Analysis

  • max time kernel
    63s
  • max time network
    64s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-10-2024 05:19

General

  • Target

    Umbral.exe

  • Size

    229KB

  • MD5

    05396af5253bb6dd42278b146668faac

  • SHA1

    44a769f9800ed7675b6b6bd57a6a123b6dc10371

  • SHA256

    eacb721b092e628a9699924dad19f4ea4ae1f3d7eb5dce85b5dcd16a273cd78b

  • SHA512

    3283964cff79c4fa5319f92bd429c19b0f99ae4a0f518a15882a132177eba60e2ed2ec0fbcfdf273e7e0be646b4f00cee0298a23bef5a83b1985029845f1b916

  • SSDEEP

    6144:lloZM+rIkd8g+EtXHkv/iD4FQpTNbYMTiqL9Y0hU9b8e1msBi:noZtL+EP8FQpTNbYMTiqL9Y0h8w

Malware Config

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Umbral family
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 2 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks system information in the registry 2 TTPs 4 IoCs

    System information is often read in order to detect sandboxing environments.

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
    "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4960
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" csproduct get uuid
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3600
  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\SplitSelect.docx" /o ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4500
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3200
    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe
      "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"
      1⤵
      • Modifies system executable filetype association
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe
        "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe" /update /restart
        2⤵
        • Executes dropped EXE
        • Checks system information in the registry
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4116
        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe
          C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe /update /restart /peruser /childprocess /extractFilesWithLessThreadCount /renameReplaceOneDriveExe /renameReplaceODSUExe /removeNonCurrentVersions /enableODSUReportingMode
          3⤵
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:664

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A

      Filesize

      471B

      MD5

      84697b844c4bf8295b192523d3502f0b

      SHA1

      08acec99f0bed2d8b82778983926e0c204105fb6

      SHA256

      18359abea906149bdc56031132e071cc39bef84722165176fb60c083380feffa

      SHA512

      a3ed8fdf499173cec19a080279e2d4c8738cef6123ee0b7a0330717edfcef7d48d9cea4cc790e896a6f312a45cf55aa29566be625a3fe4f3b8d1b4d7d44cee00

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

      Filesize

      471B

      MD5

      c11671674643d73cae76b5717704ee8a

      SHA1

      a93b6f870418e27e36b284333045c5c7264d3c47

      SHA256

      6e2b6aff8c7cd0c948d2f2b5653a7126f791fe8c0462ef6498e36912085dd145

      SHA512

      c4111ad849754d14b4c6f02a860683c0c141b020ba3a9f09a1595a6be1d7c1d3bbd4669cfc8436d7862cd72e1f9fa39d70c45d8e84c2272d3c779c03be8d5840

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A

      Filesize

      412B

      MD5

      ae500a03c0507acd295d88abe3a149fd

      SHA1

      ac1232cd1ad4862322ce627d2b801512c81ccb2c

      SHA256

      ab030b373798a3deb428edb30b576e5613ac2c550834d74d17fd75ea32f91104

      SHA512

      13e40e864c13abc38b564a5c7d00e211bb0cde6efa8c1cd854a3e628c8dd795cdf4a1c44334139b59135e6363e6a5e9cfe2630c2ee60558b63fc65ee246f4bc4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

      Filesize

      412B

      MD5

      4772dda337b0e33184d83e4632bc2c87

      SHA1

      dfdeea6607dd679dce9149989248866b838da456

      SHA256

      b7c9ed53d29ad4b2493f8e4ee4d11398dfce7a394248433146cc77073c6d399d

      SHA512

      7472a39f761180eaed720a3f8fdc12fbf237c85eb93da413082fad1c7d3b68f02bd560e0bacead50b04871b5bb6b71675c0f92bf87be5ca45710a6dc270218c7

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-100.png

      Filesize

      1KB

      MD5

      72747c27b2f2a08700ece584c576af89

      SHA1

      5301ca4813cd5ff2f8457635bc3c8944c1fb9f33

      SHA256

      6f028542f6faeaaf1f564eab2605bedb20a2ee72cdd9930bde1a3539344d721b

      SHA512

      3e7f84d3483a25a52a036bf7fd87aac74ac5af327bb8e4695e39dada60c4d6607d1c04e7769a808be260db2af6e91b789008d276ccc6b7e13c80eb97e2818aba

