Analysis

  • max time kernel
    93s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/04/2023, 14:08

General

  • Target

    2b0b2a15f00c6eed533c70e89001248a0f2ba6fae5102e1443d7451a59023516.one

  • Size

    211KB

  • MD5

    78257e7124a0c4f9b7fdef5de59bb5db

  • SHA1

    4b77f4c87f123e7b3a4b24fc7c47b09646a603f6

  • SHA256

    2b0b2a15f00c6eed533c70e89001248a0f2ba6fae5102e1443d7451a59023516

  • SHA512

    8713c6ffa0906d1abd190a9dced04667c153c61b3fc546029cc28148cfaeb479539664f76ff481fb80cc1ed36e6cb602ce6061a1b5855992a1aa5d88062aea66

  • SSDEEP

    768:MRVQBJstupjgzZTTCrEa0pmW9QHfXNJJSYPiVLjyKlRZXaBJhqRlRZXq9+yfYRZI:/pjgz1OwaemWiNj7PihWKmqzC0g

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\ONENOTE.EXE" "C:\Users\Admin\AppData\Local\Temp\2b0b2a15f00c6eed533c70e89001248a0f2ba6fae5102e1443d7451a59023516.one"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://go.microsoft.com/fwlink/?linkid=2083734
      2⤵
      • Process spawned unexpected child process
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:224
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffdc68a46f8,0x7ffdc68a4708,0x7ffdc68a4718
        3⤵
          PID:1516
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1484,8357649504055603002,12000377376751033825,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:2
          3⤵
            PID:1588
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1484,8357649504055603002,12000377376751033825,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:3
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2600
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1484,8357649504055603002,12000377376751033825,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:8
            3⤵
              PID:3432
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1484,8357649504055603002,12000377376751033825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3604 /prefetch:1
              3⤵
                PID:2464
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1484,8357649504055603002,12000377376751033825,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3596 /prefetch:1
                3⤵
                  PID:3132
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1484,8357649504055603002,12000377376751033825,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:1
                  3⤵
                    PID:1796
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1484,8357649504055603002,12000377376751033825,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:1
                    3⤵
                      PID:4700
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1484,8357649504055603002,12000377376751033825,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:1
                      3⤵
                        PID:4884
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://go.microsoft.com/fwlink/?linkid=2083734
                      2⤵
                      • Process spawned unexpected child process
                      • Suspicious use of WriteProcessMemory
                      PID:4360
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffdc68a46f8,0x7ffdc68a4708,0x7ffdc68a4718
                        3⤵
                          PID:3676
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,3224544092717436665,9415470685627532991,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:2
                          3⤵
                            PID:3224
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,3224544092717436665,9415470685627532991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:3
                            3⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3364
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:752

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C0427F5F77D9B3A439FC620EDAAB6177

                          Filesize

                          471B

                          MD5

                          6718ebdeac981b9843c46fc9edc25017

                          SHA1

                          008af3a2e9b9932cc92e36fcda36b35649c7adfa

                          SHA256

                          27426f0060c49dfe2499d46eda87eb5e798d8754ee637fb7b1d2615792d79b9f

                          SHA512

                          7592384071a603f55c1dbdc16517da1fba7a7c73664f1a83bf003ab6e5cb254e0ae9ff007c049658a023b37c2b1c67de2621119a5e0d607376c5b54f4bd8c087

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C0427F5F77D9B3A439FC620EDAAB6177

                          Filesize

                          442B

                          MD5

                          97d0e18532fc84831d1b5f0faafcb263

                          SHA1

                          0d65d9a8ed12c611809e4b7bb48a435a0dffeafe

                          SHA256

                          3acc0eb94b861dfb281e607f26ae1320282a076b816c155d3c9bd76416766da7

                          SHA512

                          8a3eafd4f8248b022771d35bb18f623e12013c331ab36c1aa1598ee946d8db7b6074dc3fd46409df089b1d4fc63bf4f33ba744ec9a0b4f7da7fa88f42734c101

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          aaeb1f5e097ab38083674077b84b8ed6

                          SHA1

                          7d9191cb2277c30f1147c9d29d75fc8e6aa0a4f2

                          SHA256

                          1654b27bfaeee49bfe56e0c4c0303418f4887f3ea1933f03cafce10352321aef

                          SHA512

                          130f1b62134626959f69b13e33c42c3182e343d7f0a5b6291f7bb0c2f64b60885f5e6331e1866a4944e9b7b2e49fe798e073316fde23927ede2c348ba0e56eda

