Analysis
-
max time kernel
1664s -
max time network
1802s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-04-2024 08:03
Static task
static1
Behavioral task
behavioral1
Sample
satan.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
satan.exe
Resource
win10v2004-20240226-en
General
-
Target
satan.exe
-
Size
184KB
-
MD5
c9c341eaf04c89933ed28cbc2739d325
-
SHA1
c5b7d47aef3bd33a24293138fcba3a5ff286c2a8
-
SHA256
1a0a2fd546e3c05e15b2db3b531cb8e8755641f5f1c17910ce2fb7bbce2a05b7
-
SHA512
7cfa6ec0be0f5ae80404c6c709a6fd00ca10a18b6def5ca746611d0d32a9552f7961ab0ebf8a336b27f7058d700205be7fcc859a30d7d185aa9457267090f99b
-
SSDEEP
3072:H8SIBtQnE7OhssdWJ5jy392aCmCbBq0ryEbh/Wl7hqU6Q4NJ15xgDbvSY5thfRb3:c7qvhssdu5jyYaCmCQVE6hqUI5sb9Rb3
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
afypo.exeafypo.exepid process 3272 afypo.exe 1804 afypo.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Explorer.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{20B05F6F-23D3-741B-5056-89006DF8340B} = "C:\\Users\\Admin\\AppData\\Roaming\\Maafry\\afypo.exe" Explorer.EXE -
Suspicious use of NtSetInformationThreadHideFromDebugger 33 IoCs
Processes:
Explorer.EXEafypo.exeConhost.exeWerFault.exemsedge.exeWerFault.exemsedge.exebackgroundTaskHost.exepid process 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 3240 Explorer.EXE 1804 afypo.exe 1804 afypo.exe 1804 afypo.exe 1804 afypo.exe 3628 Conhost.exe 3628 Conhost.exe 3628 Conhost.exe 3628 Conhost.exe 3428 WerFault.exe 3428 WerFault.exe 3428 WerFault.exe 3428 WerFault.exe 1804 afypo.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 2352 msedge.exe 1924 WerFault.exe 1924 WerFault.exe 1924 WerFault.exe 1924 WerFault.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 2432 backgroundTaskHost.exe 2432 backgroundTaskHost.exe 2432 backgroundTaskHost.exe 2432 backgroundTaskHost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
satan.exeafypo.exedescription pid process target process PID 4948 set thread context of 4780 4948 satan.exe satan.exe PID 3272 set thread context of 1804 3272 afypo.exe afypo.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
WerFault.exeWerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1460 vssadmin.exe -
Modifies registry class 1 IoCs
Processes:
sihost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.Search_cw5n1h2txyewy\WasEverActivated = "1" sihost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
satan.exeafypo.exepid process 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 4948 satan.exe 3272 afypo.exe 3272 afypo.exe 3272 afypo.exe 3272 afypo.exe 3272 afypo.exe 3272 afypo.exe 3272 afypo.exe 3272 afypo.exe 3272 afypo.exe 3272 afypo.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3240 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Explorer.EXEvssvc.exeDllHost.exeRuntimeBroker.exedescription pid process Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeBackupPrivilege 3516 vssvc.exe Token: SeRestorePrivilege 3516 vssvc.exe Token: SeAuditPrivilege 3516 vssvc.exe Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 4356 DllHost.exe Token: SeCreatePagefilePrivilege 4356 DllHost.exe Token: SeShutdownPrivilege 3944 RuntimeBroker.exe Token: SeShutdownPrivilege 3944 RuntimeBroker.exe Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE Token: SeCreatePagefilePrivilege 3240 Explorer.EXE Token: SeShutdownPrivilege 3240 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
satan.exesatan.exeafypo.exeafypo.exedescription pid process target process PID 4948 wrote to memory of 4780 4948 satan.exe satan.exe PID 4948 wrote to memory of 4780 4948 satan.exe satan.exe PID 4948 wrote to memory of 4780 4948 satan.exe satan.exe PID 4948 wrote to memory of 4780 4948 satan.exe satan.exe PID 4948 wrote to memory of 4780 4948 satan.exe satan.exe PID 4948 wrote to memory of 4780 4948 satan.exe satan.exe PID 4948 wrote to memory of 4780 4948 satan.exe satan.exe PID 4948 wrote to memory of 4780 4948 satan.exe satan.exe PID 4948 wrote to memory of 4780 4948 satan.exe satan.exe PID 4780 wrote to memory of 3272 4780 satan.exe afypo.exe PID 4780 wrote to memory of 3272 4780 satan.exe afypo.exe PID 4780 wrote to memory of 3020 4780 satan.exe cmd.exe PID 4780 wrote to memory of 3020 4780 satan.exe cmd.exe PID 4780 wrote to memory of 3020 4780 satan.exe cmd.exe PID 3272 wrote to memory of 1804 3272 afypo.exe