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-125.png

      Filesize

      1KB

      MD5

      b83ac69831fd735d5f3811cc214c7c43

      SHA1

      5b549067fdd64dcb425b88fabe1b1ca46a9a8124

      SHA256

      cbdcf248f8a0fcd583b475562a7cdcb58f8d01236c7d06e4cdbfe28e08b2a185

      SHA512

      4b2ee6b3987c048ab7cc827879b38fb3c216dab8e794239d189d1ba71122a74fdaa90336e2ea33abd06ba04f37ded967eb98fd742a02463b6eb68ab917155600

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-150.png

      Filesize

      2KB

      MD5

      771bc7583fe704745a763cd3f46d75d2

      SHA1

      e38f9d7466eefc6d3d2aaa327f1bd42c5a5c7752

      SHA256

      36a6aad9a9947ab3f6ac6af900192f5a55870d798bca70c46770ccf2108fd62d

      SHA512

      959ea603abec708895b7f4ef0639c3f2d270cfdd38d77ac9bab8289918cbd4dbac3c36c11bb52c6f01b0adae597b647bb784bba513d77875979270f4962b7884

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-200.png

      Filesize

      2KB

      MD5

      09773d7bb374aeec469367708fcfe442

      SHA1

      2bfb6905321c0c1fd35e1b1161d2a7663e5203d6

      SHA256

      67d1bb54fcb19c174de1936d08b5dbdb31b98cfdd280bcc5122fb0693675e4f2

      SHA512

      f500ea4a87a24437b60b0dc3ec69fcc5edbc39c2967743ddb41093b824d0845ffddd2df420a12e17e4594df39f63adad5abb69a29f8456fed03045a6b42388bc

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-400.png

      Filesize

      6KB

      MD5

      e01cdbbd97eebc41c63a280f65db28e9

      SHA1

      1c2657880dd1ea10caf86bd08312cd832a967be1

      SHA256

      5cb8fd670585de8a7fc0ceede164847522d287ef17cd48806831ea18a0ceac1f

      SHA512

      ffd928e289dc0e36fa406f0416fb07c2eb0f3725a9cdbb27225439d75b8582d68705ec508e3c4af1fc4982d06d70ef868cafbfc73a637724dee7f34828d14850

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-100.png

      Filesize

      2KB

      MD5

      19876b66df75a2c358c37be528f76991

      SHA1

      181cab3db89f416f343bae9699bf868920240c8b

      SHA256

      a024fc5dbe0973fd9267229da4ebfd8fc41d73ca27a2055715aafe0efb4f3425

      SHA512

      78610a040bbbb026a165a5a50dfbaf4208ebef7407660eea1a20e95c30d0d42ef1d13f647802a2f0638443ae2253c49945ebe018c3499ddbf00cfdb1db42ced1

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-125.png

      Filesize

      3KB

      MD5

      8347d6f79f819fcf91e0c9d3791d6861

      SHA1

      5591cf408f0adaa3b86a5a30b0112863ec3d6d28

      SHA256

      e8b30bfcee8041f1a70e61ca46764416fd1df2e6086ba4c280bfa2220c226750

      SHA512

      9f658bc77131f4ac4f730ed56a44a406e09a3ceec215b7a0b2ed42d019d8b13d89ab117affb547a5107b5a84feb330329dc15e14644f2b52122acb063f2ba550

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-150.png

      Filesize

      3KB

      MD5

      de5ba8348a73164c66750f70f4b59663

      SHA1

      1d7a04b74bd36ecac2f5dae6921465fc27812fec

      SHA256

      a0bbe33b798c3adac36396e877908874cffaadb240244095c68dff840dcbbf73

      SHA512

      85197e0b13a1ae48f51660525557cceaeed7d893dd081939f62e6e8921bb036c6501d3bb41250649048a286ff6bac6c9c1a426d2f58f3e3b41521db26ef6a17c

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-200.png

      Filesize

      4KB

      MD5

      f1c75409c9a1b823e846cc746903e12c

      SHA1

      f0e1f0cf35369544d88d8a2785570f55f6024779

      SHA256

      fba9104432cbb8ebbd45c18ef1ba46a45dd374773e5aa37d411bb023ded8efd6

      SHA512

      ed72eb547e0c03776f32e07191ce7022d08d4bcc66e7abca4772cdd8c22d8e7a423577805a4925c5e804ed6c15395f3df8aac7af62f1129e4982685d7e46bd85

