Overview
overview
4Static
static
1URLScan
urlscan
1https://stopify.co/f...
windows10-2004-x64
1https://stopify.co/f...
windows7-x64
1https://stopify.co/f...
windows10-1703-x64
4https://stopify.co/f...
windows10-2004-x64
1https://stopify.co/f...
windows11-21h2-x64
1https://stopify.co/f...
android-9-x86
1https://stopify.co/f...
android-10-x64
1https://stopify.co/f...
android-11-x64
1https://stopify.co/f...
android-13-x64
1https://stopify.co/f...
android-9-x86
1https://stopify.co/f...
macos-10.15-amd64
1https://stopify.co/f...
macos-10.15-amd64
4https://stopify.co/f...
ubuntu-24.04-amd64
4https://stopify.co/f...
debian-12-armhf
https://stopify.co/f...
debian-12-mipsel
https://stopify.co/f...
debian-9-armhf
https://stopify.co/f...
debian-9-mips
https://stopify.co/f...
debian-9-mipsel
https://stopify.co/f...
ubuntu-18.04-amd64
3https://stopify.co/f...
ubuntu-20.04-amd64
4https://stopify.co/f...
ubuntu-22.04-amd64
3https://stopify.co/f...
ubuntu-24.04-amd64
4Analysis
-
max time kernel
1680s -
max time network
1685s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
30-06-2024 16:21
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com
Resource
win7-20240508-en
Behavioral task
behavioral3
Sample
https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com
Resource
win11-20240611-en
Behavioral task
behavioral6
Sample
https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral7
Sample
https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com
Resource
android-x64-20240624-en
Behavioral task
behavioral8
Sample
https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral9
Sample
https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral10
Sample
https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral11
Sample
https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com
Resource
macos-20240611-en
Behavioral task
behavioral12
Sample
https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com
Resource
macos-20240611-en
Behavioral task
behavioral13
Sample
https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral14
Sample
https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com
Resource
debian12-armhf-20240418-en
Behavioral task
behavioral15
Sample
https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com
Resource
debian12-mipsel-20240221-en
Behavioral task
behavioral16
Sample
https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral17
Sample
https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral18
Sample
https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral19
Sample
https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral20
Sample
https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com
Resource
ubuntu2004-amd64-20240508-en
Behavioral task
behavioral21
Sample
https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com
Resource
ubuntu2204-amd64-20240522.1-en
Behavioral task
behavioral22
Sample
https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exemsedge.exepid process 5056 msedge.exe 5056 msedge.exe 960 msedge.exe 960 msedge.exe 2464 identity_helper.exe 2464 identity_helper.exe 1560 msedge.exe 1560 msedge.exe 580 msedge.exe 580 msedge.exe 580 msedge.exe 580 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
msedge.exepid process 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe 960 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 960 wrote to memory of 2164 960 msedge.exe msedge.exe PID 960 wrote to memory of 2164 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 920 960 msedge.exe msedge.exe PID 960 wrote to memory of 5056 960 msedge.exe msedge.exe PID 960 wrote to memory of 5056 960 msedge.exe msedge.exe PID 960 wrote to memory of 3592 960 msedge.exe msedge.exe PID 960 wrote to memory of 3592 960 msedge.exe msedge.exe PID 960 wrote to memory of 3592 960 msedge.exe msedge.exe PID 960 wrote to memory of 3592 960 msedge.exe msedge.exe PID 960 wrote to memory of 3592 960 msedge.exe msedge.exe PID 960 wrote to memory of 3592 960 msedge.exe msedge.exe PID 960 wrote to memory of 3592 960 msedge.exe msedge.exe PID 960 wrote to memory of 3592 960 msedge.exe msedge.exe PID 960 wrote to memory of 3592 960 msedge.exe msedge.exe PID 960 wrote to memory of 3592 960 msedge.exe msedge.exe PID 960 wrote to memory of 3592 960 msedge.exe msedge.exe PID 960 wrote to memory of 3592 960 msedge.exe msedge.exe PID 960 wrote to memory of 3592 960 msedge.exe msedge.exe PID 960 wrote to memory of 3592 960 msedge.exe msedge.exe PID 960 wrote to memory of 3592 960 msedge.exe msedge.exe PID 960 wrote to memory of 3592 960 msedge.exe msedge.exe PID 960 wrote to memory of 3592 960 msedge.exe msedge.exe PID 960 wrote to memory of 3592 960 msedge.exe msedge.exe PID 960 wrote to memory of 3592 960 msedge.exe msedge.exe PID 960 wrote to memory of 3592 960 