Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    600s
  • max time network
    567s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/05/2023, 05:49

General

  • Target

    b50243e912092281d37309cffff462b7.pdf

  • Size

    45KB

  • MD5

    b50243e912092281d37309cffff462b7

  • SHA1

    bf2d5c268a9dda7850854e33aed258270c8110ed

  • SHA256

    c696aea6484b032750b570a898fc15e87b92b2f8f8fa9591a37894c0f07f72fe

  • SHA512

    1b6789b2d72d10c270e46015080ca259e1eff9f175bbc87b549d1afdf8ff2dc8514ee4c8296a8f26d215bd2b9193590a5e08eb4e36e323fddb1ecadde9e93fe4

  • SSDEEP

    768:n8iqVjgocGH4FBncGH4FBQNsgecGH4FBMpamnnn6TVrXmm1QghP:8Ncs8csxecsRnnn+9P

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 7 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 5 IoCs
  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of SetWindowsHookEx 34 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\b50243e912092281d37309cffff462b7.pdf"
    1⤵
    • Checks processor information in registry
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=92BC06221F0DADA1B0D8FB1818FC3E02 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=92BC06221F0DADA1B0D8FB1818FC3E02 --renderer-client-id=2 --mojo-platform-channel-handle=1620 --allow-no-sandbox-job /prefetch:1
        3⤵
          PID:4328
        • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
          "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9542205FE9C986B94E794E9D3A35DEE8 --mojo-platform-channel-handle=1628 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
          3⤵
            PID:4140
          • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
            "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=5EA3D309C1F6DF7A4E3B07141C032841 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=5EA3D309C1F6DF7A4E3B07141C032841 --renderer-client-id=4 --mojo-platform-channel-handle=2236 --allow-no-sandbox-job /prefetch:1
            3⤵
              PID:1408
            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F90E82572528F22A063C11376A8DF34D --mojo-platform-channel-handle=2360 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
              3⤵
                PID:2764
              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=39FB9F3E5B36DF5C64EFA239420B1F28 --mojo-platform-channel-handle=2660 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                3⤵
                  PID:3564
                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=B1A9AF7B6047BA83626BEE44A48D936F --mojo-platform-channel-handle=2260 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                  3⤵
                    PID:2904
                • C:\Windows\SysWOW64\LaunchWinApp.exe
                  "C:\Windows\system32\LaunchWinApp.exe" "http://cmyk.com.ar/gkonf/644ba2ce2024f.zip"
                  2⤵
                    PID:5084
                  • C:\Windows\SysWOW64\LaunchWinApp.exe
                    "C:\Windows\system32\LaunchWinApp.exe" "http://cmyk.com.ar/gkonf/644ba2ce2024f.zip"
                    2⤵
                      PID:4412
                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                    1⤵
                    • Drops file in Windows directory
                    • Modifies Internet Explorer settings
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of SetWindowsHookEx
                    PID:4852
                  • C:\Windows\system32\browser_broker.exe
                    C:\Windows\system32\browser_broker.exe -Embedding
                    1⤵
                    • Modifies Internet Explorer settings
                    PID:4256
                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                    1⤵
                    • Suspicious behavior: MapViewOfSection
                    • Suspicious use of SetWindowsHookEx
                    PID:3408
                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                    1⤵
                    • Drops file in Windows directory
                    • Modifies Internet Explorer settings
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3316
                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                    1⤵
                      PID:1264
                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                      1⤵
                      • Modifies registry class
                      PID:392
                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                      1⤵
                      • Modifies registry class
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3396
                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                      1⤵
                      • Drops file in Windows directory
                      • Modifies registry class
                      • Suspicious use of SetWindowsHookEx
                      PID:4252
                    • C:\Windows\system32\browser_broker.exe
                      C:\Windows\system32\browser_broker.exe -Embedding
                      1⤵
                      • Modifies Internet Explorer settings
                      PID:1368
                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                      1⤵
                      • Modifies registry class
                      • Suspicious behavior: MapViewOfSection
                      • Suspicious use of SetWindowsHookEx
                      PID:988
                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                      1⤵
                      • Drops file in Windows directory
                      • Modifies registry class
                      PID:1168
                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                      1⤵
                      • Modifies registry class
                      PID:2208
                    • C:\Windows\System32\rundll32.exe
                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                      1⤵
                        PID:2012
                      • \??\c:\windows\system32\svchost.exe
                        c:\windows\system32\svchost.exe -k localservice -s fdPHost
                        1⤵
                          PID:1660
                        • C:\Windows\system32\OpenWith.exe
                          C:\Windows\system32\OpenWith.exe -Embedding
                          1⤵
                          • Drops file in Windows directory
                          • Suspicious behavior: GetForegroundWindowSpam
                          • Suspicious use of SetWindowsHookEx
                          PID:4352
                          • C:\Windows\system32\NOTEPAD.EXE
                            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\b50243e912092281d37309cffff462b7.pdf
                            2⤵
                            • Opens file in notepad (likely ransom note)
                            PID:3704

