Analysis
-
max time kernel
545s -
max time network
485s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 16:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cas5-0-urlprotect.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2fwww.docstoreinternal.com%2fnam%2f7094d542-3815-4c82-b1d5-6917d0443cf4%2f38d37282-926e-4e08-be90-1c2d0b1186a3%2f9ce46d44-88a3-4a6b-bb37-02f6738f25e0%2flogin%3fid%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&umid=30f73825-fb21-4a80-9235-5a94a8e702fa&auth=fbd9a64a18500230246a4ccb62856c7dc383f35f-e6ebbeb4d74476bb6c004d1ead964618a097fc8f
Resource
win10v2004-20240611-en
General
-
Target
https://cas5-0-urlprotect.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2fwww.docstoreinternal.com%2fnam%2f7094d542-3815-4c82-b1d5-6917d0443cf4%2f38d37282-926e-4e08-be90-1c2d0b1186a3%2f9ce46d44-88a3-4a6b-bb37-02f6738f25e0%2flogin%3fid%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&umid=30f73825-fb21-4a80-9235-5a94a8e702fa&auth=fbd9a64a18500230246a4ccb62856c7dc383f35f-e6ebbeb4d74476bb6c004d1ead964618a097fc8f
Malware Config
Signatures
-
Detected microsoft outlook phishing page
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3152 msedge.exe 3152 msedge.exe 3336 msedge.exe 3336 msedge.exe 4560 identity_helper.exe 4560 identity_helper.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe 3708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
Processes:
msedge.exepid process 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 3336 wrote to memory of 4044 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 4044 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3508 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3152 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 3152 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 4340 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 4340 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 4340 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 4340 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 4340 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 4340 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 4340 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 4340 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 4340 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 4340 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 4340 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 4340 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 4340 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 4340 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 4340 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 4340 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 4340 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 4340 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 4340 3336 msedge.exe msedge.exe PID 3336 wrote to memory of 4340 3336 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cas5-0-urlprotect.trendmicro.com/wis/clicktime/v1/query?url=https%3a%2f%2fwww.docstoreinternal.com%2fnam%2f7094d542-3815-4c82-b1d5-6917d0443cf4%2f38d37282-926e-4e08-be90-1c2d0b1186a3%2f9ce46d44-88a3-4a6b-bb37-02f6738f25e0%2flogin%3fid%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&umid=30f73825-fb21-4a80-9235-5a94a8e702fa&auth=fbd9a64a18500230246a4ccb62856c7dc383f35f-e6ebbeb4d74476bb6c004d1ead964618a097fc8f1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd08de46f8,0x7ffd08de4708,0x7ffd08de47182⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,16354645064921450867,7369589873738072685,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,16354645064921450867,7369589873738072685,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,16354645064921450867,7369589873738072685,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,16354645064921450867,7369589873738072685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,16354645064921450867,7369589873738072685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,16354645064921450867,7369589873738072685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,16354645064921450867,7369589873738072685,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,16354645064921450867,7369589873738072685,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5484 