Analysis

  • max time kernel
    66s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 22:08

General

  • Target

    d3d244eb3a8c2a5a3f11c59f5cdae87d98ed9fc1c62c7af83df40c3026a9bb89.exe

  • Size

    2.8MB

  • MD5

    0d11b022def043086396c7e67b477e83

  • SHA1

    4595e34ec983e9a8edf57097b293418d82834bbd

  • SHA256

    d3d244eb3a8c2a5a3f11c59f5cdae87d98ed9fc1c62c7af83df40c3026a9bb89

  • SHA512

    8ecee44fd347cdfa409cf7912eca6ae142508aac110eaa10395ad1c75881362a848fc0b1909b2abe1c4fd05352c9dffbac95811f99d86a7147ebf8fa14618738

  • SSDEEP

    49152:H7TvfU+8X9GrNOsva5RbKhF3ANkTTlbsyG+df9bTkykXm:c+8X9G3vP3AMeyiySm

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Enumerates connected drives 3 TTPs 14 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3d244eb3a8c2a5a3f11c59f5cdae87d98ed9fc1c62c7af83df40c3026a9bb89.exe
    "C:\Users\Admin\AppData\Local\Temp\d3d244eb3a8c2a5a3f11c59f5cdae87d98ed9fc1c62c7af83df40c3026a9bb89.exe"
    1⤵
      PID:972
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3988
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:3028
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4628
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:1160
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4632
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2308
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2548
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3172
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4604
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of SendNotifyMessage
      PID:3220
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3940
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:3516
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:4064
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:5032
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:3992
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
        PID:5020
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
          PID:2908
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
          • Modifies Installed Components in the registry
          • Modifies registry class
          PID:3244
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
            PID:2228
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
              PID:3272
            • C:\Windows\explorer.exe
              explorer.exe
              1⤵
                PID:3200
              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                1⤵
                  PID:3092
                • C:\Windows\explorer.exe
                  explorer.exe
                  1⤵
                    PID:4784
                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                    1⤵
                      PID:1416
                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                      1⤵
                        PID:3704
                      • C:\Windows\explorer.exe
                        explorer.exe
                        1⤵
                          PID:848
                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                          1⤵
                            PID:1616
                          • C:\Windows\explorer.exe
                            explorer.exe
                            1⤵
                              PID:3572
                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                              1⤵
                                PID:2956
                              • C:\Windows\explorer.exe
                                explorer.exe
                                1⤵
                                  PID:1408
                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                  1⤵
                                    PID:5068
                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                    1⤵
                                      PID:1220
                                    • C:\Windows\explorer.exe
                                      explorer.exe
                                      1⤵
                                        PID:1824
                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                        1⤵
                                          PID:3792
                                        • C:\Windows\explorer.exe
                                          explorer.exe
                                          1⤵
                                            PID:4392
                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                            1⤵
                                              PID:1128
                                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                              1⤵
                                                PID:1324
                                              • C:\Windows\explorer.exe
                                                explorer.exe
                                                1⤵
                                                  PID:1096
                                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                  1⤵
                                                    PID:2136
                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                    1⤵
                                                      PID:3272
                                                    • C:\Windows\explorer.exe
                                                      explorer.exe
                                                      1⤵
                                                        PID:4872
                                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                        1⤵
                                                          PID:4340
                                                        • C:\Windows\explorer.exe
                                                          explorer.exe
                                                          1⤵
                                                            PID:3940

                                                          Network

                                                                MITRE ATT&CK Enterprise v15

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                                  Filesize

                                                                  471B

                                                                  MD5

                                                                  7f879d6719982112a013f4032fbc8f10

                                                                  SHA1

                                                                  f40f43a85d7778035daec4ddd29171e26871cd0a

                                                                  SHA256

                                                                  de312a5c06df4f2432545e9e84431e924635cfb4cd216396d1e8610ce9818082

                                                                  SHA512

                                                                  633f7e8d972739d53b168ad36ca708187c10a3ff4d0abba384c9a1167257608d48ed873b412241fc3b7f452226a5908a99c9b6056a42134b7fc0740ec1484d97

                                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                                  Filesize

