Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    48s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2023, 22:10

General

  • Target

    7f0907eea4b392b0e7edaf822d2d2af9432122b31953bf10888e8d4b3335f964.exe

  • Size

    2.7MB

  • MD5

    a64abf4dbebd32e15b9c974c3bc37506

  • SHA1

    0a3067744f0a85baeb31231185df768c8731b4f6

  • SHA256

    7f0907eea4b392b0e7edaf822d2d2af9432122b31953bf10888e8d4b3335f964

  • SHA512

    80671b944844c1dc3e3e4409b04355804d40e2a68a181765307331fe009aca711639dd303f57666f288a40eedc05a4876ccb9934d36031906232abaa1251da8f

  • SSDEEP

    49152:H7TvfU+8X9GrNOsva5RbKhF3ANkTTlAY5ABWn:c+8X9G3vP3AMHfn

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 8 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 60 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f0907eea4b392b0e7edaf822d2d2af9432122b31953bf10888e8d4b3335f964.exe
    "C:\Users\Admin\AppData\Local\Temp\7f0907eea4b392b0e7edaf822d2d2af9432122b31953bf10888e8d4b3335f964.exe"
    1⤵
      PID:3812
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4680
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2672
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4976
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3696
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4116
    • C:\Windows\system32\werfault.exe
      werfault.exe /hc /shared Global\4fc864f0c2404c24b97f98699e64097c /t 3504 /p 4584
      1⤵
        PID:580
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:3880
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4972
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Modifies registry class
        • Suspicious use of SendNotifyMessage
        PID:2492
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
          PID:5036
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
            PID:4196
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
              PID:3192
            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
              1⤵
                PID:4032
              • C:\Windows\explorer.exe
                explorer.exe
                1⤵
                  PID:2852
                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                  1⤵
                    PID:1788
                  • C:\Windows\explorer.exe
                    explorer.exe
                    1⤵
                      PID:1716
                    • C:\Windows\system32\werfault.exe
                      werfault.exe /hc /shared Global\79e27400a23f454d8b2885500bdc60c3 /t 4524 /p 4324
                      1⤵
                        PID:404
                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                        1⤵
                          PID:4808
                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                          1⤵
                            PID:4512
                          • C:\Windows\explorer.exe
                            explorer.exe
                            1⤵
                              PID:4360
                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                              1⤵
                                PID:4368
                              • C:\Windows\explorer.exe
                                explorer.exe
                                1⤵
                                  PID:640
                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                  1⤵
                                    PID:1592
                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                    1⤵
                                      PID:1808
                                    • C:\Windows\explorer.exe
                                      explorer.exe
                                      1⤵
                                        PID:2936
                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                        1⤵
                                          PID:4648
                                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                          1⤵
                                            PID:4484
                                          • C:\Windows\explorer.exe
                                            explorer.exe
                                            1⤵
                                              PID:1488
                                            • C:\Windows\system32\werfault.exe
                                              werfault.exe /hc /shared Global\f99f14c878b84118b227fa3458bdc9a8 /t 3992 /p 2640
                                              1⤵
                                                PID:3372
                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                1⤵
                                                  PID:2916
                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                  1⤵
                                                    PID:3692
                                                  • C:\Windows\explorer.exe
                                                    explorer.exe
                                                    1⤵
                                                      PID:4520
                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                      1⤵
                                                        PID:4560
                                                      • C:\Windows\explorer.exe
                                                        explorer.exe
                                                        1⤵
                                                          PID:720

                                                        Network

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                          Filesize

                                                          471B

                                                          MD5

                                                          d819e41f638ffed2a0deb886c2d7e761

                                                          SHA1

                                                          79a058dbb783510c08a77e3211c3947f99adea6d

                                                          SHA256

                                                          6896c87b8f09add8862cfbdcbf5fae895b1eb4e0df7e9a8a03df7595988666a7

                                                          SHA512

                                                          deacf6e95cb4da05def81da84e42c6cf14f230b22965d07da6eb7e94d1937109769bd23c4cbe70b7b9a265a3c835eb70c53c94ebb34c85f83ef486c704b783ed

                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                          Filesize

                                                          412B

                                                          MD5

                                                          27755013123125bfee6dac0b20678231

                                                          SHA1

                                                          a4bfa137d7a22c401b715afcd0da0dbb09746d70

                                                          SHA256

                                                          ee5507a9f172df09a9c83de678c79750d9fb201200d7fdd748fa6cae184dba26

                                                          SHA512

                                                          74af1e855e178a99f9a1a9e94a763549149d2c5086ceb484206c0c9473332e5eba5bf17facd81556f472ff823bec6e3f86d1dd29d869ce0aa7446fd0f036b3a5