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          aaeb1f5e097ab38083674077b84b8ed6

                          SHA1

                          7d9191cb2277c30f1147c9d29d75fc8e6aa0a4f2

                          SHA256

                          1654b27bfaeee49bfe56e0c4c0303418f4887f3ea1933f03cafce10352321aef

                          SHA512

                          130f1b62134626959f69b13e33c42c3182e343d7f0a5b6291f7bb0c2f64b60885f5e6331e1866a4944e9b7b2e49fe798e073316fde23927ede2c348ba0e56eda

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          aaeb1f5e097ab38083674077b84b8ed6

                          SHA1

                          7d9191cb2277c30f1147c9d29d75fc8e6aa0a4f2

                          SHA256

                          1654b27bfaeee49bfe56e0c4c0303418f4887f3ea1933f03cafce10352321aef

                          SHA512

                          130f1b62134626959f69b13e33c42c3182e343d7f0a5b6291f7bb0c2f64b60885f5e6331e1866a4944e9b7b2e49fe798e073316fde23927ede2c348ba0e56eda

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          aaeb1f5e097ab38083674077b84b8ed6

                          SHA1

                          7d9191cb2277c30f1147c9d29d75fc8e6aa0a4f2

                          SHA256

                          1654b27bfaeee49bfe56e0c4c0303418f4887f3ea1933f03cafce10352321aef

                          SHA512

                          130f1b62134626959f69b13e33c42c3182e343d7f0a5b6291f7bb0c2f64b60885f5e6331e1866a4944e9b7b2e49fe798e073316fde23927ede2c348ba0e56eda

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          1db53baf44edd6b1bc2b7576e2f01e12

                          SHA1

                          e35739fa87978775dcb3d8df5c8d2063631fa8df

                          SHA256

                          0d73ba3eea4c552ce3ffa767e4cd5fff4e459e543756987ab5d55f1e6d963f48

                          SHA512

                          84f544858803ac14bac962d2df1dbc7ed6e1134ecf16d242d7ee7316648b56b5bc095241363837bf0bf0afd16ca7deebe7afb7d40057604acbf09821fd5a9912

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                          Filesize

                          152B

                          MD5

                          1db53baf44edd6b1bc2b7576e2f01e12

                          SHA1

                          e35739fa87978775dcb3d8df5c8d2063631fa8df

                          SHA256

                          0d73ba3eea4c552ce3ffa767e4cd5fff4e459e543756987ab5d55f1e6d963f48

                          SHA512

                          84f544858803ac14bac962d2df1dbc7ed6e1134ecf16d242d7ee7316648b56b5bc095241363837bf0bf0afd16ca7deebe7afb7d40057604acbf09821fd5a9912

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                          Filesize

                          504B

                          MD5

                          cdc1dd7cfb1eb1ddd3f73c791eec3d07

                          SHA1

                          f98dd7b35c64d646e2132b38998f1845075efe62

                          SHA256

                          337f19515ddcc7cae30586d3e94c7547dae6ae458e7b6a2149f804c95b60e4e7

                          SHA512

                          c0ebeae6890520f8ae461c20f5fbf46c51e54c261c38bfdc0e3d51b5cc74ea643eb2f7ec4362bdc1038216c1e26a029010081212c429941b0f0e969d0389b3a8

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe579bc3.TMP

                          Filesize

                          48B

                          MD5

                          02f318cf35135565cd4f2b5750a03a1e

                          SHA1

                          ab851624df19b32b3230de4d92d3a37da484c32d

                          SHA256

                          e3e27eaaae79e6a529785d14e10542b31b05e84501f45a9d5203939003711b9a

                          SHA512

                          e800c0e76f68728b82c99e1e52f06794ad2c4fcd208af4cb180cc212ee4eec5cd2068143e65ee7902a93036d14f9162e80c616fd29cd39ab024dbbf4c6d3064f

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                          Filesize

                          70KB

                          MD5

                          e5e3377341056643b0494b6842c0b544

                          SHA1

                          d53fd8e256ec9d5cef8ef5387872e544a2df9108

                          SHA256

                          e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                          SHA512

                          83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_1

                          Filesize

                          264KB

                          MD5

                          f50f89a0a91564d0b8a211f8921aa7de

                          SHA1

                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                          SHA256

                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                          SHA512