                                                                  412B

                                                                  MD5

                                                                  6c10e2a8dd022dedfbdb7a4fc6d58a7b

                                                                  SHA1

                                                                  ff3c5498aa7054ef7fadf6cd07ac9badfb21a0be

                                                                  SHA256

                                                                  e91e3255a38dcdc7ff5c72f50fd4a33af44267caffbff77e383bc3a92fc96055

                                                                  SHA512

                                                                  0a50b5108ae3d9c155d6b5f5cebfb76bf65ef79dd45e52f5f884dcf3be2237761a36e1fc7c1d0738d9bcc1d3db79ea25193f6c530c48c6b5941e9ea3eaf50b4b

                                                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PR67AA1Y\microsoft.windows[1].xml

                                                                  Filesize

                                                                  97B

                                                                  MD5

                                                                  82b066a0c26e9c3c026d421e012a093e

                                                                  SHA1

                                                                  2e4493ff239034dd93befa48a286616fa1222526

                                                                  SHA256

                                                                  a4c381833e51949fd261b3e7bf72873bddc61d6eaf01a83a89beda5877338d64

                                                                  SHA512

                                                                  4fb425137bcab122288af0df6dd2774fb9179f9c178c8c7b738e6e293d8dbe0aff97a879f42670d07c5bbc69935104b8bdcef8fd7efaee48949dd354af626feb

                                                                • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PR67AA1Y\microsoft.windows[1].xml

                                                                  Filesize

                                                                  97B

                                                                  MD5

                                                                  82b066a0c26e9c3c026d421e012a093e

                                                                  SHA1

                                                                  2e4493ff239034dd93befa48a286616fa1222526

                                                                  SHA256

                                                                  a4c381833e51949fd261b3e7bf72873bddc61d6eaf01a83a89beda5877338d64

                                                                  SHA512

                                                                  4fb425137bcab122288af0df6dd2774fb9179f9c178c8c7b738e6e293d8dbe0aff97a879f42670d07c5bbc69935104b8bdcef8fd7efaee48949dd354af626feb

                                                                • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PR67AA1Y\microsoft.windows[1].xml

                                                                  Filesize

                                                                  97B

                                                                  MD5

                                                                  82b066a0c26e9c3c026d421e012a093e

                                                                  SHA1

                                                                  2e4493ff239034dd93befa48a286616fa1222526

                                                                  SHA256

                                                                  a4c381833e51949fd261b3e7bf72873bddc61d6eaf01a83a89beda5877338d64

                                                                  SHA512

                                                                  4fb425137bcab122288af0df6dd2774fb9179f9c178c8c7b738e6e293d8dbe0aff97a879f42670d07c5bbc69935104b8bdcef8fd7efaee48949dd354af626feb

                                                                • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PR67AA1Y\microsoft.windows[1].xml

                                                                  Filesize

                                                                  97B

                                                                  MD5

                                                                  82b066a0c26e9c3c026d421e012a093e

                                                                  SHA1

                                                                  2e4493ff239034dd93befa48a286616fa1222526

                                                                  SHA256

                                                                  a4c381833e51949fd261b3e7bf72873bddc61d6eaf01a83a89beda5877338d64

                                                                  SHA512

                                                                  4fb425137bcab122288af0df6dd2774fb9179f9c178c8c7b738e6e293d8dbe0aff97a879f42670d07c5bbc69935104b8bdcef8fd7efaee48949dd354af626feb

                                                                • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PR67AA1Y\microsoft.windows[1].xml

                                                                  Filesize

                                                                  97B

                                                                  MD5

                                                                  82b066a0c26e9c3c026d421e012a093e

                                                                  SHA1

                                                                  2e4493ff239034dd93befa48a286616fa1222526

                                                                  SHA256

                                                                  a4c381833e51949fd261b3e7bf72873bddc61d6eaf01a83a89beda5877338d64

                                                                  SHA512

                                                                  4fb425137bcab122288af0df6dd2774fb9179f9c178c8c7b738e6e293d8dbe0aff97a879f42670d07c5bbc69935104b8bdcef8fd7efaee48949dd354af626feb

                                                                • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PR67AA1Y\microsoft.windows[1].xml