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,16354645064921450867,7369589873738072685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,16354645064921450867,7369589873738072685,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,16354645064921450867,7369589873738072685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,16354645064921450867,7369589873738072685,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,16354645064921450867,7369589873738072685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2696 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,16354645064921450867,7369589873738072685,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5980 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,16354645064921450867,7369589873738072685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,16354645064921450867,7369589873738072685,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD581e892ca5c5683efdf9135fe0f2adb15
SHA139159b30226d98a465ece1da28dc87088b20ecad
SHA256830f394548cff6eed3608476190a7ee7d65fe651adc638c5b27ce58639a91e17
SHA512c943f4cfe8615ac159cfac13c10b67e6c0c9093851dd3ac6dda3b82e195d3554e3c37962010a2d0ae5074828d376402624f0dda5499c9997e962e4cfd26444c0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD556067634f68231081c4bd5bdbfcc202f
SHA15582776da6ffc75bb0973840fc3d15598bc09eb1
SHA2568c08b0cbceb301c8f960aa674c6e7f6dbf40b4a1c2684e6fb0456ec5ff0e56b4
SHA512c4657393e0b9ec682570d7e251644a858d33e056ccd0f3eebffd0fde25244b3a699b8d9244bcdac00d6f74b49833629b270e099c2b557f729a9066922583f784
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\53740aaa-0237-4a27-b411-7d2ac7e2851b.tmpFilesize
7KB
MD5978bc5249e767015928dff71b4e363c6
SHA13aba32d9022e6a46ba9984ab37a339d3cdabbdec
SHA2567382ca7f2c8476e83269d7a386af172d9a2e9adc4cc7d53780d99556f4c0f4ae
SHA512bd27bd31761a4937a81b207ef2ad139bc84881402ffc4622fcb46f034adc87022f76f3325f873fd5138d9b1e679fc29cda87889d0a674c797ce23a6e71f491b1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
120B
MD536b63f2e13e0376cc7364e5f82cf3e7b
SHA1d7cd804c817917f3894ea55a62894faa74c77ea0
SHA25689acc0da7d15a2b66e69b32030f66f393fdc9372c639c42c56eb7123a843553d
SHA512d7e4e7596bec6ea8a34559d1ace49c8bf4c8c79a63c115b015b220e8effcac657363cb62d206461fb1503a213a65be6c214bf4a7e57b6ef992a8142c4d5b8cbb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
288B
MD5ae41f96bc4efcd09c561f3ec6667c75a
SHA1d97130d6b386c1e16d693a1404affab142c7354f
SHA25644e9cd7c38db561f9ba1de256e566ff982d53e6954a73b8bec98dbdcce031882
SHA512d2b8097488844b100268865bd23432e7e401bc62e57f70ba26ca6074b702308e1b3795528811f84feebd0e0b72d9c80fc2a8bd83493db51db32342c87124dd78
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
120B
MD58e3de8df194ac9df8353da6252013c86
SHA16e5d1a033c852170d28c6abfd96c8001a5d9226f
SHA2569069ae3ad95dffe76a164fd6cba84b711c8a8b5907409ac9d11c8e62bc359adf
SHA512b9f5888b43631aa5380c5b9408ea74876174f56a05d35f8bff87d94b6d9eae5007cb543d704c624e3b3969e3edc5f5f4674e3ec85cd9eb1f281cfc3ebfafdc0e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
144B
MD573e8281e128d69c8fd9a7fddc47a0416
SHA1d07a700ad96262332c658df2ec00012d50ebe638
SHA2568e1d979ccd6992b74789f2f81dfc353be7bdabbe356575939b9534f40b61e850
SHA5123ea39d00aa2a6527b3b480bce6c1d2d7a8de758cd2f4008a549d7c9c7d9f19206be82f94e99750f7f161ed3fb49a72e524ab45fc225281f9ba00b716a2552c83
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
434B
MD54a94a0343e8209f8fe930c9df8ecaf2e
SHA1058fd63cc02cdc10c2fa8ef941286a8fc33cdaa9
SHA256ee850832c84247a35ca918ca7eac5eeb4b5dca3d48c2df836eeaa4717ddf4065
SHA5122bb7713c8b749751e743f5378b9bb8dc9ce6b31b39b7bab5b2f3bd273c47159d21db54d1c50e2b376d9760a08f4f4a98af1989abc1de2816fd39dcb1497b76bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
1KB
MD563e6faf0980211536ef89ac214e52e17
SHA16d8f380e624db392b60969104816b838a7f76604
SHA2560cdea10bee873cbb237e43998ad9562506c8b2af70d282e397d9056ca3919f51
SHA512345063133dbd319e7d6b411110aadf26a68cab087aad5ab93b77031933501a1b546b32835390f16649545e82adc47efeeabc28b81a6a9907f7a31dacf5138fad
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
1KB
MD56a731b358c39907cf37c072d73f549f9
SHA1a40853ac53edcb7c43ab49b0edff1f7ac77da587
SHA256ba01d9c70b8793de70dbd57eb8d5f79fe55386316425738cd42e8b81fccad512
