Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28/06/2024, 17:24

General

  • Target

    https://dokumen.pub/download/mcse-planning-implementing-and-maintaining-a-windows-server-2003-environment-for-an-mcse-certified-on-windows-2000-exam-70-296-study-guide-and-dvd-training-system-1nbsped-9780080479323-9781932266573.html

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 4 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 27 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\LaunchWinApp.exe
    "C:\Windows\system32\LaunchWinApp.exe" "https://dokumen.pub/download/mcse-planning-implementing-and-maintaining-a-windows-server-2003-environment-for-an-mcse-certified-on-windows-2000-exam-70-296-study-guide-and-dvd-training-system-1nbsped-9780080479323-9781932266573.html"
    1⤵
      PID:4360
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:5024
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:4992
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2560
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4628
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:5104
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:2272
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3792
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:880
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      PID:3228
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa75fb9758,0x7ffa75fb9768,0x7ffa75fb9778
        2⤵
          PID:564
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1644 --field-trial-handle=1844,i,4126820246113971643,8790333005530391230,131072 /prefetch:2
          2⤵
            PID:5144
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1832 --field-trial-handle=1844,i,4126820246113971643,8790333005530391230,131072 /prefetch:8
            2⤵
              PID:5156
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2120 --field-trial-handle=1844,i,4126820246113971643,8790333005530391230,131072 /prefetch:8
              2⤵
                PID:5208
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2900 --field-trial-handle=1844,i,4126820246113971643,8790333005530391230,131072 /prefetch:1
                2⤵
                  PID:5252
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2908 --field-trial-handle=1844,i,4126820246113971643,8790333005530391230,131072 /prefetch:1
                  2⤵
                    PID:5264
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4472 --field-trial-handle=1844,i,4126820246113971643,8790333005530391230,131072 /prefetch:1
                    2⤵
                      PID:5608
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4648 --field-trial-handle=1844,i,4126820246113971643,8790333005530391230,131072 /prefetch:8
                      2⤵
                        PID:5652
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4796 --field-trial-handle=1844,i,4126820246113971643,8790333005530391230,131072 /prefetch:8
                        2⤵
                          PID:5664
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 --field-trial-handle=1844,i,4126820246113971643,8790333005530391230,131072 /prefetch:8
                          2⤵
                            PID:5864
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1844,i,4126820246113971643,8790333005530391230,131072 /prefetch:8
                            2⤵
                              PID:5952
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4876 --field-trial-handle=1844,i,4126820246113971643,8790333005530391230,131072 /prefetch:8
                              2⤵
                                PID:6016
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3680 --field-trial-handle=1844,i,4126820246113971643,8790333005530391230,131072 /prefetch:8
                                2⤵
                                  PID:3288
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=5004 --field-trial-handle=1844,i,4126820246113971643,8790333005530391230,131072 /prefetch:8
                                  2⤵
                                    PID:5892
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=5372 --field-trial-handle=1844,i,4126820246113971643,8790333005530391230,131072 /prefetch:1
                                    2⤵
                                      PID:5960
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 --field-trial-handle=1844,i,4126820246113971643,8790333005530391230,131072 /prefetch:8
                                      2⤵
                                        PID:6068
                                    • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                      "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                      1⤵
                                        PID:5472
                                      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                        1⤵
                                        • Modifies registry class
                                        PID:6128

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                        Filesize

                                        1KB

                                        MD5

                                        7e00fd9be621bbbc497b3c68afe0451b

                                        SHA1

                                        fa1156018d698aff0eb532c8f2e92cd85f5a337e

                                        SHA256

                                        c7bb939a3ad69093208ab7ae9d86bf717812967cc56c588efe24233b2471b9e1

                                        SHA512

                                        da3d3a4ce65a18a1a8a09db8448719ca39422ed2908ba9cf3625bc3e5827efe1572fae73c3f3b7039362a8fc44fa5f12ee8418c3980a2b5e7890c176dea83005

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                        Filesize

                                        371B

                                        MD5

                                        90611103d5ae7ef9c5f0dc8c1f83147b

                                        SHA1

                                        c9d303d978ccd6396411118dc3e5eb26f6f25c71

                                        SHA256

                                        da836c2d93f8003541fb00647399ea1c08282fa27f9f483be06db9e51f471008

                                        SHA512

                                        4e56e18124ae8c74364e8027653f807db98d41bf39b2c2bc126511747911bdeef0cf13f829b969687e58d0d22fd9ab9d906fa268c46cc96959384d9dd410d013

