Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 08:52

General

  • Target

    b7a33bdf15f0bd2a3e9620b95292a75ee09e1b693a911ae1c7334aadb7f0246f.exe

  • Size

    2.7MB

  • MD5

    8c6fc31bb9334a0ac92b817c75d2376a

  • SHA1

    133ba2d2df7bff2cd8e587689b86e99a9685ca58

  • SHA256

    b7a33bdf15f0bd2a3e9620b95292a75ee09e1b693a911ae1c7334aadb7f0246f

  • SHA512

    a687fb207c0c193a3ff361da9afc77c41326b40ebcdc6ad60610b66fe22dce4bee0a8b4ad2e8aae322379b93fb055c55c6008f44690f7020f787b63b7939111a

  • SSDEEP

    49152:H7TvfU+8X9GrNOsva5RbKhF3ANkTTlS/6g2Qo/uicYodFO2:c+8X9G3vP3AMng+/zeF5

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 9 IoCs
  • Enumerates connected drives 3 TTPs 16 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7a33bdf15f0bd2a3e9620b95292a75ee09e1b693a911ae1c7334aadb7f0246f.exe
    "C:\Users\Admin\AppData\Local\Temp\b7a33bdf15f0bd2a3e9620b95292a75ee09e1b693a911ae1c7334aadb7f0246f.exe"
    1⤵
      PID:2968
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1528
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:764
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:4684
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:940
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:3288
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3584
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:3504
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1660
    • C:\Windows\system32\werfault.exe
      werfault.exe /hc /shared Global\3b0b915a63cc4e77b3013df9fb7f3d0c /t 4624 /p 1836
      1⤵
        PID:3964
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:2260
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
          PID:2696
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
          • Modifies Installed Components in the registry
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          • Suspicious use of SendNotifyMessage
          PID:2140
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
          • Suspicious use of SetWindowsHookEx
          PID:2412
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:4412
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
          • Modifies Installed Components in the registry
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          PID:1316
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
            PID:3988
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            PID:1184
          • C:\Windows\explorer.exe
            explorer.exe
            1⤵
            • Modifies Installed Components in the registry
            • Enumerates connected drives
            • Checks SCSI registry key(s)
            • Modifies registry class
            PID:2256
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
            • Suspicious use of SetWindowsHookEx
            PID:3120
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
            • Suspicious use of SetWindowsHookEx
            PID:3260
          • C:\Windows\explorer.exe
            explorer.exe
            1⤵
            • Modifies Installed Components in the registry
            • Enumerates connected drives
            • Checks SCSI registry key(s)
            • Modifies registry class
            PID:2224
          • C:\Windows\system32\werfault.exe
            werfault.exe /hc /shared Global\af6dec5249184f64a822401f98989d17 /t 5072 /p 2684
            1⤵
              PID:4804
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              PID:4852
            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
              1⤵
                PID:3248
              • C:\Windows\explorer.exe
                explorer.exe
                1⤵
                • Modifies Installed Components in the registry
                • Modifies registry class
                PID:2296
              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                1⤵
                  PID:1700
                • C:\Windows\explorer.exe
                  explorer.exe
                  1⤵
                    PID:3608
                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                    1⤵
                      PID:2000
                    • C:\Windows\explorer.exe
                      explorer.exe
                      1⤵
                        PID:980
                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                        1⤵
                          PID:1992
                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                          1⤵
                            PID:3764
                          • C:\Windows\explorer.exe
                            explorer.exe
                            1⤵
                              PID:4952
                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                              1⤵
                                PID:2544
                              • C:\Windows\explorer.exe
                                explorer.exe
                                1⤵
                                  PID:4604
                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                  1⤵
                                    PID:5052
                                  • C:\Windows\explorer.exe
                                    explorer.exe
                                    1⤵
                                      PID:4932
                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                      1⤵
                                        PID:3704
                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                        1⤵
                                          PID:2904
                                        • C:\Windows\explorer.exe
                                          explorer.exe
                                          1⤵
                                            PID:4248
                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                            1⤵
                                              PID:2540
                                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                              1⤵
                                                PID:3552
                                              • C:\Windows\explorer.exe
                                                explorer.exe
                                                1⤵
                                                  PID:3232
                                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                  1⤵
                                                    PID:4864
                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                    1⤵
                                                      PID:3256
                                                    • C:\Windows\explorer.exe
                                                      explorer.exe
                                                      1⤵
                                                        PID:4800
                                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                        1⤵
                                                          PID:3716
                                                        • C:\Windows\explorer.exe
                                                          explorer.exe
                                                          1⤵
                                                            PID:4248
                                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                            1⤵
                                                              PID:2784
                                                            • C:\Windows\explorer.exe
                                                              explorer.exe
                                                              1⤵
                                                                PID:5072
                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                1⤵
                                                                  PID:3804
                                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                  1⤵
                                                                    PID:2156
                                                                  • C:\Windows\explorer.exe
                                                                    explorer.exe
                                                                    1⤵
                                                                      PID:4780

