Analysis

  • max time kernel
    473s
  • max time network
    458s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06-02-2025 16:21

General

  • Target

    BootstrapperNew (1).exe

  • Size

    3.0MB

  • MD5

    7463b682190f219845ba70fd04846e76

  • SHA1

    70d1660295c9583db59168203c6df43a5e8cf133

  • SHA256

    49425ff07e1039c2390aa13ca2e76d7f64faa75d4b55f36fc1a2b072f0975e20

  • SHA512

    6998eea72dfbf17e499f06d2a77791110c3aeb9bcc8cec5c97ee383e3778b7c19722539b75be9b2cfee6047fb8d5ade1342ecee840959740981646851f908ba2

  • SSDEEP

    49152:4s7p1EZKMnkmWg8LX5prviYDyKS5AypQxbRQAo9JnCmpau/nRFfjI7L0qb:4sHTPJg8z1mKnypSbRxo9JCm

Malware Config

Extracted

Family

orcus

Botnet

solara

C2

31.44.184.52:62202

Mutex

sudo_9odrc73zfqvqrot3tg2p1he83zq7z2g1

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %appdata%\updatelongpoll\BootstrapperNew.exe

  • reconnect_delay

    10000

  • registry_keyname

    Sudik

  • taskscheduler_taskname

    sudik

  • watchdog_path

    AppData\aga.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus family
  • Orcus main payload 1 IoCs
  • Orcurs Rat Executable 2 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 64 IoCs
  • Modifies system executable filetype association 2 TTPs 9 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 1 IoCs
  • Checks system information in the registry 2 TTPs 8 IoCs

    System information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 7 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 29 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 60 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew (1).exe
    "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew (1).exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:924
    • C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
      "C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:804
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
        3⤵
          PID:4676
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:708
    • C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
      C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
      1⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2868
    • C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
      C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1128
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"
        2⤵
          PID:3968
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"
          2⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1864
      • C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
        C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:984
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:492
      • C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
        C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4644
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:3008
      • C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
        C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
        1⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4468
      • C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
        C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
        1⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:5088
      • C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
        C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
        1⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:4264
      • C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
        C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
        1⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:3552
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:3176
        • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
          "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
          1⤵
          • Suspicious use of SetWindowsHookEx
          PID:1220
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://appdata/
          1⤵
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:3388
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff913c03cb8,0x7ff913c03cc8,0x7ff913c03cd8
            2⤵
              PID:708
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,15202123263131472202,4663262614230426996,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1996 /prefetch:2
              2⤵
                PID:1016
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1872,15202123263131472202,4663262614230426996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 /prefetch:3
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:4824
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1872,15202123263131472202,4663262614230426996,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:8
                2⤵
                  PID:848
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15202123263131472202,4663262614230426996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3156 /prefetch:1
                  2⤵
                    PID:2572
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15202123263131472202,4663262614230426996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3164 /prefetch:1
                    2⤵
                      PID:2556
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15202123263131472202,4663262614230426996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:1
                      2⤵
                        PID:3808
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1872,15202123263131472202,4663262614230426996,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4796 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3804
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15202123263131472202,4663262614230426996,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:1
                        2⤵
                          PID:2812
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:5000
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:796
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://appdata/
                            1⤵
                            • Enumerates system info in registry
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:4276
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff913c03cb8,0x7ff913c03cc8,0x7ff913c03cd8
                              2⤵
                                PID:4052
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,7649846080082388181,11261956160315900478,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:2
                                2⤵
                                  PID:932
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,7649846080082388181,11261956160315900478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:3
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4064
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,7649846080082388181,11261956160315900478,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:8
                                  2⤵
                                    PID:2468
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,7649846080082388181,11261956160315900478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2272 /prefetch:1
                                    2⤵
                                      PID:2964
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,7649846080082388181,11261956160315900478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:1
                                      2⤵
                                        PID:748
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:2448
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:3104
                                        • C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
                                          C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
                                          1⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          PID:1200
                                        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe
                                          "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"
                                          1⤵
                                          • Modifies system executable filetype association
                                          • System Location Discovery: System Language Discovery
                                          • Checks processor information in registry
                                          • Modifies Internet Explorer settings
                                          • Modifies registry class
                                          • Suspicious behavior: AddClipboardFormatListener
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of FindShellTrayWindow
                                          • Suspicious use of SendNotifyMessage
                                          • Suspicious use of SetWindowsHookEx
                                          PID:3148
                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe
                                            "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe" /update /restart
                                            2⤵
                                            • Executes dropped EXE
                                            • Checks system information in the registry
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4892
                                            • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe
                                              C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe /update /restart /peruser /childprocess /extractFilesWithLessThreadCount /renameReplaceOneDriveExe /renameReplaceODSUExe /removeNonCurrentVersions /enableODSUReportingMode
                                              3⤵
                                              • Executes dropped EXE
                                              • Modifies system executable filetype association
                                              • Adds Run key to start application
                                              • Checks system information in the registry
                                              • System Location Discovery: System Language Discovery
                                              • Modifies Internet Explorer settings
                                              • Modifies registry class
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3436
                                              • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncConfig.exe
                                                "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncConfig.exe"
                                                4⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Drops desktop.ini file(s)
                                                • System Location Discovery: System Language Discovery
                                                • Modifies registry class
                                                PID:5088
                                              • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe
                                                /updateInstalled /background
                                                4⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Modifies system executable filetype association
                                                • Checks system information in the registry
                                                • System Location Discovery: System Language Discovery
                                                • Modifies Internet Explorer settings
                                                • Modifies registry class
                                                • Suspicious behavior: AddClipboardFormatListener
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SendNotifyMessage
                                                • Suspicious use of SetWindowsHookEx
                                                PID:3468
                                        • C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
                                          C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
                                          1⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          PID:4828
                                        • C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
                                          C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
                                          1⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3048
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
                                            2⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:4984
                                        • C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
                                          C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
                                          1⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4244
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                                            2⤵
                                              PID:1044
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                                              2⤵
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3164
                                          • C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
                                            C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
                                            1⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetThreadContext
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4224
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe
                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\caspol.exe"
                                              2⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2288
                                          • C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
                                            C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe
                                            1⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:1420
                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe
                                            "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"
                                            1⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Modifies system executable filetype association
                                            • Checks system information in the registry
                                            • System Location Discovery: System Language Discovery
                                            • Modifies Internet Explorer settings
                                            • Modifies registry class
                                            PID:5000

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BootstrapperNew.exe.log

                                            Filesize

                                            1KB

                                            MD5

                                            9ab70628e2d07fb6d0af7ffe9c2534eb

                                            SHA1

                                            73e1d327502efc4ae6f21277eba6b4fddca8da3f

                                            SHA256

                                            a20c6b19845afcbb3346022339b60594c062bf437ff2303a25d8329d8baf73e6

                                            SHA512

                                            142912047400eeb4bd866f1b459bf0b4f44658fcf4e77ffa88d94e54240f87282a8af25381e3e834f094b6a8f5d607f5cf90930e2462ddaee8a7e8dcfecbbb9d

