Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/02/2024, 06:22
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://klauncher.gg/?ysclid=lsyducbjcz394967555
Resource
win11-20240221-en
General
-
Target
https://klauncher.gg/?ysclid=lsyducbjcz394967555
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3594324687-1993884830-4019639329-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 223845.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2928 msedge.exe 2928 msedge.exe 4860 msedge.exe 4860 msedge.exe 3076 identity_helper.exe 3076 identity_helper.exe 1888 msedge.exe 1888 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of FindShellTrayWindow 43 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe 4860 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4212 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4860 wrote to memory of 424 4860 msedge.exe 79 PID 4860 wrote to memory of 424 4860 msedge.exe 79 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 3368 4860 msedge.exe 80 PID 4860 wrote to memory of 2928 4860 msedge.exe 81 PID 4860 wrote to memory of 2928 4860 msedge.exe 81 PID 4860 wrote to memory of 2740 4860 msedge.exe 82 PID 4860 wrote to memory of 2740 4860 msedge.exe 82 PID 4860 wrote to memory of 2740 4860 msedge.exe 82 PID 4860 wrote to memory of 2740 4860 msedge.exe 82 PID 4860 wrote to memory of 2740 4860 msedge.exe 82 PID 4860 wrote to memory of 2740 4860 msedge.exe 82 PID 4860 wrote to memory of 2740 4860 msedge.exe 82 PID 4860 wrote to memory of 2740 4860 msedge.exe 82 PID 4860 wrote to memory of 2740 4860 msedge.exe 82 PID 4860 wrote to memory of 2740 4860 msedge.exe 82 PID 4860 wrote to memory of 2740 4860 msedge.exe 82 PID 4860 wrote to memory of 2740 4860 msedge.exe 82 PID 4860 wrote to memory of 2740 4860 msedge.exe 82 PID 4860 wrote to memory of 2740 4860 msedge.exe 82 PID 4860 wrote to memory of 2740 4860 msedge.exe 82 PID 4860 wrote to memory of 2740 4860 msedge.exe 82 PID 4860 wrote to memory of 2740 4860 msedge.exe 82 PID 4860 wrote to memory of 2740 4860 msedge.exe 82 PID 4860 wrote to memory of 2740 4860 msedge.exe 82 PID 4860 wrote to memory of 2740 4860 msedge.exe 82
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://klauncher.gg/?ysclid=lsyducbjcz3949675551⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb82f03cb8,0x7ffb82f03cc8,0x7ffb82f03cd82⤵PID:424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,7343566788929225734,1292132316301607500,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:22⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,7343566788929225734,1292132316301607500,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,7343566788929225734,1292132316301607500,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,7343566788929225734,1292132316301607500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,7343566788929225734,1292132316301607500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,7343566788929225734,1292132316301607500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4552 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,7343566788929225734,1292132316301607500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,7343566788929225734,1292132316301607500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,7343566788929225734,1292132316301607500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,7343566788929225734,1292132316301607500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:12⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,7343566788929225734,1292132316301607500,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1916,7343566788929225734,1292132316301607500,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4868 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,7343566788929225734,1292132316301607500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,7343566788929225734,1292132316301607500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2764 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,7343566788929225734,1292132316301607500,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2656 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,7343566788929225734,1292132316301607500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,7343566788929225734,1292132316301607500,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,7343566788929225734,1292132316301607500,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1396 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1916,7343566788929225734,1292132316301607500,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6692 /prefetch:82⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,7343566788929225734,1292132316301607500,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6204 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1672
