Analysis

  • max time kernel
    161s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2025 19:34

General

  • Target

    https://stemscommunity.com/activation/id=15615238573

Malware Config

Signatures

  • Detected potential entity reuse from brand STEAM. 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://stemscommunity.com/activation/id=15615238573
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff95bb446f8,0x7ff95bb44708,0x7ff95bb44718
      2⤵
        PID:1836
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,1694877430630462050,12372705441003148990,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:2
        2⤵
          PID:2132
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,1694877430630462050,12372705441003148990,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2520 /prefetch:3
          2⤵
          • Detected potential entity reuse from brand STEAM.
          • Suspicious behavior: EnumeratesProcesses
          PID:5028
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,1694877430630462050,12372705441003148990,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:8
          2⤵
            PID:5052
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1694877430630462050,12372705441003148990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:1
            2⤵
              PID:648
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1694877430630462050,12372705441003148990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:1
              2⤵
                PID:4560
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1694877430630462050,12372705441003148990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:1
                2⤵
                  PID:2796
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,1694877430630462050,12372705441003148990,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:8
                  2⤵
                    PID:2276
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,1694877430630462050,12372705441003148990,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4384
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1694877430630462050,12372705441003148990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:1
                    2⤵
                      PID:4780
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1694877430630462050,12372705441003148990,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:1
                      2⤵
                        PID:4144
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1694877430630462050,12372705441003148990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:1
                        2⤵
                          PID:1620
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1694877430630462050,12372705441003148990,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:1
                          2⤵
                            PID:1340
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1694877430630462050,12372705441003148990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:1
                            2⤵
                              PID:4536
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1694877430630462050,12372705441003148990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:1
                              2⤵
                                PID:4760
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1694877430630462050,12372705441003148990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:1
                                2⤵
                                  PID:2552
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1694877430630462050,12372705441003148990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:1
                                  2⤵
                                    PID:2356
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1694877430630462050,12372705441003148990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:1
                                    2⤵
                                      PID:2904
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,1694877430630462050,12372705441003148990,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5100 /prefetch:2
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:3060
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:3948
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:616
                                      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                                        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Desktop\SelectUpdate.docx" /o ""
                                        1⤵
                                        • Checks processor information in registry
                                        • Enumerates system info in registry
                                        • Suspicious behavior: AddClipboardFormatListener
                                        • Suspicious use of SetWindowsHookEx
                                        PID:4764
                                      • C:\Windows\System32\NOTEPAD.EXE
                                        "C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Desktop\OptimizeAdd.bat
                                        1⤵
                                        • Opens file in notepad (likely ransom note)
                                        • Suspicious use of FindShellTrayWindow
                                        PID:1952

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        99afa4934d1e3c56bbce114b356e8a99

                                        SHA1

                                        3f0e7a1a28d9d9c06b6663df5d83a65c84d52581

                                        SHA256

                                        08e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8

                                        SHA512

                                        76686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        443a627d539ca4eab732bad0cbe7332b

                                        SHA1

                                        86b18b906a1acd2a22f4b2c78ac3564c394a9569

                                        SHA256

                                        1e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9

                                        SHA512

                                        923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                        Filesize

                                        408B

                                        MD5

                                        142a3ec2a129b99653ca9ded9899aad6

                                        SHA1

                                        c76ce490c6701b39d0532366e6a4077d9338cb4d

                                        SHA256

                                        e56fbd2e63bc328dc0194187ec1c7f56ee5cc869ee0fb05262d8349cc9bb9543

                                        SHA512

                                        bc2267b5d519b1db6edc2e54b9003b542b7909f380cc372d06d3e8ca32dd64d01afcc3085e5753ad805aaa3fda72338932427766eb0d408f1a8dbe6842ad5831

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                        Filesize

                                        952B

                                        MD5

                                        c54e65e414bdad8069d180e219f90536

                                        SHA1

                                        99cb562fa440803f18804143da6c6f73e3ccbcf3

                                        SHA256

                                        011da0c4a0d2715fbaf39cd6280d9ab30f495d5b56f7cf8f62895001b35ada46

                                        SHA512

                                        185aeaaee76f368cef7da7f10ddc6a4e361c726192dea17db8a3bb7d65658540ef6e559bdc247f02b086d3587f13cbc4581a5625faa8b20577c8b30f7aa93d7f

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                        Filesize