                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\regasm.exe.log

                                            Filesize

                                            2KB

                                            MD5

                                            4cb4dd48bc56fa7e442a08bd90b3a67f

                                            SHA1

                                            07e7accfa1b65135eb01495d8164fe2d42ed7baf

                                            SHA256

                                            bfa250b55817a4f82dfc9bd80794e3a2dd0e6705e1b7b9b3e052b5ca75453b29

                                            SHA512

                                            d6e7320526cb1f539825da20bb2154a844db10e580fcb457ea7335e37c9ba94b219c585c146a4646e4d6e87eee70dff1311ed0fc04d6cf8e6434b0145fa68558

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            d91478312beae099b8ed57e547611ba2

                                            SHA1

                                            4b927559aedbde267a6193e3e480fb18e75c43d7

                                            SHA256

                                            df43cd7779d9fc91fd0416155d6771bc81565e98be38689cb17caece256bf043

                                            SHA512

                                            4086c4ebe410a37d0124fc8bd00c58775e70ab2b7b5a39b4e49b332ce5b4866c6775707436395467aff9596507c96fb4896f3bf0249c5b9c99a927f31dcc1a96

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            d7145ec3fa29a4f2df900d1418974538

                                            SHA1

                                            1368d579635ba1a53d7af0ed89bf0b001f149f9d

                                            SHA256

                                            efc56eb46cf3352bf706c0309d5d740bca6ac06142f9bdc5e8344b81d4d83d59

                                            SHA512

                                            5bb663ede88f8b7c96b09c1214aac68eda99bc09525ac383baa96914ff7d553ea1aed09e3c9d16893d791c81ddb164c682dfbb4759ac0bc751221f3e36558a91

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                            Filesize

                                            152B

                                            MD5

                                            8f1be09b130085453561f02a4a8630f5

                                            SHA1

                                            bec8d412f032e87895e116d37ef61fb8ec2dff8e

                                            SHA256

                                            6a57dd63797ab92e3cf35d0557e045b026ac577e69ce224707a38b993b359daa

                                            SHA512

                                            0c35440bacf81014122702d22100127bd44154a602f5627371355399d2fa300c42c2eaa0cb6bf3ba8413d5cd7cf3a9ac15d934e8872cde8f7342deae63079420

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\data_0

                                            Filesize

                                            44KB

                                            MD5

                                            73e634c6219c75f9d1d40de1d0dd5c4e

                                            SHA1

                                            aa11e9c009383e8e1fdb8d7c9450eb044eaf7318

                                            SHA256

                                            46ed3343209e99e9ea60d1828280ca899681a29f180417fd335a7dbe2caaff64

                                            SHA512

                                            742f7afc7d056764cf52b1ec013116f4070f4929e685d2e487461cdf0be3bdd55b3abe56a464e5a129b112287c728907a515f612d39f82835a7525b464cb18ef

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\data_1

                                            Filesize

                                            264KB

                                            MD5

                                            2b84055e1ce69c0269dd3e216c50b0f8

                                            SHA1

                                            14532b48a395c5590b8775063b108af70eff56bd

                                            SHA256

                                            6a026626cf95ca8e75cf79c9b7ff63ca4329ada961ffe01404aebf5b22f35c98

                                            SHA512

                                            813f017c53b43651e3936ad1299d803443383007144c411a1ea9ca1348bd96a3d35372b31e1d74cc2e0f160b605d4d101ee2a24e041b973ba4206de0ca3f7798

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History Provider Cache

                                            Filesize

                                            6B

                                            MD5

                                            a9851aa4c3c8af2d1bd8834201b2ba51

                                            SHA1

                                            fa95986f7ebfac4aab3b261d3ed0a21b142e91fc

                                            SHA256

                                            e708be5e34097c8b4b6ecb50ead7705843d0dc4b0779b95ef57073d80f36c191

                                            SHA512

                                            41a1b4d650ff55b164f3db02c8440f044c4ec31d8ddbbbf56195d4e27473c6b1379dfad3581e16429650e2364791f5c19aae723efc11986bb986ef262538b818

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\LOG

                                            Filesize

                                            331B

                                            MD5

                                            3a2d4c59480382dd3e3a7b7ccd022574

                                            SHA1

                                            3ddc338a87e4b58a034676e9462ebf9c11183a02

                                            SHA256

                                            2f007a22532fc1c3daca5e754d9421064b12512cd29c5f384b9543aa007c5709

                                            SHA512

                                            6ed80ed1046004250782705bdb46008398ce3468b57422d9c53da95cc19c3224da14fb2c5a3fbe0f5ce185f9c4e4bda92ff089f83da3bbb27c0fa13e5aaf5404

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            9ea6ee1b7e04a57370d4fb193701541a

                                            SHA1

                                            019d1862a5df19c7a7612236f5bb3bbff971b1ae

                                            SHA256

                                            b03fea8aa4d34ebb010098362261908b813b50cd825ea5fb1394e925e3eb6000

                                            SHA512

                                            41ebcf93030ffaf6cdf439df2253a78c1aed48139fe0e4a9c10340b3645b3599c4d9e2c6abe114173dedde0b6b25cece43ba7fc036b0aceab8945bebc93878d6

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            501e347ddfe0138d7ecf153e8fb28960

                                            SHA1

                                            6bb8ef41fca02e31f189a0018002824b6cbe0145

                                            SHA256

                                            6f38c1c542878f29774652f009e42d3f1d44431063c9996e84d3d5c5a3ec376f

                                            SHA512

                                            62d95e84186987b2f3e7297b48fcd4a2504810bd38f40d3191b792abdb474f41441faf2f628a0a2e853dddfa2f22ba607e43e902f2364ef6492954cf51651bdd

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            55ece6d419142033fe1ce8e4f57a3a13

                                            SHA1

                                            64caecfd53128f1766ff621e069650d4507f26c3

                                            SHA256

                                            5c958d4bf69de4d0f868bb6856c3379bc86d96f26be0050556d8a84d0141fd39

                                            SHA512

                                            2376441eeb0f81fcfe297b6c834defba5f060cd938640a77c0e84c2c58644c092dfd6e55ba53b16c5872239d48283402958ba7a3ab0144b86c3dc6a6dcd33a07

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                            Filesize

                                            5KB

                                            MD5

                                            472b4cc0c03267365134a917ba0ccb57

                                            SHA1

                                            81989bffa8128e6132fe31320c3f7fc864c61eb0

                                            SHA256

                                            3460691477c00eb91beaea60b9ccb138a244f6e9175b1ed7b212827f4a9f64bb

                                            SHA512

                                            f4cdb155b39bb45271971a0530c0d3d88bbeea27662ce11a68747842afeff0c66df4ab70423f355b4983fd4f537fbcb3798fecc4e6609626e7a0eff5389ae14d

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\000003.log

                                            Filesize

                                            137B

                                            MD5

                                            a62d3a19ae8455b16223d3ead5300936

                                            SHA1

                                            c0c3083c7f5f7a6b41f440244a8226f96b300343

                                            SHA256

                                            c72428d5b415719c73b6a102e60aaa6ad94bdc9273ca9950e637a91b3106514e

                                            SHA512

                                            f3fc16fc45c8559c34ceba61739edd3facbbf25d114fecc57f61ec31072b233245fabae042cf6276e61c76e938e0826a0a17ae95710cfb21c2da13e18edbf99f