                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Microsoft Edge.lnk

                          Filesize

                          2KB

                          MD5

                          1b69e39d39473a437305beee78260511

                          SHA1

                          4b7c9dc41d55b882469a9a19fb442ce696093b5e

                          SHA256

                          e88419ad601b8d7f4fd4636c474253cb044fff66d8f0f37d98d0a05bf6868595

                          SHA512

                          9627e5ddf6d7c4861a5d0bdeaec2ea8b067cb4143f4506a5ac0742b3a2f56a410c47122328540b4b8df7d1006d42237a0379fd891c7bb11926575cf067747c44

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                          Filesize

                          1KB

                          MD5

                          e2558c4988639862de8bd631158fe7b4

                          SHA1

                          ab17f8488236919b41c4dc75481904aa4c121f96

                          SHA256

                          03b75a86b7d53eb732e476b4922b6353dc6276aa71df63eca6da104379381c37

                          SHA512

                          aca47f70a10e7b4afe95015630c5b346855935aad986fcf94e4119350f727bfcdb9fb57057af2f9fa9d00d4975fed56e096f0cf4767a85fea8a38a51e3345ba8

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          4KB

                          MD5

                          3ab43d940721e40c0aaf8dcaa883a8da

                          SHA1

                          6f76ec32895ca2803ed38ac1494120283efba5f4

                          SHA256

                          90ef1c08ea3dd6f5fcb5fa4ae159cfc36832db57e886b00723893e6fc6a260e2

                          SHA512

                          772bade89d1276743414a7e34ef3f1b5696a3ae06b00c56c368e8f01e6ac4fe0f6ce738a1ed623c467d9216a8069caa52832ef2ddc1dfe48290269d46a7987a6

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                          Filesize

                          6KB

                          MD5

                          a1fc352b94557260981914bb21871058

                          SHA1

                          b14a9dcdf538716c77c08f984313689c400e1d99

                          SHA256

                          d73400716db87b04feebfdf8b19e8253920eaa2357bc1b9de197ccdbac364e35

                          SHA512

                          c1fc91bd66ac6fe0ca9cf7f41a03b1ab44d121c7f94aab702e5dc0f7a1529d4270fdfdd05d287992bc854426789e8e6aec9bc38b110c4c3a53696c7068c9cc17

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                          Filesize

                          24KB

                          MD5

                          47e94a96372e6f095b8a3fd7edc48ec0

                          SHA1

                          377b68f34e5964ca8be1b1b0c1507dd7f0e5f005

                          SHA256

                          15c77bafd922bd085317fd544d0fa129e3b8c814e3ba0d48936366004427732e

                          SHA512

                          5bd63de2e831805b723d7ddf1343c3b721ef5b757d9ab01bf8554ef8e29ac2cc09fa104fc85d530f27d66b67280774b3ebbef6729ea3ab61ce8028ab4ba5bdad

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\MANIFEST-000001

                          Filesize

                          41B

                          MD5

                          5af87dfd673ba2115e2fcf5cfdb727ab

                          SHA1

                          d5b5bbf396dc291274584ef71f444f420b6056f1

                          SHA256

                          f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                          SHA512

                          de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENT

                          Filesize

                          16B

                          MD5

                          46295cac801e5d4857d09837238a6394

                          SHA1

                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                          SHA256

                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                          SHA512

                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                          Filesize

                          2KB

                          MD5

                          f5f4d01dc81f291f72c3c633b24dedef

                          SHA1

                          eb4c321250f270e3a72634d833d028c7b1d42eb0

                          SHA256

                          34026c569200fe3a76c7d6892b51f87433b75d010495b1b725e1787db0ae36ab

                          SHA512

                          fff7d5523e6312e1e9d596cc7c515358ebcfbcaba2e7a0b523d1755b84aa634381c6a45467c2ed42a8bf877a3fb43d8130c857f8a32fd694aa33f19a4c5bf253

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                          Filesize

                          2KB

                          MD5

                          f5f4d01dc81f291f72c3c633b24dedef

                          SHA1

                          eb4c321250f270e3a72634d833d028c7b1d42eb0

                          SHA256

                          34026c569200fe3a76c7d6892b51f87433b75d010495b1b725e1787db0ae36ab

                          SHA512

                          fff7d5523e6312e1e9d596cc7c515358ebcfbcaba2e7a0b523d1755b84aa634381c6a45467c2ed42a8bf877a3fb43d8130c857f8a32fd694aa33f19a4c5bf253

                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                          Filesize

                          9KB

                          MD5

                          b6b32a1b5f82dcc74fc329a8ac28e427

                          SHA1

                          f6de6c27de7619016e29240cf01b7401b0b47ab5

                          SHA256

                          642def04bba4301228a0b21631063b72c0ed6599afbb7a4dfd3f588fcbe871a3

                          SHA512

                          08e0e622ff646e9c57875e7455edfb221c3be9330d2e46306df5d66df6445172f684b622573234429fba0bd19a7f8dec647c8be843928287ab3018766c20f300