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                                      Filesize

                                                                      471B

                                                                      MD5

                                                                      0085711bef17acad9eacf0bbf9bf3906

                                                                      SHA1

                                                                      20041eb81473c406da0ebfd7717231c0852ba344

                                                                      SHA256

                                                                      98c31705ae2dbde79cc8916db28c40c875597004ae24d94ac42433e0989d70a1

                                                                      SHA512

                                                                      3354239703701d843124bc466fd9794dd65ed766e4a1df64f784250292be3f24239a9e7156738d07a1c12316952cc1ee71ae9feba9b8fdbfb545e273ae871a6e

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                                      Filesize

                                                                      412B

                                                                      MD5

                                                                      af4ec03e643f517ab5d48e87feed9021

                                                                      SHA1

                                                                      97d22e190c7041e25bdd9f70409699d684d12656

                                                                      SHA256

                                                                      92e38dc02b9d1e11ec80c34c4d0ff271f0a2db1ae139fa96ef56de0ae2591c52

                                                                      SHA512

                                                                      818b1f9ddeeb737e84270d8dd398bf1e435d0e6032014fa75aa23c268aac17595126f6228a375f8668cda88c4c5953ca7881332047f35395bb3d4eaf1442a903

                                                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\QFB4PTP9\microsoft.windows[1].xml

                                                                      Filesize

                                                                      97B

                                                                      MD5

                                                                      4677e3ea7a170c78520dd71312ffd31e

                                                                      SHA1

                                                                      a9ac559324a6142d85ded6da9b16f44dc630bf8c

                                                                      SHA256

                                                                      703af6af210c7a59166ca33a20c29594710708757e7ca304a5c547ec4cf791c5

                                                                      SHA512

                                                                      7bf2a89ef25cb2c2f050f60a13c9c41c1e8ca959ee153b9189b4dc7f50cbb75da581a2ae608c517e941df78523ebe23ea53cdf16ce2cb1b6ee332d6d92b89095

                                                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133415034436678380.txt

                                                                      Filesize

                                                                      75KB

                                                                      MD5

                                                                      62d81c2e1e8b21733f95af2a596e4b18

                                                                      SHA1

                                                                      91c005ecc5ae4171f450c43c02d1ba532b4474c6

                                                                      SHA256

                                                                      a5596f83717bf64653b95ffe6ec38f20e40fd928456d5e254a53a440804d80b6

                                                                      SHA512

                                                                      c7f349acf55694ff696750c30a25c265ff07ced95e4d2a88fa2829d047ca3b3007dc824613a8c403c7613085aca4212155afe03f8f237c0d7781fd87e1fb8a7c

                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\QFB4PTP9\microsoft.windows[1].xml

                                                                      Filesize

                                                                      97B

                                                                      MD5

                                                                      4677e3ea7a170c78520dd71312ffd31e

                                                                      SHA1

                                                                      a9ac559324a6142d85ded6da9b16f44dc630bf8c

                                                                      SHA256

                                                                      703af6af210c7a59166ca33a20c29594710708757e7ca304a5c547ec4cf791c5

                                                                      SHA512

                                                                      7bf2a89ef25cb2c2f050f60a13c9c41c1e8ca959ee153b9189b4dc7f50cbb75da581a2ae608c517e941df78523ebe23ea53cdf16ce2cb1b6ee332d6d92b89095

                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\QFB4PTP9\microsoft.windows[1].xml

                                                                      Filesize

                                                                      97B

                                                                      MD5

                                                                      4677e3ea7a170c78520dd71312ffd31e

                                                                      SHA1

                                                                      a9ac559324a6142d85ded6da9b16f44dc630bf8c

                                                                      SHA256

                                                                      703af6af210c7a59166ca33a20c29594710708757e7ca304a5c547ec4cf791c5

                                                                      SHA512

                                                                      7bf2a89ef25cb2c2f050f60a13c9c41c1e8ca959ee153b9189b4dc7f50cbb75da581a2ae608c517e941df78523ebe23ea53cdf16ce2cb1b6ee332d6d92b89095

                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\QFB4PTP9\microsoft.windows[1].xml

                                                                      Filesize

                                                                      97B

                                                                      MD5

                                                                      4677e3ea7a170c78520dd71312ffd31e

                                                                      SHA1

                                                                      a9ac559324a6142d85ded6da9b16f44dc630bf8c

                                                                      SHA256

                                                                      703af6af210c7a59166ca33a20c29594710708757e7ca304a5c547ec4cf791c5

                                                                      SHA512

                                                                      7bf2a89ef25cb2c2f050f60a13c9c41c1e8ca959ee153b9189b4dc7f50cbb75da581a2ae608c517e941df78523ebe23ea53cdf16ce2cb1b6ee332d6d92b89095

                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\QFB4PTP9\microsoft.windows[1].xml