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\LOG

                                            Filesize

                                            319B

                                            MD5

                                            877caf9821411eba64ad870d6dbcac6d

                                            SHA1

                                            ed1bb84d9eb74a169209a74b1178f40df007fda0

                                            SHA256

                                            f335591aaba41263c87359df274d14d6174bec71f6d060859132bbcc737d50c0

                                            SHA512

                                            c8a0eebcbdf5cca97a597e4232b04f5bd8f7cecb009b09cd1d64bb416603c85190711c7b868b69664e1c253a5b7cbdb98205c7e4813e765a839cd7f8259ca5ae

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Session_13383332773252921

                                            Filesize

                                            941B

                                            MD5

                                            287c699d46ab6b1bb46cabfaf104c7f4

                                            SHA1

                                            85062300bab7eb1b570a9a18bc78bece9fef1345

                                            SHA256

                                            707501762836a75dbeb3af1d71efa437a2dc323e55b32e925648deb6cabc5518

                                            SHA512

                                            8b4ca389b4360ea23ea1d936e8dc720353182d8b5826ad8088499f779c7ede39a26876f024f2058fe6a1a0be9c80a10c7ccad2b74b3b0c223834a9a8dcad2d86

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sessions\Tabs_13383332773422921

                                            Filesize

                                            1KB

                                            MD5

                                            4913d2b10f0b713499747bf42f289447

                                            SHA1

                                            229717aaeec82ab7502e9a3f4aab7d141e5f8bfb

                                            SHA256

                                            d9e8a4303619bcf31a4db3994511f62cace45a3f1dc725ca6c8dd558760b30fc

                                            SHA512

                                            59b5964dad1550ec47186dfb21d808dcdc2a314a2aa37bd593342f57ec90e60b385275d2ef1a888db7c8e248bb58842b8a876fe97577380ead93467032a9d6e8

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\000003.log

                                            Filesize

                                            112B

                                            MD5

                                            a7c4675e5514258d728a8fe3738adfbb

                                            SHA1

                                            49bc8cf27a278376d762e409499a4b8f85229465

                                            SHA256

                                            2e17c1ad215a7e759539f9965231cd8326c175aef664780f7743674202e0eb3f

                                            SHA512

                                            ecedb35a34236661e52d737e792a1a94bb27842448aa3ac0bea86bd34aee3f43c46a40109bbb1ed5d773cfcb140a51095f9e148631d83ca8d073fe1c58d0ae4d

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG

                                            Filesize

                                            347B

                                            MD5

                                            e573afcae0a2f6a936ca031e740402e6

                                            SHA1

                                            4b7869f1f2d2f5048c7ff603dd3914e3fd0cadee

                                            SHA256

                                            6135e7a0cb19d082e9cfa3fdd99339f3bf97031066f2fcabd49a240c5af2028a

                                            SHA512

                                            4ff1772abb85f2fa46669f1b3fdbbf5ff87e36627397fa592326a7e65299f82a24b9e0159c6534d05c723f8a2f4f1a4440549870b50945e457d7eb38584a7a45

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG

                                            Filesize

                                            323B

                                            MD5

                                            b51a7fe0fb652d50881e51520b858e91

                                            SHA1

                                            082484e85181db953344d4c26cf7124cc9d3f577

                                            SHA256

                                            0c67182fc64399720896e8826499138ed5d532b08f7e5099877fbb1542158a03

                                            SHA512

                                            ed8ca9453c4f47ff561e27751881426985bee47a436f7d95aadaf85efcd9d698175a51fe07983d44325bb56805445774c3b213846b3298471bbb49e0098f7165

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\load_statistics.db

                                            Filesize

                                            44KB

                                            MD5

                                            ca1c13576e427d4d2626e606f32701fe

                                            SHA1

                                            634a9de840f2cbaecd1a1e71a131a34a26aa39dc

                                            SHA256

                                            6e886bcdd4e0893ecc044d8f83124a71d23e056b9ce3ab68bd411fa9fbc5946f

                                            SHA512

                                            7162fe89002867b2a82ae347d4de3deccd9fedcb81bfeffee6212559b8fca67c2763cafc10e43a90e75e6bc8033366b26fc8fd171f9237518ca6cee5d54a2a1d

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\LOG

                                            Filesize

                                            319B

                                            MD5

                                            43f973736a4bedb902df3ad5b770dc09

                                            SHA1

                                            6a6119263d5770845907d8d94767db19b635d3b2

                                            SHA256

                                            d2c467b636a90e445feca83697665095aade4a3bf1ad2be8d62f2262a930b1a4

                                            SHA512

                                            7f23706b764d8e2069e8d2d8954cbd26de618ccf17955310a45bba682f7e014f603bab83592cca6bc92ae171f93e11115a1d309a0c1e3f53fe084ebfe14eaa23

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\LOG

                                            Filesize

                                            337B

                                            MD5

                                            11352cfdfad4885f767009a3f9d4cebc

                                            SHA1

                                            20e460c19f1bd3dd06f89817370c270a1f5e96a0

                                            SHA256

                                            6cdf588639d70a74e45b1c8115e90bbe50d9011d27a93b839ff7eb796cea5a99

                                            SHA512

                                            097bf7ac778386b092dbbb041108384e0986ba9dc97fe252e31c2e256a5cf6e745112816498108a8a933ef1f26832913c4d03493c6ba2ade60874286a8793c03

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_0

                                            Filesize

                                            44KB

                                            MD5

                                            6227ba56cf20902dd1a6b69955efb872

                                            SHA1

                                            0f08c473a34a6fd025a42167b8db64226a454ad3

                                            SHA256

                                            ee58370b738b92d8dae9aaaeebd7dee95e34a35ff4e786921220d5f38458bd98

                                            SHA512

                                            12c59ccbc5711ebafa8b6abaffaf97d4186d34eaf5dd8143ef370e004552adc6bb5ee6517ddc9217755e5fe375a18ba67756733e23fffca24ab36c9c462819ef

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_1

                                            Filesize

                                            264KB

                                            MD5

                                            9ff87445234502023e0ed985fb8e241a

                                            SHA1

                                            745b56b695ab0d8da25273851a6ded6b43a755eb

                                            SHA256

                                            5ae96f63eec5790e3e62c15142dfd17611b94d789c544af7a27fc226dd0b4f66

                                            SHA512

                                            9d70cddcee794e2548859f990eb151d62ae45b3729f7ca48a11da7d2ca2c37b7f810fb10f02e600e12c46a6e694a7b7ea64562f5445063a42099261c9b653682

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_3

                                            Filesize

                                            4.0MB

                                            MD5

                                            af5ba364a05275ca13079776817220d7

                                            SHA1

                                            961cbfc2f47ff1207dc205e1583bbece595940c5

                                            SHA256

                                            a6963ec6ccd78dbd8ffe6d3ae43ec6edac0d960363e052e0eb511bfdd5a8bd61

                                            SHA512

                                            b9891face534df179206cba4443f65e9eb96ad9c225f0d02aa8dd7b83f271cf126429f609e3e1947661f687cb3e3c663d6ef9df2842f981d7d04b64d13d2fb41

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Last Version

                                            Filesize

                                            11B

                                            MD5

                                            b29bcf9cd0e55f93000b4bb265a9810b

                                            SHA1

                                            e662b8c98bd5eced29495dbe2a8f1930e3f714b8

                                            SHA256

                                            f53ab2877a33ef4dbde62f23f0cbfb572924a80a3921f47fc080d680107064b4

                                            SHA512

                                            e15f515e4177d38d6bb83a939a0a8f901ce64dffe45e635063161497d527fbddaf2b1261195fde90b72b4c3e64ac0a0500003faceffcc749471733c9e83eb011