afypo.exe PID 3272 wrote to memory of 1804 3272 afypo.exe afypo.exe PID 3272 wrote to memory of 1804 3272 afypo.exe afypo.exe PID 3272 wrote to memory of 1804 3272 afypo.exe afypo.exe PID 3272 wrote to memory of 1804 3272 afypo.exe afypo.exe PID 3272 wrote to memory of 1804 3272 afypo.exe afypo.exe PID 3272 wrote to memory of 1804 3272 afypo.exe afypo.exe PID 3272 wrote to memory of 1804 3272 afypo.exe afypo.exe PID 3272 wrote to memory of 1804 3272 afypo.exe afypo.exe PID 1804 wrote to memory of 2416 1804 afypo.exe sihost.exe PID 1804 wrote to memory of 2416 1804 afypo.exe sihost.exe PID 1804 wrote to memory of 2416 1804 afypo.exe sihost.exe PID 1804 wrote to memory of 2448 1804 afypo.exe svchost.exe PID 1804 wrote to memory of 2448 1804 afypo.exe svchost.exe PID 1804 wrote to memory of 2448 1804 afypo.exe svchost.exe PID 1804 wrote to memory of 2524 1804 afypo.exe taskhostw.exe PID 1804 wrote to memory of 2524 1804 afypo.exe taskhostw.exe PID 1804 wrote to memory of 2524 1804 afypo.exe taskhostw.exe PID 1804 wrote to memory of 3240 1804 afypo.exe Explorer.EXE PID 1804 wrote to memory of 3240 1804 afypo.exe Explorer.EXE PID 1804 wrote to memory of 3240 1804 afypo.exe Explorer.EXE PID 1804 wrote to memory of 3484 1804 afypo.exe svchost.exe PID 1804 wrote to memory of 3484 1804 afypo.exe svchost.exe PID 1804 wrote to memory of 3484 1804 afypo.exe svchost.exe PID 1804 wrote to memory of 3740 1804 afypo.exe DllHost.exe PID 1804 wrote to memory of 3740 1804 afypo.exe DllHost.exe PID 1804 wrote to memory of 3740 1804 afypo.exe DllHost.exe PID 1804 wrote to memory of 3840 1804 afypo.exe StartMenuExperienceHost.exe PID 1804 wrote to memory of 3840 1804 afypo.exe StartMenuExperienceHost.exe PID 1804 wrote to memory of 3840 1804 afypo.exe StartMenuExperienceHost.exe PID 1804 wrote to memory of 3944 1804 afypo.exe RuntimeBroker.exe PID 1804 wrote to memory of 3944 1804 afypo.exe RuntimeBroker.exe PID 1804 wrote to memory of 3944 1804 afypo.exe RuntimeBroker.exe PID 1804 wrote to memory of 4048 1804 afypo.exe SearchApp.exe PID 1804 wrote to memory of 4048 1804 afypo.exe SearchApp.exe PID 1804 wrote to memory of 4048 1804 afypo.exe SearchApp.exe PID 1804 wrote to memory of 3544 1804 afypo.exe RuntimeBroker.exe PID 1804 wrote to memory of 3544 1804 afypo.exe RuntimeBroker.exe PID 1804 wrote to memory of 3544 1804 afypo.exe RuntimeBroker.exe PID 1804 wrote to memory of 464 1804 afypo.exe RuntimeBroker.exe PID 1804 wrote to memory of 464 1804 afypo.exe RuntimeBroker.exe PID 1804 wrote to memory of 464 1804 afypo.exe RuntimeBroker.exe PID 1804 wrote to memory of 4440 1804 afypo.exe TextInputHost.exe PID 1804 wrote to memory of 4440 1804 afypo.exe TextInputHost.exe PID 1804 wrote to memory of 4440 1804 afypo.exe TextInputHost.exe PID 1804 wrote to memory of 4392 1804 afypo.exe msedge.exe PID 1804 wrote to memory of 4392 1804 afypo.exe msedge.exe PID 1804 wrote to memory of 4392 1804 afypo.exe msedge.exe PID 1804 wrote to memory of 448 1804 afypo.exe msedge.exe PID 1804 wrote to memory of 448 1804 afypo.exe msedge.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Modifies registry class
PID:2416
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2448
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2524
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\satan.exe"C:\Users\Admin\AppData\Local\Temp\satan.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\satan.exe"C:\Users\Admin\AppData\Local\Temp\satan.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Roaming\Maafry\afypo.exe"C:\Users\Admin\AppData\Roaming\Maafry\afypo.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Roaming\Maafry\afypo.exe"C:\Users\Admin\AppData\Roaming\Maafry\afypo.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp_80d203c6.bat"4⤵PID:3020
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:1796
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1460 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3484
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3740
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3740 -s 7682⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Enumerates system info in registry
PID:3428
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3840
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4048
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3544