                        • C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\tmp\000000BL.bin

                          Filesize

                          16KB

                          MD5

                          a21eb8916f2a2f07793c819768a8bbd0

                          SHA1

                          b3f552a13e83a4382306f257089b5f2f18a1760d

                          SHA256

                          8836467d62f1dd5a5fcfc334668a81bc39579642a57355ca1c78575c891741b5

                          SHA512

                          cde9ca8a66d352dbfff36426986f1604e7097c092e9fcfe348a35262e1c33d6e89b21140e085f22ac8ea16a0948b91a9bdefacaffb1125ed61dee7917ac4e9e0

                        • C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\tmp\000000BM.bin

                          Filesize

                          3KB

                          MD5

                          d16a6923d2106a2c4d8391a789b21333

                          SHA1

                          953249d08afc48571b3988fc381d1418adf5f062

                          SHA256

                          4f875944d822200dd0a9f822692fb1540c9fffa4da3d38f3ddec7bfe0d06680a

                          SHA512

                          0e4588b195d32959830bd6deaf36d3a706e6049eea8cd3aff759c5bdaceef97283b22c5c3e97dde74414baee4d605249050f2ddf63fd79811947cf31810db9de

                        • C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\tmp\000000BN.bin

                          Filesize

                          58KB

                          MD5

                          8cc611275a64aeab0d949994d8304090

                          SHA1

                          2a282f876b89120e2697bbcef32d359528ff24f8

                          SHA256

                          1ce755dae322536349969e1c7b21b7d3ecc44d8fb3afbdd5f74785c9a106db66

                          SHA512

                          4e8dcec63274096c60167eab9673608063bf94499c9c096ca54d67f613d5ddc6ffd5ad8bd56da217fdec3b4091a8f7fcc3b18ecfd33a4e1b02ea5944eb4399f5

                        • C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\tmp\000000BO.bin

                          Filesize

                          1KB

                          MD5

                          2a73c361081922a4c84395afd79174e3

                          SHA1

                          d2c5b559524ee131d3e3c2885716e13f35a09bc2

                          SHA256

                          60a5377439f3b763a09fc7629d776920b48380b7416552d25ec0e9cbf0f3e6b3

                          SHA512

                          fdea66137a4a3f445f617fe7224bfde66c4698b3063ee8ce79a3a7a51ce38f437cc6a281bc68ad82b6b00cdcef91d660baddf2b7287b509291ee40205e4a5bfc

                        • C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\tmp\000000BP.bin

                          Filesize

                          49KB

                          MD5

                          8aadb73e83697cab13bf57fb385e7fee

                          SHA1

                          b1dcc51a3c195ed4c6aa060959584a1ce5c1d0fc

                          SHA256

                          b8050a775058995edf17f83db66973ea3e31f8e2e4cc24988679de5418ecb7f8

                          SHA512

                          5cd8788b76a3dc7cde4beea8bf14be1fb31564fbc907fc7c87050431ccc1f1aa39829057eefc20a11e91f6f02e0d33b3b51c796500fcc61c0e1dcd3fd7c911bd

                        • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

                          Filesize

                          2B

                          MD5

                          f3b25701fe362ec84616a93a45ce9998

                          SHA1

                          d62636d8caec13f04e28442a0a6fa1afeb024bbb

                          SHA256

                          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                          SHA512

                          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                        • memory/1648-137-0x00007FFDAB790000-0x00007FFDAB7A0000-memory.dmp

                          Filesize

                          64KB

                        • memory/1648-138-0x00007FFDA8E30000-0x00007FFDA8E40000-memory.dmp

                          Filesize

                          64KB

                        • memory/1648-139-0x00007FFDA8E30000-0x00007FFDA8E40000-memory.dmp

                          Filesize

                          64KB

                        • memory/1648-136-0x00007FFDAB790000-0x00007FFDAB7A0000-memory.dmp

                          Filesize

                          64KB

                        • memory/1648-135-0x00007FFDAB790000-0x00007FFDAB7A0000-memory.dmp

                          Filesize

                          64KB

                        • memory/1648-133-0x00007FFDAB790000-0x00007FFDAB7A0000-memory.dmp

                          Filesize

                          64KB

                        • memory/1648-134-0x00007FFDAB790000-0x00007FFDAB7A0000-memory.dmp

                          Filesize

                          64KB