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            10KB

                                            MD5

                                            96803728402f40bc1fa760c414f89591

                                            SHA1

                                            ed181a76c11d9d8b255b96e8f44fb945d2c64901

                                            SHA256

                                            6a0f0069eac24edfe0ebe4a7a2a400c77e1e403147bc0ac906845aef20b870f9

                                            SHA512

                                            05349bf4551519b288002dfc1df34f78755db5f2d427c8472b1b544bfbaa80b5ff7cbe6fbac4f2d1ffe6dd9426378116308cf4d876771936fd50f0cf51d963d5

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                            Filesize

                                            10KB

                                            MD5

                                            98358b74ac1d12ffc9c2a795a575194e

                                            SHA1

                                            f790f9809fa352928d60f9ad8485f2189ddc00a1

                                            SHA256

                                            a5ea4dc171275bb660e02d096c189d0f5843ce1e4603c3e3c5081d9ea741c327

                                            SHA512

                                            5bae28f74774fa6c70e5e2e37f651147c0d45ef6bc09d5210575f209554fba24bd828945611f235fc54bd5db191fec7c7ac4cc1d3f5f94c2d20079c7fbc17dd1

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                            Filesize

                                            264KB

                                            MD5

                                            f50f89a0a91564d0b8a211f8921aa7de

                                            SHA1

                                            112403a17dd69d5b9018b8cede023cb3b54eab7d

                                            SHA256

                                            b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                            SHA512

                                            bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\edge_shutdown_ms.txt

                                            Filesize

                                            4B

                                            MD5

                                            ef1b27f31729ccbeefef022da2d16be2

                                            SHA1

                                            77995375a6e174ef978c8169a51a5bad0347c026

                                            SHA256

                                            dc37b02c3f1ffe64431be8bfbb3c9d2b8f92448de9c1ba50a56b2a5f04dec4ee

                                            SHA512

                                            db20b5ed90de0ffb78d57165f7c0765f6f0ee466fa4f4b0d094bb3aa8636123dbe16ac16256ae18cfb86e1f7346046a1da04409f4074d5b7f36792c25ebb982f

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncConfig.exe

                                            Filesize

                                            553KB

                                            MD5

                                            57bd9bd545af2b0f2ce14a33ca57ece9

                                            SHA1

                                            15b4b5afff9abba2de64cbd4f0989f1b2fbc4bf1

                                            SHA256

                                            a3a4b648e4dcf3a4e5f7d13cc3d21b0353e496da75f83246cc8a15fada463bdf

                                            SHA512

                                            d134f9881312ddbd0d61f39fd62af5443a4947d3de010fef3b0f6ebf17829bd4c2f13f6299d2a7aad35c868bb451ef6991c5093c2809e6be791f05f137324b39

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-100.png

                                            Filesize

                                            1KB

                                            MD5

                                            72747c27b2f2a08700ece584c576af89

                                            SHA1

                                            5301ca4813cd5ff2f8457635bc3c8944c1fb9f33

                                            SHA256

                                            6f028542f6faeaaf1f564eab2605bedb20a2ee72cdd9930bde1a3539344d721b

                                            SHA512

                                            3e7f84d3483a25a52a036bf7fd87aac74ac5af327bb8e4695e39dada60c4d6607d1c04e7769a808be260db2af6e91b789008d276ccc6b7e13c80eb97e2818aba

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-125.png

                                            Filesize

                                            1KB

                                            MD5

                                            b83ac69831fd735d5f3811cc214c7c43

                                            SHA1

                                            5b549067fdd64dcb425b88fabe1b1ca46a9a8124

                                            SHA256

                                            cbdcf248f8a0fcd583b475562a7cdcb58f8d01236c7d06e4cdbfe28e08b2a185

                                            SHA512

                                            4b2ee6b3987c048ab7cc827879b38fb3c216dab8e794239d189d1ba71122a74fdaa90336e2ea33abd06ba04f37ded967eb98fd742a02463b6eb68ab917155600

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-150.png

                                            Filesize

                                            2KB

                                            MD5

                                            771bc7583fe704745a763cd3f46d75d2

                                            SHA1

                                            e38f9d7466eefc6d3d2aaa327f1bd42c5a5c7752

                                            SHA256

                                            36a6aad9a9947ab3f6ac6af900192f5a55870d798bca70c46770ccf2108fd62d

                                            SHA512

                                            959ea603abec708895b7f4ef0639c3f2d270cfdd38d77ac9bab8289918cbd4dbac3c36c11bb52c6f01b0adae597b647bb784bba513d77875979270f4962b7884

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-200.png

                                            Filesize

                                            2KB

                                            MD5

                                            09773d7bb374aeec469367708fcfe442

                                            SHA1

                                            2bfb6905321c0c1fd35e1b1161d2a7663e5203d6

                                            SHA256

                                            67d1bb54fcb19c174de1936d08b5dbdb31b98cfdd280bcc5122fb0693675e4f2

                                            SHA512

                                            f500ea4a87a24437b60b0dc3ec69fcc5edbc39c2967743ddb41093b824d0845ffddd2df420a12e17e4594df39f63adad5abb69a29f8456fed03045a6b42388bc

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-400.png

                                            Filesize

                                            6KB

                                            MD5

                                            e01cdbbd97eebc41c63a280f65db28e9

                                            SHA1

                                            1c2657880dd1ea10caf86bd08312cd832a967be1

                                            SHA256

                                            5cb8fd670585de8a7fc0ceede164847522d287ef17cd48806831ea18a0ceac1f

                                            SHA512

                                            ffd928e289dc0e36fa406f0416fb07c2eb0f3725a9cdbb27225439d75b8582d68705ec508e3c4af1fc4982d06d70ef868cafbfc73a637724dee7f34828d14850

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-100.png

                                            Filesize

                                            2KB

                                            MD5

                                            19876b66df75a2c358c37be528f76991

                                            SHA1

                                            181cab3db89f416f343bae9699bf868920240c8b

                                            SHA256

                                            a024fc5dbe0973fd9267229da4ebfd8fc41d73ca27a2055715aafe0efb4f3425

                                            SHA512

                                            78610a040bbbb026a165a5a50dfbaf4208ebef7407660eea1a20e95c30d0d42ef1d13f647802a2f0638443ae2253c49945ebe018c3499ddbf00cfdb1db42ced1

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-125.png

                                            Filesize

                                            3KB

                                            MD5

                                            8347d6f79f819fcf91e0c9d3791d6861

                                            SHA1

                                            5591cf408f0adaa3b86a5a30b0112863ec3d6d28

                                            SHA256

                                            e8b30bfcee8041f1a70e61ca46764416fd1df2e6086ba4c280bfa2220c226750

                                            SHA512

                                            9f658bc77131f4ac4f730ed56a44a406e09a3ceec215b7a0b2ed42d019d8b13d89ab117affb547a5107b5a84feb330329dc15e14644f2b52122acb063f2ba550

