a90fd46309e83b6b650f51192afee69fdd1d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
148B
MD5f5f22e35a810a57837e3922757a49b56
SHA1b2f29b2a3f452ceb690cc139662e101b9e2e1935
SHA25602faa30a6525aa5aa281b33bf99b6f64d9f6a0742d68020a0da492f268052475
SHA512f4e08da4b535b7df27a62c5c4bc69c68a25b833030be2f0390ec32067cc2ffb0a8140331c1bacfd633a21233f3465e24a64a153091203b0d7abcce98343a0b76
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
157B
MD59c82806cc26776016bf3cec63ae3fded
SHA13474745202c311237da5195082b7b113ca1f002d
SHA256399852c2eca1c15b18662252b65685b4bcd6019e6690199254e8c5820bcdb596
SHA51250178389a7fe6037899ce7671a05f68c801f18b1d5df388a612d9738442eb2691dfb9ae40ff7b34c64e50e6b98b1a8e0a719ec9ac16fb102b564e771409d04e4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
89B
MD59b8a91664cb6453bf39a3729b89570ba
SHA17bd4bc7af4a953e08efff5034df34d3183de6092
SHA256635a92c1e3a0d7ff2ceb046147e09ce37efa97b7555b6ddbe4b46060fe7c59cb
SHA512f2c6c568976efff5b135028e16a4aa26d6bac9e2c71168fcf4d6e787382b7602c70d54b099cd3fa2894a81709382b25986c9e75d698faac1a84bb4ac18485d7d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
146B
MD57e512d972cbd9b145c4a4c0e916e1ccf
SHA1a10449341f6a986589194fe7254b88d1c050a39c
SHA256e1419bae826edb869cc54f01014849e0b9c6c514392576f01936ddb55af52a27
SHA512478cea46ee41350cdc135f2c6a1f9d9ae41e9abb57440e796122f7d74acce5d1fb2b9307d11d373c60bfea79fa44a9dd0e9b68c32f35c9e2e4a8e424b11e9a1e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
84B
MD5c3036b115ca2ac95108a8c3de5b462ad
SHA16e3a2e675be26e8ccb0e0c50c342009c4148a0a7
SHA256c426b509d23fcfe294b54e05114929937f2bdb8b1bac3cbc8a8a6dff8749261d
SHA512340e4e254ff28e9dbe860ddf05e1d5c0f6ce776e062f0fe541915d24b6d162b1a09a9406f06b1d480a14755bfa0e92df26e7d9b6fa209f06c0499993bf495b58
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
82B
MD5785b6e516113b47e33fb18430bc8693d
SHA1ba6b25618a82c614ee68aa390404a94eecc69ba3
SHA25604148b7abe5a968e5c757a067fb61e13ed0d1218a76671575769f9c2e313e585
SHA512955feb4a2d7e6893837c47db0b90961741f232417a08d2dae7aff080ebaa77b0151756179b961fcd2df813e40cbf91070391f925cfa976cb5e2478dc8664dd1e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
153B
MD5e5314a0fb88c2600cf7481222496e4d5
SHA1d356c20c57167f3bc5d6317b4bd4276e4f6f8333
SHA25644e0af27513bbcccfebb253fd230615271b8fcf6ac5f1bcfbd3813a7f626f6ff
SHA512b5e7ad5aa78ba983552e1db7fa60bb60af1e921b23dbaeda901327db10113d3e360ee7675bf3ffb1af6feddcbbec203dcad1399d93093f31641435468f588be6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
153B
MD520e50a31b3216e762cf354484fa10b8b
SHA1b0ce25d0426f3582834a354d74682837dc94562f
SHA256076d7c712fa1df830a59f890aa7933a59c0bcad848ca8dd9d86ff81841a437c8
SHA512b6ba5e9640f2f41ab552425673ebf129948983d9f10d66cbfbb3978754fd0692077f20c42f109f3843bf8336640e519ac950d3acdcb165abe0a54b37c60f132a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\4cb013792b196a35_0Filesize
16KB
MD514ec5faf6ea69898d2dc3676fa4bd008
SHA1859d496cc28fac0e54bde7fe4d9d0a7beb3fed6f
SHA25636f2f9678b7d757f37108111951f975e3f951fbcb4ddc6ffe640e2d2b8b32f54
SHA512cea7c2f0a79f880b2db908d80029598b60d720ac2e6aa93e9d820eed4719945533e02228cf64ad710bfd493fb579b6e6c9aad45dee7ae6b203efe5916e27da31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\4cb013792b196a35_1Filesize
11KB
MD54a5031a16bb14db91af45b3fbaa1c3e7
SHA1a4ec22e0cfb5a08be4f899f2f404dfe3403cf366
SHA256a55fed05acc4639ae3a2fd2f83b263ccee4e80b868b6350a256f7ca3a7c26cdd