                                                                  Filesize

                                                                  97B

                                                                  MD5

                                                                  82b066a0c26e9c3c026d421e012a093e

                                                                  SHA1

                                                                  2e4493ff239034dd93befa48a286616fa1222526

                                                                  SHA256

                                                                  a4c381833e51949fd261b3e7bf72873bddc61d6eaf01a83a89beda5877338d64

                                                                  SHA512

                                                                  4fb425137bcab122288af0df6dd2774fb9179f9c178c8c7b738e6e293d8dbe0aff97a879f42670d07c5bbc69935104b8bdcef8fd7efaee48949dd354af626feb

                                                                • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PR67AA1Y\microsoft.windows[1].xml

                                                                  Filesize

                                                                  97B

                                                                  MD5

                                                                  82b066a0c26e9c3c026d421e012a093e

                                                                  SHA1

                                                                  2e4493ff239034dd93befa48a286616fa1222526

                                                                  SHA256

                                                                  a4c381833e51949fd261b3e7bf72873bddc61d6eaf01a83a89beda5877338d64

                                                                  SHA512

                                                                  4fb425137bcab122288af0df6dd2774fb9179f9c178c8c7b738e6e293d8dbe0aff97a879f42670d07c5bbc69935104b8bdcef8fd7efaee48949dd354af626feb

                                                                • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PR67AA1Y\microsoft.windows[1].xml

                                                                  Filesize

                                                                  97B

                                                                  MD5

                                                                  82b066a0c26e9c3c026d421e012a093e

                                                                  SHA1

                                                                  2e4493ff239034dd93befa48a286616fa1222526

                                                                  SHA256

                                                                  a4c381833e51949fd261b3e7bf72873bddc61d6eaf01a83a89beda5877338d64

                                                                  SHA512

                                                                  4fb425137bcab122288af0df6dd2774fb9179f9c178c8c7b738e6e293d8dbe0aff97a879f42670d07c5bbc69935104b8bdcef8fd7efaee48949dd354af626feb

                                                                • memory/1096-171-0x00000000049A0000-0x00000000049A1000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/1220-132-0x0000022E3DC50000-0x0000022E3DC70000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/1220-136-0x0000022E3E020000-0x0000022E3E040000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/1220-134-0x0000022E3DC10000-0x0000022E3DC30000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/1324-160-0x0000021D38A10000-0x0000021D38A30000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/1324-156-0x0000021D38640000-0x0000021D38660000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/1324-158-0x0000021D38600000-0x0000021D38620000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/1408-125-0x0000000004D80000-0x0000000004D81000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/2548-9-0x0000000004360000-0x0000000004361000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/2908-67-0x0000026C3B4A0000-0x0000026C3B4C0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/2908-69-0x0000026C3BAC0000-0x0000026C3BAE0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/2908-63-0x0000026C3B4E0000-0x0000026C3B500000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/3244-75-0x0000000004B40000-0x0000000004B41000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/3272-85-0x00000206A8D90000-0x00000206A8DB0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/3272-183-0x00000277B86E0000-0x00000277B8700000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/3272-87-0x00000206A93A0000-0x00000206A93C0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/3272-83-0x00000206A8DD0000-0x00000206A8DF0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/3272-181-0x00000277B7FD0000-0x00000277B7FF0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/3272-179-0x00000277B8320000-0x00000277B8340000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/3516-32-0x0000000004280000-0x0000000004281000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/3704-109-0x000002558FB60000-0x000002558FB80000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/3704-111-0x000002558FF70000-0x000002558FF90000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/3704-107-0x000002558FBA0000-0x000002558FBC0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/3992-55-0x00000000045C0000-0x00000000045C1000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/4392-148-0x0000000004910000-0x0000000004911000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/4604-22-0x00000283FD6E0000-0x00000283FD700000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/4604-19-0x00000283FD240000-0x00000283FD260000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/4604-16-0x00000283FD280000-0x00000283FD2A0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/4784-99-0x0000000004800000-0x0000000004801000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/5032-40-0x0000015AC8040000-0x0000015AC8060000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/5032-42-0x0000015AC8000000-0x0000015AC8020000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/5032-44-0x0000015AC8410000-0x0000015AC8430000-memory.dmp

                                                                  Filesize

                                                                  128KB