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                          Filesize

                          471B

                          MD5

                          4d4c41a739d238ddd5b28db912dc86e0

                          SHA1

                          98f90e5e1a6a74c494934ec329e6436dbb4c18fa

                          SHA256

                          b5217476958327aeea3a359176435e25e1c198640e0054b6020816978603e3c4

                          SHA512

                          a7695c8a2aec55bfa58224d5b4f35f430e85f9b49272b2d165ee69dab60156528127888236bbfa597c79d5fb1eb7f46b9aeb1bf10e099e86b9ecb7c12bfd7ac4

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                          Filesize

                          434B

                          MD5

                          282647555aef7d308d3d23285d834e3c

                          SHA1

                          4f3d564b0610711826f405aaa2b0099b1fe9fd80

                          SHA256

                          0b4e1bf6b935c928a33844a9a089a268d54a5309d478c98fc931dafbbb246453

                          SHA512

                          9eaa6b95adb3984ad68731eacfb9baafd17075e620dceafa90e5660e2ba79a754e1a33b6567d7f254bab7c3c6abaf3c6a690dfa4eb5325d911531742665d4bee

                        • C:\Users\Admin\AppData\Local\MicrosoftEdge\SharedCacheContainers\MicrosoftEdge_iecompat\IECompatData.xml

                          Filesize

                          74KB

                          MD5

                          d4fc49dc14f63895d997fa4940f24378

                          SHA1

                          3efb1437a7c5e46034147cbbc8db017c69d02c31

                          SHA256

                          853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

                          SHA512

                          cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\IV9H23MJ\edgecompatviewlist[1].xml

                          Filesize

                          74KB

                          MD5

                          d4fc49dc14f63895d997fa4940f24378

                          SHA1

                          3efb1437a7c5e46034147cbbc8db017c69d02c31

                          SHA256

                          853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

                          SHA512

                          cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\Q7EZ5IVI\suggestions[1].en-US

                          Filesize

                          17KB

                          MD5

                          5a34cb996293fde2cb7a4ac89587393a

                          SHA1

                          3c96c993500690d1a77873cd62bc639b3a10653f

                          SHA256

                          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                          SHA512

                          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\edb.chk

                          Filesize

                          8KB

                          MD5

                          c7dfa276ae87d916080018015f2c118d

                          SHA1

                          ca65b12e098607d6313f55c4fbbfe5fbd9b7be93

                          SHA256

                          5e2d6e22799cfdc75d28317b1154d695be103713911a506fe6165af7fed9455b

                          SHA512

                          22ec008d71d0a7fade3dada223e1ef6354c8d409de02dec44b8ef80a373e7ec3a4058bf49334142481494fc44882f43d038b226f86ecada4472eb4570b56d4a8

                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Microsoft\Windows\3720402701\2219095117.pri

                          Filesize

                          207KB

                          MD5

                          e2b88765ee31470114e866d939a8f2c6

                          SHA1

                          e0a53b8511186ff308a0507b6304fb16cabd4e1f

                          SHA256

                          523e419d2fa2e780239812d36caa37e92f8c3e6a5cd9f18f0d807c593effa45e

                          SHA512

                          462e8e6b4e63fc6781b6a9935b332a1dc77bfb88e1de49134f86fd46bd1598d2e842902dd9415a328e325bd7cdee766bd9473f2695acdfa769ffe7ba9ae1953d

                        • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                          Filesize

                          717B

                          MD5

                          60fe01df86be2e5331b0cdbe86165686

                          SHA1

                          2a79f9713c3f192862ff80508062e64e8e0b29bd

                          SHA256

                          c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8

                          SHA512

                          ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23

                        • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                          Filesize

                          192B

                          MD5

                          22ae830d6212002302fcc6c993757b2a

                          SHA1

                          078ef040aaa4a0ba742eb9d9fd50f3a21496ec7e

                          SHA256

                          1ade0951a0a5c02d62b6e0115ea1af06893f24afa9adf9ceaeaa6f271694d5f4

                          SHA512

                          92d950e1a76bebc1d805eaf249fc6cb8dba188dc92f0323112073ae7ba9089fbd997d2aa01ccc2ee93be5780b0e750c5ddfb36093c8ad452f80391aa303b070e