SHA5120cc98528c30bd0197d593439c35ffde5cf31287bc31dbd1236bc6ffbeebf4bb34e580f7b18d6ba5ad2eb8bd28cfcfcc010bc3f5d8b5fb036a0e71fa23bcb8bd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\f1cdccba37924bda_0Filesize
162KB
MD53c7e4b4cd50ebbbbc5aa95a59c201cae
SHA15e894539d078b39a3a76d5ca00203c9ad97899b2
SHA25694433b1ce5f7e596b710da0b8c2b430837cc598c2ea04a2db92905dbc8b331ca
SHA5123d568ab2eb9612919f87dda282fb9b03df5599119b0bb0d896a16d3c8074ce2d089bf4431edb523673c816f4b7c91f7f701ab6b9ce47cf76a0f186a5b0c9d89b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\f1cdccba37924bda_1Filesize
382KB
MD5947aa4beff93614100f45bf29fc65231
SHA188379a3e2dc37ad3a6b2b6d2896b5ad04f7c58d6
SHA256c461271e0cfc6ec93b881121cc3ea806187178688d38f6f117ad4114110007eb
SHA512f3b14d5b42c69e78dfa954472d4d29c2bd9b9604ff41c317caecea421dc4089676875d223bc9fec571ad76c7bdd22ddfd14e81acb07964944e945920790d9e89
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-indexFilesize
96B
MD5946ac84142a0ffb58bbd115d4ec7cf32
SHA136500cdc7bc1a97bc6dbb0112031978c2af81886
SHA2562294925911f5d61673794d127fff0ee2a8c3c78d266872f8c62f73cfd3c24efc
SHA51234187d4cb4113d90e27db7f7cf204eb95d0b8b47c1954d5b967474649c9485143e3d07fda2523abbc2fd076a9c3f373356b214b2f79b753e45ecf0e1372c1c29
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-indexFilesize
72B
MD56625bfccc2236894c9d652ce1b5e0806
SHA121157b89190044be0077803cde100b2751dd8cf6
SHA25670f60b33e90d802ec96fd93aab69fed3a5d3e7176124a855dc25a30604a630df
SHA512d13d264006dd9e7e8bfc85dd8e8570b076d355e438d12868ade418c70d4a8a3b70df7fe085c6fc87be1bdd429b1244981f6cc5704cb5782c1f8361c784109e94
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58d666.TMPFilesize
48B
MD512100c22d33a62de2010e3238386a4a6
SHA1f52dac4773f72f7da60af9d1970b9ca383d4d443
SHA2565aca86ffa5809a1f4a065be7858442591780818c5092b0d3b2618891eafe7132
SHA512697fc81c61a3efe8e4c0df1c15a173dab41561bbc78328d25f23193f4b856a002b39ec38624a7f37652fec31cda98a5b94d199cb3bb859256e3f6a904a9886a0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
706B
MD568be5e29ec5c3be56fe99c875d4b906f
SHA178dbfb78c10405c9dc36e69f3b25fd412dac2ccc
SHA256df359d874f91d4131e53238ab7775f10c924633f56daebc7b3536a12df263d98
SHA5126ac1d8c37104e0ad992bd7d7c2941a4b8e018dbdd014596c4f6e93b832b56d604330f983b542ba0f57c76f94a680c677c65d78088bddf4f3d64a07b63479a0de
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5a13a8.TMPFilesize
706B
MD5622cde2af903c117b620caa89ac29d56
SHA1fbe89bfebcfab7af17a57ff7779e8db3d5b645c5
SHA256e873e713a2aa67fe01d1b2ae021feb2e31f793c014fb2f88a9ec3844582fca0b
SHA512bae972b8eadfb7e79d0c82fc52db6ec60ccb770714e8212fac4a6260f54223df0150991dae9df4fa9a5ce29ecae04366904e772c635891cc3c6d6a60fc09f825
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD50dde4e6e23388b32e455709c616c6fff
SHA1f476e1042b9ceb1820475360b141cb92cb8677bf
SHA2562872b68ba867989d52e1e3e997f4ef234877b315311fd06c52ae48d79250eaa1
SHA512f982eeeae7fda797a2b4bc9e790ca0113f3a709c7755859d7eb002c31291a487962decfa02797dd45ba4f02f90a91188e0201d1732b00720e5acd7bfa367c4cf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
10KB
MD534a6b76f7bfddf6e724a2eafafbbec92
SHA12bf3635e8495eb5d13001e69dc16d004ac2c81f6
SHA256c305ffa14072ded4ebbaab375e3284ee3cfd04fe292f84c412e7b204cb4a6a6f
SHA5123059e0b1ddd0fb2e27cb766efc8c3ad1a890feb7882f61aea377f8b1aa6a9c1fc919c01c0d99a578133975cfda03678b2ad9b69857078e4c82b79a59a7a4bddb
-
\??\pipe\LOCAL\crashpad_5052_MWLESOTIZJDIGAXNMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e