Analysis

  • max time kernel
    94s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 19:13

General

  • Target

    92bb48c7d2dd82e0b4f876eb1c605659225de6637ed9aa1a92cdf40891816b29.exe

  • Size

    3.2MB

  • MD5

    800488e6bc0ec0b8d4b61c4bda0a6ec7

  • SHA1

    8f6ae07283f78556e86b3b9c73379c7ac4b8fd94

  • SHA256

    92bb48c7d2dd82e0b4f876eb1c605659225de6637ed9aa1a92cdf40891816b29

  • SHA512

    9f69fd3c7941f58ff7d1e27144513115d76326bed9f5a98deaf9c922d651b28b558386f2dfdccd32da1db26e1a89476abf97e8b22b854caf4c15fd6a46e03c41

  • SSDEEP

    49152:D7TvfU+8X9GrNOsva5RbKhF3ANkTTlDA7aAwbg+/Ogg58rgm1Y:Q+8X9G3vP3AMBbAwbog7gOY

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 8 IoCs
  • Enumerates connected drives 3 TTPs 16 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\92bb48c7d2dd82e0b4f876eb1c605659225de6637ed9aa1a92cdf40891816b29.exe
    "C:\Users\Admin\AppData\Local\Temp\92bb48c7d2dd82e0b4f876eb1c605659225de6637ed9aa1a92cdf40891816b29.exe"
    1⤵
      PID:2164
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4736
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:3044
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2820
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2708
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:3252
    • C:\Windows\system32\werfault.exe
      werfault.exe /hc /shared Global\76a530999412403099a5c6a81a464db7 /t 5104 /p 1436
      1⤵
        PID:2304
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4124
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:1668
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of SendNotifyMessage
        PID:420
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:3440
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious use of SendNotifyMessage
        PID:2080
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Suspicious use of SetWindowsHookEx
        PID:1536
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2240
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:1088
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2856
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
        • Modifies Installed Components in the registry
        • Enumerates connected drives
        • Checks SCSI registry key(s)
        • Modifies registry class
        PID:2884
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4928
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:2228
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
          PID:2304
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
            PID:3792
          • C:\Windows\explorer.exe
            explorer.exe
            1⤵
              PID:4492
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
                PID:4436
              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                1⤵
                  PID:3160
                • C:\Windows\explorer.exe
                  explorer.exe
                  1⤵
                    PID:3156
                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                    1⤵
                      PID:952
                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                      1⤵
                        PID:868
                      • C:\Windows\explorer.exe
                        explorer.exe
                        1⤵
                          PID:4880
                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                          1⤵
                            PID:2292
                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                            1⤵
                              PID:4908
                            • C:\Windows\explorer.exe
                              explorer.exe
                              1⤵
                                PID:1816
                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                1⤵
                                  PID:4428
                                • C:\Windows\explorer.exe
                                  explorer.exe
                                  1⤵
                                    PID:4280
                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                    1⤵
                                      PID:3596
                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                      1⤵
                                        PID:2036
                                      • C:\Windows\explorer.exe
                                        explorer.exe
                                        1⤵
                                          PID:2328
                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                          1⤵
                                            PID:4236
                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                            1⤵
                                              PID:1968
                                            • C:\Windows\explorer.exe
                                              explorer.exe
                                              1⤵
                                                PID:3168
                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                1⤵
                                                  PID:1820
                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                  1⤵
                                                    PID:4892
                                                  • C:\Windows\explorer.exe
                                                    explorer.exe
                                                    1⤵
                                                      PID:2520
                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                      1⤵
                                                        PID:828
                                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                        1⤵
                                                          PID:916
                                                        • C:\Windows\explorer.exe
                                                          explorer.exe
                                                          1⤵
                                                            PID:2588
                                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                            1⤵
                                                              PID:2204
                                                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                              1⤵
                                                                PID:4136
                                                              • C:\Windows\explorer.exe
                                                                explorer.exe
                                                                1⤵
                                                                  PID:2008
                                                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                  1⤵
                                                                    PID:2936
                                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                    1⤵
                                                                      PID:3532
                                                                    • C:\Windows\explorer.exe
                                                                      explorer.exe
                                                                      1⤵
                                                                        PID:544

                                                                      Network

                                                                            MITRE ATT&CK Enterprise v15

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                                              Filesize