                                        952B

                                        MD5

                                        57bc0b9d7b1477b19ed1c0ab6f5c820a

                                        SHA1

                                        bc360777a794554b71c521a0cfd8eef5e6a8b463

                                        SHA256

                                        1cdbe4a46afec1b93c95d35ee6b8cfd169d9588661956e31ecde3cd96906b09e

                                        SHA512

                                        e0f1d3b41838d6b6d7c300cbe63630897312bd3e58b6d93eb033a7a86356ea1e96059d0d7e8a396ea5fd2b8c8c41028f4d89e671e267a27572d9d87968911211

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        8KB

                                        MD5

                                        85401b7ca7f3ee4f50174247be999df2

                                        SHA1

                                        9ded5a8bb78b0c0d0106a25eb7644b67cfcee39d

                                        SHA256

                                        d668228eec7c1f09a87dea27ffe43ba505f8f53f3ad399c02575d02234f27b14

                                        SHA512

                                        ef83818f2c4291b5c788325f064a69edf2ec02dc2abdf71a36da4d7a334a6dff714874ed723a93a15b2234daaf005e78f0bb7a7f53f26d7e4d0174efd90aeb12

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        8KB

                                        MD5

                                        ec2873f72b42cb8b83de956b01ad4794

                                        SHA1

                                        dee3514ff2b9350b737248b4df890d9a7e06d86f

                                        SHA256

                                        23b7cc5c67c5b462a835a9f2be7578576243bcc88723995ef4eaa0f106555381

                                        SHA512

                                        bdb2ae0a5cd8baf416a38bd58d5b62d0240c54d824b23a1bb80c83fed5ce634c40b5f0ab1ae9c4b2db212ab3f5c2d5dcf8149fa74379cefe19d93a5a0b3948e8

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        936bf014a09c5af13e021cfcc9895a2c

                                        SHA1

                                        bcdee2c1d424de5bd205864147e6916a8a5d8461

                                        SHA256

                                        2ce6a90acc14c77caf2d3a70258642f2ce17c57974ce013735ceb0eac771ed2c

                                        SHA512

                                        99912ba19c417421892c30981c63cd5de3428a331faaf9785b28f0c358d0f1b86661b8d9896b96e72aebdaa3ec3e3161a8061ed5ad7cf2938e17520d17c52302

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        8KB

                                        MD5

                                        8359a9f91d30ddcc21732871c89df91e

                                        SHA1

                                        d9d034c319bb248700b6e4b6c179b583635408b1

                                        SHA256

                                        023fe4abc9ffd351590a4a96817b9fa6c1f054775e8c9f096a35da2fc3faf577

                                        SHA512

                                        9f21dbe9fdf1679dca866d48d144ed6617c1877dfaeaf967b62cb11635f36ae741a06b7b4d43c82feee60b40506f19c4742e8ce21aeed3886472f8dad859c82f

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        f4b408d9217c588456861cff8de8d9d8

                                        SHA1

                                        8b24a8964d7267845ca0ee3dfc4e69e8eaa19cc6

                                        SHA256

                                        df3c581e9bb8ba6dcd59f19d7d40376078669d265c5f5205cbcebe021e88579d

                                        SHA512

                                        b3771ab902e4035d0479ee0d25c68df966a9d65e5879855f5f2ada10157064d5bf477c2cdc323068585a906f5609711581a4ec5289ce397d194560a531da6a6d

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                        Filesize

                                        1KB

                                        MD5

                                        fec05689b6ec5e046fb22f69f434d161

                                        SHA1

                                        c3224e5c6423e33e2fbae163d4da3be272474519

                                        SHA256

                                        d0df4cec5a349d9f9a29175dc6a41c2b44c61df902fb1ee8c548095cbc221562

                                        SHA512

                                        90da6166f081b687123f28dcd978c93bc06d1e15054839ee1ca39eee65ba33f99e9dde1af9c5ecc4a74b98704b0b54f03ccb1af946788d054adcec4a97cf9078

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe581fe7.TMP

                                        Filesize

                                        1KB

                                        MD5

                                        230d1698fde093ab82e71221ab9bca2a

                                        SHA1

                                        09e2980abc491788b2892602bf0ad23384f5498b

                                        SHA256

                                        df0a04ddf4d43edfb09c94f200fc4ee01e232958c6a54f744140e097c95ca009

                                        SHA512

                                        4808e156fce7ba2a531a2d6d9c9690b5391b64b4837cc83de0414246c10893d589db9f1680266e3b2a0efdd497c64ede06e9dbcb052716dc4fb572ffa61f8291

