Analysis

  • max time kernel
    85s
  • max time network
    181s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 12:20

General

  • Target

    167b8279074e66a6fe183a7017396db943c85b888dfdb261076197dcf7f16b50.exe

  • Size

    2.8MB

  • MD5

    68f3f385bf5c19946295fb1f8664afb5

  • SHA1

    1f9374b103587d3fc0cac546c6878a7a9295c428

  • SHA256

    167b8279074e66a6fe183a7017396db943c85b888dfdb261076197dcf7f16b50

  • SHA512

    b56b8eae51704804cca3761e2ca3d73854e048e267926feda00d5f262012b9318fe558aacad84dd172e482ed2fab56d7cd45daea248e61391250f051b9213093

  • SSDEEP

    49152:H7TvfU+8X9GrNOsva5RbKhF3ANkTTlve1GfzAFAIweAlY:c+8X9G3vP3AMpxeAC

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Enumerates connected drives 3 TTPs 16 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\167b8279074e66a6fe183a7017396db943c85b888dfdb261076197dcf7f16b50.exe
    "C:\Users\Admin\AppData\Local\Temp\167b8279074e66a6fe183a7017396db943c85b888dfdb261076197dcf7f16b50.exe"
    1⤵
      PID:4196
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2420
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:3796
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:5048
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1004
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:4048
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:5012
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:2204
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:628
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3844
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3196
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of SendNotifyMessage
      PID:2148
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4192
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:2180
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:4048
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:3180
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:4140
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1416
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:1392
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
        PID:3616
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
          PID:3368
        • C:\Windows\system32\werfault.exe
          werfault.exe /hc /shared Global\85492b73ac9f4effacf9cc8a44ef7369 /t 3388 /p 2220
          1⤵
            PID:4224
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
              PID:1328
            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
              1⤵
                PID:636
              • C:\Windows\explorer.exe
                explorer.exe
                1⤵
                  PID:4044
                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                  1⤵
                    PID:3772
                  • C:\Windows\explorer.exe
                    explorer.exe
                    1⤵
                      PID:3676
                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                      1⤵
                        PID:3184
                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                        1⤵
                          PID:676
                        • C:\Windows\explorer.exe
                          explorer.exe
                          1⤵
                            PID:3348
                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                            1⤵
                              PID:4056
                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                              1⤵
                                PID:1172
                              • C:\Windows\explorer.exe
                                explorer.exe
                                1⤵
                                  PID:1164
                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                  1⤵
                                    PID:1080
                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                    1⤵
                                      PID:4808
                                    • C:\Windows\explorer.exe
                                      explorer.exe
                                      1⤵
                                        PID:5008
                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                        1⤵
                                          PID:3600
                                        • C:\Windows\explorer.exe
                                          explorer.exe
                                          1⤵
                                            PID:1456
                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                            1⤵
                                              PID:3296
                                            • C:\Windows\explorer.exe
                                              explorer.exe
                                              1⤵
                                                PID:5028
                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                1⤵
                                                  PID:1080
                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                  1⤵
                                                    PID:1784
                                                  • C:\Windows\explorer.exe
                                                    explorer.exe
                                                    1⤵
                                                      PID:400
                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                      1⤵
                                                        PID:2168
                                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                        1⤵
                                                          PID:2320
                                                        • C:\Windows\explorer.exe
                                                          explorer.exe
                                                          1⤵
                                                            PID:1788
                                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                            1⤵
                                                              PID:4644
                                                            • C:\Windows\explorer.exe
                                                              explorer.exe
                                                              1⤵
                                                                PID:1640
                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                1⤵
                                                                  PID:5024
                                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                  1⤵
                                                                    PID:4024
                                                                  • C:\Windows\explorer.exe
                                                                    explorer.exe
                                                                    1⤵
                                                                      PID:376

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                                      Filesize

                                                                      471B

                                                                      MD5

                                                                      0085711bef17acad9eacf0bbf9bf3906

                                                                      SHA1

                                                                      20041eb81473c406da0ebfd7717231c0852ba344

                                                                      SHA256

                                                                      98c31705ae2dbde79cc8916db28c40c875597004ae24d94ac42433e0989d70a1

                                                                      SHA512

                                                                      3354239703701d843124bc466fd9794dd65ed766e4a1df64f784250292be3f24239a9e7156738d07a1c12316952cc1ee71ae9feba9b8fdbfb545e273ae871a6e

                                                                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                                      Filesize

                                                                      412B

                                                                      MD5

                                                                      8d3187eef14d2f280ba6465456aa25dd

                                                                      SHA1

                                                                      035d9937a476372e33a853504cd30d7ab2c96c9a

                                                                      SHA256

                                                                      2db6616ad9bc4670dba8ffa436f89e598a46f46ddffb89e42937beea998566bc

                                                                      SHA512

                                                                      358854b75be7329da96d5ea89f979a26d9c1833718142292d35e11d01482e04c527aa38f5a8d4e9cddc2e34419c32a5ddac6f04441b949b761962d9808f09ae1

