Analysis

  • max time kernel
    152s
  • max time network
    406s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-01-2024 17:42

General

  • Target

    a1s-root1=email_banfield_2024_01_25_16_SMTP-att-1-4TLRgQ29l4zJmsx-2024-01-25T16_51_46.eml

  • Size

    35KB

  • MD5

    0bdf90c601459a55b436af24ff96fdf3

  • SHA1

    b751e92a160249e8743ade1f79d572803b3d57bc

  • SHA256

    59c34ab10c3ed2f66543503c63df63cc7afa45bdd867c37a2281eb363116fa22

  • SHA512

    15a52816937b41a92c05986c2d6b98d3d545b6fc8d15486c9535cc2d80a1b5a556f3263a3a2f3fe5a432833afd2abca1710fc3449566e50f90c6de67de7c530e

  • SSDEEP

    768:zk08a88PqsrXQ0uhx6V6UaFSC9CJClCcCCNZ:zkO88P9+hYdSZ

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 14 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 37 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\a1s-root1=email_banfield_2024_01_25_16_SMTP-att-1-4TLRgQ29l4zJmsx-2024-01-25T16_51_46.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2472
  • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding
    1⤵
      PID:1880
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1888
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6a29758,0x7fef6a29768,0x7fef6a29778
        2⤵
          PID:1360
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1188 --field-trial-handle=1236,i,2487243642679606494,15914461520583580036,131072 /prefetch:2
          2⤵
            PID:2524
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1472 --field-trial-handle=1236,i,2487243642679606494,15914461520583580036,131072 /prefetch:8
            2⤵
              PID:1716
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1236,i,2487243642679606494,15914461520583580036,131072 /prefetch:8
              2⤵
                PID:2332
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2288 --field-trial-handle=1236,i,2487243642679606494,15914461520583580036,131072 /prefetch:1
                2⤵
                  PID:2892
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2276 --field-trial-handle=1236,i,2487243642679606494,15914461520583580036,131072 /prefetch:1
                  2⤵
                    PID:2888
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1320 --field-trial-handle=1236,i,2487243642679606494,15914461520583580036,131072 /prefetch:2
                    2⤵
                      PID:796
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2588 --field-trial-handle=1236,i,2487243642679606494,15914461520583580036,131072 /prefetch:2
                      2⤵
                        PID:2488
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3412 --field-trial-handle=1236,i,2487243642679606494,15914461520583580036,131072 /prefetch:1
                        2⤵
                          PID:1356
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1384 --field-trial-handle=1236,i,2487243642679606494,15914461520583580036,131072 /prefetch:8
                          2⤵
                            PID:1556
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3568 --field-trial-handle=1236,i,2487243642679606494,15914461520583580036,131072 /prefetch:8
                            2⤵
                              PID:2284
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3620 --field-trial-handle=1236,i,2487243642679606494,15914461520583580036,131072 /prefetch:8
                              2⤵
                                PID:1392
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3828 --field-trial-handle=1236,i,2487243642679606494,15914461520583580036,131072 /prefetch:1
                                2⤵
                                  PID:1512
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2488 --field-trial-handle=1236,i,2487243642679606494,15914461520583580036,131072 /prefetch:8
                                  2⤵
                                    PID:1612
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2064 --field-trial-handle=1236,i,2487243642679606494,15914461520583580036,131072 /prefetch:1
                                    2⤵
                                      PID:2576
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3696 --field-trial-handle=1236,i,2487243642679606494,15914461520583580036,131072 /prefetch:1
                                      2⤵
                                        PID:1804
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=3780 --field-trial-handle=1236,i,2487243642679606494,15914461520583580036,131072 /prefetch:1
                                        2⤵
                                          PID:988
                                      • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                        "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                        1⤵
                                          PID:2840

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          344B

                                          MD5

                                          62766d43abdb017870d14b60517df3a5

                                          SHA1

                                          3678f13ae0a92c7ec24dd8a2b96f4476fbb3bb16

                                          SHA256

                                          417d423efb04df80c4abdb82a88d74fea44ea298b16fd62f9e9e5aae7b94d577

                                          SHA512

                                          f039a37f638ab5f9c86381d4d19d4e23bf5bc2c4174b51d940e6c1c2575b96bda0f457621a66b68adf6df2afb489f809ecc44d69cf8104d52c2088725e28e02d

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\8a13cec0-f618-43e8-9325-c518e93e4bfc.tmp