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:464
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:4440
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵PID:4392
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.52 --initial-client-data=0x238,0x23c,0x240,0x234,0x2bc,0x7ff9e2402e98,0x7ff9e2402ea4,0x7ff9e2402eb02⤵PID:448
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1924 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:22⤵PID:4028
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=3156 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:32⤵PID:1912
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=3176 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:82⤵PID:3512
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --mojo-platform-channel-handle=5400 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:12⤵PID:1644
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=5584 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:12⤵PID:1336
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3752 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:82⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3728 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:82⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:388
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3112
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4828
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:808
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4356 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4356 -s 7722⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Enumerates system info in registry
PID:1924
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4296
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:232
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2952
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4280
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1872
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4856
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1676
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4552
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3540
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4128
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4760
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:280
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2856
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2276
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1820
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3868
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4012
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4492
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4140
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1100
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3580
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2348
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3308
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4408
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1292
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2368
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4808
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4756
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:720
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2636
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4320
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4868
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1884
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2372
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3044
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4548
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2336
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2000
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2964
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2172
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:376
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1708
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4216
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4032
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1196
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4320
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4768
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4024
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3448
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4200
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3536
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:912
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4216
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:776
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4348
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4504
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3004
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:940
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3764
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3276
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4472
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3608
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1288
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2900
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2324
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3428
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3592
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1608
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2336
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:284
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2164
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4128
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2984
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1860
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4032
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4548
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1628
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:308
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:5116
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:284
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2432
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3932
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4004
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:5036
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2172
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2172 -s 8282⤵PID:664
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1860
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4580
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4372
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1248
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1784
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:5052
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:880
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2636
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2568
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3556
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1444
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2276
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1860
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d3331c9a320a00d31d6c4feb3a4e2e13
SHA1710af12c5116c22bfc8c7fb9cd3551c70938c182
SHA256ae08d671c13736ddd84827ed480eef6b2babe9cc4e2f7b6ccdcc380446c09f33
SHA5121198cbf5bfce9282d136859a4ed1f3469c666c56aaca1a54d47674a1b752e5009a7ca409bebe31b2f17df04678451df1b61617b14ab288faeea3b7ca3393718a
-
Filesize
9KB
MD55f49e32720ed8fef0f0622ba3e2a7046
SHA1f1f5dcdaaa2fbbee7e956767a096ddc06ebc81a8
SHA256e52d0527c6b436f800b431cf37c3d267ec965768cedb2ac208817c0648a2daef
SHA51258b2f0dc6c13671af3a568b753352f58f419e94ac395b37140e03c8ad2da76ccdf7ac956efb5b0518d213f92a921f7b1fade73d55f769529598ed942c324968a
-
Filesize
46KB
MD5d91d0e7aa95b108ecf9908c5eec01f57
SHA14db4739126bb9e6e5ae050bd0889cf72caaf6005
SHA256e0ec269031eaa2112f058febf16fa4efdc857a444a3929fb40db7ee5b81f654d
SHA51285514d07db35dff623950a39a7c935d21fb396235023cc3a6470485c24d4de1b9ba1a2e2cd900317242a7e7fe9b71044fc8e394de17e2cc082beccbd5ef5200e
-
Filesize
46KB
MD5b518642c8be38f12e39ccf960b2a34ae
SHA11b2868070555146e7024cfa69c9ddf5db1dd2db9
SHA2566eb5966c6a846bcec50ad2e19f671aa51ca36bc91c57b7bd8a866a3597ef194f
SHA512aa7f079ae1828cacbcdb38be2ce7ffdbcf40a44cdd1153e1995545952d62a080d4c144a902bf8a69d4a0fad709dbea24870e2fbc5a86344dcf76c604b41fdb12
-
Filesize
8KB