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                        Filesize

                                        371B

                                        MD5

                                        faa5a882c368d90beac7a567bcc40b93

                                        SHA1

                                        f65f6a5a9f9b389e8104a036b51385d16f4cf384

                                        SHA256

                                        2c2ccd422fbde3a45c2b8854721e934adbebbbfcad2b200608b720f2f2fafaaa

                                        SHA512

                                        276cfef5dfd360694d09deaa783df2b6ccae635490b51bfb5be419fdfd4173504468388d1e5f028c5ac8dac4780e6f12c49288ff2d93d09fe9e8f2c0bc1e1cad

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        ff0e02b059f28ebd53ddd0c92a573955

                                        SHA1

                                        9c4c2771aa541629ebf9b3dbc0e39fa7968986a4

                                        SHA256

                                        c4c8f94d15ef6d3f10695986f2f185b003fb80ff77df5f3ee51da80271208dee

                                        SHA512

                                        03cd97beb40ca085c5d1b5fa092b5224dee0f26a46ef8655191dcaca81bed1c6d2037cc032f009be5eb5a5a65db247afe57f68b7f157d800f6a773bd43dae7ac

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        71adee06d39f961d8a41610504e29f03

                                        SHA1

                                        c1422a7ea770c05800255a52bdba4b9331841d42

                                        SHA256

                                        147b856a81587dc2092ba771b903a453d8931c2d196ab825c1d64713d087e1bf

                                        SHA512

                                        5a590bef390752da37eb149bcdc576016fcf4e2832ae91ceb77717716c81477cd0caeb8818d9a6ed36d79b011bbdf612b85d8938997bc9d0bb50b9ea7a2fef41

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                        Filesize

                                        12KB

                                        MD5

                                        a5236abf7996c131db3c9bd8f2b6c190

                                        SHA1

                                        27dd20a8c6f084aa9abc0fe5e6c78e04a119e03f

                                        SHA256

                                        bb20aa1bdb6310a6d669e8e3acab203f5c5606eba6bc5107ee959ab47fa5ccac

                                        SHA512

                                        b1d1ce145dda98e4ca94b7ff24daf0c06ae435db2e1039db866ad0c01c52e8e38331d4749a3d7ccf5c5ba54b3ae355c3551926b9d4fafeb1ab66d1582ce76d34

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                        Filesize

                                        289KB

                                        MD5

                                        357d4e994191368c7b81ec91bd318e21

                                        SHA1

                                        597313944d0f7a8280ce96ff328dba985a7125eb

                                        SHA256

                                        788919105bf6dbc3f98438a412548bb3c5faad7f1fa6c4942820a2e8d81c99b9

                                        SHA512

                                        215835ff30e048e7ee0c60ed6bb589635abaf00380459845d3ec8c1a9e4fd11b8ca8ec5185700ee29c24dad9144531340dc53d66e39a753bfd6ac20c09c6e15c

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                        Filesize

                                        289KB

                                        MD5

                                        606cb172ac4063aaa6732d50a796938d

                                        SHA1

                                        c08e3ce99c7a0adbd3271f7f648e339d37bdde84

                                        SHA256

                                        c2d1e90996e2987f118b9acf104516c04874c51201cc21dcc08b55321105674d

                                        SHA512

                                        f5ac4b79417dce89c7c7e64a836a8c8e33bb9e26d8f6144bff86adec892f6eb27a92701d30289cb978eb07b60d5fc08ee9333d4172a3cafc749b369e0ce80218

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                        Filesize

                                        264KB

                                        MD5

                                        dd1ab67c6ecbf40c1c32726f24a635cc

                                        SHA1

                                        54a4462bd2e976306d80994ff1b093c0d55b0023

                                        SHA256

                                        b7570cd5876f4c784fcce384338a5ca10d7b1273894f1ad9fd898daf4817a773

                                        SHA512

                                        dddd080c1dfa555d3c9245a70d31a494983c11e2a0ba9134810b776fd396b81bc20f42ea30f26752e0bf6e405dcbd42c484514b54214bdab958eec11e1fa567f

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                        Filesize