                                                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\46IOJ2Y1\microsoft.windows[1].xml

                                                                      Filesize

                                                                      96B

                                                                      MD5

                                                                      132893809ee21f6cc9bd8398d163fde8

                                                                      SHA1

                                                                      664b895e0f6ae4f8ed96f36dee355d4e554b29eb

                                                                      SHA256

                                                                      af9f28768de7e7f0f21d52b63003adb8fa1b563ab8e4a38bf361a7f51aa8d8d2

                                                                      SHA512

                                                                      a540b8cddd2684bf6d11480bc23200200414984b4520842db541e07021520fb6cf356492b7e2517cdd53718f4a8b6002d5268db4c085b5d1ab6ed3cc1973caa8

                                                                    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133415376280843358.txt

                                                                      Filesize

                                                                      75KB

                                                                      MD5

                                                                      62d81c2e1e8b21733f95af2a596e4b18

                                                                      SHA1

                                                                      91c005ecc5ae4171f450c43c02d1ba532b4474c6

                                                                      SHA256

                                                                      a5596f83717bf64653b95ffe6ec38f20e40fd928456d5e254a53a440804d80b6

                                                                      SHA512

                                                                      c7f349acf55694ff696750c30a25c265ff07ced95e4d2a88fa2829d047ca3b3007dc824613a8c403c7613085aca4212155afe03f8f237c0d7781fd87e1fb8a7c

                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\46IOJ2Y1\microsoft.windows[1].xml

                                                                      Filesize

                                                                      96B

                                                                      MD5

                                                                      132893809ee21f6cc9bd8398d163fde8

                                                                      SHA1

                                                                      664b895e0f6ae4f8ed96f36dee355d4e554b29eb

                                                                      SHA256

                                                                      af9f28768de7e7f0f21d52b63003adb8fa1b563ab8e4a38bf361a7f51aa8d8d2

                                                                      SHA512

                                                                      a540b8cddd2684bf6d11480bc23200200414984b4520842db541e07021520fb6cf356492b7e2517cdd53718f4a8b6002d5268db4c085b5d1ab6ed3cc1973caa8

                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\46IOJ2Y1\microsoft.windows[1].xml

                                                                      Filesize

                                                                      96B

                                                                      MD5

                                                                      132893809ee21f6cc9bd8398d163fde8

                                                                      SHA1

                                                                      664b895e0f6ae4f8ed96f36dee355d4e554b29eb

                                                                      SHA256

                                                                      af9f28768de7e7f0f21d52b63003adb8fa1b563ab8e4a38bf361a7f51aa8d8d2

                                                                      SHA512

                                                                      a540b8cddd2684bf6d11480bc23200200414984b4520842db541e07021520fb6cf356492b7e2517cdd53718f4a8b6002d5268db4c085b5d1ab6ed3cc1973caa8

                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\46IOJ2Y1\microsoft.windows[1].xml

                                                                      Filesize

                                                                      96B

                                                                      MD5

                                                                      132893809ee21f6cc9bd8398d163fde8

                                                                      SHA1

                                                                      664b895e0f6ae4f8ed96f36dee355d4e554b29eb

                                                                      SHA256

                                                                      af9f28768de7e7f0f21d52b63003adb8fa1b563ab8e4a38bf361a7f51aa8d8d2

                                                                      SHA512

                                                                      a540b8cddd2684bf6d11480bc23200200414984b4520842db541e07021520fb6cf356492b7e2517cdd53718f4a8b6002d5268db4c085b5d1ab6ed3cc1973caa8

                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\46IOJ2Y1\microsoft.windows[1].xml

                                                                      Filesize

                                                                      96B

                                                                      MD5

                                                                      132893809ee21f6cc9bd8398d163fde8

                                                                      SHA1

                                                                      664b895e0f6ae4f8ed96f36dee355d4e554b29eb

                                                                      SHA256

                                                                      af9f28768de7e7f0f21d52b63003adb8fa1b563ab8e4a38bf361a7f51aa8d8d2

                                                                      SHA512

                                                                      a540b8cddd2684bf6d11480bc23200200414984b4520842db541e07021520fb6cf356492b7e2517cdd53718f4a8b6002d5268db4c085b5d1ab6ed3cc1973caa8

                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\46IOJ2Y1\microsoft.windows[1].xml

                                                                      Filesize

                                                                      96B

                                                                      MD5

                                                                      132893809ee21f6cc9bd8398d163fde8

                                                                      SHA1

                                                                      664b895e0f6ae4f8ed96f36dee355d4e554b29eb

                                                                      SHA256

                                                                      af9f28768de7e7f0f21d52b63003adb8fa1b563ab8e4a38bf361a7f51aa8d8d2

                                                                      SHA512

                                                                      a540b8cddd2684bf6d11480bc23200200414984b4520842db541e07021520fb6cf356492b7e2517cdd53718f4a8b6002d5268db4c085b5d1ab6ed3cc1973caa8