MD58eb9823e6a8fbea8e5605873757eea63
SHA1df7b2c4863356942c7c9266f412fc7c72b5fae71
SHA256dff2a52014fc2305bcad29799892de83dc0cbd9a18830512152af4d10e0ed521
SHA512fdcdf9e8e907a46535f20af5b870977c62319379db32987e0677f14766a4f4b6ea6874dfd51a7d84bf03b981ebab99f42d2c23583803353b363ad236793ffd5c
-
Filesize
8KB
MD536ac71534d12df5d3d5b0964cae0c97c
SHA1d1b5483b4cf749e108912d4e17307edfa4329300
SHA256eb02e72c14501a7ecdf2ff0aec61c38298958ee475fd02614714f64474c55d1c
SHA51238649881ba8342e22de758b40c51f1da0e0db6844410d29b41c77a3b2126703c08ed5d0e6c9c0505fe1ccec113c495cde66e950669552d0938b8b3a711d6f957
-
Filesize
8KB
MD5495b7dc38815628d2c9715ae822772d7
SHA122de7dd1893e4f0fb6143afebeb65b80aa5245d8
SHA256b622aa2b93a0a77107bbebf01e5a9c2fdf2ed1d6075178558804febf6b422f79
SHA512993f13590c1745711f0c0de61d0ad1b53d1a834bdd9cfe643641c7d1fb0b33e838882b328f8cdc36da7fd25db4ad917063fd49f70a5ea9316a17e85aee8a519e
-
Filesize
512KB
MD5909eb7a657ae76519c95a3b6f1801ce2
SHA1b30a7b01bd8e282efd2a49a1e14dd1bf286081d8
SHA256a21881a1e56ebc64cbf764523447049fee7208460b34468a699011e7c6836c0a
SHA512c2d5ace249591d4db34a01b65c167cb84c475adc8b2d48fcc113c49b5f3f2b17e8fe6d5b9b62720f40d77cd1e6349098c6b0f9b8036633648e634b666f5aae78
-
Filesize
14.0MB
MD50709026d490b5e90df6118629e2ca909
SHA1dcf6dd7580f80bd4cc21df620b63cd9bfeb4cfd4
SHA256942111da5ad6e1e722f11ab1969ff5ebe57117f80119ff667f8c70c382eaa6fc
SHA51237d07179cc115597d618d20e4ca14b13e458b2fe6af28360867887b3d45eafe70228e8d92d6db3e2d810d199b8b9d3f7ca8e4b6b737d95f0dc81a8525556856b
-
Filesize
14.0MB
MD5183f952b22bb62be1530f9a84738f7c2
SHA15f3ec076f2006f387870b432bf0d156ead6ae35a
SHA2567193d02c227fb8facbd333b851041e2a5c0de36a8c97463887a1956452301d6b
SHA512603100f76c5babe38ee95a66c27486bc46ff896f02070ca356e71fba4b38ff985051b0ceb948469605b1eab5e89dec00c78bc57e50cc49c39ee8f42f35d60925
-
Filesize
14.0MB
MD52180682da1a0258482bf300eeac49799
SHA1da5ab5b93754eb0dd3ab251eb3ac208eae7b7032
SHA256367c4e360002abd11019e5bb91d713ad16c389e8fed0e58a337ee7a2ce8d1622
SHA512b7cadae487e8945988c21ca9925bd62a385a0462545431b000d6a109016cd57bdc02d50ef6ddb0e875f049ffaae1a9388ac5e945911c82aa7ea433bb6145d4c6
-
Filesize
16KB
MD550ed1301c001ee07a9946dc9ff837018
SHA19fc656f4438b2449daa26611240c329d4ae892b8
SHA2561277023814582d81943fb817b6d5ad26630b514e0410829d8ca2a1f25956c698
SHA512be94fa4670dd213157c7b119eaf53754891b25928ecc821b6c9432ee409fc5b0a0bd2dc643538d49cba771149b2815e50df051e1a43aadf88187f0aab03b2cd7
-
Filesize
16KB
MD59e2184958e47d28dbf32af0620cde64e
SHA1babc3a7c6ba9e608d88515669847d7736768fe62
SHA2560bafec6636325f7fd03a805212fd4259fe76e191fca03d7b5cecfa6a5a5f8ab4
SHA5127487ef715ab8d86c8e5516fa8292659b2e1ed2c11e0fa379738fad299a3bf23ab1b48ae7fc3f537ea6c7677b6fe4aae229710f12ac78d6df8681e39acbe83a37
-
Filesize
16KB
MD5d097cc92fa56d8931cf67e7a93dc9ba9
SHA1338f556d68c17d8c512dd7cd5d18a3174d7eaf46
SHA256476f92dc32f8ee08c995b8674b7409218f6cb11654769ceb88f84b822b4b3e86
SHA51223952c3284e8962e118097b69ba41c28ede986459d19b7228f336c899f346aeba6ba182ec4753e4d5e056a0cd9037088633ae1c3c62ec672d846de2803445e4d
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133585940239738864.txt
Filesize75KB
MD54196838d7bcf8227fd58a6508516ef85
SHA11a2071b13fb16522f77ef8e199026a709296598c
SHA25607846a4a0a81eef717d83ed2943465be5d8bdf7f19a6eb46515f0130b5d91599
SHA51204fe74499f358faeef7acba6303626c29a8f2ec66d08add86852208fdf9ad112831e798b338bbee388832dbce3d40120cfbc6e966d303fce7547ee58abf554a5
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat
Filesize23KB
MD5802d86e18f1986804a1bef86b603573e
SHA146de436d11f0215a1f91018a6474687559cde224
SHA25637efb463add119afef22725824600ff5732f54d1dfc900f1d6184764d697eb0b
SHA5129a44e9bbee3dc95c64e27d2a2e88466656e864a4f3842ce918bd6943356729e1c98b096c4b16cc0d3df4f7078e553890eab0c00657ac21b4a394ac49bc323cd6
-
Filesize
190B
MD5e513a61e1545c037da58191930e39fa2
SHA1d37b14eb5bd684a73f37fbe5c877a10fc967b8d6
SHA2569454f607099ab3ac16f10088b3a2b7d4fe7b95ee5aa68bcdeeb5cd9f1dc121e7
SHA512e8ff253f13d681ba03a830663c901fa364ed5f1cfd336da6cc11c4e1a5e93606092564112152c52ef669c18e7da5ab5ec0c673570a54094a3af2538931cd241d
-
Filesize
67KB
MD5f1545678a360375d25164d52c33789d9
SHA1698371dc7a1dc05f13a9b811fc44bde39a95a5c3
SHA256983e9601a3d8248948ec6bf514b7e94ee90d851914ce04c4649aab2ddd2e4e6b
SHA51239a1d2991cef8b87c44b693fed27b931543d97df1efb81b1686af40edc6688a275646b30fef6d04323667786139e8c3dea618ce2c4025b0b005732f73209b5d1