                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\QFB4PTP9\microsoft.windows[1].xml

                                                          Filesize

                                                          97B

                                                          MD5

                                                          4677e3ea7a170c78520dd71312ffd31e

                                                          SHA1

                                                          a9ac559324a6142d85ded6da9b16f44dc630bf8c

                                                          SHA256

                                                          703af6af210c7a59166ca33a20c29594710708757e7ca304a5c547ec4cf791c5

                                                          SHA512

                                                          7bf2a89ef25cb2c2f050f60a13c9c41c1e8ca959ee153b9189b4dc7f50cbb75da581a2ae608c517e941df78523ebe23ea53cdf16ce2cb1b6ee332d6d92b89095

                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{1b643a83-1577-488b-839b-e6d00c697ee7}\0.0.filtertrie.intermediate.txt

                                                          Filesize

                                                          28KB

                                                          MD5

                                                          94bd20dcef0283b5145ee7a96e1b10f2

                                                          SHA1

                                                          169e50fdd5d3be06bd63ff97b0b5aeb62293c85f

                                                          SHA256

                                                          50dd9c13bba956a27d6f2eb84fcfc82aae185ea9de2aeb6ebf48829fcadee999

                                                          SHA512

                                                          7ef990eceae6ec2364ae1a3b02fc537f3d104432758d36db2a11ca7e24176242c21cc1f3aacf0bc9d011b931b62ca8d40dca5d127c4a10a3c84821722cab2e33

                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{1b643a83-1577-488b-839b-e6d00c697ee7}\0.1.filtertrie.intermediate.txt

                                                          Filesize

                                                          5B

                                                          MD5

                                                          34bd1dfb9f72cf4f86e6df6da0a9e49a

                                                          SHA1

                                                          5f96d66f33c81c0b10df2128d3860e3cb7e89563

                                                          SHA256

                                                          8e1e6a3d56796a245d0c7b0849548932fee803bbdb03f6e289495830e017f14c

                                                          SHA512

                                                          e3787de7c4bc70ca62234d9a4cdc6bd665bffa66debe3851ee3e8e49e7498b9f1cbc01294bf5e9f75de13fb78d05879e82fa4b89ee45623fe5bf7ac7e48eda96

                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{1b643a83-1577-488b-839b-e6d00c697ee7}\0.2.filtertrie.intermediate.txt

                                                          Filesize

                                                          5B

                                                          MD5

                                                          c204e9faaf8565ad333828beff2d786e

                                                          SHA1

                                                          7d23864f5e2a12c1a5f93b555d2d3e7c8f78eec1

                                                          SHA256

                                                          d65b6a3bf11a27a1ced1f7e98082246e40cf01289fd47fe4a5ed46c221f2f73f

                                                          SHA512

                                                          e72f4f79a4ae2e5e40a41b322bc0408a6dec282f90e01e0a8aaedf9fb9d6f04a60f45a844595727539c1643328e9c1b989b90785271cc30a6550bbda6b1909f8

                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{1b643a83-1577-488b-839b-e6d00c697ee7}\Apps.ft

                                                          Filesize

                                                          38KB

                                                          MD5

                                                          be9b8079bc85a662286a3cd4bf3d9822

                                                          SHA1

                                                          9bb74848daf92cad54e8304afb84adb1e7441899

                                                          SHA256

                                                          e4c5bde5f1de5f6f7b03bbcc524d3822065ff5563553ce8b11806413891d8b2b

                                                          SHA512

                                                          70bf18c2f3e2df29c1f62c715e3560cec8729899c842bf8d502aaf59cc50581cf96320512e69da3b1c23635d00a4334a6bfdef180dbe79fc147cc721bc9dd748

                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{1b643a83-1577-488b-839b-e6d00c697ee7}\Apps.index

                                                          Filesize

                                                          1.0MB

                                                          MD5

                                                          7a7b18520d7eef89e997883202244910

                                                          SHA1

                                                          dd92550480126b31f6a4188263f802c849b3d2c0

                                                          SHA256

                                                          a8ababd8f0a4846af8f74669ba95e9d51746090c635841074d8c3cf7c43f22f2

                                                          SHA512

                                                          4ff942fc576b428199823f3a443253e7d4b0a9138d1e524dfa5f2681ee2cf672536bbbadb9085ebf81818ead4958ef6c0942cd6aefe7d5b04a7f43d6938eb056