                                          Filesize

                                          5KB

                                          MD5

                                          3df6f5749ea70a6aa76dd103e774893a

                                          SHA1

                                          a16569dfddf23d1cd449227d9b1ffd1fafbbf680

                                          SHA256

                                          a79ad06c32b534ee951d369686d9a1dd64ef46fd95a70f99a4ad6581785fcbaa

                                          SHA512

                                          4838c20eb6d572e7a11120015164f156fd7645d1b1b5dc175ab01ae774c0793f625bb5e49e1d523434ef659565e52355f2ff55f09c8ecd4fca432017ff9d63ac

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000021

                                          Filesize

                                          192KB

                                          MD5

                                          5036f7c363373f5d9cc2b6519806feae

                                          SHA1

                                          3caf2148a2eb7c82f9aff0f3a2f4594ee70327bf

                                          SHA256

                                          715c5d3e3839c1b47c3008e8a89f929e60858ee379724a20775003c692e9fd6c

                                          SHA512

                                          4661cd6fb02dccc48a42fe127b1e88f7e794cd4eb1d8a5a8f5075f772dad63211efa349bab579c5bb81bfb2c4b1be201c6725a56f617f8913a2235e3565fe645

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                          Filesize

                                          4KB

                                          MD5

                                          86f72f6c8877172164cccb8c1f9f882a

                                          SHA1

                                          091a7ac4dea946932f8228a7d12f514fd4d40e0e

                                          SHA256

                                          e1ade44f21919c439cd24972996676be0f213dc3a18dbac798d9ad54c6d02668

                                          SHA512

                                          0857b05dc31ea3c8bf6bb059bfbc94e93a97a855c8d85c26f6bf857580a1d93a1937efc190164840e696cdeafb3fe7b34e1c7de52aa0b698786cdf154bbe568c

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                          Filesize

                                          3KB

                                          MD5

                                          0a3ec09a9513eb6c4b5f3efbb4982521

                                          SHA1

                                          7c639240638e854399e8c80369c3de2f0468b280

                                          SHA256

                                          f135950b63841e843edcdc8733cd8f51821301a2403ceb696a55ac6938681d57

                                          SHA512

                                          9d7cfbb2fe2fb5a080a8a7057c5ec2aa2996db83f735a563d3e90b46fe92705208bb582143b31eee95f213fa6bfcf0d53fb1b8bd3505310fd9846deb140650bd

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                          Filesize

                                          522B

                                          MD5

                                          744fff46f1534a6f28bd812872965811

                                          SHA1

                                          33231a29699d8c5ecbc9ba26ca7be2b5f0cce9d6

                                          SHA256

                                          5502ad6b3c764a5da810ad357f09bb07da143a695e512dbf75fd0f9a603b8725

                                          SHA512

                                          b46bd4cf13f233e3ddba415ce4e7148089849d3c2e78824d8d336227c4c3f41ee832fbdaaac0459b2fe77d828c8b8f786aa58bb5467d3c2fe8c8b2acc3358467

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                          Filesize

                                          361B

                                          MD5

                                          1d4317ff6c0bdfaf05d1b5d6639ed5ec

                                          SHA1

                                          32dc5b08b3fe20d1f16eb43e8175786665b22955

                                          SHA256

                                          4f233f72fdf9d69edbb37bf4bf0cae8f0d8f261271c8e7241a9c21840d04a53c

                                          SHA512

                                          a42e2987f213353b3dbce3092640508a9e13f3f8bb9bcaac6750a27feaf28d18e639a6ead3659c78da2bc1ca7ae78f2f1d6baab40a18433d422c177a155160cc

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          5KB

                                          MD5

                                          d0a5d676b3b9f138e54812107c22926a

                                          SHA1

                                          b80f5f2f54d9e66ea7195f6150f82d9d8e3afc44

                                          SHA256

                                          614e458ae56efa5a64a79232c4886570cc135cba0a5becd2fbfc65e5f2b49243

                                          SHA512

                                          21faca8b6066a3d9474a31f4dc32f58277cc62001677965ea2100fe92d4ea378568169162814255c7ee4efea4ef1acb2af36e845d6ccf639f5c2a99e043746b6

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                          Filesize