                                                                      Filesize

                                                                      97B

                                                                      MD5

                                                                      4677e3ea7a170c78520dd71312ffd31e

                                                                      SHA1

                                                                      a9ac559324a6142d85ded6da9b16f44dc630bf8c

                                                                      SHA256

                                                                      703af6af210c7a59166ca33a20c29594710708757e7ca304a5c547ec4cf791c5

                                                                      SHA512

                                                                      7bf2a89ef25cb2c2f050f60a13c9c41c1e8ca959ee153b9189b4dc7f50cbb75da581a2ae608c517e941df78523ebe23ea53cdf16ce2cb1b6ee332d6d92b89095

                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\QFB4PTP9\microsoft.windows[1].xml

                                                                      Filesize

                                                                      97B

                                                                      MD5

                                                                      4677e3ea7a170c78520dd71312ffd31e

                                                                      SHA1

                                                                      a9ac559324a6142d85ded6da9b16f44dc630bf8c

                                                                      SHA256

                                                                      703af6af210c7a59166ca33a20c29594710708757e7ca304a5c547ec4cf791c5

                                                                      SHA512

                                                                      7bf2a89ef25cb2c2f050f60a13c9c41c1e8ca959ee153b9189b4dc7f50cbb75da581a2ae608c517e941df78523ebe23ea53cdf16ce2cb1b6ee332d6d92b89095

                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\QFB4PTP9\microsoft.windows[1].xml

                                                                      Filesize

                                                                      97B

                                                                      MD5

                                                                      4677e3ea7a170c78520dd71312ffd31e

                                                                      SHA1

                                                                      a9ac559324a6142d85ded6da9b16f44dc630bf8c

                                                                      SHA256

                                                                      703af6af210c7a59166ca33a20c29594710708757e7ca304a5c547ec4cf791c5

                                                                      SHA512

                                                                      7bf2a89ef25cb2c2f050f60a13c9c41c1e8ca959ee153b9189b4dc7f50cbb75da581a2ae608c517e941df78523ebe23ea53cdf16ce2cb1b6ee332d6d92b89095

                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\QFB4PTP9\microsoft.windows[1].xml

                                                                      Filesize

                                                                      97B

                                                                      MD5

                                                                      4677e3ea7a170c78520dd71312ffd31e

                                                                      SHA1

                                                                      a9ac559324a6142d85ded6da9b16f44dc630bf8c

                                                                      SHA256

                                                                      703af6af210c7a59166ca33a20c29594710708757e7ca304a5c547ec4cf791c5

                                                                      SHA512

                                                                      7bf2a89ef25cb2c2f050f60a13c9c41c1e8ca959ee153b9189b4dc7f50cbb75da581a2ae608c517e941df78523ebe23ea53cdf16ce2cb1b6ee332d6d92b89095

                                                                    • memory/980-83-0x0000000003370000-0x0000000003371000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1184-45-0x000002146ABA0000-0x000002146ABC0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/1184-48-0x000002146AB60000-0x000002146AB80000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/1184-50-0x000002146AF70000-0x000002146AF90000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/1316-37-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2140-16-0x0000000004780000-0x0000000004781000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2156-187-0x000001A2B7980000-0x000001A2B79A0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/2156-193-0x000001A2B7D50000-0x000001A2B7D70000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/2156-190-0x000001A2B7940000-0x000001A2B7960000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/2296-59-0x0000000003530000-0x0000000003531000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/2904-116-0x00000185F3660000-0x00000185F3680000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/2904-118-0x00000185F3620000-0x00000185F3640000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/2904-120-0x00000185F3AD0000-0x00000185F3AF0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/3232-154-0x00000000033A0000-0x00000000033A1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/3248-69-0x0000015B26430000-0x0000015B26450000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/3248-67-0x0000015B26470000-0x0000015B26490000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/3248-71-0x0000015B26840000-0x0000015B26860000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/3256-164-0x000001B8E7860000-0x000001B8E7880000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/3256-162-0x000001B8E78A0000-0x000001B8E78C0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/3256-166-0x000001B8E7E80000-0x000001B8E7EA0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/3552-139-0x0000023889230000-0x0000023889250000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/3552-144-0x0000023889600000-0x0000023889620000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/3552-141-0x00000238891F0000-0x0000023889210000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/3764-96-0x000001AE07AB0000-0x000001AE07AD0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/3764-93-0x000001AE073A0000-0x000001AE073C0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/3764-91-0x000001AE073E0000-0x000001AE07400000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/4248-131-0x0000000003E00000-0x0000000003E01000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/4412-29-0x000002228DCA0000-0x000002228DCC0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/4412-26-0x000002228D680000-0x000002228D6A0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/4412-22-0x000002228D6C0000-0x000002228D6E0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/4932-108-0x00000000044B0000-0x00000000044B1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/5072-179-0x0000000002EF0000-0x0000000002EF1000-memory.dmp

                                                                      Filesize

                                                                      4KB