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-150.png

                                            Filesize

                                            3KB

                                            MD5

                                            de5ba8348a73164c66750f70f4b59663

                                            SHA1

                                            1d7a04b74bd36ecac2f5dae6921465fc27812fec

                                            SHA256

                                            a0bbe33b798c3adac36396e877908874cffaadb240244095c68dff840dcbbf73

                                            SHA512

                                            85197e0b13a1ae48f51660525557cceaeed7d893dd081939f62e6e8921bb036c6501d3bb41250649048a286ff6bac6c9c1a426d2f58f3e3b41521db26ef6a17c

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-200.png

                                            Filesize

                                            4KB

                                            MD5

                                            f1c75409c9a1b823e846cc746903e12c

                                            SHA1

                                            f0e1f0cf35369544d88d8a2785570f55f6024779

                                            SHA256

                                            fba9104432cbb8ebbd45c18ef1ba46a45dd374773e5aa37d411bb023ded8efd6

                                            SHA512

                                            ed72eb547e0c03776f32e07191ce7022d08d4bcc66e7abca4772cdd8c22d8e7a423577805a4925c5e804ed6c15395f3df8aac7af62f1129e4982685d7e46bd85

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-400.png

                                            Filesize

                                            8KB

                                            MD5

                                            adbbeb01272c8d8b14977481108400d6

                                            SHA1

                                            1cc6868eec36764b249de193f0ce44787ba9dd45

                                            SHA256

                                            9250ef25efc2a9765cf1126524256fdfc963c8687edfdc4a2ecde50d748ada85

                                            SHA512

                                            c15951cf2dc076ed508665cd7dac2251c8966c1550b78549b926e98c01899ad825535001bd65eeb2f8680cd6753cd47e95606ecf453919f5827ed12bca062887

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-100.png

                                            Filesize

                                            2KB

                                            MD5

                                            57a6876000151c4303f99e9a05ab4265

                                            SHA1

                                            1a63d3dd2b8bdc0061660d4add5a5b9af0ff0794

                                            SHA256

                                            8acbdd41252595b7410ca2ed438d6d8ede10bd17fe3a18705eedc65f46e4c1c4

                                            SHA512

                                            c6a2a9124bc6bcf70d2977aaca7e3060380a4d9428a624cc6e5624c75ebb6d6993c6186651d4e54edf32f3491d413714ef97a4cdc42bae94045cd804f0ad7cba

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-125.png

                                            Filesize

                                            4KB

                                            MD5

                                            d03b7edafe4cb7889418f28af439c9c1

                                            SHA1

                                            16822a2ab6a15dda520f28472f6eeddb27f81178

                                            SHA256

                                            a5294e3c7cd855815f8d916849d87bd2357f5165eb4372f248fdf8b988601665

                                            SHA512

                                            59d99f0b9a7813b28bae3ea1ae5bdbbf0d87d32ff621ff20cbe1b900c52bb480c722dd428578dea5d5351cc36f1fa56b2c1712f2724344f026fe534232812962

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-150.png

                                            Filesize

                                            5KB

                                            MD5

                                            a23c55ae34e1b8d81aa34514ea792540

                                            SHA1

                                            3b539dfb299d00b93525144fd2afd7dd9ba4ccbf

                                            SHA256

                                            3df4590386671e0d6fee7108e457eb805370a189f5fdfeaf2f2c32d5adc76abd

                                            SHA512

                                            1423a2534ae71174f34ee527fe3a0db38480a869cac50b08b60a2140b5587b3944967a95016f0b00e3ca9ced1f1452c613bb76c34d7ebd386290667084bce77d

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-200.png

                                            Filesize

                                            6KB

                                            MD5

                                            13e6baac125114e87f50c21017b9e010

                                            SHA1

                                            561c84f767537d71c901a23a061213cf03b27a58

                                            SHA256

                                            3384357b6110f418b175e2f0910cffe588c847c8e55f2fe3572d82999a62c18e

                                            SHA512

                                            673c3bec7c2cd99c07ebfca0f4ab14cd6341086c8702fe9e8b5028aed0174398d7c8a94583da40c32cd0934d784062ad6db71f49391f64122459f8bb00222e08

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-400.png

                                            Filesize

                                            15KB

                                            MD5

                                            e593676ee86a6183082112df974a4706

                                            SHA1

                                            c4e91440312dea1f89777c2856cb11e45d95fe55

                                            SHA256

                                            deb0ec0ee8f1c4f7ea4de2c28ff85087ee5ff8c7e3036c3b0a66d84bae32b6bb

                                            SHA512

                                            11d7ed45f461f44fa566449bb50bcfce35f73fc775744c2d45ea80aeb364fe40a68a731a2152f10edc059dea16b8bab9c9a47da0c9ffe3d954f57da0ff714681

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-100.png

                                            Filesize

                                            783B

                                            MD5

                                            f4e9f958ed6436aef6d16ee6868fa657

                                            SHA1

                                            b14bc7aaca388f29570825010ebc17ca577b292f

                                            SHA256

                                            292cac291af7b45f12404f968759afc7145b2189e778b14d681449132b14f06b

                                            SHA512

                                            cd5d78317e82127e9a62366fd33d5420a6f25d0a6e55552335e64dc39932238abd707fe75d4f62472bc28a388d32b70ff08b6aa366c092a7ace3367896a2bd98

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-125.png

                                            Filesize

                                            1018B

                                            MD5

                                            2c7a9e323a69409f4b13b1c3244074c4

                                            SHA1

                                            3c77c1b013691fa3bdff5677c3a31b355d3e2205

                                            SHA256

                                            8efeacefb92d64dfb1c4df2568165df6436777f176accfd24f4f7970605d16c2

                                            SHA512

                                            087c12e225c1d791d7ad0bf7d3544b4bed8c4fb0daaa02aee0e379badae8954fe6120d61fdf1a11007cbcdb238b5a02c54f429b6cc692a145aa8fbd220c0cb2d

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-150.png

                                            Filesize

                                            1KB

                                            MD5

                                            552b0304f2e25a1283709ad56c4b1a85

                                            SHA1

                                            92a9d0d795852ec45beae1d08f8327d02de8994e

                                            SHA256

                                            262b9a30bb8db4fc59b5bc348aa3813c75e113066a087135d0946ad916f72535

                                            SHA512

                                            9559895b66ef533486f43274f7346ad3059c15f735c9ce5351adf1403c95c2b787372153d4827b03b6eb530f75efcf9ae89db1e9c69189e86d6383138ab9c839

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-200.png

                                            Filesize

                                            1KB

                                            MD5

                                            22e17842b11cd1cb17b24aa743a74e67

                                            SHA1

                                            f230cb9e5a6cb027e6561fabf11a909aa3ba0207

                                            SHA256

                                            9833b80def72b73fca150af17d4b98c8cd484401f0e2d44320ecd75b5bb57c42

                                            SHA512

                                            8332fc72cd411f9d9fd65950d58bf6440563dc4bd5ce3622775306575802e20c967f0ee6bab2092769a11e2a4ea228dab91a02534beeb8afde8239dd2b90f23a

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-400.png

                                            Filesize

                                            3KB

                                            MD5

                                            3c29933ab3beda6803c4b704fba48c53

                                            SHA1

                                            056fe7770a2ba171a54bd60b3c29c4fbb6d42f0c

                                            SHA256

                                            3a7ef7c0bda402fdaff19a479d6c18577c436a5f4e188da4c058a42ef09a7633

                                            SHA512

                                            09408a000a6fa8046649c61ccef36afa1046869506f019f739f67f5c1c05d2e313b95a60bd43d9be882688df1610ad7979dd9d1f16a2170959b526ebd89b8ef7