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2240
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2668
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c65e704fc47bc3d9d2c45a244bb74d76
SHA13e7917feebea866e0909e089e0b976b4a0947a6e
SHA2562e5d6a5eeb72575f974d5fa3cdff7ad4d87a361399ffdd4b03f93cdbdec3a110
SHA51236c3be0e5fbc23c5c0ad2e14cfb1cf7913bea9a5aeb83f9f6fcf5dbc52a94d8ccb370cef723b0cda82b5fba1941b6a9ff57f77ff0076a2c5cf4250711e3dd909
-
Filesize
152B
MD55c3ea95e17becd26086dd59ba83b8e84
SHA17943b2a84dcf26240afc77459ffaaf269bfef29f
SHA256a241c88bb86182b5998d9818e6e054d29b201b53f4f1a6b9b2ee8ba22dd238dc
SHA51264c905e923298528783dc64450c96390dc5edbda51f553c04d88ee944b0c660b05392dc0c823d7fb47f604b04061390b285f982dfcc767c8168ccb00d7e94e21
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize840B
MD5fee267559423de85c60d1817ba376aae
SHA1b2d899b834604f5aef33d896a1fa34d2b8c67b06
SHA256649753d553b465da559b7995843811af6cb202fd2e45e3a7dbcf821c5a29300a
SHA512411af32ab7f4a2bf8e11ebcff225f7ea17c49b3d0c040df3a03ac8b89bb33a5b29c13584c4096b1208164d98a526cf2578962db8841b52e7f7154b951e4d8fc5
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\File System\001\t\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
2KB
MD5baf045618e0c1f3935c9266e16b43537
SHA18ce65a86d157bdfe480585467e204f2580f1c7dc
SHA256243b725d85f4271683a1e628018ef2230a861f0bbdd2b5465e53662ae2d3f229
SHA5124772da501e49efb4899d12ee77f1efcce925ca16d0f8f144b9d89c235acf02f5e7dbaeea3989d6e07f236339b421ec3eff85de56d8fae07af8e3c7ec3b9d567f
-
Filesize
6KB
MD546f3d86309432969ea260b9152b53239
SHA199c07238c3a9a4435aa0149de1ad0ca4df584370
SHA2561ab83ee1d539aaf7c2428bb2733f1af408de7d71217c98e47a4f4d14995a52ee
SHA512b77715d0185a6fa97de1edb14d03fbcf1a52778e37e89adb7b4eec053d8540e066fd27264b05ec05d4dc70871cc40344fec2b374ca111cdb2164fd7fab1a6a21
-
Filesize
7KB
MD592ddcbe144fe4d6aaa81bb8ce59ade40
SHA1a8a4a3e5686f1dfd7769e53383852770da2ac1b7
SHA256b11ac6b6cf7376f7d72a179f54fca88d50abe301062e53b1e31f3be01cf42424
SHA512261b7664e92741ad570510d723edb807d4b070eff1779ee865e497443e07ad4820b043df8275b5673f12aa35e64ecdeac5a8db7164ec664b1d7635b34f838dc8
-
Filesize
6KB
MD579962569d3d5e0ff5d4dd394aa6e091a
SHA1ee2c170f9a87d42eba16ccd041715fb6a47f9206
SHA2560dbe1526d4043ea53f6c5cf5849ed8c80f1f2a5c5eee285348681301e00b81d5
SHA512dd87467bfe5cb255168db2c795c544d2f2f87414ce7f5a9dc0e4bd09e3d2619592f1126af1c74662650068cfb31ff832c6a1536026f73f84ea33dfee2722400a
-
Filesize
1KB
MD5960fc52688e1263708f976ed72df8e2e
SHA1a62294e486d09170312fb3dde5c3f81b5e17af64
SHA2565c98fd607427c073f7ef9941cd1cf3bceda905f040aa4d560a758cc692ac4777
SHA5128940679107adced88ec2f77c994f371bb83d2c73f6e82053cd71ed3407ee15cea3edd61df951b1bd18e2b5d9d48f48e9aaef8ef2e3db765e9b6871972ac431f4
-
Filesize
1KB
MD54acf9f000e240753a837b9f7f601928f
SHA1fdebd440b106e2ab628ca1d73fb394a6e1580cf0
SHA256616c8d7029cd3d5ee7fdc70b032513a7b0e2f3dec3a502e3a3e340f315e64c6c
SHA512aa776989f54040a4f3dd2a28529ee80300e54a9c78f08bb8e657618d9c8971f6c8a818983d8eab19de2b510f4f0a0d9d4d5c26c7509e25ca6a318265ccda409f
-
Filesize
1KB
MD59f28bff9cbc9ec6e9db7d30f5f67589b
SHA1270d79be73f6f4dcec7557a60a86471274ae5ad6
SHA256298ba2022fe7a6664d57ce6d369d8b0105b3b2dc6b985ab647dcd6be9a41b3a1
SHA51231281afba2df1dc007ec739a2cba7a58971d308882a7ad824f373a3f2afd5e7beaad4a5a1dc67f50777da68c9729bd523c8d557e1157a217d7c1e6c077fe1430
-
Filesize
1KB
MD53915ab20c813605b68a5afd80df761fc
SHA1180747f7ec084dfb855c45d14d355209c2637e1e
SHA2569e49cf1cd56388a4f9baa4fa178a62cc3b8a3c1bf6321bf26907e80cae561185
SHA512e28f553d8b6e74f59c9050683ddac6c0a0ecdc0978f6b43d668d1bae8cd39278750dded974286e42848029917e8182630da9ad3bdcb84b512527d23b4c936761
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ebeb18f49277a4215a86654c68393c3f
SHA137f13cab25543b7e96cf7b2d62047fcdc0e93ebb
SHA256f0d66ff50494bc36088b3028a521068d1a273948ed626cfb66bdb78940aa9a9e
SHA5126e9bc1456e0a21885193f9c66624f976b37712030822f4e73ebce89d4c1e181d5427450cbffee1e71e2457ee02403969748010e80e564a5e8e8846996a815a0c
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5b1f935cbd0a4e7baeb4cfa73725bb226
SHA1e5a5f4e788f95ccf950f745d01b8956dd14cb66c
SHA256d7f24ca6d10c289d45cce23f5a19cebc0ea2b9c6b867f6b4b23c4effb08180a9
SHA5128891f8904cf16da4ea8ccfc8bb993b6c0ad3beb7c146765d22e82388d2c4f4f01d84c2979b05b6c4bf11e1e93430454cc83dda012010ebf3369d94153327592d