Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    64s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/10/2023, 17:58

General

  • Target

    17b8295b03689991e52044d96a1be2cb9886b496e0bcc6bdad93a90edbc75d6d.exe

  • Size

    3.3MB

  • MD5

    117c1c9afbad622faf68d2b16c502e28

  • SHA1

    157eb74909865cdb613d1e2ba8969c61635b383c

  • SHA256

    17b8295b03689991e52044d96a1be2cb9886b496e0bcc6bdad93a90edbc75d6d

  • SHA512

    ba523dea8264763fd1cfc52d3e1e33b241e4bb042deec33f3975fa3ff870dbe9840d828f3059fcf727ea891b76beebdaa149389d54699dbb03f1d9d3d2d6cfaf

  • SSDEEP

    49152:H7TvfU+8X9GrNOsva5RbKhF3ANkTTlll8jSxdd7sHw1+IYcoJiMdqueCzVos:c+8X9G3vP3AM3lgSxdd7sHo9owapeu7

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 9 IoCs
  • Enumerates connected drives 3 TTPs 16 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\17b8295b03689991e52044d96a1be2cb9886b496e0bcc6bdad93a90edbc75d6d.exe
    "C:\Users\Admin\AppData\Local\Temp\17b8295b03689991e52044d96a1be2cb9886b496e0bcc6bdad93a90edbc75d6d.exe"
    1⤵
      PID:1460
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4112
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4260
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1772
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:3328
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1144
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:4916
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1580
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of SendNotifyMessage
      PID:3660
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2192
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of SendNotifyMessage
      PID:5104
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:208
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4932
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:4036
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:1344
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:3188
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:748
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:3792
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2324
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Modifies registry class
      PID:2488
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
        PID:2068
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
          PID:2520
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
            PID:1944
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
              PID:4464
            • C:\Windows\explorer.exe
              explorer.exe
              1⤵
                PID:1808
              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                1⤵
                  PID:3152
                • C:\Windows\explorer.exe
                  explorer.exe
                  1⤵
                    PID:2912
                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                    1⤵
                      PID:4836
                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                      1⤵
                        PID:3136
                      • C:\Windows\explorer.exe
                        explorer.exe
                        1⤵
                          PID:1280
                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                          1⤵
                            PID:3640
                          • C:\Windows\explorer.exe
                            explorer.exe
                            1⤵
                              PID:2012
                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                              1⤵
                                PID:4868
                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                1⤵
                                  PID:3280
                                • C:\Windows\explorer.exe
                                  explorer.exe
                                  1⤵
                                    PID:3700
                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                    1⤵
                                      PID:1912
                                    • C:\Windows\explorer.exe
                                      explorer.exe
                                      1⤵
                                        PID:488
                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                        1⤵
                                          PID:3380
                                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                          1⤵
                                            PID:4308
                                          • C:\Windows\explorer.exe
                                            explorer.exe
                                            1⤵
                                              PID:4064
                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                              1⤵
                                                PID:816
                                              • C:\Windows\explorer.exe
                                                explorer.exe
                                                1⤵
                                                  PID:2152
                                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                  1⤵
                                                    PID:4612
                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                    1⤵
                                                      PID:4444
                                                    • C:\Windows\explorer.exe
                                                      explorer.exe
                                                      1⤵
                                                        PID:2760
                                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                        1⤵
                                                          PID:4660
                                                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                          1⤵
                                                            PID:3224
                                                          • C:\Windows\explorer.exe
                                                            explorer.exe
                                                            1⤵
                                                              PID:4532
                                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                              1⤵
                                                                PID:1044
                                                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                1⤵
                                                                  PID:1244
                                                                • C:\Windows\explorer.exe
                                                                  explorer.exe
                                                                  1⤵
                                                                    PID:2164
                                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                    1⤵
                                                                      PID:3928
                                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                      1⤵
                                                                        PID:840
                                                                      • C:\Windows\explorer.exe
                                                                        explorer.exe
                                                                        1⤵
                                                                          PID:648
                                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                          1⤵
                                                                            PID:3140

                                                                          Network

                                                                          MITRE ATT&CK Enterprise v15

                                                                          Replay Monitor

                                                                          Loading Replay Monitor...