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-400.png

      Filesize

      8KB

      MD5

      adbbeb01272c8d8b14977481108400d6

      SHA1

      1cc6868eec36764b249de193f0ce44787ba9dd45

      SHA256

      9250ef25efc2a9765cf1126524256fdfc963c8687edfdc4a2ecde50d748ada85

      SHA512

      c15951cf2dc076ed508665cd7dac2251c8966c1550b78549b926e98c01899ad825535001bd65eeb2f8680cd6753cd47e95606ecf453919f5827ed12bca062887

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-100.png

      Filesize

      2KB

      MD5

      57a6876000151c4303f99e9a05ab4265

      SHA1

      1a63d3dd2b8bdc0061660d4add5a5b9af0ff0794

      SHA256

      8acbdd41252595b7410ca2ed438d6d8ede10bd17fe3a18705eedc65f46e4c1c4

      SHA512

      c6a2a9124bc6bcf70d2977aaca7e3060380a4d9428a624cc6e5624c75ebb6d6993c6186651d4e54edf32f3491d413714ef97a4cdc42bae94045cd804f0ad7cba

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-125.png

      Filesize

      4KB

      MD5

      d03b7edafe4cb7889418f28af439c9c1

      SHA1

      16822a2ab6a15dda520f28472f6eeddb27f81178

      SHA256

      a5294e3c7cd855815f8d916849d87bd2357f5165eb4372f248fdf8b988601665

      SHA512

      59d99f0b9a7813b28bae3ea1ae5bdbbf0d87d32ff621ff20cbe1b900c52bb480c722dd428578dea5d5351cc36f1fa56b2c1712f2724344f026fe534232812962

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-150.png

      Filesize

      5KB

      MD5

      a23c55ae34e1b8d81aa34514ea792540

      SHA1

      3b539dfb299d00b93525144fd2afd7dd9ba4ccbf

      SHA256

      3df4590386671e0d6fee7108e457eb805370a189f5fdfeaf2f2c32d5adc76abd

      SHA512

      1423a2534ae71174f34ee527fe3a0db38480a869cac50b08b60a2140b5587b3944967a95016f0b00e3ca9ced1f1452c613bb76c34d7ebd386290667084bce77d

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-200.png

      Filesize

      6KB

      MD5

      13e6baac125114e87f50c21017b9e010

      SHA1

      561c84f767537d71c901a23a061213cf03b27a58

      SHA256

      3384357b6110f418b175e2f0910cffe588c847c8e55f2fe3572d82999a62c18e

      SHA512

      673c3bec7c2cd99c07ebfca0f4ab14cd6341086c8702fe9e8b5028aed0174398d7c8a94583da40c32cd0934d784062ad6db71f49391f64122459f8bb00222e08

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-400.png

      Filesize

      15KB

      MD5

      e593676ee86a6183082112df974a4706

      SHA1

      c4e91440312dea1f89777c2856cb11e45d95fe55

      SHA256

      deb0ec0ee8f1c4f7ea4de2c28ff85087ee5ff8c7e3036c3b0a66d84bae32b6bb

      SHA512

      11d7ed45f461f44fa566449bb50bcfce35f73fc775744c2d45ea80aeb364fe40a68a731a2152f10edc059dea16b8bab9c9a47da0c9ffe3d954f57da0ff714681

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-100.png

      Filesize

      783B

      MD5

      f4e9f958ed6436aef6d16ee6868fa657

      SHA1

      b14bc7aaca388f29570825010ebc17ca577b292f

      SHA256

      292cac291af7b45f12404f968759afc7145b2189e778b14d681449132b14f06b

      SHA512

      cd5d78317e82127e9a62366fd33d5420a6f25d0a6e55552335e64dc39932238abd707fe75d4f62472bc28a388d32b70ff08b6aa366c092a7ace3367896a2bd98

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-125.png

      Filesize

      1018B

      MD5

      2c7a9e323a69409f4b13b1c3244074c4

      SHA1

      3c77c1b013691fa3bdff5677c3a31b355d3e2205

      SHA256

      8efeacefb92d64dfb1c4df2568165df6436777f176accfd24f4f7970605d16c2

      SHA512

      087c12e225c1d791d7ad0bf7d3544b4bed8c4fb0daaa02aee0e379badae8954fe6120d61fdf1a11007cbcdb238b5a02c54f429b6cc692a145aa8fbd220c0cb2d