                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\46IOJ2Y1\microsoft.windows[1].xml

                                                                      Filesize

                                                                      96B

                                                                      MD5

                                                                      132893809ee21f6cc9bd8398d163fde8

                                                                      SHA1

                                                                      664b895e0f6ae4f8ed96f36dee355d4e554b29eb

                                                                      SHA256

                                                                      af9f28768de7e7f0f21d52b63003adb8fa1b563ab8e4a38bf361a7f51aa8d8d2

                                                                      SHA512

                                                                      a540b8cddd2684bf6d11480bc23200200414984b4520842db541e07021520fb6cf356492b7e2517cdd53718f4a8b6002d5268db4c085b5d1ab6ed3cc1973caa8

                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\46IOJ2Y1\microsoft.windows[1].xml

                                                                      Filesize

                                                                      96B

                                                                      MD5

                                                                      132893809ee21f6cc9bd8398d163fde8

                                                                      SHA1

                                                                      664b895e0f6ae4f8ed96f36dee355d4e554b29eb

                                                                      SHA256

                                                                      af9f28768de7e7f0f21d52b63003adb8fa1b563ab8e4a38bf361a7f51aa8d8d2

                                                                      SHA512

                                                                      a540b8cddd2684bf6d11480bc23200200414984b4520842db541e07021520fb6cf356492b7e2517cdd53718f4a8b6002d5268db4c085b5d1ab6ed3cc1973caa8

                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\46IOJ2Y1\microsoft.windows[1].xml

                                                                      Filesize

                                                                      96B

                                                                      MD5

                                                                      132893809ee21f6cc9bd8398d163fde8

                                                                      SHA1

                                                                      664b895e0f6ae4f8ed96f36dee355d4e554b29eb

                                                                      SHA256

                                                                      af9f28768de7e7f0f21d52b63003adb8fa1b563ab8e4a38bf361a7f51aa8d8d2

                                                                      SHA512

                                                                      a540b8cddd2684bf6d11480bc23200200414984b4520842db541e07021520fb6cf356492b7e2517cdd53718f4a8b6002d5268db4c085b5d1ab6ed3cc1973caa8

                                                                    • memory/400-180-0x00000000048E0000-0x00000000048E1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/628-15-0x00000000040E0000-0x00000000040E1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/636-76-0x00000250ECF50000-0x00000250ECF70000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/636-70-0x00000250ECB80000-0x00000250ECBA0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/636-73-0x00000250ECB40000-0x00000250ECB60000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/676-94-0x0000020C3DE40000-0x0000020C3DE60000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/676-97-0x0000020C3DE00000-0x0000020C3DE20000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/676-100-0x0000020C3E200000-0x0000020C3E220000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/1164-132-0x0000000004690000-0x0000000004691000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1172-121-0x0000023A91800000-0x0000023A91820000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/1172-117-0x0000023A91840000-0x0000023A91860000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/1172-123-0x0000023A91C00000-0x0000023A91C20000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/1416-52-0x0000017D83AA0000-0x0000017D83AC0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/1416-48-0x0000017D83490000-0x0000017D834B0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/1416-46-0x0000017D834D0000-0x0000017D834F0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/1640-204-0x00000000045E0000-0x00000000045E1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/1784-165-0x000001473DDC0000-0x000001473DDE0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/1784-168-0x000001473DD80000-0x000001473DDA0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/1784-170-0x000001473E190000-0x000001473E1B0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/2320-190-0x0000029E0D3C0000-0x0000029E0D3E0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/2320-188-0x0000029E0D700000-0x0000029E0D720000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/2320-195-0x0000029E0DAD0000-0x0000029E0DAF0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/3180-38-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/3196-27-0x000001AE4B3B0000-0x000001AE4B3D0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/3196-21-0x000001AE4AD80000-0x000001AE4ADA0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/3196-24-0x000001AE4AD40000-0x000001AE4AD60000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/3348-109-0x0000000004A10000-0x0000000004A11000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/3368-62-0x0000000004AB0000-0x0000000004AB1000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/3676-86-0x0000000004520000-0x0000000004521000-memory.dmp

                                                                      Filesize

                                                                      4KB

                                                                    • memory/4024-212-0x000001E912590000-0x000001E9125B0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/4024-214-0x000001E912550000-0x000001E912570000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/4024-216-0x000001E912B60000-0x000001E912B80000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/4808-142-0x000001D933F90000-0x000001D933FB0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/4808-140-0x000001D933FD0000-0x000001D933FF0000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/4808-144-0x000001D9343E0000-0x000001D934400000-memory.dmp

                                                                      Filesize

                                                                      128KB

                                                                    • memory/5028-157-0x0000000004080000-0x0000000004081000-memory.dmp

                                                                      Filesize

                                                                      4KB