Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    62s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231025-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/11/2023, 22:07

General

  • Target

    e717697078ba05c6e1bfc6c4f78ea129e0bf47bba53923f497597d2910661f4b.exe

  • Size

    2.6MB

  • MD5

    3aa6a5f20235719d8961de7400c58729

  • SHA1

    4c7c165312a90a00a773c1aeff18d61de5ebbf51

  • SHA256

    e717697078ba05c6e1bfc6c4f78ea129e0bf47bba53923f497597d2910661f4b

  • SHA512

    cdd93ce07c0cc699dc18c57b99786387949fddfad60a1af5a53c3124447ed68fb4237fb8973cc4d78fc0085e714aad45e3407ab5c8c0914f6b3aff8e50af9a77

  • SSDEEP

    49152:D7TvfU+8X9GrNOsva5RbKhF3ANkTTl86zWyN8Ps8Oa3vo:Q+8X9G3vP3AMW6Ky8b73g

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 6 IoCs
  • Enumerates connected drives 3 TTPs 12 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e717697078ba05c6e1bfc6c4f78ea129e0bf47bba53923f497597d2910661f4b.exe
    "C:\Users\Admin\AppData\Local\Temp\e717697078ba05c6e1bfc6c4f78ea129e0bf47bba53923f497597d2910661f4b.exe"
    1⤵
      PID:4820
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1396
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:768
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3316
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:3228
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3212
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies Installed Components in the registry
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of SendNotifyMessage
      PID:3504
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
        PID:3440
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:4028
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
          PID:3428
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
          • Suspicious use of SetWindowsHookEx
          PID:336
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:3140
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
          • Modifies Installed Components in the registry
          • Enumerates connected drives
          • Checks SCSI registry key(s)
          • Modifies registry class
          PID:1240
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          PID:888
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
            PID:2572
          • C:\Windows\explorer.exe
            explorer.exe
            1⤵
              PID:3428
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
                PID:3108
              • C:\Windows\explorer.exe
                explorer.exe
                1⤵
                • Modifies Installed Components in the registry
                • Enumerates connected drives
                • Checks SCSI registry key(s)
                • Modifies registry class
                PID:4844
              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                1⤵
                • Suspicious use of SetWindowsHookEx
                PID:3720
              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                1⤵
                  PID:3980
                • C:\Windows\explorer.exe
                  explorer.exe
                  1⤵
                    PID:456
                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                    1⤵
                      PID:384
                    • C:\Windows\explorer.exe
                      explorer.exe
                      1⤵
                      • Modifies registry class
                      • Suspicious use of SetWindowsHookEx
                      PID:3108
                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                      1⤵
                        PID:1332
                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                        1⤵
                          PID:2660
                        • C:\Windows\explorer.exe
                          explorer.exe
                          1⤵
                            PID:3276
                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                            1⤵
                              PID:4364
                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                              1⤵
                                PID:536
                              • C:\Windows\explorer.exe
                                explorer.exe
                                1⤵
                                  PID:1072
                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                  1⤵
                                    PID:4092
                                  • C:\Windows\explorer.exe
                                    explorer.exe
                                    1⤵
                                      PID:4272
                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                      1⤵
                                        PID:220
                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                        1⤵
                                          PID:3744
                                        • C:\Windows\explorer.exe
                                          explorer.exe
                                          1⤵
                                            PID:2828
                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                            1⤵
                                              PID:3568
                                            • C:\Windows\explorer.exe
                                              explorer.exe
                                              1⤵
                                                PID:2768
                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                1⤵
                                                  PID:2876
                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                  1⤵
                                                    PID:4512
                                                  • C:\Windows\explorer.exe
                                                    explorer.exe
                                                    1⤵
                                                      PID:4912
                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                      1⤵
                                                        PID:4836
                                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                        1⤵
                                                          PID:3564
                                                        • C:\Windows\explorer.exe
                                                          explorer.exe
                                                          1⤵
                                                            PID:2228
                                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                            1⤵
                                                              PID:3260
                                                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                              1⤵
                                                                PID:4404
                                                              • C:\Windows\explorer.exe
                                                                explorer.exe
                                                                1⤵
                                                                  PID:3896
                                                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                  1⤵
                                                                    PID:3276
                                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                    1⤵
                                                                      PID:4140
                                                                    • C:\Windows\explorer.exe
                                                                      explorer.exe
                                                                      1⤵
                                                                        PID:1068