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-150.png

      Filesize

      1KB

      MD5

      552b0304f2e25a1283709ad56c4b1a85

      SHA1

      92a9d0d795852ec45beae1d08f8327d02de8994e

      SHA256

      262b9a30bb8db4fc59b5bc348aa3813c75e113066a087135d0946ad916f72535

      SHA512

      9559895b66ef533486f43274f7346ad3059c15f735c9ce5351adf1403c95c2b787372153d4827b03b6eb530f75efcf9ae89db1e9c69189e86d6383138ab9c839

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-200.png

      Filesize

      1KB

      MD5

      22e17842b11cd1cb17b24aa743a74e67

      SHA1

      f230cb9e5a6cb027e6561fabf11a909aa3ba0207

      SHA256

      9833b80def72b73fca150af17d4b98c8cd484401f0e2d44320ecd75b5bb57c42

      SHA512

      8332fc72cd411f9d9fd65950d58bf6440563dc4bd5ce3622775306575802e20c967f0ee6bab2092769a11e2a4ea228dab91a02534beeb8afde8239dd2b90f23a

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-400.png

      Filesize

      3KB

      MD5

      3c29933ab3beda6803c4b704fba48c53

      SHA1

      056fe7770a2ba171a54bd60b3c29c4fbb6d42f0c

      SHA256

      3a7ef7c0bda402fdaff19a479d6c18577c436a5f4e188da4c058a42ef09a7633

      SHA512

      09408a000a6fa8046649c61ccef36afa1046869506f019f739f67f5c1c05d2e313b95a60bd43d9be882688df1610ad7979dd9d1f16a2170959b526ebd89b8ef7

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\OneDrive.exe

      Filesize

      1.9MB

      MD5

      1c7eaa9f5a7ea5a58942e94adc424901

      SHA1

      254190bea43532224a51e34c1bb0762daec7deb3

      SHA256

      acf02bf598a1732248c7f829e2e6dc8b49231e8b623f2f3d43d62429bb547f7e

      SHA512

      d879149ffd0bc1e668808d28e5719014c528606997f23d0167d6eec1887470948f231fc18012f360d32f96c47ddf6e958785d7430ebf782a3cb66f24719d55e7

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe

      Filesize

      40.2MB

      MD5

      fb4aa59c92c9b3263eb07e07b91568b5

      SHA1

      6071a3e3c4338b90d892a8416b6a92fbfe25bb67

      SHA256

      e70e80dbbc9baba7ddcee70eda1bb8d0e6612dfb1d93827fe7b594a59f3b48b9

      SHA512

      60aabbe2fd24c04c33e7892eab64f24f8c335a0dd9822eb01adc5459e850769fc200078c5ccee96c1f2013173bc41f5a2023def3f5fe36e380963db034924ace

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\settings\Personal\logUploaderSettings_temp.ini

      Filesize

      38B

      MD5

      cc04d6015cd4395c9b980b280254156e

      SHA1

      87b176f1330dc08d4ffabe3f7e77da4121c8e749

      SHA256

      884d272d16605590e511ae50c88842a8ce203a864f56061a3c554f8f8265866e

      SHA512

      d3cb7853b69649c673814d5738247b5fbaaae5bb7b84e4c7b3ff5c4f1b1a85fc7261a35f0282d79076a9c862e5e1021d31a318d8b2e5a74b80500cb222642940

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\settings\PreSignInSettingsConfig.json

      Filesize

      63KB

      MD5

      e516a60bc980095e8d156b1a99ab5eee

      SHA1

      238e243ffc12d4e012fd020c9822703109b987f6

      SHA256

      543796a1b343b4ebc0285d89cb8eb70667ac7b513da37495e38003704e9d88d7

      SHA512

      9b51e99ba20e9da56d1acc24a1cf9f9c9dbdeb742bec034e0ff2bc179a60f4aff249f40344f9ddd43229dcdefa1041940f65afb336d46c175ffeff725c638d58

    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\setup\logs\DeviceHealthSummaryConfiguration.ini

      Filesize

      77B

      MD5

      9a05593e932c3f8a621e82773a2e67c4

      SHA1

      140ddbab470afe692161716af783bad5ca1b1e51

      SHA256

      b258347513f2eda32b95ee380182382486e3d16a9b952ec083c6fa88ef6162f8

      SHA512

      2af427451a57b2e196b49e88cc5a78d4e7298d1bc58c603f0ad37b62a6c37378170db1cfda1084c8c8b81318124c1c98374c6c98e43462fe49556adf84859875