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-100.png

                                            Filesize

                                            1KB

                                            MD5

                                            1f156044d43913efd88cad6aa6474d73

                                            SHA1

                                            1f6bd3e15a4bdb052746cf9840bdc13e7e8eda26

                                            SHA256

                                            4e11167708801727891e8dd9257152b7391fc483d46688d61f44b96360f76816

                                            SHA512

                                            df791d7c1e7a580e589613b5a56ba529005162d3564fffd4c8514e6afaa5eccea9cea9e1ac43bd9d74ee3971b2e94d985b103176db592e3c775d5feec7aac6d1

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-125.png

                                            Filesize

                                            2KB

                                            MD5

                                            09f3f8485e79f57f0a34abd5a67898ca

                                            SHA1

                                            e68ae5685d5442c1b7acc567dc0b1939cad5f41a

                                            SHA256

                                            69e432d1eec44bed4aad35f72a912e1f0036a4b501a50aec401c9fa260a523e3

                                            SHA512

                                            0eafeaf735cedc322719049db6325ccbf5e92de229cace927b78a08317e842261b7adbda03ec192f71ee36e35eb9bf9624589de01beaec2c5597a605fc224130

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-150.png

                                            Filesize

                                            3KB

                                            MD5

                                            ed306d8b1c42995188866a80d6b761de

                                            SHA1

                                            eadc119bec9fad65019909e8229584cd6b7e0a2b

                                            SHA256

                                            7e3f35d5eb05435be8d104a2eacf5bace8301853104a4ea4768601c607ddf301

                                            SHA512

                                            972a42f7677d57fcb8c8cb0720b21a6ffe9303ea58dde276cfe2f26ee68fe4cc8ae6d29f3a21a400253de7c0a212edf29981e9e2bca49750b79dd439461c8335

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-200.png

                                            Filesize

                                            4KB

                                            MD5

                                            d9d00ecb4bb933cdbb0cd1b5d511dcf5

                                            SHA1

                                            4e41b1eda56c4ebe5534eb49e826289ebff99dd9

                                            SHA256

                                            85823f7a5a4ebf8274f790a88b981e92ede57bde0ba804f00b03416ee4feda89

                                            SHA512

                                            8b53dec59bba8b4033e5c6b2ff77f9ba6b929c412000184928978f13b475cd691a854fee7d55026e48eab8ac84cf34fc7cb38e3766bbf743cf07c4d59afb98f4

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-400.png

                                            Filesize

                                            11KB

                                            MD5

                                            096d0e769212718b8de5237b3427aacc

                                            SHA1

                                            4b912a0f2192f44824057832d9bb08c1a2c76e72

                                            SHA256

                                            9a0b901e97abe02036c782eb6a2471e18160b89fd5141a5a9909f0baab67b1ef

                                            SHA512

                                            99eb3d67e1a05ffa440e70b7e053b7d32e84326671b0b9d2fcfcea2633b8566155477b2a226521bf860b471c5926f8e1f8e3a52676cacb41b40e2b97cb3c1173

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\OneDrive.VisualElementsManifest.xml

                                            Filesize

                                            344B

                                            MD5

                                            5ae2d05d894d1a55d9a1e4f593c68969

                                            SHA1

                                            a983584f58d68552e639601538af960a34fa1da7

                                            SHA256

                                            d21077ad0c29a4c939b8c25f1186e2b542d054bb787b1d3210e9cab48ec3080c

                                            SHA512

                                            152949f5b661980f33608a0804dd8c43d70e056ae0336e409006e764664496fef6e60daa09fecb8d74523d3e7928c0dbd5d8272d8be1cf276852d88370954adc

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\OneDrive.exe

                                            Filesize

                                            2.3MB

                                            MD5

                                            c2938eb5ff932c2540a1514cc82c197c

                                            SHA1

                                            2d7da1c3bfa4755ba0efec5317260d239cbb51c3

                                            SHA256

                                            5d8273bf98397e4c5053f8f154e5f838c7e8a798b125fcad33cab16e2515b665

                                            SHA512

                                            5deb54462615e39cf7871418871856094031a383e9ad82d5a5993f1e67b7ade7c2217055b657c0d127189792c3bcf6c1fcfbd3c5606f6134adfafcccfa176441

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\OneDriveStandaloneUpdater.exe

                                            Filesize

                                            2.9MB

                                            MD5

                                            9cdabfbf75fd35e615c9f85fedafce8a

                                            SHA1

                                            57b7fc9bf59cf09a9c19ad0ce0a159746554d682

                                            SHA256

                                            969fbb03015dd9f33baf45f2750e36b77003a7e18c3954fab890cddc94046673

                                            SHA512

                                            348923f497e615a5cd0ed428eb1e30a792dea310585645b721235d48f3f890398ad51d8955c1e483df0a712ba2c0a18ad99b977be64f5ee6768f955b12a4a236

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\Resources.pri

                                            Filesize

                                            4KB

                                            MD5

                                            7473be9c7899f2a2da99d09c596b2d6d

                                            SHA1

                                            0f76063651fe45bbc0b5c0532ad87d7dc7dc53ac

                                            SHA256

                                            e1252527bc066da6838344d49660e4c6ff2d1ddfda036c5ec19b07fdfb90c8c3

                                            SHA512

                                            a4a5c97856e314eedbad38411f250d139a668c2256d917788697c8a009d5408d559772e0836713853704e6a3755601ae7ee433e07a34bd0e7f130a3e28729c45

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe

                                            Filesize

                                            40.2MB

                                            MD5

                                            fb4aa59c92c9b3263eb07e07b91568b5

                                            SHA1

                                            6071a3e3c4338b90d892a8416b6a92fbfe25bb67

                                            SHA256

                                            e70e80dbbc9baba7ddcee70eda1bb8d0e6612dfb1d93827fe7b594a59f3b48b9

                                            SHA512

                                            60aabbe2fd24c04c33e7892eab64f24f8c335a0dd9822eb01adc5459e850769fc200078c5ccee96c1f2013173bc41f5a2023def3f5fe36e380963db034924ace

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\settings\Personal\logUploaderSettings_temp.ini

                                            Filesize

                                            38B

                                            MD5

                                            cc04d6015cd4395c9b980b280254156e

                                            SHA1

                                            87b176f1330dc08d4ffabe3f7e77da4121c8e749

                                            SHA256

                                            884d272d16605590e511ae50c88842a8ce203a864f56061a3c554f8f8265866e

                                            SHA512

                                            d3cb7853b69649c673814d5738247b5fbaaae5bb7b84e4c7b3ff5c4f1b1a85fc7261a35f0282d79076a9c862e5e1021d31a318d8b2e5a74b80500cb222642940

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\settings\Personal\logUploaderSettings_temp.ini

                                            Filesize

                                            108B

                                            MD5

                                            3d7d794d9631ebe6884a963500d0d613

                                            SHA1

                                            8c5b7952317c233e99e87f20fc01e9d57fa3e63a

                                            SHA256

                                            589dc4e7b5304d0fd05aa91874fcdc705e217957aad5860be38b163467450f7d

                                            SHA512

                                            923ac5e35abf9d2c83f64e92b1c3441d80455af7ff7acbfc4059b59902f20ef2622794db091d3bbd9972c1ded6bdd4549ed03ea854b09e207c53c024c21c0ba4