                                                                      Network

                                                                      MITRE ATT&CK Enterprise v15

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                                        Filesize

                                                                        471B

                                                                        MD5

                                                                        a854c577fd52d32726cd2d82a6c402d1

                                                                        SHA1

                                                                        c59c412b0c8feb244b3d63a6c83ed673551f82b0

                                                                        SHA256

                                                                        e15768dcef473e64864fb1c91620f3511054ba63324e39878b69471528622fd8

                                                                        SHA512

                                                                        2bbf87fee4289714fe353fbae8c5f1952492ffc27fc0e060a5fc245d2a0221853e0614107231bb787f5642e2214bc95495a4cb95566b0bdadba96468423e5413

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53

                                                                        Filesize

                                                                        412B

                                                                        MD5

                                                                        3c4eeff38066f2507643fb1836bf7a12

                                                                        SHA1

                                                                        51dbe21504f817d744a2feac16d4f515c1c73b03

                                                                        SHA256

                                                                        6874c3804417261e27b813c1ace4603736ce86684ade0f02a198650606830968

                                                                        SHA512

                                                                        941a4f964c45291f8815eb21e59a2174e357612f8884366a8976bc9e88a52acf41a8ba90c88d1338f8d9015576705c8a66c050ba18958351b898ddf93ce8bb59

                                                                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TERA0QIF\microsoft.windows[1].xml

                                                                        Filesize

                                                                        97B

                                                                        MD5

                                                                        8d6e57645a3894c78fedfd96931fb799

                                                                        SHA1

                                                                        8fa46e487e762948f191626bc0e39bdf52b4a367

                                                                        SHA256

                                                                        9dceae2923a4265b821c1e66e634f7ad1a2ad12e0f1e41effcc8662aa1980f24

                                                                        SHA512

                                                                        14947e39d023e6e94d6ddfbf2ee971f37ac4ff96a0faa6b3d069b9cc07f6452e99c54f4edfdccbf0c4013a2c9827db200d2cae3ec6e509044c507b6b653fdd59

                                                                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        a2b88dc1762755d42c7d3ebe460f7284

                                                                        SHA1

                                                                        ae8e8477d516686f89142c74948a3c2f924d603a

                                                                        SHA256

                                                                        9b6a4367ab87fcd394cfef44df024543248546a34dec4f5f039b425f5ad147f0

                                                                        SHA512

                                                                        9f01d86fce3b331bd1ef9ed6b5ee3184fe4b7c11d48476574dcd96bd8d3341d0d6cb228abfd39e784a5aa46c517c4b2ede59a02380b7b7b72ec23fa04664fa62

                                                                      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TERA0QIF\microsoft.windows[1].xml

                                                                        Filesize

                                                                        97B

                                                                        MD5

                                                                        8d6e57645a3894c78fedfd96931fb799

                                                                        SHA1

                                                                        8fa46e487e762948f191626bc0e39bdf52b4a367

                                                                        SHA256

                                                                        9dceae2923a4265b821c1e66e634f7ad1a2ad12e0f1e41effcc8662aa1980f24

                                                                        SHA512

                                                                        14947e39d023e6e94d6ddfbf2ee971f37ac4ff96a0faa6b3d069b9cc07f6452e99c54f4edfdccbf0c4013a2c9827db200d2cae3ec6e509044c507b6b653fdd59

                                                                      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TERA0QIF\microsoft.windows[1].xml

                                                                        Filesize

                                                                        97B

                                                                        MD5

                                                                        8d6e57645a3894c78fedfd96931fb799

                                                                        SHA1

                                                                        8fa46e487e762948f191626bc0e39bdf52b4a367

                                                                        SHA256

                                                                        9dceae2923a4265b821c1e66e634f7ad1a2ad12e0f1e41effcc8662aa1980f24

                                                                        SHA512

                                                                        14947e39d023e6e94d6ddfbf2ee971f37ac4ff96a0faa6b3d069b9cc07f6452e99c54f4edfdccbf0c4013a2c9827db200d2cae3ec6e509044c507b6b653fdd59

                                                                      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TERA0QIF\microsoft.windows[1].xml