                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133392348622363301.txt

                                                          Filesize

                                                          75KB

                                                          MD5

                                                          62d81c2e1e8b21733f95af2a596e4b18

                                                          SHA1

                                                          91c005ecc5ae4171f450c43c02d1ba532b4474c6

                                                          SHA256

                                                          a5596f83717bf64653b95ffe6ec38f20e40fd928456d5e254a53a440804d80b6

                                                          SHA512

                                                          c7f349acf55694ff696750c30a25c265ff07ced95e4d2a88fa2829d047ca3b3007dc824613a8c403c7613085aca4212155afe03f8f237c0d7781fd87e1fb8a7c

                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133414495225434949.txt

                                                          Filesize

                                                          75KB

                                                          MD5

                                                          62d81c2e1e8b21733f95af2a596e4b18

                                                          SHA1

                                                          91c005ecc5ae4171f450c43c02d1ba532b4474c6

                                                          SHA256

                                                          a5596f83717bf64653b95ffe6ec38f20e40fd928456d5e254a53a440804d80b6

                                                          SHA512

                                                          c7f349acf55694ff696750c30a25c265ff07ced95e4d2a88fa2829d047ca3b3007dc824613a8c403c7613085aca4212155afe03f8f237c0d7781fd87e1fb8a7c

                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133414495225434949.txt

                                                          Filesize

                                                          75KB

                                                          MD5

                                                          62d81c2e1e8b21733f95af2a596e4b18

                                                          SHA1

                                                          91c005ecc5ae4171f450c43c02d1ba532b4474c6

                                                          SHA256

                                                          a5596f83717bf64653b95ffe6ec38f20e40fd928456d5e254a53a440804d80b6

                                                          SHA512

                                                          c7f349acf55694ff696750c30a25c265ff07ced95e4d2a88fa2829d047ca3b3007dc824613a8c403c7613085aca4212155afe03f8f237c0d7781fd87e1fb8a7c

                                                        • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\QFB4PTP9\microsoft.windows[1].xml

                                                          Filesize

                                                          97B

                                                          MD5

                                                          4677e3ea7a170c78520dd71312ffd31e

                                                          SHA1

                                                          a9ac559324a6142d85ded6da9b16f44dc630bf8c

                                                          SHA256

                                                          703af6af210c7a59166ca33a20c29594710708757e7ca304a5c547ec4cf791c5

                                                          SHA512

                                                          7bf2a89ef25cb2c2f050f60a13c9c41c1e8ca959ee153b9189b4dc7f50cbb75da581a2ae608c517e941df78523ebe23ea53cdf16ce2cb1b6ee332d6d92b89095

                                                        • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\QFB4PTP9\microsoft.windows[1].xml

                                                          Filesize

                                                          97B

                                                          MD5

                                                          4677e3ea7a170c78520dd71312ffd31e

                                                          SHA1

                                                          a9ac559324a6142d85ded6da9b16f44dc630bf8c

                                                          SHA256

                                                          703af6af210c7a59166ca33a20c29594710708757e7ca304a5c547ec4cf791c5

                                                          SHA512

                                                          7bf2a89ef25cb2c2f050f60a13c9c41c1e8ca959ee153b9189b4dc7f50cbb75da581a2ae608c517e941df78523ebe23ea53cdf16ce2cb1b6ee332d6d92b89095

                                                        • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\QFB4PTP9\microsoft.windows[1].xml

                                                          Filesize

                                                          97B

                                                          MD5

                                                          4677e3ea7a170c78520dd71312ffd31e

                                                          SHA1

                                                          a9ac559324a6142d85ded6da9b16f44dc630bf8c

                                                          SHA256

                                                          703af6af210c7a59166ca33a20c29594710708757e7ca304a5c547ec4cf791c5

                                                          SHA512

                                                          7bf2a89ef25cb2c2f050f60a13c9c41c1e8ca959ee153b9189b4dc7f50cbb75da581a2ae608c517e941df78523ebe23ea53cdf16ce2cb1b6ee332d6d92b89095

                                                        • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\QFB4PTP9\microsoft.windows[1].xml