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\settings\PreSignInSettingsConfig.json

                                            Filesize

                                            63KB

                                            MD5

                                            e516a60bc980095e8d156b1a99ab5eee

                                            SHA1

                                            238e243ffc12d4e012fd020c9822703109b987f6

                                            SHA256

                                            543796a1b343b4ebc0285d89cb8eb70667ac7b513da37495e38003704e9d88d7

                                            SHA512

                                            9b51e99ba20e9da56d1acc24a1cf9f9c9dbdeb742bec034e0ff2bc179a60f4aff249f40344f9ddd43229dcdefa1041940f65afb336d46c175ffeff725c638d58

                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\setup\logs\DeviceHealthSummaryConfiguration.ini

                                            Filesize

                                            77B

                                            MD5

                                            884719ce032f726a888505d32d8764c0

                                            SHA1

                                            946352cee3688c3f4b2cae60ed68bdaf7c739fa9

                                            SHA256

                                            463a8857e432bed3d80813945925156d066a81ae57ffc378b257a22a199fe1f5

                                            SHA512

                                            317c72cf35efdb5d34bbcc9cb37108f640e7ab4ea5c6e2e8c956392aeb32817a875ab3753827b9f1e315664edea78d2ced18716c96c9769de1a65fc6c89180c4

                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\9ED10DTS\update100[1].xml

                                            Filesize

                                            726B

                                            MD5

                                            53244e542ddf6d280a2b03e28f0646b7

                                            SHA1

                                            d9925f810a95880c92974549deead18d56f19c37

                                            SHA256

                                            36a6bd38a8a6f5a75b73caffae5ae66dfabcaefd83da65b493fa881ea8a64e7d

                                            SHA512

                                            4aa71d92ea2c46df86565d97aac75395371d3e17877ab252a297b84dca2ab251d50aaffc62eab9961f0df48de6f12be04a1f4a2cbde75b9ae7bcce6eb5450c62

                                          • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                                            Filesize

                                            10KB

                                            MD5

                                            96329c73cc49cd960e2485210d01c4d2

                                            SHA1

                                            a496b98ad2f2bbf26687b5b7794a26aa4470148e

                                            SHA256

                                            4c159cab6c9ef5ff39e6141b0ccb5b8c6251a3d637520609dfbdd852fa94d466

                                            SHA512

                                            e98736a879cad24c693d6c5939654b2fd25bf9d348f738668624214f22d541a9b781c967201ab2d43cbac9207946824a0299d482485f4b63c48d5d2a839e5baf

                                          • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                                            Filesize

                                            10KB

                                            MD5

                                            847a64ce22adca83e091e5403ef844ed

                                            SHA1

                                            f2cf8559f0eba3d237cee1162b811613d2a0c308

                                            SHA256

                                            1db255895b125edbed50b5296edafaf303dde2b93a600313b6a1aa61f9ec2b88

                                            SHA512

                                            94abff56e498bfd7af0e72a652a0b03d29cbe7d0322f43cb8fa4182cfa829ec6d608c5bb3f6deaaf1dcaae764c90036beedb503109c8080999dfaf2d6a2e9de6

                                          • C:\Users\Admin\AppData\Local\Temp\tmp2185.tmp

                                            Filesize

                                            35.9MB

                                            MD5

                                            5b16ef80abd2b4ace517c4e98f4ff551

                                            SHA1

                                            438806a0256e075239aa8bbec9ba3d3fb634af55

                                            SHA256

                                            bbc70091b3834af5413b9658b07269badd4cae8d96724bf1f7919f6aab595009

                                            SHA512

                                            69a22b063ab92ca7e941b826400c62be41ae0317143387c8aa8c727b5c9ee3528ddd4014de22a2a2e2cbae801cb041fe477d68d2684353cdf6c83d7ee97c43d4

                                          • C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe

                                            Filesize

                                            3.0MB

                                            MD5

                                            7463b682190f219845ba70fd04846e76

                                            SHA1

                                            70d1660295c9583db59168203c6df43a5e8cf133

                                            SHA256

                                            49425ff07e1039c2390aa13ca2e76d7f64faa75d4b55f36fc1a2b072f0975e20

                                            SHA512

                                            6998eea72dfbf17e499f06d2a77791110c3aeb9bcc8cec5c97ee383e3778b7c19722539b75be9b2cfee6047fb8d5ade1342ecee840959740981646851f908ba2

                                          • C:\Users\Admin\AppData\Roaming\updatelongpoll\BootstrapperNew.exe.config

                                            Filesize

                                            357B

                                            MD5

                                            a2b76cea3a59fa9af5ea21ff68139c98

                                            SHA1

                                            35d76475e6a54c168f536e30206578babff58274

                                            SHA256

                                            f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839

                                            SHA512

                                            b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

                                          • C:\Users\Admin\AppData\Roaming\updatelongpoll\lib_sudo_9odrc73zfqvqrot3tg2p1he83zq7z2g1\SharpDX.DXGI.dll

                                            Filesize

                                            125KB

                                            MD5

                                            2b44c70c49b70d797fbb748158b5d9bb

                                            SHA1

                                            93e00e6527e461c45c7868d14cf05c007e478081

                                            SHA256

                                            3762d43c83af69cd38c9341a927ca6bd00f6bae8217c874d693047d6df4705bf

                                            SHA512

                                            faced62f6ecbfa2ee0d7a47e300302d23030d1f28758cbe9c442e9d8d4f8359c59088aa6237a28103e43d248c8efc7eeaf2c184028701b752df6cce92d6854d0

                                          • C:\Users\Admin\AppData\Roaming\updatelongpoll\lib_sudo_9odrc73zfqvqrot3tg2p1he83zq7z2g1\SharpDX.Direct3D11.dll

                                            Filesize

                                            271KB

                                            MD5

                                            98eb5ba5871acdeaebf3a3b0f64be449

                                            SHA1

                                            c965284f60ef789b00b10b3df60ee682b4497de3

                                            SHA256

                                            d7617d926648849cbfef450b8f48e458ee52e2793fb2251a30094b778aa8848c

                                            SHA512

                                            a60025e304713d333e4b82b2d0be28087950688b049c98d2db5910c00b8d45b92e16d25ac8a58ff1318de019de3a9a00c7cbf8a6ad4b5bb1cb175dafa1b9bea2

                                          • C:\Users\Admin\AppData\Roaming\updatelongpoll\lib_sudo_9odrc73zfqvqrot3tg2p1he83zq7z2g1\SharpDX.Direct3D9.dll

                                            Filesize

                                            338KB

                                            MD5

                                            934da0e49208d0881c44fe19d5033840

                                            SHA1

                                            a19c5a822e82e41752a08d3bd9110db19a8a5016

                                            SHA256

                                            02da4af8cd4a8de19d816000caaae885e676b9e52f136ff071a279c2b8ad34c7

                                            SHA512

                                            de62f629c2299b50af62893244a28895d63b78138c8632449984306f45de16bd01076eadbb0d75a700215e970c1df731e202ea640236c0f0da6ed15146193b59

                                          • C:\Users\Admin\AppData\Roaming\updatelongpoll\lib_sudo_9odrc73zfqvqrot3tg2p1he83zq7z2g1\SharpDX.dll