                                                                              471B

                                                                              MD5

                                                                              56f8fa6aa59f3ee1aa24361d930a52d4

                                                                              SHA1

                                                                              2b43132dcfbedcd28adb4e03c2c90290f81816b8

                                                                              SHA256

                                                                              066a23f715a61c55ba3c4cae2e214a473fa4c3cf3a4bf963f323c62bba98e0d2

                                                                              SHA512

                                                                              46312236d22521e8e7d96ba38f411420a6e231d029a09bcfe57154fe670526ea36159572cca9c8fd2b43c7b2948e3a05b09f3fc98a5734079dfd7bc2db5ec15a

                                                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                                              Filesize

                                                                              412B

                                                                              MD5

                                                                              62fa59e5c0b68338a97142b46479a240

                                                                              SHA1

                                                                              81c07f6f214f2b3cd1ae4f42da74d871751b5a37

                                                                              SHA256

                                                                              33f065187b5f8b7c3fd9b246b5204722a57897e897fee633c0c0ab518b014ad6

                                                                              SHA512

                                                                              3746fb4c145b5e8d30efa7c19c190e9cd23e7d7b70fa59b2a0c028c9b06b8b67431b06269136962efa8d0419a71daee3687d8f5131c5b5649489b37a66e9ce3b

                                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PR67AA1Y\microsoft.windows[1].xml

                                                                              Filesize

                                                                              97B

                                                                              MD5

                                                                              82b066a0c26e9c3c026d421e012a093e

                                                                              SHA1

                                                                              2e4493ff239034dd93befa48a286616fa1222526

                                                                              SHA256

                                                                              a4c381833e51949fd261b3e7bf72873bddc61d6eaf01a83a89beda5877338d64

                                                                              SHA512

                                                                              4fb425137bcab122288af0df6dd2774fb9179f9c178c8c7b738e6e293d8dbe0aff97a879f42670d07c5bbc69935104b8bdcef8fd7efaee48949dd354af626feb

                                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133416980372192801.txt

                                                                              Filesize

                                                                              75KB

                                                                              MD5

                                                                              62d81c2e1e8b21733f95af2a596e4b18

                                                                              SHA1

                                                                              91c005ecc5ae4171f450c43c02d1ba532b4474c6

                                                                              SHA256

                                                                              a5596f83717bf64653b95ffe6ec38f20e40fd928456d5e254a53a440804d80b6

                                                                              SHA512

                                                                              c7f349acf55694ff696750c30a25c265ff07ced95e4d2a88fa2829d047ca3b3007dc824613a8c403c7613085aca4212155afe03f8f237c0d7781fd87e1fb8a7c

                                                                            • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133416980372192801.txt

                                                                              Filesize

                                                                              75KB

                                                                              MD5

                                                                              62d81c2e1e8b21733f95af2a596e4b18

                                                                              SHA1

                                                                              91c005ecc5ae4171f450c43c02d1ba532b4474c6

                                                                              SHA256

                                                                              a5596f83717bf64653b95ffe6ec38f20e40fd928456d5e254a53a440804d80b6

                                                                              SHA512

                                                                              c7f349acf55694ff696750c30a25c265ff07ced95e4d2a88fa2829d047ca3b3007dc824613a8c403c7613085aca4212155afe03f8f237c0d7781fd87e1fb8a7c

                                                                            • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PR67AA1Y\microsoft.windows[1].xml

                                                                              Filesize

                                                                              97B

                                                                              MD5

                                                                              82b066a0c26e9c3c026d421e012a093e

                                                                              SHA1

                                                                              2e4493ff239034dd93befa48a286616fa1222526

                                                                              SHA256

                                                                              a4c381833e51949fd261b3e7bf72873bddc61d6eaf01a83a89beda5877338d64

                                                                              SHA512

                                                                              4fb425137bcab122288af0df6dd2774fb9179f9c178c8c7b738e6e293d8dbe0aff97a879f42670d07c5bbc69935104b8bdcef8fd7efaee48949dd354af626feb

                                                                            • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PR67AA1Y\microsoft.windows[1].xml

                                                                              Filesize

                                                                              97B

                                                                              MD5

                                                                              82b066a0c26e9c3c026d421e012a093e

                                                                              SHA1

                                                                              2e4493ff239034dd93befa48a286616fa1222526

                                                                              SHA256

                                                                              a4c381833e51949fd261b3e7bf72873bddc61d6eaf01a83a89beda5877338d64

                                                                              SHA512

                                                                              4fb425137bcab122288af0df6dd2774fb9179f9c178c8c7b738e6e293d8dbe0aff97a879f42670d07c5bbc69935104b8bdcef8fd7efaee48949dd354af626feb