                                                                          Downloads

                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                                            Filesize

                                                                            471B

                                                                            MD5

                                                                            ecc3c9de4f6c2909d80c9a355c58a995

                                                                            SHA1

                                                                            205eb3c15c1e0338dee194e6b3de88fc61e8a503

                                                                            SHA256

                                                                            2d8dd41275cee7e1fc715eaab2e020c74e4d4640c5c7b25db31aa3a98519b966

                                                                            SHA512

                                                                            1e7138e5770573cf06796ffdd1811d9978c9d43dbfae2250c69b79b6a3b5d51b0f7e1e4c9fca5105629454586164e2c52b9624dbde93e21ebb69694a18a3bbd3

                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                                            Filesize

                                                                            412B

                                                                            MD5

                                                                            e9f66d9ce6f99e1ec13061f16e93402d

                                                                            SHA1

                                                                            4c708833352ba18f1d787ead5fdd7405361e0ccb

                                                                            SHA256

                                                                            3a04be1d46429713e98d37ed11523b95ea8f0b6bbbd44074e0d13adbf8872265

                                                                            SHA512

                                                                            de46efb0fd00fecdcba646884fa8258b78535fafd90b7c0fa2cd9c638301fbbb7042b9da862501ac39e6be157f1fe6d2544b25480923d60dfea83015ac98bcf5

                                                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\46IOJ2Y1\microsoft.windows[1].xml

                                                                            Filesize

                                                                            96B

                                                                            MD5

                                                                            132893809ee21f6cc9bd8398d163fde8

                                                                            SHA1

                                                                            664b895e0f6ae4f8ed96f36dee355d4e554b29eb

                                                                            SHA256

                                                                            af9f28768de7e7f0f21d52b63003adb8fa1b563ab8e4a38bf361a7f51aa8d8d2

                                                                            SHA512

                                                                            a540b8cddd2684bf6d11480bc23200200414984b4520842db541e07021520fb6cf356492b7e2517cdd53718f4a8b6002d5268db4c085b5d1ab6ed3cc1973caa8

                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\46IOJ2Y1\microsoft.windows[1].xml

                                                                            Filesize

                                                                            96B

                                                                            MD5

                                                                            132893809ee21f6cc9bd8398d163fde8

                                                                            SHA1

                                                                            664b895e0f6ae4f8ed96f36dee355d4e554b29eb

                                                                            SHA256

                                                                            af9f28768de7e7f0f21d52b63003adb8fa1b563ab8e4a38bf361a7f51aa8d8d2

                                                                            SHA512

                                                                            a540b8cddd2684bf6d11480bc23200200414984b4520842db541e07021520fb6cf356492b7e2517cdd53718f4a8b6002d5268db4c085b5d1ab6ed3cc1973caa8

                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\46IOJ2Y1\microsoft.windows[1].xml

                                                                            Filesize

                                                                            96B

                                                                            MD5

                                                                            132893809ee21f6cc9bd8398d163fde8

                                                                            SHA1

                                                                            664b895e0f6ae4f8ed96f36dee355d4e554b29eb

                                                                            SHA256

                                                                            af9f28768de7e7f0f21d52b63003adb8fa1b563ab8e4a38bf361a7f51aa8d8d2

                                                                            SHA512

                                                                            a540b8cddd2684bf6d11480bc23200200414984b4520842db541e07021520fb6cf356492b7e2517cdd53718f4a8b6002d5268db4c085b5d1ab6ed3cc1973caa8

                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\46IOJ2Y1\microsoft.windows[1].xml

                                                                            Filesize

                                                                            96B

                                                                            MD5

                                                                            132893809ee21f6cc9bd8398d163fde8

                                                                            SHA1

                                                                            664b895e0f6ae4f8ed96f36dee355d4e554b29eb

                                                                            SHA256

                                                                            af9f28768de7e7f0f21d52b63003adb8fa1b563ab8e4a38bf361a7f51aa8d8d2

                                                                            SHA512

                                                                            a540b8cddd2684bf6d11480bc23200200414984b4520842db541e07021520fb6cf356492b7e2517cdd53718f4a8b6002d5268db4c085b5d1ab6ed3cc1973caa8

                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\46IOJ2Y1\microsoft.windows[1].xml

                                                                            Filesize

                                                                            96B

                                                                            MD5

                                                                            132893809ee21f6cc9bd8398d163fde8

                                                                            SHA1

                                                                            664b895e0f6ae4f8ed96f36dee355d4e554b29eb

                                                                            SHA256

                                                                            af9f28768de7e7f0f21d52b63003adb8fa1b563ab8e4a38bf361a7f51aa8d8d2

                                                                            SHA512

                                                                            a540b8cddd2684bf6d11480bc23200200414984b4520842db541e07021520fb6cf356492b7e2517cdd53718f4a8b6002d5268db4c085b5d1ab6ed3cc1973caa8

                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\46IOJ2Y1\microsoft.windows[1].xml

                                                                            Filesize

                                                                            96B

                                                                            MD5

                                                                            132893809ee21f6cc9bd8398d163fde8

                                                                            SHA1

                                                                            664b895e0f6ae4f8ed96f36dee355d4e554b29eb

                                                                            SHA256

                                                                            af9f28768de7e7f0f21d52b63003adb8fa1b563ab8e4a38bf361a7f51aa8d8d2

                                                                            SHA512

                                                                            a540b8cddd2684bf6d11480bc23200200414984b4520842db541e07021520fb6cf356492b7e2517cdd53718f4a8b6002d5268db4c085b5d1ab6ed3cc1973caa8