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UV4TX9UP\update100[1].xml

      Filesize

      726B

      MD5

      53244e542ddf6d280a2b03e28f0646b7

      SHA1

      d9925f810a95880c92974549deead18d56f19c37

      SHA256

      36a6bd38a8a6f5a75b73caffae5ae66dfabcaefd83da65b493fa881ea8a64e7d

      SHA512

      4aa71d92ea2c46df86565d97aac75395371d3e17877ab252a297b84dca2ab251d50aaffc62eab9961f0df48de6f12be04a1f4a2cbde75b9ae7bcce6eb5450c62

    • C:\Users\Admin\AppData\Local\Temp\TCD4597.tmp\iso690.xsl

      Filesize

      263KB

      MD5

      ff0e07eff1333cdf9fc2523d323dd654

      SHA1

      77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

      SHA256

      3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

      SHA512

      b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

    • C:\Users\Admin\AppData\Local\Temp\tmpADB0.tmp

      Filesize

      35.9MB

      MD5

      5b16ef80abd2b4ace517c4e98f4ff551

      SHA1

      438806a0256e075239aa8bbec9ba3d3fb634af55

      SHA256

      bbc70091b3834af5413b9658b07269badd4cae8d96724bf1f7919f6aab595009

      SHA512

      69a22b063ab92ca7e941b826400c62be41ae0317143387c8aa8c727b5c9ee3528ddd4014de22a2a2e2cbae801cb041fe477d68d2684353cdf6c83d7ee97c43d4

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      Filesize

      387B

      MD5

      7e6df33577e81346eb6d234277ca2893

      SHA1

      4b5d37bd50b803f3f6576638b960717d33814828

      SHA256

      1d5f7b82e198444c458265dcfc5b03e8ccc72f431db11f9a14ff3c7a51aa554b

      SHA512

      5901116d933586043e4b38f7c1678b980e6e133046a2849d0337c9e68b831724912eab7c2632fffbf18b7930ebc588f8135bc5e614d151a57db8ac8fd5286f59

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

      Filesize

      4KB

      MD5

      37a8cec12110be1af0a2b47a15277b18

      SHA1

      3f19ef801c15a7a7e0689d40c17ab7e76fe81c5a

      SHA256

      868ef0130e3ccf2aedd60c08a077eb746ccf7dae750dbd8d7634bfdf95e98ece

      SHA512

      cc905b975452742bc9a8616723166fa44d2768eb62b2fe7fedced74308b62ab2736fd41cbb2a475aa3962eaa527b4945070ac5ca1b5d00fe239ebdcb5e392abd

    • memory/4500-42-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/4500-15-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/4500-14-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/4500-10-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/4500-7-0x00007FFC7CBF0000-0x00007FFC7CC00000-memory.dmp

      Filesize

      64KB

    • memory/4500-8-0x00007FFC7CBF0000-0x00007FFC7CC00000-memory.dmp

      Filesize

      64KB

    • memory/4500-6-0x00007FFCBCC0D000-0x00007FFCBCC0E000-memory.dmp

      Filesize

      4KB

    • memory/4500-16-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/4500-18-0x00007FFC7A4F0000-0x00007FFC7A500000-memory.dmp

      Filesize

      64KB

    • memory/4500-13-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/4500-12-0x00007FFC7CBF0000-0x00007FFC7CC00000-memory.dmp

      Filesize

      64KB

    • memory/4500-11-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/4500-5-0x00007FFC7CBF0000-0x00007FFC7CC00000-memory.dmp

      Filesize

      64KB

    • memory/4500-17-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/4500-43-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/4500-9-0x00007FFC7CBF0000-0x00007FFC7CC00000-memory.dmp

      Filesize

      64KB

    • memory/4500-41-0x00007FFCBCC0D000-0x00007FFCBCC0E000-memory.dmp

      Filesize

      4KB

    • memory/4500-40-0x00007FFCBCB70000-0x00007FFCBCD65000-memory.dmp

      Filesize

      2.0MB

    • memory/4500-19-0x00007FFC7A4F0000-0x00007FFC7A500000-memory.dmp

      Filesize

      64KB

    • memory/4960-1-0x000001C36C3E0000-0x000001C36C420000-memory.dmp

      Filesize

      256KB

    • memory/4960-0-0x00007FFC9E883000-0x00007FFC9E885000-memory.dmp

      Filesize

      8KB

    • memory/4960-4-0x00007FFC9E880000-0x00007FFC9F341000-memory.dmp

      Filesize

      10.8MB

    • memory/4960-2-0x00007FFC9E880000-0x00007FFC9F341000-memory.dmp

      Filesize

      10.8MB