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        46295cac801e5d4857d09837238a6394

                                        SHA1

                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                        SHA256

                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                        SHA512

                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        206702161f94c5cd39fadd03f4014d98

                                        SHA1

                                        bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                        SHA256

                                        1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                        SHA512

                                        0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        10KB

                                        MD5

                                        d43ef57edaada7d6d4d6ffc96290734e

                                        SHA1

                                        23ed191058d1675cb7113c1ee46f141ac03f4ef2

                                        SHA256

                                        ee7de82272f1b5f10ec41fa8e90905cc17b1fc68e17ba98effc516bb6a57c6c4

                                        SHA512

                                        272686512afc74a607a505d0633aed81baa608c7871ec32e017f79ed1de13933e757d40b421243fbfb933ce5d8da1eb92982995575f690a7c9da5242a3fc740f

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        11KB

                                        MD5

                                        6793a0fc32e288985ae998ed2e4cc2c6

                                        SHA1

                                        9b2f75ed9dd02f1b70ab3357e865291cd8afbe24

                                        SHA256

                                        8dad0ed061692e05bf3de3db0ad3d454858a5c33f2d8b725e005a853644441a0

                                        SHA512

                                        252af3ce329f0d0d8d2e16967be3084684638890ad86127ffe55d6874128d0a4f0a671df453b1ae270dcd1adca7f3ff706449d162c2461edcff9a781d570a562

                                      • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\9cd93bc6dcf544bae69531052e64647ec02f2bb4.tbres

                                        Filesize

                                        4KB

                                        MD5

                                        f7fcbd6af518c619946064ce0c862bd9

                                        SHA1

                                        2a831fa87bb7a006f37ba9892dc79ae88b7e3195

                                        SHA256

                                        c02f1a88b36b5bbcb19d77e763b4109602893a1aba1669233463f7c0a32310e8

                                        SHA512

                                        aff6c08927b144113364294f0fcc58336795c119e3d28a193c9065b01c62a2f1c2d9d47f676adc79bcde8fdd97cdccb74122fd7c4d4e6c68e5e24bbe08c1fefc

                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

                                        Filesize

                                        298B

                                        MD5

                                        510ab95abc7ef2c22b3dbb2060892af8

                                        SHA1

                                        a762bff9ad2cb922b36c18795fecd02d5e1fae14

                                        SHA256

                                        bf2ceb002cde15ad8caf883a6f0130d189e088d2cf120c0966d45b8fbbf7d9f3

                                        SHA512

                                        6c136f98deeda2e4ae35bc4a1354f8059e36cbb7a417b0867d4a014202d2bae08d51a8efab568a5c3d923450e51b4c9931f59635d4435424664138817f9686ea

                                      • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

                                        Filesize

                                        12B

                                        MD5

                                        f6f801e5b0502f5e803ed826dd37ae44

                                        SHA1

                                        273e87aa518397186653443c0c3e81d574361708

                                        SHA256

                                        e7bcd23ba708556ee69f96050dc7e74f9dab95825bfab48bcea7fd8fac482fd1

                                        SHA512

                                        8fe0217b9c7f9331664dc4259c7924b9c7e5e145f0b795ec98d713e41a2e3d001014b3ac41071fe41447632ddbfbbefc8c7d6de8fa9faeca455a0a78575e5584

                                      • memory/4764-194-0x00007FF92A5D0000-0x00007FF92A5E0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4764-196-0x00007FF928160000-0x00007FF928170000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4764-195-0x00007FF928160000-0x00007FF928170000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4764-193-0x00007FF92A5D0000-0x00007FF92A5E0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4764-271-0x00007FF92A5D0000-0x00007FF92A5E0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4764-274-0x00007FF92A5D0000-0x00007FF92A5E0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4764-273-0x00007FF92A5D0000-0x00007FF92A5E0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4764-272-0x00007FF92A5D0000-0x00007FF92A5E0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4764-191-0x00007FF92A5D0000-0x00007FF92A5E0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4764-192-0x00007FF92A5D0000-0x00007FF92A5E0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/4764-190-0x00007FF92A5D0000-0x00007FF92A5E0000-memory.dmp

                                        Filesize

                                        64KB