                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\46IOJ2Y1\microsoft.windows[1].xml

                                                                            Filesize

                                                                            96B

                                                                            MD5

                                                                            132893809ee21f6cc9bd8398d163fde8

                                                                            SHA1

                                                                            664b895e0f6ae4f8ed96f36dee355d4e554b29eb

                                                                            SHA256

                                                                            af9f28768de7e7f0f21d52b63003adb8fa1b563ab8e4a38bf361a7f51aa8d8d2

                                                                            SHA512

                                                                            a540b8cddd2684bf6d11480bc23200200414984b4520842db541e07021520fb6cf356492b7e2517cdd53718f4a8b6002d5268db4c085b5d1ab6ed3cc1973caa8

                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\46IOJ2Y1\microsoft.windows[1].xml

                                                                            Filesize

                                                                            96B

                                                                            MD5

                                                                            132893809ee21f6cc9bd8398d163fde8

                                                                            SHA1

                                                                            664b895e0f6ae4f8ed96f36dee355d4e554b29eb

                                                                            SHA256

                                                                            af9f28768de7e7f0f21d52b63003adb8fa1b563ab8e4a38bf361a7f51aa8d8d2

                                                                            SHA512

                                                                            a540b8cddd2684bf6d11480bc23200200414984b4520842db541e07021520fb6cf356492b7e2517cdd53718f4a8b6002d5268db4c085b5d1ab6ed3cc1973caa8

                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\46IOJ2Y1\microsoft.windows[1].xml

                                                                            Filesize

                                                                            96B

                                                                            MD5

                                                                            132893809ee21f6cc9bd8398d163fde8

                                                                            SHA1

                                                                            664b895e0f6ae4f8ed96f36dee355d4e554b29eb

                                                                            SHA256

                                                                            af9f28768de7e7f0f21d52b63003adb8fa1b563ab8e4a38bf361a7f51aa8d8d2

                                                                            SHA512

                                                                            a540b8cddd2684bf6d11480bc23200200414984b4520842db541e07021520fb6cf356492b7e2517cdd53718f4a8b6002d5268db4c085b5d1ab6ed3cc1973caa8

                                                                          • memory/488-107-0x0000000002330000-0x0000000002331000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/840-214-0x00000273CEE80000-0x00000273CEEA0000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/840-211-0x00000273CE7E0000-0x00000273CE800000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/840-209-0x00000273CEA20000-0x00000273CEA40000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/1144-10-0x00000000045E0000-0x00000000045E1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/1244-190-0x0000026424D00000-0x0000026424D20000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/1244-193-0x0000026425110000-0x0000026425130000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/1244-186-0x0000026424D40000-0x0000026424D60000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/1580-17-0x000002C7923F0000-0x000002C792410000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/1580-19-0x000002C7923B0000-0x000002C7923D0000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/1580-22-0x000002C7927C0000-0x000002C7927E0000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/2152-131-0x0000000004DD0000-0x0000000004DD1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/2164-201-0x0000000004A70000-0x0000000004A71000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/2520-60-0x00000000040C0000-0x00000000040C1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/2760-156-0x00000000048A0000-0x00000000048A1000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/2912-84-0x0000000004630000-0x0000000004631000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/3136-99-0x000001A45E4A0000-0x000001A45E4C0000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/3136-95-0x000001A45DE80000-0x000001A45DEA0000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/3136-92-0x000001A45DEC0000-0x000001A45DEE0000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/3224-167-0x000002686D4A0000-0x000002686D4C0000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/3224-165-0x000002686D090000-0x000002686D0B0000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/3224-163-0x000002686D0D0000-0x000002686D0F0000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/4308-119-0x0000021C5C7F0000-0x0000021C5C810000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/4308-117-0x0000021C5C1E0000-0x0000021C5C200000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/4308-115-0x0000021C5C420000-0x0000021C5C440000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/4444-141-0x0000020046FE0000-0x0000020047000000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/4444-139-0x0000020047220000-0x0000020047240000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/4444-144-0x00000200475F0000-0x0000020047610000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/4464-68-0x000001B190530000-0x000001B190550000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/4464-73-0x000001B190B00000-0x000001B190B20000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/4464-70-0x000001B1904F0000-0x000001B190510000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/4532-178-0x0000000004220000-0x0000000004221000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/4932-45-0x00000247058B0000-0x00000247058D0000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/4932-43-0x00000247051A0000-0x00000247051C0000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/4932-41-0x00000247051E0000-0x0000024705200000-memory.dmp

                                                                            Filesize

                                                                            128KB

                                                                          • memory/5104-33-0x0000000004AB0000-0x0000000004AB1000-memory.dmp

                                                                            Filesize

                                                                            4KB