                                        2B

                                        MD5

                                        99914b932bd37a50b983c5e7c90ae93b

                                        SHA1

                                        bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                        SHA256

                                        44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                        SHA512

                                        27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\V28C7N3J\edgecompatviewlist[1].xml

                                        Filesize

                                        74KB

                                        MD5

                                        d4fc49dc14f63895d997fa4940f24378

                                        SHA1

                                        3efb1437a7c5e46034147cbbc8db017c69d02c31

                                        SHA256

                                        853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

                                        SHA512

                                        cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

                                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\VIIN2MMI\warmup[2].gif

                                        Filesize

                                        43B

                                        MD5

                                        325472601571f31e1bf00674c368d335

                                        SHA1

                                        2daeaa8b5f19f0bc209d976c02bd6acb51b00b0a

                                        SHA256

                                        b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b

                                        SHA512

                                        717ea0ff7f3f624c268eccb244e24ec1305ab21557abb3d6f1a7e183ff68a2d28f13d1d2af926c9ef6d1fb16dd8cbe34cd98cacf79091dddc7874dcee21ecfdc

                                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\User\Default\DOMStore\J1ZMIH3D\www.bing[1].xml

                                        Filesize

                                        1KB

                                        MD5

                                        70f8d1377c20710a89cca8d37c096b1a

                                        SHA1

                                        e9e6cf796e387a2a1910adef6304f3114cf77020

                                        SHA256

                                        a852c9808d49730039cc3c3a90658692d3cf52a10426fcc04e4ed41f6310422b

                                        SHA512

                                        8b1cad92c167e0ce5dcd5adcfe17c359cab3fd680f5285ec79886fd1e93781a7dad19ed49bb7a740642eb5cf7444f8e82f90470d7a7d3ea01c3435b77d7ab529

                                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\User\Default\DOMStore\J1ZMIH3D\www.bing[1].xml

                                        Filesize

                                        6KB

                                        MD5

                                        b8320c0db389cac01e1285404b6ed3af

                                        SHA1

                                        563fca0fa59b25276ab795122a692f9ebbfa5e2a

                                        SHA256

                                        269b9f8aec7f9d886299d3336ab0f02f9c5bd5741b3d1c1deebf61d497e6dba7

                                        SHA512

                                        de9bd458a7e1bc0695d91a6386248e46f788baa453068ef0c6694bf612e0349c1b7365539adfbcb7fc3d4eb3728a4bbc9fff7941c9504ebea15a9da6fabdf064

                                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                        Filesize

                                        4KB

                                        MD5

                                        1bfe591a4fe3d91b03cdf26eaacd8f89

                                        SHA1

                                        719c37c320f518ac168c86723724891950911cea

                                        SHA256

                                        9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

                                        SHA512

                                        02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

                                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\4SVC5XL2\suggestions[1].en-US

                                        Filesize

                                        17KB

                                        MD5

                                        5a34cb996293fde2cb7a4ac89587393a

                                        SHA1

                                        3c96c993500690d1a77873cd62bc639b3a10653f

                                        SHA256

                                        c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                                        SHA512

                                        e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                                      • memory/3792-149-0x000002216EC80000-0x000002216ECA0000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/3792-155-0x000002216EF70000-0x000002216EF90000-memory.dmp

                                        Filesize

                                        128KB

                                      • memory/3792-106-0x000002215E900000-0x000002215EA00000-memory.dmp

                                        Filesize

                                        1024KB

                                      • memory/4628-42-0x000001A244800000-0x000001A244900000-memory.dmp

                                        Filesize

                                        1024KB

                                      • memory/5024-0-0x00000193C2A20000-0x00000193C2A30000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/5024-35-0x00000193BFE90000-0x00000193BFE92000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/5024-16-0x00000193C2B20000-0x00000193C2B30000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/5024-403-0x00000193C9BB0000-0x00000193C9BB1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/5024-402-0x00000193C9BA0000-0x00000193C9BA1000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/5104-62-0x000001598C2B0000-0x000001598C2B2000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/5104-69-0x000001598C6E0000-0x000001598C6E2000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/5104-65-0x000001598C2E0000-0x000001598C2E2000-memory.dmp

                                        Filesize

                                        8KB

                                      • memory/5104-67-0x000001598C6C0000-0x000001598C6C2000-memory.dmp

                                        Filesize

                                        8KB