                                          4KB

                                          MD5

                                          ecabefe490c97c701caa0225a5c68300

                                          SHA1

                                          9872f59992fb2b3b525ad20ea8fc8186f3b06dfc

                                          SHA256

                                          6f84e49fff119dfd076790b51b29e129eea3401d40fe1734a4941190c5d1ad31

                                          SHA512

                                          8749697650b126b175a7bd7c5e5f0e9078c6ae23d85512da8600bd664efc4badc240565b5b10499711e4a904562e7985fb631d3d9358d90eb204ee272406f492

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                          Filesize

                                          16B

                                          MD5

                                          18e723571b00fb1694a3bad6c78e4054

                                          SHA1

                                          afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                          SHA256

                                          8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                          SHA512

                                          43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                          Filesize

                                          264KB

                                          MD5

                                          f50f89a0a91564d0b8a211f8921aa7de

                                          SHA1

                                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                                          SHA256

                                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                          SHA512

                                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                        • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

                                          Filesize

                                          235KB

                                          MD5

                                          151356c434771f14585083d88d86f4bf

                                          SHA1

                                          0d5dd86e7f19a233b15f6e485f2d325fd8a67651

                                          SHA256

                                          8ae884f15cd47a2418f42814f8396b1ea54c95dbf5b6c52ffed0b89cdc34cbae

                                          SHA512

                                          ea7d5ec949474ded859b19ba1c8b575217ebbaec738739fb98e0b288aa3d858427a2fd67f075186fbef2b249560bb1fd108c44069be063a289a0b6a897dc6083

                                        • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

                                          Filesize

                                          240KB

                                          MD5

                                          c82ee5788508e3aef27264221f7e1307

                                          SHA1

                                          85af7e442a263f5b9cb74c3e67ae27afb562cc11

                                          SHA256

                                          db31c3a5c9adfe761cf6de6cf20f3a258c8bc2e56d4bda9e4084212b5bf16067

                                          SHA512

                                          cedcfed5496b70f3a62974eeb216d484546884c8239f028049764a0e477b914f05c0cb13657569cf792a8fe2686e2b0e124467848a2b86f8764b90cad36f8872

                                        • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

                                          Filesize

                                          1KB

                                          MD5

                                          48dd6cae43ce26b992c35799fcd76898

                                          SHA1

                                          8e600544df0250da7d634599ce6ee50da11c0355

                                          SHA256

                                          7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

                                          SHA512

                                          c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

                                        • C:\Users\Admin\AppData\Local\Temp\Cab63F3.tmp

                                          Filesize

                                          65KB

                                          MD5

                                          ac05d27423a85adc1622c714f2cb6184

                                          SHA1

                                          b0fe2b1abddb97837ea0195be70ab2ff14d43198

                                          SHA256

                                          c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

                                          SHA512

                                          6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

                                        • C:\Users\Admin\AppData\Local\Temp\Tar6406.tmp

                                          Filesize

                                          171KB

                                          MD5

                                          9c0c641c06238516f27941aa1166d427

                                          SHA1

                                          64cd549fb8cf014fcd9312aa7a5b023847b6c977

                                          SHA256

                                          4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

                                          SHA512

                                          936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

                                        • C:\Users\Admin\AppData\Local\Temp\{C04DC996-5323-4473-876B-425B9F4A8885}.html

                                          Filesize

                                          6KB

                                          MD5

                                          adf3db405fe75820ba7ddc92dc3c54fb

                                          SHA1

                                          af664360e136fd5af829fd7f297eb493a2928d60

                                          SHA256

                                          4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

                                          SHA512

                                          69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

                                          Filesize

                                          2B

                                          MD5

                                          f3b25701fe362ec84616a93a45ce9998

                                          SHA1

                                          d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                          SHA256

                                          b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                          SHA512

                                          98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                        • \??\pipe\crashpad_1888_HCQQRZNPRMWFRWYV

                                          MD5

                                          d41d8cd98f00b204e9800998ecf8427e

                                          SHA1

                                          da39a3ee5e6b4b0d3255bfef95601890afd80709

                                          SHA256

                                          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                          SHA512

                                          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                        • memory/2472-162-0x00000000695C1000-0x00000000695C2000-memory.dmp

                                          Filesize

                                          4KB

                                        • memory/2472-193-0x000000007358D000-0x0000000073598000-memory.dmp

                                          Filesize

                                          44KB

                                        • memory/2472-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

                                          Filesize

                                          64KB

                                        • memory/2472-1-0x000000007358D000-0x0000000073598000-memory.dmp

                                          Filesize

                                          44KB