                                            Filesize

                                            247KB

                                            MD5

                                            ffb4b61cc11bec6d48226027c2c26704

                                            SHA1

                                            fa8b9e344accbdc4dffa9b5d821d23f0716da29e

                                            SHA256

                                            061542ff3fb36039b7bbffdf3e07b66176b264c1dfd834a14b09c08620717303

                                            SHA512

                                            48aa6130bf1f5bd6de19256bbdf754c0158b43dd122cec47bb801a7a7b56f2da268bfdec24d135621764a23278ead3dcc35911a057e2dfa55a348bae8ef7b8a9

                                          • C:\Users\Admin\AppData\Roaming\updatelongpoll\lib_sudo_9odrc73zfqvqrot3tg2p1he83zq7z2g1\TurboJpegWrapper.dll

                                            Filesize

                                            1.3MB

                                            MD5

                                            ac6acc235ebef6374bed71b37e322874

                                            SHA1

                                            a267baad59cd7352167636836bad4b971fcd6b6b

                                            SHA256

                                            047b042cebf4c851f0d14f85f16ce952f03e48c20362d4ed9390875d4900fe96

                                            SHA512

                                            72ac8b8c8f27264cc261297c325d14a0be2084d007c6132ab8402d87f912fe9189cb074db11625d9f86d29a6188f22a89e58ae45c9131fac4522473567017081

                                          • C:\Users\Admin\AppData\Roaming\updatelongpoll\lib_sudo_9odrc73zfqvqrot3tg2p1he83zq7z2g1\x86\turbojpeg.dll

                                            Filesize

                                            646KB

                                            MD5

                                            82898ed19da89d7d44e280a3ced95e9b

                                            SHA1

                                            eec0af5733c642eac8c5e08479f462d1ec1ed4db

                                            SHA256

                                            5f4b9f8360764d75c9faaecd94f6d200c54611b33064cd216e363d973dae7c29

                                            SHA512

                                            ee7b884ce7d7366ee28fb17721b6c89bd4eba8fb373cdbb483e26a4ed7a74ab5db847513c54704d753d77a7e18b1fb9fee90ed6bbc0540bff702273fda36b682

                                          • memory/708-33-0x00000000060B0000-0x00000000060C8000-memory.dmp

                                            Filesize

                                            96KB

                                          • memory/708-39-0x00000000073C0000-0x0000000007426000-memory.dmp

                                            Filesize

                                            408KB

                                          • memory/708-40-0x0000000007D80000-0x0000000008398000-memory.dmp

                                            Filesize

                                            6.1MB

                                          • memory/708-41-0x0000000007460000-0x0000000007472000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/708-42-0x00000000077A0000-0x00000000077DC000-memory.dmp

                                            Filesize

                                            240KB

                                          • memory/708-43-0x00000000077E0000-0x000000000782C000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/708-44-0x0000000007960000-0x0000000007A6A000-memory.dmp

                                            Filesize

                                            1.0MB

                                          • memory/708-45-0x00000000083A0000-0x0000000008562000-memory.dmp

                                            Filesize

                                            1.8MB

                                          • memory/708-46-0x0000000007920000-0x000000000792E000-memory.dmp

                                            Filesize

                                            56KB

                                          • memory/708-47-0x0000000008770000-0x00000000087C0000-memory.dmp

                                            Filesize

                                            320KB

                                          • memory/708-36-0x0000000006D70000-0x0000000006D7A000-memory.dmp

                                            Filesize

                                            40KB

                                          • memory/708-35-0x0000000006140000-0x0000000006150000-memory.dmp

                                            Filesize

                                            64KB

                                          • memory/804-32-0x0000000074780000-0x0000000074F31000-memory.dmp

                                            Filesize

                                            7.7MB

                                          • memory/804-28-0x0000000006E10000-0x0000000006EAC000-memory.dmp

                                            Filesize

                                            624KB

                                          • memory/804-24-0x0000000074780000-0x0000000074F31000-memory.dmp

                                            Filesize

                                            7.7MB

                                          • memory/804-25-0x0000000074780000-0x0000000074F31000-memory.dmp

                                            Filesize

                                            7.7MB

                                          • memory/804-26-0x00000000064C0000-0x000000000650E000-memory.dmp

                                            Filesize

                                            312KB

                                          • memory/924-5-0x00000000058C0000-0x0000000005E66000-memory.dmp

                                            Filesize

                                            5.6MB

                                          • memory/924-23-0x0000000074780000-0x0000000074F31000-memory.dmp

                                            Filesize

                                            7.7MB

                                          • memory/924-1-0x00000000001F0000-0x00000000004EE000-memory.dmp

                                            Filesize

                                            3.0MB

                                          • memory/924-2-0x0000000004E90000-0x0000000004E9E000-memory.dmp

                                            Filesize

                                            56KB

                                          • memory/924-3-0x0000000074780000-0x0000000074F31000-memory.dmp

                                            Filesize

                                            7.7MB

                                          • memory/924-4-0x0000000004F70000-0x0000000004FCC000-memory.dmp

                                            Filesize

                                            368KB

                                          • memory/924-0-0x000000007478E000-0x000000007478F000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/924-6-0x0000000005310000-0x00000000053A2000-memory.dmp

                                            Filesize

                                            584KB

                                          • memory/924-7-0x0000000005220000-0x0000000005232000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/1128-51-0x00000000050D0000-0x00000000050E2000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/1864-96-0x0000000006F80000-0x0000000006F8C000-memory.dmp

                                            Filesize

                                            48KB

                                          • memory/1864-95-0x0000000006F70000-0x0000000006F86000-memory.dmp

                                            Filesize

                                            88KB

                                          • memory/1864-133-0x00000000660C0000-0x000000006614F000-memory.dmp

                                            Filesize

                                            572KB

                                          • memory/1864-64-0x0000000006F20000-0x0000000006F64000-memory.dmp

                                            Filesize

                                            272KB

                                          • memory/1864-122-0x00000000660C0000-0x000000006614F000-memory.dmp

                                            Filesize

                                            572KB

                                          • memory/1864-59-0x00000000075D0000-0x000000000761C000-memory.dmp

                                            Filesize

                                            304KB

                                          • memory/1864-71-0x0000000008670000-0x00000000086BA000-memory.dmp

                                            Filesize

                                            296KB

                                          • memory/1864-548-0x00000000660C0000-0x000000006614F000-memory.dmp

                                            Filesize

                                            572KB

                                          • memory/1864-92-0x00000000088E0000-0x0000000008A34000-memory.dmp

                                            Filesize

                                            1.3MB

                                          • memory/1864-85-0x00000000076C0000-0x00000000076E6000-memory.dmp

                                            Filesize

                                            152KB

                                          • memory/1864-78-0x0000000008720000-0x000000000877A000-memory.dmp

                                            Filesize

                                            360KB

                                          • memory/2868-30-0x0000000074780000-0x0000000074F31000-memory.dmp

                                            Filesize

                                            7.7MB

                                          • memory/2868-48-0x0000000074780000-0x0000000074F31000-memory.dmp

                                            Filesize

                                            7.7MB

                                          • memory/3164-1290-0x0000000005380000-0x0000000005392000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/3164-1292-0x0000000006F90000-0x0000000006FDC000-memory.dmp

                                            Filesize

                                            304KB