SHA512966a43576febd9f81616c0b605eb0109f6447c01332a116ba1e9f7d3146b8e336f9700f8ae3156b2597e1894b951c969191775801747523012032cc05f730a69
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD55ce115d3480dae2654dc94b28ffc0eca
SHA1ef47576a21cb0c2340982cd317486296fc50c63e
SHA2564c20b2841a5fecaecfedf97c57a521cc2081b5768d4fa4d2425813c7d3310390
SHA51223e79bfac94e958480358e3013fb8c671f04e2eaecabaa7f6dc1b5db9d6bb69e67ff132752a7ec7402bae3b0a2d9257ea5e59b5fb1af4b328ec61528e29c387b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD5a623a452562807ebce82592500088afd
SHA1e7defcc726e0997b26522d0dcc34751381a86a6e
SHA256bf49546147dd7186cca878b56712169ecfbddf72d2ad20420da60e06991dfcfd
SHA512d31b09396a5a2738c038bb103268d2d676b3cb1596d5df8f549c2071bba6366ae1c8f33d9611f91699073b99c596320323a35232c8e51b438f378d989e7df4ff
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD573b046695f25821992be5b63abadebb5
SHA19d195f9d58e22ce00e15374e29873f230f2fa896
SHA256e8bbcda0f8efe5dc81b7db36d2d2f6d400ca63a41492e341c97f10839caed01a
SHA512eb2d33f2467c8fde5e26118f615a78017c6d1e13f948b5ae1831815ff3e556bdd81c7da68c3a890fe22d404ec5bcfd9bece5189bb52f6b3b2ee51286b71d04e0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD575fb42f5d97c1a84ddfea56b8f8db9d1
SHA10a9d3512ffa72fead5424dfe679f1722ac504b22
SHA2565703872c4ee56b4495fbacd28767b65508360e1bcee826598522da391c2be9ac
SHA51236bf90fd2ae4253147f8b05a2b914235604c5963dad4f6c166976f762360689cb158b5e53176a741abdbe5a6c476557020867adea099c4c4e0343e558d79e9a7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD52322574fce12ec26ab84568bd4c3102f
SHA1d95858979e2702091c5213a337130d4a53e8ff47
SHA256738d5011349ac85596ebfb69a2ca44d19eae6425a3a20322473a7a9c9f55439b
SHA5122878eca15a1e932e2665c049e312389c742d9ffc90bf55ea824a7651ff19b11c425d1a14852654a828892e8b01849c57d6aa9174e8c2599a27678eccc93e5e80
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
706B
MD5ac0adb4b54b87183e8e15b31ed332388
SHA1da28d35bf3db48407c119fdbb7fd4226eead8077
SHA256ee3a854067710e01239ba5e468949a5118e90dc1405ea7a5fe81359b98544031
SHA51202453ca711a3fec66d1783875654853f824e5503aab2784ef9e1c9f53ad85cbb768b1b0f01de2e7b8f3d52e5706669d09849ce5806d4f69a8e5009ef1bd27b1f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
1KB
MD5bf5ba5ca3f897fad49581dafdd4f252c
SHA1db374ef041609c1c361d3d66879b75d5aebffa32
SHA256682528224ea031342a2754f218ef3615c5bf710b45e26faa9e333954d242a23d
SHA512c12a0f7216297546b5da6c32f6f92edba90f37c817409198d13d0bf0d6c3744265e40e432b4b39e3c65ab9dc0ef26c4054d1cbc7606ee2c4ed5ffb90b64e7a66
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
204B
MD562467b9c1acc17d3ffc44b0bbc916ab9
SHA1a73c27c9e8561109e7f145505341686cc6ef2411
SHA256dec743926373fa6dba1087d8b28cf139c88362159b55d49e58088cf3ecae7bb0
SHA512d4890aece17b60e501088a99fc9594a4ec14f78a6eba3f6a3339f7062be2c84c8d6541c9138a327b4e75285cd809e78db62750a1a9fc0917e3ff9c3eeca289c8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
204B
MD52be84d08626ef890485f337ea34e2b43
SHA1c2f9c832e82f7647920250cc21b90a6d8d0be070
SHA256ee9c24302c9fc32e2efbc9e0f073a2a3537684f1b8cb0fe8fd419cdb416252e3
SHA512d19fea3917ae7ff8928c574f012e05b77a6f814a8f9f44d33820907a9ba134232316c5fbb54614bd4a736af55a21fbdad898ad417ec13f47dfea629e1e974111
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57efaf.TMPFilesize
204B
MD54280566dfcd049814589d309790c4fee
SHA16f2c24c491078993e43eacfe18e1f2dd842cef4b
SHA256c083df209186fb68500451d7ae59cd1a0b7e4de8636f2a40ba154d541b64fd35
SHA512874cf6bb8661eb62594bcd12d59fc83c34533949d8ae0919628c848bc3dd5ceb180794084322a7ca2810c2d3d3f0922ce2fa1dec63b4986a65d0a18e7376b2d9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD574e4b9c575165dbfd79d9501686cc3f0
SHA108c67bf9958e9f59086dc658bcadca82d9a9c855
SHA25665d1f7ccf9c39820bdd5fcb75579344f5a92b1c83b92481a13d3acf8ccf04053
SHA51223c11ce7f15d589b617ffd16f1a17c200ab670dad6797646ac116405a392aa86f05ddde8b018338d8a345713901c208e77a57cf611dc049f6cbedba462c02676
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-msFilesize
11KB
MD59b754074e9b673221e97618a13bec78e
SHA1f95573795861f1fc5ebeea94b9cf452a30a67bd2
SHA256261d20e91a78585ba8dfac15a63ee1e32bf547c2e9daad083f0488384fc1cd02
SHA512a8e1c8f90d4ca9655dcce8cae1c9440bd42a6224e1685e6f2e5fb72368f2fc070d6fee5d1964dc3ea2c317e3bfbf9ca1eb03cb8bf58ce0f52f3be723bbfc1e1d
-
\??\pipe\LOCAL\crashpad_3336_EPBQHFZSLWCSTBKVMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e