                                                                        Filesize

                                                                        97B

                                                                        MD5

                                                                        8d6e57645a3894c78fedfd96931fb799

                                                                        SHA1

                                                                        8fa46e487e762948f191626bc0e39bdf52b4a367

                                                                        SHA256

                                                                        9dceae2923a4265b821c1e66e634f7ad1a2ad12e0f1e41effcc8662aa1980f24

                                                                        SHA512

                                                                        14947e39d023e6e94d6ddfbf2ee971f37ac4ff96a0faa6b3d069b9cc07f6452e99c54f4edfdccbf0c4013a2c9827db200d2cae3ec6e509044c507b6b653fdd59

                                                                      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TERA0QIF\microsoft.windows[1].xml

                                                                        Filesize

                                                                        97B

                                                                        MD5

                                                                        8d6e57645a3894c78fedfd96931fb799

                                                                        SHA1

                                                                        8fa46e487e762948f191626bc0e39bdf52b4a367

                                                                        SHA256

                                                                        9dceae2923a4265b821c1e66e634f7ad1a2ad12e0f1e41effcc8662aa1980f24

                                                                        SHA512

                                                                        14947e39d023e6e94d6ddfbf2ee971f37ac4ff96a0faa6b3d069b9cc07f6452e99c54f4edfdccbf0c4013a2c9827db200d2cae3ec6e509044c507b6b653fdd59

                                                                      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TERA0QIF\microsoft.windows[1].xml

                                                                        Filesize

                                                                        97B

                                                                        MD5

                                                                        8d6e57645a3894c78fedfd96931fb799

                                                                        SHA1

                                                                        8fa46e487e762948f191626bc0e39bdf52b4a367

                                                                        SHA256

                                                                        9dceae2923a4265b821c1e66e634f7ad1a2ad12e0f1e41effcc8662aa1980f24

                                                                        SHA512

                                                                        14947e39d023e6e94d6ddfbf2ee971f37ac4ff96a0faa6b3d069b9cc07f6452e99c54f4edfdccbf0c4013a2c9827db200d2cae3ec6e509044c507b6b653fdd59

                                                                      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TERA0QIF\microsoft.windows[1].xml

                                                                        Filesize

                                                                        97B

                                                                        MD5

                                                                        8d6e57645a3894c78fedfd96931fb799

                                                                        SHA1

                                                                        8fa46e487e762948f191626bc0e39bdf52b4a367

                                                                        SHA256

                                                                        9dceae2923a4265b821c1e66e634f7ad1a2ad12e0f1e41effcc8662aa1980f24

                                                                        SHA512

                                                                        14947e39d023e6e94d6ddfbf2ee971f37ac4ff96a0faa6b3d069b9cc07f6452e99c54f4edfdccbf0c4013a2c9827db200d2cae3ec6e509044c507b6b653fdd59

                                                                      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TERA0QIF\microsoft.windows[1].xml

                                                                        Filesize

                                                                        97B

                                                                        MD5

                                                                        8d6e57645a3894c78fedfd96931fb799

                                                                        SHA1

                                                                        8fa46e487e762948f191626bc0e39bdf52b4a367

                                                                        SHA256

                                                                        9dceae2923a4265b821c1e66e634f7ad1a2ad12e0f1e41effcc8662aa1980f24

                                                                        SHA512

                                                                        14947e39d023e6e94d6ddfbf2ee971f37ac4ff96a0faa6b3d069b9cc07f6452e99c54f4edfdccbf0c4013a2c9827db200d2cae3ec6e509044c507b6b653fdd59

                                                                      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TERA0QIF\microsoft.windows[1].xml

                                                                        Filesize

                                                                        97B

                                                                        MD5

                                                                        8d6e57645a3894c78fedfd96931fb799

                                                                        SHA1

                                                                        8fa46e487e762948f191626bc0e39bdf52b4a367

                                                                        SHA256

                                                                        9dceae2923a4265b821c1e66e634f7ad1a2ad12e0f1e41effcc8662aa1980f24

                                                                        SHA512

                                                                        14947e39d023e6e94d6ddfbf2ee971f37ac4ff96a0faa6b3d069b9cc07f6452e99c54f4edfdccbf0c4013a2c9827db200d2cae3ec6e509044c507b6b653fdd59

                                                                      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TERA0QIF\microsoft.windows[1].xml