                        • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\Windows\3720402701\2219095117.pri

                          Filesize

                          207KB

                          MD5

                          e2b88765ee31470114e866d939a8f2c6

                          SHA1

                          e0a53b8511186ff308a0507b6304fb16cabd4e1f

                          SHA256

                          523e419d2fa2e780239812d36caa37e92f8c3e6a5cd9f18f0d807c593effa45e

                          SHA512

                          462e8e6b4e63fc6781b6a9935b332a1dc77bfb88e1de49134f86fd46bd1598d2e842902dd9415a328e325bd7cdee766bd9473f2695acdfa769ffe7ba9ae1953d

                        • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\LogFiles\edb.log

                          Filesize

                          512KB

                          MD5

                          a0756fb0704b0ab65b8bd2699c745acc

                          SHA1

                          d6301b3011e4cb97537575c095b7fb5659f52f91

                          SHA256

                          daa7ae919d9956b3bdc78e207b84f6b2c273ac6d46171a560f5b2c410f38cb93

                          SHA512

                          6dc8bc3305855f187bd14373dd6e2ddcd3071bb2273fe47260f5885997ffa65ffaea13aa91ae081ff9427c0a56e43794dbacab207072d2e5b694923d18a10268

                        • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\edb.chk

                          Filesize

                          8KB

                          MD5

                          ff206e04879ebed07a4f14d61dd8d821

                          SHA1

                          6b3ce511710c8e9f109e74c5a891d31cda03a1cd

                          SHA256

                          de3cb24f8160bb951c3f9569296c1619c83b1e5f9925ae98425dbe4bed024b36

                          SHA512

                          43f8261c48ccc86be4c91e587d36f21b9d731a7975ba501d67819f51ef7d2c76a85c749b8a16d59e6a1a840df6cfd12eb8ac7b913e693e91ade5a8381c7005a6

                        • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.edb

                          Filesize

                          2.0MB

                          MD5

                          0a29aa7319ceb7420132fa8c5cd4cbaf

                          SHA1

                          89bcec9454bc6a4e68c5cfd8efc997781a62a876

                          SHA256

                          eb4148f2c1bd6b835be2b1da1843affb3489b814f53069337b37edc42fb410b9

                          SHA512

                          40e2701c8408f8e566b4264671d98dff64595fa73c1c4706e32a79e3925f0b09ef4ae2591ee35665b771b799fc9b2a267f581f586e9afad2c60a618a2d7cadbe

                        • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore\spartan.jfm

                          Filesize

                          16KB

                          MD5

                          0b3e09e3afe20669822b82025a1eea87

                          SHA1

                          0b660a768239bc236f1e7ac0252ab38509f633f1

                          SHA256

                          772d5d108f564e081daac86522c78d3c175dbec9ffe9c9920dbbda027ae8dd9a

                          SHA512

                          a3c7684ee955c2fec0eaa126d1a425d0f2c15ffe5cbe8b0da7538fadf9b0a22865e38649aa17f5fbf286807716f77ebd79f454b761c3f180848da07126d147e8

                        • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\RecoveryStore.{5125AE57-5631-4C87-99C8-95301F331B85}.dat

                          Filesize

                          5KB

                          MD5

                          7a450bac5c51dcc07a728c8a10b9f42a

                          SHA1

                          5483b62d2549f575501f038c6ca006353dbf76e1

                          SHA256

                          202c6599ab04c80a5979e116d4095bc0882798c693932dffcf05a01cf26469fa

                          SHA512

                          923b3a71dfbd1b875984b1ec968c23f348c91d6f412f45365c58c63152841befaa35607f17a4156cdfecd77326fdd98c05ef094fef0554241fe984d2d999c7ad

                        • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\Recovery\Active\{89E2108E-D85E-4731-92C3-5F551F50ADE3}.dat

                          Filesize

                          4KB

                          MD5

                          4d082f5ea74cda0e380c8d5e6674bad3

                          SHA1

                          aacbacfdbc7a7496c371411fbd0c12fd6b278299

                          SHA256

                          9ab3ecb89fe36d58e98f1b109ad60bc383feeee9a1ea32d06311aa80e485d4de

                          SHA512

                          b0e8cebec6a514b484b4d5f86476e18783321e5b259a0c1e3b7163bc3df05143b7dd29d917be159a4a132447727a4eefc31543c5120fe54edc922f4b58b912db