                                                                            • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PR67AA1Y\microsoft.windows[1].xml

                                                                              Filesize

                                                                              97B

                                                                              MD5

                                                                              82b066a0c26e9c3c026d421e012a093e

                                                                              SHA1

                                                                              2e4493ff239034dd93befa48a286616fa1222526

                                                                              SHA256

                                                                              a4c381833e51949fd261b3e7bf72873bddc61d6eaf01a83a89beda5877338d64

                                                                              SHA512

                                                                              4fb425137bcab122288af0df6dd2774fb9179f9c178c8c7b738e6e293d8dbe0aff97a879f42670d07c5bbc69935104b8bdcef8fd7efaee48949dd354af626feb

                                                                            • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PR67AA1Y\microsoft.windows[1].xml

                                                                              Filesize

                                                                              97B

                                                                              MD5

                                                                              82b066a0c26e9c3c026d421e012a093e

                                                                              SHA1

                                                                              2e4493ff239034dd93befa48a286616fa1222526

                                                                              SHA256

                                                                              a4c381833e51949fd261b3e7bf72873bddc61d6eaf01a83a89beda5877338d64

                                                                              SHA512

                                                                              4fb425137bcab122288af0df6dd2774fb9179f9c178c8c7b738e6e293d8dbe0aff97a879f42670d07c5bbc69935104b8bdcef8fd7efaee48949dd354af626feb

                                                                            • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PR67AA1Y\microsoft.windows[1].xml

                                                                              Filesize

                                                                              97B

                                                                              MD5

                                                                              82b066a0c26e9c3c026d421e012a093e

                                                                              SHA1

                                                                              2e4493ff239034dd93befa48a286616fa1222526

                                                                              SHA256

                                                                              a4c381833e51949fd261b3e7bf72873bddc61d6eaf01a83a89beda5877338d64

                                                                              SHA512

                                                                              4fb425137bcab122288af0df6dd2774fb9179f9c178c8c7b738e6e293d8dbe0aff97a879f42670d07c5bbc69935104b8bdcef8fd7efaee48949dd354af626feb

                                                                            • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PR67AA1Y\microsoft.windows[1].xml

                                                                              Filesize

                                                                              97B

                                                                              MD5

                                                                              82b066a0c26e9c3c026d421e012a093e

                                                                              SHA1

                                                                              2e4493ff239034dd93befa48a286616fa1222526

                                                                              SHA256

                                                                              a4c381833e51949fd261b3e7bf72873bddc61d6eaf01a83a89beda5877338d64

                                                                              SHA512

                                                                              4fb425137bcab122288af0df6dd2774fb9179f9c178c8c7b738e6e293d8dbe0aff97a879f42670d07c5bbc69935104b8bdcef8fd7efaee48949dd354af626feb

                                                                            • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PR67AA1Y\microsoft.windows[1].xml

                                                                              Filesize

                                                                              97B

                                                                              MD5

                                                                              82b066a0c26e9c3c026d421e012a093e

                                                                              SHA1

                                                                              2e4493ff239034dd93befa48a286616fa1222526

                                                                              SHA256

                                                                              a4c381833e51949fd261b3e7bf72873bddc61d6eaf01a83a89beda5877338d64

                                                                              SHA512

                                                                              4fb425137bcab122288af0df6dd2774fb9179f9c178c8c7b738e6e293d8dbe0aff97a879f42670d07c5bbc69935104b8bdcef8fd7efaee48949dd354af626feb

                                                                            • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PR67AA1Y\microsoft.windows[1].xml

                                                                              Filesize

                                                                              97B

                                                                              MD5

                                                                              82b066a0c26e9c3c026d421e012a093e

                                                                              SHA1

                                                                              2e4493ff239034dd93befa48a286616fa1222526

                                                                              SHA256

                                                                              a4c381833e51949fd261b3e7bf72873bddc61d6eaf01a83a89beda5877338d64

                                                                              SHA512

                                                                              4fb425137bcab122288af0df6dd2774fb9179f9c178c8c7b738e6e293d8dbe0aff97a879f42670d07c5bbc69935104b8bdcef8fd7efaee48949dd354af626feb

                                                                            • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PR67AA1Y\microsoft.windows[1].xml