                                                                        Filesize

                                                                        97B

                                                                        MD5

                                                                        8d6e57645a3894c78fedfd96931fb799

                                                                        SHA1

                                                                        8fa46e487e762948f191626bc0e39bdf52b4a367

                                                                        SHA256

                                                                        9dceae2923a4265b821c1e66e634f7ad1a2ad12e0f1e41effcc8662aa1980f24

                                                                        SHA512

                                                                        14947e39d023e6e94d6ddfbf2ee971f37ac4ff96a0faa6b3d069b9cc07f6452e99c54f4edfdccbf0c4013a2c9827db200d2cae3ec6e509044c507b6b653fdd59

                                                                      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\TERA0QIF\microsoft.windows[1].xml

                                                                        Filesize

                                                                        97B

                                                                        MD5

                                                                        8d6e57645a3894c78fedfd96931fb799

                                                                        SHA1

                                                                        8fa46e487e762948f191626bc0e39bdf52b4a367

                                                                        SHA256

                                                                        9dceae2923a4265b821c1e66e634f7ad1a2ad12e0f1e41effcc8662aa1980f24

                                                                        SHA512

                                                                        14947e39d023e6e94d6ddfbf2ee971f37ac4ff96a0faa6b3d069b9cc07f6452e99c54f4edfdccbf0c4013a2c9827db200d2cae3ec6e509044c507b6b653fdd59

                                                                      • memory/536-155-0x000001E86B370000-0x000001E86B390000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/536-157-0x000001E86B330000-0x000001E86B350000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/536-159-0x000001E86B740000-0x000001E86B760000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/1240-75-0x0000000004C30000-0x0000000004C31000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/2228-240-0x00000000044F0000-0x00000000044F1000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/2572-83-0x0000025D4EB60000-0x0000025D4EB80000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/2572-85-0x0000025D4EB20000-0x0000025D4EB40000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/2572-87-0x0000025D4EF20000-0x0000025D4EF40000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/2660-137-0x000001B30A860000-0x000001B30A880000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/2660-135-0x000001B30A3C0000-0x000001B30A3E0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/2660-132-0x000001B30A400000-0x000001B30A420000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/2768-195-0x0000000004A40000-0x0000000004A41000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/3108-124-0x00000000049D0000-0x00000000049D1000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/3140-60-0x0000015A50620000-0x0000015A50640000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/3140-67-0x0000015A509F0000-0x0000015A50A10000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/3140-63-0x0000015A503E0000-0x0000015A50400000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/3212-19-0x00000221AFE10000-0x00000221AFE30000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/3212-14-0x00000221AFA40000-0x00000221AFA60000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/3212-16-0x00000221AFA00000-0x00000221AFA20000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/3276-147-0x0000000004BE0000-0x0000000004BE1000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/3316-7-0x0000000004490000-0x0000000004491000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/3428-53-0x00000000041D0000-0x00000000041D1000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/3504-30-0x00000000026D0000-0x00000000026D1000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/3564-232-0x00000222BFC70000-0x00000222BFC90000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/3564-229-0x00000222BF860000-0x00000222BF880000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/3564-225-0x00000222BF8A0000-0x00000222BF8C0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/3744-181-0x0000016276B10000-0x0000016276B30000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/3744-184-0x0000016276F20000-0x0000016276F40000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/3744-179-0x0000016276B50000-0x0000016276B70000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/3980-107-0x000001B616320000-0x000001B616340000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/3980-113-0x000001B6166E0000-0x000001B616700000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/3980-110-0x000001B615FD0000-0x000001B615FF0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4028-43-0x0000025DBF040000-0x0000025DBF060000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4028-37-0x0000025DBEC70000-0x0000025DBEC90000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4028-40-0x0000025DBEC30000-0x0000025DBEC50000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4272-171-0x0000000004700000-0x0000000004701000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/4404-252-0x000001E7EDB00000-0x000001E7EDB20000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4404-250-0x000001E7ED470000-0x000001E7ED490000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4404-248-0x000001E7ED4B0000-0x000001E7ED4D0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4512-202-0x00000276E6020000-0x00000276E6040000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4512-206-0x00000276E63E0000-0x00000276E6400000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4512-204-0x00000276E5DD0000-0x00000276E5DF0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4844-100-0x0000000004850000-0x0000000004851000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/4912-218-0x0000000003FD0000-0x0000000003FD1000-memory.dmp

                                                                        Filesize

                                                                        4KB