                        • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

                          Filesize

                          717B

                          MD5

                          60fe01df86be2e5331b0cdbe86165686

                          SHA1

                          2a79f9713c3f192862ff80508062e64e8e0b29bd

                          SHA256

                          c08ccbc876cd5a7cdfa9670f9637da57f6a1282198a9bc71fc7d7247a6e5b7a8

                          SHA512

                          ef9f9a4dedcbfe339f4f3d07fb614645596c6f2b15608bdccdad492578b735f7cb075bdaa07178c764582ee345857ec4665f90342694e6a60786bb3d9b3a3d23

                        • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

                          Filesize

                          1KB

                          MD5

                          a10bb80d318c8366553bccae634410a6

                          SHA1

                          c21bbf9dda40f29b1f48918b096fa9392de9f9cf

                          SHA256

                          8f5c8871d4caa246c5399d89e8a187b135d554a97ddd8a24bb0d33530cfc8cf4

                          SHA512

                          e67d299a93d41fe57da91e1e7439373e2cd26b6a24cdff9e39e3cfbd92d95003c4d741e76c9fd0381d72ef6a5a706864fcfc4b5910fe214bf4401deb59461089

                        • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

                          Filesize

                          192B

                          MD5

                          3c46d6f3b21d8422243931870132ffe7

                          SHA1

                          0bc4e8163b9c85c91035b9f37bfcaf626807169a

                          SHA256

                          be36b2e385e8042ab7256fd609ef66a7f3492b670e9925ce55f5e46b0fb6df8e

                          SHA512

                          e60fd2efea826b0e9a7d0feab9c65ad0e84c04f3bd2e092154d0c84ac8b4ad36ec2bcb54829483161719afda5e212edd893c789198d79346a3d5ba1fb58fce44

                        • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

                          Filesize

                          416B

                          MD5

                          e51ca3e51a6441dbb15d2f525094e85b

                          SHA1

                          6ad32b071b59f087b31fe383488f1fbbf2db301b

                          SHA256

                          c89a0287dc98ca4ff14295e65e842167cdfe6b9d0d111b2edf012ea01b800a66

                          SHA512

                          bc2bf8f1d6d61726c1ecef1c93b9da76636cd40f9ce66c867206edd1f16edfd6163567ad0763becd1c5a9336587263f918575026a2ec19773ce5bbab444ebdb3

                        • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\Microsoft\Windows\3720402701\2219095117.pri

                          Filesize

                          207KB

                          MD5

                          e2b88765ee31470114e866d939a8f2c6

                          SHA1

                          e0a53b8511186ff308a0507b6304fb16cabd4e1f

                          SHA256

                          523e419d2fa2e780239812d36caa37e92f8c3e6a5cd9f18f0d807c593effa45e

                          SHA512

                          462e8e6b4e63fc6781b6a9935b332a1dc77bfb88e1de49134f86fd46bd1598d2e842902dd9415a328e325bd7cdee766bd9473f2695acdfa769ffe7ba9ae1953d

                        • memory/3316-241-0x000002BF48E00000-0x000002BF48E02000-memory.dmp

                          Filesize

                          8KB

                        • memory/3316-239-0x000002BF48D40000-0x000002BF48D42000-memory.dmp

                          Filesize

                          8KB

                        • memory/3316-236-0x000002BF48D10000-0x000002BF48D12000-memory.dmp

                          Filesize

                          8KB

                        • memory/4852-283-0x000001B8F8CD0000-0x000001B8F8CD1000-memory.dmp

                          Filesize

                          4KB

                        • memory/4852-378-0x000001B8F1250000-0x000001B8F1251000-memory.dmp

                          Filesize

                          4KB

                        • memory/4852-282-0x000001B8F8CC0000-0x000001B8F8CC1000-memory.dmp

                          Filesize

                          4KB

                        • memory/4852-181-0x000001B8F1120000-0x000001B8F1130000-memory.dmp

                          Filesize

                          64KB

                        • memory/4852-367-0x000001B8F1910000-0x000001B8F1912000-memory.dmp

                          Filesize

                          8KB

                        • memory/4852-374-0x000001B8F1500000-0x000001B8F1501000-memory.dmp

                          Filesize

                          4KB

                        • memory/4852-223-0x000001B8F5CE0000-0x000001B8F5CE2000-memory.dmp

                          Filesize

                          8KB

                        • memory/4852-222-0x000001B8F5C80000-0x000001B8F5C82000-memory.dmp

                          Filesize

                          8KB

                        • memory/4852-220-0x000001B8F15E0000-0x000001B8F15E2000-memory.dmp

                          Filesize

                          8KB

                        • memory/4852-218-0x000001B8F1500000-0x000001B8F1501000-memory.dmp

                          Filesize

                          4KB

                        • memory/4852-197-0x000001B8F1940000-0x000001B8F1950000-memory.dmp

                          Filesize

                          64KB