                                                                              Filesize

                                                                              97B

                                                                              MD5

                                                                              82b066a0c26e9c3c026d421e012a093e

                                                                              SHA1

                                                                              2e4493ff239034dd93befa48a286616fa1222526

                                                                              SHA256

                                                                              a4c381833e51949fd261b3e7bf72873bddc61d6eaf01a83a89beda5877338d64

                                                                              SHA512

                                                                              4fb425137bcab122288af0df6dd2774fb9179f9c178c8c7b738e6e293d8dbe0aff97a879f42670d07c5bbc69935104b8bdcef8fd7efaee48949dd354af626feb

                                                                            • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\PR67AA1Y\microsoft.windows[1].xml

                                                                              Filesize

                                                                              97B

                                                                              MD5

                                                                              82b066a0c26e9c3c026d421e012a093e

                                                                              SHA1

                                                                              2e4493ff239034dd93befa48a286616fa1222526

                                                                              SHA256

                                                                              a4c381833e51949fd261b3e7bf72873bddc61d6eaf01a83a89beda5877338d64

                                                                              SHA512

                                                                              4fb425137bcab122288af0df6dd2774fb9179f9c178c8c7b738e6e293d8dbe0aff97a879f42670d07c5bbc69935104b8bdcef8fd7efaee48949dd354af626feb

                                                                            • memory/868-131-0x0000017210130000-0x0000017210150000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/868-128-0x0000017210170000-0x0000017210190000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/868-135-0x0000017210540000-0x0000017210560000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/916-243-0x00000159BC5E0000-0x00000159BC600000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/916-240-0x00000159BBFD0000-0x00000159BBFF0000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/916-236-0x00000159BC220000-0x00000159BC240000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/1968-195-0x000001B4CCD40000-0x000001B4CCD60000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/1968-192-0x000001B4CC930000-0x000001B4CC950000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/1968-190-0x000001B4CC970000-0x000001B4CC990000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/2008-274-0x00000000048B0000-0x00000000048B1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2036-178-0x000001F011130000-0x000001F011150000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/2036-174-0x000001F0109E0000-0x000001F010A00000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/2036-172-0x000001F010D20000-0x000001F010D40000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/2080-47-0x0000000004A70000-0x0000000004A71000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2228-83-0x000001EC49230000-0x000001EC49250000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/2228-86-0x000001EC49640000-0x000001EC49660000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/2228-81-0x000001EC49270000-0x000001EC49290000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/2240-57-0x000001F638B60000-0x000001F638B80000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/2240-55-0x000001F638BA0000-0x000001F638BC0000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/2240-61-0x000001F638F70000-0x000001F638F90000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/2328-184-0x0000000004880000-0x0000000004881000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2520-229-0x00000000029E0000-0x00000000029E1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2588-251-0x00000000042C0000-0x00000000042C1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2820-34-0x00000149F2300000-0x00000149F2320000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/2820-30-0x00000149F1F40000-0x00000149F1F60000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/2820-32-0x00000149F1F00000-0x00000149F1F20000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/2884-73-0x0000000004C40000-0x0000000004C41000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/3156-121-0x0000000004550000-0x0000000004551000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/3160-110-0x000002359E540000-0x000002359E560000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/3160-105-0x000002359E170000-0x000002359E190000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/3160-108-0x000002359E130000-0x000002359E150000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/3168-205-0x00000000049C0000-0x00000000049C1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/3532-288-0x00000244A4B00000-0x00000244A4B20000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/3532-287-0x00000244A44F0000-0x00000244A4510000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/3532-282-0x00000244A4530000-0x00000244A4550000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/4124-13-0x00000000042D0000-0x00000000042D1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/4136-263-0x0000024ECC700000-0x0000024ECC720000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/4136-261-0x0000024ECBFB0000-0x0000024ECBFD0000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/4136-259-0x0000024ECC300000-0x0000024ECC320000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/4280-165-0x0000000004E80000-0x0000000004E81000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/4492-97-0x0000000004AD0000-0x0000000004AD1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/4880-143-0x0000000004570000-0x0000000004571000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/4892-218-0x000001F64C120000-0x000001F64C140000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/4892-216-0x000001F64BD20000-0x000001F64BD40000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/4892-213-0x000001F64BD60000-0x000001F64BD80000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/4908-156-0x000001A0A89E0000-0x000001A0A8A00000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/4908-154-0x000001A0A83D0000-0x000001A0A83F0000-memory.dmp

                                                                              Filesize

                                                                              128KB

                                                                            • memory/4908-151-0x000001A0A8620000-0x000001A0A8640000-memory.dmp

                                                                              Filesize

                                                                              128KB