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://stopify.co/film.php?idhttps://youtu.be/dQw4w9WgXcQ?si=PVZoxY1NY1sWsfwp=O6K4FC.com1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffde9353cb8,0x7ffde9353cc8,0x7ffde9353cd82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1828,1452408874496089304,3354993424282657216,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1828,1452408874496089304,3354993424282657216,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2072 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1828,1452408874496089304,3354993424282657216,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,1452408874496089304,3354993424282657216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,1452408874496089304,3354993424282657216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,1452408874496089304,3354993424282657216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4584 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1828,1452408874496089304,3354993424282657216,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,1452408874496089304,3354993424282657216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3904 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,1452408874496089304,3354993424282657216,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1828,1452408874496089304,3354993424282657216,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,1452408874496089304,3354993424282657216,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2100 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1828,1452408874496089304,3354993424282657216,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1404 /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1828,1452408874496089304,3354993424282657216,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD56f738fcca0370135adb459fac0d129b9
SHA15af8b563ee883e0b27c1c312dc42245135f7d116
SHA2561d37a186c9be361a782dd6e45fe98b1f74215a26990af945a2b8b9aa4587ec63
SHA5128749675cdd8f667ff7ca0a0f04d5d9cad9121fd02ed786e66bcd3c1278d8eb9ce5995d3e38669612bdc4dccae83a2d1b10312db32d5097ef843512244f6f769a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD568de3df9998ac29e64228cf1c32c9649
SHA1be17a7ab177bef0f03c9d7bd2f25277d86e8fcee
SHA25696825c1e60e4a87dc5dbae78b97104e6968275fa1602c69053d0192cae143f43
SHA5121658b0bc504a8a5c57c496477cd800a893d751f03d632ef50aff9327cd33ad0e4e4f27bcb85b20bd22bef2ca65600b7d92e2a1f18fd3d08ad6391983de77beaf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
456B
MD544eb5f40380894d21a705265675db391
SHA12ad0cdf231f262fa0148474c9a88c45ec4bd83bf
SHA25684616d3b483143555c67b1625605587fa964b6cdd5ac49f93974c966fe3d0f31
SHA512120ea98eff9c61b00d2c5e6cb89e8fa0969b170479640247b83b8970cdc66910569a764aa3a80d631581ffa33e695928a44e0febcdf6024ef1a2d7610c5f4abc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
2KB
MD5f4fe8196f16a68153e849b03f12441d2
SHA138b573a28763db1f644e8c54f6d44779fa50480a
SHA25674c8765e56b566cec93a44371f5053d5cc7d8c34ea30fb926a6e90cc8a318dea
SHA51281f0265289e8c68bca69670de45b632391624f1f998da3d4db5c857d5ab22dd3cf86007eda066b9abe4235c0fde6f75efbec24d1149bfa54a7feb47ae6971268
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5c4f81f7c0a3a4c5aee919d6c81128722
SHA13494829e6d390e3683c0873db989c3515f35c7c3
SHA25693fc64e84d326c346c67ed48de8b047fd00561773f8a6ab6f0e902e8d15a6610
SHA5124ae04102948d04bc760b09bb57df9aec635d2fe3eaee219d441a1c937ca10726b0688785f71cf99e8e8b0fff588c22481e504e3db35c585a121fb7a8436a6527
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD55d937264b2146287594ad0c5e417616c
SHA138651e442a675225680e70b03b3e6c4c2e96a05a
SHA2562006537ed0aa22d507e2bc374b0b272806cc670154b322f3994b1fa4ff24bc6f
SHA5123b7f4762f2d210a3adf20cd5c378ffe77ce5ba64e40180b446f527f04b8c1a1ccfbbec46ecc90f3240acb96c0828f93ac5cb6352cbb6794d9eb0c99277ac9634
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD588add4cc54cf623fdac0b7c49e027a6b
SHA18da82237ad8097dfed2540ce544ae921e9958b11
SHA256021846419b48be7a2668971dd757dbf7dbe93740892b02c4e23704142b5a4a7f
SHA5120f759eded8beeae6a8159d0d1b898232194050a4849173dc2226bcd78348c7ca8a749acbd2002367794496003200de2952c6444523da20cca24f2ccfd2a473d1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD53b969ac185e470c801c66a16eeaaa6fb
SHA193f446dff8e8497d68368a82720b46a562f9651e
SHA25654663d797e328f0a8b7e6ba7a38969bf10d71fea61219512f521769582e2f4fe
SHA512eff801b67db3a2e230da80e9e962a72408bed25882c74f7b51ed1934ffde4e0bfa368de8324cf6c6163527c7406573be9a305301fb6ddb1210191d978ce3e479
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
11KB
MD5116d1baed1ac7ce9017283f88d8ee1a1
SHA1256a765c7abfb921065832a3593d9c21d3910e89
SHA256c36b82122fcb22d379bca72f95220a57dbab13a1a09fe15603a82f4f852b8a98
SHA512fc11550cc3f732b7707da81bdd17c5b1bd23a9e2d26e025326527a128f935dedf16038b64ba088bf23f394ca7e1cedf464cf5305a59a06382b8830ac6288d14a
-
\??\pipe\LOCAL\crashpad_960_TQXNFLJEKGEEHOOZMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e