                                                          Filesize

                                                          97B

                                                          MD5

                                                          4677e3ea7a170c78520dd71312ffd31e

                                                          SHA1

                                                          a9ac559324a6142d85ded6da9b16f44dc630bf8c

                                                          SHA256

                                                          703af6af210c7a59166ca33a20c29594710708757e7ca304a5c547ec4cf791c5

                                                          SHA512

                                                          7bf2a89ef25cb2c2f050f60a13c9c41c1e8ca959ee153b9189b4dc7f50cbb75da581a2ae608c517e941df78523ebe23ea53cdf16ce2cb1b6ee332d6d92b89095

                                                        • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\QFB4PTP9\microsoft.windows[1].xml

                                                          Filesize

                                                          97B

                                                          MD5

                                                          4677e3ea7a170c78520dd71312ffd31e

                                                          SHA1

                                                          a9ac559324a6142d85ded6da9b16f44dc630bf8c

                                                          SHA256

                                                          703af6af210c7a59166ca33a20c29594710708757e7ca304a5c547ec4cf791c5

                                                          SHA512

                                                          7bf2a89ef25cb2c2f050f60a13c9c41c1e8ca959ee153b9189b4dc7f50cbb75da581a2ae608c517e941df78523ebe23ea53cdf16ce2cb1b6ee332d6d92b89095

                                                        • memory/640-109-0x0000000004520000-0x0000000004521000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/1808-123-0x000002DC30A20000-0x000002DC30A40000-memory.dmp

                                                          Filesize

                                                          128KB

                                                        • memory/1808-119-0x000002DC30620000-0x000002DC30640000-memory.dmp

                                                          Filesize

                                                          128KB

                                                        • memory/1808-117-0x000002DC30660000-0x000002DC30680000-memory.dmp

                                                          Filesize

                                                          128KB

                                                        • memory/2936-131-0x0000000004730000-0x0000000004731000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/3692-163-0x0000013C71A70000-0x0000013C71A90000-memory.dmp

                                                          Filesize

                                                          128KB

                                                        • memory/3692-169-0x0000013C720D0000-0x0000013C720F0000-memory.dmp

                                                          Filesize

                                                          128KB

                                                        • memory/3692-166-0x0000013C71A30000-0x0000013C71A50000-memory.dmp

                                                          Filesize

                                                          128KB

                                                        • memory/4032-59-0x0000028FB4BB0000-0x0000028FB4BD0000-memory.dmp

                                                          Filesize

                                                          128KB

                                                        • memory/4032-62-0x0000028FB52C0000-0x0000028FB52E0000-memory.dmp

                                                          Filesize

                                                          128KB

                                                        • memory/4032-56-0x0000028FB4F00000-0x0000028FB4F20000-memory.dmp

                                                          Filesize

                                                          128KB

                                                        • memory/4116-8-0x0000000004960000-0x0000000004961000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/4196-48-0x0000000003620000-0x0000000003621000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/4360-86-0x00000000049A0000-0x00000000049A1000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/4484-143-0x00000129B1E00000-0x00000129B1E20000-memory.dmp

                                                          Filesize

                                                          128KB

                                                        • memory/4484-141-0x00000129B19F0000-0x00000129B1A10000-memory.dmp

                                                          Filesize

                                                          128KB

                                                        • memory/4484-139-0x00000129B1A30000-0x00000129B1A50000-memory.dmp

                                                          Filesize

                                                          128KB

                                                        • memory/4512-93-0x00000198104D0000-0x00000198104F0000-memory.dmp

                                                          Filesize

                                                          128KB

                                                        • memory/4512-95-0x0000019810490000-0x00000198104B0000-memory.dmp

                                                          Filesize

                                                          128KB

                                                        • memory/4512-97-0x00000198108A0000-0x00000198108C0000-memory.dmp

                                                          Filesize

                                                          128KB

                                                        • memory/4520-156-0x00000000029E0000-0x00000000029E1000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/4972-44-0x000001A5F6390000-0x000001A5F63B0000-memory.dmp

                                                          Filesize

                                                          128KB

                                                        • memory/4972-37-0x000001A5F5F20000-0x000001A5F5F40000-memory.dmp

                                                          Filesize

                                                          128KB

                                                        • memory/4972-24-0x000001A5F58F0000-0x000001A5F5910000-memory.dmp

                                                          Filesize

                                                          128KB

                                                        • memory/4972-21-0x000001A5F5930000-0x000001A5F5950000-memory.dmp

                                                          Filesize

                                                          128KB